Cybersecurity News: FCC China ban, Windows servers freeze, WhatsApp data leak

FCC announces ban on Chinese telecom and surveillance equipment

The total ban applies to Chinese companies Huawei, ZTE, Hytera, Hikvision, and Dahua and is due to what is being called an “unacceptable” national security threat. They are included as a directive in the Secure Equipment Act of 2021, which was signed by President Biden in November. Hytera, Hikvision, and Dahua must provide details about the safeguards they have implemented on the sale of their devices for government use and the surveillance of critical infrastructure facilities. The FCC explained that the above companies are subject to the exploitation, influence and control of the Chinese government, and the national security risks associated with such exploitation, influence, and control.

(Security Affairs)

New Windows Server updates cause domain controller freezes, restarts

Microsoft is investigating LSASS memory leaks, caused by Windows Server updates released during the November Patch Tuesday, that might lead to freezes and restarts on some domain controllers. LSASS (short for Local Security Authority Subsystem Service) is responsible for enforcing security policies on Windows systems, and it handles access token creation, password changes, and user logins. If this service crashes, logged-in users immediately lose access to Windows accounts on the machine, and they’re shown a system restart error followed by a system reboot. Microsoft is working on a resolution and says it will provide an update with an upcoming release.

(Bleeping Computer)

WhatsApp data leak: 500 million user records for sale

On November 16, an actor posted an ad on a well-known hacking community forum, claiming they were selling a 2022 database of 487 million WhatsApp user mobile numbers. The dataset allegedly contains WhatsApp user data from 84 countries. Threat actor claims there are over 32 million US user records included. The dataset also allegedly has tens of millions of numbers from customers in Egypt, Italy, Saudi Arabia, France, Turkey, Russia and the UK. The seller did not specify how they obtained the database, suggesting they “used their strategy” to collect the data. WhatsApp parent company, Meta has not commented on this story, but industry experts suggest that this collection of numbers could have been achieved from scraping, and not hacking.

(Cybernews)

Ransomware gang targets Belgian municipality, hits police instead

The Ragnar Locker ransomware gang has published stolen data from what they thought was the municipality of Zwijndrecht, but turned out to be stolen from Zwijndrecht police, a local police unit in Antwerp, Belgium. The leaked data reportedly exposed thousands of car license plates, fines, crime report files, personnel details, investigation reports, and more. This type of data can potentially expose people who reported crimes or abuse and could compromise ongoing law enforcement operations and investigations. Belgian media outlets call this data leak one of the biggest of this kind that has impacted a public service in the country, exposing all data kept by Zwijndrecht police from 2006 until September 2022.

(Bleeping Computer)

Thanks to this week’s episode sponsor, Automox

Automox allows you to automate the configuration, patching, and compliance of your Windows, macOS, and Linux systems all from the cloud. Visit Automox.com to start a free trial and have all your endpoints safe and secure in just 15 minutes. Automox is also offering special pricing from now until December 31st so you can start 2023 off right and get automated patching without breaking your budget.

Meta confirms U.S. military involvement in sprawling phony social media operation

People associated with the U.S. military were behind dozens of phony Facebook accounts, more than a dozen pages, a pair of groups and 26 Instagram accounts that pushed pro-U.S. messaging largely to audiences in the Middle East and Central Asia, while attempting to hide their real identities, Facebook’s parent company Meta said in a report published Tuesday. After researchers first exposed the decade-long operation in August, the Pentagon ordered “a sweeping audit of how it conducts clandestine information warfare,” The Washington Post reported in September. Citing unnamed U.S. officials, the paper reported that U.S. Central Command was among the entities under scrutiny as part of their potential role in the operation. A spokesperson for U.S. Central Command declined to comment Tuesday.

(Cyberscoop)

Dell, HP, and Lenovo devices found using outdated OpenSSL versions

An analysis of firmware images across devices from these manufacturers has revealed the presence of outdated versions of the OpenSSL cryptographic library, underscoring a supply chain risk. EFI Development Kit, functions as an interface between the operating system and the firmware embedded in the device’s hardware. Per firmware security company Binarly, the firmware image associated with Lenovo Thinkpad enterprise devices was found to use three different versions of OpenSSLsoem dating back to August 2014. “This clearly indicates the supply chain problem with third-party dependencies when it looks like these dependencies never received an update, even for critical security issues,” the company said.

(The Hacker News)

Businesses hope to cut cyber turnover by encouraging volunteer work 

Companies are encouraging their cyber employees to volunteer at nonprofits, a nudge that managers say can help businesses retain in-demand technical experts despite high turnover in security roles. The CyberPeace Institute, a Geneva-based group that helps nonprofits, humanitarian and healthcare organizations address cybersecurity, set up a program last year to enlist professionals from the corporate world to explain things like email phishing to nonprofits that might lack the budget to hire their own experts.  Cyber volunteerism can also bolster the team as a whole, said Clair Rosso, chief executive of (ISC)2. Stepping away from day-to-day work and looking at a different organization as an outsider can give employees a fresh perspective on their own job, she said. “There’s a case that allowing employees to go and volunteer in other organizations is actually going to strengthen the security posture of your own organization,” she said.

(Wall Street Journal)

Automakers are locking the aftermarket out of ECUs

As vehicles start to integrate more complex systems such as Advanced Driver Assist Systems and over-the-air updates, automakers are growing weary of what potential bad actors could gain access to by way of hacking. Whether those hacks come in an attempt to retrieve personal customer data, or to take control of certain aspects of these integrated vehicles, automakers want to leave no part of that equation unchecked. In order to prevent this from becoming a potential safety or legal issue, numerous car manufacturing companies have moved to heavily encrypt their vehicle’s software. This sort of total lockout presents an interesting challenge for tuners who rely on access to things like engine and transmission control modules to create their products.

(Road and Track)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.