Cybersecurity News – Jenkins’ 0-day bugs, HackerOne employee sells bugs, preventable issues lead Q1 attacks

Jenkins discloses dozens of zero-day bugs in multiple plugins

On Thursday, the Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open source automation server, 29 of the bugs being zero-days still waiting to be patched. The zero-days’ CVSS base scores range from low to high severity, and, according to Jenkins’ stats, the impacted plugins have a total of more than 22,000 installs. The complete list of flaws yet to be patched includes XSS, Stored XSS, Cross-Site Request Forgery (CSRF) bugs, missing or incorrect permission checks, as well as passwords, secrets, API keys, and tokens stored in plain text. Based on Shodan data, there are currently more than 144,000 Internet-exposed Jenkins servers that could be targeted in attacks if running an unpatched plugin.

(Bleeping Computer)

Rogue HackerOne employee steals bug reports to sell on the side

The rogue worker had contacted about half a dozen HackerOne customers and collected bounties “in a handful of disclosures,” the company said on Friday. On June 22, HackerOne responded to a customer request to investigate a suspicious vulnerability disclosure through an off-platform communication channel from someone using the handle “rzlr.” The customer had noticed that the same security issue had been previously submitted through HackerOne. The rogue employee received bounties for some of the reports they submitted, which allowed HackerOne to follow the money trail and identify the perpetrator as one of its workers who triaged vulnerability disclosures for “numerous customer programs.”

(Bleeping Computer)

Patchable and preventable security issues lead causes of Q1 attacks

Eighty-two percent of attacks on organizations in Q1 2022 were caused by the external exposure of known vulnerabilities in the victim’s external-facing perimeter or attack surface. Those unpatched bugs overshadowed breach-related financial losses tied to human error, which accounted for 18 percent. The numbers come from Tetra Defense and its quarterly report that sheds light on a notable uptick in cyberattacks against United States organizations between January and March 2022. The report did not let employee security hygiene, or a lack thereof, off the hook. Tetra revealed that a lack of multi-factor authentication (MFA) mechanisms adopted by firms and compromised credential are still major factors in attacks against organizations.

(Threatpost)

Raspberry Robin Windows worm has already infected hundreds of organizations.

Discovered by cybersecurity researchers from Red Canary, Raspberry Robin is a Windows worm that propagates through removable USB devices. It uses Windows Installer to reach out to QNAP-associated domains and download a malicious DLL. The malware uses TOR exit nodes as a backup C2 infrastructure. The malware was first spotted in September 2021, with Red Canary experts observed it targeting organizations in the technology and manufacturing industries. BleepingComputer reported that Microsoft warned its customers via a private threat intelligence advisory sent to Microsoft Defender for Endpoint subscribers.

(Security Affairs)

Thanks to today’s episode sponsor, Votiro

Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes evasive and unknown malware from content in milliseconds, without impacting file fidelity or usability. It even works on password-protected and zipped files. Plus, it’s an API, so it integrates with everything – including Microsoft 365. Learn more at Votiro.com.

British Army social media accounts hijacked

The British army’s Twitter and YouTube accounts were compromised by a malicious third party on Sunday and used to direct visitors to cryptocurrency scams. The Ministry of Defence (MoD) press office account took to Twitter at around 7pm local time to report the incident, and four hours later an update claimed the issue had been resolved. The hackers had posted multiple promotional links to various crypto and NFT scams using live stream videos featuring celebrities like Elon Musk and Jack Dorsey, which one prominent lending institution, Santander, says is a fast growing trend in the crypto scam business.

(InfoSecurity Magazine)

UK signs deal to share police biometric database with US border guards

According to a member of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (LIBE), “informally” meetings with representatives of the US Department of Homeland Security were held this week to discuss the plans. They come under the auspices of the Enhanced Border Security Partnership (EBSP), which is designed to increase the US Department Of Homeland Security’s ability to detect threats through biometric information sharing. Israel signed up to the arrangement in March. LIBE committee members said they have already discovered that the UK – and three unidentified EU member states had already signed up to reintroduce US visa requirements which grant access to police biometric databases. 

(The Register)

Last week in ransomware 

Last week’s big news was the release of LockBit 3.0, which includes a new bug bounty reward program where the threat actors pay between $1,000 to $1 million for submitted bugs and new ways of enhancing their operation. A LockBit affiliate is distributing the ransomware through fake copyright infringement emails, Word docs are used to install AstraLocker directly, and the Black Basta gang is exploiting the PrintNightmare vulnerabilities. There were attacks last week on publishing house Macmillan, Fitzgibbon Hospital in Missouri, Med. University of Innsbruck, and automotive fabric supplier TB Kawashima. Threat actors also claimed to have attacked semiconductor giant AMD, and Walmart, who says the attack never occurred.

(Bleeping Computer)

FBI adds CryptoQueen to top ten most wanted

Ruja Ignatova, a Bulgarian woman believed to be in her 40s, is wanted for her alleged role in running a cryptocurrency Ponzi scheme known as OneCoin. Federal investigators accuse the fugitive of using the scheme to defraud victims out of more than $4bn. She has been missing since 2017 when US officials signed an arrest warrant and investigators began closing in on her. In 2014, OneCoin, a self-described cryptocurrency, began offering buyers commission if they sold the currency on to more people. But FBI agents say OneCoin was worthless and was never safeguarded by the blockchain technology used by other cryptocurrencies. For those interested in this story, the podcasting arm of the BBC has a 10-part series entitled “The Missing Cryptoqueen.”

(BBC News)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.