october-security-report2016

October 2016 Internet Security Report


Joomla takes the cake for most serious exploits doing the rounds this month, with a combination of account creation and privilege escalation vulnerabilities proving an easy way to take complete control of various versions of Joomla. The diagnosis is grim for anyone who was not paying enough attention to patch within 24 hours as mass exploitation of these vulnerabilities have been reported, if you have not patched you should assume your Joomla site is already compromised.

Threats

  • Joomla 3.6.4 was released to address account creation, elevation, and modification vulnerabilities that are being actively exploited in mass across the web just days after the vulnerabilities were disclosed. Anyone who has not already updated should consider their site compromised.
    https://www.joomla.org/announcements/release-news/5678-joomla-3-6-4-released.html
  • Microsoft patched 45 security flaws in their October 2016 patches, one of which is being actively exploited as part of a malvertising campaign. This also being Microsoft first month with their new patching approach, removing the ability to pick-and-choose patches to apply. This new system puts much more pressure on software maintainers to push out patches for their applications that break due to patching, as companies would otherwise have to choose with being vulnerable to exploits, or have a functional application.
    https://technet.microsoft.com/en-us/library/security/ms16-oct.aspx
  • Google has released some unpatched 0-day vulnerabilities in Windows after the time limit of responsible disclosure of actively exploited vulnerabilities ran out. This vulnerability has no patch available and is “local privilege escalation in the Windows kernel that can be used as a security sandbox escape”. Windows 10 Anniversary update is not vulnerable and Microsoft reports that older versions of Microsoft will provide patches on Tuesday, November 8.
    https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html
    https://blogs.technet.microsoft.com/mmpc/2016/11/01/our-commitment-to-our-customers-security/
  • Linux Kernel local privilege escalation vulnerability known as Dirty COW has been patched 9 years after its introduction. As this vulnerability has existed for so long, it will affect practically all Linux-powered devices, from cars, to android phones, routers, etc… Cleaning up this Dirty COW is not going to be easy, with many devices simply no longer supported, or patches take months to be released.
    http://dirtycow.ninja/
  • DNS hosting provider DynDNS has been hit by a huge DDoS attack that shook much of their services offline. Being a DNS provider this had very long reaching effects with many major websites being brought offline because users were unable to perform DNS lookups for websites using DynDNS services.
    Read more on Krebs on Security website
  • Spam has been found to be delivered through a calendar invite file “.ics” that contained a cancellation request with many recipients. Depending on how the calendar invite is managed it could cause the spam email to be forwarded to all the recipients from your email address.
    https://isc.sans.edu/forums/diary/Spam+Delivered+via+ICS+Files/21611/

Breaches

Other

  • The Privacy Amendment (Notifiable Data Breaches) Bill 2016 has passed its second reading in the Australian House of Representatives. If passed, this bill will require entities subject to the Privacy Act 1988 to issue a notification in case personal information (that may result in serious harm) gets lost.
  • The Register has published an interesting post on the potential liabilities of being hacked.
    http://www.theregister.co.uk/2016/10/14/been_hacked_what_are_you_liable_for/