You are here

Cybersecurity

Researchers Release Security Software to Defend against Cyber Attacks

A team consisting of researchers from Microsoft Research, Inria, and Carnegie Mellon University’s CyLab recently released the world's first verifiably secure industrial-strength cryptographic library – a set of code that can be used to protect data and is guaranteed to protect against the most popular classes of cyberattacks. The library is called “EverCrypt” and is available for download on GitHub. "With EverCrypt, we can rule out entire classes of vulnerabilities," said CybLab’s Bryan Parno, who is also an associate professor of Computer Science and Electrical and Computer Engineering.

Multiple Vulnerabilities in Broadcom WiFi Chipsets

The CERT Coordination Center (CERT/CC) has released information on multiple vulnerabilities in Broadcom Wi-Fi chipset drivers. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. The NCCIC encourages users and administrators to review the CERT/CC Vulnerability Note VU#166939 for more information and refer to vendors for appropriate updates, when available.

Latest Supply Chain Attack Demonstrators the Importance of Evaluating all Vendors

In the latest high-profile supply chain attack, IT consulting firm Wipro confirmed it experienced a phishing attack that may have allowed its systems to be used to target many of its clients. Wipro believes it was targeted, possibly by a nation-state attacker, who then used the company’s own systems to deliver follow up attacks on at least 12 of its customers. This incident is notable because of the perpetrators’ ability to compromise Wipro accounts, despite the company’s expertise in the area.

Delta Industrial Automation CNCSoft (ICSA-19-106-01)

The NCCIC has published an advisory on stack-based buffer overflow, heap-based buffer overflow, and out-of-bounds read vulnerabilities in Delta Industrial Automation CNCSoft. Versions 1.00.88 and prior are affected. Successful exploitation of these vulnerabilities could cause buffer overflow conditions that may allow information disclosure, remote code execution, or crash the application. Delta Electronics recommends updating to the latest version of ScreenEditor 1.00.89. The NCCIC also provides a list of recommended measures for addressing the vulnerabilities.

WAGO Series 750-88x and 750-87x (ICSA-19-106-02) – Products Used in the Energy Sector

The NCCIC has published an advisory on a use of hard-coded credentials vulnerability in WAGO Series 750-88x and 750-87x. Numerous versions of these two products are affected. This vulnerability allows a remote attacker to change the settings or alter the programming of the device. WAGO has released a security advisory and recommends updating to the newest firmware and taking a series of defense measures. The NCCIC also provides a list of recommended measures for addressing the vulnerabilities.

Protecting Against Ransomware

The NCCIC has published a “Protecting Against Ransomware” Security Tip, which provides an overview of ransomware, describes how it works and is delivered, and provides recommendations for preventing and responding to ransomware infections. This resource also contains numerous links to other products for helping partners to understand ransomware and how to protect themselves and their organizations from attacks. Access the Security Tip at NCCIC/US-CERT.

North Korean Malicious Cyber Activity – “HOPLIGHT” Trojan

The Department of Homeland Security (DHS) and the FBI report they have identified a Trojan malware variant – referred to as “HOPLIGHT” – used by the North Korean government. The DHS National Cybersecurity and Communications Integration Center (NCCIC) has published a Malware Analysis Report (MAR) on HOPLIGHT that it encourages partners to review. The MAR includes malware descriptions, suggested response actions, and recommended mitigation techniques.

Limiting ICS Impacts from IT-focused Incidents

The industrial cybersecurity community, including WaterISAC, continues to emphasize the larger threat to ICS emanates from IT versus OT-centric cyber threats. To further address this issue, ICS cyber forensic firm Dragos posted Implications of IT Ransomware for ICS Environments. Dragos discusses the importance in identifying the propagation methods of IT-based malware, like WannaCry, NotPetya, and LockerGoga in order to more effectively prevent inadvertent impact to ICS operations.

Pages

Subscribe to Cybersecurity