You are here

Cybersecurity

LCDS LAquis SCADA LQS File Parsing (ICSA-19-213-06) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on out-of-bounds read and type confusion vulnerabilities in LCDS LAquis. SCADA 4.3.1.71 is affected. Successful exploitation of these vulnerabilities could allow an attacker to obtain confidential information or execute remote code. LCDS recommends users update to Version 4.3.1.323. The NCCIC also advises of a series of measures for mitigating the vulnerability. Read the advisory at CISA.

Advantech WebAccess HMI Designer (ICSA-19-213-01) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on an out-of-bounds write vulnerability in Advantech WebAccess HMI Designer. Versions 2.1.9.23 and prior are affected. Successful exploitation of this vulnerability may allow an attacker to remotely execute arbitrary code. Advantech has released Version 2.1.9.31 of WebAccess HMI Designer to address the reported vulnerability. The NCCIC also advises of a series of measures for mitigating the vulnerability. Read the advisory at CISA.

New Playbooks Provide Overviews and Technical Information on Top Cyber Threat Actors

Unit 42, which describes itself as “the global threat intelligence team” at Palo Alto Networks, has released 11 new “Adversary Playbooks” that present the tools, techniques, and procedures (TTPs) used by cyber threat actors. The addition of the newest Playbooks nearly doubles the number in Unit 42’s collection, which now stands at 21.

Tips for Cleaning Out Old Data and Devices

The Center for Internet Security (CIS) reminds partners to properly dispose of old or unused data and devices in its July 2019 newsletter. Without careful management of online accounts, cloud storage, physical storage, and electronic devices, users could inadvertently disclose sensitive information that can be exploited by cyber criminals. CIS is home to the Multi-State Information Sharing & Analysis Center (MS-ISAC), a WaterISAC partner focused on cyber threat prevention, protection, response, and recovery for U.S. state, local, tribal, and territorial government entities.

Prima Systems FlexAir (ICSA-19-211-02)

The NCCIC has published an advisory on numerous types of vulnerabilities in Prima Systems FlexAir. Versions 2.3.38 and prior are affected. Exploitation of these vulnerabilities may allow an attacker to execute commands directly on the operating system, upload malicious files, perform actions with administrative privileges, execute arbitrary code in a user’s browser, discover login credentials, bypass normal authentication, and have full system access. Prima Systems has released Version 2.5.12 to fix these issues.

Poor Rates of DMARC Adoption Help Perpetuate Email Spoofing

Analysis performed of domains used by Fortune 500 companies, U.S. government agencies, and other major organizations reveal nearly 80 percent don’t use DMARC, or Domain-based Message Authentication, Reporting & Conformance. It is a protocol that works on top of email servers that already support the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). It lets email server administrators put policies in place that can detect when an incoming email is lying about its real "From:" address.

Free Ransomware Recovery Service Celebrates Third Anniversary

Last Friday marked the third anniversary of the “No More Ransom” initiative that has helped more than 200,000 victims of ransomware recover their files free of charge since it was first launched in July 2016. The initiative is a public-private partnership, which includes Europol’s European Cybercrime Centre (EC3), that offers the victims of ransomware an alternative solution to losing their files or having to pay the demanded money to the criminals.

CISA and MS-ISAC Join in Statement Recommending Immediate Action against Ransomware

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State ISAC (MS-ISAC), both WaterISAC partners, have joined with the National Governors Association and the National Association of State Chief Information Officers in releasing a statement recommending state and local governments take immediate action to safeguard against ransomware attacks.

Pages

Subscribe to Cybersecurity