You are here

Cybersecurity

Threat Update - Click2Gov Victim Identifies Data on Dark Web, Suggests Potential Link to Breach

Another city has come forward with information regarding the ongoing vulnerabilities with online utility payment provider Click2Gov. Unfortunately, this one comes with an added wrinkle. The city of Marietta, GA and the FBI have reason to believe data found on the dark web is linked with recent utility customer online transactions.

Siemens SPPA-T3000 (ICSA-19-351-02) – Product Used in the Energy Sector

CISA has published an advisory on improper authentication, cleartext transmission of sensitive information, unrestricted upload of file with dangerous type, heap-based buffer overflow, integer overflow or wraparound, out-of-bounds read, improper access control, stack-based buffer overflow, SFP secondary cluster: missing authentication, deserialization of untrusted data, information exposure, and cleartext transmission of sensitive information vulnerabilities in Siemens SPPA-T3000. All versions of the Application Server and the MS3000 Migration Server are affected.

GE S2020/S2020G Fast Switch 61850 (ICSA-19-351-01) – Product Used in the Energy Sector

CISA has published an advisory on a cross-site scripting vulnerability in GES2020/S2020G Fast Switch 61850. Versions 07A03 and prior are affected. Successful exploitation of this vulnerability may allow an attacker to inject arbitrary code and allow disclosure of sensitive data. GE produced and released Version 07A04, which fixes the vulnerability. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

“Ransomware Attacks Are Now Data Breaches:” Criminals Threaten to Identify Victims and Release Data

In the last few days, the cyber criminals behind the Maze ransomware created a public website where they identify their victims who have chosen to rebuild their operations rather than yield to the ransom demands. The move is part of the criminals’ signaling that they will publish the data stolen from their victims if they don’t pay. “For years, ransomware developers and affiliates have been telling victims that they must pay the ransom or stolen data would be publicly released,” said cybersecurity researcher and BleepingComputer founder Lawrence Adams.

Omron PLC CJ, CS and NJ Series (ICSA-19-346-03)

CISA has published an advisory on an improper restriction of excessive authentication attempts vulnerability in Omron PLC CJ, CS and NJ. All versions of all three products are affected. Successful exploitation of this vulnerability could allow an attacker to brute force login credentials, obtain unauthorized access of the system, and may allow an attacker unauthorized access to the FTP interface. Omron offers some measures to mitigate the mitigate the vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerability.

Omron PLC CJ and CS Series (ICSA-19-346-02)

CISA has published an advisory on authentication bypass by spoofing, authentication bypass by capture-replay, and unrestricted externally accessible lock vulnerabilities in Omron PLC CJ and CS Series. All versions of both products are affected. Successful exploitation of this vulnerability may allow remote code execution. Omron offers some measures to mitigate the mitigate the vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Advantech DiagAnywhere Server (ICSA-19-346-01) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a stack-based buffer overflow vulnerability in Advantech DiagAnywhere Server. Versions 3.07.11 and prior are affected. Successful exploitation of this vulnerability may allow remote code execution. Advantech has phased out DiagAnywhere Server Version 3.07.11 and removed it from its website. It has released Version 3.07.14 of DiagAnywhere Server to address the reported vulnerability. CISA also recommends a series of measures to mitigate the vulnerability.

Ten Tips to Securely Configure Your New Devices

Whether by taking advantage of retailers’ discounts or through gifting from family members or friends, many people will be the recipients of new cyber gadgets by the end of the present holiday season. Many of these people, in turn, will take these devices (particularly the mobiles ones) into their workplaces, potentially transferring any vulnerabilities they may have to their organizations. With this consideration in mind, WaterISAC encourages its members to review list of ten tips for securely configuring new devices from its partner, MS-ISAC.

Pages

Subscribe to Cybersecurity