Feedback & Followups
- πΊπΈ π¨π³ The scope of the Chinese State-sponsored hack of telcos expands: T-Mobile confirms it was hacked in recent wave of telecom breaches β www.bleepingcomputer.com/β¦
- A rare leak of what the GreyKey phone unlocking device can do today: Leak: what law enforcement can unlock with the ‘Graykey’ iPhone hacking tool β appleinsider.com/β¦
- ATM the tools only have partial access to fully patched modern iPhones (no details on what ‘partial’ means π)
- Newer phones and OSes remain more resistant than older ones, so if security is important to you, update!
- In general, iPhones remain more resistant than Androids
Deep Dive 1 β Taking Stock
As we approach the end of the year, summary reports start to come out. These reports mostly focus on the enterprise, so at first glance, theyβre not that relevant to this segment, but if you scratch a little deeper they are. Our security depends on two things:
- The actions we choose to take and fail to take
- The actions the companies we choose to trust choose to take and fail to take
Itβs that second one that these reports are relevant to. Something thatβs depressingly consistent in these reports is that there is a surprising amount of low-hanging fruit left for attackers to exploit. This is why there are moves on both sides of the Atlantic to try establish cybersecurity baselines.
The concept of baseline is not new β we already them for sector of the economy like financial & healthcare, and for government agencies. In an ideal world, there would be a spectrum of baselines and every company and organisation that processes customer data would fall somewhere on that spectrum. No one would get away without at least some baseline responsibilities. Nothing like that is on the cards yet, but there are new baselines in various stages of rollout on both sides of the Atlantic, and they’re expanding the net.
The specifics vary wildly, but if you zoom out, the kinds of organisations that are finding themselves having to prepare for new or expanded mandated baselines of some kind include:
- Government contractors
- Critical infrastructure providers (energy, water, communications etc.)
- Educational institutions
- Organisations holding a lot of personal data
One particularly broad-reaching idea that is gaining traction in Europe is the idea of making software vendors liable for damage caused by negligence on their part. Every software license I’ve ever read includes a clause forcing users to disclaim all rights to compensation for damages. The proposed laws would make those clauses unenforceable throughout all of Europe. In effect, this would put a baseline of not being ‘negligent’ on all software vendors doing business in Europe. It would seem sensible in this kind of world for regulators to release or endorse some kind of best practices like those put out by various organisations already as a working definition of what you need to do not to be negligent.
What has all this to do with end of year reports? Well, those report illustrate why there is so much momentum towards baselines these days β clearly, the free market alone is not succeeding is delivering even a reasonable cybersecurity baseline.
The Most Exploited Vulnerabilities of 2023
The first report that caught my eye is a joint report by the relevant national security agencies in the so-called Five Eyes π¦πΊπ¨π¦π³πΏπ¬π§πΊπΈ. This report lists the vulnerabilities most often used by attackers in successful attacks on enterprises in 2023.
The report’s main calls to action are:
- For software vendors to adopt a Secure by Design approach
- For organisations to put better patch management systems in place so they donβt let so many systems stay so unpatched for so long
To save you trying to find the relevant bits on a long report, I’d recommend the reporting from Bleeping Computer which includes the list as a nice table.
Looking at the list, my two conclusions are:
- Too many organisations are disappointingly slow to patch even the really well-known bugs that make the mainstream news, let alone the less newsworthy run-of-the-mill bugs. The low-lights for me are that top 15 include:
- Log4J which was once a zero-day, but not in 2023!
- MoveIT which did start as multiple zero-days in 2023, but there were patches, massive media coverage, and alerts from major CERTs (Cybersecurity Emergency Response Teams) all over the world within hours. It should not have been reacted to slowly enough for it to make this list!
- Too many organisations are too slow to patch the absolute most critical stuff like their firewalls, remote access tools, and core systems like collaboration tools from:
- Citrix, CISCO, Fortinet, Barracuda & Microsoft dominate the list)
- Pushback from management against downtime and the risk of patching quickly likely plays a big part, but I really don’t think the risk of not pathing is properly factored in much of the time
Links
- The executive summary and links to the full report: 2023 Top Routinely Exploited Vulnerabilities β www.cisa.gov/β¦
- Bleeping Computer’s coverage: FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023 β www.bleepingcomputer.com/β¦
The 25 Most Exploited Vulnerability Type of 2024
The second report that caught me eye is from MITRE, the not-for-profit that manages the critically important MITRE ATT&CK framework that has revolutionised modern cybersecurity tools (a common taxonomy of tactics & techniques used by cyber attackers). MITRE’s report lists the 25 most exploited types of vulnerability seen between July 2023 & 2024. In other words, what are the most common types of software bugs?
Like with the Five Eyes report, Bleeping Computer has a nice summary with a table.
Again, my takeaway is how depressingly old many of these vulnerability types are, and how easy they would be to prevent with simple best practices and modern tooling:
- Trivial data validation bugs that have been understood for decades still dominate the list:
- Cross Site Scripting is still at No. 1, and its slightly more subtle cousin Cross Site Request Forgery is at No. 4 (up five places since 2023!)
- SQL Injection is still at No. 3
- Path traversal (letting things like
../
sneak into user input that gets translated to a file path or URL) is at No. 5, up 3 places since 2023! - OS command injection is at No. 7, and other generic command injections are at No. 13
- Finally, all other generic input validation issues are at No. 12
- Despite a wealth of modern memory-safe languages that make a whole raft of bugs impossible, clearly, lots of code is still written in old memory-unsafe languages like C, and without the required software engineering tools designed to compensate for the language’s well-understood shortcomings being deployed:
- Out-of-bounds-writes (like buffer overflows) are at No. 2, I guess it’s progress that they’re down one place since 2023 π
- Out-of-bounds-reads and Use-after-free error are at Nos. 6 & 8, and they lead to memory leaks like HeartBleed π
- Code injection (making things like remote code execution possible) is not just still on the list at No. 11 but up a whopping 12 places!
- Null pointers leading to app crashes are also still on the list, though they’ve dropped nine places to No. 21
- Even a trivial problem like the good old integer overflow is still on the list at No. 23, though thankfully down nine places
- Leaky security controls are still a big problem, which implies to me there is not enough penetration testing being done by vendors:
- Improper authentication, improper privilege management, and improper authorisation are at Nos. 14, 15 & 18, with the latter two up by seven & six places!
- Exposure of sensitive data to unauthorised actors, i.e. data leaks to software or people, is at No. 17, up a whopping 13 places. I guess that helps explain why we still have so many data leaks π
- Missing authentication on critical function rounds out the list at No. 25, thankfully down five places
- Hardcoded credentials are still a thing in 2024 π€― β though they are down at No. 22, and have fallen 4 places
Links
- The original report: 2024 CWE Top 25 Most Dangerous Software Weaknesses β cwe.mitre.org/β¦
- Bleeping Computer’s coverage: MITRE shares 2024’s top 25 most dangerous software weaknesses β www.bleepingcomputer.com/β¦
Deep Dive 2 β Some Interesting Security Announcements at Microsoft Ignite 2024
Microsoft’s equivalent of Apple’s big WWDC event is their annual Ignite event, and Microsoft Ignite 2024 ran from the 17th to the 23rd of October.
From a cybersecurity point of view, the biggest news was the new high-level initiative to boost Windows security and resiliency.
One of the obvious inspirations for this new security and resiliency push was the infamous CroudStrike outage over the summer. Two announcements in particular are clearly direct responses to that incident:
- Microsoft officially announced that they are working with cybersecurity vendors to add the needed APIs to allow 3rd-party security tools to run outside of the kernel (like they already can on macOS & Linux). This work is happening through the Microsoft Virus Initiative.
- Windows 11 is getting a new recovery tool that lets admins remotely fix computers that fail to boot (like those afflicted by the CrowdStrike bug!)
The focus wasn’t entirely on preventing a next ‘CrowdStrike’. There were some other nice announcements too:
- Windows 11 is getting a new Admin Protection feature:
- When local admins log in, they run as regular users, but have the power to elevate to Admin when needed β massively reducing the damage malware can do without tricking the user or exploiting a bug for privilege escalation
- User experience is Apple-like β Windows Hello to authenticate admin actions
- HotPatch (kernel updates without reboots as we have on Linux, but not yet macOS) is now in test on the latest insider builds of Windows 11
- Microsoft is testing new APIs to allow Paskeys stored in 3rd-party apps to be used for Windows Hello (like FaceID) β partners include 1Password π
Links:
- Microsoft’s blog post in Windows Security and Resiliency β blogs.windows.com/β¦
- Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity β thehackernews.com/β¦
- Microsoft shares more details on Windows 11 admin protection β www.bleepingcomputer.com/β¦
- New Windows 11 recovery tool to let admins remotely fix unbootable devices β www.bleepingcomputer.com/β¦
- Microsoft now testing hotpatch on Windows 11 24H2 and Windows 365 β www.bleepingcomputer.com/β¦
- Microsoft testing Windows 11 support for third-party passkeys β www.bleepingcomputer.com/β¦ (working with 1Password and others)
β Action Alerts
- Patch Tuesday as been and gone:
- Apple patch just about everything
- Ubuntu Linux impacted by decade-old ‘needrestart’ flaw that gives root β www.bleepingcomputer.com/β¦
- A timely reminder of the importance of keeping security tools patched: Security plugin flaw in millions of WordPress sites gives admin access β www.bleepingcomputer.com/β¦
- Security tools tend to be very privileged, so when they have a serious problem like a remote code execution bug or an authentication bypass, the effect is often catastrophic!
Worthy Warnings
- Since many NosillaCastaways use GitHub, beware: New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns β thehackernews.com/β¦ (Malware-as-a-Service offering bulk-targeting of GitHub users)
Notable News
- Signal introduces convenient “call links” for private group chats β www.bleepingcomputer.com/β¦
- πΊπΈ The National Do Not Call list seems to be having a positive effect: FTC reports 50% drop in unwanted call complaints since 2021 β www.bleepingcomputer.com/β¦
Excellent Explainers
- How XProtect protects you from viruses on macOS β appleinsider.com/β¦ (Starts with a deep but approachable overview, then gets really nerdy including lots of cool terminal commands for peering deep under the hood!)
Palate Cleansers
- From Bart:
- π§ Followup from the Euclid image Allison shared last time: Astronomy Cast: Ep. 732- The Euclid Telescope β overcast.fm/β¦
- VMware makes Workstation and Fusion free for everyone β www.bleepingcomputer.com/β¦
- An A-Z Index of Apple macOS (bash) commands β ss64.com/β¦
- Exploits of a Mom (Drop Tables) on XKCD
- From Allison:
- π¬π§ O2 unveils Daisy, the AI granny wasting scammersβ time β news.virginmediao2.co.uk/β¦
- Don’t understand an XKCD cartoon? Check out explain xkcd wiki
Legend
When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.
Emoji | Meaning |
---|---|
π§ | A link to audio content, probably a podcast. |
β | A call to action. |
flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
π | A link to graphical content, probably a chart, graph, or diagram. |
π§― | A story that has been over-hyped in the media, or, “no need to light your hair on fire” π |
π΅ | A link to an article behind a paywall. |
π | A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future. |
π© | A tip of the hat to thank a member of the community for bringing the story to our attention. |
π¦ | A link to video content. |