Breaches this month
3. Two of note. Standard SWCRC advice: if you might be affected, change your account passwords, implement two factor authentication if the company offers, and beware of communications purporting to be from them in the future. And if youâre using the same password on other sites, have a word with yourself, and change them too.
Uber was extensively breached and there are no clear details about what user data has been accessed, but it seems probable that account details will have been compromised. Interestingly, the route in seems to have been via a tactic we recently warned against: MFA spamming, where the user of a compromised account was sent so many notifications that someone was trying to access his account, that he eventually gave up and accepted. And the
North Face clothing company also had around 200,000 customer records breached, including name, gender, purchase history, billing/ shipping address, and telephone number. This was apparently a result of a so-called âcredential stuffing attackâ where passwords known through previous breaches, were tried on the North Face site. Thatâs why you donât use the same password multiple times.
4. Apps to delete - Mister Phone Cleaner and Kylhavy Mobile Security. Both have been on the Google Play store and have been downloaded around 60,000 times. Theyâve bypassed security in that they donât contain malware, but they do rapidly ask the user to update the apps in order to maintain protection. And thatâs when the malware is installed. Consider a (reputable) virus check on your phone or a factory reset if youâve installed either app.
5. Website vulnerability â affecting Wordpress sites. These sites tend to run lots of different components (or plug-ins), and WPGateway is one of them. Itâs designed to update other plugins and themes, but an as-yet-unfixed vulnerability has been identified which allows unauthorised users to create an admin account and take over your whole site. If this is all a bit meaningless to you, we advise contacting whoever sets up your site and asking them to either remove or disable the plugin for now. The vulnerability has a unique reference which theyâll understand - CVE-2022-3180 â and you can see more detail
here.
6. Breaking news: Google might have access to all of your passwords. Security firm Otto found that if youâre using Edge or Chrome, your passwords are sent in plain text to Google servers, if you have spellcheck set up in your browser, or if you click the âshow your passwordâ icon. Thereâs no confirmation of what happens after that â do they store them anywhere? â and you might of course feel that Google are a reasonable risk⌠but it does seem safest to keep your passwords so that only you can see them. To turn off the spell check feature, we suggest googling âturn off spell check in [browsername]â and youâll find instructions. More detail
here.
7. And lastly,
one for the cyber security experts. Weâre hearing that thereâs an increasing
shift away from Cobalt Strike and towards other frameworks, such as Sliver, Brute Ratel or others. Not because theyâre better, but because they are less known, there are fewer indicators of compromise, and those engaged in network defence may be less familiar with them. In particular, Sliver is an open source framework available on GitHub and there is an expectation that use of it will grow. More information on the Microsoft blog
here.