TLDR Information Security 2024-03-25

Large Scale WordPress site attack ⚠️, KDE Theme wipes user files 😱, German Authorities shut down Nemesis Markets πŸ‡©πŸ‡ͺ

πŸ”“
Attacks & Vulnerabilities

Large-scale Sign1 malware campaign already infected 39,000+ WordPress sites (2 minute read)

A large-scale malware campaign called Sign1 has infected over 39,000 WordPress sites in the last six months. The attackers injected malicious JavaScript that redirected visitors to harmful websites. The malware uses dynamic URLs and only runs if visitors do not come from popular websites to avoid detection.

New Loop DoS Attack May Impact up to 300,000 Online Systems (2 minute read)

A new DoS attack relies on a vulnerability in the UDP protocol that allows for IP spoofing. If an attacker launches an attack against a vulnerable server with the spoofed IP of another vulnerable server, the servers will continuously respond with errors to each other until all resources are exhausted. It is estimated that 300,000 servers are vulnerable to this attack.

KDE Advises Extreme Caution After Theme Wipes User’s Files (3 minute read)

In light of a Reddit user reporting that installing a KDE Plasma theme wiped all of their files, KDE has issued a warning to vet themes before installing them. This is because themes can be uploaded by anyone and by the nature of how they change the behavior of KDE, they must execute arbitrary code. KDE has promised to make its security warnings more clear and, resources permitting, begin to vet themes.
🧠
Strategies & Tactics

Passkeys – Under The Hood (6 minute read)

This article covers the technical details on how Passkeys work under the hood and how to use this technology for your organization as a replacement for passwords. Passkeys offer advantages like synchronization to multiple devices. Their implementation and security measures vary among services. The shift in threat models from hardware security keys to passkeys requires careful consideration based on user requirements.

OPA 1.0 is Coming. Here’s What You Need to Know (7 minute read)

Version 1.0 of OPA includes a few breaking changes. The OPA team has provided flags for opa check and opa fmt to check and update policies for compliance.

Remote Code Execution (RCE) Lateral Movement Tactics in Cloud Exploitation (6 minute read)

This blog post discusses Remote Code Execution (RCE) in the context of cloud environments, specifically focusing on AWS. It explains the steps attackers can use to exploit RCE vulnerabilities in the cloud with blurbs about how Uptycs can help, but the advice and insights should be common enough to be applicable to other tools too.
πŸ§‘β€πŸ’»
Launches & Tools

Introducing PoIEx - Points of Intersection Explorer (5 minute read)

The Doyensec team developed PoIEx to aid in its code audit efforts. Points of Intersection are areas in application code that interact with IaC infrastructure. PoIEx creates a graph of IaC infrastructure and allows for jumping to application code that references it using semgrep rules.

The Family of Safe Golang Libraries is Growing (4 minute read)

Google has released three new Golang libraries built to be secure by default. SafeText is used for processing YAML templates and templating shell commands. SafeOpen is designed to protect against path traversal attacks when opening files. SafeArchive is meant to protect against attacks related to dealing with archive files.

weAudit (3 minute read)

weAudit is a VS Code extension that aids teams of code reviewers. It allows reviewers to add bookmarks with findings or notes to code as well as mark files as reviewed. weAudit tracks bookmarks and notes in shareable files to enable collaboration and allow for the creation of GitHub issues.
🎁
Miscellaneous

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties (2 minute read)

Russian hackers linked to Russia's Foreign Intelligence Service (SVR) have been using the WINELOADER malware to target German political parties through phishing emails with logos from the Christian Democratic Union (CDU).

Microsoft to shut down 50 cloud services for Russian businesses (3 minute read)

Microsoft is set to shut down access to over fifty cloud services for Russian organizations by the end of March in compliance with EU sanctions. The decision was influenced by EU Council Regulation 2023/2873, which prohibits supplying certain software, including cloud solutions, to entities in Russia.
⚑️
Quick Links

Responding to a cyber incident – a guide for CEOs (5 minute read)

The UK's National Cyber Security Centre has released a set of guidelines for public and private sector leaders to navigate cyber security incidents effectively.

Hackers Can Unlock Over 3 Million Hotel Doors In Seconds (1 minute read)

A group of security researchers discovered a technique called Unsaflok that allows hackers to open Saflok-brand RFID-based keycard locks in hotel rooms worldwide.

German Authorities Shut Down Online Marketplace for Drugs, Data, and Cybercrime Services (1 minute read)

German authorities have shut down the Nemesis Market, an online marketplace dealing in drugs, cybercrime services, and fraudulently obtained credit card data.
Curated news πŸ“°, research πŸ§‘β€πŸ”¬, and tools πŸ”’ for information security professionals
Join 300,000 readers for