On the 12th day of December, Verismic sent to me … Top 10 Breaches of 2017!
Throughout this year we have been breaking some of the worst IT security breaches of 2017, which have impacted millions of users worldwide. We continue to advise our clients the single most important decision you can make to achieve a level of protection for your organization is to onboard a tool like Cloud Management Suite to automate the detection of all devices and to automate a rigorous patching processes. If you need help, please download our Avoiding Patch Doomsday whitepaper or get in touch.
Here are our top 10 IT security breaches for 2017:
- TeamViewer Exploited. A new vulnerability within TeamViewer has been making news across the internet. In an official statement by the company, they revealed that a GitHub user discovered a vulnerability in TeamViewer’s set of permissions.
- Worldwide Malware Attack: Exploring WannaCry. WannaCry is the worst malware attack of 2017. As computer virus outbreaks go, this ransomware attack is being called one of the biggest cyberattacks in history and continues to spread worldwide.
- Equifax Hack – Cyberattack. Criminals gained access to certain files in Equifax’s system from mid-May to July by exploiting a weak point in website software affecting 143 million customers worldwide.
- Hyatt Hack: Major Data Breach. 41 of its hotels spread across 13 countries confirmed unauthorized access to payment card information. Hyatt suffered a similar breach affecting 250 hotels located in 50 countries back in 2015.
- HBO – Game of Thrones series stolen. The recent HBO hack may have exposed up to 1.5 terabytes of data. This is 7 times what Sony lost in the 2014 cyberattack.
- CIA Hacks. Wikileaks recently published the article “Vault 7: CIA Hacking Tools Revealed.” This list of compromised software includes Notepad++. When Notepad++ is launched, the original scilexer.dll is replaced by a modified scilexer.dll built by the CIA.
- BadRabbit: Newest Ransomware to Target Corporate Networks. The outbreak began in Russia, infecting big Russian media outlets, but it has already spread. Several US and UK firms, with corporate entities in the Ukraine and Russia, have already been infected.
- Hidden Cobra: North Korea’s History of Hacking. Since 2009, Hidden Cobra actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disruptive in nature.
- Invasion of the Body Hackers. On August 29th, the FDA issued an alert regarding Abbott pacemakers. Formerly known as St. Jude Medical, the Abbott pacemakers have vulnerabilities in their software.
- BitPaymer Ransomware Hits NHS. The hack caused major disruption, leading to thousands of cancelled appointments.
BREAKING NEWS: 1.4 Billion credentials leaked on the Dark Web!
A huge data dump has been found on the dark web containing 1.4 clear text credentials. At over 41 gigabytes in size, this will take some time to pass through however you can be assured sophisticated programs will be ready soon to exploit software, apps or websites you are using. Robert Brown, Director of Services at Verismic said, “No matter how complex your passwords are, it is not going to be complex enough if your password is discovered in this data dump. Two-factor authentication has been around for years, and Cloud Management Suite has been using Two-factor since the beginning to protect our customer identity. Two-factor authentication within Cloud Management Suite requires an additional automatically generated password be entered via email or Google Authenticator ensuring no single password gives you full access to the system. We would highly encourage our clients to leave it enabled as it is enabled by default.”
Companies Plan to Change Third-Party Vendors that Pose Highest Risks!
Global consulting firm Protiviti and the Shared Assessments Program’s annual Vendor Risk Management Benchmark Study finds that a majority (53 percent) of organizations surveyed are likely to exit or change (de-risk) relationships with some vendors due to heightened risk levels. The study finds that 71 percent of these organizations will likely change their high-risk relationships over the next 12 months. Robert Brown, Director of Services for Verismic said, “Deployment of Third-party updates to bring them into compliancy is simple if you are using the right systems management toolset & the right approach to deployment of detected updates.” The full article can be found here.
December Patch Tuesday Release
Microsoft addressed 32 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, Microsoft Edge, Microsoft Exchange, Microsoft Excel, Microsoft PowerPoint, and Microsoft SharePoint. The vulnerabilities could allow an attacker to execute arbitrary code, gain elevated privileges, bypass security protections, view sensitive information, or cause a denial of service condition. We have chosen a few updates to prioritise this month, this recommendation has been made using evidence from industry experts (including our own), anticipated business impact & most importantly the independent CVSS score for the vulnerability. The independent CVSS scores used in the table below range from 0 to 10. Vulnerabilities with a base score in the range 7.0-10.0 are High, those in the range 4.0-6.9 are Medium, and 0-3.9 are Low.
|CVE ID||Vulnerability Alert||CVSS Base Score||Recommended|
|CVE-2017-11886||Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11890||Microsoft Internet Explorer Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11894||Microsoft Edge and Internet Explorer Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11895||Microsoft Edge and Internet Explorer Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11899||Microsoft Windows Security Feature Bypass Vulnerability||7.5||Yes|
|CVE-2017-11901||Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11903||Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11907||Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11912||Microsoft Edge and Internet Explorer Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11913||Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11919||Microsoft Edge and Internet Explorer Information Disclosure Vulnerability||7.5||Yes|
|CVE-2017-11930||Microsoft Edge and Internet Explorer Memory Corruption Vulnerability||7.5||Yes|
|CVE-2017-11885||Microsoft Windows RRAS Arbitrary Code Execution Vulnerability||6.6||Yes|
|CVE-2017-11932||Microsoft Exchange Spoofing Vulnerability||5.4||Yes|
|CVE-2017-11936||Microsoft SharePoint Cross-Site Scripting Vulnerability||5.4||Yes|
|CVE-2017-11887||Microsoft Internet Explorer Scripting Engine Information Disclosure Vulnerability||4.3|
|CVE-2017-11906||Microsoft Internet Explorer Scripting Engine Information Disclosure Vulnerability||4.3|
|CVE-2017-11927||Microsoft Windows Information Disclosure Vulnerability||4.3|
|CVE-2017-11934||Microsoft PowerPoint Information Disclosure Vulnerability||4.3|
|CVE-2017-11888||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11889||Microsoft Edge Memory Corruption Vulnerability||4.2|
|CVE-2017-11893||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11905||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11908||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11909||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11910||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11911||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11914||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11916||Microsoft Edge and Internet Explorer Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11918||Microsoft Edge Scripting Engine Memory Corruption Vulnerability||4.2|
|CVE-2017-11935||Microsoft Excel Arbitrary Code Execution Vulnerability||4.2|
|CVE-2017-11939||Microsoft Office Information Disclosure Vulnerability||3.1|