Cyber Security Today, August 18, 2023 – CISA urges action on a Citrix ShareFile vulnerability, and more

Share post:

The CISA urges action on a Citrix ShareFile vulnerability, and more.

Welcome to Cyber Security Today. It’s Friday, August 18th, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

A vulnerability in the storage zones controller of Citrix’s ShareFile file transfer application has caught the attention of the U.S. Cybersecurity and Infrastructure Security Agency. An alert and fix about this vulnerability was issued by Citrix in June. But the cybersecurity agency is now warning federal departments — and all organizations — using this application to install the fix. Vulnerable file transfer applications like Accelion FTA, GoAnywhere MFT and MOVEit have been targets for hackers over the past two years.

Separately, CNN reports that the White House has ordered federal departments to get cracking on complying with a 2021 executive order to boost their cybersecurity posture. As of the end of June many departments and agencies were behind, says a memo to senior officials. They have until the end of this year to meet their deadlines.

Still with the U.S. government, the Consumer Financial Protection Bureau is promising action to ensure data brokers comply with the U.S. Fair Credit Reporting Act. That act requires data being sold to third parties, such as credit and employment agencies, must be accurate. The bureau might also limit the ability of credit reporting companies to disclose personal information that could be used to contact people who don’t want to be bothered by marketers.

Microsoft still hasn’t closed a significant hole in the naming policies of modules developers can put in PowerShell Gallery. That’s according to researchers at Aqua Security. As a result threat actors can plunk malware in Gallery modules or scripts with similar names to legitimate packages. It’s the same tactic used by threat actors in open source libraries like GitHub, NPM and others. There are over 9 billion packages in PowerShell Gallery. What’s the risk? A Windows or Azure developer could download what they think is a legitimate package and infect their IT system.

UPDATE: After this podcast was recorded Microsoft told The Register that it has made some changes to help identify and remove from the Gallery packages with misleading names.

Last month researchers at vpnMentor completed a 14 month-long experiment. They set up a honeypot with fake data — an unprotected website purporting to be a fraud prevention company — to see what would happen. Within a month it had been found and somone started stealing data. Word must have spread because over the test period there were about 50,000 downloads a month. Lesson one: If your IT environment has data that can easily be stolen, someone will find it fast. The other thing the researchers noticed is no one tried to warn the fake company about its leaky website. Lesson two: Don’t expect Good Samaratins to warn you of security issues.

Here’s an interesting thing about that report: It outlines how hard it is now to misconfigure AWS S3 storage buckets. That’s because there are a number of warnings when setting up bucks. However, AWS application misconfigurations are a big problem. The director of the office of the CISO told Cybersecurity Dive that one big mistake AWS developers make is not limiting an application’s level of access and permissions. Not every operation of a piece of software needs to access every AWS function. Wide access means a successful hacker can also access everything the application can. It’s worth thinking about.

Finally, a service that allowed the sharing of files anonymously has shut because it was being abused by threat actors. Bleeping Computer reports that AnonFiles closed this week because crooks were using it to pass around stolen data and host malware. The service tried banning hundreds of thousands of files. But its hand was forced when the service’s proxy provider — which enabled the anonymity — had had enough.

Later today the Week in Review will be available. Among the topics being discussed is this week’s report by the Cyber Safety Review Board on why the Lapsus$ extortion gang was so successful.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker. Thanks for listening. I’m Howard Solomon

The post Cyber Security Today, August 18, 2023 – CISA urges action on a Citrix ShareFile vulnerability, and more first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Pablo Listingart from ComIT – Hashtag Trending the Weekend Edition for May 25, 2024

Pablo Listingart, founder and executive director of ComIT, discusses the resource shortage in cybersecurity and IT and the...

Cyber Security Today, May 24, 2024 – A threat actor leverages Windows BitLocker in ransomware attacks, beware of ORB networks, and more

A threat actor leverages Windows BitLocker in ransomware attacks, beware of ORB networks, and more. Welcome to Cyber Security...

Consumers don’t trust social media companies with AI. Hashtag Trending for Friday, May 24th, 2024

A new Axios poll says that consumers don’t trust social media giants branching into AI.  Two companies headed...

Canada centralizing cybersecurity efforts of federal IT departments

Federal departments and agencies are making only marginal progress in improving their cyber maturity, Ottawa said Wednesday as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways