Cyber Security Today, Nov. 25, 2022 – The Android patch-gap continues, beware of corrupted VPN apps and more

Share post:

The Android patch-gap continues, beware of corrupted VPN apps and more.

Welcome to Cyber Security Today. It’s Friday, November 25th, 2022. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

If you have a certain model of an Android phone from Google Pixel, Samsung and other manufacturers it may have vulnerabilities hackers can take advantage of. ARM, the company that makes the graphics processor with the problems, has patched the holes. However, many handset manufacturers and cellphone carriers have been slow to distribute a fix to the devices. According to Google’s Project Zero group, which found the vulnerabilities, ARM issued patches to close the five holes by the end of August. But as of Tuesday of this week a bunch of phones Project Zero tested still hadn’t been patched. This is a common problem with smartphones: Cellphone companies don’t automatically push patches to all the devices they sell. It’s something you could mention to your wireless provider.

Threat actors are using the open Docker Hub image repository for containers to hide malware. Docker Hub reviews some images and verified software developers can add content. But researchers at Sysdig say they recently found over 1,600 images with malicious content out of 250,000 Linux images they examined. The problem containers include links to malicious internet websites and domains, embedded SSH and API keys, cryptominers and corrupt versions of legitimate open-source software. The lesson is to carefully scan everything downloaded from Docker Hub, just as you should with content from open-source repositories like GitHub and PyPI.

Targeted people are being tricked into downloading corrupted versions of two legitimate Android VPN apps by an advanced hacking group. The apps, supposedly real versions of SoftVPN or OpenVPN, are really spyware that captures text messages when victims use WhatsApp, Facebook, Signal, Viber and Telegram. Researchers at ESET believe the attackers are hacking-for-hire group researchers call Ba-ha-mut. Usually it goes after targets in the Middle East and South Asia. But the lesson for anyone around the world is only download apps from websites approved by your IT department.

ConnectWise RMM, a remote monitoring management tool used by a number of IT departments and managed service providers, had a stored cross-site scripting vulnerability that could have been exploited by threat actors. That’s according to researchers at Guardio. They notified the company in June, which quietly issued a patch for the hole in August. News is only coming out now because Guardio agreed to give time for customers to install the update. The thing is, attackers didn’t need to compromise installations of ConnectWise RMM to take advantage of the hole: All they had to do was register for a free 14-day trial version of ConnectWise RMM, set up a fake customer support page for a company they wanted to hit and start luring victims to log in. Malware could be sent to the victim’s computer. You see, the trial version allowed the creation of customized pages, just like the paid version. So an attacker could have set up a fake IT support page with any company’s logo, send out emails to the company’s staff and trick them into logging into the fake support page. After being notified ConnectWise removed the ability to customize pages in the trial version and fixed the cross-site scripting vulnerability. Two lessons here: First, it’s important that application developers rigorously scrutinize their code for bugs. Second, don’t enable all features in trial versions of software.

Remember later today the Week in Review podcast will be available.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

The post Cyber Security Today, Nov. 25, 2022 – The Android patch-gap continues, beware of corrupted VPN apps and more first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Open AI to launch search engine to compete with Google? Hashtag Trending, Friday, May 3, 2024

“Insider” Jimmy Apples says OpenAI is going to launch a search engine to compete with Google, Intel is...

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways