Flair Data Systems Cybersecurity News Update 7-10-2024

My name is Brent Forrest and I serve as a vCISO at Flair Data Systems. Here is your cybersecurity news update for 7/10/2024... 

Happy Wednesday! 

 

A quick update from last week about the Evolve Bank incident regarding the data exfiltration has been confirmed to affect 7.6 million customers.  Outside of the normal activities, it was nice to have a slower than normal weekend due to the 4th of July holiday but getting back into the swing of things has been nice as well. 

 

Please, take a special note of the Microsoft Patch Tuesday this month, there are some severe vulnerabilities being patched this month. 


So, with that, let’s dive into this week’s cybersecurity news update... 



China’s Velvet Ant hackers exploiting new Cisco zero-day 

 

CVE-2024-20399: a vulnerability affecting the Cisco NX-OS software in Nexus-series switches (which was discussed last week) 

  • Velvet Ant, state backed hackers from China, have been seen to use this vulnerability where they focus on establishing long-term access 
  • This vulnerability was discovered during an IR (Incident Response) engagement where Velvet Ant was the Threat Actor 
  • The Threat Actor had to have already gained access to the environment to exploit the vulnerability 

Link (1): https://therecord.media/cisco-velvet-ant-hackers-china 

 

Europol law enforcement takes down Cobalt Strike servers 

 

Operation Morpheus, was a Europol coordinated join operation that led to almost 600 cobalt servers 

  • These servers are being used for criminal activities to attack infrastructure 
  • Over 690 IP addresses were flagged by service provides across 27 counties, where 593 were taken down over the course of a week 

Link (1): https://www.bleepingcomputer.com/news/security/europol-takes-down-593-cobalt-strike-servers-used-by-cybercriminals/ 

 

Twilio SMS MFA list compromised  

 

Twilio has confirmed that an unsecured API allowed threat actors to verify the phone number of millions of Authy MFA users 

  • The concern here is that this could potentially make these users vulnerable to SMS phishing and SIM swapping attacks 
  • The data released was by a threat actor, ShinyHunters, where they released a CSV containing 33 million phone numbers registered with Authy services 
  • This unsecured API has since been resolved and is now secured 
  • This is similar to how threat actors abused the unsecured Twitter API and Facebook API in the past 

Link (1): https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/ 

 

Australian man charges with running fake Wi-Fi while on airline 

 

A 42-year-old Australian man (unnamed) has been charged with running a fake Wi-Fi access point during a domestic flight with the goal of stealing user credentials and data 

  • The suspicious wireless network was discovered by the employees of an airline during a domestic flight 
  • This is not the first time this has happened; I have heard talks from threat researchers where they will stand up a Wi-Fi Pineapple device on a flight or at an airport where it will allow auto connections to Open Wi-Fi connections that someone has established on their devices already to automatically connect 
  • Consider turning off your wireless when you are not at home or in a trusted area - for iPhones, there are mechanisms you can use that are built in that will automatically disable wireless when you leave your home and turn on when you come back 

Link (1): https://thehackernews.com/2024/07/australian-man-charged-for-fake-wi-fi.html 

 

Alabama Department of Education suffers data breach 

 

On June 17th, Alabama State Department of Education announced that it stopped a ransomware attack, yet the threat actors were still able to exfiltrate data that it had accessed and disrupted some services before being stopped 

  • The type and amount of data is still being investigated 
  • This goes to validate that just because you "stopped" the ransoming of your environment does not mean you stopped the exfiltration of your data - because that last part has already occurred before the ransom occurs 

Link (1): https://securityaffairs.com/165389/uncategorized/alabama-state-department-of-education-data-breach.html 

 

Microsoft Patch Tuesday - July 

 

CVE-2024-37985: Information disclosure vulnerability with a low CVSS temporal score of 5.2. Although publicly disclosed, it has not been detected publicly. Microsoft also gives this an "Exploitation Less Likely" rating. 

  • CVE-2024-38080: This update has a slightly higher CVSS temporal score of 6.8. An attacker who successfully exploits it could gain SYSTEM privileges. It is not publicly disclosed but exploitation has been detected in the wild
  • CVE-2024-38112: A spoofing vulnerability that has a score of 7.0. This CVE is also not public but is being exploited. It does require user interaction as Microsoft says successful exploitation would require an attacker to trick a user into executing a malicious file. 
  • CVE-2024-35264: This zero day is a remote code execution scored 7.1. This has been publicly disclosed, but exploitation has not yet been detected. The attack complexity is high. 
  • Microsoft SharePoint Server 2019 has had alleged RCE Proof of Concepts go up on the dark web for the following CVEs 
  • CVE-2024-38094 
  • CVE-2024-38024 
  • CVE-2024-38023 


Until next week, it’s Brent Forrest signing off. Be cyber safe my friends! 



About the Author: Brent Forrest is a Field CISO with Flair Data Systems. In this role, Brents acts as an advisor to customers that span across different verticals providing guidance to include; developing strategies to reduce risk with existing or modern technology while enabling the business.  With over 20 years of experience in the IT industry, Brent has been able to be a part of multiple groups within the IT field spanning from Telecom, Network, Wireless, Infrastructure, and eventually finding his passion within Security. Roughly 20 years of that time was spent within the Oil and Gas industry working across multiple teams and leading initiatives. Specifically with EnLink Midstream, he spent most of his time building resilience and developing the cybersecurity program. 

Brent has been with Flair Data for 3 years and is CISSP, C|CISO, CvCISO, & Sec+ certified. In his free time, he likes to spend time with family, working out, or staying up with personal development. He lives in Dallas, Texas with his wife and children. 



About: Flair Data Systems is a strategically priced IT solutions company, serving clients in the U.S., with offices in Texas and Colorado. Now a technology industry leader, we began in 1916 as the Porter Burgess Company. Flair Data Systems is your Trusted Advisor for: Collaboration, Unified Communications, Networking, Cloud, Infrastructure, Data Analytics, and Cybersecurity, serving the U.S.  We provide trusted cybersecurity services in Fort Worth, TX. and the DFW Metroplex. 


Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 7/22/2024
July 22, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 7/22/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 7/17/2024
July 17, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 7/17/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 7/03/2024
July 3, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 7/03/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/26/2024
June 26, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/26/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/19/2024
June 20, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/19/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/12/2024
June 12, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/12/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/05/2024
June 5, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 6/05/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 5/29/2024
May 29, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 5/29/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 5/15/2024
May 15, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 5/15/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 5/8/2024
May 8, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 5/8/2024.
More Posts
Share by: