There is a newly disclosed code-execution vulnerability in VMware vCenter. VMware was quick to release a patch (within a day) and it can be found here.
The severity of this vulnerability as well as the fact that there are exploits available for both Windows and Linux servers, kicked off a flurry of mass scanning for vulnerable vCenter Servers.
Code execution, no authorization required
CVE-2021-21972 allows hacker with no authorization to upload files to vulnerable vCenter servers that are publicly accessible over port 443, researchers from security firm Tenable said. Successful exploits will result in hackers gaining unfettered remote code-execution privileges in the underlying operating system. The vulnerability stems from a lack of authentication in the vRealize Operations plugin, which is installed by default.
The flaw has received a severity score of 9.8 out of 10.0 on the Common Vulnerability Scoring System Version 3.0. Mikhail Klyuchnikov, the Positive Technologies researcher who discovered the vulnerability and privately reported it to VMware, compared the risk posed by CVE-2021-21972 to that of CVE-2019-19781, a critical vulnerability in the Citrix Application Delivery Controller
Everyday, you read another story about how a company has been hit by a ransomware attack, which potentially can disrupt your business, services to your clients and livelihood of your employees.
Just last week it was announced another company, Forward Air, was hit by a ransomware attack, which disrupted services and impacted revenue. This attack was attributed to a group “Hades”. Forward Air, a trucking company from Tennessee, posted revenues of $1.4 billion in 2019 and employs more than 4300.
The ransomware note, resembles a similar note used by another ransomware group known as “REvil”, also known as “Sodin”.
This is a Sodinokibi variant that was first seen in early 2019. Sodinokibi is what is known as ransomware-as-a-service, basically a software package which is catered by underground vendors to threat actors providing them a ransomware platform tool.
Companies are limited in their ability to defend against this type of exploitation, especially if they do not have full time IT staff or contracted Managed Service Providers that focus on security. Your organization must follow the following guidelines to help mitigate your exposure:
- Patch aggressively so vulnerabilities are eliminated and access routes are contained
- Enable endpoints with tools that automatically detect and respond to infections before they become systemwide
- Enable network threat intelligence tools to detect anomalies in your network traffic
- Make sure emails are screened for malicious payloads and links
- Minimize access levels by employees to perform their job functions
If you have been hit by ransomware, or just want to assess your company’s state of preparedness, reach out to us to discuss your needs.
LMJ is a full service Managed Service Provider, with offices in Alaska and California.
So you have secured your business.
Firewall, VPN for work from home, radius authenticated WiFi or perhaps an RDS gateway for remote desktops. Anti-virus is up to date, patching is top notch, SaaS applications locked up with two-factor authentication.
What about educating your workforce? Although Phishing is only the 5th most common primary cause of security incidents (per the Verizon 2020 Data Breach Report), following Denial-of-Service (DoS), data loss, Command and Control, or misdelivery of email/data – when it comes to data breaches Phishing is still number one.
Without a solid training plan for your employees, your business is at greater risk to have data compromised.
Top areas to look out for:
- Social Engineering
- Stolen Credentials
- Malware (usually delivered via email)
According to Verizon, Phishing is the first step in about 20% of security incidents and plays a role in another 30% of secondary steps to gain access to your information.
Highlights by Sector
Financial and Insurance:
- 1,509 incidents, 448 with confirmed data disclosure
- What did they target, Web Applications, Miscellaneous Errors and Everything Else
represent 81% of breaches
- External to company (64%), Internal (35%), Partner (2%), Multiple (1%) (breaches)
- Financial motive (91%), Espionage (3%), Grudge (3%) (breaches)
- What did they get- Personal data (77%), Other (35%), Credentials (35%), Bank (32%)
- How do they solve the problem -Implement a Security Awareness and Training Program (CSC 17),
Boundary Defense (CSC 12), Secure Configurations (CSC 5, CSC 11)
- 798 incidents, 521 with confirmed data disclosure
- Miscellaneous Errors, Web Applications and Everything Else
represent 72% of breaches.
- External (51%), Internal (48%), Partner (2%), Multiple (1%) (breaches)
- Financial motive (88%), Fun (4%), Convenience (3%) (breaches)
- What did they get – Personal data (77%), Medical (67%), Other (18%), Credentials (18%)
- How do they solve the problem – Implement a Security Awareness and Training Program (CSC 17),
Boundary Defense (CSC 12), Data Protection (CSC 13)
But my company is too small for someone to try and get our data!
While differences between small and medium-sized businesses (SMBs) and large organizations remain, the movement toward the cloud and its myriad web-based tools, along with the continued rise of social attacks, has narrowed the dividing line between the two.
As SMBs have adjusted their business models, the criminals have
adapted their actions to keep in step and select the quickest and easiest path to their victims.
Contact us to get more information on our security practice and how you can have your team trained on cyber-security awareness.