Cyber Security

Intel, VMware Be part of Patch Tuesday Parade

Know-how giants Intel Corp. and VMware joined the Patch Tuesday parade this week, rolling out fixes for safety defects that expose customers to malicious hacker assaults.

Intel launched two advisories to repair privilege escalation and knowledge disclosure vulnerabilities within the SGX software program growth equipment and {Hardware} Accelerated Execution Supervisor (HAXM) software program merchandise.

The extra critical of the 2 flaws — CVE-2021-0186 — impacts the Software program Guard Extensions (SGX) Software program Improvement Package (SDK) purposes compiled for SGX2-enabled processors and will enable escalation of privilege in sure circumstances.

Intel has tagged the bug with a “excessive danger” ranking and a CVSS Base Rating of 8.2 and credited a number of tutorial establishments with reporting the problem.

[ READ: MS Patch Tuesday: 71 Vulns, One Exploited as Zero-Day ]

The second Intel advisory covers a pair of safety vulnerabilities within the Intel {Hardware} Accelerated Execution Supervisor (HAXM) software program which will enable escalation of privilege or info disclosure.   The HAXM updates are available on Github.

Individually, VMware launched a trio of advisories to warn about safety defects within the VMware vRealize IT operations administration platform.

VMware launched patches for an open-redirect flaw in the vRealize Orchestrator product (reasonable severity), a CSV injection vulnerability in vRealize Log (medium-severity) and a low-risk SSRF flaw in vRealize Operations product.

The Intel and VMware updates comply with a significant Patch Tuesday freight prepare for October with zero-day fixes from Microsoft and Apple (iOS 15.0.2), and important updates from Adobe and SAP.

Thus far in 2021, there have been 73 documented in-the-wild zero day assaults, the bulk hitting susceptible code in merchandise bought by Microsoft, Apple and Google.

Associated: MS Patch Tuesday: 71 Vulns, One Exploited as Zero-Day

Associated: Adobe Patches Critical Code Execution Vulnerabilities

Associated: Microsoft Office Zero-Day Hit in Targeted Attacks 

Associated: SAP Patches Critical Vulnerabilities in Environmental Compliance

view counter

Source link

Cyber Security

Attackers Encrypt VMware ESXi Server With Python Ransomware

A just lately noticed assault employed a Python-based ransomware variant to focus on a corporation’s VMware ESXi server and encrypt all digital disks, Sophos reviews.

The attack concerned using a customized Python script that, as soon as executed on the goal group’s digital machine hypervisor, took all VMs offline.

The attackers, Sophos’ safety researchers clarify, have been slightly fast to execute the ransomware: the encryption course of began roughly three hours after preliminary compromise.

For preliminary entry, the attackers compromised a TeamViewer account that didn’t have multi-factor authentication arrange, and which was working within the background on a pc belonging to a consumer that had Area Administrator credentials.

The attackers waited half-hour previous midnight within the group’s time zone to log in, then downloaded and executed a instrument to determine targets on the community, which allowed them to discover a VMware ESXi server, Sophos explains.

At round 2am, the attackers fetched an SSH consumer to log into the server, leveraging the built-in SSH service ESXi Shell that may be enabled on ESXi servers for administration functions.

Three hours after the community was first scanned, the attackers logged into the ESXi Shell, copied the Python script, after which executed it for every datastore disk quantity, thus encrypting the digital disk and settings recordsdata for digital machines.

The script is simply 6kb in measurement, however permits attackers to configure it with a number of encryption keys, in addition to with varied e mail addresses and with the file suffix to be appended to encrypted recordsdata.

Based on Sophos, the script comprises a number of hardcoded encryption keys, and a routine for producing much more keys, which led the researchers to the conclusion that the ransomware creates a singular key at every run.

Thus, on this specific assault, as a result of the attackers executed the script individually for every of the three focused ESXi datastores, a brand new key was created for every encryption course of. The script doesn’t transmit the keys however as a substitute writes them to the filesystem, encrypted with the hardcoded public key.

“Python is pre-installed on Linux-based techniques similar to ESXi, and this makes Python-based assaults potential on such techniques. ESXi servers signify a beautiful goal for ransomware risk actors as a result of they will assault a number of digital machines directly, the place every of the digital machines could possibly be working business-critical functions or companies,” Andrew Brandt, principal researcher at Sophos, stated.

Associated: Colossus Ransomware Hits Automotive Company in the U.S.

Associated: Links Found Between MSHTML Zero-Day Attacks and Ransomware Operations

view counter

Ionut Arghire is a world correspondent for SecurityWeek.

Earlier Columns by Ionut Arghire:

Source link