BlogNews
26 JUL, 2024

The Cybersecurity Express – July 26, 2024

Cybourn Media Hub

You stand on the platform, the distant rumble of the approaching train sending a thrill of anticipation through you. The sign above reads “Cybersecurity Express,” and you can’t help but feel a mixture of excitement and curiosity about the journey ahead. The air is filled with an electric buzz, a promise of secrets and revelations about to unfold. As the train pulls into the station, its sleek, modern design mirrors the cutting-edge technology you’re about to explore.

Boarding the train, you find a seat by the window, your heart pounding with the thrill of discovery. The conductor’s voice crackles over the intercom, welcoming you aboard and hinting at the wealth of information awaiting you at each stop. The journey promises to delve into the latest cybersecurity news, from data breaches to groundbreaking policies. As the train begins to move, you settle in, ready to embark on this enlightening voyage into the world of digital security.

CrowdStrike $10 Apology Vouchers Triggers Backlash

In the aftermath of the significant service outage, CrowdStrike decided to issue $10 apology vouchers to affected victims, a move that, despite good intentions and obviously not being the only form of compensation that they will offer for this, has sparked considerable backlash, nonetheless. The outage, caused by a faulty update to CrowdStrike’s Falcon sensor update, led to system crashes and operational disruptions for thousands of businesses, impacting an estimated 9 million devices worldwide. Despite the company’s efforts to remediate the issue swiftly and the decisions to follow the congressional hearings, the compensation offered has been widely criticized as insufficient given the scale of the disruption, and perceived more as a mockery, adding to the already tarnished image of the cybersecurity giant.

The $10 vouchers, redeemable on UberEats, have been perceived as inadequate by many, considering the extensive impact of the outage that, according to the insurance firm Parametrix, is estimated to be approximately $5.4 billion in financial losses, considering just the top 500 US companies by revenue, excluding Microsoft. Only $540 million to $1.08 billion of these losses were insured, leaving many businesses to bear the brunt of the financial damage. The discrepancy between the losses incurred and the apparent “compensation” offered has fueled discontent among affected parties.

The U.S. House of Representatives Homeland Security Committee has summoned CrowdStrike CEO George Kurtz to testify regarding the outage. The hearing aims to delve into the root causes of the incident, discuss the company’s response, and evaluate the measures being taken to prevent future occurrences. In their letter, the congressional panel highlighted the magnitude of the outage, labeling it as potentially the largest IT disruption in history, as we covered in a previous article.

In response to the outage, CrowdStrike has implemented several measures to prevent similar incidents in the future. These include enhancing software development practices, improving testing protocols, and increasing transparency with clients. The company has also been proactive in communicating with affected clients, providing regular updates and ensuring that all necessary patches and solutions are promptly applied. Despite these efforts, the public failed to see the intent behind the $10 vouchers. It was never going to be all that CrowdStrike gave back to the community, but a first step in showing appreciation for those many souls that had to work through the weekend to fix the outage. However, whoever came up with the idea and the amount must have been the same team that pushed the faulty patch, as it seems they did not put too much thought into it. Considering the scale of impact, they should really calculate every step they take from here on.

Docker Fixes Critical 5-Year-Old Authentication Bypass Flaw

Docker has patched a critical vulnerability, CVE-2024-41110, that had been present for five years, posing a significant security risk. This flaw allowed unauthorized access to the Docker API, potentially enabling attackers to execute arbitrary commands and compromise the host system. The vulnerability has a critical-severity CVSS score of 10.

The flaw works by allowing the bypass of authorization plugins (AuthZ). With a specially crafted API request with a Content-Length of 0, the attacker can trick the Docker daemon into forwarding it to the AuthZ plugin without the body, preventing the plugin from performing proper validation and resulting in privilege escalation. This allows attackers to gain unauthorized access and perform actions such as deploying containers that could execute code, access data, or compromise other services running on the host.

Originally discovered and fixed in Docker Engine v18.09.1, released in January 2019, the issue inexplicably resurfaced in later versions as the fix wasn’t carried forward. The affected versions include Docker Engine up to v19.03.15, v20.10.27, v23.0.14, v24.0.9, v25.0.5, v26.0.2, v26.1.4, v27.0.3, and v27.1.0 for users who use authorization plugins for access control. Those who do not use the plugin are not affected by this vulnerability.

Docker has released patches to address this critical flaw. Users are strongly advised to update to the latest versions of Docker, which include the necessary fixes to secure the Docker socket. The updates ensure that access to the Docker socket is restricted and that proper authentication mechanisms are enforced. Additionally, Docker has provided guidelines for securing Docker installations, including recommendations for configuring user permissions and restricting access to the Docker group.

To mitigate the risk of exploitation, it is crucial for Docker users to apply the patches promptly. Furthermore, organizations should conduct security audits to ensure that their Docker installations are properly configured and that access to the Docker socket is restricted to authorized users only. Implementing additional security measures, such as network segmentation and monitoring for unusual activity, can further enhance the security of Docker environments.

Massive Network of GitHub Accounts Distributing Malware Uncovered

A massive network of over 3,000 GitHub accounts has been uncovered by an extensive investigation by Checkpoint, all being used to distribute malware. The discovery of the so called Stargazers Ghost Network has raised significant concerns about the security of open-source platforms and the methods employed by cybercriminals to exploit them. These accounts systematically hosted and spread malicious code, primarily targeting developers and IT professionals.

The attackers created repositories containing malware disguised as legitimate software tools or updates. These repositories included detailed README files, making them appear credible. The malware, embedded in seemingly benign code, would be downloaded by unsuspecting users, leading to potential data breaches, system compromises, and other malicious activities.

GitHub’s security team identified the malicious accounts through automated scanning and manual review. The attackers used various evasion techniques to avoid detection, such as obfuscated code and frequent updates to bypass security checks. The types of malware distributed included remote access Trojans (RATs), credential stealers, and other malicious software designed to exfiltrate sensitive information and gain unauthorized access to systems.

The “Stargazers” network, exploited GitHub’s trust model by manipulating the stargazer feature to boost repository credibility. This strategy deceived users into downloading malicious software, thinking it was popular and trusted. The malware used included Python-based information stealers and cryptominers. The attackers found a clever way to abuse the GitHub algorithm, by using multiple accounts, that were vouching for other, keeping the network spread as not to lose operations if an account is taken down, and immediately changing the reference links once one was discovered. The threat actor’s campaigns typically involve a repository account that owns the phishing repository hosting the download link, a commit account that makes commits to the repository, a release account that creates and updates the malicious archive in the repository’s release section, and multiple Stargazer accounts that fork, star, and like the repository and releases. “Most of the time, we observe that Repository and Stargazer accounts remain unaffected by bans and repository takedowns, whereas Commit and Release accounts are typically banned once their malicious repositories are detected,” Check Point explains.

The network’s scale and sophistication indicate a well-coordinated effort by cybercriminals to exploit the trust placed in open-source platforms. The affected repositories have been taken down, and GitHub is working with security researchers to mitigate the impact and prevent future incidents. Users are advised to exercise caution when downloading software from GitHub and to verify the authenticity of repositories before installation.

To address this issue, GitHub has implemented stricter security measures, including enhanced automated detection systems and more rigorous manual reviews. Developers are encouraged to use security tools and practices, such as code signing and integrity verification, to protect their projects from being compromised. Regular security audits and staying informed about the latest threats are crucial steps to mitigate risks associated with open-source development.

Switzerland Mandates Open Source for All Government Software

Switzerland has enacted a groundbreaking policy (Federal Law on the Use of Electronic Means for the Fulfillment of Government Tasks) requiring all government software to be open source, with third-party rights allows it or there are no national security concerns. This move aims to enhance transparency, security, and collaboration in public sector technology. By making government software publicly accessible, Switzerland seeks to foster a more robust and innovative technological ecosystem.

The Swiss government will release the source code of its software on open platforms like GitHub, allowing developers and citizens to review, modify, and contribute to these projects. This initiative is designed to improve the security of government software by leveraging the collective scrutiny and expertise of the global developer community. Open source software is typically more secure because vulnerabilities can be identified and addressed more quickly through community collaboration. Additionally, the policy promotes interoperability and reduces dependency on proprietary software vendors, potentially leading to cost savings for the government. The open source mandate applies to all new software projects and existing software that undergoes significant updates. To support this transition, the Swiss government is establishing guidelines and providing resources for public agencies to adopt and manage open source software. These guidelines will cover best practices for code development, documentation, and community engagement. The government is also setting up a centralized repository to host the open source projects, ensuring easy access and management. While the benefits of open source are significant, the transition also presents challenges, such as ensuring data privacy and managing intellectual property rights. The Swiss government is addressing these concerns by implementing strict security protocols and legal frameworks to protect sensitive information and respect the rights of contributors.

Overall, Switzerland’s move to open source software reflects a growing global trend towards transparency and collaboration in public sector technology. By opening up its software, Switzerland is not only enhancing its own digital infrastructure but also contributing to the global open source community. This policy could serve as a model for other countries looking to improve their technological capabilities and public trust through open source solutions.

Stay informed and take proactive steps to protect your digital assets. Thank you for joining us, and we look forward to welcoming you back aboard the Cybersecurity Express for more insightful updates. Your engagement is invaluable in navigating the complexities of cybersecurity.

Share

We Also Recommend to See:

EtherLast™
The versatile platform that allows you to promptly detect complex threats, analyse and respond to them from a single pane of glass.
Dreamlab
CyBourn's DreamLab pushes the boundaries of innovation in the cyberspace.

Tell us about your Cybersecurity needs

We are strategists, engineers, analysts, and governance experts embedded in the world’s biggest cyber missions and trusted to advance them. Let us help you today.