SonicWall Investigates Zero-Day Attack Own Its Products

SonicWall Investigates Zero-Day Attack Own Its Products

SonicWall has warned its customers that threat actors may have found zero-day vulnerabilities in some of its remote access products. An initial post on the company’s knowledgebase pages on Friday claimed that the NetExtender VPN client model 10.x and the SMB-focused SMA 100 series were at risk.

However, an update over the weekend clarified that impacted models were confined to its Secure Mobile Access (SMA) version 10.x offering running on SMA 200, SMA 210, SMA 400, SMA 410 physical appliances and the SMA 500v virtual appliance.

These provide client employees with secure remote access to internal resources — capabilities in high demand during the pandemic. As such, there is an apparent advantage to attackers in finding bugs to exploit in such tools.

“We believe it is extraordinarily important to be transparent with our customers, our partners and the broader cybersecurity community about the ongoing attacks on global business and government,” SonicWall said in the alert.

“Recently, SonicWall identified a coordinated attack on its internal systems by highly state-of-the-art threat actors exploiting probable zero-day vulnerabilities on certain SonicWall secure remote access products.”

There is no more information for now on what the attackers were after and how they carried out the intrusion. However, SonicWall also clarified that its firewall products, SonicWave APs and SMA 1000 Series product line are unaffected.

“Current SMA 100 Series customers may continue to use NetExtender for remote access with the SMA 100 series. We have decided that this use case is not susceptible to exploitation,” it added. “We advise SMA 100 collection administrators to create specific access rules or disable Virtual Office and HTTPS administrative get entry to from the internet while we continue to investigate the vulnerability.”

Since the begin of the COVID-19 crisis, security and infrastructure providers have come under increasing scrutiny as attackers look for holes in products which could provide them with large-scale access to customer environments.

Back in April last year, it emerged that sophisticated ransomware groups were exploiting flaws in VPN products to assault hospitals, while in October, the US warned that APT groups were chaining VPN exploits with the Zero logon flaw to target public and private sector organizations.

Products from Fortinet (CVE-2018-13379), MobileIron (CVE-2020-15505), Juniper (CVE-2020-1631), Pulse Secure (CVE-2019-11510), Citrix NetScaler (CVE-2019-19781) and Palo Alto Networks (CVE-2020-2021) were all highlighted as at risk.

X-Rated College Pictures Leaked Due to Amazon Leaking Buckets

X-Rated College Pictures Leaked Due to Amazon Leaking Buckets

A cloud misconfiguration at a now-defunct social media app Fleek, has uncovered hundreds of thousands of explicit images of customers that they thought had been deleted. Fleek was once seen as an unfiltered and uncensored choice to Snapchat “Campus Stories.” A hit with US college students, it promised to automatically delete pictures after a short period, encouraging customers to publish salacious photographs of themselves engaged in sexually explicit and unlawful activities.

A group led by Noam Rotem found AWS S3 misconfigured buckets October last year belonging to the now defunct Fleek and owner Squid Inc. The researchers found that not was this not true but many images were still available on the amazon bucket for download months after the service ceased to exist.

Fleek customers were mostly university students naive of the implications of importing snap shots that exhibit them attractive in embarrassing and crook activities, such as drug use. If cyber-criminals acquired these pictures and knew how to locate the people exposed, they ought to effortlessly target them and blackmail them for giant sums of money.”

In total, the research crew located around 377,000 archives in the 32GB bucket. This additionally included pictures and bot scripts.

Having contacted both Squid Inc’s founder and AWS to notify about the privacy ISSUE vpnMentor discovered the bucket had been secured about a week after it was discovered. However, it is uncertain whether the information has been deleted or not.

It is important to understand from service provider what happens to your data if the service ceased to exist in the case of Fleek. Often, with smaller companies, the companies keeps possession of the data, and there’s very little accountability stopping them from misusing it or sharing with others in the future.”

US Govt Withdraws From The Extradition Of Irish Hacker Who Duped People of Millions of Dollars In Bitcoin.

US Govt Withdraws From The Extradition Of Irish Hacker Who Duped People of Millions of Dollars In Bitcoin.

The United States has withdrawn an extradition request for an Irish hacker convicted of breaking into digital wallets to steal millions of dollars in cryptocurrency.

Conor Freeman was once recognized through US Homeland Security as one of at least 5 co-conspirators involved in a string of digital thefts that robbed multiple victims of their life savings in 2018.

Freeman was arrested at his Dublin home in May 2019 on a warrant issued through US authorities. Following his arrest, the hacker handed over stolen Bitcoin worth $2,187,977 to Gardaí the Irish police.

Freeman, of Dun Laoghaire, pleaded responsible to stealing cryptocurrency, dishonestly running a PC to make a gain, and knowingly engaging in the possession of the proceeds of crime. In November 2020, the 21-year-old was sentenced to three months in jail minus one month served in custody by Judge Martin Nolan in Dublin Circuit Criminal Court.

The US had requested Freeman to be surrendered and extradited to the United States to face charges of one count of conspiracy to commit wire fraud, 4 counts of aiding and abetting wire fraud, and 4 counts of aiding and abetting aggravated identification theft.

US authorities alleged that Freeman used to be a member of an equipped online crook gang known as The Community that conspired to steal from targets they picked out on social media. The gang used SIM-swapping to gain control of a victim’s smartphone number, leveraging it to gain access into their digital wallets.

A member of The Community, arrested in Michigan in May 2018, gave US authorities access to his computers. The member’s online chat data revealed an individual calling himself Conor was involved in the thefts.

IP addresses used by this Conor have been linked to an Irish cellular smartphone and residential net provider carriers used by Conor Freeman.

The High Court heard this morning that following his conviction in Ireland, the United States was no longer seeking to prosecute Freeman, who had no prior convictions.

Had Freeman been convicted in the US on all counts, the Dubliner should have been sentenced to a most of 108 years at the back of bars.