Skip to the content
Menu

Jack Smallpage, Information Security Officer at Chess, reviews the latest cyber security news and advises how to protect your data. He covers:


Welcome to the second issue of our Cyber Month in Review series. I've summarised for you some of June's highlights in this 5-minute read to help you be more cyber aware.

 

Follina Windows Zero-Day

Starting with a major vulnerability which has been running its course this month, the "Follina" zero-day (tracked as CVE-2022-30190) is a vulnerability in the 'Microsoft Support Diagnostic Tool' (MSDT). This dangerous flaw is currently being exploited globally, including by the ever-worrying APT (Advanced Persistent Threat) actors. The exploit allows attackers to execute malicious PowerShell commands via MSDT through crafted applications such as Word. To make matters worse, the exploit works by opening or even just previewing the document. It doesn't need macro code enabled to run the scripts, allowing the attacker to then install programs, view, change, or delete data, or create new accounts in the context allowed by the user's rights. This macro-less nature makes the attack particularly attributable to phishing attacks – so be aware!

 

Email: The Danger Within

Watch Webinar

 

What Should I do

Thankfully this was patched in the June 2022 deployment, so make sure you have rolled this out to your business for remediation. If you cannot deploy this patch, however, you can disable the MSDT URL protocol as a workaround to mitigate the threat as detailed here: Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability – Microsoft Security Response Center

 

Cloudflare's defends a record DDos Attack

At the start of this month, Cloudflare stated that they had mitigated a 26 million request per second distributed denial of service (DDos) attack, being the largest HTTPS DDos attack detected to date! The attack purportedly utilised a 'less is more' approach with virtual machines and powerful servers being used to generate the attack rather than weaker but more numerous Internet of Things (IoT) devices. Read more on this here: Cloudflare mitigates 26 million request per second DDoS attack

What Should I do

Whilst this is not aimed at endorsing Cloudflare's DDos solution, it is an important reminder that in a world of ransomware, other attacks such as DDos continue and advance in power and complexity. Make sure your business has planned for these types of attacks in your business continuity plan and have measures in place (whatever they may be). You can find guidance on making a DoS plan on the NCSC site here: Preparing for denial of service (DoS) attacks - NCSC.GOV.UK

 

Atlassian's Confluence Zero-Day

Attackers have been actively exploiting a Zero-day in Atlassian Confluence this month. Tracked as CVE-2022-26134, the unauthenticated remote code execution (RCE) exploit allows the unauthenticated attacker to create new admin accounts and execute commands to compromise and otherwise takeover the affected server in Confluence Data Centre and Server (not including Atlassian Cloud sites).

What Should I do

Atlassian have now released the patch for this vulnerability. If you are affected and have not done so already, get it patched as soon as possible! Released versions 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4 and 7.18.1 contain a fix for this issue. More detail on this patch and mitigation options can be found here: Confluence Security Advisory 2022-06-02 | Confluence Data Center and Server 7.18 | Atlassian Documentation


Citrix attackers can reset your admin!

Citrix have warned customers this month to deploy security updates with particular focus on a critical 'Improper Access Control' vulnerability regarding the Citrix Application Delivery Management (ADM). Citrix ADM is a web-based solution which provides admins with a cloud-based console for managing on-prem and cloud Citrix deployments.
Successful exploitation of this vulnerability would allow an unauthenticated, remote attacker to corrupt the system and reset the admin password at the next device reboot, allowing an attacker with ssh access to connect with the admin credentials after the reboot.

What Should I do

As with others, it is vital that vulnerabilities such as this are patched as soon as possible to reduce the likelihood of compromise. If you use Citrix ADM within your business (Citrix ADM 13.1 before 13.1-21.53 or Citrix ADM 13.0 before 13.0-85.19), make sure to apply the patch offered by Citrix – more details can be found here: Citrix Application Delivery Management Security Bulletin for CVE-2022-27511 and CVE-2022-27512

Cisco reminds us to check our lifecycles

When was the last time you checked the lifecycle of your software? More specifically, to this entry, when was the last time you checked the end of support/life date of your hardware? A critical vulnerability has been found in the web-based management interface of Cisco Small Business routers. Exploiting this vulnerability could allow an unauthenticated and remote attacker to execute commands with root-level privilege.

In particular, the vulnerability affects the following small business RV series routers:

  • RV110W Wireless-N VPN Firewall
  • RV130 VPN Router
  • RV130W Wireless-N Multifunction VPN Router
  • RV215W Wireless-N VPN Router
What Should I do

Of more importance here, is that this vulnerability has identified no workarounds (though it only affects devices with the web-based remote management interface enabled on WAN connections), and Cisco do not intend to release a patch. Instead, they warn customers that the affected devices are end of life and customers should instead upgrade to newer models following best security practice. More details of this can be found here: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability

 

 

Microsoft Defender for Business

Keep your business cyber secure

Read More

 

Microsoft Enforcing better Security Defaults

So, with all this talk of vulnerabilities and attackers, Microsoft have jumped in to give us a hand defending our business. Announcing that it has already begun the rollout of security defaults on all existing Azure AD tenants, the security defaults introduced in October 2019 will be enabled automatically moving forward for all existing Microsoft customers. This will help protect an additional 60 million accounts, protecting your network and reducing the strain on your IT teams with features such as conditional access, identity protection, and MFA.

What Should I do

You will likely already been notified, but if you haven't, your global administrators will be given the option to enable the defaults with an alert like the image below or "snooze" the enforcement for 14 days, where it will then be toggled on automatically.

Make sure you go through these settings and ensure they fit your business's requirements and risk appetite. If you need help understanding these settings and configurations, Chess is on hand to help you out should you need it! More details can be found here: Raising the Baseline Security for all Organizations in the World - Microsoft Tech Community

 

 


 

“We are confident that our users cannot be compromised from outside the organisation – that was the biggest concern we had at the beginning of our (Microsoft) path. It gives myself as the Head of IT and our board the peace of mind that our accounts are secure.”

- Head of IT, MDL Marinas


 


Conclusion

With the Follina exploit causing a panic in the early weeks and other vulnerabilities being detected and exploited across the board, this week has shown both the red team's attempts to compromise and the blue teams' achievements in defending our global interest in security. As always, it is important to reiterate that this article has not included ALL security news or vulnerabilities disclosed this month, and others such as Microsoft's Patch Tuesday's other fixes, Internet Explorer's retirement, Android's critical security update, and Gitlab's Account Takeover flaw (patched) are just honourable mentions as examples of other updates you should be aware of and research.

If you have been caught off-guard by some of this month's developments, have a look at your security processes and see what changes you can make to ensure you don't get caught out in the future. Just 20 minutes of research each day can help you keep on top of the major security trends and alerts, which help protect your business and keep you cyber aware! If you have any more questions or worries, please do not hesitate to get in touch and see what Chess can do to help you and your security posture.

 

Book your free 30-minute security consultation with one of our penetration testers to learn more about how you can protect your organisation. Get agnostic advice from industry experts on how secure your business. Request here.

 

 


Did you miss May's Cyber Month In Review? Read it now >

Recommended Content

Security for Small and Medium-Sized Enterprises (SMEs)

Security for Small and Medium-Sized Enterprises (SMEs)

Adam Gleeson, Cyber Security Vendor Alliance Manager, reviews the five key essential functions small and medium-sized organisations require to be cyber secure.

Finding Your Cyber Security Weaknesses

Finding Your Cyber Security Weaknesses

Adam Gleeson, Vendor Alliance Manager at Chess, offers insight into how cyber security vulnerability assessments can help businesses protect and improve their systems.

Jack Smallpage

Jack Smallpage

Jack Smallpage is the Information Security Officer at Chess. He creates and maintains our security policy, takes lead in a variety of compliance certifications and security projects and acts as the company security liaison for security incidents, BCDR planning, GDPR compliance and risk management.


Speak to a Product Specialist

You can fill out the form and one of our product specialists will contact you shortly with more information.
Sales
To contact our Sales team directly, please call 0344 770 6000 and choose option 4.
Customer Service
For general queries or to report a non-urgent fault, please log a ticket on our customer portal using the email address associated with your account. Logging a ticket is quick and easy to do. Once you have logged your ticket, we will respond within 24 hours or your Service Level Agreement, whichever is quicker.
I agree for my information to be used for marketing communications.
Chess Privacy Notice

By submitting your personal information through this form, you consent to your information being processed in accordance with the Chess group privacy notice.