A handful of names are being floated for key cyber positions by well-connected insiders and former high-ranking Trump officials, according to four people who spoke to Recorded Future News on the condition of anonymity to discuss the fluid deliberations.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 17:06:432024-11-21 17:06:43Potential Trump cyber picks coalesce — but insiders say there could be surprises
Wiz, one of the most talked-about names in the world of cybersecurity, is making a significant acquisition to expand its product reach in cloud security, particularly with developers. It is buying Dazz, a specialist in security remediation and risk management. Sources tell us the deal is valued at $450 million in a mix of cash […]
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 15:07:102024-11-21 15:07:10Wiz acquires Dazz for $450M to expand its cybersecurity platform
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 15:07:092024-11-21 15:07:09Cybersecurity Is Critical, but Breaches Don’t Have to Be Disasters
The German CERT has raised the alarm bells for the exploitation of chained vulnerabilities, urging users to patch them urgently as hundreds of vulnerable instances remain exposed around the country and the globe.
CERT-Bund warned in a notification on X earlier this week: “Attacks are already taking place. Customers should immediately secure their firewalls.” This warning was for two critical vulnerabilities, CVE-2024-0012 and CVE-2024-9474, in Palo Alto Networks’ PAN-OS.
Palo Alto confirmed that these bugs have been actively exploited in a limited set of attacks, tracking under the banner “Operation Lunar Peek.” These vulnerabilities allow attackers to gain unauthorized administrative privileges and execute arbitrary commands, posing a significant risk to organizations using affected devices.
While fixes have been released, the urgency of patching, monitoring, and securing firewall management interfaces has never been higher. This blog provides a detailed breakdown of the vulnerabilities, exploitation patterns, and actionable remediation strategies to safeguard against this ongoing threat.
Impact: Allows unauthenticated attackers with network access to the management web interface to:
Gain PAN-OS administrator privileges.
Tamper with configurations.
Exploit other privilege escalation vulnerabilities, such as CVE-2024-9474.
Affected Products: PAN-OS 10.2, 11.0, 11.1, and 11.2 software on PA-Series, VM-Series, CN-Series firewalls, Panorama appliances, and WildFire. Note: Cloud NGFW and Prisma Access are not affected.
Root Cause: Missing authentication checks for critical functions within the PAN-OS management web interface.
CVE-2024-9474: Privilege Escalation Vulnerability
Severity: Critical
Impact: Allows authenticated PAN-OS administrators to escalate privileges and execute arbitrary commands with root access.
Affected Products: Same as CVE-2024-0012, with additional fixes available for PAN-OS 10.1.
These vulnerabilities are particularly dangerous when chained together, enabling unauthenticated remote command execution on vulnerable devices. Palo Alto said that it assesses with moderate to high confidence that a functional exploit chaining CVE-2024-0012 and CVE-2024-9474 is publicly available.
Observed Exploitation in Operation Lunar Peek
Palo Alto Networks’ Unit 42 team is actively tracking exploitation activities tied to these vulnerabilities. Key observations include:
Initial Access: Exploitation has primarily targeted PAN-OS management web interfaces exposed to the internet. Many attacks originated from IP addresses associated with anonymous VPN services or proxies.
Post-Exploitation Activity:
Interactive command execution.
Deployment of webshells, such as a payload recovered with SHA256: 3C5F9034C86CB1952AA5BB07B4F77CE7D8BB5CC9FE5C029A32C72ADC7E814668.
Potential lateral movement and further compromise of network assets.
Scanning Activity: Increased manual and automated scans, likely probing for vulnerable interfaces. A report by Censys found 13,324 publicly exposed management interfaces globally, with 34% located in the United States. More than 200 were located in Germany. German CERT has also confirmed active exploitation, urging organizations to “immediately secure their firewalls.”
Remediation and Mitigation
Patching
Palo Alto Networks has released patches addressing both vulnerabilities. Organizations must upgrade to the following versions immediately:
PAN-OS 10.2: 10.2.12-h2 or later.
PAN-OS 11.0: 11.0.6-h1 or later.
PAN-OS 11.1: 11.1.5-h1 or later.
PAN-OS 11.2: 11.2.4-h1 or later.
PAN-OS 10.1: 10.1.14-h6 (for CVE-2024-9474).
Securing Management Interfaces
Palo Alto Networks strongly recommends the following:
Restrict Interface Access: Allow only trusted internal IP addresses or designated jump boxes to access the management interface.
Disable Public Access: Block internet-facing access to the management interface via network-level controls.
Enable Two-Factor Authentication (2FA): Add an extra layer of security for administrator access.
Monitoring and Detection
Deploy detection rules for webshells and other malicious artifacts. The following decoded PHP webshell sample was observed during Operation Lunar Peek:
At Compass Security, we are proud to offer a fully managed bug bounty program tailored to the needs of both SMEs and larger enterprises. From scoping to payout, we manage every aspect of the process to ensure a seamless experience for our customers and valued hunters. In this blog post, we’ll take a look at our journey since the launch of our service in October 2023, highlighting key milestones, metrics and learnings gathered along the way.
We want to cut through the hype around bug bounty programs by publishing the real numbers, challenges and benefits in a transparent way.
From October 2023 onwards
Since October 2023, we have brought five customers on board, with more in the pipeline. Moreover, we are also eating our own dog food and running two programs, focusing on Compass Security’s infrastructure and the cyber training range developed by our sister company Hacking-Lab.
Specifically, we are very proud to be running the program for the European Organization for Nuclear Research (CERN), based in Meyrin (Geneva), which is probably the largest bug bounty program in Switzerland, next to Swisscom’s immense playground.
Let’s Talk Bounties
In total, hunters from all over the world have discovered over 30 valid bugs so far, resulting in a total payout of roughly CHF 15’000 and averaging at about CHF 500 per bug. Thirteen hunters have received payouts so far. The highest bounty paid was CHF 2’050.
Figure : Payouts in CHF per Hunter
So if you are considering launching a program you will find that it is not the masses that will jump on it and go after your scope but a few very dedicated hunters who will try to skim the cream . The set of criteria that hunters use to decide which program to jump on ranges from the novelty of the program, to scope, to maximum bounty payouts. We have learnt from discussions that European and Swiss hunters in particular will rarely invest their time in programs where the maximum bounty is below CHF 10’000. And we can confirm that most of the bounties we have paid have gone outside Europe. Mainly Asia and North America.
Key Metrics and Performance
Our managed programs received just over 200 reports in total. Some of the most interesting findings were subdomain takeover, account takeover, and exposure of sensitive resources. While most of the vulnerabilities were of low or medium severity, we also received a few high severity issues. Our triage process still varies in speed but is generally very fast. Payouts have also been very fast, but are occasionally affected by slow bank procedures. We have already built up a small community of hunters who submit new reports and keep us going.
With so many bugs, there are also many reports that do not qualify for a bounty.
Ineligible bugs are usually some form of report that either is no issue, has no real impact, lacks relevant proof or is defined in the program’s Rules of Engagement (RoE) as not being eligible for payment.
Duplicates, also known as collisions with Pwn2Own events, are bugs that have already been reported by another hunter and are therefore no longer eligible for a bounty. Understandably, this is one of the pain points and fears that come with bug hunting and puts pressure on hunters. Our general triage policy is to mark a report as duplicate if the same issue has already been reported and accepted for the same asset.
Most of the duplicates come from hunters smashing automated scanners at program scopes. Although we generally forbid scanning by program policy, some hunters still use it as an efficient means to perhaps grab some low hanging fruit or get an overview of the targets.
Beyond that, we sometimes get reports that are out of scope and address issues in assets that are not listed among our managed bug bounty programs, due to hunters not following the asset lists, mistakenly testing third-party services or excluded IP ranges, and for very human reasons such as typos in domain names.
Love From the Community
One of our hunters recently shared their positive experience with our bug bounty platform, praising our fast triage process and transparent payout system. His feedback underscores the importance of effective communication in building a respectful relationship that encourages continued collaboration.
I wanted to take a moment to express my appreciation for your exceptional bug bounty platform. I really like your platform and the immediate response of the triage team and the payout process is so fast and transparent.
So far i have been hunting on so many platforms. I find your triage to be the best out of them all with very well explained responses. I have learned a lot from you guys too while hunting. Your detailed explanations on my reports really helped me understand so many vulnerabilities that i find hard to understand. So, it is a great experience working with you guyz.
Looking forward to contribute more on your platform. – GS
This is where we are heading. Trust, transparency, kindness and respect for those who contribute to the success of the programs we manage.
Cost and Earnings
For most of our programs we currently take a flat fee for every eligible bug report we handle, hand over to the customer, provide guidance on fixing and track status. We use this flat rate to cover triage efforts and continuous development of our very basic reporting platform.
Yes, we do not charge for false positives, duplicates or out of scope issues. It is our promise to keep these away from our customers.
Bug Bounty Buyers Guide
If you are considering starting a bug bounty program, we suggest you stick to the concept. Money for bugs. So consider free subscriptions that take a flat fee per relevant report. *shameless plug*
Unless you have super specific needs for huge maximum bounties, multi-user and multi-language features, unparalleled marketing of your program, fully automated integration into the DevOps process or advanced vulnerability management, an annual subscription fee is hard to justify. As for our statistics, we have sent out five valid reports per program so far.
Do not overthink which platform to choose. The number of hunters and programs on a platform is not very relevant. Hunters have started to pull and aggregate programs on their own dedicated pages to get an overview on the latest changes that are relevant to them. What really matters is the attractiveness of your program. High bounties, wide open scope and a big variety of technology . This is what makes you an interesting target.
Hunters are essentially freelancers. They are an ingenious crowd and have an entrepreneurial mindset when it comes to finding and “acquiring” new projects with potential. What they are looking for is interesting technology, fair treatment and quick payment.
And that is what we aim for. To grow our platform with interesting and large scopes, but also to make sure that the money goes where the hard work is done. Quickly.
Conclusion
As we reflect on our journey, we’re grateful for the valuable insights we’ve gained from our customers and hunters. We remain committed to continuously improve, and leverage feedback to refine our processes. If you have comments or are curious about specific figures, get in touch.
Wordware, a San Francisco startup, raised $30 million to simplify AI development with a natural language platform, enabling non-coders to build AI agents without traditional programming.Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 14:06:502024-11-21 14:06:50Wordware raises $30 million to make AI development as easy as writing a document
Our Global Research and Analysis Team (GReAT) experts have discovered two malicious packages in the Python Package Index (PyPI) – a popular third-party software repository for Python. According to the packages’ descriptions, they were libraries that allowed to work with popular LLMs (large language models). However, in fact, they imitated the declared functionality using the demo version of ChatGPT, and their main purpose was to install JarkaStealer malware.
The packages were available for download for more than a year. Judging by the repository’s statistics, during this time they were downloaded more than 1700 times by users from more than 30 countries.
Malicious packages and what were they used for
The malicious packages were uploaded to the repository by one author and, in fact, differed from each other only in name and description. The first was called “gptplus” and allegedly allowed access to the GPT-4 Turbo API from OpenAI; the second was called “claudeai-eng” and, according to the description, also promised access to the Claude AI API from Anthropic PBC.
The descriptions of both packages included usage examples that explained how to create chats and send messages to language models. But in reality, the code of these packages contained a mechanism for interaction with the ChatGPT demo proxy in order to convince the victim that the package was working. Meanwhile, the __init__.py file contained in the packages decoded the data contained inside and downloaded the JavaUpdater.jar file from the GitHub repository. If Java was not found on the victim’s machine, it also downloaded and installed the Java Runtime Environment (JRE) from Dropbox. The jar file itself contained the JarkaStealer malware, which was used to compromise the development environment and for undetected exfiltration of stolen data.
What is JarkaStealer malware, and why is it dangerous?
JarkaStealer is malware, presumably written by Russian-speaking authors, which is used primarily to collect confidential data and send it to the attackers. Here’s what it can do:
Steal data from various browsers;
Take screenshots;
Collect system information;
Steal session tokens from various applications (including Telegram, Discord, Steam, and even a Minecraft cheat client);
Interrupt browser processes to retrieve saved data.
The collected information is then archived, sent to the attacker’s server, and then deleted from the victim’s machine.
The malware authors distribute it through Telegram using the malware-as-a-service (MaaS) model. However, we also found the source code of JarkaStealer on GitHub, so it’s possible that this campaign didn’t involve the original authors of the malware.
How to stay safe
We promptly informed PyPI administrators about the malicious implants in the gptplus and claudeai-eng packages, and as of now they’ve already been removed from the repository. However, there’s no guarantee that this (or a similar) trick won’t be pulled on some other platform. We continue to monitor activity related to the JarkaStealer malware and look for other threats in open source software repositories.
For those who downloaded and used one of the malicious packages, the main recommendation is to immediately delete it. The malware doesn’t have persistence functionality, so it’s launched only when the package is used. However, all passwords and session tokens that were used on a victim’s machine could have been stolen by JarkaStealer, and so should be immediately changed or reissued.
We also recommend that developers be especially vigilant when working with open source software packages, and inspect them thoroughly before integrating them into their projects. This includes a detailed analysis of the dependencies and the respective supply chain of software products – especially when it comes to such a hyped topic as the integration of AI technologies.
In this case, the author’s profile’s creation date on PyPI could have been a red flag. If you look closely at the screenshot above, you can see that both packages were published on the same day, while the account that published them was registered just a couple of days earlier.
In order to minimize the risks of working with third-party open source software packages and avoid an attack on the supply chain, we recommend including in DevSecOps processes the Kaspersky Open Source Software Threats Data Feed, which is designed specifically for monitoring used open source components in order to detect threats that might be hidden inside.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-21 14:06:402024-11-21 14:06:40Packages with infostealer found in PyPI repository | Kaspersky official blog