Cyber Bites by Edwin Kwan
Cyber Bites
Cyber Bites - 23rd August 2024
0:00
Current time: 0:00 / Total time: -10:26
-10:26

Cyber Bites - 23rd August 2024

  • Thousands of Websites Exposed AWS Credentials, Leading to Large-Scale Extortion Campaign

  • Mac Users Beware: Microsoft Apps May Have Allowed Hackers to Spy on You

  • Ransomware on Track for Record Year Despite Fewer Victims Paying

  • FlightAware Data Breach Exposes User Information for Years

  • GitHub Actions Exposing Authentication Tokens in Popular Open-Source Projects


Thousands of Websites Exposed AWS Credentials, Leading to Large-Scale Extortion Campaign

https://www.csoonline.com/article/3488207/aws-environments-compromised-through-exposed-env-files.html

Researchers at Palo Alto Networks' Unit 42 have uncovered a large-scale extortion campaign targeting AWS environments. Attackers exploited a common misconfiguration - insecurely stored environment variables (.env files) on web servers - to steal AWS access keys and credentials for various cloud services.

The campaign involved scanning over 110,000 domains, leading to the exposure of over 90,000 unique environment variables. These exposed credentials included AWS access keys, database logins, social media tokens, and API keys for various services.

Once attackers gained access to AWS credentials, they used their knowledge of AWS APIs to move laterally within compromised environments, escalating privileges and deploying malicious scripts. The ultimate goal was to exfiltrate data from S3 buckets, a popular storage option for many web applications. After stealing the data, attackers left ransom notes demanding payment to prevent its sale.

The researchers highlight the importance of secure configuration practices. Web servers should be configured to prevent access to sensitive files like .env. Organizations should also implement logging and monitoring solutions to detect suspicious activity within their AWS environments. Additionally, using temporary IAM roles with least privilege access can minimize the damage caused by compromised credentials.

This extortion campaign demonstrates the significant risks associated with misconfigured web servers and insecure credential storage. Businesses are urged to review their cloud security practices and implement the recommended measures to prevent falling victim to similar attacks.

Mac Users Beware: Microsoft Apps May Have Allowed Hackers to Spy on You

https://www.linkedin.com/pulse/warning-microsoft-apps-macos-allows-hackers-spy-sgfwe/

Security researchers have discovered vulnerabilities in several popular Microsoft applications for macOS that could have allowed hackers to access your camera and microphone without your knowledge.

The affected apps include Microsoft Teams, Outlook, Word, PowerPoint, Excel, and OneNote. While Microsoft considers the exploit a "low risk," some versions remain unpatched.

Here's how it worked: Hackers could inject malicious code into these Microsoft apps, bypassing Apple's security measures and gaining access to sensitive resources like your camera and microphone.

Normally, Apple's macOS security requires user consent for apps to access these resources. However, the vulnerabilities allowed attackers to bypass this process entirely.

Thankfully, Microsoft has already patched Teams and OneNote to address the issue. However, users of Excel, PowerPoint, Word, and Outlook are still potentially vulnerable.

While Microsoft downplays the risk, security experts warn that users may have unknowingly granted permissions to these productivity tools, making them prime targets for exploitation.

This incident highlights the importance of staying informed about security updates and applying them promptly. Additionally, users should be cautious about granting permissions to applications, especially those that seem unnecessary for the app's intended function.

Here are some takeaways:

  • Update your Microsoft apps for macOS, especially Teams and OneNote.

  • Be mindful of the permissions you grant to applications.

  • Stay informed about security vulnerabilities and updates.

Ransomware on Track for Record Year Despite Fewer Victims Paying

https://www.chainalysis.com/blog/2024-crypto-crime-mid-year-update-part-1/

Ransomware attacks are seeing a surge in profitability in 2024, with victims on track to pay a record-breaking $459.8 million in the first half of the year alone. This is a 2% increase compared to the same period in 2023, which ultimately saw a record $1.1 billion in total payments.

The trend suggests that while ransomware attacks may be decreasing in number, attackers are focusing on larger targets and demanding higher ransoms. This is evidenced by the $75 million ransom payment made by a Fortune 50 company earlier this year, the largest ever recorded. The median ransom payment has also jumped significantly, from under $200,000 in early 2023 to $1.5 million by June 2024.

Experts believe this shift in tactics is due to a combination of factors, including:

  • Disruption of major ransomware operations: Law enforcement efforts have disrupted major ransomware groups like LockBit, forcing others to adapt.

  • Focus on larger organizations: Targeting larger companies with deeper pockets allows attackers to demand and potentially receive higher ransoms.

  • Data exfiltration: Stealing sensitive customer data alongside encryption adds pressure on organizations to pay to avoid leaks.

Despite the rise in ransom demands, there's a positive trend: the number of victims paying ransoms continues to decline. Chainalysis reports a 27% decrease in total ransomware payment events compared to the first half of 2023. This aligns with earlier reports suggesting a decrease in the overall ransom payment rate.

The report also highlights a significant increase in stolen cryptocurrency. The total value of stolen crypto has doubled year-over-year, reaching $1.58 billion by July 2024. This suggests a shift in focus by cybercriminals, with centralized exchanges becoming more targeted than DeFi protocols.

While these numbers paint a concerning picture for ransomware profitability, the overall decline in illicit cryptocurrency activity suggests that legitimate crypto use is growing at a faster pace.

FlightAware Data Breach Exposes User Information for Over 3 Years

https://static.flightaware.com/pdf/fa_data_notification.pdf

Popular flight tracking platform FlightAware suffered a data breach due to a configuration error that left user information exposed from January 1, 2021, to July 25, 2024.

The breach potentially exposed a range of personal data, including usernames, passwords, email addresses, and for some users, even Social Security numbers. Additional information like billing addresses, phone numbers, and even pilot licenses could also be compromised.

While the exact number of impacted users is unknown, FlightAware boasts over 12 million registered users, suggesting the breach could be significant. The company itself has not confirmed the number affected.

FlightAware has addressed the configuration error and is requiring all potentially impacted users to reset their passwords upon their next login. Additionally, they are offering a free 24-month identity protection service through Equifax to all affected users.

Here's what you need to do:

  • If you have a FlightAware account, be prepared to reset your password upon your next login.

  • Consider changing your password for any other online accounts where you might be using the same credentials.

  • Report any suspicious activity to your local law enforcement agency.

This incident highlights the importance of secure configuration practices and the dangers of reusing passwords across multiple platforms.

GitHub Actions Exposing Authentication Tokens in Popular Open-Source Projects

https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/

A security vulnerability in GitHub Actions has exposed authentication tokens for multiple high-profile open-source projects, including those from Google, Microsoft, AWS, and Red Hat.

These exposed tokens could allow attackers to gain unauthorized access to private repositories, steal source code, or inject malicious code into projects.

The issue lies in how GitHub Actions handles artifacts, files generated during the build process and stored alongside the code. Insecure configurations and user errors can lead to these artifacts containing sensitive information, including GitHub tokens used for authentication within the workflow.

Researchers from Palo Alto Networks' Unit 42 discovered this vulnerability, which they call "ArtiPACKED." They identified several contributing factors:

  • Default settings: By default, the commonly used "actions/checkout" action stores the GitHub token within the local Git directory (.git). Uploading this entire directory as an artifact exposes the token.

  • Misconfiguration: Uploading artifacts containing other sensitive information like logs or build outputs can also expose credentials stored in environment variables.

  • Lack of security checks: Scripts within the workflow might inadvertently log environment variables containing tokens.

Unfortunately, GitHub has chosen not to address this vulnerability itself, leaving the responsibility on developers to secure their workflows. Here's what you need to know:

  • Affected projects: Unit 42 identified 14 large open-source projects that leaked tokens, including projects from Google, Microsoft, AWS, and Red Hat.

  • Exploitation: Attackers could exploit these leaks by downloading artifacts and searching for exposed tokens before they expire.

  • Mitigation: Developers should avoid uploading sensitive directories, sanitize logs, and review CI/CD workflows to ensure credentials are not persisted unnecessarily. Additionally, using least privilege for access tokens can minimize damage if leaked.

This incident highlights the importance of security best practices within CI/CD pipelines and the potential risks associated with default configurations. Developers are urged to review their workflows and implement appropriate mitigation strategies.


Special Thanks to Justin Butterfield once again for contributing some of the interesting stories for this week’s cyber bites.

Discussion about this podcast