Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆHow do you secure remote access in ICS/OT?
Here are 5 tips on how to allow remote access AND secure it.
As much as possible.
1. Multifactor Authentication
This one goes without saying. While MFA isn't a silver bullet...
It vastly decreases the chance an unauthorized party can establish a VPN connection without a valid second factor.
2. On-demand Access
Besides MFA, this is my favorite.
Always assume that any VPN user's system could be compromised.
-> Your vendors.
-> Your employees.
-> Your other third parties.
Once compromised, do you want an attacker having 24x7x365 access into your ICS/OT network?
Of course not.
Limit VPN access to only the time windows in which access is required.
Have the outside parties schedule or call when access is required.
Many say that this is burdensome and too much overhead.
Which I can understand.
You'll have to weigh the advantages and disadvantages for your environment.
For me, I always push for on-demand access to greatly reduce the risk.
3. Implement Harden Jump Hosts
Require remote parties to login to a jump host before accessing ICS/OT resources.
There could even be multiple jump hosts for them to authenticate to.
For these jump hosts, ensure that each system is hardened.
Also ensure that the host's network connectivity is limited to only the IP addresses and ports that are necessary.
4. Monitor for Suspicious Activity
No security solution is perfect.
A VPN can become compromised.
Attackers can gain access to your network.
For when they do, it's important to be watching.
95% of ICS/OT networks don't perform network security monitoring.
This doesn't mean you shouldn't.
Watching your network activity. Your host activity.
All for signs of compromise.
Which brings us to...
5. Record and Monitor Jump Host Activity
This one isn't high on many lists.
But if you have the resources, watch in real-time what remote parties are doing on jump hosts.
Ensure all activity looks legitimate.
And if something looks suspicious, take action!
Thanks for checking out the list!
P.S. Do you know someone with unsecured remote access?
Ref: Mike HolcombMike Holcomb
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Here are 5 tips on how to allow remote access AND secure it.
As much as possible.
1. Multifactor Authentication
This one goes without saying. While MFA isn't a silver bullet...
It vastly decreases the chance an unauthorized party can establish a VPN connection without a valid second factor.
2. On-demand Access
Besides MFA, this is my favorite.
Always assume that any VPN user's system could be compromised.
-> Your vendors.
-> Your employees.
-> Your other third parties.
Once compromised, do you want an attacker having 24x7x365 access into your ICS/OT network?
Of course not.
Limit VPN access to only the time windows in which access is required.
Have the outside parties schedule or call when access is required.
Many say that this is burdensome and too much overhead.
Which I can understand.
You'll have to weigh the advantages and disadvantages for your environment.
For me, I always push for on-demand access to greatly reduce the risk.
3. Implement Harden Jump Hosts
Require remote parties to login to a jump host before accessing ICS/OT resources.
There could even be multiple jump hosts for them to authenticate to.
For these jump hosts, ensure that each system is hardened.
Also ensure that the host's network connectivity is limited to only the IP addresses and ports that are necessary.
4. Monitor for Suspicious Activity
No security solution is perfect.
A VPN can become compromised.
Attackers can gain access to your network.
For when they do, it's important to be watching.
95% of ICS/OT networks don't perform network security monitoring.
This doesn't mean you shouldn't.
Watching your network activity. Your host activity.
All for signs of compromise.
Which brings us to...
5. Record and Monitor Jump Host Activity
This one isn't high on many lists.
But if you have the resources, watch in real-time what remote parties are doing on jump hosts.
Ensure all activity looks legitimate.
And if something looks suspicious, take action!
Thanks for checking out the list!
P.S. Do you know someone with unsecured remote access?
Ref: Mike HolcombMike Holcomb
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Underground #Ransomware Group Targets Simmtech Co, Ltd
https://undercodenews.com/underground-ransomware-group-targets-simmtech-co-ltd/
@Undercode_News
https://undercodenews.com/underground-ransomware-group-targets-simmtech-co-ltd/
@Undercode_News
UNDERCODE NEWS
Underground Ransomware Group Targets Simmtech Co, Ltd - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Upgrading Your SIEM: A Guide to Modern Cybersecurity
https://undercodenews.com/upgrading-your-siem-a-guide-to-modern-cybersecurity/
@Undercode_News
https://undercodenews.com/upgrading-your-siem-a-guide-to-modern-cybersecurity/
@Undercode_News
UNDERCODE NEWS
Upgrading Your SIEM: A Guide to Modern Cybersecurity - UNDERCODE NEWS
Security Information and Event Management (SIEM) systems are a cornerstone of modern cybersecurity. They collect, analyze, and correlate security data from
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Windows 11's Evolving Start Menu: A Step Forward, But Still a Nudge Too Far
https://undercodenews.com/windows-11s-evolving-start-menu-a-step-forward-but-still-a-nudge-too-far/
@Undercode_News
https://undercodenews.com/windows-11s-evolving-start-menu-a-step-forward-but-still-a-nudge-too-far/
@Undercode_News
UNDERCODE NEWS
Windows 11's Evolving Start Menu: A Step Forward, But Still a Nudge Too Far - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
Getting RCE via Worst Fit ๐คฆ
If you watched the Black Hat talk from Orange Tsai and Splitline last week in London, you might have found yourself shocked to see that a code snippet like the one below can lead to RCE.
Why can this be hacked? ๐ค
Well, because you can inject double quotes... But can you? Not really, because 'subprocess.run()' would handle them securely. What you can do instead though is inject the odd fullwidth quotation mark: ๏ผ
This shouldn't be a problem because surely shells wouldn't interpret this, right?
Wrong. Since Windows historically stores a lot of things, like cmdlines, environment variables, etc., in both ANSI and UTF-16, we run into a problem... How can you represent a value in ANSI if that value doesn't actually exist in the character set?
Meet "Best Fit". Which converts certain UTF-16 characters to similar-looking ANSI characters (such as converting a โ to an 8. Or converting a ยฅ to a backslash. Or converting a ๏ผto a normal double quote).
This means that you can pwn this code snippet by injecting something like:
๏ผ --use-askpass=calc ๏ผ
This pops calculator.
If you want to play around a bit with this, you may want to check out this PoC that I've created: https://lnkd.in/dBgeFscq
Also, you may want to check out https://worst[.]fit/ which tracks a list of Windows binaries vulnerable to this attack.
The worst part? Microsoft says this isn't a Windows vulnerability while open-source library maintainers say it is. So who is gonna fix it? ๐คทโโ๏ธ
Ref: Florian Walter
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
If you watched the Black Hat talk from Orange Tsai and Splitline last week in London, you might have found yourself shocked to see that a code snippet like the one below can lead to RCE.
Why can this be hacked? ๐ค
Well, because you can inject double quotes... But can you? Not really, because 'subprocess.run()' would handle them securely. What you can do instead though is inject the odd fullwidth quotation mark: ๏ผ
This shouldn't be a problem because surely shells wouldn't interpret this, right?
Wrong. Since Windows historically stores a lot of things, like cmdlines, environment variables, etc., in both ANSI and UTF-16, we run into a problem... How can you represent a value in ANSI if that value doesn't actually exist in the character set?
Meet "Best Fit". Which converts certain UTF-16 characters to similar-looking ANSI characters (such as converting a โ to an 8. Or converting a ยฅ to a backslash. Or converting a ๏ผto a normal double quote).
This means that you can pwn this code snippet by injecting something like:
๏ผ --use-askpass=calc ๏ผ
This pops calculator.
If you want to play around a bit with this, you may want to check out this PoC that I've created: https://lnkd.in/dBgeFscq
Also, you may want to check out https://worst[.]fit/ which tracks a list of Windows binaries vulnerable to this attack.
The worst part? Microsoft says this isn't a Windows vulnerability while open-source library maintainers say it is. So who is gonna fix it? ๐คทโโ๏ธ
Ref: Florian Walter
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - dub-flow/worst-fit-poc: This repo contains a PoC of exploiting Worst Fit (props to Orange Tsai and Splitline who presentedโฆ
This repo contains a PoC of exploiting Worst Fit (props to Orange Tsai and Splitline who presented this research at Black Hat EMEA 2024) - dub-flow/worst-fit-poc
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Serbia's #Spyware Scandal: A Deep Dive into the NoviSpy Affair
https://undercodenews.com/serbias-spyware-scandal-a-deep-dive-into-the-novispy-affair/
@Undercode_News
https://undercodenews.com/serbias-spyware-scandal-a-deep-dive-into-the-novispy-affair/
@Undercode_News
UNDERCODE NEWS
Serbia's Spyware Scandal: A Deep Dive into the NoviSpy Affair - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from DailyCVE
๐ด ColdFusion Improper Access Control (#CVE-2024-20767) - HIGH
https://dailycve.com/coldfusion-improper-access-control-cve-2024-20767-high/
@DailyCVE
https://dailycve.com/coldfusion-improper-access-control-cve-2024-20767-high/
@DailyCVE
DailyCVE
ColdFusion Improper Access Control (CVE-2024-20767) - HIGH - DailyCVE
2024-12-16 Platform: ColdFusion Version: 2023.6, 2021.12 and earlier Vulnerability: Improper Access Control Severity: HIGH (CVSS: 7.4) Date: March 18, 2024 [โฆ]
Forwarded from DailyCVE
๐ด #Windows Kernel-Mode Driver Elevation of Privilege Vulnerability (#CVE-2024-XXXX) (Critical)
https://dailycve.com/windows-kernel-mode-driver-elevation-of-privilege-vulnerability-cve-2024-xxxx-critical/
@Daily_CVE
https://dailycve.com/windows-kernel-mode-driver-elevation-of-privilege-vulnerability-cve-2024-xxxx-critical/
@Daily_CVE
DailyCVE
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability (CVE-2024-XXXX) (Critical) - DailyCVE
2024-12-16 This article describes a critical vulnerability (CVE-2024-XXXX) in Windows Kernel-Mode Drivers that allows attackers to gain elevated privileges on [โฆ]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Winnti Group's Glutton: A Multi-Layered PHP Backdoor with a Twist
https://undercodenews.com/winnti-groups-glutton-a-multi-layered-php-backdoor-with-a-twist/
@Undercode_News
https://undercodenews.com/winnti-groups-glutton-a-multi-layered-php-backdoor-with-a-twist/
@Undercode_News
UNDERCODE NEWS
Winnti Group's Glutton: A Multi-Layered PHP Backdoor with a Twist - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Farewell, Dragon! #SpaceX Cargo Ship Departs Space Station
https://undercodenews.com/farewell-dragon-spacex-cargo-ship-departs-space-station/
@Undercode_News
https://undercodenews.com/farewell-dragon-spacex-cargo-ship-departs-space-station/
@Undercode_News
UNDERCODE NEWS
Farewell, Dragon! SpaceX Cargo Ship Departs Space Station - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Dragon Departs the International Space Station: Witness Its Undocking Live on #NASA+!
https://undercodenews.com/dragon-departs-the-international-space-station-witness-its-undocking-live-on-nasa/
@Undercode_News
https://undercodenews.com/dragon-departs-the-international-space-station-witness-its-undocking-live-on-nasa/
@Undercode_News
UNDERCODE NEWS
Dragon Departs the International Space Station: Witness Its Undocking Live on NASA+! - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Internet-Exposed HMIs: A Growing Threat to Water and Wastewater Systems
https://undercodenews.com/internet-exposed-hmis-a-growing-threat-to-water-and-wastewater-systems/
@Undercode_News
https://undercodenews.com/internet-exposed-hmis-a-growing-threat-to-water-and-wastewater-systems/
@Undercode_News
UNDERCODE NEWS
Internet-Exposed HMIs: A Growing Threat to Water and Wastewater Systems - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฆ ๐๐ ๐๐ฅ๐ฎ๐ ๐๐๐๐ฆ ๐๐ซ๐๐ข๐ง๐ข๐ง๐ ๐
๐๐๐ ๐๐จ๐ฎ๐ซ๐ฌ๐๐ฌ
1- Cybersecurity for Students: lnkd.in/g4YmXP9J
2- SOC Fundamentals: lnkd.in/gVfUGNR3
3- Phishing Email Analysis: lnkd.in/giQWrn3a
4- Detecting Web Attacks: lnkd.in/gUTFXRzM
5- Malware Traffic Analysis with Wireshark: lnkd.in/g5Ze-iwU
6- Linux for Blue Team: lnkd.in/gvpWMdea
7-Building a Malware Analysis Lab: lnkd.in/gGXunp4q
8-๐ Splunk for SOC: lnkd.in/gkZMam_n
9-๐ Introduction to Cryptology: lnkd.in/g3jbE84W
10-๐ผ Job Hunting: lnkd.in/g9MeH9P7
Ref: Mohamed Hamdi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1- Cybersecurity for Students: lnkd.in/g4YmXP9J
2- SOC Fundamentals: lnkd.in/gVfUGNR3
3- Phishing Email Analysis: lnkd.in/giQWrn3a
4- Detecting Web Attacks: lnkd.in/gUTFXRzM
5- Malware Traffic Analysis with Wireshark: lnkd.in/g5Ze-iwU
6- Linux for Blue Team: lnkd.in/gvpWMdea
7-Building a Malware Analysis Lab: lnkd.in/gGXunp4q
8-๐ Splunk for SOC: lnkd.in/gkZMam_n
9-๐ Introduction to Cryptology: lnkd.in/g3jbE84W
10-๐ผ Job Hunting: lnkd.in/g9MeH9P7
Ref: Mohamed Hamdi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Rhode Island's RIBridges System Compromised in #Ransomware Attack
https://undercodenews.com/rhode-islands-ribridges-system-compromised-in-ransomware-attack/
@Undercode_News
https://undercodenews.com/rhode-islands-ribridges-system-compromised-in-ransomware-attack/
@Undercode_News
UNDERCODE NEWS
Rhode Island's RIBridges System Compromised in Ransomware Attack - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Agile Business, Agile Security: How #AI and Zero Trust Work Together
https://undercodenews.com/agile-business-agile-security-how-ai-and-zero-trust-work-together/
@Undercode_News
https://undercodenews.com/agile-business-agile-security-how-ai-and-zero-trust-work-together/
@Undercode_News
UNDERCODE NEWS
Agile Business, Agile Security: How AI and Zero Trust Work Together - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฅ๏ธ Beware Graphic Designers: Malicious Ads Targeting You with Fake #Software
https://undercodenews.com/beware-graphic-designers-malicious-ads-targeting-you-with-fake-software/
@Undercode_News
https://undercodenews.com/beware-graphic-designers-malicious-ads-targeting-you-with-fake-software/
@Undercode_News
UNDERCODE NEWS
Beware Graphic Designers: Malicious Ads Targeting You with Fake Software - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Iranian Cyberweapon Targets Critical Infrastructure: Decoding the IOCONTROL Threat
https://undercodenews.com/iranian-cyberweapon-targets-critical-infrastructure-decoding-the-iocontrol-threat/
@Undercode_News
https://undercodenews.com/iranian-cyberweapon-targets-critical-infrastructure-decoding-the-iocontrol-threat/
@Undercode_News
UNDERCODE NEWS
Iranian Cyberweapon Targets Critical Infrastructure: Decoding the IOCONTROL Threat - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ