Security news weekly round-up - 23rd July 2021

We've been at this for 9 weeks in a row, on track to beat the previous record of 14 weeks in a row which was set between May 15, 2020, and August 14, 2020.

Can we do this? Yes! we can.

Introduction

Hello, and welcome to this week's security round-up. As always, I am your host Habdul Hazeez.

In this week's review, we have bugs everywhere.

Let's begin.

CloudFlare is a popular name in the security world and among developers. Its CDNJS is used to serve JavaScript and CSS libraries and it's used by 12.7% of all websites on the internet.

The bug can lead to a complete server takeover.

Excerpt from the article:

Specifically, the vulnerability works by publishing packages to Cloudflare's CDNJS using GitHub and npm, using it to trigger a path traversal vulnerability, and ultimately trick the server into executing arbitrary code, thus achieving remote code execution.

Bugs can lie dormant for decades until finds they intentionally or by accident.

Excerpt from the article:

Tracked as CVE-2021-3438 (CVSS score: 8.8), the issue concerns a buffer overflow in a print driver installer package named "SSPORT.SYS" that can enable remote privilege and arbitrary code execution.

Talk about smart. This is smart.

Excerpt from the article:

Upon successful infection, the initial Delphi-based dropper — which masquerades as a software installer — acts as an entry point to fetch next-stage payloads from a remote server and also add local exclusions in Windows Defender for the two downloaded executables in an attempt to thwart antivirus scanning

The title says it all.

Excerpt from the article:

The world woke up on Tuesday to two new vulnerabilities—one in Windows and the other in Linux—that allow hackers with a toehold in a vulnerable system to bypass OS security restrictions and access sensitive resources.

Tell me something that I don't know.

Excerpt from the article:

XLoader is currently being offered on an underground forum as a botnet loader service that can “recover” passwords from web browsers and some email clients (Chrome, Firefox, Opera, Edge, IE, Outlook, Thunderbird, Foxmail).

Kindly change to router password.

Excerpt from the article:

These routers, which number in the tens of thousands, can be remotely found and attacked using publicly available passwords, granting malicious hackers access to the victim’s home network

Stay safe, be careful of what you download.

Excerpt from the article:

Although Microsoft has made the process of downloading and installing Windows 11 from its official website fairly straightforward, many still visit other sources to download the software, which often contains unadvertised goodies from cybercriminals (and isn’t necessarily Windows 11 at all)

Credits

Cover photo by Debby Hudson on Unsplash.

That's it for this week, I'll see you next Friday.

23