Major companies have confirmed being impacted by the recent MOVEit zero-day attack, including BBC, British Airways and Zellis.
The post Several Major Organizations Confirm Being Impacted by MOVEit Attack appeared first on SecurityWeek.
The all in one place for non-profit security aid.
Major companies have confirmed being impacted by the recent MOVEit zero-day attack, including BBC, British Airways and Zellis.
The post Several Major Organizations Confirm Being Impacted by MOVEit Attack appeared first on SecurityWeek.
SysBumps – New Kernel Break Attack Bypassing macOS Systems Security
Security researchers have uncovered a novel attack targeting macOS systems running on Apple Silicon processors. Dubbed “SysBumps,” this attack exploits speculative execution vulnerabilities in system calls to bypass kernel isolation and break Kernel Address Space Layout Randomization (KASLR), a critical security feature.
The research team from Korea University, led by Hyerean Jang, Taehun Kim, and Youngjoo Shin, presented their findings in a paper titled “SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon.”
Their work represents the first successful KASLR break attack on macOS systems powered by Apple’s custom ARM-based chips.
KASLR is a defense mechanism that randomizes the memory layout of the kernel, making it harder for attackers to predict the location of specific functions or data structures.
By breaking KASLR, malicious actors can potentially exploit other vulnerabilities more easily, compromising system security.
The SysBumps attack leverages speculative execution, a performance optimization technique used in modern processors.
By exploiting Spectre-type vulnerabilities in certain macOS system calls, the researchers demonstrated that an unprivileged attacker could cause transient memory accesses to kernel addresses, even with kernel isolation enabled.
A key component of the attack involves using the Translation Lookaside Buffer (TLB) as a side channel to infer information about the kernel’s memory layout. The research team reverse-engineered the TLB structure of various M-series processors, uncovering previously unknown details about its architecture.
The attack works by constructing a distinguishing oracle that can determine whether a given kernel address is valid or not. This allows attackers to gradually map out the kernel’s memory space and ultimately determine its base address, effectively breaking KASLR.
The researchers successfully demonstrated the SysBumps attack across different M-series processors and macOS versions in their experiments.
The attack achieved an average accuracy of 96.28% in determining the kernel base address, with execution times of around 3 seconds.
What makes SysBumps particularly concerning is its ability to bypass existing kernel isolation techniques implemented in macOS. This highlights the ongoing challenges in securing modern operating systems against sophisticated side-channel attacks.
The discovery of SysBumps raises important questions about the security of Apple’s custom silicon and the effectiveness of current protection mechanisms.
As Apple continues to transition its product line to ARM-based processors, addressing such vulnerabilities becomes increasingly critical.
The researchers have responsibly disclosed their findings to Apple, who acknowledged the issue and are investigating its root cause.
To mitigate the SysBumps attack, the paper proposes several potential countermeasures. These include partitioning the data TLB between user and kernel space, modifying TLB behavior for invalid addresses, and employing code reordering techniques to prevent speculative execution of sensitive instructions.
As the tech industry grapples with the security implications of speculative execution and other microarchitectural optimizations, research like this serves as a reminder of the constant need for vigilance and innovation in cybersecurity.
The SysBumps attack underscores the complexity of securing modern computing systems, where performance optimizations can often lead to unexpected security vulnerabilities.
As Apple and other tech giants continue to push the boundaries of processor design, balancing performance and security remains an ongoing challenge.
Users of macOS systems, particularly those running on Apple Silicon, are advised to keep their systems updated with the latest security patches as they become available. While no immediate fix is available, Apple is likely to address this vulnerability in future software updates.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
The post SysBumps – New Kernel Break Attack Bypassing macOS Systems Security appeared first on Cyber Security News.
xz-utils Backdoor Found in Kali Linux Installations – Check for Malware Infection
[[{“value”:”
A backdoor was recently discovered in the xz-utils package versions 5.6.0 to 5.6.1, shocking the Linux community. This poses a significant threat to the security of Linux distributions, including Kali Linux.
The vulnerability, CVE-2024-3094, could potentially allow malicious actors to compromise sshd authentication, granting unauthorized access to systems remotely.
The xz-utils package is a widely used library in the Linux ecosystem for data compression, making the severity of this vulnerability particularly alarming.
The backdoor was discovered in versions 5.6.0 and 5.6.1 of the xz-utils package, and had it not been identified and addressed promptly, it could have had far-reaching consequences.
Document
Run Free ThreatScan on Your Mailbox
AI-Powered Protection for Business Email Security
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .
The issue was quickly patched in Debian and, consequently, in Kali Linux, mitigating the potential impact.
Kali Linux users who updated their installations between March 26th and March 29th, 2024, are at risk of having installed the compromised version of xz-utils (5.6.0-0.2).
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.
— Kali Linux (@kalilinux) March 29, 2024
It is crucial for users who updated their systems during this period to apply the latest updates immediately to rectify the issue.
However, according to a statement from Kali Linux, this vulnerability does not affect those who did not update their Kali installations before March 26th.
To check if your system is affected, you can execute the following command:
apt-cache policy liblzma5
If the output indicates that version 5.6.0-0.2 is installed, it is imperative to upgrade to the latest version (5.6.1+really5.4.5-1) using the following commands:
sudo apt update && sudo apt install -y –only-upgrade liblzma5
This incident is a reminder to act promptly on security vulnerabilities.
The quick identification and resolution of the backdoor in xz-utils highlight the responsiveness of the Linux community to security threats.
Users are encouraged to stay informed about potential vulnerabilities and to apply updates and patches as soon as they become available to ensure the security of their systems.
For more detailed information on the vulnerability and guidance on addressing it, users can refer to the initial disclosure on Openwall, the summary post on Help Net Security, and the National Vulnerability Database (NVD) entry for CVE-2024-3094.
The discovery of the xz-utils backdoor underscores the ongoing challenges in securing the software supply chain and the critical role that community vigilance and rapid response play in safeguarding the integrity of open-source software.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
The post xz-utils Backdoor Found in Kali Linux Installations – Check for Malware Infection appeared first on Cyber Security News.
“}]] Read More
Cyber Security News
Why Pay A Pentester?
The evolution of software always catches us by surprise. I remember betting against the IBM computer Deep Blue during its chess match against the grandmaster Garry Kasparov in 1997, only to be stunned when the machine claimed victory. Fast forward to today, would we have imagined just three years ago that a chatbot could write essays, handle customer support calls, and even craft commercial Read More