Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:00):
Mark's and Spencer confirmsthat customer personal data
was accessed in a recent hack.
The FBI warns of 13 outdated routershijacked by hackers, Fortinet patches a
zero day and Fortivoice actively exploitedin targeted attacks and joy or rapture,
unforeseen ransomware reaches the CPU.
(00:23):
Welcome to Cybersecurity.
Today, I'm your host, Jim Love
Marks and Spencer has confirmed thathackers accessed personal customer
data during a cyber attack that hasdisrupted its operations since late April.
The breach, which occurred over theEaster weekend, compromised information,
including names, dates of birth, home andemail addresses, phone numbers, household
(00:45):
details, and even online order histories.
But importantly, Mars and Spencer statedthat no usable payment card details
or account passwords were accessed.
The attack has been linked to thecyber crime group, Dragon Force, known
for ransomware and extortion tactics.
Marks and Spencer's onlineordering systems remain offline
(01:07):
and the company is not specified.
When services will resume, , customersare being prompted to reset
their passwords as a precaution.
And Marks and Spencer's advisesvigilance against potential phishing
attempts and emphasizes it will neverrequest personal account information
via unsolicited communications.
The UK's National Cybersecurity Center iscollaborating with Mark Spencer and law
(01:32):
enforcement to investigate the incident.
The old saying, if itain't broke, don't fix.
It might not apply to routers.
I. It turns out that some of thoseold reliable Linksys routers might
be a significant security risk.
The FBI has issued an urgent alertregarding 13 older router models being
(01:54):
actively exploited by cyber criminals.
These devices primarily from Linksys,Cradlepoint, and Cisco have reached
their end of life and are no longerreceiving security updates, making
them vulnerable to malware attacks.
For many larger companies, we wouldhope this wouldn't be an issue.
Replacement should be done for any networkdevice that is no longer supported.
(02:18):
But for smaller companies or homeoffices, this could be a real threat.
I. So the Linksys E 1200, E 2,500, E1000, E 4,200 E, 1500 E 300 E 3,200 E,
1550 WRT three 20 NWRT three 10 n and WRTsix 10 N are affected from Cradlepoint.
(02:41):
The E 100 series is and from Cisco,the M 10 series . Hackers are
exploiting these outdated routersusing variants of the moon malware.
The malware allows attackers togain unauthorized access, turning
compromised routers into proxynodes for malicious activities such
as data theft and cyber attacks.
(03:02):
Once infected, these routers canbe controlled remotely, often
without the owner's knowledge.
Some signs of compromise might include.
Unusual overheating, frequent internetdisconnections, unexpected changes
in router settings or appearanceof unknown devices on your network.
If you own one of the affectedmodels, the FBI is strongly advising
(03:24):
replacing it with a newer model thatregularly receives security updates.
But if not, at least ensure that youdisable remote administration, access
your router settings, and turn offremote management features to at least
try to prevent unauthorized access.
Fortinet has issued a criticalfix for a zero day vulnerability
(03:47):
CVE 20 25 32 7 5 6, affecting itsFortiVoice enterprise phone systems.
After confirming the flaw was activelyexploited in real world attacks,
the vulnerability is a stack based bufferoverflow that allows unauthenticated
attackers to remotely execute codeby sending specially crafted HTTP
(04:10):
requests, Fortinets product securityteam discovered the issue following the
attacker's activities including networkscans, system crash log deletions to
cover their tracks and FCGI debuggingbeing toggled on to log credentials
from the system or SSH login attempts.
(04:31):
The company has released patches andadvises administrators to disable
the HTTP or H-T-T-P-S administrativeinterfaces as a temporary mitigation.
This is the latest in a stringof critical security issues
affecting Fortinet products.
Last month, the Shadow Server Foundationreported on 16,000 internet exposed
(04:51):
Fortnite devices that were compromisedusing a new SIM link backdoor
that provides threat actors withread-only access to sensitive files.
On now patched deviceshacked in previous attacks
earlier this year, Fortinetpatched another vulnerability,
CVE 20 25 2 4 4 7 2.
An authentication bypass flaw inFort iOS and FortiProxy that allowed
(05:16):
attackers to gain superin access.
The company has urged all customers toaudit systems for signs of compromise
and apply patches immediately.
Organizations relying on Fortivoice or other impacted Fortinet
products, including Forti male,Forti NDR, Forti recorder, and
Forti camera should act quickly.
(05:36):
The nature of the exploit and itsconfirmed use in the wild makes
this vulnerability, especiallyhigh risk for unpatched systems.
And finally, a cybersecurityresearcher has developed a proof
of concept demonstrating thatransomware can be embedded directly
into a computer's CPU via microcode updates, potentially bypassing
(06:01):
all traditional security measures.
Christian Beek, a senior directorat cybersecurity firm, rapid seven
created the POC inspired by acritical flaw in AMD's Zen processors.
The flaw previously identified byGoogle researchers allows attackers
to modify the RDRAND instruction.
(06:21):
Enabling the injection of custom microcodebeaks approach involves weaponizing
microcode updates a low level layerbetween hardware and machine code.
Typically used by chip makers to fixbugs and improve CPU reliability,
to hide ransomware payloadswithin the processor itself.
(06:43):
While MICROCODE updates are generallyexclusive to CPU manufacturers,
Beek's research indicates thatinjecting custom microcode, although
challenging is actually feasible.
His POC, which he has no plans to releasepublicly, demonstrates how such an
attack could render traditional securitytechnologies ineffective as the malware
(07:04):
operates beneath the software layer.
The development underscores the evolvingsophistication of cyber threats.
Beek references the Black Lotus Boot Kitknown for compromising UEFI, firmware and
INFECTING systems protected by Secure Bootas a precedent for such low level attacks.
Additionally, leaked chat logs from theConti Ransomware Group in 2022 revealed
(07:29):
efforts to develop ransomware capableof installing directly into the UEFI.
Firmware highlighting a trend towardsmore persistent and stealthy malware.
The ability to embed ransomware at theCPU level would represent a significant
escalation in cyber attack capabilities,potentially allowing malware to survive,
(07:52):
system reboots, hardware replacements,and even software reinstalls.
This research serves as a warningto both chip manufacturers and
PC manufacturers about the needto address vulnerabilities at the
hardware level and to develop defensesagainst such deeply embedded threats.
(08:13):
And on that happy note, that's our show.
We're always interested in youropinion, and you can contact
us at editorial@technewsday.ca.
You can find me on LinkedIn,or if you're watching this on
YouTube, you know what to do.
Leave a comment under the video.
I'm your host, Jim Love.
Thanks for listening.