Month: April 2017

Network Mgmt vulnerability exposes home cable modems to hacking

(PCWorld.com): Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation.

SNMP is used for automated network device identification, monitoring and remote configuration. It is supported and enabled by default in many devices, including servers, printers, networking hubs, switches and routers.

Independent researchers Ezequiel Fernandez and Bertin Bervis recently found a way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers.

Versions 1 and 2 of the SNMP protocol don't have strong authentication to begin with. They provide either read-only or write access to a device's configuration through passwords called community strings. By default these passwords are "public" for read-only access and "private" for write access, but device manufacturers can change them in their implementations and it's generally recommended to do so.

The leaking of sensitive configuration data through the default "public" SNMP community string is a known problem that has affected many devices over the years. In 2014, researchers from Rapid7 found SNMP leaks in almost half a million internet-connected devices made by Brocade, Ambit and Netopia.

However, what Fernandez and Bervis found is much worse: devices from multiple vendors that accept virtually any value for the SNMP community string and unlock both read and write access to their configuration data.

The two researchers first located a small number of vulnerable devices, including the Cisco DPC3928SL cable modem that's now part of Technicolor's product portfolio following the company's acquisition of Cisco's Connected Devices division in 2015.

The researchers claim that when they reported the issue to Technicolor, the company told them that it was the result of an access misconfiguration by a single ISP in Mexico rather than a problem with the device itself.

This prompted the researchers to perform a wider internet scan that resulted in the discovery of 78 vulnerable cable modem models from 19 manufacturers, including Cisco, Technicolor, Motorola, D-Link and Thomson.

The number of vulnerable devices that can be targeted directly over the internet range from less than 10 for some models to tens and hundreds of thousands for others. For example, there are almost 280,000 vulnerable Thomson DWG850-4 devices on the internet, most of them are in Brazil, according to the researchers.

The researchers believe that the underlying problem is located in the SNMP implementation used by the modems, rather than being the result of misconfiguration by ISPs.

Regardless of the cause, the problem is serious, as attackers could exploit this flaw to extract administrative and Wi-Fi passwords or to hijack devices by modifying their configurations.

There's not much that users can do if their ISP supplied them with a vulnerable device, other than ask for a different model or install their own modem. Unfortunately, not many ISPs allow their residential customers to use their own gateway devices, because they want uniformity and remote management capabilities on their networks.

Determining if a particular device is vulnerable to this issue is possible, but requires a bit of work. An online port scanner like ShieldsUp can be used to determine if the device responds to SNMP requests over its public IP address.

If SNMP is open, a different online tool can be used to check if the device's SNMP server returns valid responses when the "public" or random community strings are used. At the very least this would indicate an information leak problem.

The above article was taken from PCWorld.com.

Possible Fix on How to get a “stuck” app update “unstuck”

For those own us who use iOS devices, we know that developers are always updating and improving their apps.

When they do (and when Apple gets around to making them available) the app has to be sent from the App Store to the iOS device. While this process works 99.9% of the time, sometimes the update "gets stuck" and downloads, but doesn't update all the way. When this happens, an annoying pop-up window comes up saying that:

So you do and get the same error.  What to do?  Here are some ideas:

Reboot the iOS device:

  1. Hold the power and home buttons at the same time until you see the Apple logo appear. 
  2. Try the update again. 

Close the app:

Even though Apple claims that an open app doesn't take up any resources, we cannot find any information about updating an app that's currently open. In any case, close the app by double clicking the home button, find the app in question, and then swipe up to close it. Then try the update again.

If none if the above works, you may want to contact the developer directly.

 

New Mac Malware bypasses Gatekeeper and is non-detectible by most AntiVirus Apps

“We learned recently that macOS malware grew by 744% last year, though most of it fell into the less-worrying category of adware,” ben Lovejoy reports for 9to5Mac. “However, a newly-discovered piece of malware (via Reddit) falls into the ‘seriously nasty’ category – able to spy on all your Internet usage, including use of secure websites.”

“Security researchers at CheckPoint found something they’ve labelled OSX/Dok, which manages to go undetected by Gatekeeper and stops users doing anything on their Mac until they accept a fake OS X update,” Lovejoy reports. “OSX/Dok does rely on a phishing attack as its initial way in. Victims are sent an email claiming to be from a tax office regarding their income tax return, asking them to open an attached zip file for details.”

“But after that, the approach taken by the malware is extremely clever,” Lovejoy reports. “t installs itself as a Login Item called AppStore, which means it automatically runs each time the machine is booted. It then waits for a while before presenting a fake macOS update window.”

Read more in the full article here.

You may have Missed:

Verified by MonsterInsights