Security Updates

5 years 3 months ago

January 28 is Data Privacy Day (DPD), an annual effort to promote data privacy awareness and education. This year's DPD events, sponsored by the National Cyber Security Alliance (NCSA), focus around the theme, A New Era in Privacy.

The NCSA Stay Safe Online website will feature a live stream of the Data Privacy Day 2019 - Live From LinkedIn event, which includes presentations on opportunities and challenges and the future of privacy, as well as a TED-style talk with the Amazon Web Services Global principal security architect.

The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), encourages users and administrators to review NCSA's tips on Managing Your Privacy and the following NCCIC tips:

5 years 4 months ago

Caribou Coffee chain announces card breach impacting 239 stores, including the Cedar Falls store

"All customers who used a credit or debit card at one of the affected stores between August 28, 2018, and December 3, 2018, should consider their card details compromised and take precautions such as asking for a card replacement, reviewing credit card reports, and enrolling in identity protection programs. Users can consult the list of impacted stores via the company's data breach notice, posted on its homepage. Caribou Coffee officials said they detected that something was wrong last month, on November 28, when its IT staff was alerted of "unusual activity" on its network via its security monitoring processes."

To read the complete article see: https://www.zdnet.com/article/caribou-coffee-chain-announces-card-breach-impacting-239-stores/
 

5 years 5 months ago

Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use technology in anyway, at work or at home, trust us - you have value to the bad guys. But, you are in luck. You already have the best defense there is against these cyber attacks - you. SANS OUCH!

5 years 5 months ago

An email message with Subject: Request for Input - UNI Branding Effort is being delivered to many faculty, staff, and perhaps student inboxes this week. I have had several conversations with recipients who are concerned about the legitimacy of this message. This message is legitimate.

While the From: address is a non-UNI address, it is the expected address for email originating from our Qualtrics survey tool. Other clues that this is a legitimate message include:

  • A Reply-to: of csbr‌@uni.edu. Additionally, the content in the body of the message discusses contacting CSBR for questions or administrative issues with the survey.
  • The link(s) in the message have a domain of uni.co1.qualtrics.com, the proper domain for Qualtrics surveys administered by UNI.

I understand and greatly appreciate your vigilance regarding this message, especially in the midst of our Phishing Education initiative. Keep up the good work!

5 years 6 months ago


A security flaw in libssh leaves thousands of servers at risk of hijacking.

Excerpt: "The vulnerability allows an attacker to bypass authentication procedures and gain access to a server with an SSH connection enabled without having to enter the password. An attacker can do this by sending the SSH server "SSH2_MSG_USERAUTH_SUCCESS" message instead of the "SSH2_MSG_USERAUTH_REQUEST" message that a server usually expects and which libssh uses as a sign that an authentication procedure needs to initiate. Because of a coding error, when libssh receives the "SSH2_MSG_USERAUTH_SUCCESS" message, it will interpret this as the "authentication has already taken place" and will grant the attacker access to the local server."

Source: Catalin Cimpanu, ZDNet Date 

Published: October 17, 2018 

To read the complete article see:  https://www.zdnet.com/article/security-flaw-in-libssh-leaves-thousands-of-servers-at-risk-of-hijacking/
 

5 years 7 months ago

UNI embarked on a phishing education venture starting last October and continuing through April. Simulated but realistic phishing messages were sent periodically to faculty and staff mailboxes by a contracted vendor. Those that respond to these educational messages received some quick and specific training on recognizing and avoiding future phishing messages. Tips for dealing with phishing messages in general are available at Phishing

Here's a summary of the messages sent throughout the academic year.

5 years 8 months ago

This morning has brought another round of scam emails that purport to be from President Nook, but that are not using his real UNI address. An example address that was used was "drmarknook‌@gmail.com". Personal messages to you from President Nook will come from his normal UNI address, "Mark.Nook‌@uni.edu". Mass messages will be from a different address, usually "president‌@uni-mail.org".

The initial content of this morning's scam message was very short and cryptic:

Are you available now?

A response to that message went to a human and generated a conversation that ends with a request for you to purchase several iTunes gift cards for which reimbursement will made. This is an outright scam. The criminals aren't after your credentials or identity, they just want your money! Recognize the fake message from the beginning, mark it as spam, and delete it.

5 years 8 months ago

Millions of mobile devices from eleven smartphone vendors are vulnerable to attacks carried out using AT commands, a team of security researchers has discovered.

AT (ATtention) commands, or the Hayes command set, is a collection of short-string commands developed in the early 1980s that were designed to be transmitted via phone lines and control modems. Different AT command strings can be merged together to tell a modem to dial, hang up, or change connection parameters.

The story continues at https://www.bleepingcomputer.com/news/security/smartphones-from-11-oems-vulnerable-to-attacks-via-hidden-at-commands/

5 years 8 months ago

Back to School: COBALT DICKENS Targets Universities

Despite indictments in March 2018, the Iranian threat group is likely responsible for a large-scale phishing campaign that targeted university credentials using the same spoofing tactics as previous attacks. Continue the story at https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities

5 years 8 months ago

Given our Adobe licenses, there may not be a lot of use of ghostscript on campus, but if you're using it anyway, there are a number of vulnerabilities identified yesterday.  See https://www.kb.cert.org/vuls/id/332928 for details.  From the CERT page:

Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary commands on a vulnerable system.

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub