skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Newsletter 1 November 2024

Newsletter 1 November 2024

/ 8 min read

📧 Secure Transmission: Your Latest Intel

Welcome to our November 1, 2024 edition! This week, we’re uncovering critical vulnerabilities, innovative security solutions, and notable industry insights impacting the cybersecurity landscape. From new tools to enhance distributed workforce security to the latest breaches revealing significant data exposure, we’ve got the intel you need to stay protected and proactive. Dive in for the top developments and actionable insights to keep your defenses strong and informed!

🛠️ Security Enhancements and New Technologies

🛡️ Zenarmor 1.18 Enhances Security for Distributed Workforces Zenarmor has released version 1.18, introducing significant features to bolster security for distributed and remote work environments. This update includes support for Microsoft Windows platforms, enabling endpoint-level protection without the need for separate firewall hardware. Additionally, Zenconsole now offers centralized management capabilities, allowing organizations to define and manage policies, configurations, and reporting across various Zenarmor instances. These enhancements aim to provide a comprehensive Secure Access Service Edge (SASE) solution, addressing the evolving security needs of modern, distributed workforces.

🔑 nKode introduces icon-based password alternative nKode introduces a unique icon-based alternative to traditional passwords, aiming to improve security and memorability. Users create an nKode by selecting four distinct icons, replacing complex passwords. During login, icons are shuffled to prevent phishing, and nKode utilizes server-side protections, like icon dispersion, to guard against breaches. Upcoming features include multi-factor authentication (MFA) and anti-session hijacking measures. nKode plans to expand its security offerings via partnerships and potentially integrate with mobile apps for enhanced biometrics. Currently in demo, nKode targets both personal and business users for secure, easy logins. https://nkode.tech/

🔍 Zizmor simplifies security analysis for GitHub Actions workflows. This open-source tool, currently in beta, assists developers in identifying and resolving potential security issues in their GitHub Actions CI/CD configurations. Designed with static analysis features, Zizmor helps maintain secure automation workflows in a user-friendly setup. Users can find installation instructions, a quickstart guide, and more detailed usage documentation on the project site. GitHub link

🕳️ Vulnerabilities and Exploits

🚦 Researcher Exposes Vulnerabilities in Traffic Control Systems. A recent investigation by Red Threat Security identified security flaws in the Intelight X-1 traffic controller, exposing how easily these systems can be compromised. The researcher found that the device’s web interface had no authentication by default, allowing unauthorized access to system settings. Despite responsible disclosure attempts, the vendor’s response was dismissive, citing the device’s end-of-life status. This finding has raised concerns over unprotected infrastructure, underscoring the need for security protocols in legacy systems. Read more

🔓 Researcher Exploits Just Eat Takeaway Terminal Vulnerabilities. A security enthusiast acquired a Just Eat Takeaway terminal and uncovered multiple security flaws. By utilizing an NFC card to access the device’s settings, they bypassed activation requirements and gained control over the terminal. The investigation revealed that the terminal operates on an outdated Android version, lacks proper security measures, and contains hardcoded administrative codes. These findings highlight significant security concerns in the device’s design. Read more

🔒 Retrofitting Encrypted Firmware on Lexmark Printers Uncovers Security Risks. In an exploration of Lexmark printer firmware security, a researcher detailed how they bypassed firmware encryption updates and activated backdoor access, despite recent encryption changes by Lexmark. Through reverse engineering, they decrypted firmware components and demonstrated that hardcoded keys allow ongoing access. The findings, shared at industry events, reveal vulnerabilities in legacy firmware encryption methods, raising concerns about secure update practices. Read more

🔐 Keycloak Authentication System Vulnerabilities Exposed. Researchers at HN Security conducted an analysis on Keycloak’s authentication system, uncovering serious flaws in OTP bypass, unauthorized access to metrics and health endpoints, and a race condition vulnerability in the anti-brute force mechanism. The OTP bypass vulnerability allows attackers to circumvent two-factor authentication by exploiting access to default applications. Other issues include unauthorized access to sensitive endpoints and concurrent access flaws, weakening Keycloak’s security defenses. These findings emphasize the need for improved security updates and protocol checks. Read more

🛡️ Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024. During the Pwn2Own 2024 competition in Cork, Ireland, researchers identified a format string vulnerability in the Synology TC500 security camera’s web service. Despite modern security measures like ASLR, PIE, NX, and Full RelRO, the flaw was exploitable due to improper string formatting in HTTP request parsing. The exploitation was challenging due to blind exploitation conditions, payload size limitations, and restricted character sets. The researchers successfully achieved arbitrary code execution by leveraging indirect memory manipulation techniques, highlighting the importance of thorough security assessments even in systems with advanced protections. Read more

🛡️ New Windows Driver Signature Bypass Enables Kernel Rootkit Installations. Researchers have identified a method to downgrade Windows kernel components, effectively bypassing Driver Signature Enforcement (DSE) and allowing the installation of rootkits on fully patched systems. This technique involves manipulating the Windows Update process to introduce outdated, vulnerable components without altering the system’s fully patched status. By replacing critical files like ‘ci.dll’ with unpatched versions, attackers can load unsigned kernel drivers, compromising system security. Microsoft has acknowledged the issue but has not classified it as a vulnerability, citing the need for administrative privileges to execute the attack. Security experts advise vigilance and recommend monitoring for unusual system behavior. Read more

💼 CISOs Overwhelmed by Security Tools Yet Missing Breaches. A recent survey reveals that 44% of Chief Information Security Officers (CISOs) missed data breaches in the past year despite significant investments in security tools. The study highlights that 75% of CISOs are inundated with threat detections from an array of tools, leading to alert fatigue and oversight. Key blind spots include hybrid cloud infrastructures and encrypted data-in-transit, with 80% of CISOs expressing concern over these areas. To address these challenges, 60% plan to consolidate and optimize existing tools in 2025, aiming for enhanced visibility and efficiency in threat detection. Read more

🔓 UnitedHealth Data Breach Exposes Information of Over 100 Million Individuals. In February 2024, UnitedHealth Group’s subsidiary, Change Healthcare, suffered a ransomware attack compromising the personal data of over 100 million people, marking it as the largest healthcare data breach on record. The stolen information includes health insurance details, medical records, billing and payment information, and personal identification numbers. The breach was attributed to the hacker group BlackCat (ALPHV), who exploited a lack of multi-factor authentication on a Citrix remote access service. UnitedHealth paid a $22 million ransom to regain control over the compromised systems. Read more

🔒 Russian Hackers Exploit RDP Files in Phishing Attacks on Government Entities. Microsoft has identified a spear-phishing campaign by the Russian-backed group Midnight Blizzard, targeting government, defense, academic, and NGO sectors globally. The attackers use signed Remote Desktop Protocol (RDP) configuration files embedded in phishing emails to gain unauthorized access to systems, allowing them to steal sensitive data. This method enables control over files, network drives, and authentication mechanisms. Microsoft advises restricting RDP access and implementing robust security measures to mitigate this threat. Read more

**🛠 Tools

  • Authelia v4.38.17 (v4.38.17) | SSO and MFA | Fixes for startup panic, template edge cases, and UI improvements in password reset and WebAuthn views.

  • Authentik v2024.10.0 (v2024.10.0) | Authentication | Enhances MFA toggling, updates Kerberos, social-login support, and improves documentation.

  • Smallstep Certificates v0.28.0 (v0.28.0) | Certificate Authority | Adds SSH user/host controls, Prometheus refactors, and updates for cloud dependencies.

  • Chainloop v0.97.4 (v0.97.4) | Software Supply Chain | Supports custom download filenames, project normalization, and policy enhancements.

  • Chainloop v0.97.5 (v0.97.5) | Software Supply Chain | Adds workflow filtering, project versioning, and fixes policy references.

  • Copacetic v0.9.0 (v0.9.0) | Container Image Patching | Adds Azure Linux 3 support, dependency updates, and documentation improvements.

  • Firezone gateway-1.4.0 (gateway-1.4.0) | Zero Trust Access | Implements security improvements and client updates.

  • Garak v0.10.0 (v0.10.0) | LLM Vulnerability Scanner | Adds new plugins, support for Azure OpenAI, reporting updates, and CLI enhancements.

  • Gitleaks v8.21.2 (v8.21.2) | Secrets Management | Adds support for Octopus Deploy and GitLab tokens, improves AWS entropy and rule accuracy.

  • Rudder Server v1.37.0 (v1.37.0) | Privacy/Security Segment Alternative | Introduces Scylla batch read, improves error handling, and reduces metric cardinality.

  • SecObserve v1.21.0 (v1.21.0) | Vulnerability Management | Introduces license management, UI improvements, and fixes API severity typo.

🚨CISA Advisories and Alerts

🌐 Upcoming Events


Thank you for tuning in to this week’s Secure Transmission! We’re here to keep you informed and protected. If you found this edition helpful, consider sharing it with others who care about cybersecurity. Stay vigilant, and watch for next week’s insights and updates!

Check out what's latest