Biweekly Threat Report
New attacks use Windows security bypass zero-day to drop malware
S3crets Scanner: An Open-source tool that scans AWS S3 Buckets for Secrets
Amazon S3 is commonly used by companies to store data, services, and software in buckets. However, a lot of companies fail to properly secure their S3 buckets which has resulted in data exposure, potentially placing sensitive information in the hands of an adversary or competitor.
Eilon Harel, the creator of this tool, realised that there were no available automated tools that were capable of scanning accidental data leaks. As a result, he created S3crets Scanner. It is capable of listing bucket content via API queries, downloading the relevant textual files, checking for exposed textual files, forwarding results to SIEM, canning content for secrets and using CSPM to get a list of public buckets.
This tool will only scan buckets which have “BlockPublicAcls”,” BlockPublicPolicy”,” IgnorePublicAcls”, and “RestrictPublicBuckets” configurations set to False.
A leaked Amazon Prime video server exposed users' viewing habits
An unprotected Elasticsearch database dubbed Sauron was found by a security researcher Anurag Send, the database was stored on an internal Amazon server and contained Prime Video viewing habits. The server was left without any password protection, meaning anyone with the IP could connect and view any data stored within.
The data exposed contained 215 million records of pseudonymized viewing data. Including the names of movies or shows, the device used for streaming the content, and similar internal data such as subscription information and network quality. Thankfully this data cannot be used to identify the customers by name.
LockBit 3.0 gang claims to have stolen data from Thales
Thales Group is a French multinational company that designs, develops and manufactures electrical systems as well as devices and equipment for the aerospace, defence, transportation and security sectors.
The French defence and technology group Thales confirmed to be aware that the ransomware group LockBit 3.0 claimed to have stolen some of its data. Thales confirmed it had not received any direct ransom notification, the company confirms it has launched an investigation into the alleged security breach, and they have also notified the French ANSSI national cyber security agency.
Microsoft Patch Tuesday, November 2022 fixes 6 exploited zero-day
This month's patch Tuesday fixes six actively exploited zero-day vulnerabilities, with one being publicly disclosed. Exploits are classified as zero-day by Microsoft if it is publicly disclosed or actively exploited with no official fix available.
The Six are as follows:
The agency pointed out that is scanning the Internet using standard and freely available network tools running within a dedicated cloud-hosted environment. The probes are launched by the two IP addresses:
New attacks use Windows security bypass zero-day to drop malware
Blog post ~ 6 cyber security threats that are overlooked by businesses
81% Increase in Large-Volume DDoS Attacks