{"id":54110,"date":"2022-05-31T20:38:24","date_gmt":"2022-05-31T16:38:24","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=54110"},"modified":"2022-06-03T14:21:41","modified_gmt":"2022-06-03T10:21:41","slug":"news-you-mightve-missed-may-2022","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-may-2022\/","title":{"rendered":"News You Might&#8217;ve Missed. May 2022"},"content":{"rendered":"<p>What's new this month in the news for MSPs? Google Cloud zeroing in on cloud governance, zero trust, open source software, etc.; 5 new critical vulnerabilities in enterprise network switches; Trend Micro finds Linux-based ransomware \u201dCheerscrypt\u201d targeting VMware ESXi servers; vulnerabilities in VMware and F5 products warning from CISA; and more.<!--more--><\/p>\n<p>Let's see what it's all about.<\/p>\n<h2>Google Cloud Zeroing in on Cloud Governance, Zero Trust, Open Source Software, etc.<\/h2>\n<p>Google says it\u2019s zooming in on its \u201cinvisible security\u201d concept with an offering of new security services.<\/p>\n<p>They want to encourage the adoption of zero-trust architecture by enterprise clients to help to secure software supply chains, transform security operations and boost cloud governance overall.<\/p>\n<p>Since many customers of its cloud services remain reliant on open-source software for their infrastructures and critical apps, Google says that\u2019s their weakest link, where patching is far behind the vulnerabilities that continue to appear in rapid succession.<\/p>\n<p>What\u2019s worse is that cybercriminals are increasing their attacks because they realize this. According to Sonatype Inc. <a href=\"https:\/\/www.sonatype.com\/hubfs\/Q3%202021-State%20of%20the%20Software%20Supply%20Chain-Report\/SSSC-Report-2021_0913_PM_2.pdf?hsLang=en-us\" target=\"_blank\" rel=\"noopener noreferrer\">in a recent report<\/a>, cyberattacks against open-source software suppliers increased by over 650% over the last year.<\/p>\n<p>At the Google Cloud Summit, Google Cloud announced the launch of the Assured Open Source Software service (Assured OSS) to rebuild the confidence of its subscribers.<\/p>\n<p>Assured OSS lets Google Cloud subscribers include the same OSS packages that Google developers leverage in their workflows. This service will enable businesses to use open-source software and not need to develop packages or operate and maintain the complex processes necessary to handle dependencies securely.<\/p>\n<p>What\u2019s more, the OSS packages are frequently analyzed, scanned, and \u201cfuzz-tested\u201d for vulnerabilities. Google then signs them, and they are distributed from a protected and secured artifact with Google. This process does the heavy lifting for each business when securing the software supply chain.<br \/>\nTo further its concept of zero-trust security, Google says it\u2019s expanding its Beyond Enterprise services with a new solution it\u2019s dubbed Beyond Enterprise Essentials. This service is aimed at helping businesses zero-trust their architectures with ease. After implementing it, companies will gain context-aware access controls for SaaS apps, URL filtering, and threat and data protection directly included in the Google Chrome browser.<\/p>\n<p>Google also announced the launch of its Security Foundation service and updates to the Security Command Center. It\u2019s targeting two pain points for developers using APIs: misconfigured application programming interfaces and \u201cbad-bots\u201d detection responsible for malicious API calls. Google is launching the public preview of Apigee Advanced API Security.<\/p>\n<h2>5 New Critical Vulnerabilities in Enterprise Network Switches<\/h2>\n<p>Armis Inc. has uncovered five critical vulnerabilities when implementing TLS in the network switches used by millions of businesses. The vulnerability, dubbed TLStorm 2.0, is a sequel to three vulnerabilities <a href=\"https:\/\/siliconangle.com\/2022\/03\/08\/apc-smart-ups-vulnerabilities-expose-millions-businesses-hacking\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovered in APC Smart-UPS<\/a> by Armis last year and stems from a shared design flaw in the devices.<\/p>\n<p>In the original TLStorm, attackers were able to gain control of Smart-UPS devices from the internet and required no user interaction. The UPS overloaded and destroyed itself and eventually burned out in a cloud of smoke. The misuse of the NanoSSL TLS Library by Mocana is the cause of these vulnerabilities.<\/p>\n<p>So far, Armis researchers have identified dozens of devices using the Mocana NanoSSL TLS Library, including those from Avaya Inc. and Aruba Networks, owned by Hewlett-Packard Enterprise Co. While network switches differ from UPS devices in how they function and the levels of trust in the network, the TLS issues in their implementation still allow for devastating results.<\/p>\n<p>What\u2019s more, the vulnerabilities from TLStorm 2.0 can give an attacker total control of the network switches found in hospitals, airports, hotels, and many other organizations globally. The potential exploits due to the vulnerabilities include possibly spreading to other devices by changing switch behavior, data exfiltration of sensitive or private information of corporate network traffic from the internal network to the public internet, and \u201ccaptive portal\u201d escape.<\/p>\n<h2>Trend Micro Finds Linux-Based Ransomware \u201dCheerscrypt\u201d Targeting VMware ESXi Servers<\/h2>\n<p>Linux-based ransomware dubbed \u201cCheerscrypt\u201d targets VMware Inc. by using the ESXi hypervisor they developed to deploy virtual PCs, <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/e\/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html\" target=\"_blank\" rel=\"noopener noreferrer\">say researchers at Trend Micro Inc<\/a>.<\/p>\n<p>The ransomware shares some similarities with other ransomware groups like Hive, LockBit, and RansomEXX that have targeted ESXi servers before. Cheerscrypt ransomware encrypts all VMware-related files. Its name is derived from the ransomware\u2019s activities.<\/p>\n<p>After it gets into an ESXi server, it will search for all .vmdk, .log, .vswp, .vmem, and .vmsn extension files connected to ESXi snapshots, log files, paging files, swap files and virtual disks. Before encryption, it adds \u201c.Cheers\u201d to the end of the file names.<\/p>\n<p>The researchers say Cheerscrypt ransomware is a double-tap type of ransomware. The group behind it not only demands payment for the decryptor but threatens to share the stolen files if the victim doesn\u2019t pay the ransom.<\/p>\n<p>Researchers say a proactive and robust security profile is necessary to maintain cybersecurity defenses solid against these types of threats. It is wise to adopt stringent best practices and set up security frameworks that keep pace with modern ransomware families.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE WHITEPAPER<\/div>\n<div class=\"call-to-action__title\">The Value of Backup in Ransomware Protection Strategy<\/div>\n<div class=\"call-to-action__text\">What your ransomware protection strategy should look like? Learn in this whitepaper:<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-fdf288ef-642b-4286-87a6-2299b8ff9a76\" data-portal=\"5442029\" data-id=\"fdf288ef-642b-4286-87a6-2299b8ff9a76\"><span class=\"hs-cta-node hs-cta-fdf288ef-642b-4286-87a6-2299b8ff9a76\" id=\"hs-cta-fdf288ef-642b-4286-87a6-2299b8ff9a76\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/fdf288ef-642b-4286-87a6-2299b8ff9a76\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-fdf288ef-642b-4286-87a6-2299b8ff9a76\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/fdf288ef-642b-4286-87a6-2299b8ff9a76.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/04\/Value-of-backup-in-ransomware-protection.png\" alt=\"Ransomware WP icon\" \/><\/div>\n<\/div>\n<h2>Vulnerabilities in VMware and F5 Products Warning from CISA<\/h2>\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings on five software vulnerabilities expected to affect many businesses. They found four of these in VMware Inc. products, and they discovered the fifth in an F5 load balancer.<\/p>\n<p>Patches from VMware came out on April 6 for two of the vulnerabilities in CVE 2022-22954 and CVE 2022-22960. VMware\u2019s One Access, vRealize Automation, Identity Manager, vRealize Suite Lifecycle Manager, and VMware Cloud Foundation products are affected.<\/p>\n<p>According to the alert published by CISA, the cybercriminals reverse-engineered VMware\u2019s April 6 patch in only 48 hours. They then began attacking vulnerable networks. Systems with vulnerabilities are susceptible to many types of attacks, and these hackers can run malicious scripts on the affected devices and get admin access and root access.<\/p>\n<p>Independently of this warning, CISA issued an <a href=\"https:\/\/www.cisa.gov\/emergency-directive-22-03\" target=\"_blank\" rel=\"noopener noreferrer\">emergency directive<\/a> on two newer vulnerabilities found in identical VMware products. They are tracked as CVE-2022-22972 and CVE-2022-22973.<\/p>\n<p>CISA released a <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-138a\" target=\"_blank\" rel=\"noopener noreferrer\">fifth security vulnerability alert<\/a> that affects BIG-IP, a load balancer from F5 used by organizations to manage network traffic. They discovered that specific versions of the load balancer contain a vulnerability tracked as CVE-2022-1388.<\/p>\n<p>On May 4th, F5 released a patch for the vulnerability. Nevertheless, CISA states in the alert that threat actors publicly released proof-of-concept code that demonstrates how hackers can use the weakness and launch cyberattacks. CISA also warned that threat actors are already targeting affected systems.<\/p>\n<p>CISA and the Multi-State Information Sharing and Analysis Center expect widespread attacks that target affected systems soon. Agency officials \u201cstrongly urge\u201d businesses to secure vulnerable devices.<\/p>\n<h2>Cado Labs Says Denonia Malware Is Going After AWS Lambda Environments<\/h2>\n<p>Security researchers have uncovered a new malware variant seen targeting AWS Lambda. In May, Cado Security published their research findings about Denonia, a malware that threat actors use in cyberattacks targeted against Lambda.<\/p>\n<p>Businesses use Lambda, a scalable computer service from AWS (Amazon Web Services), to run code, for OS and server maintenance, operating many backend services, and logging.<\/p>\n<p><a href=\"https:\/\/www.cadosecurity.com\/cado-discovers-denonia-the-first-malware-specifically-targeting-lambda\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cado Security says<\/a> that with the advent of this new malware strain, the cloud service used by many small and medium businesses (SMBs) globally is in jeopardy of being infected by it. The malware should not be confused with Lambda Ransomware, as the code used is written in the Go programming language and is completely different, despite having the file name \u201cpython.\u201d<\/p>\n<p>They took the name \u201cDenonia\u201d for the malware based on the site it connects to and shares data with \u2013 gw.denonia.xyz.<\/p>\n<p>The sample the researchers conducted dynamic analysis on revealed that DoH (DNS over HTTPS) is used, rather than the traditional method of DNS. The new process encrypts the DNS queries to send out inquiries that appear as typical HTTPS network traffic to DNS over HTTPS resolvers.<\/p>\n<p>While researchers say the first sample seemed innocuous because it only runs software for cryptomining, it does indicate that cyberattackers are turning to cloud-specific knowledge, intending to exploit cloud environments. It sets the stage for future, much more malicious attacks.<br \/>\nA second sample has since been added to VirusTotal.<\/p>\n<h2>NAS Customers Warned by QNAP of New Deadbolt Ransomware Attacks<\/h2>\n<p>The network-attached storage (NAS) manufacturer QNAP, based in Taiwan, warned of a new onslaught of cyberattacks that push payloads for Deadbolt ransomware and urged customers to take steps to secure their devices.<\/p>\n<p>Some of the steps suggested by QNAP included updating public-facing devices to the latest software version. The update will help to protect them from remote access over the internet.<\/p>\n<p>QNAP\u2019s PSIRT (Product Security Incident Response Team) says the <a href=\"https:\/\/www.qnap.com\/en\/security-news\/2022\/take-immediate-actions-to-secure-qnap-nas-and-update-qts-to-the-latest-available-version\" target=\"_blank\" rel=\"noopener noreferrer\">attacks target NAS devices using QTS 4.4.1 and QTS 4.3.6<\/a> on the TS-X53 and TS-X51 series.<\/p>\n<p>The new warning comes on the heels of another customer advisory posted in January that urged those with public-facing devices to:<\/p>\n<ul>\n<li>Turn off the Port Forwarding function of the router<\/li>\n<li>Turn off the UPnP function of the QNAP NAS<\/li>\n<\/ul>\n<p>The manufacturer also gave detailed instructions that showed users how to turn off Telnet and SSH connections, change the system port number, change device passwords and turn on account access and IP protection.<\/p>\n<p>In April, customers of QNAP were warned to turn off UPnP (Universal Plug and Play) and port forwarding to stop exposure to internet attacks.<\/p>\n<p>Should customers need access to their NAS devices (with no direct access to the internet), they can turn on their router\u2019s VPN feature, which will allow them to use the QuWan SD-WAN or QVPN Service app solution.<\/p>\n<p>In late January, researchers first noticed Deadbolt ransomware attacks against QNAP devices. The ransomware steals the login page of the device and displays a message that reads, \"WARNING: Your files have been locked by DeadBolt\" in its place.<\/p>\n<p>Michael Gillespie, a ransomware expert, offers a Windows-based decryptor for free to help victims decrypt their files without the executable from the ransomware. Still, QNAP owners must pay the ransom if hit by Deadbolt ransomware to get a valid decryptor.<\/p>\n<h2>Microsoft Says It Mitigated Vulnerability in Third-Party Azure Synapse Data Connector<\/h2>\n<p><a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/09\/vulnerability-mitigated-in-the-third-party-data-connector-used-in-azure-synapse-pipelines-and-azure-data-factory-cve-2022-29972\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft mitigated<\/a> an Azure Synapse and Azure Database Connectivity (ODBC) pipeline vulnerability. Microsoft says it was specific to the third-party ODBC driver that customers use to link to the Azure Data Factory Integration Runtime (IR) and Amazon Redshift in Azure Synapse pipelines. On the whole, it did not impact Azure Synapse.<\/p>\n<p>This weakness could have allowed the execution of remote commands throughout the IR infrastructure by an attacker that was not limited to a single customer\u2019s tenant.<\/p>\n<p>Subsequently, to determine if there were any cases of abuse, Microsoft conducted a thorough internal investigation. Orca Security, the company that reported the vulnerability, was the only activity that was identified. No evidence of malicious activity or misuse was found during the investigation.\u202fThe vulnerability was mitigated on April 15, 2022.<\/p>\n<h2>That's a Wrap for News You Might've Missed<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next month for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this month in the news for MSPs? Google Cloud zeroing in on cloud governance, zero trust, open source software, etc.; 5 new critical vulnerabilities in enterprise network switches; Trend Micro finds Linux-based ransomware \u201dCheerscrypt\u201d targeting VMware ESXi servers; vulnerabilities in VMware and F5 products warning from CISA; and more.<\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-54110","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/54110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=54110"}],"version-history":[{"count":5,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/54110\/revisions"}],"predecessor-version":[{"id":54169,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/54110\/revisions\/54169"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=54110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=54110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=54110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}