[10239] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, September 30, 2014

daemon@ATHENA.MIT.EDU (Monique Buchanan)
Tue Sep 30 09:36:29 2014

Resent-From: ist-security-fyi@mit.edu
From: Monique Buchanan <myeaton@mit.edu>
To: ist-security-fyi <ist-security-fyi@mit.edu>
Date: Tue, 30 Sep 2014 13:34:37 +0000
Message-ID: <68160C2C-5E74-4984-B390-1738BE9148C3@mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============1005405371=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============1005405371==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_68160C2C5E744984B3901738BE9148C3mitedu_"

--_000_68160C2C5E744984B3901738BE9148C3mitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable


In this issue:

1. The ShellShock Bug
2. Event on Oct. 7: Free Coffee and Donut with a Slice of Security
3. The CryptoWall Attack


-------------------------------
1. The ShellShock Bug
-------------------------------

A critical vulnerability in bash Unix shell, nicknamed =93shellshock=94 was=
 reported by the security community last week. It is said to be more seriou=
s than the Heartbleed vulnerability.

Bash is a command language interpreter and is available on almost all non-W=
indows systems, including OS X. Especially vulnerable are web servers that =
are hosting CGI scripts, and certain other network services such as DHCP an=
d FTP, so it=92s imperative that bash is patched on these systems.

If you are an IS&T managed-server hosted customer, your systems were patche=
d on 9/24. When doing a scan of the network, IS&T found only a handful of s=
ystems vulnerable to the bug, which indicates that maintainers patched thei=
r systems quickly.

Please refer to this Knowledge Base article for instructions on patching Re=
d Hat Enterprise and Ubuntu Linux systems: http://kb.mit.edu/confluence/x/7=
wgrCQ. Note that the patch CVE-2014-7169 is the patch to apply (it supersed=
es the earlier patch).

Unfortunately, the patches released by the bash scripting team did not fix =
*all* of the bash problems. See this article on ArsTechnica for more on the=
 situation<http://arstechnica.com/security/2014/09/still-more-vulnerabiliti=
es-in-bash-shellshock-becomes-whack-a-mole/>.

The vulnerability is being actively exploited. It is recommended to be care=
ful of any unusual attachments to emails.

Additional information:


  *   A webcast briefing from the Internet Storm Center (ISC) on how shells=
hock works and what to do about it<https://isc.sans.edu/forums/diary/Webcas=
t+Briefing+Bash+Code+Injection+Vulnerability/18709>
  *   The ISC blog, summarizing the problem<https://isc.sans.edu/forums/dia=
ry/Update+on+CVE-2014-6271+Vulnerability+in+bash+shellshock+/18707>
  *   Direct link to YouTube video of the ISC briefing<https://www.youtube.=
com/watch?v=3DW7GaVyzkCs0>


---------------------------------------------------------------------------=
------------
2. Event on Oct. 7: Free Coffee and Donut with a Slice of Security
---------------------------------------------------------------------------=
------------

Next week Tuesday, October 7, IS&T is hosting a table in W20 from 9:00 unti=
l 11:00 am, in support of National Cyber Security Awareness Month (NCSAM).

Have any security concerns? Want help with securing your computer or smartp=
hone?
IS&T personnel will be on hand to help.

Think you=92re pretty savvy when it comes to phishing or other cyber attack=
s? Test your threat level with our security quiz cards.

And don=92t forget to grab a free coffee and donut.


---------------------------------
3. The CryptoWall Attack
---------------------------------

A form of ransomware, CryptoWall is one of the viruses trying to hit unpatc=
hed machines. Should you fall victim, CryptoWall will encrypt your folders =
and attempt to extort money from you to decrypt/release them. They ask $750=
.

Your best defense against this type of virus is having virus detection soft=
ware, such as Sophos<http://ist.mit.edu/sophos>, installed on your machine.=
 Keep all your software, including browsers, up to date with the latest sec=
urity patches<http://ist.mit.edu/security/patches>.

CyptoWall Indicators<https://msisac.cisecurity.org/daily-tips/cryptowall-in=
dicators.cfm>


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Read all archived Security FYI Newsletter articles and submit comments onli=
ne at http://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D


Monique Buchanan
IT Security Communications Coordinator
Information Systems & Technology (IS&T)
Massachusetts Institute of Technology
http://ist.mit.edu/secure
tel: 617.253.2715




--_000_68160C2C5E744984B3901738BE9148C3mitedu_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <5C2B5952A291DD45B9D2B8DCAAB96965@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;">
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">In this issue:</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">1. The ShellShock Bug</=
div>
<div style=3D"margin: 0px; font-family: Helvetica;">2. Event on Oct. 7: Fre=
e Coffee and Donut with a Slice of Security</div>
<div style=3D"margin: 0px; font-family: Helvetica;">3. The CryptoWall Attac=
k</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">-----------------------=
--------</div>
<div style=3D"margin: 0px; font-family: Helvetica;">1. The ShellShock Bug</=
div>
<div style=3D"margin: 0px; font-family: Helvetica;">-----------------------=
--------</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">A critical vulnerabilit=
y in bash Unix shell, nicknamed =93shellshock=94 was reported by the securi=
ty community last week. It is said to be more serious than the Heartbleed v=
ulnerability.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Bash is a command langu=
age interpreter and is available on almost all non-Windows systems, includi=
ng OS X. Especially vulnerable are web servers that are hosting CGI scripts=
, and certain other network services
 such as DHCP and FTP, so it=92s imperative that bash is patched on these s=
ystems.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">If you are an IS&amp;T =
managed-server hosted customer, your systems were patched on 9/24. When doi=
ng a scan of the network, IS&amp;T found only a handful of systems vulnerab=
le to the bug, which indicates that maintainers
 patched their systems quickly.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Please refer to this Kn=
owledge Base article for instructions on patching Red Hat Enterprise and Ub=
untu Linux systems:
<a href=3D"http://kb.mit.edu/confluence/x/7wgrCQ">http://kb.mit.edu/conflue=
nce/x/7wgrCQ</a><span style=3D"text-decoration: underline ; color: #4787ff"=
>.</span> Note that the patch CVE-2014-7169 is the patch to apply (it super=
sedes the earlier patch).</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Unfortunately, the patc=
hes released by the bash scripting team did not fix *all* of the bash probl=
ems.
<a href=3D"http://arstechnica.com/security/2014/09/still-more-vulnerabiliti=
es-in-bash-shellshock-becomes-whack-a-mole/">
See this article on ArsTechnica for more on the situation</a>.&nbsp;</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">The vulnerability is be=
ing actively exploited. It is recommended to be careful of any unusual atta=
chments to emails.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Additional information:=
&nbsp;</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<ul>
<li style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"https://isc.s=
ans.edu/forums/diary/Webcast&#43;Briefing&#43;Bash&#43;Code&#43;Injection&#=
43;Vulnerability/18709">A webcast briefing from the Internet Storm Center (=
ISC) on how shellshock works and what to do about it</a>
</li><li style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"https://=
isc.sans.edu/forums/diary/Update&#43;on&#43;CVE-2014-6271&#43;Vulnerability=
&#43;in&#43;bash&#43;shellshock&#43;/18707">The ISC blog, summarizing the p=
roblem</a>
</li><li style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"https://=
www.youtube.com/watch?v=3DW7GaVyzkCs0">Direct link to YouTube video of the =
ISC briefing</a>
</li></ul>
<div style=3D"margin: 0px; font-family: Helvetica; color: rgb(71, 135, 255)=
; min-height: 17px;">
<span style=3D"text-decoration: underline"></span><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">-----------------------=
----------------------------------------------------------------</div>
<div style=3D"margin: 0px; font-family: Helvetica;">2. Event on Oct. 7: Fre=
e Coffee and Donut with a Slice of Security</div>
<div style=3D"margin: 0px; font-family: Helvetica;">-----------------------=
----------------------------------------------------------------</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Next week Tuesday, Octo=
ber 7, IS&amp;T is hosting a table in W20 from 9:00 until 11:00 am, in supp=
ort of National Cyber Security Awareness Month (NCSAM).&nbsp;</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Have any security conce=
rns? Want help with securing your computer or smartphone?</div>
<div style=3D"margin: 0px; font-family: Helvetica;">IS&amp;T personnel will=
 be on hand to help.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Think you=92re pretty s=
avvy when it comes to phishing or other cyber attacks? Test your threat lev=
el with our security quiz cards.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">And don=92t forget to g=
rab a free coffee and donut.</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">-----------------------=
----------</div>
<div style=3D"margin: 0px; font-family: Helvetica;">3. The CryptoWall Attac=
k</div>
<div style=3D"margin: 0px; font-family: Helvetica;">-----------------------=
----------</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">A form of ransomware, C=
ryptoWall is one of the viruses trying to hit unpatched machines. Should yo=
u fall victim, CryptoWall will encrypt your folders and attempt to extort m=
oney from you to decrypt/release them.
 They ask $750.&nbsp;</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Your best defense again=
st this type of virus is having virus detection software, such as
<a href=3D"http://ist.mit.edu/sophos">Sophos</a>, installed on your machine=
. Keep all your software, including browsers, up to date with the latest
<a href=3D"http://ist.mit.edu/security/patches">security patches</a>.&nbsp;=
</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica;"><a href=3D"https://msis=
ac.cisecurity.org/daily-tips/cryptowall-indicators.cfm">CyptoWall Indicator=
s</a></div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div style=3D"margin: 0px; font-family: Helvetica; min-height: 17px;"><br>
</div>
<div apple-content-edited=3D"true">
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;">
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;">
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;">
<div style=3D"margin: 0px; font-family: Helvetica;">=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</div>
<div style=3D"margin: 0px; font-family: Helvetica;">Read all archived Secur=
ity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/"><span style=3D"color: rgb(4, =
46, 238);">http://securityfyi.wordpress.com/</span></a>.</div>
<div style=3D"margin: 0px; font-family: Helvetica;">=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</div>
</div>
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; t=
ext-align: start; text-indent: 0px; text-transform: none; white-space: norm=
al; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-w=
rap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-=
space;">
<br>
Monique Buchanan<br>
IT Security Communications Coordinator<br>
Information Systems &amp; Technology (IS&amp;T)<br>
Massachusetts Institute of Technology<br>
<a href=3D"http://ist.mit.edu/secure">http://ist.mit.edu/secure</a><br>
tel: 617.253.2715<br>
<br>
<br>
</div>
</div>
</div>
</div>
<br>
</body>
</html>

--_000_68160C2C5E744984B3901738BE9148C3mitedu_--

--===============1005405371==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1005405371==--

home help back first fref pref prev next nref lref last post