Google Emergency Patches Chrome’s 0-Day

Google responds quick to the actively exploited Chrome zero day bug to shutdown the cyberattacks observed from two threat groups in North Korea.

BleepingComputer – “Emergency Google Chrome update fixes zero-day used in attacks” : https://www.bleepingcomputer.com/news/security/emergency-google-chrome-update-fixes-zero-day-used-in-attacks/

More Network Routers Actively Being Attacked

“Actively exploited bug bypasses authentication on millions of routers” via Sergiu Gatlan | Bleeping Computer

“Threat actors actively exploit a critical authentication bypass vulnerability impacting home routers with Arcadyan firmware to take them over and deploy Mirai botnet malicious payloads.

The vulnerability tracked as CVE-2021-20090 is a critical path traversal vulnerability (rated 9.9/10) in the web interfaces of routers with Arcadyan firmware that could allow unauthenticated remote attackers to bypass”….

More detail here: https://www.bleepingcomputer.com/news/security/actively-exploited-bug-bypasses-authentication-on-millions-of-routers/

Bug hunters asked to probe Microsoft Teams mobile apps, can earn up to $30k – Help Net Security

Bug hunters asked to probe Microsoft Teams mobile apps, can earn up to $30k
— Read on www.helpnetsecurity.com/2021/07/20/bug-hunters-microsoft-teams/

0Day Used Against Orgs via CyberThreat Group

“Hackers used SolarWinds zero-day bug to target US Defense orgs” via Lawrence Abrams | Bleeping Computer

“China-based hackers actively target US defense and software companies using a vulnerability in the SolarWinds Serv-U FTP server.

Today, SolarWinds released a security update for a zero-day vulnerability in Serv-U FTP servers that allow remote code execution when SSH is enabled.

According to SolarWinds, this vulnerability was disclosed to Microsoft, who saw a threat actor actively exploiting the vulnerability to execute commands on vulnerable customer’s devices.”

More detail: https://www.bleepingcomputer.com/news/microsoft/hackers-used-solarwinds-zero-day-bug-to-target-us-defense-orgs/

Microsoft Releases Fix to PrintNightmare

“Out-of-Band (OOB) Security Update available for CVE-2021-34527” via Microsoft Security Response Center

“Today Microsoft released an Out-of-Band (OOB) security update for CVE-2021-34527, which is being discussed externally as PrintNightmare. This is a cumulative update release, so it contains all previous security fixes and should be applied immediately to fully protect your systems. The fix that we released today fully addresses the public vulnerability, and it also includes a new feature that allows customers to implement stronger protections.”

More detail: https://msrc-blog.microsoft.com/2021/07/06/out-of-band-oob-security-update-available-for-cve-2021-34527/

Microsoft Gives Guidance to Mitigate PrintNightmare

“Microsoft shares mitigations for Windows PrintNightmare zero-day bug” via Sergiu Gatlan

“Microsoft has provided mitigation guidance to block attacks on systems vulnerable to exploits targeting the Windows Print Spooler zero-day vulnerability known as PrintNightmare.

This remote code execution (RCE) bug—now tracked as CVE-2021-34527—impacts all versions of Windows per Microsoft, with the company still investigating if the vulnerability is exploitable on all of them.

CVE-2021-34527 allows attackers to take over affected servers via remote code execution with SYSTEM privileges as it enables them to install programs, view, change, or delete data, and create new accounts with full user rights”

For more detail: https://www.bleepingcomputer.com/news/security/microsoft-shares-mitigations-for-windows-printnightmare-zero-day-bug/