this week in security — november 29 edition
|MC_PREVIEW_TEXT|
~this week in security~ a cybersecurity newsletter by @zackwhittaker (https://twitter.com/zackwhittaker)
volume 3, issue 46
View this email in your browser (|ARCHIVE|)
~ ~ This week’s newsletter is shorter than usual because of the Thanksgiving holiday in the United States. We’ll be back to our usual full steam next week when there’s more news to share. ~ ~
** THIS WEEK, TL;DR
This Bluetooth attack can steal a Tesla Model X in minutes (https://www.wired.com/story/tesla-model-x-hack-bluetooth/) Wired ($): Security researcher Lennert Wouters found a bug in the Bluetooth keyless fobs used to unlock Tesla Model X cars that could be exploited to hijack the car and drive away. The attack involves grabbing a Tesla’s identification number (visible from the car’s dashboard by looking through the window) and using $300 worth of hardware that can extract a radio code from a victim’s keyfob to unlock the car door. Another vulnerability let the researcher pair the cloned keyfob to the car, allowing him to drive off after just a minute’s work. Tesla is still reportedly rolling out a fix, so Wouters hasn’t published the exploit code yet. Wired does a great job (as usual) of breaking down how the bug works. More: ZDNet (https://www.zdnet.com/article/tesla-model-x-hacked-and-stolen-in-minutes-using-new-key-fob-hack/) | IMEC (https://www.imec-int.com/en/press/belgian-security-researchers-ku-leuven-and-imec-demonstrate-serious-flaws-tesla-model-x) Suspected North Korean hackers targeted COVID vaccine maker AstraZeneca (https://www.reuters.com/article/us-healthcare-coronavirus-astrazeneca-no/exclusive-suspected-north-korean-hackers-targeted-covid-vaccine-maker-astrazeneca-sources-idUSKBN2871A2) Reuters: North Korean hackers tried to break into the systems of British drugmaker AstraZeneca in the past few weeks, according to sources speaking to Reuters, as the company continues its push to deploy its COVID-19 vaccine. The attackers used LinkedIn and WhatsApp to send spoofed job offers laced with malware. The efforts were not successful. It’s the latest attempt by North Korea, which only earlier this month was blamed for trying to steal (https://techcrunch.com/2020/11/13/microsoft-russia-north-korea-hackers-coronavirus-vaccine/) vaccine research. More: Microsoft (https://blogs.microsoft.com/on-the-issues/2020/11/13/health-care-cyberattacks-covid-19-paris-peace-forum/?2020-11-12) | @jc_stubbs (https://twitter.com/jc_stubbs/status/1332292567631847424)
A bug allowed hackers to get anyone’s email address on Xbox Live (https://www.vice.com/en/article/m7ag44/bug-allowed-hackers-to-get-anyones-email-address-on-xbox-live) Motherboard: Microsoft has now patched a bug that allowed hackers to reveal the email address used to register any Xbox gamertag. Initially the bug wasn’t serious enough for Microsoft to fix. But as noted by Motherboard, it was feared that the bug could be used to dox or harass gamers, which has led to fatal “swatting” incidents (https://www.vice.com/en/article/gywjv7/fatal-swatting-results-in-felony-charges-for-gamer-but-not-cop-who-pulled-trigger) . Background: Vice News (https://www.vice.com/en/article/gywjv7/fatal-swatting-results-in-felony-charges-for-gamer-but-not-cop-who-pulled-trigger)
U.K. networks breaking new law face big fines (https://www.bbc.com/news/technology-55044182) BBC News: A new security law unveiled this week in the U.K. would allow the government to fine telecoms giants up to 10% of their global revenue if they fail to tighten up their security. The bill, if passed, would also ban Chinese telecoms giant Huawei from involvement in the country’s 5G network. It’s part of a wider effort to improve the country’s national security by instructing telecom companies how they use “high risk” vendors in their networks. The U.K. is one of several countries that fears Huawei’s links to China’s military because of the perceived risk that the company could be compelled to spy for the Chinese government. More: Quartz (https://qz.com/1938635/uk-huawei-ban-could-be-implemented-earlier-than-planned/)
Networking giant Belden says hackers accessed data on employees, business partners (https://www.cyberscoop.com/belden-cable-networking-hackers-employees/) Cyberscoop: Belden, which manufactures networking and industrial cables, said an attacker broke in and stole information on current and former employees, as well as its business partners. The company’s statement (https://investor.belden.com/news-releases/news-details/2020/Belden-Responds-to-Data-Incident-Notifies-Impacted-Current-and-Former-Employees-Business-Partners/default.aspx) didn’t say how many people’s information was compromised, but warned it may include bank account information and Social Security numbers. Belden also owns Tripwire, which makes data integrity software, which it bought for $710 million in 2014. More: Belden (https://investor.belden.com/news-releases/news-details/2020/Belden-Responds-to-Data-Incident-Notifies-Impacted-Current-and-Former-Employees-Business-Partners/default.aspx) ~ ~ SUPPORT THIS NEWSLETTER
Thank you to everyone who reads this newsletter! If you can spare $1/month (or more for perks! (https://www.patreon.com/posts/mugs-are-on-way-32666051) ), it helps to maintain its upkeep. You can contribute to the Patreon (https://www.patreon.com/thisweekinsecurity) or send a one-time donation via PayPal (http://paypal.me/thisweekinsecurity) or Venmo (https://mcusercontent.com/e1ad6038c994abec17dafb116/images/9686ed69-9c8a-4787-9b13-758569be85e4.png) . ~ ~
** THE STUFF YOU MIGHT’VE MISSED
Manchester United silent over cyberattack (https://www.bbc.com/sport/football/55094962) BBC Sport: Manchester United, one of the most famous soccer clubs in the world, has confirmed (https://www.businesswire.com/news/home/20201120005752/en/) a cyberattack that knocked much of its systems offline. It’s believed to be a ransomware attack, but the club has refused to say if it’s received a ransom of “millions” of British pounds as reported in some of the U.K. press. This will be one to watch, especially if the ransomware exfiltrated data (as many do), given the potential financial penalties (no pun intended) under GDPR.
COVIDSafe data ‘incidentally’ collected by Australian intelligence agencies (https://www.itnews.com.au/news/covidsafe-data-incidentally-collected-by-intelligence-agencies-in-first-six-months-558129) ITNews: The Australian intelligence community’s watchdog confirmed that the nation’s spy agencies “incidentally” collected data from the country’s COVIDSafe contact tracing app, but said the data was not decrypted, accessed or used. This particular app uses Bluetooth to contact trace, but requires Australians to submit some personal information, like their name and address, in order for health authorities to reach out in the event of a positive COVID-19 test. This is precisely what some people were afraid of: governments acquiring COVID-19 app data (even if the information wasn’t used).
U.S. Fertility says patient data was stolen in a ransomware attack (https://techcrunch.com/2020/11/26/us-fertility-ransomware-attack/) TechCrunch: One of the largest networks of fertility clinics in the U.S. has been hit by data-stealing ransomware. The company has refused to say specifically what data was stolen beyond names, addresses, in some cases Social Security numbers, but admitted that protected health information may have been taken. The fear is that the ransomware operators may have taken health records and other sensitive medical information. U.S. Fertility has 55 locations across the U.S.(Disclosure: I wrote this story.) ~ ~
** THE HAPPY CORNER
Right, onto the fun stuff.
@gabsmashh (https://twitter.com/gabsmashh) has a rolling tweet thread (https://twitter.com/gabsmashh/status/1329052951781011456) of Black Friday and Cyber Monday deals (as in past years). There are a ton of deals in here, from laptops to subscriptions. Go check them out. (Most deals are online because of the pandemic.)
And, enjoy this (https://twitter.com/lunasorcery/status/1331765371754450945?s=21) blast from the past. If you want to nominate some good news from the week, feel free to reach out (mailto:this@weekinsecurity.com?subject=Good%20news%20for%20your%20newsletter) . ~ ~
** THIS WEEK’S CYBER CAT
This is Tiger, who featured in the early days of the newsletter, and I’m thrilled to welcome Tiger back. A big thanks to Shanni (https://twitter.com/Enigma_Rosa) for the submission! You can send in your cyber cats (mailto:this@weekinsecurity.com?subject=Cyber%20Cat%20submission&body=Please%20include%20a%20JPG%20of%20your%20cyber%20cat%2C%20their%20name%2C%20and%20also%20your%20name%20and%20Twitter%20handle%20if%20you%20want%20credit.) here. They’re featured first come, first serve. ~ ~
** SUGGESTION BOX
That’s all for this week (a very short one). I’ll be back next Sunday with the usual goods. If you have any feedback please drop it in the suggestion box (https://docs.google.com/forms/d/e/1FAIpQLSebkpf8z8TvMJoixuSzmrR-CTLcOv_ufF7voso1HZBI_f5zrw/viewform) . See you in a week!
============================================================ |IFNOT:ARCHIVE_PAGE| |LIST:DESCRIPTION|
Our mailing address is: |LIST_ADDRESS| |END:IF| You can update your preferences (|UPDATE_PROFILE|) or unsubscribe from this list (|UNSUB|) .
~this week in security~ does not track email opens or link clicks.