Hello All. Most of you know who Malwarebytes is, endpoint product used to protect against malware. Many in the industry say is one of the best consumer products our there when compared to others like McAfee or Norton. In some unfortunate news, it looks like they may have suffered a cyber-breach similar in nature to that of the SolarWinds attack.

“Malwarebytes said its intrusion is not related to the SolarWinds supply chain incident since the company doesn’t use any of SolarWinds software in its internal network. Instead, the security firm said the hackers breached its internal systems by exploiting an Azure Active Directory weakness and abusing malicious Office 365 applications. Malwarebytes said it learned of the intrusion from the Microsoft Security Response Center (MSRC) on December 15. At the time, Microsoft was auditing its Office 365 and Azure infrastructures for signs of malicious apps created by the SolarWinds hackers, also known in cyber-security circles as UNC2452 or Dark Halo.”

“After an extensive investigation, we determined the attacker only gained access to a limited subset of internal company emails,” said Marcin Kleczynski, Malwarebytes co-founder and CEO.

Given the same threat actor that breached SolarWinds moved to weaponize the company’s software by inserting the Sunburst malware into some updates for the SolarWinds Orion platform, Malwarebytes has indicated that they have also performed a very thorough audit of all their products and associated source code, searching for any signs of a similar compromise or past supply chain attack.

“Our internal systems showed no evidence of unauthorized access or compromise in any on-premises and production environments. Our software remains safe to use,” Kleczynski added.

To read the statement from Marcin Kleczynski – visit http://bit.ly/2M8GVO0

Read more

Hello All. Recall all the days of having to deal with Adobe Flash-based attacks? Arbitrary code execution flaws? Users not always updating their devices to the most recent version of software right away, leaving them susceptible to the thousands of known vulnerabilities. How about exploit kits that took advantage of vulnerabilities in Flash – for example, a hacker may decide to use an exploit kit delivered by website redirect. That means, when a user clicks on a website link in their browser, an embedded script redirects the user to a hacker’s landing page that contains the exploit kit. Remember a few years ago when an unpatched bug in Adobe Flash was being targeted by the Angler Exploit Kit – causing all kinds of ransomware hits?

Well, I am happy to say we can put all of that behind us. Adobe Flash Player is officially non-functional, and it’s time to uninstall the program once and for all. In a coordinated announcement from Adobe, Apple, Microsoft, Google, and Mozilla in July 2017. we learned that Adobe Flash Player would officially reach the end of life on December 31st, 2020.

When Adobe released their final version of Flash Player in December, they also announced that recent versions of the software include a kill switch that prevents Flash Player from loading Flash content starting on January 12th, 2021.

It is now January 14th, and as Flash content no longer runs in Flash Player, it is time to uninstall the software. Now, when you try to open Flash content, which most browsers automatically block by default, Flash player will display the following icon that opens the when you click on it.

Read more

Hello All. US President-Elect Joe Biden has confirmed that cybersecurity is a priority for the incoming administration with the addition of Anne Neuberger, the NSA’s Director of Cybersecurity as its the new Whitehouse Cybersecurity Coordinator and member of the National Security Council (NSC).

Given the recent SolarWinds breach and the steady increase or foreign cyberattacks from nation states such as Russia and China, I think Biden, or at least his advisors understand that this is an important seat at the NSC table.  For those of you who may not remember, it was in 2018 when then National Security Advisor, John Bolton eliminated the role filled by Rob Joyce, former Tailored Access Operations unit with the NSA. Bolton said the post was no longer considered necessary because lower-level officials had already made cybersecurity issues a “core function” of the president’s national security team. Most of us in the industry were baffled by this move.

I know about the importance of the role well enough having heard numerous stories from my good friend, the late Howard Schmidt who served as the inaugural WH cybersecurity coordinator for President George W. Bush and returned to the role under President Barak Obama. He mentioned how critical the role was in advising the President via the NSC.

The new appointee, Anne Neuberger, joined the NSA more than a decade ago and has been serving as the agency’s director of cybersecurity since 2019, will be named deputy national security adviser for cybersecurity in the incoming NSC. She will be responsible for coordinating the fed’s cybersecurity efforts. She will most probably focus on responding to the attacks campaign by Russian hackers in 2020. She is a perfect candidate for the role. She was the NSA’s first director of cybersecurity, responsible for managing intelligence information sharing between the NSA and other government agencies, as well as the private sector, about threats to country’s critical infrastructure.

Read more