Mining sensitive information from Google Groups

Google Groups is a service from Google that provides discussion groups for people sharing common interests. By default, Google Groups are set to private; there have been a number of instances, however, where G Suite Administrators have accidentally shared sensitive information as a result of misconfigured Google Groups privacy settings. Google has published a G Suite update here.

According to a recent research by Kenna Security, thousands of organizations seem to be inadvertently leaking internal or customer information. Examples of real e-mails found during the research are past due invoices, password recovery information and GitHub credentials.

Read more about it here.

Mining passwords from public Trello boards

Cybersecurity enthusiast Kushagra Pathak discovered a vulnerability in the Trello web management, allowing to mine credentials from doznes of public Trello boards with simple Google queries.

Trello is the project collaboration tool for enterprise and personal use. By default, Trello boards are set to either private or team-visible only. That doesn’t stop users from manually sharing personal boards that include confidential information, which may later by indexed by search engines. The credentials include usernames, passwords, API keys and more.

User should never store credentials on public boards.

Google search on Trello
Google search on Trello

Read more about it here.

Hackers stole Las Vegas casino high-roller database via its fish tank

Hackers once stole Las Vegas casino high-roller database via its fish tank, said Nicole Eagan, the CEO of cyber defense company Darktrace, on April 12, 2018, at the WSJ CEO Council Conference in London.

The hackers were able to breach the thermostat in the fish tank, which was used to control the temperature and quality of the water remotely. They then found the high-roller database, and then pulled that back across the network, out the thermostat, and up to the cloud. The name of the casino wasn’t revealed.

Hackers are increasingly targeting “internet of things” (IOT) devices to find their way into corporate networks.

Read more about it here.

Under Armour says 150 million MyFitnessPal accounts hacked

On March 29, 2018, Under Armour announced that about 150 million accounts on its popular health app MyFitnessPal were hacked in February 2018. The affected data includes usernames, e-mail addresses, and hashed passwords. The company doesn’t collect Social Security numbers or driver’s license information, and credit card data is collected and stored separately. The company recommended that all users change their passwords.

For most users, the company uses the hash function “bcrypt” to convert all passwords into a hard-to-crack hash. However, some of the users had their password hashed using a less secure hash function called “SHA-1”.

The company recommended that all users change their passwords.

The root cause for the data breach wasn’t immediately disclosed.

Read more about it here.

15 year old hacked Ledger crypto wallet

15 year old security researcher Saleem Rashid discovered a flaw in cryptocurrency hardware wallets made by Ledger, a French company whose popular products are designed to physically safeguard public and private keys used to receive or spend the user’s cryptocurrencies.

The root cause is that the Ledger devices use a secure processor chip and a non-secure microcontroller chip. An attacker could compromise the insecure processor.

Ledger released a patch on March 6, 2018 to address vulnerability, and Eric Larchevêque, Ledger’s CEO, stated that the company hadn’t received any reports of hackers actually accessing the crypto keys.

Read more about it here.

GitHub survives the biggest ever DDoS attack

On February 28, 2018, popular source code hosting web site GitHub was hit by the largest-ever distributed denial of service (DDoS) attack, that peaked at 1.35 Tbps. The attack abused servers running Memcached, an open source distributed memory object caching system. The attack was an amplification attack, where the attacker sends a request of a few bytes to the target server, causing the server to respond with a much larger response, up to 51,200 times larger.

The Github website is protected by the anti-DDoS service provided Akamai.

Read more about it here.

PayPal issue allows disclosure of account balance and recent transactions

A recently discovered PayPal issue allows anyone to reveal the last four digits of the payment method, the account balance and recent transactions. This vulnerability was reported to PayPal’s bug bounty program, where it was classified as being out of scope. The issue still exists as of February 25, 2018.

All the attacker needs to know is the e-mail address and phone number linked to the account. The attacker would then visit the Forgot Password page on PayPal’s web site, and enter the e-mail address of the target account. The web site would offer to confirm the credit card number linked to the account, while presenting the credit card type and the last 2 digits of the credit card number. The attacker would then call the customer service number, and try to guess via the interactive voice response system the last four digits of the credit card number. Having the last two digits already at hand, this leaves only 100 combinations to try.

Once the correct combination of the last four digits has been found, the attacker would use the interactive voice response system to retrieve the account balance and the recent transactions.

Read more about it here.