Xopero Blog

Microsoft releases a one-click ProxyLogon mitigation tool

Welcome to the next episode of the Xopero Security Center. Race against time – that’s the best description of the ProxyLogon situation. First Microsoft has released emergency patches for vulnerable systems. No more than a week later researchers spotted the first ransomware actively exploiting these vulnerabilities. Now users got a one-click ProxyLogon mitigation tool (details below). The keyword is „mitigation” – it mitigates the risk of exploit until the update will be applied. This is not an alternative. The good news – tens of thousands of Microsoft Exchange servers have been patched already. Experts have never seen patch rates this high for any system before. Still, there are about 82k devices vulnerable to the attack. Hence the new tool. Need to find out more? Check the rest of the article.

Read more

Git Repository Backup: third-party software or your own script

When it comes to files, endpoints, servers, or VMs – a third-party backup software is something obvious that nearly every business needs and should have. Unlike repository backup which is not so obvious, but of equal importance. As CTO, IT manager, software-house owner, or team leader – you probably can imagine how much it would cost you to lose the code your team has been working on for months… if not, try to calculate…

Read more

Z0Miner malware / DearCry ransomware and ProxyLogon exploits / reCAPTCHA phishing

Welcome to the next episode of the Xopero Security Center. This time we are taking a closer look into the Z0Miner malware case – a new threat against unpatched ElasticSearch and Jenkins servers. MS Exchange servers are under attack too. Remember the four new zero-day vulnerabilities discovered a few weeks ago? They have got a fancy name now – ProxyLogon exploits – and very effective [DearCry] ransomware which is targeting vulnerable devices. What’s next? There is also a novel phishing attack that uses fake Google reCAPTCHA to swipe Microsoft 365 credentials. There were also some problems with the GitHub logging mechanism. Details can be found below.

Read more

MS Exchange got emergency patches for four critical zero-day flaws

Microsoft is pressing customers to install emergency patches as soon as possible. So far, there is only one highly skilled hacker group actively exploiting the vulnerabilities – named Hafnium – but the situation could change at any time. The best protection against this attack will be applying new patches now, not tomorrow or one week from today. More information about MS Exchange zero-days can be found below.

Read more

Critical RCE flaw in VMware vCenter – fixed, so update now

After multiple proof-of-concept exploit scripts of VMware RCE new bug were published on GitHub, hackers started mass scanning for vulnerable Internet-exposed servers. The company patched the critical vulnerability already, but thousands of unpatched vCenter servers are still reachable over the Internet. This is a serious problem. It does look like this is the last moment for a safe update. More information about vCenter vulnerability can be found below.

Read more

Masslogger comeback – a new and powerful variant steals Outlook and Chrome credentials

MassLogger malware has come back in a new variant which is much more powerful than the old spyware that has attacked the Windows platform for years. (Brand)New and better? Yes. We are dealing with a Trojan horse that tries to steal usernames and passwords from Microsoft Outlook, the Thunderbird email client, and password managers built into Google Chrome, Mozilla Firefox, Microsoft Edge and other browsers. Have you got any suspicious-looking email? Better never open it. Want to find out more about MassLogger? Check the article below for more information.

Read more

Bitbucket down – why backup Bitbucket?

Bitbucket is considered a proven, secure Git repository management solution used by millions of companies worldwide. However, as in most services, there are moments of Bitbucket down. You might be lucky to not see for yourself what Bitbucket down means, but trust me – some other companies already experienced service outages or other problems, and more will. If you don’t want to join a group of users affected by Bitbucket problems, you might want to consider bringing in an additional layer of security in the form of a proper backup. In this article, we will talk about why you need one, and generally about why you should protect your Bitbucket repositories.

Read more

Dependency Confusion – a new cyberattack method takes advantage of open ecosystems

A novel supply chain attack, called dependency confusion or a substitution attack, takes advantage of the open ecosystem that many businesses use as part of their app development process. And given that business apps have become increasingly important, any threat to the app development supply chain could potentially have huge implications. Found this short intro interesting? Then click and read the whole new episode of the Xopero Security Center.

Read more

GitHub down – why backup GitHub?

Does your company use GitHub? And if so how do you protect your data there? You might be wondering why I’m asking that question when you consider GitHub as some sort of protection for your code. Well, you might be lucky enough to not see for yourself what exactly GitHub down means, but many users experienced problems with the service outage, and so will many do in the future. But there are some things you can do to ensure your data safety and accessibility when a failure occurs to GitHub. In this article, we will talk about why you need to protect your GitHub repos, and how to do it with a proper backup.

Read more