Cyber Round-up

Cyber Round-up for 31st January

Welcome to the latest edition of the Ironshare Cyber Round-up where we look back at the events of that last week and cover some of the news, posts, views, and highlights from the world of Security.

In this week’s round-up:

Security News

UK Gives Huawei Limited Role in 5G Networks

Despite warnings from the US, the UK has decided to allow Huawei to participate in building its 5G networks. The UK Prime Minister believes working together is important in diversifying the market, but still proceeded with caution; restrictions will be implemented that exclude Huawei from high profile areas, such as military bases and nuclear sites. The UK and US are in disagreement over this decision, as the US believe it to be too big a risk; despite this, the Foreign Secretary has confirmed that the changes will not affect the UK’s intelligence-sharing relationship with allies, including the US.


Microsoft Set to Build New Cyber Security Centre in Belfast

Microsoft have plans to build a new cyber security centre and have chosen Belfast as its location. Northern Ireland has taken a recent interest in cyber security, and the sector has been growing rapidly; because of this, Microsoft are providing £800,000 to fund the pre-employment training provided by Belfast Met college. This collaboration with the college will aim to develop the necessary skills to compete for a place within the company’s new cyber security centre. This will create eighty-five new jobs initially, nut the government plan to establish Northern Ireland as a global hub for cyber security within the next 10 years, with over 5,000 employed professionals.


Cisco Umbrella Trial


The UN Cover Up Major Cyber Attack on Their IT Systems

The UN are facing criticism following a major attack on their IT systems in Europe that started back in July 2019. Despite the severity of the attack, the UN decided to not disclose it to the public. It is said that staff records, details of health insurance and commercial contract details were all compromised, and it is believed that the entire breach could have been prevented with a simple software patch. The breach reportedly affected dozens of servers in multiple locations and included the personal information of its employees and staff. The public are unhappy with the secrecy of the UN regarding this attack and see it as a breach of trust; the scale of the organisation only amplifies the risk of such careless procedures.


Shlayer Malware Affecting 1 in 10 Macs

The Shlayer malware, which was discovered two years ago, is continuing to infect Apple Mac devices at an increasing rate. Shlayer disguises itself as an Adobe Flash Player update and although it was considered a minor threat back then, it now has almost 32,000 unique variants that make up a third of all malware detections of Mac AV products. The staggering statistics show that 10% of all macOS users have reported seeing this malware and it was the most common in all of 2019. Users of Adobe Flash are warned to only download updates from the official Adobe website to avoid the risk of an attack; we advise looking into all the mitigation techniques to best protect against this kind of malware.


AMP Free Trial

Vulnerabilities & Updates

Magento Addresses Critical Vulnerabilities in V2.3.4

Version 2.3.4 of the Magento e-commerce platform has been released, and it addresses a number of vulnerabilities, three of which were rated critical. The critical vulnerabilities include an SQL injection flaw capable of leaking personal information, as well as two remote code execution flaws. Other important vulnerabilities include cross-site scripting and path traversal and as far as we know, these attacks are not being actively exploited in the wild. All versions of Magento Commerce, Open Source, Enterprise Edition and Community Edition are at risk; we highly recommend applying the recent patch as soon as possible.


Recent Apple Patch Addresses Dozens of Security Flaws

Apple has released their monthly patches, 23 affecting iOS, 31 in macOS and 2 in Safari. This long list of security issues includes address bar spoofing exploits, memory corruption issues, iOS camera exploits and remote code execution flaws. Apple refuses to disclose details of vulnerabilities until after they have been patched. These serious vulnerabilities affect all previous versions, and we advise updating as soon as possible to minimise the risk of an attack. 


And that’s it for this week’s round-up, please don’t forget to tune in for new instalments every week.

Why not follow us on social media using the links provided on the right.

Edition #76 – 31st January 2020

Ironshare – Security Simplified