126 lines
8.5 KiB
Plaintext
126 lines
8.5 KiB
Plaintext
|
|
Episode: 3743
|
||
|
|
Title: HPR3743: HPR News
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3743/hpr3743.mp3
|
||
|
|
Transcribed: 2025-10-25 04:51:25
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
This is Hacker Public Radio Episode 3,743 for Wednesday the 7th of December 2022.
|
||
|
|
Today's show is entitled HPR News.
|
||
|
|
It is the 20th show of some guy on the internet and is about 10 minutes long.
|
||
|
|
It carries a clean flag.
|
||
|
|
The summary is news for the community by the community.
|
||
|
|
Hello and welcome to another episode of Hacker Public Radio.
|
||
|
|
This is the news show, HPR News, starting off with threat analysis, your attack surface.
|
||
|
|
Microsoft confirms a server misconfiguration led to 65,000 companies data leak.
|
||
|
|
Microsoft misconfigured an Azure Blob storage server causing a major security breach.
|
||
|
|
Attackers were able to access unauthorized customer data.
|
||
|
|
SOC Radar, a cybersecurity company, is calling the security breach Blue Blade.
|
||
|
|
SOC Radar discovered the breach on September 24th, 2022.
|
||
|
|
Microsoft is attempting to downplay the security breach, but security researcher Kevin Buehmont
|
||
|
|
isn't buying it.
|
||
|
|
Mr. Buehmont suggests that Microsoft dropped the ball on informing its customers
|
||
|
|
and federal regulators of the security breach in a timely manner.
|
||
|
|
For our next article,
|
||
|
|
Hidden ads malware affects over 1 million Android users.
|
||
|
|
MacAfee's mobile research team identified multiple apps containing malware on Google's Play Store.
|
||
|
|
After install, the malicious Android apps automatically run without the user knowing or interacting
|
||
|
|
with the app. That's right, they automatically run after install.
|
||
|
|
They're happy.
|
||
|
|
These malicious apps then disguise themselves by changing their icon to the Google Play icon
|
||
|
|
and renaming themselves to either Google Play or Settings.
|
||
|
|
The malicious apps quickly create permanent malicious services.
|
||
|
|
MacAfee's mobile research team demonstrates the resilience of the malware by using
|
||
|
|
Kill-9 on the service processes.
|
||
|
|
More malicious processes generate immediately as if nothing happened.
|
||
|
|
For our next article,
|
||
|
|
fully undetectable PowerShell backdoor disguised as part of Windows Update.
|
||
|
|
Director of security research at Safe Reach,
|
||
|
|
Tomarbar stated,
|
||
|
|
The covert self-employed tool and the associated C2 command seem to be the work of a sophisticated
|
||
|
|
unknown threat actor who has targeted approximately 100 victims.
|
||
|
|
Oh no!
|
||
|
|
Based on a metadata found within the malicious document,
|
||
|
|
it seems to be a LinkedIn-based spearfishing attack,
|
||
|
|
which ultimately leads to the execution of a PowerShell script via a piece of macro code.
|
||
|
|
The macro drops update.vbs creates a scheduled task pretending to be part of the Windows update,
|
||
|
|
which will execute the updater.vbs script from a fake update folder under
|
||
|
|
slash app data slash local slash Microsoft slash Windows.
|
||
|
|
Said Tomar,
|
||
|
|
Currently, 32 security vendors in 18 anti-malware engines
|
||
|
|
have flagged the decoy document and the PowerShell scripts as malicious.
|
||
|
|
Yay!
|
||
|
|
The findings come as Microsoft has taken steps to block Excel forms and visual basic application
|
||
|
|
macros by default across Office apps, prompting threat actors to pivot toward alternative delivery
|
||
|
|
methods. I imagine this is a major issue inside of work environments and school environments,
|
||
|
|
where users slash students share documents on Microsoft Cloud.
|
||
|
|
If one person gets a hold of the malicious document,
|
||
|
|
then they just spreads like wildfire across the environment.
|
||
|
|
There will be links down in the show notes.
|
||
|
|
I've turned certain words in the hyperlinks where you can find out more about what steps
|
||
|
|
Microsoft has taking as well as the alternative delivery methods the attackers are using.
|
||
|
|
Next up, user spakes.
|
||
|
|
Texas sues Google for biometric data collection.
|
||
|
|
The great state of Texas has filed a lawsuit against Google claiming that the tech bohemeth
|
||
|
|
has taken user biometric data without permission.
|
||
|
|
Texas Attorney General Ken Paxton claims Google is illegally data harvesting Texans using features
|
||
|
|
and devices such as Google Photos, Google Assistant, and Nest Hub Max.
|
||
|
|
Alright, I can just imagine this guy sitting somewhere down in Texas on a front porch,
|
||
|
|
hollering it at his phone with an image of the Google logo and he's drinking from a jar of
|
||
|
|
moon shine that he just brewed in his truck radiator on his way home from work.
|
||
|
|
That's how I picture this guy because there's no way in hell he honestly believes that people
|
||
|
|
don't know Google is harvesting their data.
|
||
|
|
That Ulyss bulletproof right, whatever you do with that device, whatever sensors that device
|
||
|
|
has on it, cameras, microphones, the ability to do the fingerprint reading.
|
||
|
|
If it can collect any form of data, Google has it.
|
||
|
|
Same thing with Apple, same thing with I don't know LG Samsung, you name it.
|
||
|
|
I also imagine seeing Google's lawyers just planning how this trial will go
|
||
|
|
and rather than actually showing up for the trial, they just send a pallet of money.
|
||
|
|
So everything Ken Paxton has to argue, the judge will just look over at the pile of money and say,
|
||
|
|
nope, doesn't add up. Let's pivot back to threat analysis.
|
||
|
|
The next story, millions of patients compromised in hospital data leak.
|
||
|
|
Nearly three million Illinois and Wisconsin patients are caught in a hospital data breach.
|
||
|
|
Advocate Aurora Health, which operates 27 hospitals, said in a statement.
|
||
|
|
The breach may have exposed information, including a patient's medical provider,
|
||
|
|
type of appointments, medical procedures, date and locations of scheduled appointments,
|
||
|
|
and IP addresses.
|
||
|
|
The system blamed the breach on the use of pixels.
|
||
|
|
Computer code that collects information on how a user interacts with their website.
|
||
|
|
Wow, I can't believe this. This computer code pixels includes products developed by Google
|
||
|
|
and Facebook's parent company meta that make the collected data accessible to those companies
|
||
|
|
like Aurora Health. Yes, ladies and gentlemen, here in the United States of America,
|
||
|
|
Google and Facebook are in control of your health care.
|
||
|
|
Or at least the information surrounding your health care.
|
||
|
|
The health care industry's use of pixels has come under wide criticism from privacy advocates
|
||
|
|
who warned that the technologies used violates federal patent and privacy laws.
|
||
|
|
A report published in June by the markup found that many of the country's top ranked hospitals
|
||
|
|
used the meta pixel.
|
||
|
|
Wow, ladies and gentlemen, I don't know what to tell you. I can't believe it.
|
||
|
|
Our health care system is so difficult that regular citizens can't get health care.
|
||
|
|
You can't go across state lines to get better health care if you could even afford it in the first
|
||
|
|
place, right? So they lock you into a state which limits the amount of health care you can receive.
|
||
|
|
You know, the options of insurance you can get so you can't get a cheaper plan from a neighboring
|
||
|
|
state and then they make it so expensive that you can't even afford it in the first place.
|
||
|
|
On top of that, to add insult to entry, they give your data to Facebook.
|
||
|
|
I mean, to stop and think about that, Facebook and Google can tie your medical records to some
|
||
|
|
account online and these people have no hip-hop obligations. There are no laws or anything protecting
|
||
|
|
your data. Once it's in the hands of Facebook, they have no federal regulation that says how they
|
||
|
|
must house this data. Who can have access to it? Nothing. Your data is just raw out there in
|
||
|
|
the hands of Facebook. Meanwhile, everybody's upset about something on Twitter. You know, I haven't
|
||
|
|
heard one person stop and talk about this, but yet, you know, apparently the Tesla guy in Twitter,
|
||
|
|
that that's worth chatting about. Let me put it this way. Not if, but when Facebook suffers
|
||
|
|
another day to breach, imagine having not only your Facebook account being compromised,
|
||
|
|
but also any medical diagnosis that you have had any sort of appointments that you've made
|
||
|
|
toward that diagnosis, any sort of embarrassing health conditions. They maybe they're not embarrassing,
|
||
|
|
but they're private. You don't want it out there and they're open like that.
|
||
|
|
All right, ladies and gentlemen, I'm going to leave you with that one to chew on because that one
|
||
|
|
was a little bit upsetting to hear from you personally, but I want to know what you think about that.
|
||
|
|
What do you think about Google and Meta, you know, with air quotes? What do you think about them
|
||
|
|
being in control of your health care data? I'm some guy on the internet. This is HPR News and I'm
|
||
|
|
signing off. You have been listening to Hacker Public Radio at Hacker Public Radio does work.
|
||
|
|
Today's show was contributed by a HPR listener like yourself. If you ever thought of recording
|
||
|
|
podcast, click on our contribute link to find out how easy it really is. Hosting for HPR has been
|
||
|
|
kindly provided by an honesthost.com, the internet archive, and our sings.net.
|
||
|
|
On this advice status, today's show is released under Creative Commons Attribution 4.0 International
|
||
|
|
License.
|