Email Details

Lowe's Phished with Google Ads 🧰, CISO Hard Truths 🧐, Typosquatting Github Actions🐙

Attackers registered domains to common typos of MyLowesLife and bought Google Ads to have them show up in search results for MyLowesLife. 

TLDR

Together With

TLDR Information Security 2024-09-09

Shrink Your Cloud Attack Surface by 90% in a Few Days (Sponsor)

Did you know less than 10% of cloud identities with sensitive cloud permissions actually use them? Sonrai's Cloud Permissions Firewall tackles this head-on, by quickly identifying and quarantining these “zombies” lurking in your AWS environment!

Within days, Cloud Permissions Firewall:

  • Restricts unused sensitive permissions and services
  • Quarantines unused identities
  • Restricts access to specific cloud regions

The best part? Zero disruption to DevOps, and if a quarantined “Zombie” needs to be used later on, simply wake them up with a permissions request through chat tools like Slack. Making requests and approvals quick and painless.

Start your 14-day free trial at sonrai.co/zombie-identities and experience effortless, continuous AWS cloud security.

🔓

Attacks & Vulnerabilities

New RAMBO attack steals data using RAM in air-gapped computers (3 minute read)

A new attack called RAMBO can steal data from highly secure air-gapped computers by using electromagnetic radiation emitted from the computer's RAM. This attack allows data transfer rates of up to 1,000 bits per second, making it suitable for stealing small amounts of data like text, keystrokes, and small files. Mitigation strategies such as zone restrictions and RAM jamming can help defend against the RAMBO attack, but they come with additional complexities.
Lowe's Employees Phished via Google Ads (3 minute read)

Malwarebytes detected a phishing campaign targeting Lowe's employees by masquerading as the Lowe's benefits portal. The attackers registered domains to common typos of MyLowesLife and bought Google Ads to have them show up in search results for MyLowesLife. The bogus domains were then used to steal login credentials from employees.
Car rental company Avis discloses a data breach (2 minute read)

Avis, a car rental company, experienced a data breach in August that compromised customers' personal information. The breach occurred between August 3 and August 6 but was discovered on August 14. Avis is advising impacted customers to monitor their accounts for fraudulent activities and is offering free credit monitoring services.
🧠

Strategies & Tactics

What you should know about PHP code security (8 minute read)

This blog dives into PHP security. Due to its popularity and wide usage, PHP is often a target for hackers and malicious entities. Security vulnerabilities can creep in due to various reasons, such as poor coding practices, lack of sanitization of user inputs, and outdated versions.
Learning Rust for fun and backdoo-rs (10 minute read)

Rust, a modern systems programming language that offers C/C++ performance without their pitfalls, is growing in popularity. This author shares their journey of learning Rust in 2024, highlighting the abundance of learning resources available and his personal recommendations.
“Unstripping” binaries: Restoring debugging information in GDB with Pwndbg (6 minute read)

Jason An from Trail Of Bits discusses how analyzing stripped binaries can be tough. He has enhanced Pwndbg to restore debugging information in GDB for stripped binaries using Binary Ninja integration. He also introduced the go-dump command for easier debugging of Go values. These improvements are available on the Pwndbg dev branch and its latest release.
🧑‍💻

Launches & Tools

Free event (Oct 17): The [streaming] CISO Summit (Sponsor)

Learn from the brightest minds in data security at BigID's digital summit! Industry experts from Microsoft, Google Cloud, Bank of England, and more will explore the latest in DSPM, DLP, AI, and beyond! Plus, you can earn two CPE credits and a raffle entry for attending!

Save your (virtual) seat 🎟️
Redflags (Product Launch)

Redflags is a platform designed to increase secure behavior through the concept of ‘nudging'. By nudging users, they practice ‘good' behavior beyond simply acknowledging poor behavior and bad intent.
Go-over (GitHub Repo)

A tool to audit Erlang & Elixir dependencies.
GitHub Actions Attack Diagram (GitHub Repo)

GitHub Actions Attack Diagram provides guidance for identifying vulnerabilities in GitHub Actions pipelines.
🎁

Miscellaneous

Year-Long Campaign of Malicious npm Packages Targeting Roblox Users (8 minute read)

A long-running malware campaign is targeting Roblox developers through fake NPM packages mimicking "noblox.js". Attackers are using brandjacking and starjacking to appear legitimate and install malware that steals data, persists in systems, and deploys additional payloads to continue siphoning future data.
Hard Truths your CISO won't tell you (6 minute read)

Slides from Travis McPeak's off the record BlackHat campfire talk. McPeak shares some unfortunate realities of security in a business context, security organizations, and security practices. He closes with a set of good news such as the community being strong, the industry maturing, and that developers are looking to work with security.
What's the Worst Place to Leave Your Secrets? (10 minute read)

A researcher deployed canary tokens to a variety of different locations to measure how quickly attackers would find them and attempt to use them on AWS. Tokens deployed to package managers (npm and PyPi) and GitHub were accessed within minutes whereas Pastebin, a web server, and a Docker container took longer. Tokens deployed to GitLab, BitBucket, S3, GCP Cloud Storage, and a (weak) password-protected Pastebin were never accessed, suggesting that attackers are not actively monitoring these resources.

Quick Links

The State of the Virtual CISO 2024 (15 minute read)

The State of the Virtual CISO Survey Report examines vCISO adoption, opportunities, and challenges for MSPs/MSSPs, based on insights from 200 security leaders.
GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code (3 minute read)

Threat actors are exploiting typos in GitHub Actions to run malicious code by creating similar-sounding actions, compromising projects, and stealing sensitive information.
A global assessment of third-party connection tampering (19 minute read)

CloudFlare discussed at SIGCOMM how it was able to analyze anomalous internet connections so that various signature patterns of tampering can be identified.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


If you don't want to receive future editions of TLDR Information Security, please unsubscribe from TLDR Information Security or manage all of your TLDR newsletter subscriptions.

© 2024 Email Dashboard. All rights reserved.