BlackBerry Vulnerability, DeepBlueMagic Ransomware, HolesWarm Malware, CISA Ransomware Guidance- Experts Comments

By   ISBuzz Team
Writer , Information Security Buzz | Aug 20, 2021 03:02 am PST


BlackBerry has publicly disclosed that its QNX Real Time Operating System (RTOS) is affected by a BadAlloc vulnerability. The vulnerability has left 200 million cars, along with critical hospital and factory equipment, vulnerable. CISA strongly encourages critical infrastructure organizations and other organization developing, maintaining, supporting, or using affected QNX-based systems, to patch affected products as quickly as possible.  

Notify of
1 Expert Comment
Oldest Most Voted
Inline Feedbacks
View all comments
Saumitra Das
Saumitra Das , CTO and Co-founder
August 20, 2021 11:43 am

<p>“QNX is the operating system of choice for embedded systems and is very widely deployed where real-time guarantees are needed in computing such as medical devices, robotics, cars, etc. This should be at the top of the list for patching and in the meantime, networks reachable from QNX devices should be extensively monitoring from a detection and response perspective to disrupt attacker kill chains. Attackers who are already inside the network may auction off their initial access to more sophisticated third parties who exploit this CVE.” </p>
<p>\"Researchers from Heimdal Security have <a href=\"\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"\">uncovered</a> a new ransomware strain named “DeepBlueMagic” which deletes Volume Shadow copy for Windows, making recovery nearly impossible without a decryption key. The malware was observed by Heimdal on an encryption tool from Jetico called BestCrypt Volume Encryption to start encryption on all drives, except the primary system drive (“C:\\”), on an infected Windows Server 2012 R2 system.\"</p>
<p>“Ransomware actors are always looking at new methods to gain leverage to blackmail. The original leverage was just business downtime from drive encryption but currently it is common for attackers to do double extortion to exfiltrate data as well as encrypt. They can exfiltrate and sell data, name and shame the victim, or just disrupt their business like what can happen with this type of attack. Using deeper disk interfaces is an interesting addition to their toolkit of attacks which may help them from a disruption point of view.”</p>
<p>Researchers at Tencent have <a href=\"\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"\">identified</a> a malware which exploits unpatched Windows and Linux servers. HolesWarm, the botnet cryptominer, has already compromised 1,000-plus clouds since June and is being referred to as the “King of Vulnerability Exploitation”. The malware has leveraged more than 20 known vulnerabilities in Linux and Windows servers, and Tencent has warned that both government and enterprise should mitigate known vulnerabilities as soon as possible to prevent from falling prey to the next HolesWarm attack.\"</p>

Last edited 2 years ago by Saumitra Das

Recent Posts

Would love your thoughts, please comment.x