3CX created the desktop phone app 3CXDesktopApp and now finds itself in the middle of a supply chain attack. As a recognized company in the softphone space, 3CX provides services to many large companies including Honda, Coca-Cola, BMW, Holiday Inn among others, according to the testimonials on their website. This week though, they disclosed an attack … [Read more...]
5G Didn’t Break Your Car
5G didn't put malware on these Mazda’s entertainment systems but many Seattle Mazda drivers couldn't change their radio station after turning it to the local NPR station, KUOW. As one reddit user put it, "the whole audio system and Bluetooth just keeps trying to reboot." Some users also reported they couldn't use their backup cameras. This fiasco started around January 24th … [Read more...]
Face Recognition and Privacy Concerns Works Its Way Into Taxes
The US IRS has plans to use a 3rd party identification system to prevent tax-related identity theft. The IRS plans to contract with ID.me to identify people using, among other factors, face recognition. James Hendler, professor of Computer, Web and Cognitive Sciences, wrote about some issues with the IRS’s plan. How will the data be processed? ID.me would need to store … [Read more...]
Log4j Becomes The Highest Detected Vulnerability Days After Release
Log4Shell attacks have spread throughout the Internet due to the ease with which attackers can perform them. The WatchGuard Threat Lab sees a sample of these attacks from our customers’ perspectives when they opt to provide anonymized threat intelligence data from their Fireboxes. This limited data, along with our analysis, gives us a unique opportunity to review some of the … [Read more...]
Active Compromises of vCenter Using The Log4J Vulnerability
Much of what we see exploiting the log4j2 vulnerability, CVE-2021-44228, appears like a scan for the vulnerability, not necessarily exploitation. However, our own honey pot https://github.com/WatchGuard-Threat-Lab/log4shell-iocs has seen activity from this exploit to install coin miners. In one of the first targeted cases for this vulnerability, a ransomware gang have exploited … [Read more...]