Olivier Dony   

71 Followers
141 Following
101 Posts
Defending against Dark Arts at @Odoo ;-)
Posts rarely, mostly about science, Odoo, software engineering, data protection and security.
Githubhttps://github.com/odony
Twitterhttps://twitter.com/odony

Exploitation was the primary entry method into orgs, although it declined slight YoY due to the rise of infostealers.

Three of the four most exploited vulns were zero days, all were in cybersecurity products (Palo-Alto, Ivanti Connect Secure, Ivanti Policy Secure and Fortinet). In most of the cases documented, it was ransomware groups running rings around security vendors, ie the security vendors were the cause of the victims woes due to defective products.

Ten npm packages were suddenly updated with malicious code yesterday to steal environment variables and other sensitive data from developers' systems.

https://www.bleepingcomputer.com/news/security/infostealer-campaign-compromises-10-npm-packages-targets-devs/

Infostealer campaign compromises 10 npm packages, targets devs

Ten npm packages were suddenly updated with malicious code yesterday to steal environment variables and other sensitive data from developers' systems.

BleepingComputer

Expect many more of these. VSCode is an absolute security trash fire, MS Security needs to have a word with MS.

- It installs as non-admin
- There are no security controls *at all* around marketplace access
- addons update automatically and are required
- No vetting
- Blue tick verification just needs any domain name
- Source code link on addons doesn’t need to match the addons
- Allows RCE by design
- The marketplace is absolutely riddled with malware

https://www.bleepingcomputer.com/news/security/vscode-extensions-with-9-million-installs-pulled-over-security-risks/

VSCode extensions with 9 million installs pulled over security risks

Microsoft has removed two popular VSCode extensions, 'Material Theme - Free' and  'Material Theme Icons - Free,' from the Visual Studio Marketplace for allegedly containing malicious code.

BleepingComputer
1/6 | How We Hacked Multi-Billion Dollar Companies in 30 Minutes Using a Fake VSCode Extension

30 minutes. 30 minutes is how long it took us to develop, publish, and polish a Visual Studio Code (The most popular IDE on the planet with over 15m monthly users) extension that changes your IDE’s…

ExtensionTotal
A large botnet targets M365 accounts with password spraying attacks

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication.

Security Affairs
The legality (not wisdom) of putting European private data on US clouds hinges on the availability of the US Privacy and Civil Liberties Oversight Board. Trump neutered this board, and the European parliament has taken notice & asked the European Commission what they think:
2023 #OCA Top Contributors. Here is the ranking of merged Pull Requests (PR) in 2023 grouped by company. Click here to see the details by individual contributors together with the ranking of reviewers. https://buff.ly/3XR3oBy
We thank all our awesome contributors who provide a massive amount of time and energy to build high quality and innovative #Odoo addons through their involvement with design, code, test, reviews, documentation and translation!
Ranking of Top Contributors in 2023

Odoo Community Association (OCA)

me, 2020: "it's going to be really funny when Google discontinues search"

you, my followers: "lol amy you're so cynical"

google, 2024:

https://www.vincentschmalbach.com/google-now-defaults-to-not-indexing-your-content/

Google Now Defaults to Not Indexing Your Content

Picture this: It’s ten years ago, and you’ve just launched a new WordPress blog. Within hours, sometimes even minutes, your content is indexed by Google. You search for a unique sentence from your…

Vincent Schmalbach
Filippo Valsorda (@filippo.abyssdomain.expert)

I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission. The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system(). It's RCE, not auth bypass, and gated/unreplayable. [contains quote post or other embedded content]

Bluesky Social

I was doing some micro-benchmarking at the time, needed to quiesce the system to reduce noise. Saw sshd processes were using a surprising amount of CPU, despite immediately failing because of wrong usernames etc. Profiled sshd, showing lots of cpu time in liblzma, with perf unable to attribute it to a symbol. Got suspicious. Recalled that I had seen an odd valgrind complaint in automated testing of postgres, a few weeks earlier, after package updates.

Really required a lot of coincidences.