Current Activityus-cert.gov | February 22 08:58 AM
Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities
Various cyber actors have engaged in malicious activity against U.S. Government and private sector entities. The apparent objective of this activity has been the theft of intellectual property, trade secrets, and other sensitive business information. The malicious actors have employed a variety of techniques to infiltrate targeted organizations, establish a foothold, penetrate throughout the targets’ networks, and steal confidential or proprietary data. The United States Department of Homeland Security, in collaboration with the Federal Bureau of Investigation and other partners, has released a Joint Indicator Bulletin (JIB) through secure channels. This JIB contains cyber threat indicators that will enable public and private sector critical infrastructure partners to take action to mitigate adverse impacts from this activity and protect their sensitive information.
This traffic light protocol green JIB contains internet protocol addresses, domain names, and malware indicators associated with malicious data exfiltration activity. Confirmed members of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems administrators, and information security practitioners, may request a copy of this bulletin by contacting firstname.lastname@example.org with the subject “JIB Request,” and including the requestor’s name and affiliation.
Apple Releases Security Update for Java on OS X
added Thursday, February 21, 2013 at 4:45 pm
Apple has released a security update for Java on OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later, Mac OS X v10.6.8, and Mac OS X Server v10.6.8 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code.
US-CERT encourages users and administrators to review Apple Support Article HT5666 and follow best-practice security policies to determine which updates should be applied.
Google Releases Google Chrome 25.0.1364.87
added Thursday, February 21, 2013 at 2:53 pm
Google has released Google Chrome 25.0.1364.87 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to cause a denial-of-service condition or bypass security features.
US-CERT encourages users and administrators to review the Google Chrome Release blog entry and update to Chrome 25.0.1364.87.
Mozilla Releases Multiple Updates
added Thursday, February 21, 2013 at 2:50 pm
The Mozilla Foundation has released updates for the following products to address multiple vulnerabilities.
Firefox ESR 17.0.3
Thunderbird ESR 17.0.3
These vulnerabilities could allow an attacker to execute arbitrary code, bypass security features, or cause a denial-of-service condition.
US-CERT encourages users and administrators to review the Mozilla Foundation Advisory for Firefox 19.0, Firefox ESR 17.0.3, Thunderbird 17.0.3, Thunderbird ESR 17.0.3, and SeaMonkey 2.16 and apply any necessary updates to help mitigate the risk.
Adobe Releases Security Updates for Adobe Reader and Acrobat
added Thursday, February 14, 2013 at 2:20 pm | updated Thursday, February 21, 2013 at 11:09 am
Adobe has released a security advisory for Adobe Reader and Acrobat to address multiple vulnerabilities. Exploitation of these vulnerabilities may allow an attacker to cause a denial-of-service condition or take control of the affected system. Adobe is aware of reports that two vulnerabilities referenced in Security Advisory APSA13-02, CVE-2013-0640 and CVE-2013-0641, are being exploited in the wild.
The advisory indicates that the following versions of Adobe Reader and Acrobat are affected:
Adobe Reader XI 11.0.01 and earlier for Windows and Macintosh
Adobe Reader X 10.1.5 and earlier for Windows and Macintosh
Adobe Reader 9.5.3 and earlier 9.x versions for Windows, Macintosh, and Linux
Adobe Acrobat XI 11.0.01 and earlier for Windows and Macintosh
Adobe Acrobat X 10.1.5 and earlier for Windows and Macintosh
Adobe Acrobat 9.5.3. and earlier 9.x versions for Windows and Macintosh
Adobe recommends users update their product installations to the latest version using the instructions provided in the “Solutions” section in Security Bulletin APSB13-07.