{"id":12341,"date":"2024-08-06T13:00:44","date_gmt":"2024-08-06T11:00:44","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=12341"},"modified":"2025-02-13T13:37:08","modified_gmt":"2025-02-13T12:37:08","slug":"infected-software-updates","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/08\/06\/infected-software-updates\/","title":{"rendered":"THREAT INTEL: Mac and Windows users infected by software updates delivered over hacked ISP"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12341\" class=\"elementor elementor-12341\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cc87d0 e-flex e-con-boxed e-con e-parent\" data-id=\"1cc87d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-407499a0 elementor-widget elementor-widget-html\" data-id=\"407499a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-606a89d0 e-con-full e-flex e-con e-parent\" data-id=\"606a89d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6389f64e e-con-full e-flex e-con e-child\" data-id=\"6389f64e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-242eeaac elementor-widget elementor-widget-image\" data-id=\"242eeaac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"169\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-300x169.jpg\" class=\"attachment-medium size-medium wp-image-12344\" alt=\"Hacker_Using_Supercomputer\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-300x169.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-768x432.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit:DC Studio\/Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b82abaa elementor-widget elementor-widget-html\" data-id=\"5b82abaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77dd88c4 e-con-full e-flex e-con e-child\" data-id=\"77dd88c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5eecba0c elementor-widget elementor-widget-wp-widget-text\" data-id=\"5eecba0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping keep European SMEs CYBERSafe!<br \/>\n<\/strong>Gibraltar: Tuesday 06 August 2024 at 12:50 CET<\/p>\n<p><strong>THREAT INTEL: Mac and Windows users infected by software updates delivered over hacked ISP<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<p><strong>DNS poisoning attack worked even when targets used DNS from Google and Cloudflare.<\/strong><\/p>\n<p>Hackers or a more appropriately <strong>Cybercriminals<\/strong> delivered malware to <strong>Windows<\/strong> and <strong>Mac<\/strong> users by compromising their Internet service provider and then tampering with software updates delivered over unsecure connections.<\/p>\n<p>The attack, researchers from security firm <strong>Volexity<\/strong> said,<\/p>\n<p><em>&#8220;Worked by hacking routers or similar types of device infrastructure of an unnamed <strong>ISP<\/strong>.&#8221;<\/em><\/p>\n<p>The attackers then used their control of the devices to poison domain name system responses for legitimate hostnames providing updates for at least six different apps written for <strong>Windows<\/strong> or <strong>macOS<\/strong>. The apps affected were the 5KPlayer, Quick Heal, Rainmeter, Partition Wizard, and those from Corel and Sogou.<\/p>\n<p>Because the update mechanisms didn\u2019t use <strong>TLS<\/strong> or cryptographic signatures to authenticate the connections or downloaded software, the threat actors were able to use their control of the <strong>ISP<\/strong> infrastructure to successfully perform machine-in-the-middle (<strong>MitM<\/strong>) attacks that directed targeted users to hostile servers rather than the ones operated by the affected software makers. These redirections worked even when users employed non-encrypted public<strong> DNS<\/strong> services such as <strong>Google\u2019s<\/strong> 8.8.8.8 or <strong>Cloudflare\u2019s<\/strong> 1.1.1.1 rather than the authoritative <strong>DNS<\/strong> server provided by the <strong>ISP<\/strong>.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35d5d57b elementor-widget elementor-widget-image\" data-id=\"35d5d57b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"427\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-9178\" alt=\"DNS-Server\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_MichaelJARMOLUK_Pixabay_DNSServer_compressed-1.jpg 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35552b40 elementor-widget elementor-widget-wp-widget-text\" data-id=\"35552b40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>In other words, the <strong>DNS<\/strong> responses returned by any <strong>DNS<\/strong> server would be changed once it reached the infrastructure of the hacked <strong>ISP<\/strong>. The only way an end user could have thwarted the attack was to use <strong>DNS<\/strong> over <strong>HTTPS<\/strong> or <strong>DNS<\/strong> over <strong>TLS<\/strong> to ensure lookup results haven\u2019t been tampered with or to avoid all use of apps that deliver unsigned updates over unencrypted connections.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-725894ba e-con-full e-flex e-con e-child\" data-id=\"725894ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f115678 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7f115678\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/arstechnica.com\/security\/2024\/08\/hacked-isp-infects-users-receiving-unsecure-software-updates\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f075e4d e-flex e-con-boxed e-con e-parent\" data-id=\"f075e4d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9dcaaff e-con-full e-flex e-con e-child\" data-id=\"9dcaaff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61b43ac4 elementor-widget elementor-widget-image\" data-id=\"61b43ac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"200\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo.jpg\" class=\"attachment-large size-large wp-image-12128\" alt=\"Cybersec Innovation Partners\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo.jpg 200w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/cybersec_innovation_partners_ltd_logo-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2fd256b1 e-con-full e-flex e-con e-child\" data-id=\"2fd256b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56fcc4bb elementor-widget elementor-widget-wp-widget-text\" data-id=\"56fcc4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48febe51 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"48febe51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit:DC Studio\/Freepik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":12344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440,594],"tags":[517,439],"ppma_author":[415],"class_list":["post-12341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","category-reportage","tag-cyberawareness","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589.jpg",1000,563,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-300x169.jpg",300,169,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-768x432.jpg",640,360,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589.jpg",640,360,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589.jpg",1000,563,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589.jpg",1000,563,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589.jpg",1000,563,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/20589-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/reportage\/\" rel=\"category tag\">REPORTAGE<\/a>","tag_info":"REPORTAGE","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=12341"}],"version-history":[{"count":9,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12341\/revisions"}],"predecessor-version":[{"id":12351,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/12341\/revisions\/12351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/12344"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=12341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=12341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=12341"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=12341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}