Per Kaspersky, the zero-day was found being deployed on user devices via a Korean-language news portal. The Russian antivirus company said it couldn’t link the zero-day’s use to a specific hacking group, although there are some code similarities with past North Korean malware. The company is tracking the current attacks using this zero-day under a codename of “Operation WizardOpium.”
Bottom line, the odds of being affected by this are very slim but nevertheless its worth the due diligence and ensuring you are all patched up!
Just came across a great read by Matthew Finnegan at Computerworld detailing Google’s plans for G Suite and Gmail going forward. According to Google, Gmail will continue to be a focal point as G Suite continues to evolve into a more collaborative based software package aimed at keeping users away from Microsoft’s Office 365 suite.
Check out the full article here for more info and let me know what are your thoughts on this.
Martin Brinkmann on ghacks.net provides details here on how Google recently released a feature that allows Gmail users to automate the sending of e-mail to others.
Key positives about this new feature includes time of day options for scheduled and customized sending along with a separate folder for scheduled items.
At this time, I’m not sure if there are any notable differences between Gmail’s scheduling feature and Microsoft’s decade old scheduling feature that has been available in the Outlook Web App and the full Outlook client. Better late than never…
So it looks like Google has released specific details regarding their initial call to action for all users to patch their Chrome web browser / OS as soon as possible. Come to find out this would have only affected those users running 32-bit versions of Windows 7 which is another reason why you should upgrade to Windows 10 sooner rather than later!
See a part of the statement released by Clement Lecigne of the Google Threat Analysis Group:
On Wednesday, February 27th, we reported two 0-day vulnerabilities — previously publicly-unknown vulnerabilities — one affecting Google Chrome and another in Microsoft Windows that were being exploited together.
To remediate the Chrome vulnerability (CVE-2019-5786), Google released an update for all Chrome platforms on March 1; this update was pushed through Chrome auto-update. We encourage users to verify that Chrome auto-update has already updated Chrome to 72.0.3626.121 or later.
The second vulnerability was in Microsoft Windows. It is a local privilege escalation in the Windows win32k.sys kernel driver that can be used as a security sandbox escape. The vulnerability is a NULL pointer dereference in win32k!MNGetpItemFromIndexwhen NtUserMNDragOver() system call is called under specific circumstances.
We strongly believe this vulnerability may only be exploitable on Windows 7 due to recent exploit mitigations added in newer versions of Windows. To date, we have only observed active exploitation against Windows 7 32-bit systems.
Pursuant to Google’s vulnerability disclosure policy, when we discovered the vulnerability we reported it to Microsoft. Today, also in compliance with our policy, we are publicly disclosing its existence, because it is a serious vulnerability in Windows that we know was being actively exploited in targeted attacks. The unpatched Windows vulnerability can still be used to elevate privileges or combined with another browser vulnerability to evade security sandboxes. Microsoft have told us they are working on a fix.
As mitigation advice for this vulnerability users should consider upgrading to Windows 10 if they are still running an older version of Windows, and to apply Windows patches from Microsoft when they become available. We will update this post when they are available.
For those of you that may not be aware of this, Google has released information urging everyone to update to the latest version of Google Chrome to combat a 0 Day vulnerability found in previous versions.
Most configurations of Chrome should be auto updating but it is suggested to push out the updated version. I believe at this time Version 72.0.3626.121 is the patched one being deployed.
More information about this can be found here, here, and here.
As someone who works in a school district, I’ve seen firsthand the influence Google has had on education. Whether or not you agree with how much technology plays a role in the classroom, it’s up to Network / System Admins such as myself to stay current with what is out there. That being said, I’m going to commit to getting Google Certified; I’m thinking G Suite may be a good start and am looking forward to seeing what they have in store for the revamped curriculum and certification exam.