{"id":7836,"date":"2021-09-09T16:55:57","date_gmt":"2021-09-09T04:55:57","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=7836"},"modified":"2021-09-09T16:55:57","modified_gmt":"2021-09-09T04:55:57","slug":"urgent-zero-day-exploit-9-sept-2021","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=7836","title":{"rendered":"Urgent &#8211; &#8220;Zero Day&#8221; exploit 9 Sept 2021"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p><span>Today&#8217;s news is full of stories about increased cyber-threats in NZ &#8211; <a href=\"https:\/\/www.nzherald.co.nz\/business\/cyber-attacks-against-kiwibank-anz-nz-post-metservice-experts-see-lockdown-link\/43J3RAEFZXCM6LFWPUIJ5XDOEI\/\">Cyber attacks against Kiwibank, ANZ, NZ Post, MetService &#8211; experts see lockdown link &#8211; NZ Herald<\/a><\/span><\/p>\n<p>We&#8217;ve seen several days of issues caused by these &#8220;DDOS&#8221; attacks.<\/p>\n<p>&nbsp;<\/p>\n<h2>Overnight, another cyber-threat snuck through<\/h2>\n<p>It is a <span><a href=\"\/kare-for-security-s2\/\">zero day<\/a> exploit of Microsoft MSHTML Remote Code Execution Vulnerability.\u00a0<\/span><\/p>\n<p><span>This <\/span><span>is in the cyber security news because the exploit has a CVSS (Common Vulnerability Scoring System) of 8.8 out of 10 and <strong>impacts almost every Windows desktop, laptop and server.<\/strong><\/span><\/p>\n<p><span>As with all security alerts, this is an evolving situation.<\/span><\/p>\n<h3><span> Here are some things you need to know, as we currently understand them to be.<\/span><\/h3>\n<p><span>The exploit is active, <strong>hackers are using it right now<\/strong> to gain access to systems.<\/span><\/p>\n<p><span>The news mentions Internet Explorer.\u00a0 You may think that because you use Edge or Chrome, you are not at risk.\u00a0 Unfortunately, that&#8217;s not true. Internet Explorer is still installed on almost every Windows device and hackers can exploit that.\u00a0 That&#8217;s even if you don&#8217;t actively use it.<\/span><\/p>\n<p><span>Microsoft\u2019s official workaround at this stage is to disable the installation of new Active X controls.\u00a0 This has a risk for some businesses which use applications that rely on these controls.\u00a0 <\/span><\/p>\n<p><span>It is reported that delivery of the hack is through documents from the web.\u00a0 Infected documents have this malicious content hidden in them.\u00a0 \u00a0The good news is that the default setting in Word is to disable this content for any documents opened from a web location.\u00a0 This is typically shown as the Enable Editing button on web documents.\u00a0 <\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;http:\/\/kinetics.co.nz\/wp-content\/uploads\/2021\/09\/IEACTX.png&#8221; title_text=&#8221;IEACTX&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h2><span>You are least at risk if you have :<\/span><\/h2>\n<ul>\n<li><span>Up to date Anti-Virus\/EDR (Endpoint Detection and Response),\u00a0 <\/span><\/li>\n<li><span>All your Microsoft patches are up to date, and<\/span><\/li>\n<li><span>Use Multifactor Authentication (MFA).<\/span><\/li>\n<\/ul>\n<p><span>Awareness is also a key tool in prevention.\u00a0 <strong>Please remind all your staff of the dangers around documents.<\/strong><\/span><\/p>\n<p><strong>Don&#8217;t panic if you have Kinetics for KARE Security: Our <a href=\"http:\/\/kinetics.co.nz\/cybersecurity\/\">Kinetics KARE for Security Clients<\/a> already have these layers of protection, and <a href=\"http:\/\/kinetics.co.nz\/kare-for-security-s2\/\">KARE for Security S2<\/a> clients also have advanced EDR on all covered devices.<\/strong><\/p>\n<p><span>We expect that Microsoft will release an update to resolve the issue.\u00a0 In the meantime, everyone needs to take care accessing documents from emails and web sites &#8211; even more so than usual.<\/span><\/p>\n<p><span><strong>If you wish to follow Microsoft advice of disabling Active X<\/strong>, then Kinetics can use KARE to implement this on all devices for all devices covered under your agreement.\u00a0 \u00a0This is chargeable for <\/span><span>our Ready Reaction and Core Fundamental clients. <\/span><\/p>\n<p><span>We recommend this as a temporary \u00a0change as some line of business application make use of these controls.\u00a0\u00a0\u00a0 Kinetics is offering to deploy the Active X block across all end user devices and Remote Desktop Servers, then remove it once a fix is deployed at a <strong>fixed fee of $299+GST<\/strong>.\u00a0 This does not include any remediation if issues arise from any software like Line-Of-Business\u00a0applications.\u00a0 If you wish to use this, please contact your account manager.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today&#8217;s news is full of stories about increased cyber-threats in NZ &#8211; Cyber attacks against Kiwibank, ANZ, NZ Post, MetService &#8211; experts see lockdown link &#8211; NZ Herald We&#8217;ve seen several days of issues caused by these &#8220;DDOS&#8221; attacks. &nbsp; Overnight, another cyber-threat snuck through It is a zero day exploit of Microsoft MSHTML Remote [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":7253,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-7836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/7836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7836"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/7836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}