Connect with us

Press Release

Heroku acknowledges that a cyberattack resulted in the theft of user credentials.

Published

on

Heroku acknowledges that a cyberattack resulted in the theft of user credentials.

The GitHub integration OAuth tokens that were taken last month also contributed to the vulnerability of an internal client database, according to a recent statement from Heroku.

The cloud platform, which is owned by Salesforce, acknowledged that the same compromised token was utilised by attackers to steal client credentials that had been hashed and salted from “a database.”

Following yesterday’s contact between BleepingComputer and Salesforce, Heroku released an update.

Even though BleepingComputer doesn’t have any OAuth integrations that leverage Heroku apps or GitHub, we unexpectedly received a password reset email from Heroku, like many other users. This suggested that there was another reason for these password resets.

Forced password resets are explained by Heroku.
Following the security breach from last month, Heroku began this week forcing password resets for a portion of its user accounts without providing a detailed justification.

Some Heroku users received emails on Tuesday evening informing them that their account passwords would be changed as a result of the security breach, with the subject line “Heroku security notification – resetting user account passwords on May 4, 2022.” The email noted that the reset will also invalidate all API access tokens and force users to create new ones.

However, the original security problem being discussed involves threat actors stealing OAuth tokens given to Heroku and Travis-CI and utilising them to retrieve data from secure GitHub repositories belonging to a variety of companies, including npm.

According to a previous statement from GitHub, “On April 12, GitHub Security started an investigation that uncovered evidence that an attacker exploited stolen OAuth user tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, to download data from dozens of organisations, including npm.”

These tokens had previously been used by the OAuth integrations of the Travis-CI and Heroku platforms to link with GitHub and release apps.

Threat actors could access and download data from GitHub repositories belonging to users who gave their accounts permission to the stolen Heroku or Travis CI OAuth apps by stealing these OAuth tokens. Notably, the issue had no effect on GitHub’s infrastructure, processes, or private repositories.

But up until this point, it was still unclear why Heroku would need to reset some user account passwords.

It turns out that threat actors were able to access Heroku’s internal database of client accounts through the compromised token for a Heroku machine account:

Heroku updates its security warning: “Our research also discovered that the same compromised token was used to access a database and exfiltrate the hashed and salted passwords for users’ accounts.”

“Because of this, Salesforce is making sure that all Heroku user passwords are changed and that any potentially vulnerable credentials are updated. We have added more detections and rotated internal Heroku credentials. We are still looking into the token compromise’s origin.”

A reader of YCombinator Hacker News suggested that the “database” being discussed might be what was formerly known as “core-db.”

Craig Kerstiens of the PostgreSQL platform CrunchyData, a former employee of Heroku, is the reader in question.

According to Kerstiens, the internal database is referenced in the most recent report as “a database.”

“It appears [the attacker] had access to internal systems, but I don’t want to guess too much. It was discovered, noted, and reported to Heroku by GitHub. You can’t argue against the need for further clarity, but it would be wise to follow up with Salesforce on that.”

After being contacted by BleepingComputer, Kerstiens acknowledged writing these statements.

Clients refer to ambiguous disclosure as a “train crash.”
In its initial statement about the security breach, Heroku said that accounts using compromised OAuth tokens from Heroku had exploited GitHub repositories to gain unauthorised access.

The business has previously said that “The compromised tokens could give the threat actor access to customer GitHub repos, but not customer Heroku accounts.”

However, the password reset emails legitimately raised consumer worries that Heroku’s investigation might have turned up additional malicious activity by the threat actors that wasn’t being made public.

The disclosure was termed “a complete train wreck and a case study on how not to interact with your customers,” by some YCombinator Hacker News readers.

Heroku has started to shed some light on the issue in an effort to be more open with the community.

According to Heroku, “We embrace transparency and recognise that our customers are looking for a deeper understanding of the implications of this incident and our reaction thus far.”

The cloud platform added that it had reached a stage where more material could be disclosed without jeopardising the ongoing investigation after cooperating with GitHub, threat intelligence suppliers, industry partners, and law enforcement during the inquiry:

A different third-party integrator, Travis-CI, revealed, however, that no client data had been harmed by the event on the business day that followed GitHub’s initial notice.

Users of Heroku are urged to keep checking the security notification page for updates concerning the incident.

 

Continue Reading

Press Release

Benefits of Using a Software Application for Doctor Online Reputation Management

Published

on

Benefits of Using a Software Application for Doctor Online Reputation Management

For this reason, a lot of people are beginning to use software to manage their internet business reputation. This is done to make sure they have all the information they require about a clinic, hospital, or other establishment before taking a person there. However, patients must use this software package in order for this to happen. to ensure that they are providing reviews and compliments for the technique they examined. All of these advantages and benefits come from using this monitoring software application for your clinical procedure or company.

It encourages the marketing of a facility or clinical practise.

The fact that it encourages the marketing of the medical practise or establishment is one of the most important reasons why using online reputation monitoring in the healthcare industry is a great idea. However, this will only help the company if you receive positive reviews, recommendations, and comments.

It promotes advertising and marketing because the software will make it much easier for people to find the practise online if they are looking for it. After that, they may choose if this is something they should consider employing or not. However, it will also include negative remarks and also evaluations.

letting your patients know how your practise is doing

When you employ physician internet reputation monitoring software, you can be sure that you are telling your clients the truth about your practise. enabling them to express exactly how they perceive the technique or clinic in their own words. And they believe that what they believe can change the approach to make it much better for the patients.

Because you aren’t the one waiting in the waiting room, this is a great concept. In addition, they might have access to information that you do not. Giving your people a voice in your strategy can be a smart idea because of this. When they create an online evaluation, they can accomplish this.

Make it easier for others to find you online.

Generally speaking, this benefit is the same as the marketing and advertising benefit. Due to the doctor’s online reputation monitoring software, specifically a Google search, people can find your approach online. making it simpler for new customers to find your approach.

However, they will also find this to be simpler if you receive a lot of negative feedback. This is why, if any of your current patients are leaving comments, you need to make sure they are all good. Regardless of whether there are techniques that can’t be found online, this can help or hurt your practise.

provides a mechanism for you to communicate with people

It gives you a way to communicate with people thanks to the medical online Amazeful reputation management software. Make sure potential customers can tell that you genuinely value your clients’ experiences in your waiting area and with your service.

The only thing to keep in mind is that, under any circumstances, you should never comment negatively on someone. The only thing that can determine whether you’ll get new patients or not is what you do.

enabling you to improve the flaws in your approach.

Continue Reading

Press Release

You become infected with RedLine malware through fake Windows 11 upgrade installers.

Published

on

You become infected with RedLine malware through fake Windows 11 upgrade installers.

Users of Windows 10 have begun to get phoney Windows 11 upgrade installers, tricking them into downloading and running RedLine stealer software.

The attacks took place at the same time that Microsoft announced the broad deployment phase for Windows 11. As a result, the attackers were well-prepared for this move and waited for the ideal time to maximise the effectiveness of their operation.

As the most extensively used password, browser cookie, credit card, and cryptocurrency wallet information thief at the moment, RedLine stealer infections can have serious negative effects on the victims.

The initiative

The attackers exploited the “windows-upgraded.com” domain for the malware distribution portion of their campaign, according to HP experts who have detected this effort.

When a visitor selected the “Download Now” button on the website, a 1.5 MB ZIP archive with the name “Windows11InstallationAssistant.zip” was downloaded directly from a Discord CDN. The website looks to be an official Microsoft website.

Decompressing the file yields a folder with a size of 753MB and a remarkable compression ratio of 99.8%, which was made possible by the executable’s inclusion of padding.

An encoded parameter starts a PowerShell process when the victim runs the programme in the folder.

A.jpg file is then retrieved from a distant web server when a cmd.exe process with a 21-second timeout has finished running.

The DLL in this file is organised in reverse, maybe to avoid detection and analysis.

The first process then loads the DLL and swaps it out for the current thread context. That DLL is a RedLine stealer payload that uses a TCP connection to communicate with the command-and-control server to receive instructions on what malicious operations should be performed next on the recently compromised system.

Outlook
Nothing prevents the actors from registering a new domain and continuing their campaign even though the distribution site is currently unavailable. In fact, it’s quite likely that this is already taking place in nature.

Due to hardware compatibility issues, many Windows 10 customers are unable to download Windows 11 via the official distribution channels. Malware operators see this as a great opportunity to recruit new victims.

The strategies disclosed by HP are not surprising at this time, as threat actors are also use Windows’ legitimate update clients to execute malicious code on compromised Windows systems, as BleepingComputer discovered in January.

Remember that these risky websites are advertised through forum postings, posts on social media, and instant messages, so only rely on the official Windows upgrade system alerts.

Continue Reading

Press Release

Resources: Facebook will certainly introduce a suite of audio items on Monday, consisting of a Clubhouse-like app, a podcast exploration item linked to Spotify, and much more (Peter Kafka/Vox).

Published

on

suite of audio items

Sources: Facebook will announce a suite of audio products on Monday, including a Clubhouse-like app, a podcast discovery product connected to Spotify, and more (Peter Kafka/Vox)

Peter Kafka / Vox:
Sources: Facebook will announce a suite of audio products on Monday, including a Clubhouse-like app, a podcast discovery product connected to Spotify, and more  —  Announcements are coming on Monday, but some products won’t show up for a while.  —  Facebook wants you to start talking and listening, on Facebook.

Continue Reading

Trending