<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news June 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 17 Apr 2026 22:58:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717708</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jul 2021 19:36:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717708</guid>
		<description><![CDATA[Huawei dev flamed for &#039;useless&#039; Linux kernel code contributions
Time-wasting commits called out as effort to burnish submission metrics
https://www.theregister.com/2021/06/26/linux_kernel_contributor_from_huawei/]]></description>
		<content:encoded><![CDATA[<p>Huawei dev flamed for &#8216;useless&#8217; Linux kernel code contributions<br />
Time-wasting commits called out as effort to burnish submission metrics<br />
<a href="https://www.theregister.com/2021/06/26/linux_kernel_contributor_from_huawei/" rel="nofollow">https://www.theregister.com/2021/06/26/linux_kernel_contributor_from_huawei/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717707</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jul 2021 19:35:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717707</guid>
		<description><![CDATA[Microsoft says its customer support tools were compromised by the SolarWinds hackers
It says the group used the tools for targeted attacks
https://www.theverge.com/2021/6/25/22551193/microsoft-customer-support-tools-solarwinds-hackers-nobelium]]></description>
		<content:encoded><![CDATA[<p>Microsoft says its customer support tools were compromised by the SolarWinds hackers<br />
It says the group used the tools for targeted attacks<br />
<a href="https://www.theverge.com/2021/6/25/22551193/microsoft-customer-support-tools-solarwinds-hackers-nobelium" rel="nofollow">https://www.theverge.com/2021/6/25/22551193/microsoft-customer-support-tools-solarwinds-hackers-nobelium</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717705</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jul 2021 19:33:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717705</guid>
		<description><![CDATA[Microsoft says new breach discovered in probe of suspected SolarWinds hackers
The company said it had found the compromise during its response to hacks by a team it identifies as responsible for earlier major breaches at SolarWinds and Microsoft.
https://www.moneycontrol.com/news/world/microsoft-says-new-breach-discovered-in-probe-of-suspected-solarwinds-hackers-7089811.html]]></description>
		<content:encoded><![CDATA[<p>Microsoft says new breach discovered in probe of suspected SolarWinds hackers<br />
The company said it had found the compromise during its response to hacks by a team it identifies as responsible for earlier major breaches at SolarWinds and Microsoft.<br />
<a href="https://www.moneycontrol.com/news/world/microsoft-says-new-breach-discovered-in-probe-of-suspected-solarwinds-hackers-7089811.html" rel="nofollow">https://www.moneycontrol.com/news/world/microsoft-says-new-breach-discovered-in-probe-of-suspected-solarwinds-hackers-7089811.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717569</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:48:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717569</guid>
		<description><![CDATA[Major Linux RPM problem uncovered &#124; ZDNet
https://www.zdnet.com/article/major-linux-rpm-problem-uncovered/ 

Red Hat has used RPM for software package distribution for decades, but we now know RPM contained a nasty hidden security bug since Day One. It&#039;s now been unveiled and a repair patch has been submitted.

In 1995, when Linux 1.x was the hot new Linux kernel, early Red Hat founding programmers Marc Ewing and Erik Troan created RPM. This software package management system became the default way to distribute software for Red Hat Linux-based distributions such as Red Hat Enterprise Linux (RHEL), CentOS Stream, AlmaLinux OS, and Rocky Linux. Unfortunately, hidden within its heart is a major security hole. 

Dmitry Antipov, a Linux developer at CloudLinux, AlmaLinux OS&#039;s parent company, first spotted the problem in March 2021. Antipov found that RPM would work with unauthorized RPM packages. This meant that unsigned packages or packages signed with revoked keys could silently be patched or updated without a word of warning that they might not be kosher.

Why? Because RPM had never properly checked revoked certificate key handling. 

How could this be? It&#039;s because RPM dates back from the days when getting code to work was the first priority and security came a long way second. 

Things have changed. Security is a much higher priority. 

Antipov, wearing his hat as a TuxCare (CloudLinux&#039;s KernelCare and Extended Lifecycle Support) team member, has submitted a patch to fix this problem. As Antipov explained in an interview: &quot;The problem is that both RPM and DNF, [a popular software package manager that installs, updates, and removes packages on RPM-based Linux distributions]  do a check to see if the key is valid and genuine but not expired, but not for revocation. As I understand it, all the distribution vendors have just been lucky enough to never have been hit by this.&quot;]]></description>
		<content:encoded><![CDATA[<p>Major Linux RPM problem uncovered | ZDNet<br />
<a href="https://www.zdnet.com/article/major-linux-rpm-problem-uncovered/" rel="nofollow">https://www.zdnet.com/article/major-linux-rpm-problem-uncovered/</a> </p>
<p>Red Hat has used RPM for software package distribution for decades, but we now know RPM contained a nasty hidden security bug since Day One. It&#8217;s now been unveiled and a repair patch has been submitted.</p>
<p>In 1995, when Linux 1.x was the hot new Linux kernel, early Red Hat founding programmers Marc Ewing and Erik Troan created RPM. This software package management system became the default way to distribute software for Red Hat Linux-based distributions such as Red Hat Enterprise Linux (RHEL), CentOS Stream, AlmaLinux OS, and Rocky Linux. Unfortunately, hidden within its heart is a major security hole. </p>
<p>Dmitry Antipov, a Linux developer at CloudLinux, AlmaLinux OS&#8217;s parent company, first spotted the problem in March 2021. Antipov found that RPM would work with unauthorized RPM packages. This meant that unsigned packages or packages signed with revoked keys could silently be patched or updated without a word of warning that they might not be kosher.</p>
<p>Why? Because RPM had never properly checked revoked certificate key handling. </p>
<p>How could this be? It&#8217;s because RPM dates back from the days when getting code to work was the first priority and security came a long way second. </p>
<p>Things have changed. Security is a much higher priority. </p>
<p>Antipov, wearing his hat as a TuxCare (CloudLinux&#8217;s KernelCare and Extended Lifecycle Support) team member, has submitted a patch to fix this problem. As Antipov explained in an interview: &#8220;The problem is that both RPM and DNF, [a popular software package manager that installs, updates, and removes packages on RPM-based Linux distributions]  do a check to see if the key is valid and genuine but not expired, but not for revocation. As I understand it, all the distribution vendors have just been lucky enough to never have been hit by this.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717568</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:45:23 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717568</guid>
		<description><![CDATA[NCSC-FI Twitterissä:
&quot;Kriittinen taustatulostuspalvelun (Print Spooler) haavoittuvuus, poista taustatulostuspalvelu käytöstä toimialueen ohjauskoneella (domain controller). Julkaisemme 1.7. suomenkielisen haavoittuvuustiedotteen 19/2021, stay tuned ...
https://mobile.twitter.com/CERTFI/status/1410233980264370183 
Lyhytlinkki domainiin tenable.com https://t.co/0klvx11OgI?amp=1

Hacker Fantastic Twitterissä:
&quot;Fully patched Windows 2019 domain controller, popped with 0day exploit (CVE-2021-1675) from a regular Domain User&#039;s account giving full SYSTEM privileges. Disable &quot;Print Spooler&quot; service on servers that do not require it....
https://mobile.twitter.com/hackerfantastic/status/1410100394492112898

NCSC-FI VULNERABILITIES SUMMARY 2021-06-30:
Public Windows PrintNightmare 0-day exploit allows domain takeover
https://www.bleepingcomputer.com/news/security/public-windows-printnightmare-0-day-exploit-allows-domain-takeover/
Classification: Critical, Solution: Mitigation, Exploit: Yes
Another vulnerability, CVE-2021-1675 regarding Print Spooler, was
fixed in the Microsoft June update. Researchers from Chinese security
company Sangfor, decided to release their writeup and demo exploit
called PrintNightmareand believed to release information about the
same issue. As it turns out PrintNightmare is not the same as
CVE-2021-1675. PrintNightmare PoC was released to Github and even if
the original was removed, it was already cloned and is still
available. This vulnerability is critical and workaround should be
implemented immediately.]]></description>
		<content:encoded><![CDATA[<p>NCSC-FI Twitterissä:<br />
&#8220;Kriittinen taustatulostuspalvelun (Print Spooler) haavoittuvuus, poista taustatulostuspalvelu käytöstä toimialueen ohjauskoneella (domain controller). Julkaisemme 1.7. suomenkielisen haavoittuvuustiedotteen 19/2021, stay tuned &#8230;<br />
<a href="https://mobile.twitter.com/CERTFI/status/1410233980264370183" rel="nofollow">https://mobile.twitter.com/CERTFI/status/1410233980264370183</a><br />
Lyhytlinkki domainiin tenable.com <a href="https://t.co/0klvx11OgI?amp=1" rel="nofollow">https://t.co/0klvx11OgI?amp=1</a></p>
<p>Hacker Fantastic Twitterissä:<br />
&#8220;Fully patched Windows 2019 domain controller, popped with 0day exploit (CVE-2021-1675) from a regular Domain User&#8217;s account giving full SYSTEM privileges. Disable &#8220;Print Spooler&#8221; service on servers that do not require it&#8230;.<br />
<a href="https://mobile.twitter.com/hackerfantastic/status/1410100394492112898" rel="nofollow">https://mobile.twitter.com/hackerfantastic/status/1410100394492112898</a></p>
<p>NCSC-FI VULNERABILITIES SUMMARY 2021-06-30:<br />
Public Windows PrintNightmare 0-day exploit allows domain takeover<br />
<a href="https://www.bleepingcomputer.com/news/security/public-windows-printnightmare-0-day-exploit-allows-domain-takeover/" rel="nofollow">https://www.bleepingcomputer.com/news/security/public-windows-printnightmare-0-day-exploit-allows-domain-takeover/</a><br />
Classification: Critical, Solution: Mitigation, Exploit: Yes<br />
Another vulnerability, CVE-2021-1675 regarding Print Spooler, was<br />
fixed in the Microsoft June update. Researchers from Chinese security<br />
company Sangfor, decided to release their writeup and demo exploit<br />
called PrintNightmareand believed to release information about the<br />
same issue. As it turns out PrintNightmare is not the same as<br />
CVE-2021-1675. PrintNightmare PoC was released to Github and even if<br />
the original was removed, it was already cloned and is still<br />
available. This vulnerability is critical and workaround should be<br />
implemented immediately.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717567</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:42:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717567</guid>
		<description><![CDATA[Putin&#039;s Phone-in Hit by &#039;Cyberattacks&#039;
https://www.securityweek.com/putins-phone-hit-cyberattacks

A televised phone-in with Russian President Vladimir Putin Wednesday was targeted by &quot;powerful&quot; cyberattacks, the state-run Rossiya 24 network which broadcast the event said.

Shown on Kremlin-friendly media, the annual session with Putin sees the president field in real time queries submitted by Russians throughout the country.

This year&#039;s phone-in on Wednesday, which lasted nearly four hours, repeatedly faced connection problems, particularly during calls from remote regions.

&quot;Our digital systems are right now facing attacks, powerful DDoS attacks,&quot; a Rossiya-24 presenter told Putin, after a caller from the Kuzbass region in southwestern Siberia experienced connection issues.

&quot;Are you joking? Seriously?&quot; Putin responded.

&quot;Turns out we have hackers in Kuzbass,&quot; he quipped.

Russia&#039;s largest telecommunications provider, Rostelecom, confirmed the attacks to news agencies, saying that measures were being taken to &quot;block these illegitimate activities&quot;]]></description>
		<content:encoded><![CDATA[<p>Putin&#8217;s Phone-in Hit by &#8216;Cyberattacks&#8217;<br />
<a href="https://www.securityweek.com/putins-phone-hit-cyberattacks" rel="nofollow">https://www.securityweek.com/putins-phone-hit-cyberattacks</a></p>
<p>A televised phone-in with Russian President Vladimir Putin Wednesday was targeted by &#8220;powerful&#8221; cyberattacks, the state-run Rossiya 24 network which broadcast the event said.</p>
<p>Shown on Kremlin-friendly media, the annual session with Putin sees the president field in real time queries submitted by Russians throughout the country.</p>
<p>This year&#8217;s phone-in on Wednesday, which lasted nearly four hours, repeatedly faced connection problems, particularly during calls from remote regions.</p>
<p>&#8220;Our digital systems are right now facing attacks, powerful DDoS attacks,&#8221; a Rossiya-24 presenter told Putin, after a caller from the Kuzbass region in southwestern Siberia experienced connection issues.</p>
<p>&#8220;Are you joking? Seriously?&#8221; Putin responded.</p>
<p>&#8220;Turns out we have hackers in Kuzbass,&#8221; he quipped.</p>
<p>Russia&#8217;s largest telecommunications provider, Rostelecom, confirmed the attacks to news agencies, saying that measures were being taken to &#8220;block these illegitimate activities&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717563</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:38:07 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717563</guid>
		<description><![CDATA[&quot;Fully patched Windows 2019 domain controller, popped with 0day exploit (CVE-2021-1675) from a regular Domain User&#039;s account giving full SYSTEM privileges. Disable &quot;Print Spooler&quot; service on servers that do not require it,&quot; according to one researcher tracking the issue
https://twitter.com/hackerfantastic/status/1410100394492112898]]></description>
		<content:encoded><![CDATA[<p>&#8220;Fully patched Windows 2019 domain controller, popped with 0day exploit (CVE-2021-1675) from a regular Domain User&#8217;s account giving full SYSTEM privileges. Disable &#8220;Print Spooler&#8221; service on servers that do not require it,&#8221; according to one researcher tracking the issue<br />
<a href="https://twitter.com/hackerfantastic/status/1410100394492112898" rel="nofollow">https://twitter.com/hackerfantastic/status/1410100394492112898</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717562</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:36:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717562</guid>
		<description><![CDATA[Windows Admins Scrambling to Contain &#039;PrintNightmare&#039; Flaw Exposure
https://www.securityweek.com/windows-admins-scrambling-contain-printnightmare-flaw-exposure

Windows network administrators are scrambling to contain the fallout from the release of proof-of-concept code for a nasty Windows Print Spooler vulnerability that exposes Windows servers to remote code execution attacks.

The issue is causing major headaches in security research circles because the exploit targets CVE-2021-1675, a vulnerability that was patched by Microsoft on June 8 and originally misdiagnosed as a low-risk privilege escalation issue.]]></description>
		<content:encoded><![CDATA[<p>Windows Admins Scrambling to Contain &#8216;PrintNightmare&#8217; Flaw Exposure<br />
<a href="https://www.securityweek.com/windows-admins-scrambling-contain-printnightmare-flaw-exposure" rel="nofollow">https://www.securityweek.com/windows-admins-scrambling-contain-printnightmare-flaw-exposure</a></p>
<p>Windows network administrators are scrambling to contain the fallout from the release of proof-of-concept code for a nasty Windows Print Spooler vulnerability that exposes Windows servers to remote code execution attacks.</p>
<p>The issue is causing major headaches in security research circles because the exploit targets CVE-2021-1675, a vulnerability that was patched by Microsoft on June 8 and originally misdiagnosed as a low-risk privilege escalation issue.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717561</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:36:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717561</guid>
		<description><![CDATA[Authorities Take Down DoubleVPN Service for Aiding Cybercriminals
https://www.securityweek.com/authorities-take-down-doublevpn-service-aiding-cybercriminals

Law enforcement agencies in Europe, the US, and Canada on Tuesday announced the takedown of DoubleVPN, a virtual private network (VPN) service that allegedly helped cybercriminals conduct nefarious activities.

As part of the takedown operation, servers across the world were seized to ensure the disruption of the DoubleVPN service. Furthermore, the service’s web domains now display a law enforcement splash page.

“On 29th of June 2021, law enforcement took down DoubleVPN. Law enforcement gained access to the servers of DoubleVPN and seized personal information, logs and statistics kept by DoubleVPN about all of its customers. DoubleVPN’s owners failed to provide the services they promised,” the splash page reads.

Advertised on underground cybercrime forums for both Russian and English speakers, the service was used by ransomware operators and phishing fraudsters to hide their real location and identity.]]></description>
		<content:encoded><![CDATA[<p>Authorities Take Down DoubleVPN Service for Aiding Cybercriminals<br />
<a href="https://www.securityweek.com/authorities-take-down-doublevpn-service-aiding-cybercriminals" rel="nofollow">https://www.securityweek.com/authorities-take-down-doublevpn-service-aiding-cybercriminals</a></p>
<p>Law enforcement agencies in Europe, the US, and Canada on Tuesday announced the takedown of DoubleVPN, a virtual private network (VPN) service that allegedly helped cybercriminals conduct nefarious activities.</p>
<p>As part of the takedown operation, servers across the world were seized to ensure the disruption of the DoubleVPN service. Furthermore, the service’s web domains now display a law enforcement splash page.</p>
<p>“On 29th of June 2021, law enforcement took down DoubleVPN. Law enforcement gained access to the servers of DoubleVPN and seized personal information, logs and statistics kept by DoubleVPN about all of its customers. DoubleVPN’s owners failed to provide the services they promised,” the splash page reads.</p>
<p>Advertised on underground cybercrime forums for both Russian and English speakers, the service was used by ransomware operators and phishing fraudsters to hide their real location and identity.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/06/01/cyber-security-news-june-2021/comment-page-7/#comment-1717560</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jul 2021 06:35:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188798#comment-1717560</guid>
		<description><![CDATA[Police seize DoubleVPN data, servers, and domain https://blog.malwarebytes.com/cybercrime/2021/06/police-seize-doublevpn-data-servers-and-domain/
A coordinated effort between global law enforcement agenciesled by the Dutch National Policeshut down a VPN service that was advertised on cybercrime forums. The VPN company promised users the ability to
double- and triple-encrypt their web traffic to obscure their location and identity.]]></description>
		<content:encoded><![CDATA[<p>Police seize DoubleVPN data, servers, and domain <a href="https://blog.malwarebytes.com/cybercrime/2021/06/police-seize-doublevpn-data-servers-and-domain/" rel="nofollow">https://blog.malwarebytes.com/cybercrime/2021/06/police-seize-doublevpn-data-servers-and-domain/</a><br />
A coordinated effort between global law enforcement agenciesled by the Dutch National Policeshut down a VPN service that was advertised on cybercrime forums. The VPN company promised users the ability to<br />
double- and triple-encrypt their web traffic to obscure their location and identity.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
