Friday, January 27, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

IBM Cloud Vulnerability Exposed Users to Supply Chain Attacks

Researcher by Researcher
December 5, 2022
in Cybersecurity
0
IBM Cloud Vulnerability Exposed Users to Supply Chain Attacks
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


IBM recently patched a vulnerability in IBM Cloud Databases for PostgreSQL that could have exposed users to supply chain attacks.

The vulnerability has been named Hell’s Keychain by cloud security firm Wiz, whose researchers discovered the issue. It has been described by the company as a “first-of-its-kind supply-chain attack vector impacting a cloud provider’s infrastructure”.

“The vulnerability consists of a chain of three exposed secrets (Kubernetes service account token, private container registry password, CI/CD server credentials) coupled with overly permissive network access to internal build servers. This attack vector could allow malicious actors to remotely execute code in customers’ environments to read and modify the data stored in the PostgreSQL database,” Wiz said.

The exposed secrets could have been leveraged by an attacker to access IBM Cloud repositories that store software dependencies for PostgreSQL container images. The attacker could have altered trusted repositories and forced users’ PostgreSQL instances into running malicious code.

Hell's Keychain IBM Cloud supply chain vulnerability

IBM said in its advisory that the flaw has been patched and customers do not need to take any action as the fixes have been automatically applied. The tech giant has found no evidence of malicious exploitation.

The security hole has not been assigned a CVE identifier — as is typical for cloud vulnerabilities — but Wiz does maintain a database of vulnerabilities and other security issues affecting cloud services.

Wiz has published a blog post providing a detailed technical description of Hell’s Keychain.

“Hell’s Keychain reinforces the importance of proper secrets management, network controls, and tenant isolation, especially in large and complex cloud environments,” the cloud security firm said.

Related: Oracle Cloud Infrastructure Vulnerability Exposed Sensitive Data

Related: IBM Patches High-Severity Vulnerabilities in Cloud, Voice, Security Products

Related: ‘Sysrv’ Botnet Targeting Recent Spring Cloud Gateway Vulnerability

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:
Tags:





Source link

Related articles

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
Learn cutting-edge ethical hacking techniques for just $39.99

Learn cutting-edge ethical hacking techniques for just $39.99

January 27, 2023
Tags: AttackschaincloudexposedIBMsupplyusersvulnerability
Share76Tweet47

Related Posts

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
0

Authorities in the United States and Europe have announced the results of a major law enforcement operation targeting the Hive...

Learn cutting-edge ethical hacking techniques for just $39.99

Learn cutting-edge ethical hacking techniques for just $39.99

January 27, 2023
0

The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. Image: StackCommerce For...

U.S. Takes Down Hive Ransomware Infrastructure

U.S. Takes Down Hive Ransomware Infrastructure

January 27, 2023
0

The FBI, Europol, and law enforcement authorities from several European countries have disrupted the Hive ransomware group’s operations, seizing two...

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’

January 26, 2023
0

The FBI has at least temporarily dismantled the network of a prolific ransomware gang it infiltrated last year, saving victims...

Cybersecurity budgets aren’t matching cybersecurity challenges

Cybersecurity budgets aren’t matching cybersecurity challenges

January 26, 2023
0

A new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Multicast Domain Name System (mDNS) – Still Flooding?

Multicast Domain Name System (mDNS) – Still Flooding?

January 27, 2023
Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
Why your data is more valuable than you may realize

Why your data is more valuable than you may realize

January 27, 2023
Learn cutting-edge ethical hacking techniques for just $39.99

Learn cutting-edge ethical hacking techniques for just $39.99

January 27, 2023

Recent Posts

Multicast Domain Name System (mDNS) – Still Flooding?

Multicast Domain Name System (mDNS) – Still Flooding?

January 27, 2023
Industry Reactions to Hive Ransomware Takedown: Feedback Friday

Industry Reactions to Hive Ransomware Takedown: Feedback Friday

January 27, 2023
Why your data is more valuable than you may realize

Why your data is more valuable than you may realize

January 27, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved