KeyPass is essentially a simple database containing passwords. Both vulnerabilities are in the implementation of the SRP-6(a) key exchange protocol. The update announcement is light on the details, but thankfully we have the full story directly from, the student that discovered the vulnerabilities. KeePass released an update this week addressing a couple flaws in the KeePassRPC service. Let’s hope Garmin learned their lesson, and are shoring up their security practices. The attack was apparently very widespread through Garmin’s network, as it seems that both workstations and public facing servers were impacted. A leaked decryptor program confirms that they received the decryption key. It’s suspected that Garmin actually paid the ransom. It’s reported that the requested ransom was an eye-watering $10 million. After four days, Garmin was able to start the process of restoring the services. Thanks to information leaked by Garmin employees, we know that this multi-day outage was caused by the Wastedlocker ransomware campaign. On July 23, multiple services related to Garmin were taken offline, including their call center and aviation related services.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |