Middlebury ITS Information Security is currently investigating indications that members of the Middlebury community are using iOS apps infected with the recently discovered XCodeGhost malware.
XCodeGhost-infected apps can potentially steal private information and even launch phony authentication dialogues that can be used to attempt to steal usernames and passwords. Despite this capability, no information has yet come to light indicating that the infected apps were used for malicious purposes, such as harvesting personally identifiable information or stealing passwords
The majority of the XCodeGhost-infected apps were authored by Chinese developers who were tricked into downloading fake Apple development libraries. Therefore, the greatest impact of the XCodeGhost appears to be in China. Some apps have been identified, however, that have world-wide use, including WeChat, Baidu, and others.
If you have an iOS device, our recommendation is that you remove from the device any apps known to be compromised with XCodeGhost. Download and reinstall the app from the Apple App Store once a fixed version has been made available.
ITS has begun enabling new, proactive anti-spam and anti-phishing email filters intended to improve the filtering of unsolicited and unwanted messages, by leveraging external reputation-based lists of email servers that have been flagged for sending spam and/or malicious email.
We’ve had the new filters in “Tag” mode since October 2014, so we’re confident that they are accurate and we’ll be closely monitoring incoming mail queues during the days after the change. Still, there is a possibility that someone trying to sending you email will have their message blocked, if their email servers have been flagged for sending spam and/or malicious email. The sender, in such cases, will receive an email advising them that their message could not be delivered.
If you encounter such as scenario, (i.e. a legitimate sender is trying to email you, but the message is being blocked by Middlebury’s email servers), or you have noticed legitimate messages recently having been incorrectly tagged as [SPAM?], please contact the ITS Help Desk at email@example.com and we will help you identify and resolve the issue.
College-managed Windows computers which have Sophos EndPoint Security suite installed have automatically received a Sophos update to version 10.3.x. This update requires a reboot of the computer to complete.
Middlebury’s software management application, (KACE), may display a “desktop alert” message requesting that your computer be rebooted to complete the Sophos update. This is a legitimate and valid alert! If you see this KACE “desktop alert” message, please save your files and restart your computer as soon as possible, thank you.
As you may have read in mainstream news media outlets, a vulnerability was recently discovered in the Bourne Again Shell (Bash) component of Unix-based operating systems. This vulnerability could allow an attacker to execute shell commands through shell environment variables. It has also been leveraged for denial of service attacks and other malicious activity.
ITS has already patched relevant local systems and is expecting vendors to patch any relevant externally-hosted systems. There is no evidence to suggest that Middlebury assets have been compromised.
As you may have read in mainstream news media outlets, a security vulnerability was recently discovered in Internet Explorer which could allow a remote attacker to execute code on a compromised system. This vulnerability is being actively exploited through Flash-enabled web sites. The vulnerability allows an attacker to execute code on the compromised system and gain access with the same level of permissions as the system user.
Microsoft is releasing patches to address this vulnerability. Middlebury’s network has enhanced security protections already in place.
Here are some protective steps that you can take on your own:
As you may have read in mainstream news media outlets, a vulnerability was recently discovered in certain versions of OpenSSL which could allow a remote attacker access to sensitive data on certain types of servers.
LIS has already patched relevant local systems and is working with vendors to ensure that any relevant externally-hosted systems are similarly patched. There is no evidence to suggest that Middlebury account credentials have been compromised.
Google has announced that all Google Apps services are getting a new sign-in page. This change will be rolled out to the Middlebury Google Apps instance by March 1st, 2014.
The new sign-in page requires users to sign in with their full email address, like this…
The new sign-in page is intended to provide a streamlined and cohesive sign-in experience for all users, an account chooser that makes it easy to switch between Google accounts, and security enhancements, including advanced bot detection and improved account hijacking protection.
The Middlebury campus community can find out what’s happening with global IT trends with access to research, news analysis and trends from Gartner Inc.
Gartner, Inc. (NYSE: IT) is the world’s leading information technology research and advisory company. Middlebury has a campus subscription to Gartner’s online research database. To access Gartner, simply visit http://go.middlebury.edu/gartner-login and authenticate using your Middlebury username and password.
Students can benefit by using Gartner to find research for assignments, learn where IT is headed and how it will shape our world, discover an area of interest, or even get ideas on careers. Gartner research enriches the educational experience by providing timely, objective real-world examples and content.
Faculty & Staff can benefit by using Gartner to stay current on IT industry trends. Gartner provides insight to the application of technology to real-world problems and enables understanding of the long-term trends and issues that current and future IT decision makers will face.
Should you have any problems accessing this resource or have any questions pertaining to Gartner research, please contact Chris Norris.