News

All News

October 17, 2017

Researchers have discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks.  This includes everything from computers, tablets, phones, home wireless routers and any device that supports WPA2 over Wi-Fi.

While details are still emerging, not all vendors have released patches as of yet.  So, in some cases, there will be little users can do until patches are released.   An attacker needs to be in range of an access-point to leverage this attack.  

September 6, 2017

Summary

A critical vulnerability has been discovered in the Apache Struts web application framework for Java web applications. A remote code execution attack is possible when using the Apache Struts REST plugin with XStream handler to deserialise XML requests. [1]

Impact

Attackers can execute arbitrary code remotely by exploiting this vulnerability.

July 17, 2017

The bSecure team invites you to join us for a series of Town Hall events this month. All are welcome and existing Campus firewall customers are strongly encouraged to attend.

What?

The purpose of these Town Hall events is to introduce Campus to the bSecure project and its team. Topics will include:

June 14, 2017

Summary

A remote code execution vulnerability exists when Windows Search handles objects in memory.  This can be exploited by an attacker sending a specially crafted SMB message to the Windows Search service. [4]

Due to recent nation-state activity and the elevated risk of potential cyber attacks, Microsoft has released security updates for older unsupported versions of Windows for this issue as well as other high-severity fixes in the June patch release. [1]

June 1, 2017

bSecure is the new initiative from the Network Operations & Services and Information Security & Policy teams to replace legacy firewalls and VPN, and provide proactive security technologies to Campus.

You can access all bSecure project information at http://bsecure.berkeley.edu or https://security.berkeley.edu/projects/bsecure.

May 25, 2017

Summary

The samba team has released a patch for a Remote Code Execution bug that affects all versions between 3.5.0 and 4.6.3/4.5.9/4.4.13. This vulnerability will allow a malicious attacker to upload a library to a writable share then cause the server to execute that library. [1] Patches are available from the samba.org. [2]

Impact

May 3, 2017

To the campus community,

On Wednesday, May 3rd, we learned of a global phishing attack targeting the nearly 1 billion people who use Google email, including members of the campus community. You may have received an email that a Google Doc had been shared with you by a person you know. These were fraudulent emails sent as part of that cyber attack.

XXX has invited you to view the following document: Open in Docs

April 13, 2017

This message, appearing to come from the HR department, was successful at convincing several campus recipients to click on the link provided and enter their Calnet credentials. The link was directed to a fake Calnet login page, the account name and password entered on this page would be compromised.

April 1, 2017

Dear Student, Your access to your library account is expiring soon due to inactivity. To continue to have access to the library services, you must reactivate your account. For this purpose, click the web address below or copy and paste it into your web browser. A successful login will activate your account and you will be redirected to your library profile. https://auth.berkeley.edu/cas/login?service=https%3a%2f% If you are not able to login, please contact at xxxxx@berkeley.edu for immediate assistance.

March 9, 2017

Summary

A critical vulnerability has been discovered and released in the Apache Struts 2 framework. Patches are available from Apache. [1]

Impact

This vulnerability allows for unauthenticated, remote code execution on the server. Further, there are at least two known public exploits for this vulnerability [2] and ISP has already started to see scanning and exploit attempts against campus systems.

February 3, 2017

Summary

WordPress has fixed several critical flaws in its content management system, addressing cross-site scripting and sql injection bugs, along with a severe privilege escalation / content injection vulnerability. [1]

January 30, 2017

Hello, You just received a file through Dropbox Share Application. Please click below and log in to view file. View file Every time a friend installs Dropbox, we'll give both of you 1 GB of space for free! Need even more space? Upgrade your Dropbox and get 1 TB (1,000 GB) of space. Happy Dropboxing. - The Dropbox Team

January 25, 2017

A targeted phishing message was received on campus appearing as an expiration notice for access to bCourses. The message attempted to trick recipients to login with CalNet credentials to prevent access expiration

January 24, 2017

As tax season begins, W-2 wage statements have already begun to be made available online this week.  Last year, several convincing phishing messages were crafted by tax scammers and sent to Campus to trick victims into divulging personal information for criminal purposes.

These fraudsters use your stolen credentials and tax documents to commit identity theft, and file a fraudulent tax return with the IRS in order to collect a refund using your identity.

The Human Resources/Payroll Department has completed the final paystub changes for 2017 tax year. To view the changes to your paystub information and view/download your W-2 forms (2014 - 2016 tax years), go to: Adp Portal We hope you find the changes to your paystub information useful and welcome any comments you may have. Yours Sincerely, Danielle Carrel.

January 20, 2017

Campus printers have received unwanted printouts in recent weeks. Report any unwanted printouts to CSS-IT and Information Security and Policy.

January 3, 2017

Dear Customer, We could not deliver your item. You can review and print complete details of shipping duty on your order. Thanks

December 14, 2016

Good Morning Berkeley Family, Please read attached for an important announcement from Chancellor Nicholas B. Dirks Thanks, Nicholas B. Dirks Chancellor 1 attachment: shared Document.pdf

October 28, 2016

Dear User, Someone else was trying to use your Berkeley ID to sign into iCloud via a web browser. Date and Time: 28 October 2016, 1:38 PM Browser: Firefox Operating System: Windows Location:Thailand If the information above looks familiar, you can disregard this email. If you have not recently and believe someone may be trying to access your account, you should Click Here . Sincerely, Technical Support Team