• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Midsummer Security Indicators: Hot and Gloomy

    August 2, 2023 Alex Woodie

    The hot summer heat is smothering Americans like a tight polyester jacket these days. Also having big impacts on Americans are hackers, security vulnerabilities, spam, and malicious emails, which seem to be peaking with the seasonal fry.

    Security software company Securin scanned 8 million addressable IPs among US state government systems, and discovered 119,000 instances of high-risk services that could be easily exploited, according to a report released yesterday, dubbed “The State of Cybersecurity in America.”

    All told, Securin found 3,700 exposed databases (Db2 among them), 3,400 exposed Secure Shell (SSH) endpoints, 2,780 exposed File Transfer Protocol (FTP) systems, and 1,800 exposed Remote Desktop Protocol (RDP) endpoints in the scanned state government systems, the report found.

    Image courtesy Securin

    “A significant number of internal non-production systems are accessible from the Internet, creating easy opportunities,” Securin says in the report. “Several domains contain assets with unpatched high-risk vulnerabilities known to be previously exploited by ransomware gangs.”

    It’s hot enough to fry an egg on the sidewalk in Arizona this summer, but that’s not preventing J.R. Sloan, the chief information officer for the state government, from locking down digital endpoints to minimize the chance of hackers getting in.

    “As cyber threats continue to evolve, the State of Arizona collaborates with all industries and all levels of government to share intelligence data, best practices, learn from past events, and continue to find new ways to protect the entire state from potential attacks,” Sloan says in the Securin report.

    The IBM i server itself has been hit with several security vulnerabilities this summer. IBM disclosed the first vulnerability, which involves a flaw in the Distributed Data Management (DDM) system that enables unauthenticated users to remotely run CL or PASE commands, on June 30. Originally given a CVSS base score of 5.6, IBM revisited the matter and gave it a much higher 8.6 score later.

    A second pair of IBM i security flaws were revealed by IBM on July 16. Those flaws, which impacted Facsimile Support for i and Performance Tools for i, both were given a CVSS base score of 8.4. These two flaws, like the DDM flaw, were discovered by Silent Signal, an established Hungarian security company that has recently taken an interest in IBM i.

    A chilling gap between the perception of good security practices in hybrid cloud environments and the cold, hard reality was one piece of unwelcome news exposed in a new Gigamon report.

    In the “Hybrid Cloud Security Survey,” Gigamon found that hybrid cloud architectures are here to stay, citing Forrester analysts who say 72 percent of companies have adopted this deployment methodology. A whopping 94 percent of CISOs with hybrid cloud apparatuses say “their security tools and processes provide them with complete visibility and insights.”

    “Yet, when we delved deeper to further investigate precise levels of deep observability, critical visibility gaps began to appear, from encrypted traffic, laterally moving data, and ‘unknown’ blind spots,” Gigamon wrote in the report.

    Nearly one-third of security breaches are going undetected, according to Gigamon’s report. Nearly three in four CISOs (70 percent) say they don’t bother to analyze encrypted data flows.

    “It seems there is a naivety across the globe on what constitutes a hybrid cloud blind spot and the resulting danger of not analyzing data simply because it’s encrypted or only flows internally,” the company said.

    Malicious emails hit an all-time high during the first quarter of the year, according to a report from PhishLabs, a security research firm owned by Fortra.

    Researchers with the company found that 7.7 percent of emails hitting inboxes were malicious, with 15.9 percent assigned the “do not engage” moniker. Having nearly one-quarter (23.6 percent) of all emails classified as malicious is an all-time high, the company said.

    One particular piece of malware that’s been really heating up this summer is QBot, a ransomware package. According to PhishLabs, the QBot family accounted for nearly 88 percent of the total ransomware payload observed, which the company says is a “staggering” amount.

    QBot, which is typically distributed through malicious attachments in phishing emails, has been spotted in OneNote and Adobe documents, as well as in “HTML smuggling campaigns,” PhishLabs says. “The most popular malware family two quarters in a row, QBot features capabilities such as self-spreading, C2 communication, and sandbox detection,” the company says.

    PhishLabs is also seeing a spike in social media attacks, which were up 12.2 percent in the first quarter. The social media environment is lucrative for malicious actors thanks to its open nature, but it’s proving prone to attack vectors, such as cyber threats (33.1 percent), impersonation (26.3 percent), counterfeiting (22.1 percent), and fraud (16.9 percent).

    RELATED STORIES

    Serious New IBM i Vulns Exposed by Silent Signal – More On the Way

    New “High Priority” DDM Vulnerability Affects IBM i

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: CL, cybersecurity, DB2, File Transfer Protocol, Fortra, FTP, IBM i, Malware, PASE, PhishLabs, QBot, RDP, Remote Desktop Protocol, Secure Shell, Silent Signal, SSH

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Four Hundred Monitor, August 2 New GUI, Native SMS Come to Kisco’s iEventMonitor

    One thought on “Midsummer Security Indicators: Hot and Gloomy”

    • ema tissani says:
      August 2, 2023 at 12:40 pm

      It’s really incredible that so many system even in the public/state sector are “unwillingly” exposed to the internet. For state owned, public interest system, this is really inexcusable.
      But guess what….. I have a customer with an old AS400 running in some room with the plain 5250 obliviously exposed to the internet : D … since 20 years …. never touched … I’m imagining the face of the hacker with a scanner trying to log in to the green screen :DDD … I guess “being a niche” pays off in some sense :DDDDD

      Reply

    Leave a Reply Cancel reply

TFH Volume: 33 Issue: 46

This Issue Sponsored By

  • Rocket Software
  • WorksRight Software
  • Raz-Lee Security
  • ARCAD Software

Table of Contents

  • ASNA Generates First-Class C# from RPG with Encore
  • New GUI, Native SMS Come to Kisco’s iEventMonitor
  • Midsummer Security Indicators: Hot and Gloomy
  • Four Hundred Monitor, August 2

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle