Monday, June 10, 2019

Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions

A security researcher recently revealed details of a newly unpatched vulnerability in Microsoft Windows Remote Desktop Protocol (RDP).
Tracked as CVE-2019-9510, the reported vulnerability could allow client-side attackers to bypass the lock screen on remote desktop (RD) sessions.
Discovered by Joe Tammariello of Carnegie Mellon University Software Engineering Institute (SEI), the flaw exists when Microsoft Windows Remote Desktop feature requires clients to authenticate with Network Level Authentication (NLA), a feature that Microsoft recently recommended as a workaround against the critical BlueKeep RDP vulnerability .
According to Will Dormann, a vulnerability analyst at the CERT/CC, if a network anomaly triggers a temporary RDP disconnect while a client was already connected to the server but the login screen is locked, then "upon reconnection the RDP session will be restored to an unlocked state, regardless of how the remote system was left."
"Starting with Windows 10 1803 and Windows Server 2019, Windows RDP handling of NLA-based RDP sessions has changed in a way that can cause unexpected behavior with respect to session locking," Dormann explains in an
advisory published today.
"Two-factor authentication systems that integrate with the Windows login screen, such as Duo Security MFA, are also bypassed using this mechanism. Any login banners enforced by an organization will also be bypassed."

The CERT describes the attack scenario as the following:
A targeted user connects to a Windows 10 or Server 2019 system via RDS.
The user locks the remote session and leaves the client device unattended.
At this point, an attacker with access to the client device can interrupt its network connectivity and gain access to the remote system without needing any credentials.
This means that exploiting this vulnerability is very trivial, as an attacker just needs to interrupt the network connectivity of a targeted system.
However, since the attacker requires physical access to such a targeted system (i.e., an active session with locked screen), the scenario itself limits the attack surface to a greater extent.
Tammariello notified Microsoft of the vulnerability on April 19, but the company responded by saying the "behavior does not meet the Microsoft Security Servicing Criteria for Windows," which means the tech giant has no plans to patch the issue anytime soon.
However, users can protect themselves against potential exploitation of this vulnerability by locking the local system instead of the remote system, and by disconnecting the remote desktop sessions instead of just locking them.

Sunday, June 9, 2019

USA continues harassing alshabab militias

A joint operation by the US forces and the Somali forces conducted an airstrike targeting Al-Shabaab militias on June 5th in the vicinity of Tooratoorow area of Lower Shabelle Somalia.
“U.S. Africa Command has assessed that the airstrike killed one Al-Shabaab militia and confirmed no civilians were injured or killed in this airstrike,” read the statement
The strike, AFRICOM said was to stop Al-Shabaab taking advantage of safe havens from which they can build capacity and attack the people of Somalia.
In the month of May alone, AFRICOM conducted six strikes in Golis Mountains targeting ISIS militants in what could be seen as a move to tame the spread of the militant group further south though it already has tentacles in south-central regions including the capital Mogadishu.

Wednesday, June 5, 2019

Be extra cautious of DMI terrorists owned tabloids, social media accounts, travel agencies allover South Africa, Zambia, Mozambique, Kenya...

When i started warning eastafricans living in southafrica of the danger of associating with suspicious rwandese speaking ladies,many did not take me serious!The various assassinations,attempted assassinations and the latest kidnap and stage managed killing of casimir nkurunziza must further open your eyes to protect yourself from SARUHARA RWANKOMOKOMO  and his agents.The agents of this devilish political vampire man are widespread allover the republic of southafrica,zambia,mozambique ..etc.you will find them scattered allover universities of southafrica principally teaching about genocide but maliciously to reap sympathy and branding all those who are against saruhararwankomokomo's satanic system as evil.many of these rwandese ladies have branded themselves as tswana and carry on service delivery activities like travel agents  and advisory services throught which they continue with propaganda of defaming countriies like that "in uganda women are killed for ritual sacrifice,that foreighners are kidnapped,......" one of southafrican long tiime asked me if it was true and i only responded"just wait for the day they will advise you that your country southafrica is not good for you to live in"..... !these DMI agents of saruhara rwankomokomo own travel agents advisory services in throught southern and central africa,and thus i advise those taking travels to be extra cautious,or else you will take a plane via kigali and you will be pulled outta plane or poisoned .i also call upon all companies operating flights to screen out and check list their workers for the satanic system of saruhara rwankomokomo has infiltrate most travel companies in zambia,mozambique,malawi,southafrica and worse of it all the "DRC" is on a timely bomb,the whole of DRC system has be fully infiltrated by DMI! There are special social media accounts that have been establishe to tarnish the name of president museveni and nkurunziza and all these social media accounts are under te supervision of the direct agents of the political vampire.They have turned up to creating social media accounts  even here in Uganda,of which many are used to blackmail  the government, directly attack and abuse government  officials of whom notably are His excellence yoweri  museveni, afande Abel kandiho,afande Kaka, and other patriotic  Ugandans and institutions . These accounts  are principally established to stir up anger and tribalism in Uganda. Those who  manage such accounts  stupidly think that Ugandans  do not love their country and are trying to use social media to promote  hatred for the ruling party. Many of them hide in other parties not necessarily  that they feel  good for them but principally  to drive the interests of the foreigners who  want to dirten our peace ,some of them are Ugandans who have relatives  in Rwanda or who outta tribal hatred want to see their opportunistic and selfish interests met. What I can tell them is that"they should continue  writing since they are enjoying  the rights and freedoms  which cannot be found in Rwanda" and there is no-one who will offer them a red line  not to cross. I even advise security  agencies to be extra cautious  in dealing with such idiots  for what  they wanted to prove to the world that his excellence  museveni and his government  are bad. These are the idiots who want to arouse the public with fowl cries that"CMI,ISO,....etc is harassing  me".Their main intention is to show that ISO, CMI are bad. But all in all I leave the whole work to the Uganda  communication  commission  to deal with such people and it is very easy to identify such accounts.I also warn all Ugandans working in Southafrica, Zambia, Mozambique, and all these embassies  to be cautious  if people they employ. For the case if South Africa, they pretend to be Tswana ladies and have jobs in hotels, own travel  agencies  and advisory services but their main intention  is to spy upon every  one who comes from  Eastafrica, I know one in polokwane,i suspect  two in gauteng, and many at the university of southafrica(UNISA) who want to reap sympathy   survivors but principally  promoting hatred  and defaming Uganda, Burundi and their president,they are e real spies. Stay warned all you Rwandese refugees staying in South Africa, please be aware of these ladies who pretend to be Tswana, Zulu, Xhosa yet they pretend  to speak little  kinyarwanda it kiswahili.They will pretend to be good friends, will get your contacts, and will even attempt to hijack  your social  media accounts  through  SS7 exploit and other means. I remember  when  I told this to one of my confidant in mosselbay ihe thought  I was joking until he met the same girl at St'George's mall, this Kenyan friend was shocked to see this lady  fluently speaking kinyarwanda on a phone of course as someone who had worked with some news paper in Rwanda he was shocked to see someone  who he knew was a Tswana speaking  real kinyarwanda.   Be cautious  if young men from from Rwanda working in car parking yards they are they principally To identify which car their  targets are to use. I know you cannot believe  this but one day you will  see it.
 For God and my country

Tuesday, May 28, 2019

How long does Google's verification code last before it becomes unusable

There is something  I may ask,,how long does a Google verification  code last for it to be non usable.... Google. Coz is not serious, how do you send the same verification  code even after 30minutes when you have sent a similar code!!!!!  This is very  dangerous!!!  To those who use Google.com services you are at risk..... 

MTN Uganda mobile money services to be enjoyed by Kenyans, rwandese and Tanzanians

MTN Uganda has done a very good thing... I love the way Uganda is calculating it's thing. It very easy now to send receive money from Uganda to the whole of Eastern Africa. Man mobile money can now be used to send and receive  money through out Kenya, Rwanda and Tanzania.....  You simply have to Dial *165*1*2# .This is very good to those who have been stuck and caught up in the recent saga of the closure of Rwanda Uganda border...you can now send your money to your families...  No more starving!!!

Wednesday, May 22, 2019

Five people killed in Somalia

At least five people have been killed among them two soldiers and police officer in a car bomb explosion near Godka Jiloho prison in Bondhere district, Mogadishu.
Sources have said that two soldiers-a couple, the wife identified as Faay Ali Rage were killed during the blast. According to eyewitnesses, the vehicle which was parked at a roadblock heading to the prison blew up leaving death and destruction in its wake.
Media ne
ws has also established the third victim, a police officer was attached to the security team of MP Maryan Arif.
The free ambulance service Aaamin Ambulance said 10 people were injured in the blast. The medical provider said of the injured, one was a child while two were female.

Windows 10 ZERO day vulnerability revealed

Windows 10 has another zero-day vulnerability, as discovered by a security researcher who specializes in finding bugs in Microsoft’s operating system – and has previously publicly outed them without warning before.
The unpatched vulnerability highlighted by SandboxEscaper has been confirmed to work on Windows 10 (32-bit) systems, as reported by
ZDNet. Furthermore, with some tweaking, it could theoretically be leveraged against any version of Windows (going as far back as Windows XP).

Utilizing a bug in the Task Scheduler in Windows, this is a local privilege escalation security flaw, meaning it can be used by a hacker to raise an account with low-level privileges on a PC to a full admin account (in other words, allowing them to do anything on the victim’s computer).
Note, however, that this security flaw can’t be used to gain access to a PC. It’s an exploit for malicious parties who have already hacked their way onto a computer, and a way for them to subsequently elevate their privileges to be able to do more.
Even so, this is obviously something Microsoft needs to address swiftly, and will perhaps be patched in the next round of security updates to arrive in June.
More where that came from
As we mentioned at the outset, SandboxEscaper is renowned for being a thorn in Microsoft’s side, and in October 2018 she released details of a bug that can also be abused to elevate privileges on a system, and
drew attention to a similar flaw back in August 2018.
More worryingly, she has also claimed that she’s found four further unpatched bugs in Windows, so we can expect more revelations in the pipeline fairly soon, no doubt.
SandboxEscaper previously highlighted these bugs on Twitter, but seemingly has had several of her Twitter accounts suspended in the past.

ARM chipsets will nolonger be working with Huawei

Huawei’s ambitions for the smartphone market have been dealt a serious blow according to leaked documents that suggest chipmaker ARM is suspending all activities with the beleaguered Chinese vendor.
Last week, the US Commerce Department prohibited American firms from doing business with Huawei, a move which means the company’s handsets will no longer receive updates for the Android operating system from Google or access to its popular applications.
However, the impact of that order is set to be far-reaching and could have even more disastrous consequences. The BBC has obtained internal memos ordering ARM employees to stop working on all Huawei contracts and cases to provide any support.

ARM’s chip designs are used to power virtually every major mobile chipset, including those from Qualcomm and Huawei’s Kirin processors. ARM is based in the UK and owned by Japanese firm SoftBank, but many of its designs feature US-made technology.
This has led ARM to believe that working with Huawei would see it breach US trade regulations. The BBC also notes that this impacts ARM China, a joint-venture that aims to make ARM technology and localised support available in the country. ARM has a 49 per cent stake.
Huawei is not commenting on the reports, but an inability to use ARM technology in Huawei’s Kirin processors would be extremely damaging. Huawei has been preparing for a ban on US technology for some time, stockpiling components and developing an alternative operating system to Android, but the innovations afforded by ARM would be impossible to replace.
The upcoming Kirin 985 chip is unaffected, but Huawei would be unable to use ARM technology in future iterations.
A Huawei spokesperson said: "We value our close relationships with our partners, but recognise the pressure some of them are under, as a result of politically motivated decisions. We are confident this regrettable situation can be resolved and our priority remains to continue to deliver world-class technology and products to our customers around the world.”
Huawei has managed to build on domestic success by expanding into Western Europe in recent years thanks to a series of critically acclaimed devices. It is now the world’s second largest manufacturer, recently overtaking Apple, despite being excluded from the US.

Monday, May 13, 2019

Are you von Twitter, Instagram,WhatsApp or Facebook.... Never dare click on such links!!! Just for the sake of your privacy and general cyber security






He who likes playing about with faeces,cannot and will never stop until the faeces have dropped on his lips!!!

Just
like they did to spark off genocide in Rwanda by killing former president Juvenal Habyarimaana, the Kagame regime is hatching many more plans to cause a lot of instabilities in the region and possibly genocide.
According to credible information from a reliable source, a RPF captain, Cpt Olivier who rents houses for RPF spies in Nairobi kenya has been part of the plan to destabilize Uganda in order to have Uganda expel Rwandan refugees so that the Rwandan regime can subject them to imprisonment or even death. He was working with “Kawukumi in Uganda police to illegally deport Rwandan refugees so that the regime in Rwanda can arrest them.
It is not only Uganda that Rwanda has been trying to destabilize but also other countries in the great lakes region which include Zambia, Burundi, DRC among others.
The operation of destabilizing Zambia is being run by a one Col. FaustianTinka who works at Rwanda’s embassy in Tanzania. Tinka who works on the orders of Dan Munyuza is working closely with Abel Buhungu(the charge d’ affairs at the high commission of Rwanda in Zambia) to execute the mission.
Through the corporation between Rwanda and South African countries, Col. Tinka has been under the guise of Rwanda Tanzania friendship association (RWATAFA), smuggling spies from Rwanda safe houses in Kenya to Zambia who are received by Abel Buhungu. The spies are working on a mission to destabilize Zambia so that Zambia can forcefully repatriate the Hutu refugees living there.
Col. Tinka and Buhungu are identifying people who can incite Zambian youth to attack the Rwandan refugees, loot their shops and kill them to have them flee the country. The plan is to kill innocent Zambians and then blame it on Rwandan refugees in order for the Zambians to retaliate.
In order for the operation to be successful, the Rwandan regimes have invested 1million dollars to corrupt security officers and some politicians in Zambia who will be demanding the Zambian government to deport the Rwandans. Part of the money is being given to the youth to kill Rwandans.
8 people have been killed so far and the locals are being told that it’s the interahamwe killing them in ritual sacrifices. Rwanda government wasn’t happy with Zambia hosting its refugees and this is why they want to destabilize it.
The plot to destabilize DRC is being executed by the Al-Qaeda Islamic Maghreb (AQIM). There is clear evidence that Paul Kagame is working with the AQIM and he has provide a home to their coordinator MoustaphaOuld Lima.
Moustapha is one of the most wanted people on the continent for terrorism. He is the coordinator of AQIM an Al-Qaeda affiliate in the Sahara desert and had direct contact with the former Al-Qaeda commander Osama bin laden.
Surprisingly Last week Kagame appeared with MoustaphaOuld Lima at Kigali international airport to receive Qatar supreme leader Tamim Bin Hamad Al Thani. This clearly showed how close Kagame and the AQIM leader are.
AQIM makes millions of dollars by kidnapping tourists, expatriates, and business men in Burkina Faso, Ivory Coast, Niger, Mali Mauritania and Algeria.
It seems he has started the business in the great lakes region since the kidnap of tourists has increased in DRC. This further explains why ISIS claimed its first attack in DRC recently.
may be he is seeking to compel USA in questing for the use of UPDF in fight against alshabab
Thanks to https//www.command1post.com