Vector
Vector

Choose your topics

Blogs
3 Best Practices for Data Privacy

With more technology comes more data, and with that a greater need for data privacy enforcement. What best practices should you be following?

Data Privacy
Blogs
How to Prioritize Your Third-Party Risks

How can you prioritize effectively and enhance your organization’s security posture? Here are our top tips for setting up realistic, sustainable processes.

Third-Party Risk Management GRC
Blogs
Top Tips to Save Time When Assessing Third-Party Risks

Is assessing third-party risks taking up too much of your time? How can you make the process more effective and efficient? Find out in the latest post from SureCloud.

Third-Party Risk Management GRC
Blogs
The GRC Trends to Look Out for in 2024

Our GRC experts at SureCloud share their 2024 predictions for the world of governance, risk and compliance.

GRC
Blogs
The Top 5 Challenges of Third-Party Risk Management

With the supply chain now seen as a legitimate attack path, what can your organization do? Let’s explore 5 challenges of TPRM and how to overcome them.

Third-Party Risk Management GRC
Blogs
What is Third-Party Risk Management?

What is third-party risk management and how should you approach it? Find out in this post.

Third-Party Risk Management GRC
Blogs
The Top 4 Challenges of Risk Management

What are the top four challenges of risk management today and how can you overcome them? Find out in this post from SureCloud.

Third-Party Risk Management GRC
Blogs
Transform Compliance into Your Competitive Advantage

In GRC, compliance is often viewed as a cost that makes it harder to pursue growth. Here's how to make it your competitive advantage.

Compliance Management GRC
Blogs
Questions You Should Ask when Preparing For Your First Pen Test

Understand the processes that you and your chosen pentest provider will travel through for your first pen test, from the initial point to the day the test starts.

Penetration Testing
Vector (7)
Vector-1
Vulnerability Management, GRC

SureCloud Responds to SC Media's Article on Vulnerability in mIRC

SureCloud Responds to SC Media's Article on Vulnerability in mIRC
Written by

Admin

Published on

20 Feb 2019

SureCloud Responds to SC Media's Article on Vulnerability in mIRC

 
 

SC Media’s article “Vulnerability in mIRC enables hackers to execute remote code,” discusses a recently discovered flaw in an internet relay chat client that could enable hackers to run code to download further malware. The flaw has been found to exist within mIRC; an application used to connect IRC servers to allow users to chat with one another.

The vulnerability, found by Benjamin Chetioui and Baptiste Devigne from ProofOfCalc, allows hackers to inject commands into these custom URI schemes, affecting mIRC versions older than 7.55. They discovered that for the exploit to work, a hacker sends a victim a link to a web page that has an iframe that opens the custom irc: URL. Once opened, the iframe will launch the mIRC application using the remote configuration file and execute the remote script’s commands.

SureCloud’s Cybersecurity Practice Director, Luke Potter, responds to the article and advises on whether you should continue to use mIRC, and how best organizations can protect themselves against these type of attacks:

Should anyone use mIRC after this?

If you are using mIRC, then upgrade to v7.55 ASAP. A patch for this RCE was released on 8th February 2019 (https://www.mirc.com/whatsnew.txt).

What mitigations should be put in place?

There is limited mitigation available; the absolute best approach is to patch immediately.

What can organizations do to prevent/mitigate attacks?

Patch immediately and review the use of mIRC in your organization. It’s not an application we commonly see being used in a corporate context and environment.

You can read the full article here

Learn about SureCloud’s ‘Pentest-as-a-Service©’