Complete DHS Report for February 29, 2016
• The New Jersey State Department of Environmental Protection and IMTT reported February 25 that crews recovered 95,000 gallons of mixture from the excavation area, and another 62,000 gallons from the combined sewer system in Halecky-IMTT Park in Bayonne. – Jersey Journal
1. February 25, Jersey Journal – (New Jersey) Oil leak in Bayonne park stopped, permanent repairs to follow, DEP says. The New Jersey State Department of Environmental Protection and IMTT reported February 25 that crews recovered 95,000 gallons of mixture from the excavation area, and another 62,000 gallons from the combined sewer system after stopping a leak in Halecky-IMTT Park in Bayonne following a pipeline rupture that was reported February 22. Source: http://www.nj.com/hudson/index.ssf/2016/02/oil_leak_in_bayonne_park_stopped_permanent_repairs.html#incart_river_index
• An employee at Excel Industries opened fire at the Hesston, Kansas industrial facility February 25 killing 3 people and injuring 14 before authorities shot and killed the gunman.. – ABC News
3. February 26, ABC News – (Kansas) Kansas gunman issued restraining order at scene of deadly shooting before killings, cops say. An employee at Excel Industries opened fire at the Hesston, Kansas industrial facility February 25, killing 3 people and injuring 14 before authorities shot and killed the gunman. Authorities reported the man opened fire at two other locations prior to the factory shooting and are investigating the shooter’s motive. Source: http://abcnews.go.com/US/kansas-shooter-issued-restraining-order-killings-cops/story?id=37214171
• Baltimore City officials announced February 25 that at least 200,000 gallons of wastewater containing some raw sewage flowed into the Chesapeake Bay from cracked pipes and manholes during severe storms February 24. – Baltimore Sun
12. February 25, Baltimore Sun – (Maryland) 200,000 gallons of wastewater flowed into bay during Wednesday’s storms. The Baltimore City Department of Public Works announced February 25 that at least 200,000 gallons of wastewater containing some raw sewage flowed into the Chesapeake Bay from cracked pipes and manholes during severe storms February 24. An additional 50,000 gallons of wastewater that was in the process of treatment at the Patapsco Wastewater Treatment Facility overflowed into the Patapsco River due to a surge of water and power outage. Source: http://www.baltimoresun.com/news/maryland/bs-md-ci-sewer-overflows-20160225-story.html
• Palo Alto Networks released updates for its PAN-OS that fixed several vulnerabilities including a high severity flaw that can allow a remote, unauthenticated attacker to execute arbitrary operating system commands. – SecurityWeek See item 20 below in the Information Technology Sector
Financial Services Sector
5. February 24, U.S. Attorney’s Office, Northern District of Illinois – (Illinois) Chicago real estate developer convicted on Federal fraud charges on swindling banks and the city out of millions of dollars in loans. The former president of Joseph Freed & Associates LLC, (JFA) was found guilty February 24 of Federal fraud charges relating to a $105 million line of credit he received for city and suburban properties, including a former Goldblatt’s Department Store and the Streets of Woodfield Mall after he signed false affidavits to obtain millions of dollars in Tax Increment Financing (TIF) from the city of Chicago in 2009 and 2010, and stole $7 million from his business partner, Kimco Realty Corp. and recorded the money as loans. Source: http://www.justice.gov/usao-ndil/pr/chicago-real-estate-developer-convicted-federal-fraud-charges-swindling-banks-and-city
Information Technology Sector
17. February 26, SecurityWeek – (International) Over 60 vulnerabilities patched in Apple TV. Apple released Apple TV version 7.2.1 which patched security holes in over 20 different components of the TV including Webkit, the kernel, the third-party app sandbox, Office Viewer, and Cloudkit, among other libraries, and patched vulnerabilities that can be exploited for information disclosure, execution of unsigned code, arbitrary code execution, application crashes, and modifications to protected parts of the filesystem.
18. February 25, SecurityWeek – (International) Breach detection time improves, destructive attacks rise: FireEye. FireEye-owned Mandiant released a report titled, M-Trends which stated that current organizations were improving their breach detection rates after an investigation on real-life incidences revealed that the median detection rate improved from 205 days in 2014 to 146 days in 2015. The report also stated that disruptive attacks were a legitimate threat and gave insight into how organizations can prepare for and deal with such attacks. Source: http://www.securityweek.com/breach-detection-time-improves-destructive-attacks-rise-fireeye
19. February 25, SecurityWeek – (International) Cisco patches command injection flaw in ACE appliance. Cisco released patches for its Application Control Engine (ACE) 4710 appliances after the company found that the product’s Device Manager graphical user interface (GUI) had an insufficient user input validation flaw that could be exploited by a remote, authenticated attacker to execute command-line interface commands with administrator privileges by sending specially crafted Hypertext Transfer Protocol (HTTP) POST requests with commands injected into the value of the POST parameter. Attackers could exploit the flaw to bypass role-based access control (RBAC) restrictions. Source: http://www.securityweek.com/cisco-patches-command-injection-flaw-ace-appliance
20. February 25, SecurityWeek – (International) Palo Alto Networks fixes PAN-OS vulnerabilities. Palo Alto Networks released updates for its PAN-OS, the operating system (OS) for its enterprise security platform, which fixed several vulnerabilities including a high severity flaw that can allow a remote, unauthenticated attacker, with access to the device to execute arbitrary OS commands, and a critical buffer overflow flaw in the GlobalProtect portal that can be exploited to cause a denial-of-service (DoS) condition, crash a device, and potentially cause a remote code execution.
Nothing to report