
Weekly Axis Of Easy #390
Last Week’s Quote was: “Do I not destroy my enemies when I make them my friends? was by Abraham Lincoln. Veronica got it right 🙂
This Week’s Quote: “We are all born mad. Some remain so.” by ???
THE RULES: No searching up the answer, must be posted at the bottom of the blog post, in the comments section.
The Prize: First person to post the correct answer gets their next domain or hosting renewal on us.
This is your easyDNS #AxisOfEasy Briefing for the week of March 3rd, 2025 our Technology Correspondent Joann L Barnes and easyCEO Mark E. Jeftovic send out a short briefing on the state of the ‘net and how it affects your business, security and privacy.
To Listen/watch this podcast edition with commentary and insight from Joey and Len the Lengend click here.
In this issue:
- CTA Proposal Could Fine Airline Passengers for Publicly Discussing Complaint Resolutions
- Critical Security Flaw Found in Hirsch’s Enterphone MESH Access System
- New LinkedIn Phishing Scam Uses Fake InMail to Deliver ConnectWise RAT
- China’s Silk Typhoon Expands Cyberattacks to Global IT Supply Chain, Microsoft Warns
- Microsoft to Retire Skype in May, Shifting Focus to Teams
Elsewhere Online:
CTA Proposal Could Fine Airline Passengers for Publicly Discussing Complaint Resolutions
The Canadian Transportation Agency (CTA) wants to fine people for talking about how their airline complaints got resolved. A 2023 amendment forced airlines to disclose complaint outcomes—flight number, date, delay type, and whether they paid up—but let the CTA keep everything else secret if either party requested. Now, the agency wants to penalize passengers who spill details beyond that, invoking its authority under the *Confidentiality of Information* section of the Act. Critics, particularly Air Passenger Rights founder Gabor Lukacs, call this unconstitutional, arguing that binding decisions should be public, like small claims court rulings.
CTA spokesperson Jadrino Huot insists nothing new is being mandated, just routine regulatory updates. The agency denies it’s reacting to systemic confidentiality breaches and says penalties won’t be automatic. Still, the fine structure starts at $50, doubling per violation, capped at $5,000. The CTA sidestepped questions on actual enforcement plans. Meanwhile, Lukacs is rallying opposition, urging the public to submit complaints before the February 28 deadline, calling the proposal a speech regulation overreach. The *National Post* sought further comment, but CTA remained vague. The move raises concerns about transparency, power imbalances, and whether passengers can be legally gagged over their own disputes.
Read: https://nationalpost.com/news/canada/cta-complaints-passenger-fine
Critical Security Flaw Found in Hirsch’s Enterphone MESH Access System
Security researcher Eric Daigle, a fifth-year computer science and economics student at the University of British Columbia, has identified a severe vulnerability in Hirsch’s Enterphone MESH door access control system, which is used in residential and office buildings across the U.S. and Canada. The issue stems from a default password that remains unchanged in many installations, allowing unauthorized users to remotely control door locks and elevators. This vulnerability has been rated 10 out of 10 on the severity scale due to the ease of exploitation—an attacker needs only to retrieve the default password from Hirsch’s installation guide and enter it into an affected building’s login page. Additionally, each system displays the building’s physical address, making unauthorized access even more concerning.
Daigle discovered the flaw in 2024 after encountering an Enterphone MESH panel in Vancouver. Using ZoomEye, an internet scanning tool, he searched for connected Enterphone MESH systems and found 71 that still used the default credentials. By testing these credentials, he confirmed they provided full access to the system’s web-based management console, which is used by building managers to control entry to residential and office spaces, elevators, and shared areas. This security lapse means that an attacker could gain access to multiple buildings in minutes without detection.
Hirsch never required customers to change the default password upon installation, leaving many systems vulnerable. Following media intervention, the company has announced a security patch scheduled for mid-March that will mandate password changes. New Enterphone orders are on hold until the patch is in place, and Hirsch has contacted customers with reminders to update their credentials. Additionally, the company is introducing a security reporting page to allow the public to report vulnerabilities. These measures aim to prevent similar risks in the future and strengthen overall system security.
Read: https://techcrunch.com/2025/02/24/a-single-default-password-exposes-access-to-dozens-of-apartment-buildings/
New LinkedIn Phishing Scam Uses Fake InMail to Deliver ConnectWise RAT
Cofense researchers uncovered a phishing campaign impersonating LinkedIn InMail notifications to deliver the ConnectWise RAT. Unlike typical LinkedIn scams that steal credentials, this attack installs remote access malware. The fraudulent email mimics LinkedIn branding but uses an outdated pre-2020 template. It fabricates a sales inquiry from a non-existent company, DONGJIN Weidmüller Korea Ind, borrowing elements from real firms. The attacker’s LinkedIn profile picture belongs to Cho So-young, president of a Korean civil engineering organization.
Clicking “Read More” or “Reply To” downloads the trojan, avoiding direct download prompts to evade suspicion. The email fails SPF and DKIM authentication, proving it wasn’t sent from LinkedIn, yet bypasses security due to a weak DMARC policy marking it as spam rather than blocking it. The campaign, active since May 2024, has consistently used this template, though prior malware variants remain unconfirmed.
Attackers exploit LinkedIn’s credibility and professional urgency to bypass user skepticism. Security teams must enforce strict email authentication (SPF, DKIM, DMARC), configure Secure Email Gateways, and train employees to detect phishing. The campaign highlights the adaptability of cybercriminals and the persistent vulnerabilities in business communication networks reliant on LinkedIn.
Read: https://hackread.com/scammers-fake-linkedin-inmail-deliver-connectwise-trojan/
China’s Silk Typhoon Expands Cyberattacks to Global IT Supply Chain, Microsoft Warns
Microsoft warns that Silk Typhoon, a Chinese government-backed espionage group, has shifted tactics from hacking cloud services to infiltrating the global IT supply chain, targeting IT services, remote monitoring firms, and managed service providers. The group leverages stolen API keys and compromised credentials to conduct reconnaissance, escalate privileges, and exfiltrate data. It has exploited Microsoft’s Entra Connect (formerly AADConnect) and breached state and local governments, IT services, and financial institutions.
Previously linked to Microsoft Exchange, VPN, and firewall exploits, Silk Typhoon infiltrated the US Treasury’s foreign investment and sanctions offices, exploiting BeyondTrust and PostgreSQL vulnerabilities. It now abuses OAuth and service principals to steal data from email, OneDrive, and SharePoint via MSGraph, while compromising multi-tenant applications to move across environments. Exchange Web Services (EWS) API access allows them to exfiltrate email data.
Microsoft describes the group as well-resourced, adaptable, and quick to exploit zero-day flaws. It uses password spraying, reconnaissance, and leaked credentials from GitHub to infiltrate corporate accounts. Silk Typhoon’s persistent access strategy includes web shells, enabling command execution and data exfiltration. The attack highlights a wider security risk for any organization using IT supply chain solutions without strong credential management.
Read: https://www.securityweek.com/china-hackers-behind-us-treasury-breach-caught-targeting-it-supply-chain/
Microsoft to Retire Skype in May, Shifting Focus to Teams
Microsoft is shutting down Skype in May, marking the end of an era for the once-revolutionary video-calling platform. Launched in 2003, Skype made international calls cheap and accessible, powering everything from long-distance family chats to CNN interviews. But as consumer habits shifted toward FaceTime, WhatsApp, and Microsoft’s own Teams, Skype’s relevance declined. Microsoft introduced Teams in 2017, and the pandemic accelerated its adoption—Teams now logs four times the meeting minutes of consumer calls compared to two years ago.
Users can export their Skype data or migrate to Teams, which offers similar features—calls, messaging, and file-sharing—plus meetings, calendar integration, and community-building. Jeff Teper, Microsoft’s head of collaborative apps, says the move simplifies the company’s offerings while enabling greater innovation. Analysts aren’t surprised. Carolina Milanesi calls Skype “the rotary phone of communications,” arguing that its remaining users rely on habit rather than functionality.
This follows Microsoft’s history of sunsetting legacy technology, from Windows Phone to MSN Messenger. While some longtime users may be nostalgic, J.P. Gownder of Forrester notes that “Skype’s heyday is in the past.” Microsoft is betting that Teams, not a 22-year-old relic, is the future of communication—and, of course, a lucrative enterprise play.
Read: https://www.msn.com/en-us/news/technology/microsoft-to-shut-down-skype-farewell-to-the-rotary-phone-of-communications/ar-AA1A0HyX
Elsewhere Online:
Hackers Leverage Cloud Flaws for Malware Distribution
Read: https://hackread.com/hackers-exploit-cloud-misconfigurations-spread-malware/
Google and Mozilla Fix Multiple Browser Security Issues
Read: https://www.securityweek.com/chrome-134-firefox-136-patch-high-severity-vulnerabilities/
AWS Misconfigurations Exploited by JavaGhost Phishing Group
Read: https://www.darkreading.com/cloud-security/threat-actor-javaghost-targets-aws-environments-phishing-scheme
Google’s Manifest V3 Limits Ad Blocking Capabilities
Read: https://gizmodo.com/google-is-hobbling-popular-ad-blocker-ublock-origin-on-chrome-2000570878
BianLian Imposters Use Mail for Extortion Demands
Read: https://www.darkreading.com/threat-intelligence/bogus-bianlian-snail-mail-extortion-letters
If you missed the previous issues, they can be read online here:
-
-
-
-
-
-
-
- February 28th, 2025: What Did You Get Done Last Week?
- February 21st, 2025: Russian Hackers Exploit Signal’s Device-Linking Feature To Spy On Military And Civilian Communications
- February 14th, 2025: UK Secretly Orders Apple To Build Global iCloud Backdoor, Sparking Privacy Battle
- February 7th, 2025: Trapped In A Scam Call Center A Young Worker’s Shocking Story
- January 31st, 2025: DeepSeek’s Disruption Could Trigger An AI Market Collapse
-
-
-
-
-
-
The quote seems like Lewis Carroll, Alice in Wonderland.