Home » GreenRocket Security Blog
GreenRocket Security Blog
GreenRocket Security Blog
The Latest
We have released a new Windows Logon MFA agent version (v2.9.21-N). If your GreenRADIUS license enables the U2F Module (used for Windows Logon MFA), and you have not received the new Windows Logon MFA agent via email, please contact us.
The Belgian hospital AZ Monica was hit with a cyberattack in January, followed by a major disruption to all operations. The hospital warned patients that it was running on limited
At Green Rocket Security, we’re constantly striving to improve our product to meet and exceed users’ expectations. Here are some highlights from 2025’s product developments: Thank you to all our
Cyber attacks are on the rise. Schools from, elementary to university-level, are especially vulnerable for multiple reasons. The Guardian reported that schools were nearly twice as likely as private businesses to experience
Authentication
Thousands of school districts in the US use the software system, Power School, as a tool to manage student and teacher information. Over 60 million students have data stored with this software. This past December the system was hacked causing disruption for many school districts across the country.
Using stolen credentials a hacker or group was able to access large amounts of personal information through the customer support portal.
At least two anonymous school districts have confirmed that even historical data has been stolen from former students, as well as current.
TechCrunch states that, “PowerSchool have told TechCrunch that hackers accessed ‘all’ of their historical student and teacher data.” From some commentary by RootED’s executive chief, the article continues that, “some school districts are reporting the number of affected students in the range of four- to 10-times higher than the number of actively enrolled students in their district.”
Another source claimed that data has been stolen even prior to December. On top of this, it has been found that school districts which only formerly used PowerSchool have also been affected by this breach.
Some accusations claim that PowerSchool failed to implement basic software protection, such as multi-factor authentication. When TechCrunch reached out to a PowerSchool spokesperson, she answered that their software did have MFA but did not make any further comment.
The scale of this data breach remains unknown, although multiple school districts have disclosed their effects, and more continue to do so as well.
To prevent such disaster, secure the data under your charge with multi-factor authentication. Contact us to find out how GreenRADIUS can provide this safety for your customers and your team.
A large-scale cyber-attack was confirmed earlier this week that includes breaches into United States federal government agencies. On Monday, SolarWinds confirmed that Orion – its flagship network management software – had served as the unwitting...
Weak passwords and cross-site password reuse are two of the most common ways to break into a WordPress installation. Fortunately, WordPress plugins are able to augment the system’s default authentication. Our GreenRADIUS WordPress Authentication Plugin...
General
We are excited to announce the release of GreenRADIUS v4.0! With this release, GreenRADIUS becomes even more versatile to meet various customer requirements. Among the most important changes are the following:
- FIPS 140-2 compliance
- Containerization
- Upgrade to Ubuntu 18.04 LTS
FIPS 140-2 Compliance
As requested by many government agencies, GreenRADIUS v4.0 can be configured to run in FIPS mode, thus achieving FIPS 140-2 compliance. Paired with YubiKey FIPS tokens, customers can deploy an end-to-end, FIPS-compliant 2FA solution. This GreenRADIUS-YubiKey solution can support a number of integrations, such as VPN, Windows logon, Linux ssh, SAML-based applications, websites, and more.
Containerization
Also requested by customers was to make GreenRADIUS a containerized solution. While deploying GreenRADIUS as a virtual machine is still popular among our customers, we have added the flexibility to deploy GreenRADIUS as a containerized solution for those that prefer to.
Upgrade to Ubuntu 18.04 LTS
The GreenRADIUS v4.0 VM runs on Ubuntu 18.04 LTS, an upgrade from the now end-of-life Ubuntu 14.04 LTS that was used for GreenRADIUS v3.1.
Learn more about GreenRADIUS by contacting us at info@greenrocketsecurity.com.
I’m sure you’ve heard about the numerous cyber attacks on big businesses like Target, Chase Bank, Equifax, and Sony, and other large organizations like the U.S. Government. These are big enterprises that have the resources...
2016 has been an exciting year for GreenRADIUS. Apart from security-related updates and bug fixes, your feedback has been the basis of over 50 new features and improvements to GreenRADIUS during the year! The top...
News
Boyd Gaming recently notified the public of a data breach on their systems, in which personal information of employees and several other individuals was stolen. Certain personal data was also removed from their database.
Boyd Gaming discloses data breach after suffering a cyberattack
This gaming and hospitality service is based in Utah, but operates across 10 different states. The corporation runs 28 different properties, employing over 16,000 people.
No threat actor has been linked to the breach, and as cybersecurity experts have been looking into the situation, the company has not yet disclosed specific details.
Cybersecurity experts advise securing all networks and systems with multi-factor authentication. Green Rocket Security offers a solution which will keep your database secure from such disruptions. Look into protecting your systems with GreenRADIUS 2FA in the link below.
The recent discovery of the Blast-RADIUS vulnerability (CVE-2024-3596) poses a significant risk to networks worldwide. This flaw in the RADIUS authentication protocol can be exploited by attackers to gain unauthorized access, launch denial-of-service attacks, and...
SUMMARY This notice covers CVE-2024-6387 OpenSSH vulnerability (nicknamed “regreSSHion”) and its impact related to GreenRADIUS. GreenRADIUS is accessed using SSH from an internal (on prem) origin and therefore normally protected by an external firewall. This...
New Threats
Are you using a password manager to securely store all of your passwords? The use of password managers has become very common. It allows people to keep track of a variety of passwords, which are unique enough to protect their networks.
Although the purpose of this is to keep your passwords together in a secure manner, cases have been found in which these password managers have mistakenly leaked credentials. This flaw in the system has been named “AutoSpill”.
TechSpot recently reported that the way this happens is, “When the password manager is prompted to fill in the credentials, the expected behavior is that it’ll autofill them in the right fields of the WebView interface. However, it will sometimes expose your credentials to the base app instead.”
In this case there is no phishing or trick that the user can avoid, the mistake is automatically done through the password manager itself.
Having multi-factor authentication protects your network against the AutoSpill glitch or in any situation where your password has been exposed. This is because the password itself is not sufficient to gain access to your sensitive information.
Green Rocket Security specializes in multi-factor authentication by which users can have access to an Authenticator app or a physical token, such as a YubiKey. If you are looking for network protection beyond just your passwords, contact us to learn more about our GreenRADIUS solution.
Summary CVE-2021-44228 and CVE-2021-45046 (Log4Shell or LogJam) are both zero-day vulnerabilities in the widely used Apache Log4j Java-based logging library. Since it is widely used in many popular products, customers have contacted Green Rocket Security...
LokiBot Trojan Malware (a.k.a LukiBot, Lokibot, Loki PWS, and Loki-bot) is active again stealing sensitive information such as usernames, passwords, cryptocurrency wallets, and other credentials. It was first discovered in 2015 and has been used...