New Sh1mmer ChromeBook exploit unenrolls managed devices

A new exploit called 'Sh1mmer' allows users to unenroll an enterprise-managed Chromebook, enabling them to install any apps they wish and bypass device restrictions. When Chromebooks are enrolled with a school or an enterprise, they are managed by policies established by the organization's administrators. This allows admins to force-install browser extensions, apps, and to restrict how a device can be used. Once enrolled, it is almost impossible to unenroll the device without the organization's admin doing it for you. To bypass these restrictions, security researchers from the Mercury Workshop Team have developed a new exploit called 'Shady Hacking 1nstrument Makes Machine Enrollment Retreat', or 'Sh1mmer,' that lets users unenroll their Chromebooks from enterprise management. The exploit requires a publicly leaked RMA shim that the Sh1mmer exploit will modify to allow users to manage the device's enrollment. The researchers say that the following Chromebook boards are known to have publicly released RMA shims. For those unfamiliar with RMA shims, they are disk images stored on USB devices that contain a combination of the ChromOS factory bundle components used to reinstall the operating system and manufacturer tools used to perform repair and diagnostics. To use this exploit, you need to download an RMA shim for your Chromebook board, use the researcher's online builder to inject it with the Sh1mmer exploit, and then run the Chrome Recovery utility. Using the steps detailed on the Sh1mmer site, you can load the modified RMA shim to launch the Sh1mmer menu, shown below. From this menu, you can unenroll and re-enroll a device as needed, enable USB boot, allow root-level access to the operating system, open a bash shell, and more. A member of the k12sysadmin Reddit group tested the exploit and stated that they could use the exploit to unenroll their Chromebook and use it as a brand new device. "I tested with my spare Acer 311/722 this morning. It definitely does exactly what it says it will. Go to Utilities, wipe GBB flags, and then deprovision and reboot," posted a technician to the /r/k12sysadmin Reddit group. "I could then register it with my personal email and everything works just like a new out of the box device with no forced enrollment." Another system administrator warned that the use of this exploit likely breaks student code of conduct, and could lead to serious consequences. "Other IT admins warn that this is a serious breach of school At this point, it's practically vandalizing school property and breaking your AUP," wrote a k12sysadmin member. "This isn't a tech issue, its a discipline issue. Once you find out, have the school confiscate the chromebook and the IT Dept. re-enroll the chromebook to the network." "Take the kid's district use of tech away for a year. They should learn their lesson." Google told BleepingComputer that they are aware of the exploit and are working to address the issue. "We are aware of the issue affecting a number of ChromeOS device RMA shims and are working with our hardware partners to address it," Google told BleepingComputer. They did not provide information on how admins can prevent the exploit or detect exploited devices. When the Sh1mmer exploit is used, it will cause the device to show up as inactive in the administration console. Another member of the k12sysadmin Reddit group said that admins could enable Inactive device notifications to receive emails when a device becomes inactive, allowing admins to look into it further and see if the exploit was used. Google nukes 50,000 accounts pushing Chinese disinformation. U.S. sues Google for abusing dominance over online ad market. Google Ads invites being abused to push spam, adult sites. Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 01 Feb 2023 00:02:03 +0000


Cyber News related to New Sh1mmer ChromeBook exploit unenrolls managed devices

New Sh1mmer ChromeBook exploit unenrolls managed devices - A new exploit called 'Sh1mmer' allows users to unenroll an enterprise-managed Chromebook, enabling them to install any apps they wish and bypass device restrictions. When Chromebooks are enrolled with a school or an enterprise, they are managed by ...
1 year ago Bleepingcomputer.com
Chromebook SH1MMER exploit promises admin jailbreak The Register - Users of enterprise-managed Chromebooks now, for better or worse, have a way to break the shackles of administrative control through an exploit called SHI1MMER. SH1MMER - you may pronounce the "1" as an "i" - is a shim exploit, or more specifically, ...
1 year ago Packetstormsecurity.com
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices - A new exploit has been devised to "Unenroll" enterprise- or school-managed Chromebooks from administrative control. Enrolling ChromeOS devices makes it possible to enforce device policies as set by the organization via the Google Admin console, ...
1 year ago Thehackernews.com
From Trend to Mainstay: The Unstoppable Force of Managed Services - There's no denying that IT managed services are being embraced across businesses of all sizes as a path to achieve business goals. As technologies becomes increasingly complex and the lines between siloed architectures become blurred, companies are ...
1 month ago Feedpress.me
Webex announces comprehensive Device Management Capabilities with Phonism integration - Webex is excited to announce a comprehensive solution for 3rd party Device Management referred to as 'Partner Managed Devices. ' Partner Managed Devices allows Webex Cloud Calling offers to support a flexible Device Management strategy. With this ...
6 months ago Feedpress.me
The Momentum, the Margin and the "Magic" with Cisco MSP Partners - The momentum of Cisco's Managed Service Provider partners is undeniable. A recent Canalys study¹ indicates that a striking 79% of partners anticipate growth in this sector in 2023, with 56% expecting growth rates to exceed 10%. By 2027, the managed ...
7 months ago Feedpress.me
5 ChromeOS settings you should change for a more secure Chromebook - ChromeOS is not merely a simplified operating system. ChromeOS is also a relatively secure operating system - thanks to its multiple layers of protection for preventing things like viruses and malware from harming your device and accessing your data. ...
2 days ago Zdnet.com
CVE-2021-41769 - A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < ...
2 years ago
Managed Ransomware Detect & Respond Offering From Zyston - PRESS RELEASE. DALLAS, Jan. 24, 2024 /PRNewswire-PRWeb/ - Zyston, a leading Managed Security Services Provider based in Dallas, Texas, is excited to introduce Managed Ransomware Detect and Respond, a co-managed solution designed to mitigate risk and ...
5 months ago Darkreading.com
Why BYOD Is the Favored Ransomware Backdoor - These devices exist outside of direct corporate management and provide a ransomware gang with unchecked platforms for encrypting data. Microsoft's fourth annual Digital Defense Report for 2023 reveals that 80% of all ransomware compromises come from ...
5 months ago Esecurityplanet.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
Claroty Team82: 63% of Known Exploited Vulnerabilities Tracked by CISA Are on Healthcare Organization Networks - PRESS RELEASE. NEW YORK and ORLANDO, Fla., March 12, 2024/PRNewswire/ -Claroty, the cyber-physical systems protection company, released today at the annual HIMSS24 conference a new report that uncovered concerning data about the security of medical ...
3 months ago Darkreading.com
Coming Soon to a Network Near You: More Shadow IoT - News of former Microsoft head of product Panos Panay's exit caused a small stir in the tech industry when it was learned he would join Amazon to lead that company's product division. Precisely what Amazon and Panay have in mind for that ecosystem has ...
5 months ago Securityweek.com
Cyber security isn't simple, but it could be The Register - Sponsored Feature Most experts agree cybersecurity is now so complex that managing it has become a security problem in itself. Hackers targeted weaknesses in isolated systems such as email, office applications or Windows PCs and so it made perfect ...
6 months ago Go.theregister.com
IoT Security for Business: Safeguarding Connected Devices - In this discussion, we will explore the significance of IoT security for businesses and effective strategies for safeguarding connected devices. With the increasing number of connected devices in business environments, the need for effective IoT ...
5 months ago Securityzap.com
CVE-2022-22774 - The DOM XML parser and SAX XML parser components of TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center, TIBCO Managed File Transfer Command Center, TIBCO Managed File Transfer Internet Server, and TIBCO Managed File Transfer ...
2 years ago
Grow and Differentiate Your Business with Expanded Managed Security Solutions - Security continues to be top-of-mind for today's global enterprises, confirmed in both the 2022 Global Hybrid Cloud Trends Report and the 2023 Global Networking Trends Report from Cisco. Our Global Networking Trends Report also found that when ...
5 months ago Feedpress.me
East Texas hospital network can't receive ambulances because of potential cybersecurity incident - GetTime();if(!(u<=a&&d<=l throw new RangeError("Invalid interval");return r.inclusive?u<=l&&d<=a:ut||isNaN(t. Step):1;if(s<1||isNaN(s throw new RangeError("`options. Step):1;if(l<1||isNaN(l throw new RangeError("`options. GetTime()<=n throw new ...
7 months ago Cnn.com
IoT Security: Safeguarding Business IoT Devices - The security of IoT devices is of utmost importance as businesses increasingly rely on them to streamline operations and enhance productivity. In this discussion, we will explore the importance of IoT security in safeguarding business IoT devices and ...
4 months ago Securityzap.com
CVE-2017-12308 - A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The ...
3 years ago
CVE-2017-12307 - A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. ...
3 years ago
Top 6 Managed Detection & Response Providers in 2024 - The best MDR solutions in the industry typically offer features like threat hunting, alert management, and digital forensics. To help you select the best MDR for your organization, we've analyzed solutions from leading providers and narrowed the list ...
1 month ago Esecurityplanet.com
The key to connected care excellence - Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of the CTO. She has worked as an engineer in IT for over 25 years and is an experienced security solutions architect in the ...
5 months ago Blog.checkpoint.com
IoT Security in the Age of Cyber Threats - These vast neural networks enable IoT devices to seamlessly connect the mundane and the sophisticated into the digital fabric of the internet. This range of devices includes everything right from kitchen appliances and industrial machinery to smart ...
5 months ago Feeds.dzone.com
MIPS chips targeted by new P2Pinfect malware in Redis server and IoT-based attacks - A new variant of P2Pinfect has been observed targeting embedded IoT devices based on 32-bit MIPS processors, malware that aims to bruteforce Secure Shell access to these devices. Written in Rust, the P2Pinfect malware acts as a botnet agent, ...
6 months ago Packetstormsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)