Deutsch | English

[CERT-daily] Tageszusammenfassung - Montag 9-12-2013

Daily end-of-shift report team at cert.at
Mon Dec 9 18:36:01 CET 2013


=======================
= End-of-Shift report =
=======================

Timeframe:   Freitag 06-12-2013 18:00 − Montag 09-12-2013 18:00
Handler:     Matthias Fraidl
Co-Handler:  n/a




*** RuggedCom ROS Multiple Vulnerabilities ***
---------------------------------------------
Siemens has reported to NCCIC/ICS-CERT multiple vulnerabilities in the RuggedCom Rugged OS (ROS). Siemens has produced a firmware update that mitigates these vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to hijack an active Web session and access administrative functions on the devices without proper authorization. These vulnerabilities could be exploited remotely.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-340-01




*** The Biggest Security Stories of 2013 ***
---------------------------------------------
As 2013 comes to a close, security experts are looking back at the major stories and developments of the year, including the Edward Snowden NSA leaks and major malware attacks. In this video, Vitaly Kamluk of Kaspersky Lab examines the biggest security news of 2013 and talks about the lasting effects they may have.
---------------------------------------------
http://threatpost.com/the-biggest-security-stories-of-2013/103125




*** Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt ***
---------------------------------------------
Just dont bork our crim-busting honeypots again Microsoft has teamed up with the FBI to launch a renewed attempt to disrupt the operations of the infamous ZeroAccess botnet.
---------------------------------------------
http://www.theregister.co.uk/2013/12/06/zeroaccess_zombienet_takedown/




*** FAQ: Pony Malware Payload Discovery ***
---------------------------------------------
Our team´s discovery of the spoils of yet another instance of Pony 1.9 has kept us busy the past couple of days. We´ve enjoyed explaining our discovery to journalists and trying our best to answer the questions that arise over social networks and email with each publication of a story. A lot of those questions tend to be similar. 
---------------------------------------------
http://blog.spiderlabs.com/2013/12/faq-pony-malware-payload-discovery.html




*** 2014 Predictions: Blurring Boundaries ***
---------------------------------------------
The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking "does privacy still exist?", cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things, but boring was not one of them.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/2014-predictions-blurring-boundaries/




*** The state of targeted attacks ***
---------------------------------------------
Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners who have involvement in defensive efforts against APTs launched at their organisations.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16059




*** Android-Apps: Sicherheitslücke durch fehlerhafte SSL-Prüfung ***
---------------------------------------------
Das Fraunhofer-Institut für Sichere Informationstechnologie hat mehrere Android-Apps ausfindig gemacht, bei denen die fehlerhafte Prüfung des SSL-Zertifikats den Zugriff auf Zugangsdaten möglich macht. Nur etwa die Hälfte aller kontaktierten Hersteller hat die Sicherheitslücke bisher geschlossen.
---------------------------------------------
http://www.golem.de/news/android-apps-sicherheitsluecke-durch-fehlerhafte-ssl-pruefung-1312-103250-rss.html




*** The world´s most dangerous mobile phone spying app just moved into the tablet and iPad market ***
---------------------------------------------
The evolution of GPS and the smart-phone market has spawned a macabre industry of surveillance apps designed to be covertly installed onto the cellphones of vulnerable employees, business associates, partners and children.
---------------------------------------------
http://www.privacysurgeon.org/blog/incision/the-worlds-most-dangerous-mobile-phone-spying-app-just-moved-into-the-tablet-and-ipad-market/




*** Bypassing Windows AppLocker using a Time of Check Time of Use vulnerability ***
---------------------------------------------
Windows AppLocker is Microsoft´s replacement to Software Restriction Policies in Windows 7, Windows 8, Server 2008 and Server 2012. Windows AppLocker has been promoted by several government agencies such as the National Security Agency and the New Zealand National Cyber Security Center as an effective mechanism to combat the execution of unauthorized code on modern Microsoft Windows based systems.
---------------------------------------------
http://www.nccgroup.com/media/495634/2013-12-04_-_ncc_-_technical_paper_-_bypassing_windows_applocker__2_.pdf




*** Automater - IP URL and MD5 OSINT Analysis ***
---------------------------------------------
Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal.
---------------------------------------------
http://www.tekdefense.com/automater/




*** Drei GIMP-Lücken auf einen Streich ***
---------------------------------------------
Das Sicherheits-Team von Red Hat hat drei Speicherverwaltungsprobleme in der Bildverarbeitungssoftware GIMP gefunden und beseitigt, die dazu ausgenutzt werden könnten, dem Benutzer Schadcode unterzuschieben.
---------------------------------------------
http://www.heise.de/security/meldung/Drei-GIMP-Luecken-auf-einen-Streich-2062907.html




*** Malicious multi-hop iframe campaign affects thousands of Web sites, leads to a cocktail of client-side exploits - part two ***
---------------------------------------------
Ever since we exposed and profiled the evasive, multi-hop, mass iframe campaign that affected thousands of Web sites in November, we continued to monitor it, believing that the cybercriminal(s) behind it, would continue operating it, basically switching to new infrastructure once the one exposed in the post got logically blacklisted, thereby undermining the impact of the campaign internationally. 
---------------------------------------------
http://www.webroot.com/blog/2013/12/09/malicious-multi-hop-iframe-campaign-affects-thousands-web-sites-leads-cocktail-client-side-exploits-part-two/




*** Putting malware in the picture ***
---------------------------------------------
Spammers actively spread malware using fake notifications on behalf of various financial and banking institutions, booking and delivery services and other companies. The arsenal of tricks used by cybercriminals is constantly being updated. In particular, in recent years we have registered a number of English- and German-language mass mailings in which the attackers try to hide malware under photos and pictures.
---------------------------------------------
https://www.securelist.com/en/blog/8159/Putting_malware_in_the_picture




*** [webapps] - Zimbra 0day exploit / Privilegie escalation via LFI ***
---------------------------------------------
http://www.exploit-db.com/exploits/30085




*** D-Link DSR Router Remote Root Shell Exploit ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013120055




*** WordPress DZS Video Gallery 3.1.3 Remote File Disclosure ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2013120050




*** cURL Certificate Validation Flaw Lets Remote Users Spoof SSL Servers ***
---------------------------------------------
http://www.securitytracker.com/id/1029434




*** Security Bulletin: Multiple Security vulnerability fix for IBM Tivoli Storage Manager Administration Center (CVE-2012-5081, CVE-2013-0169, CVE-2013-0443). ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_multiple_security_vulnerability_fix_for_ibm_tivoli_storage_manager_administration_center_cve_2012_5081_cve_2013_0169_cve_2013_0443?lang=en_us




*** Steinberg MyMp3PRO SEH buffer overflow ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/89468


More information about the Daily mailing list
Kontakt
Email: reports@cert.at
Tel.: +43 1 5056416 78
mehr ...
Warnungen
mehr ...
Blog
mehr ...
Jahresbericht 2017
Ein Resumee zur digitalen Sicherheitslage in Österreich

(HTML, PDF).
Letzte Änderung: 2018/5/28 - 15:00:00
Haftungsausschluss / Datenschutzerklärung