=======================
= End-of-Shift report =
=======================
Timeframe: Montag 30-03-2015 18:00 − Dienstag 31-03-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** New reconnaissance threat Trojan.Laziok targets the energy sector ***
---------------------------------------------
A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised ..
---------------------------------------------
http://www.symantec.com/connect/blogs/new-reconnaissance-threat-trojanlazio…
*** WordPress Leads 1.6.1-1.6.2 - Persistent XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7871
*** Drive-by code and Phishing on Swiss websites in 2014 ***
---------------------------------------------
In 2014, about 1,800 Swiss websites were cleaned from drive-by code, compared with 2,700 in 2013, a decline of 33%. At the same time, the number of phishing cases affecting .ch and .li ..
---------------------------------------------
http://securityblog.switch.ch/2015/03/31/drive-by-phishing-swiss-websites-2…
*** Citrix Command Center Bugs Let Remote Users Download Files and Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1031993
*** VB2015 conference programme announced ***
---------------------------------------------
>From drones to elephants: an exciting range of topics will be covered in Prague.In six months time, security researchers from around the world will gather in Prague for the 25th Virus Bulletin conference. Today we are excited to reveal the conference programme.As every year, the selection committees task ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/03_31.xml?rss
*** IoT Research - Smartbands ***
---------------------------------------------
One of the big trends in sphere of health and fitness are fitness trackers such as smartbands. Tracking devices and their mobile applications from three leading vendors were inspected in this report to shed some light on the current ..
---------------------------------------------
http://securelist.com/analysis/publications/69412/iot-research-smartbands/
*** Chinas Man-on-the-Side Attack on GitHub ***
---------------------------------------------
We have looked closer at this attack, and can conclude that China is using their active and passive network infrastructure in order to perform a man-on-the-side attack against GitHub. See our "TTL analysis" at the end of ..
---------------------------------------------
http://www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-…
*** Hacking Browsers: Are Browsers the Weakest Link of the Security Chain? ***
---------------------------------------------
Current scenario The number of cyber attacks is constantly increasing, and according to security experts they grow even more sophisticated. The security firm Secunia has recently released its annual study of trends in software vulnerabilities, an interesting report that highlights the ..
---------------------------------------------
http://resources.infosecinstitute.com/hacking-browsers-are-browsers-the-wea…
*** The sad state of SMTP encryption ***
---------------------------------------------
This is a quick recap of why Im sad about SMTP encryption. It explains how TLS certificate verification in SMTP is useless even if you force it.
---------------------------------------------
https://blog.filippo.io/the-sad-state-of-smtp-encryption/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 27-03-2015 18:00 − Montag 30-03-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** iOS, OS X Library AFNetwork Patches MiTM Vulnerability ***
---------------------------------------------
Until yesterday, a popular networking library for iOS and OS X, used by several apps like Pinterest and Simple was susceptible to SSL man-in-the-middle (MiTM) attacks.
---------------------------------------------
http://threatpost.com/ios-os-x-library-afnetwork-patches-mitm-vulnerability…
*** Cisco Unified Call Manager Arbitrary File Retrieval Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38079
*** Privilege Escalation in TYPO3 Neos ***
---------------------------------------------
http://www.typo3.org/news/article/privilege-escalation-in-typo3-neos/
*** Offenbar schwerwiegendes Datenleck bei Uber ***
---------------------------------------------
Offenbar kursieren im Dark Web zurzeit Zugangsdaten zu Tausenden von Nutzerkonten des Fahrdienstes Uber. Diese werden zu Spottpreisen von mehreren Anbietern laut Motherboard verhökert. Die Datensätze enthalten demnach Benutzername, Passwort und die letzten Ziffern, sowie das Verfallsdatum der ..
---------------------------------------------
http://derstandard.at/2000013594365
*** British Airways: Hacker hatten Zugriff auf Bonusmeilen ***
---------------------------------------------
In einem offenbar automatisierten Angriff auf Konten des British Airways Executive Club ist es Einbrechern möglicherweise gelungen, die Bonusmeilen einiger Kunden abzugreifen.
---------------------------------------------
http://www.golem.de/news/british-airways-hacker-hatten-zugriff-auf-bonusmei…
*** Announcing tlscompare.org ***
---------------------------------------------
As part of an ongoing project on increasing TLS security we are today announcing https://tlscompare.org This webpage is about evaluating a massive extension of the ruleset for HTTPSEverywhere, a browser extension for Chrome and Firefox which ..
---------------------------------------------
https://www.sba-research.org/2015/03/30/announcing-tlscompare-org/
*** Newsletter 3.7.0 - Open Redirect ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7868
*** Projekt-Hosting: Tagelanger DDoS-Angriff auf Github ***
---------------------------------------------
Seit Donnerstag läuft die grösste DDoS-Attacke auf Github seit dem Entstehen des Dienstes. Experten vermuten, der Angriff gehe von chinesische Behörden aus, bestätigt wird das durch den Projekt-Hoster aber nicht.
---------------------------------------------
http://www.golem.de/news/projekt-hosting-tagelanger-ddos-angriff-auf-github…
*** Security Attacks via Malicious QR Codes ***
---------------------------------------------
With the increasing use of smartphones, QR codes are becoming popular. Recently, WhatsApp launched its web version, which needs QR code scanning to access the web version of WhatsApp. So, many people now know what QR code is, but still more are unaware. It is very similar to a bar code we ..
---------------------------------------------
http://resources.infosecinstitute.com/security-attacks-via-malicious-qr-cod…
*** OpenSSL RSA Temporary Key Cryptographic Downgrade Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=36956
*** Ad Networks Ripe for Abuse Via Malvertising ***
---------------------------------------------
Criminals have found a safe haven abusing legitimate processes, such as real-time bidding, implemented by online advertising networks to move exploits and malware, and build botnets and fraud campaigns.
---------------------------------------------
http://threatpost.com/ad-networks-ripe-for-abuse-via-malvertising/111840
*** WordPress Plugin - Revslider update captions CSS file critical vulnerability ***
---------------------------------------------
Today being another day at work for SecureLayer7 to recover our client's defaced website, and bang I think I hit upon a nasty vulnerability of a famous plugin. Although we successfully patched the vulnerability and we fixed the undoing of the blacklisting. On further research I stumbled ..
---------------------------------------------
http://blog.securelayer7.net/wordpress-plugin-revslider-update-captions-css…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 26-03-2015 18:00 − Freitag 27-03-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Cisco Wireless LAN Controller Task Name aaaQueueReader Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38076
*** Verschlüsselung: Kryptographen zeigen neue Angriffe gegen RC4 ***
---------------------------------------------
Eine bislang wenig beachtete Schwäche von RC4 nutzt der Kryptograph Itsik Mantin für seine neue Angriffsmethode. Ein weiterer kürzlich vorgestellter Angriff betrifft IMAP-Verbindungen.
---------------------------------------------
http://www.golem.de/news/verschluesselung-rc4-erneut-unter-beschuss-1503-11…
*** Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2014 Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities in the Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2014. Schneider Electric has released new patches that mitigate these vulnerabilities.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-085-01
*** Beta Bot Trojan ***
---------------------------------------------
In this article, I would like to show how an analysis is performed on the Beta Bot trojan to identify its characteristics. The Beta Bot trojan, classified as Troj/Neurevt-A, is a dangerous trojan. This trojan is transferred to the victim machine through a phishing email, and the user downloads the files disguised ..
---------------------------------------------
http://resources.infosecinstitute.com/beta-bot-trojan/
*** Cisco NX-OS Software DHCP Options Command Injection Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=38062
*** Microsoft will Windows-Lücke nicht schliessen ***
---------------------------------------------
Google entdeckt Fehler, über den sich einfache Nutzer Systemrechte verschaffen können.
---------------------------------------------
http://derstandard.at/2000013551658
*** The bizarre, pre-internet history of ransomware ***
---------------------------------------------
Two months ago, I wrote a short article about helping my mother deal with CryptoWall 2.0., a form of computer virus more broadly known as ransomware. Basically what happens is this: You flip open your laptop to find you have been locked out of all your files. Then a ransom note hovers into view, written ..
---------------------------------------------
https://medium.com/un-hackable/the-bizarre-pre-internet-history-of-ransomwa…
*** Baidu's traffic hijacked to DDoS GitHub.com ***
---------------------------------------------
As a Chinese living outside of China, I frequently visit Chinese websites, many of which use advertising and visitor tracking provided by Baidu, the largest search engine available in China. As I was browsing one of the most popular ..
---------------------------------------------
http://insight-labs.org/?p=1682
*** Vulnerability: CVE-2015-0932 ***
---------------------------------------------
ANTLabs InnGate devices are a popular Internet gateway for visitor-based networks. They're commonly installed in hotels, convention centers and other places that provide temporary guests access to a WiFi connection. If you've ever used WiFi in a hotel, you're familiar with these types of devices as they are typically tied to a specific room number for billing purposes.
---------------------------------------------
http://blog.cylance.com//spear-team-cve-2015-0932
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 25-03-2015 18:00 − Donnerstag 26-03-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Pin-up on your Smartphone!, (Thu, Mar 26th) ***
---------------------------------------------
Yeah, okay, I admit that headline is cheap click bait. Originally, it said Certificate Pinning on Smartphones. If you are more interested in pin-ups on your smartphone, I fear youll have to look elsewhere :). Recently, an email provider that I use changed their Internet-facing services completely. I hadnt seen any announcement that this would happen, and the provider likely thought that since the change was transparent to the customer, no announcement was needed. But Im probably a tad more...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19513&rss
*** Data lurking: How to protect your company against overlooked insider threats ***
---------------------------------------------
Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system err...
---------------------------------------------
http://www.net-security.org/article.php?id=2245
*** Setting issue in Windows 7 and 8.1 could allow privilege escalation ***
---------------------------------------------
Experts of the Project Zero have disclosed a proof-of-concept for the exploitation of a default setting in Windows 7, 8.1 that allow privilege escalation. A new security issue threatens users of Windows 7 and 8.1, this time experts are warning about a default setting in both OSs that could allow local users to elevate privileges...
---------------------------------------------
http://securityaffairs.co/wordpress/35318/hacking/win-7-and-8-1-privilege-e…
*** Security Harden CentOS 7 ***
---------------------------------------------
This HowTo walks you through the steps required to security harden CentOS 7, it's based on the OpenSCAP benchmark, unfortunately the current version of OpenSCAP that ships with CentOS does not offically support CentOS CPEs. But there is a "workaround" that will allow OpenSCAP + OpenSCAP workbench to run on CentOS, I'll document this in a separate post.
---------------------------------------------
http://highon.coffee/blog/security-harden-centos-7/
*** Encryption Solutions for the New World ***
---------------------------------------------
Keeping personal information secure and protected remains a top priority for computer users who now rely heavily on information systems to manage a large part of their personal and business lives. One of the ways to make sure only authorized users have access to information is the use of encryption, a process that transforms data...
---------------------------------------------
http://resources.infosecinstitute.com/encryption-solutions-for-the-new-worl…
*** Who Is the Antidetect Author? ***
---------------------------------------------
Earlier this month I wrote about Antidetect, a commercial tool designed to help thieves evade fraud detection schemes employed by many e-commerce companies. That piece walked readers through a sales video produced by the author of Antidetect showing the software being used to buy products online with stolen credit cards. Today, well take a closer look at clues to a possible real-life identity of this tools creator.
---------------------------------------------
http://krebsonsecurity.com/2015/03/who-is-the-antidetect-author/
*** Hacking-Kit für Steuergeräte im Auto ***
---------------------------------------------
Ein Hacking-Toolkit soll dabei helfen, IT-Sicherheitslücken bei Autos aufzudecken. Ziel ist es, die Hersteller zu mehr Sorgfalt bei diesem Thema zu bewegen.
---------------------------------------------
http://heise.de/-2585225
*** Verschlüsselung: RC4 erneut unter Beschuss ***
---------------------------------------------
Auf der Black Hat Asia hat der Kryptograph Itsik Mantin neue Angriffsmethoden gegen die RC4-Verschlüsselung vorgestellt. Den Grundstein dazu hatte Mantin bereits vor 13 Jahren gelegt. Davon unabhängig wurde kürzlich ein weiterer Angriff gegen RC4 vorgestellt, der IMAP-Verbindungen betrifft.
---------------------------------------------
http://www.golem.de/news/verschluesselung-rc4-erneut-unter-beschuss-1503-11…
*** WordPress Malware Causes Psuedo-Darkleech Infection ***
---------------------------------------------
Darkleech is a nasty malware infection that infects web servers at the root level. It use malicious Apache modules to add hidden iFrames to certain responses. It's difficult to detect because the malware is only active when both server and site admins are not logged in, and the iFrame is only injected once a dayRead More
---------------------------------------------
http://blog.sucuri.net/2015/03/pseudo-darkleech-server-root-infection.html
*** VMSA-2015-0001.2 ***
---------------------------------------------
VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2015-0001.html
*** DFN-CERT-2015-0416 - Citrix Command Center: Zwei Schwachstellen ermöglichen die Übernahme des Systems ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0416/
*** EMC Isilon OneFS Privilege Escalation ***
---------------------------------------------
Topic: EMC Isilon OneFS Privilege Escalation Risk: Medium Text:ESA-2015-049: EMC Isilon OneFS Privilege Escalation Vulnerability EMC Identifier: ESA-2015-049 CVE Identifier: CVE-2015-...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015030182
*** Security Advisories for Drupal Third-Party Modules ***
---------------------------------------------
*** Linear Case - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-084 ***
https://www.drupal.org/node/2459327
*** Webform Multiple File Upload - Moderately Critical - Cross Site Request Forgery (CSRF) - SA-CONTRIB-2015-083 ***
https://www.drupal.org/node/2459323
*** Crumbs - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-082 ***
https://www.drupal.org/node/2459315
*** Petition - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-081 ***
https://www.drupal.org/node/2459311
*** Invoice - Moderately Critical - Multiple vulnerabilities - Unsupported - SA-CONTRIB-2015-085 ***
https://www.drupal.org/node/2459337
*** Ubercart Webform Checkout Pane - Moderately Critical - Cross Site Scripting (XSS) - Unsupported - SA-CONTRIB-2015-087 ***
https://www.drupal.org/node/2459359
*** Decisions - Moderately Critical - Cross Site Scripting (XSS) - Unsupported - SA-CONTRIB-2015-086 ***
https://www.drupal.org/node/2459349
*** Decisions - Moderately Critical - Cross Site Request Forgery (CSRF) - Unsupported - SA-CONTRIB-2015-086 ***
https://www.drupal.org/node/2459349
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 24-03-2015 18:00 − Mittwoch 25-03-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Patched Flash Vulnerability Now Part of Exploit Kit (March 20, 2015) ***
---------------------------------------------
A vulnerability in Adobes Flash Player that was patched on March 12 has already been added to an exploit kit.......
---------------------------------------------
http://www.sans.org/newsletters/newsbites/r/17/23/200
*** Macro-based Malware Increases Along with Spam Volume, Now Drops BARTALEX ***
---------------------------------------------
Early this year Microsoft reported an increase in macro-related threats being used to spread malware via spam. Similarly, we've been seeing a drastic increase in spammed emails with attached Microsoft Word documents and Microsoft Excel spreadsheets that come with embedded macros. Macros are a set of commands or code that are meant to help automate...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/EHquGcibJew/
*** 15,435 vulnerabilities across 3,870 applications were recorded in 2014 ***
---------------------------------------------
In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different vendors, and these numbers ...
---------------------------------------------
http://www.net-security.org/secworld.php?id=18132
*** l+f: XXSs not dead ***
---------------------------------------------
Nur weil es keine Schlagzeilen mehr macht, ist es noch lange nicht aus der Welt. Das beweist etwa eine XSS-Lücke bei Amazon.
---------------------------------------------
http://heise.de/-2584311
*** Multifunctional Vawtrak malware now updated via favicons ***
---------------------------------------------
The Vawtrak (aka Snifula) multifunctional malware has been around since mid-2013. Its information-stealing, backdoor and spying capabilities deservedly earned it the description as the "Swiss army kni...
---------------------------------------------
http://www.net-security.org/malware_news.php?id=2997
*** Not using IPv6? Are you sure? ***
---------------------------------------------
Internet Protocol version 6 (IPv6) has been around for many years and was first supported in Red Hat Enterprise Linux 6 in 2010. Designed to provide, among other things, additional address space on the ever-growing Internet, IPv6 has only recently...
---------------------------------------------
https://securityblog.redhat.com/2015/03/25/security-considerations-regardin…
*** PHP 5.5.23 is available, (Wed, Mar 25th) ***
---------------------------------------------
>From the fine folks at php.net: The PHP development team announces the immediate availability of PHP 5.5.23. Several bugs have been fixed as well as CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331. All PHP 5.5 users are encouraged to upgrade to this version. (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19507&rss
*** F-Secure: FSC-2015-2: PATH TRAVERSAL VULNERABILITY, (Wed, Mar 25th) ***
---------------------------------------------
F-Secure has announced a security vulnerability affecting their corporate and consumer protection products. The details are available here: https://www.f-secure.com/en/web/labs_global/fsc-2015-2
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19509&rss
*** Researcher finds backdoor opened by Dells helper app ***
---------------------------------------------
A security researcher has discovered a serious bug in Dell System Detect, the software Dell users are urged to use to download the appropriate drivers for their machines. The flaw can be exploited by ...
---------------------------------------------
http://www.net-security.org/secworld.php?id=18134
*** Flash in 2015 ***
---------------------------------------------
In the past few years, web exploits had three main targets: Internet Explorer, Java, and Flash. In 2013, the popularity of Java exploits peaked. Bug hunters became really good at finding Java bugs, and corrupting the security manager was a convenient exploitation technique. Multiple exploit campaigns used Java zero-days, and exploit kits (EK) universally adopted these exploits.
In January of 2014, however, Oracle blocked the execution of unsigned applets by default, and exploit authors largely abandoned Java. The change left Internet Explorer and Adobe Flash as the next best targets. Both IE and Flash received attention from exploit developers, but in June of 2014, Microsoft began rolling out heap corruption mitigations such as an isolated heap and delayed frees for IE. Exploit developers again, needed to shift their focus.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2015/03/flash_in_2015.html
*** Guest talk: "Large-scale Automated Software Diversity - Programming Language Technology to Enhance System Security" ***
---------------------------------------------
26/03/2015 - 10:00 am - 11:00 am SBA Research Favoritenstraße 16 1040 Wien
---------------------------------------------
https://www.sba-research.org/events/guest-talk-large-scale-automated-softwa…
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco IOS XR Software DHCPv4 Server Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38006
*** Cisco Mobility Service Engine Password Information Disclosure Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38007
*** Multiple Vulnerabilities in Cisco IOS Software and IOS XE Software Autonomic Networking Infrastructure ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Multiple Vulnerabilities in Cisco IOS Software Common Industrial Protocol ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software Virtual Routing and Forwarding ICMP Queue Wedge Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software and IOS XE Software TCP Packet Memory Leak Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerabilities ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Service Tester (CVE-2014-3566, CVE-2014-6457, CVE-2014-6593, CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=swg21699013
*** IBM Security Bulletin: NTP vulnerabilities affect IBM SmartCloud Entry (CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-9296) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1022036
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0206) ***
http://www.ibm.com/support/docview.wss?uid=swg21697205
*** IBM Security Bulletin: IBM Cloud Manager with OpenStack Nova Vulnerability (CVE-2014-3708) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1022097
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime Technology Edition affect Rational Functional Tester (CVE-2014-3065, CVE-2014-3566, CVE-2014-6511) ***
http://www.ibm.com/support/docview.wss?uid=swg21693297
*** IBM Security Bulletin: Vulnerabilities in GSKit affect IBM Content Collector for SAP Applications (CVE-2015-0138, CVE-2014-8730) ***
http://www.ibm.com/support/docview.wss?uid=swg21699263
*** IBM Security Bulletin : Multiple vulnerabilities in IBM Java Runtime affect IBM Integration Bus and WebSphere Message Broker ***
http://www.ibm.com/support/docview.wss?uid=swg21697107
*** IBM Security Bulletin: Multiple vulnerabilities in the IBM Java Runtime affect Rational DOORS Web Access (CVE-2014-6593, CVE-2015-0410, CVE-2015-0138) ***
http://www.ibm.com/support/docview.wss?uid=swg21697068
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Tivoli Netcool Configuration Manager (ITNCM) (CVE-2014-6549) (CVE-2015-0408) (CVE-2015-0412) (CVE-2015-0395) (CVE-2015-0403) (CVE-2015-0406) (CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=swg21699907
*** DFN-CERT-2015-0399 GnuTLS: Mehrere Schwachstellen ermöglichen das Umgehen von Sicherheitsvorkehrungen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0399/
*** GE and MACTek HART Device DTM Vulnerability (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-15-036-01 GE and MACTek HART Device DTM Vulnerability that was published February 5, 2015, on the NCCIC/ICS-CERT web site. This advisory provides mitigation details for an improper input vulnerability in the HART Device Type Manager (DTM) library utilized in GE and MACTek's HART Device DTM.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-036-01A
*** Random Article component for Joomla! multiple SQL injection ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/101773
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 23-03-2015 18:00 − Dienstag 24-03-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** DMARC and Spam: Why It Matters ***
---------------------------------------------
Recently I discussed how TorrentLocker spam was using email authentication for its spam runs. At the time, I suggested that these spam runs were using email authentication to gather information about victim networks and potentially improve the ability to evade spam filters. DomainKeys Identified Mail's (DKIM) own specification mentions the possibility of messages with from "trusted sources" and with a...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/W3IX-WkypVo/
*** Why enterprise IT and security teams should talk more ***
---------------------------------------------
The "It wont happen to me" mentality combined with communication gaps between the IT and security teams greatly increases enterprises risk of being breached.
---------------------------------------------
http://www.scmagazine.com/why-enterprise-it-and-security-teams-should-talk-…
*** Xen shows off 35-piece cloudpocalypse collection ***
---------------------------------------------
The latest fixing fashions for open-source hypervisors hit the catwalk The Xen Project has fixed 35 flaws, all rated critical, for versions 4.3 and 4.4 of its flagship hypervisor. The fixes appear to correspond to flaws identified after the late February 2014 cloudpocalypse, when major cloud providers feared they would once again need to reboot substantial parts of their server fleets to keep them secure.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/03/24/xen_shows_o…
*** Four advantages of an identity behavior-based approach to cybersecurity ***
---------------------------------------------
With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 percent from 2013 to 2014 and...
---------------------------------------------
http://www.net-security.org/article.php?id=2243
*** KNX-Schwachstellen: Spielen mit den Lichtern der anderen ***
---------------------------------------------
Das aktuelle KNX-Protokoll abzusichern, halten die Entwickler nicht für nötig. Denn Angreifer brauchen physischen Zugriff auf das System. Doch den bekommen sie leichter als gedacht - und können dann sogar Türöffner und Alarmanlagen steuern.
---------------------------------------------
http://www.golem.de/news/knx-schwachstellen-spielen-mit-den-lichtern-der-an…
*** BlackHat talk hibernated over 0-day in SAPs Afaria mobile manager ***
---------------------------------------------
Researcher has form as a gent: he held back disclosure of medical records leak Alexander Polyakov has been forced to withdraw a talk detailing dangerous vulnerabilities into SAPs mobile device management product Afaria scheduled to be given at BlackHat Asia Pacific this week.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/03/24/sap_blackha…
*** Google deckt erneut Missbrauch im SSL-Zertifizierungssystem auf ***
---------------------------------------------
Über das Public-Key-Pinning im Webbrowser Chrome ist Google auf gefälschte Zertifikate für Google-Domains gestoßen. Diese werden von der Root-CA CNNIC beglaubigt, der viele Betriebssysteme und Browser beim Aufbau verschlüsselter Verbindungen vertrauen.
---------------------------------------------
http://heise.de/-2583414
*** The importance of standards in electronic identification and trust services providers ***
---------------------------------------------
ENISA publishes a new report on the importance of standards in the area of electronic identification and trust services providers.
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/the-importance-of-standards-in-…
*** Full, cracked version of NanoCore RAT leaked, onslaught of infection attempts expected ***
---------------------------------------------
NanoCore, a lesser-known remote access Trojan (RAT), has recently been spotted being delivered to employees of energy companies in Asia and the Middle East via spear-phishing emails impersonating a le...
---------------------------------------------
http://www.net-security.org/malware_news.php?id=2995
*** Android Installer Hijacking Vulnerability Could Expose Android Users to Malware ***
---------------------------------------------
Executive Summary We discovered a widespread vulnerability in Google's Android OS we are calling "Android Installer Hijacking", estimated to impact 49.5 percent of all current Android users. In detail: Android Installer Hijacking allows an attacker...
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijack…
*** The average DDoS attack tripled in volume ***
---------------------------------------------
The average packet volume for DDoS attacks increased 340 percent to 4.36 million packets per second (Mpps), and the average bit volume swelled 245 percent to 12.1 Gbps in the final quarter of 2014, ac...
---------------------------------------------
http://www.net-security.org/secworld.php?id=18125
*** Privilege Gone Wild 2: Over 25% of Organizations Have No Privileged Access Controls ***
---------------------------------------------
BeyondTrust recently conducted a survey, with over 700 respondents, to explore how organizations view the risk of misuse from privileged account misuse, as well as trends in addressing and mitigating those risks.
---------------------------------------------
http://blog.beyondtrust.com/privilege-gone-wild-2-over-25-of-organizations-…
*** Is Your Multi-Factor Authentication Solution the Real Thing? ***
---------------------------------------------
In infosec, multi-factor authentication is often considered a positive, constructive element of layered security. However, some people have an oversimplified view. With multi-factor authentication, there are many nuances to consider. At BSides Austin I presented on this topic. When shopping for a multi-factor authentication solution, what should you look for? There are over 200 multi-factor authentication vendors, how do you evaluate the best one for your needs? You can weed out more the half
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/is-your-multi-factor-a…
*** Why Website Reinfections Happen ***
---------------------------------------------
I joined Sucuri a little over a month ago. My job is actually as a Social Media Specialist, but we have this process where regardless of your job you have to learn what website infections look like and more importantly, how to clean them. It's this idea that regardless of you are you must always...
---------------------------------------------
http://blog.sucuri.net/2015/03/why-website-reinfections-happen.html
*** HP Security Bulletins ***
---------------------------------------------
*** HPSBST03196 rev.1- HP StoreEver MSL6480 Tape Library running OpenSSL, Remote Code Execution ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04599191
*** HPSBGN03299 rev.1 - HP IceWall SSO Dfw, SSO Certd, MCRP, and Federation Agent running OpenSSL, Remote Disclosure of Information, Unauthorized Access ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04604357
*** HPSBHF03289 rev.1- HP ThinClient PCs running ThinPro Linux, Remote Code Execution, Denial of Service, Disclosure of information ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04602055
*** HPSBMU03220 rev.1 - HP Shunra Network Appliance / HP Shunra Wildcat Appliance, Remote Execution of Code ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04518183
*** HPSBMU03297 rev.1- HP Helion Application Lifecycle Service (ALS) for Linux, Remote Code Execution ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04599861
*** HPSBMU03301 rev.1 - HP BladeSystem c-Class Onboard Administrator running OpenSSL, Remote Disclosure of Information ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04609844
*** HPSBHF03151 rev.1 - HP Integrated Lights-Out 2 and 4 (iLO 2, iLO 4), Chassis Management (iLO CM), Remote Denial of Service, Remote Execution of Code, Elevation of Privilege ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04486432
*** HPSBHF03275 rev.1 - HP Integrated Lights-Out 2, 3, and 4 (iLO 2, iLO 3, iLO 4), Remote Disclosure of Information ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04582218
*** HPSBHF03276 rev.1 - HP Integrated Lights-Out 2, 3, and 4 (iLO 2, iLO 3, iLO 4), Remote Unauthorized Access, Denial of Service (Dos) ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04582368
*** HPSBMU03292 rev.1 - HP Operations Orchestration Authentication Bypass ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595607
*** HPSBMU03291 rev.1 - HP Operations Orchestration running Powershell Operations, Remote Disclosure of Information ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595417
*** HPSBMU03263 rev.1 - HP Insight Control running OpenSSL, Remote Disclosure of Information ***
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04574073
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM InfoSphere Balanced Warehouse C3000, C4000, IBM Smart Analytics System 1050, 2050 and 5710 are affected by vulnerabilities in NTP (CVE-2014-9293, CVE-2014-9294, CVE-2014-9297, CVE-2014-9298) ***
http://www.ibm.com/support/docview.wss?uid=swg21699578
*** IBM Security Bulletin: Vulnerabilities in IBM Rational ClearQuest (CVE-2014-8925) ***
http://www.ibm.com/support/docview.wss?uid=swg21699148
*** IBM Security Bulletin: IBM Forms Experience Builder is affected by a Dojo Toolkit vulnerability (CVE-2014-8917) ***
http://www.ibm.com/support/docview.wss?uid=swg21697448
*** IBM Security Bulletin: IBM Security Identity Manager Adapters passwords exposed in log files (CVE-2014-8923) ***
http://www.ibm.com/support/docview.wss?uid=swg21699902
*** IBM Security Bulletin: Multiple vulnerabilities IBM Java SDK affect IBM Rational Connector for SAP Solution Manager (CVE-2014-3566 CVE-2014-6457) ***
http://www.ibm.com/support/docview.wss?uid=swg21698921
*** IBM Security Bulletin: Vulnerability in IBM Java SDK affects IBM Sterling Connect:Direct for Microsoft Windows (CVE-2014-3065) ***
http://www.ibm.com/support/docview.wss?uid=swg21696456
*** IBM Security Bulletin: Multiple vulnerabilities in Java Runtime affect XIV Management Tools (CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005143
*** IBM Security Bulletin: Multiple vulnerabilities IBM Java SDK affect IBM Rational Connector for SAP Solution Manager (CVE-2014-6593 CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=swg21698695
*** IBM Security Bulletin: Vulnerability in Apache Struts affects SAN Volume Controller and Storwize Family (CVE-2014-7809) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005037
*** IBM Security Bulletin: Multiple Kerberos (krb5) vulnerabilities affect PowerKVM (Multiple CVEs) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1022076
*** IBM Security Bulletin: Security Bulletin: IBM i is affected by the following SAMBA vulnerabilities: CVE-2015-0240 ***
http://www.ibm.com/support/docview.wss?uid=nas8N1020638
*** EMC Documentum xMS information disclosure ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/101741
*** DSA-3203 tor - security update ***
---------------------------------------------
Several denial-of-service issues have been discovered in Tor, aconnection-based low-latency anonymous communication system.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3203
*** InBoundio Marketing Plugin <= 2.0.3 - Shell Upload ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7864
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 20-03-2015 18:00 − Montag 23-03-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Apple: Those security holes we fixed last week? Youre going to need to repatch ***
---------------------------------------------
Turns out those bugs werent quite squished Apple has released a follow-up to last weeks security update after finding a pair of flaws that are still vulnerable on patched systems.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/03/20/apple_remem…
*** Drupal Compromise Analysis Including Indicators of Compromise ***
---------------------------------------------
I would like to thank fellow SpiderLabs Researcher Chaim Sanders and Dennis Wilson, Bryant Smith and Casey Critchfield for their help with gathering data and analyzing this attack. Analysis of a real Drupal compromise In this blog post, we will...
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Drupal-Compromise-Analy…
*** Operation Woolen Goldfish, a hacking campaign in the wild ***
---------------------------------------------
Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor group known as Rocket Kitten. Security experts at Trend Micro have uncovered a new cyber espionage campaign that is targeting a number of European organisations and businesses. The attackers run a spear phishing campaign that...
---------------------------------------------
http://securityaffairs.co/wordpress/35128/cyber-crime/operation-woolen-gold…
*** PoSeidon the most sophisticated PoS malware until now ***
---------------------------------------------
Cisco Security Team has spotted in the wild a new Point-of-Sale malware dubbed PoSeidon that is more sophisticated than previously detected PoS malware. Expert at Cisco have discovered a new Point-of-Sale (PoS) malware dubbed PoSeidon. The experts have discovered many similarities with the popular Zeus Trojan and use sophisticated methods to find card data respect other POS malware like BlackPoS, which was used...
---------------------------------------------
http://securityaffairs.co/wordpress/35181/cyber-crime/poseidon-pos-malware.…
*** CREEPS rejoice: Small biz Cisco phones open to eavesdrop 0-day ***
---------------------------------------------
Open phones may crop up on Shodan Creeps can listen in to conversations placed over vulnerable Cisco small business phones.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/03/23/creeps_rejo…
*** New Dridex malware evades detection with AutoClose function ***
---------------------------------------------
Security experts at Proofpoint have discovered a new phishing campaign that exploits a Dridex variant that evades detection with AutoClose function. Criminal crews behind the Dridex banking malware are very prolific and are improving the popular malicious code. Recently we have discussed about a Dridex variant which was spread through phishing messages with Microsoft Office documents embedding malicious macros. The attackers exploited social engineering technique to lure...
---------------------------------------------
http://securityaffairs.co/wordpress/35197/cyber-crime/new-dridex-malware.ht…
*** Adobe CVE-2011-2461 Remains Exploitable Four Years After Patch ***
---------------------------------------------
A Flash vulnerability that Adobe patched four years ago actually remains exploitable according to a presentation given by a pair of researchers at the TROOPERS security conference.
---------------------------------------------
http://threatpost.com/adobe-cve-2011-2461-remains-exploitable-four-years-af…
*** Watch for updated router firmware!, (Mon, Mar 23rd) ***
---------------------------------------------
With the OpenSSL updates this week I am sure you are all diligently testing and deploying to all your vulnerable servers. Something you may not have though of is that most SOHO routers run some kind of *nix variant and will most likely make use of OpenSSL. Be sure to watch for new firmware for those devices as well. On Friday I chatted to two of the larger manufacturers and neither had any timeline for deploying new firmware containing the OpenSSL patches and both said to watch for
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19497&rss
*** BIOS-Rootkit LightEater: In den dunklen Ecken abseits des Betriebssystems ***
---------------------------------------------
Ein Rootkit, das unabhängig vom Betriebssystem operiert, sämtlichen Speicher auslesen kann und durch den Tausch der Festplatte im System nicht gestoppt wird - was klingt wie eine IT-Gruselgeschichte haben zwei Forscher nun öffentlich präsentiert.
---------------------------------------------
http://heise.de/-2582782
*** VU#631788: Multiple BIOS implementations permit unsafe SMM function calls to memory locations outside of SMRAM ***
---------------------------------------------
Vulnerability Note VU#631788 Multiple BIOS implementations permit unsafe SMM function calls to memory locations outside of SMRAM Original Release date: 20 Mar 2015 | Last revised: 20 Mar 2015 Overview Multiple BIOS implementations permit unsafe System Management Mode (SMM) function calls to memory locations outside of SMRAM. Description Multiple BIOS implementations permit unsafe System Management Mode (SMM) function calls to memory locations outside of SMRAM. According to Corey Kallenberg
---------------------------------------------
http://www.kb.cert.org/vuls/id/631788
*** Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products ***
---------------------------------------------
cisco-sa-20150320-openssl
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** DSA-3199 xerces-c - security update ***
---------------------------------------------
Anton Rager and Jonathan Brossard from the Salesforce.com ProductSecurity Team and Ben Laurie of Google discovered a denial of servicevulnerability in xerces-c, a validating XML parser library for C++. Theparser mishandles certain kinds of malformed input documents, resultingin a segmentation fault during a parse operation. An unauthenticatedattacker could use this flaw to cause an application using thexerces-c library to crash.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3199
*** DSA-3202 mono - security update ***
---------------------------------------------
Researchers at INRIA and Xamarin discovered several vulnerabilities inmono, a platform for running and developing applications based on theECMA/ISO Standards. Monos TLS stack contained several problems thathampered its capabilities: those issues could lead to clientimpersonation (via SKIP-TLS), SSLv2 fallback, and encryption weakening(via FREAK).
---------------------------------------------
https://www.debian.org/security/2015/dsa-3202
*** Bugtraq: FreeBSD Security Advisory FreeBSD-SA-15:06.openssl [REVISED] ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534943
*** Xen Project 4.4.2 ***
---------------------------------------------
We are pleased to announce the release of Xen 4.4.2. This is available immediately from its git repository http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.4 (tag RELEASE-4.4.2) or from this download page This fixes the following critical vulnerabilities:...
---------------------------------------------
http://www.xenproject.org/downloads/xen-archives/xen-44-series/xen-442.html
*** Xen Project 4.3.4 ***
---------------------------------------------
We are pleased to announce the release of Xen 4.3.4. This is available immediately from its git repository http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.3 (tag RELEASE-4.3.4) or from this page. Note that this is expected to be the last release of the 4.3 stable series. The tree will be switched to security only maintenance mode after this release. This fixes the following critical vulnerabilities:...
---------------------------------------------
http://www.xenproject.org/downloads/xen-archives/xen-43-series/xen-434.html
*** SA-CONTRIB-2015-066 - Tracking Code - Cross Site Request Forgery (CSRF) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-066Project: Tracking Code (third-party module)Version: 7.xDate: 2015-March-04Security risk: 13/25 ( Moderately Critical) AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site Request ForgeryDescriptionTracking Code module allows you to create tracking code snippets and control their visibility.The module doesnt sufficiently protect some URLs against CSRF. A malicious user can cause an administrator to disable tracking codes by getting
---------------------------------------------
https://www.drupal.org/node/2445961
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect Sterling Connect:Enterprise for UNIX (CVE-2014-3569, CVE-2015-0204, CVE-2014-3570, CVE-2014-3572, CVE-2014-8275) ***
http://www.ibm.com/support/docview.wss?uid=swg21699211
*** IBM Security Bulletin: TLS padding vulnerability affects IBM API Management (CVE-2014-8730) ***
http://www.ibm.com/support/docview.wss?uid=swg21699160
*** IBM Security Bulletin: IBM Content Collector affected by vulnerability in IBM Dojo Toolkit (CVE-2014-8917) ***
http://www.ibm.com/support/docview.wss?uid=swg21694603
*** IBM Security Bulletin: Multiple security vulnerabilities in IBM Java Runtime affect IBM Rational ClearCase (CVE-2014-3566, CVE-2014-6457) ***
http://www.ibm.com/support/docview.wss?uid=swg21698748
*** IBM Security Bulletin: XML External Entity Processing in Castor might affect IBM Business Process Manager (CVE-2014-3004) ***
http://www.ibm.com/support/docview.wss?uid=swg21690565
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Tivoli Storage Productivity Center July 2014 CPU ***
http://www.ibm.com/support/docview.wss?uid=swg21695005
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Financial Transaction Manager for ACH Services, Check Services and Corporate Payment Services (CVE-2014-6593, CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=swg21698702
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Performance Tester (CVE-2014-3566, CVE-2014-6457, CVE-2014-6593, CVE-2015-0410) ***
http://www.ibm.com/support/docview.wss?uid=swg21699032
*** IBM Security Bulletin: IBM Forms Viewer can crash based on an embedded PNG image (CVE-2014-9495, CVE-2015-0973) ***
http://www.ibm.com/support/docview.wss?uid=swg21697791
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 19-03-2015 18:00 − Freitag 20-03-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Paper: Dylib hijacking on OS X ***
---------------------------------------------
Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks.A few years ago, DLL hijacking on Windows was really hot, despite the fact that the concept had been discussed by none other than the NSA as far ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/03_19.xml?rss
*** FindPOS: New POS Malware Family Discovered ***
---------------------------------------------
Unit 42 has discovered a new Point of Sale (POS) malware family, which includes multiple variants created as early as November 2014. Over the past few weeks we have been analyzing this malware family, which ..
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/03/findpos-new-pos-malware-…
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=37934http://tools.cisco.com/security/center/viewAlert.x?alertId=37947http://tools.cisco.com/security/center/viewAlert.x?alertId=37946
*** Security Update 2015-003 ***
---------------------------------------------
https://support.apple.com/kb/HT204563
*** Who Develops Code for IT Support Scareware Websites? ***
---------------------------------------------
When investigating a website used as part of an IT support scam, I came across a web page that attempted to fool the visitor into thinking that the persons system was infected. The goal was to persuade the potential victim to call a Microsoft Certified Live Technician at the designated phone number ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19489&rss
*** CryptoWall 3.0 Ransomware Partners With FAREIT Spyware ***
---------------------------------------------
Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that's combined with spyware - a first for crypto-ransomware. This development just comes at the heels of the discovery that ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/cryptowall-3-0-r…
*** Rockwell Automation FactoryTalk DLL Hijacking Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for multiple DLL Hijacking vulnerabilities in a software component included with Rockwell Automation's FactoryTalk View Studio product.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-062-02
*** CVE-2015-0336 (Flash up to 16.0.0.305) and Exploit Kits ***
---------------------------------------------
As reported by Malwarebytes and FireEye, Nuclear Pack is now taking advantage of a vulnerability patched with the last version of Flash Player ( 17.0.0.134 )
---------------------------------------------
http://malware.dontneedcoffee.com/2015/03/cve-2015-0336-flash-up-to-1600305…
*** Erhebliche Sicherheitsmängel bei Geschenkkarten ***
---------------------------------------------
Geschenkkarten lassen sich erschreckend einfach manipulieren, wird in der aktuellen Ausgabe des Computermagazins c’t gewarnt. Während Geldscheine mit immer mehr Sicherheitsmerkmalen gegen Fälschungen geschützt werden, sieht das bei den beliebten Geschenkkarten völlig anders aus. "Mit simplen Tricks ..
---------------------------------------------
http://derstandard.at/2000013205756
*** Android Security Symposium, co-organized by SBA Research ***
---------------------------------------------
https://www.sba-research.org/events/android-security-symposium-co-organized…
*** Apple: Anti-Viren-Apps für iOS "irreführend" ***
---------------------------------------------
Als Begründung für den plötzlichen Rauswurf von Anti-Viren-Software aus dem App Store hat Apple einem Bericht zufolge angeführt, diese Apps könnten Nutzer glauben lassen, es gäbe Viren für iOS.
---------------------------------------------
http://heise.de/-2581916
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 18-03-2015 18:00 − Donnerstag 19-03-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Sicherheitsforscher: Unsichtbare Apps unter iOS 8 weiterhin möglich ***
---------------------------------------------
Mit einer neuen Methode ist es möglich, für den Nutzer praktisch unsichtbare iOS-Software zu installieren und diese als Spyware einzusetzen, erklärt ein Sicherheitsforscher – dies funktioniere auch auf Jailbreak-freien iPhones.
---------------------------------------------
http://heise.de/-2579429
*** Experten warnen vor Risiken vernetzter medizinischer Geräte ***
---------------------------------------------
"Wenn vernetztes Gerät in menschlichen Körper implantiert wurde, sind Konsequenzen eines Cyberangriffs besonders bedrohlich"
---------------------------------------------
http://derstandard.at/2000013144564
*** Drupal Core - Moderately Critical - Multiple Vulnerabilities - SA-CORE-2015-001 ***
---------------------------------------------
https://www.drupal.org/SA-CORE-2015-001
*** SA-CONTRIB-2015-079 - Chaos tool suite (ctools) - Multiple vulnerabilities ***
---------------------------------------------
https://www.drupal.org/node/2454909
*** SA-CONTRIB-2015-078 - Webform - Cross Site Scripting (XSS) ***
---------------------------------------------
https://www.drupal.org/node/2454903
*** Introduction to GSM Security ***
---------------------------------------------
Introduction The Global System for Mobile Communication or GSM is a wireless communication that uses digital technology and is widely deployed across the globe for mobile communications, such as mobile phones. This technology utilizes microwaves, and its signal transmission is divided by time, ..
---------------------------------------------
http://resources.infosecinstitute.com/introduction-to-gsm-security/
*** New BIOS Implant, Vulnerability Discovery Tool to Debut at CanSecWest ***
---------------------------------------------
Researchers are expected to present at CanSecWest a BIOS rootkit that automates BIOS vulnerability discovery and implants persistent malware.
---------------------------------------------
http://threatpost.com/new-bios-implant-vulnerability-discovery-tool-to-debu…
*** Freak-Attacke: Noch immer tausende Android- und iOS-Apps gefährdet ***
---------------------------------------------
Im Vergleich zu früheren OpenSSL-Lücken wie Heartbleed sind die Auswirkungen der vor einigen Wochen aufgetauchten Freak-Attacke vergleichsweise begrenzt. Dies liegt nicht zuletzt daran, dass für einen Angriff sowohl Client als auch Server verwundbar sein müssen, und mittlerweile viele Browser-Hersteller mit Updates die entsprechende Lücke abgedichtet haben.
---------------------------------------------
http://derstandard.at/2000013168279
*** Cisco will an falsche Adressen liefern, um NSA zu täuschen ***
---------------------------------------------
Router und andere Hardware soll an leerstehende Wohnungen versandt werden, um Empfänger zu verschleiern
---------------------------------------------
http://derstandard.at/2000013170564
*** Ransomware - should you pay? ***
---------------------------------------------
The big question, usually left unanswered in technical discussions of ransomware, is, "Should you pay?" We help you make up your mind.
---------------------------------------------
https://nakedsecurity.sophos.com/2015/03/19/ransomware-should-you-pay/
*** Critical Vulnerability in Microsoft Translator hub writeup ***
---------------------------------------------
A month back I was hunting for Vulnerabilities in Microsoft Web services, as Microsoft has large online infrastructure, finding a vulnerability which could lead to Microsoft hall of fame for security researchers wasn't difficult. While browsing around their online services, one of their services, ..
---------------------------------------------
https://haiderm.com/critical-vulnerability-in-microsoft-translator-hub-writ…
*** The Impacts of a Hacked Website ***
---------------------------------------------
Today, with the proliferation of open-source technologies like WordPress, Joomla! and other Content Management Systems (CMS) people around the world are able to quickly establish a virtual presence with little to no cost. In the process however, a lot is being lost in terms of what it means to own a ..
---------------------------------------------
http://blog.sucuri.net/2015/03/the-impacts-of-a-hacked-website.html
*** Intrusion Detection (IDS) for Analysts ***
---------------------------------------------
IDS device installed? Check. IDS seeing traffic? Check. IDS generating Events? Check. Analysts investigating Events? Ummm .. Investigating IDS alerts is a process like any other; however the variable nature of Information Security often makes this process difficult to adhere to. Maintaining ..
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/intrusion-detection-id…
*** OpenSSL Security Advisory [19 Mar 2015] ***
---------------------------------------------
https://www.openssl.org/news/secadv_20150319.txt
*** Google Analytics by Yoast <= 5.3.2 - Stored Cross-Site Scripting (XSS) ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7856
*** Erschlichenes Zertifikat: Microsoft antwortet vier Jahre nicht auf Warnung ***
---------------------------------------------
Zum fälschlicherweise ausgestellten Zertifikat für die Microsoft-Domain live.fi sind weitere Details bekannt. Demnach hatte sich Microsoft Wochen Zeit gelassen, um zu reagieren. In einem ähnlichen Fall ließ Microsoft sogar vier Jahre verstreichen.
---------------------------------------------
http://www.golem.de/news/gefaelschtes-zertifikat-microsoft-antwortet-vier-j…
*** TLS-Zertifikate: Comodo stellt fälschlicherweise Microsoft-Zertifikat aus ***
---------------------------------------------
Für die Domain live.fi, die Microsoft für die finnische Version seiner Live-Services nutzt, ist ein unberechtigtes Zertifikat von Comodo ausgestellt worden. Dabei wird eine Reihe von Schwächen des Zertifikatssystems deutlich.
---------------------------------------------
http://www.golem.de/news/tls-zertifikate-comodo-stellt-gefaelschtes-microso…
*** Aktiver Angriff auf Shop-System xt:Commerce ***
---------------------------------------------
Angreifer nutzen die Sicherheitslücke in einem Versionszweig des Online-Shop-Systems xt:Commerce aktiv aus, um an sensible Kundendaten zu gelangen. Wer den Hotfix noch nicht eingespielt hat, sollte dies jetzt schleunigst tun.
---------------------------------------------
http://heise.de/-2580640
*** Cisco IOS Software Autonomic Networking Infrastructure Overwrite Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=37935
*** Linux-Entwickler erschweren Rowhammer-Angriffe ***
---------------------------------------------
Momentan kann ein Programm mit einfachen Nutzerrechten beim Kernel erfragen, wo im Speicher die Daten eines Prozesses liegen. Das vereinfacht den Rowhammer-Angriff. Ab Linux ..
---------------------------------------------
http://heise.de/-2580654
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 17-03-2015 18:00 − Mittwoch 18-03-2015 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Malware Hunting with the Sysinternals Tools ***
---------------------------------------------
This session provides an overview of several Sysinternals tools, including Process Monitor, Process Explorer, and Autoruns, focusing on the features useful for malware analysis and removal. These utilities enable deep inspection and control of processes, file system and registry activity, and autostart execution points. Mark Russinovich demonstrates their malware-hunting capabilities by presenting several real-world cases that used the tools to identify and clean malware, and concludes by...
---------------------------------------------
http://blog.malwareresearch.institute/video/2015/03/17/malware-hunting-with…
*** Pass the hash!, (Wed, Mar 18th) ***
---------------------------------------------
No, this isnt about sharing a hallucinogen-laced bong for a smoke. The hash were referring to here is the one that Wikipedia aptly but unhelpfully defines as a derivation of data, notably used in cryptographic hash functions. Passing the hash is a form of login credential theft that is quite prevalent. In it, an attacker captures the encoded session password (the hash) from one computer, and then re-uses it to illicitly access another computer. On (most configurations of) the Microsoft Windows...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19479&rss
*** SSL Labs unveils free open source tool, new APIs ***
---------------------------------------------
Qualys SSL Labs now includes free assessment APIs, accompanied by a free open source tool that can be used for bulk and automated testing of websites. These new enhancements provide the same results a...
---------------------------------------------
http://www.net-security.org/secworld.php?id=18096
*** Apple-Browser: Update für drei Safari-Versionen behebt Sicherheitslücken ***
---------------------------------------------
Apple hat in der Nacht zum Mittwoch Aktualisierungen für Safari unter OS X Mountain Lion, OS X Mavericks und OS X Yosemite veröffentlicht. Damit werden teils schwerwiegende Fehler ausgebügelt.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Apple-Browser-Update-fuer-drei-Safar…
*** Fatally flawed RC4 should just die, shout angry securobods ***
---------------------------------------------
Its the Swiss Cheese of infosec and were all gazing through its holes Security researchers have banged another nail into the coffin of the ageing RC4 encryption algorithm.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/03/18/kill_rc4_sa…
*** Mobile Android, iOS Apps Still Vulnerable to FREAK Attacks ***
---------------------------------------------
FireEye scanned iOS and Android apps downloaded billions of times in aggregate and determined that, despite the availability of patches, because the apps still connect to vulnerable HTTPS servers, they're subject to FREAK attacks.
---------------------------------------------
http://threatpost.com/mobile-android-ios-apps-still-vulnerable-to-freak-att…
*** Cisco Content Services Switch (11500) Unauthenticated Port Forwarding Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=37889
*** VU#868948: HP ArcSight contains multiple vulnerabilities ***
---------------------------------------------
Vulnerability Note VU#868948 HP ArcSight contains multiple vulnerabilities Original Release date: 17 Mar 2015 | Last revised: 17 Mar 2015 Overview HP ArcSight contains multiple vulnerabilities. Description CWE-434: Unrestricted Upload of File with Dangerous Type - CVE PendingHP ArcSight Logger 5.3.1.6838.0 configuration import file upload capability does not sanitize file names, which allows a remote, authenticated attacker to put arbitrary files into the document root. This vulnerability...
---------------------------------------------
http://www.kb.cert.org/vuls/id/868948
*** Security Advisory - Resource Management Vulnerability in the AR1220 ***
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Security Advisory - Directory File Deletion Vulnerability in UDS ***
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Security Advisory - Multiple Injection Vulnerabilities in UDS ***
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** [DSA 3195-1] php5 security update ***
---------------------------------------------
Multiple vulnerabilities have been discovered in the PHP language: CVE-2015-2305 - Guido Vranken discovered a heap overflow in the ereg extension (only applicable to 32 bit systems). ... CVE-2015-0231 - Stefan Esser discovered a use-after-free in the unserialisation of objects. CVE-2015-0232 - Alex Eubanks discovered incorrect memory management in the exif extension. CVE-2015-0273 - Use-after-free in the unserialisation of DateTimeZone.
---------------------------------------------
https://lists.debian.org/debian-security-announce/2015/msg00080.html
*** XZERES 442SR Wind Turbine Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a cross-site request forgery vulnerability in XZERES's 442SR turbine generator operating system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-076-01
*** Honeywell XL Web Controller Directory Traversal Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a directory traversal vulnerability in Honeywell's XL Web Controller.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-076-02