=======================
= End-of-Shift report =
=======================
Timeframe: Montag 29-06-2015 18:00 − Dienstag 30-06-2015 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Windows kerberos ticket theft and exploitation on other platforms ***
---------------------------------------------
I decided to take a look at how the kerberos tickets can be dumped from a Windows target and re-used on Linux. It was surprisingly easy to accomplish.
---------------------------------------------
https://mikkolehtisalo.wordpress.com/2015/06/29/copying-windows-kerberos-ti…
*** Why vulnerability disclosure shouldn't be a marketing tool ***
---------------------------------------------
So now we have three approaches to vulnerability disclosure: full disclosure, responsible disclosure, and marketing disclosure. My concern with the latter is that by its very nature it will get more coverage in both the IT industry and mainstream media.
...
In the cases where the vulnerability does affect the organization, the security team is called into action to remediate it, but this remediation may be based more on the impact the vulnerability has had on the news headlines rather than on the impact it actually may have on the environment, This results in already overstretched security teams being distracted from other core tasks.
---------------------------------------------
http://www.net-security.org/article.php?id=2318
*** DSA-3297 unattended-upgrades - security update ***
---------------------------------------------
It was discovered that unattended-upgrades, a script for automaticinstallation of security upgrades, did not properly authenticatedownloaded packages when the force-confold or force-confnew dpkg optionswere enabled via the DPkg::Options::* apt configuration.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3297
*** How Malware Campaigns Employ Google Redirects and Analytics, (Tue, Jun 30th) ***
---------------------------------------------
The email message sent to the bank employee claimed that the sender received a wire transfer from the recipients organization and that the sender wanted to confirm that the payment went through without issues. The victim was encouraged to click a link that many people would considersafe, in part because it began with https://www.google.com/.
How would you examine the nature of this email? Examining MSG and EML Files on Linux One way to analyze the suspicious message saved as an Outlook .msg file
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19843&rss
*** Tearing Apart a Datto ***
---------------------------------------------
Datto devices are becoming a popular backup solution for small to medium sized businesses. They are easy to use and well equipped out of the box. We recently found ourselves in an engagement where one of these devices was accessible via the LAN. Gaining access to backups is a bit of a goldmine during an assessment; unrestricted access to file shares, configuration information, extracting hashes from the NTDS.dit file, and a multitude of other things.
---------------------------------------------
http://silentbreaksecurity.com/tearing-apart-a-datto/
*** Vulnerability in Citrix NetScaler Application Deliver Controller and NetScaler Gateway Management Interface Could Result in Arbitrary Command Injection ***
---------------------------------------------
A vulnerability has been identified in Citrix NetScaler Application Delivery Controller (ADC) and Citrix NetScaler Gateway Management Interface that could allow an authenticated malicious user to execute shell commands on the appliance.
CVE: CVE-2015-5080
---------------------------------------------
http://support.citrix.com/article/CTX201149
*** Viele Android-Geräte über Debugger angreifbar ***
---------------------------------------------
Über eine Schwachstelle im Debugger können Angreifer den Inhalt des Hauptspeichers von über 90 Prozent aller Android-Geräte auslesen und so weitere Attacken fahren.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Viele-Android-Geraete-ueber-Debugger…
*** Analyzing a Facebook Clickbait Worm ***
---------------------------------------------
Here at Sucuri we suspect everything, especially when your friends start to share content written in another language with clickbait headlines.
If you are not familiar with the term, clickbait is when web content is created in a way that psychologically exploits the reader's curiosity using compelling headlines. When someone clicks on the article to read it, the service promoting the article generates online advertisement revenue.
---------------------------------------------
https://blog.sucuri.net/2015/06/analyzing-a-facebook-clickbait-worm.html
*** Vulnerabilities in Cisco products***
---------------------------------------------
Cisco Unified IP Phones 9900 Series Denial of Service Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=39554
---------------------------------------------
Cisco Unified Communications Domain Manager Information Disclosure Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=39557
---------------------------------------------
*** Vulnerabilities in IBM products***
---------------------------------------------
Security Bulletin: Vulnerabilities in libxml2 affect System Networking Products (CVE-2014-0191, CVE-2013-2877, CVE-2014-3660)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098306
---------------------------------------------
Security Bulletin: Vulnerabilities in OpenSSL affect Flex System FC3171 8Gb SAN Switch and Flex System FC3171 8Gb SAN Pass-thru (CVE-2014-3513, CVE-2014-3567, CVE-2014-3568)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098265
---------------------------------------------
Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Flex System Manager (FSM) SMIA Configuration Tool (CVE-2015-4000)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403
---------------------------------------------
Security Bulletin: Vulnerability in RC4 stream cipher affects IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru firmware. (CVE-2015-2808)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098314
---------------------------------------------
Security Bulletin: Vulnerability in RC4 stream cipher affects IBM System Networking RackSwitch (CVE-2015-2808)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098302
---------------------------------------------Security Bulletin: Vulnerability in RC4 stream cipher affects IBM BladeCenter Switches (CVE-2015-2808)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098303
---------------------------------------------
Security Bulletin: Multiple vulnerabilities in xorg-x11-server affect IBM Flex System Manger (FSM)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098372
---------------------------------------------
Security Bulletin: GNU C library (glibc) vulnerability affects IBM Flex System EN6131 40Gb Ethernet / IB6131 40Gb Infiniband Switch Firmware (CVE-2015-0235)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098317
---------------------------------------------
Security Bulletin: Vulnerabilities in OpenSSL affect IBM Flex System FC3171 8Gb SAN Switch and SAN Pass-thru Firmware (CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098358
---------------------------------------------
Security Bulletin: Vulnerabilities in OpenSSL affect IBM System x, BladeCenter and Flex Systems Unified Extensible Firmware Interface (UEFI) (CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098339
---------------------------------------------
IBM Security Bulletin: IBM SmartCloud Analytics - Log Analysis is affected by Open Source Python Vulnerability (CVE-2014-9365)
http://www.ibm.com/support/docview.wss?uid=swg21958936
---------------------------------------------
IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM Endpoint Manager for Remote Control
http://www.ibm.com/support/docview.wss?uid=swg21903374
---------------------------------------------
IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime, affect Tivoli Endpoint Manager for Remote Control.
http://www.ibm.com/support/docview.wss?uid=swg21903373
---------------------------------------------
IBM Security Bulletin: A vulnerability in cURL libcURL affects IBM Tivoli Composite Application Manager for Transactions (CVE-2014-8150)
http://www.ibm.com/support/docview.wss?uid=swg21697198
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 26-06-2015 18:00 − Montag 29-06-2015 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** In eigener Sache: CERT.at sucht Verstärkung ***
---------------------------------------------
Wir suchen aktuell eine/n ProgrammiererIn - vorerst als Karenzvertretung bis Jahresende. Details siehe https://cert.at/about/jobs/jobs.html
---------------------------------------------
http://www.cert.at/services/blog/20150629141329-1553.html
*** IETF Officially Deprecates SSLv3 ***
---------------------------------------------
The IETF, in RFC7568, declared SSLv3 "not sufficiently secure" and prohibited its use. SSLv3 fallbacks were to blame for the POODLE and BEAST attacks.
---------------------------------------------
http://threatpost.com/ietf-officially-deprecates-sslv3/113503
*** NIST Updates Random Number Generation Guidelines ***
---------------------------------------------
An anonymous reader writes: Encryption weighs heavily on the public consciousness these days, as weve learned that government agencies are keeping an eye on us and a lot of our security tools arent as foolproof as weve thought. In response to this, the National Institute of Standards and Technology has issued a formal update to its document on how to properly generate a random number - crucial in many types of encryption.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/JJ7XjyjPA9c/nist-updates-ra…
*** Lücke im Flash Player: Exploit Kit erhöht Angriffs-Risiko ***
---------------------------------------------
Bisher haben Angreifer die in der letzten Woche bekanntgewordene Schwachstelle in Adobes Flash Player nur vereinzelt und gezielt attackiert. Aktuell nutzt jedoch auch das Magnitude Exploit Kit die Lücke aus und vergrößert den Angriffsradius.
---------------------------------------------
http://heise.de/-2730795
*** The State of the ESILE/Lotus Blossom Campaign ***
---------------------------------------------
As is generally the case with backdoors, ESILE contacts a command-and-control server in order to receive commands from its attacker. How it does this is also a fingerprint of the campaign as well. It uses a URL based on the MAC address of the infected machine's network interface, as well as the current time. ... This distinctive pattern can be used to help spot and block ESILE-related endpoints on an organization's network.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/the-state-of-the…
*** Migrating from SHA-1 to SHA-2 ***
---------------------------------------------
Heres a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....
---------------------------------------------
https://www.schneier.com/blog/archives/2015/06/migrating_from_.html
*** Cyber Security Challenge: Bundesheer sucht Nachwuchs-Hacker ***
---------------------------------------------
Qualifikation läuft bis August, Veranstaltung von Cyber Security Austria und Abwehramt organisiert
---------------------------------------------
http://derstandard.at/2000018220253
*** Bugtraq: ESA-2015-097: EMC Secure Remote Services (ESRS) Virtual Edition (VE) Multiple Security Vulnerabilities ***
---------------------------------------------
Summary: ESRS VE version 3.06 contains security fixes for multiple vulnerabilities that could potentially be exploited by malicious uses to compromise the affected system
Insufficient Certificate Validation
CVE-2015-0543: CVSSv2 Base Score: 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Cookie Generated with Insufficient Randomness
CVE-2015-0544: CVSSv2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
---------------------------------------------
http://www.securityfocus.com/archive/1/535851
*** The Powershell Diaries 2 - Software Inventory, (Mon, Jun 29th) ***
---------------------------------------------
After last weeks story, hopefully youve got your problem users accounts identified. With that worked out, lets see about finding problem applications. We all need a handle on what applications are installed on workstations for a number of reasons to make sure that when upgrade time comes, that nobody gets left behind that older apps that have security vulnerabilities or have limited function get taken care of...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19851&rss
*** Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) ***
---------------------------------------------
Business recommendation: By combining all vulnerabilities documented in this advisory an unprivileged authenticated remote attacker can gain full system access (root) on the RPRM appliance. This has an impact on all conferences taking place via this RP Resource Manager. Attackers can steal all conference passcodes and join or record any conference. SEC Consult recommends not to use this system until a thorough security review has been performed by security professionals and all identified issues have been resolved.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2015…
*** TYPO3-EXT-SA-2015-015: Cross-Site Scripting in extension "404 Page not found handling" (pagenotfoundhandling) ***
---------------------------------------------
It has been discovered that the extension "404 Page not found handling" (pagenotfoundhandling) is susceptible to Cross-Site Scripting
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C
Affected Versions: version 2.1.0 and below
---------------------------------------------
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e…
*** Hacker-Angriff vermutet: Apache Build-Server offline ***
---------------------------------------------
Bis jetzt wurde ein Angriff nicht offiziell bestätigt. Auch ist nicht bekannt, ob ein Eingriff in auf den Servern gebaute Software-Pakete stattgefunden hat.
Die Build-Systeme der ASF werden unter anderem von OpenOffice, dem Tomcat-Projekt und dem Web-Framework Apache Wicket verwendet. Neben den Build-Servern und der Continuous-Integration-Webseite ist auch das CMS der Apache-Seiten betroffen.
---------------------------------------------
http://heise.de/-2731265
*** Cisco Application Policy Infrastructure Controller Unauthorized Access Vulnerability ***
---------------------------------------------
CVE: CVE-2015-4225, CVSS2 Base Score: 5.5
A vulnerability in the role-based access control (RBAC) of the Cisco Application Policy Infrastructure Controller (Cisco APIC) could allow an authenticated, remote attacker to have read access to certain information stored in the affected system.
The vulnerability is due to improper handling of RBAC for health scoring. An attacker could exploit this vulnerability to gain access to information on the affected system.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39529
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 25-06-2015 18:00 − Freitag 26-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Multiple Default SSH Keys Vulnerabilities in Cisco Virtual WSA, ESA, and SMA ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Magento Platform Targeted By Credit Card Scrapers ***
---------------------------------------------
We've been writing a lot about E-Commerce hacks and PCI Compliance recently. The more people buy things online, the more of an issue this will be come and the more important it will ..
---------------------------------------------
https://blog.sucuri.net/2015/06/magento-platform-targeted-by-credit-card-sc…
*** MMD-0034-2015 - New ELF Linux/DES.Downloader on Elasticsearch CVE-2015-1427 exploit ***
---------------------------------------------
This is a tough writing, and will be many addition will be added after the initial release. We are pushed to release this as alert of an on going attack, it is a real malware incident ..
---------------------------------------------
http://blog.malwaremustdie.org/2015/06/mmd-0034-2015-new-elf.html
*** That shot you heard? SSLv3 is now DEAD ***
---------------------------------------------
Its joined the choir invisible We really, really, really mean it this time: take SSL3 and bury ..
---------------------------------------------
http://www.theregister.co.uk/2015/06/26/that_shot_you_heard_sslv3_is_now_de…
*** EU-Ermittler zerschlagen Ring von Online-Banking-Betrügern ***
---------------------------------------------
Verschiedenen Behörden aus Europa haben eine erfolgreiche Operation gegen Cyber-Kriminelle durchgeführt, die im großen Stil über alle Kontinente verteilt Banking-Trojaner eingesetzt haben.
---------------------------------------------
http://heise.de/-2729777
*** Windows Server 2003 noch auf Drittel aller Server: Support-Ende im Juli ***
---------------------------------------------
Am 14. Juli endet der Support von Windows Server 2003, Server 2003 R2 und Small Business Server 2003. Ab dann wird es für das zwölf Jahre alte System keine neuen Updates, Hotfixes oder Sicherheits-Aktualisierung mehr geben.
---------------------------------------------
http://derstandard.at/2000018075592
*** Polycom RealPresence Resource Manager critical vulnerabilities allow surveillance on conferences ***
---------------------------------------------
Multiple remote vulnerabilities (arbitrary file disclosure, path traversal, arbitrary file upload, privilege escalation in the web application) combined with local vulnerabilities (sudo misconfiguration, weak filesystem permissions) allow an ..
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2015…
*** Siemens Climatix BACnet/IP Communication Module Cross-site Scripting Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an identified cross-site scripting vulnerability in the Siemens Climatix BACnet/IP communication module.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-176-01
*** PACTware Exceptional Conditions Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a handling of exceptional conditions vulnerability in the PACTware Consortium PACTware application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-176-02
*** Latest spam filter test sees significant drop in catch rates ***
---------------------------------------------
Despite a drop in catch rates, 15 products earn a VBSpam award, with four earning a VBSpam+ award.Spam is notoriously volatile and thus, while we like to make the news headlines with our tests as much as anyone, we would warn against ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/06_26.xml
*** ZDI-15-262: HP System Management Homepage Single Sign On Stack Buffer Overflow Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard System Management Homepage. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-262/
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 24-06-2015 18:00 − Donnerstag 25-06-2015 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Paper: Using .NET GUIDs to help hunt for malware ***
---------------------------------------------
Tool to extract identifiers incorporated into VirusTotal.
The large number of new malware samples found each day hasnt made malware analysis an easier task, and researchers could use anything that helps them automate this task. Today, we publish a paper by Cylance researcher Brian Wallace, who looks at two globally unique identifiers (GUIDs) found in malware created using .NET, which can help link multiple files to the same Visual Studio project.
---------------------------------------------
http://www.virusbtn.com/blog/2015/06_24a.xml?rss
*** The Powershell Diaries - Finding Problem User Accounts in AD, (Wed, Jun 24th) ***
---------------------------------------------
Powershell has gotten a lot of attention lately as a pentesters tool of choice, since it has access to pretty much every low-level system function in the Microsoft ecosystem, and the AV industry isnt dealing well with that yet (aside from ignoring powershell completely that is). But what about day-to-day system administration? Really, the possibilities for admins are just as limitless as for pentesters - thats what Powershell was invented for after all !
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19833&rss
*** Shibboleth authentication - Moderately critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-129 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-129
Project: Shibboleth authentication (third-party module)
Version: 6.x, 7.x
Date: 2015-June-24
Security risk: 13/25 ( Moderately Critical)
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All
Vulnerability: Cross Site Scripting
Description
Shibboleth authentication module allows users to log in and get permissions based on federated (SAML2) authentication.The module didnt filter the text that is displayed as a login link.
---------------------------------------------
https://www.drupal.org/node/2511518
*** HybridAuth Social Login - Less Critical - Access bypass - SA-CONTRIB-2015-127 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-127
Project: HybridAuth Social Login (third-party module)
Version: 7.x
Date: 2015-June-24
Security risk: 8/25 ( Less Critical)
AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypass
Description
The HybridAuth Social Login module enables you to allow visitors to authenticate or login to a Drupal site using their identities from social networks like Facebook or Twitter.
---------------------------------------------
https://www.drupal.org/node/2511410
*** Web security subtleties and exploitation of combined vulnerabilities, (Thu, Jun 25th) ***
---------------------------------------------
The goal of a penetration test is to report all identified vulnerabilities to the customer. Of course, every penetration tester puts most of his effort into finding critical security vulnerabilities: SQL injection, XSS and similar, which have the most impact for the tested web application (and, indeed, it does not hurt a penetration testers ego when such a vulnerability is identified :)
However, I strongly push towards reporting of every single vulnerability, no matter how harmless it might appear ...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19837&rss
*** Samsung deaktiviert keine Sicherheitsupdates von Windows ***
---------------------------------------------
PR-Desaster im Eigenbau: Samsung veröffentlicht ein Tool namens "disable_Windowsupdate.exe". Doch das macht gar nicht das, was der Name vermuten lässt.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Samsung-deaktiviert-keine-Sicherheit…
*** Von wegen Schutz: NOD32 erlaubt das Kapern von Rechnern ***
---------------------------------------------
Statt die Nutzer zu schützen erlaubte NOD32 von Eset es Angreifern, die Rechner der Opfer komplett zu übernehmen. Das Update, welches die Lücke schließt, sollte schleunigst eingespielt werden.
---------------------------------------------
http://heise.de/-2728967
*** SSA-142512 (Last Update 2015-06-25): Cross-Site Scripting Vulnerability in Climatix BACnet/IP Communication Module ***
---------------------------------------------
SSA-142512 (Last Update 2015-06-25): Cross-Site Scripting Vulnerability in Climatix BACnet/IP Communication Module
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** Multiple vulnerabilities in Cisco products ***
*** Cisco Wireless LAN Controller Command Injection Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39517
*** Cisco IOS XR MPLS LDP Packet Processing Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39509
*** Cisco Unified Presence Server Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39504
*** Cisco IM and Presence Service Leaked Encrypted Passwords Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39505
*** Cisco IM and Presence Service SQL Injection Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39506
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 23-06-2015 18:00 − Mittwoch 24-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Operation Clandestine Wolf � Adobe Flash Zero-Day in APT3 PhishingCampaign ***
---------------------------------------------
In June, FireEye�s FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability (CVE-2015-3113). The attackers� emails included links to compromised web servers that served either benign content or a malicious Adobe Flash Player file that exploits CVE-2015-3113.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-…
*** Digital Snake Oil ***
---------------------------------------------
One of the most common complaints we see on our forums, and from our users, concerns a particular category of program called �Registry Optimizers� or �Registry Cleaners� or �Registry Defragmenters�. For this post, we will just refer to them as ..
---------------------------------------------
https://blog.malwarebytes.org/social-engineering/2015/06/digital-snake-oil/
*** Websites Hacked Via Website Backups ***
---------------------------------------------
The past few months we�ve been spending a good deal of time talking about backups. This is for good reason, they are often your safety net when things go wrong; interestingly enough though, they are often the forgotten pillar of security. It�s why we ..
---------------------------------------------
https://blog.sucuri.net/2015/06/websites-hacked-via-website-backups.html
*** Cisco AnyConnect Client for Windows Privilege Escalation Vulnerability ***
---------------------------------------------
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM account.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39466
*** MMD-0033-2015 - Linux/XorDDoS infection incident report (CNC: HOSTASA.ORG) ***
---------------------------------------------
This post is an actual malware infection incident of the"Linux/XOR.DDoS" malware, see this previous post as reference, malware was in attempt to infect a real service. Incident details: Source of attack: An attack ..
---------------------------------------------
http://blog.malwaremustdie.org/2015/06/mmd-0033-2015-linuxxorddos-infection…
*** Analysis and Exploitation of an ESET Vulnerability ***
---------------------------------------------
Many antivirus products include emulation capabilities that are intended to allow unpackers to run for a few cycles before signatures are applied. ESET NOD32 uses a minifilter or kext to intercept all disk I/O, which is analyzed and then emulated if ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/06/analysis-and-exploitation-of-…
*** Of Privacy, Security, and the Art of Scanning ***
---------------------------------------------
With all the recent news and attention on world events the concept and concern around privacy has increased over the last several years. This is an excellent progression of personal protection and should be pursued ..
---------------------------------------------
http://blog.shadowserver.org/2015/06/23/of-privacy-security-and-the-art-of-…
*** Attacking Ruby Gem Security with CVE-2015-3900 ***
---------------------------------------------
A Ruby gem is a standard packaging format used for Ruby libraries and applications. This packaging format allows Ruby software developers a clearly defined format in which they can ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Secu…
*** Samsung deliberately disabling Windows Update ***
---------------------------------------------
On my home forum Sysnative, a user (wavly) was being assisted with a WU issue, which was going well, aside from the fact that wavlys WU kept getting disabled randomly. It was figured out eventually after using auditpol.exe and registry security ..
---------------------------------------------
http://bsodanalysis.blogspot.de/2015/06/samsung-deliberately-disabling-wind…
*** Kaspersky hilft Facebook User-PCs nach Viren zu scannen ***
---------------------------------------------
Facebook will die Verbreitung von Malware über das soziale Netzwerk eindämmen. Dafür werden nicht nur Profile nach verdächtigen Aktivitäten gescannt. Das Unternehmen bietet Nutzern auch die Möglichkeit an, einen kostenlosen Scan ihres Computers durchzuführen. Seit einiger Zeit ..
---------------------------------------------
http://derstandard.at/2000017946165
*** Identifying vulnerable code ***
---------------------------------------------
No matter how much care you take during development of any software, security issues creep in. Hence, it is important to get the code reviewed for security loopholes. Code is the only advantage for organizations over the hackers and they need ..
---------------------------------------------
http://resources.infosecinstitute.com/identifying-vulnerable-code/
*** Am 30. Juni ist DNSSEC-Day ***
---------------------------------------------
Am 30. Juni 2015 veranstalten das BSI, der DENIC und heise online den DNSSEC-Day. Kern der Veranstaltung ist ein Livestreaming, bei dem Fachleute Nutzen und ..
---------------------------------------------
http://heise.de/-2723932
*** Results of my recent PostScript Charstring security research unveiled ***
---------------------------------------------
Some months ago, I started reverse engineering and investigating the security posture of the Adobe Type Manager Font Driver (ATMFD.DLL) module, which provides support for Type 1 and OpenType fonts in the Windows kernel since Windows NT 4.0, ..
---------------------------------------------
http://j00ru.vexillium.org/?p=2520
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 22-06-2015 18:00 − Dienstag 23-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Security updates available for Adobe Flash Player (APSB15-14) ***
---------------------------------------------
A Security Bulletin (APSB15-14) has been published regarding security updates for Adobe Flash Player. These updates address a critical vulnerability (CVE-2015-3113), and Adobe recommends users update their product installations to the latest ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1210
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39439http://tools.cisco.com/security/center/viewAlert.x?alertId=39440http://tools.cisco.com/security/center/viewAlert.x?alertId=39455http://tools.cisco.com/security/center/viewAlert.x?alertId=39457http://tools.cisco.com/security/center/viewAlert.x?alertId=39459http://tools.cisco.com/security/center/viewAlert.x?alertId=39460http://tools.cisco.com/security/center/viewAlert.x?alertId=39377http://tools.cisco.com/security/center/viewAlert.x?alertId=39458
*** �Free� Proxies Aren�t Necessarily Free ***
---------------------------------------------
Netflix, Hulu and a host of other content streaming services block non-U.S. users from viewing their content. As a result, many people residing in or traveling outside of the United States seek to circumvent such restrictions by using services that advertise "free" and "open" Web proxies capable of ..
---------------------------------------------
http://krebsonsecurity.com/2015/06/free-proxies-arent-necessarily-free
*** Security hole in MacKeeper used to shove malware onto Macs ***
---------------------------------------------
According to researchers at BAE, a recent Mac malware infestation was carried out using a security hole in a utility called MacKeeper.
---------------------------------------------
https://nakedsecurity.sophos.com/2015/06/22/security-hole-in-mackeeper-used…
*** New Dridex infection vector identified - Banking Trojan�s authors use Microsoft Office trick and a legitimate service to infect systems ***
---------------------------------------------
Malware authors can sometimes be creative in order to manipulate their human targets on the one hand and to circumvent security products, too. The experts of G DATA�s SecurityLabs analyzed a specially crafted Microsoft Word document ..
---------------------------------------------
https://blog.gdatasoftware.com/blog/article/new-dridex-infection-vector-ide…
*** XOR DDOS Mitigation and Analysis, (Tue, Jun 23rd) ***
---------------------------------------------
I have struggled over the past recent months with a clients environment becoming infected and reinfected with an XOR DDOS trojan. The disruption and reinfection rates were costly at times. The client in question ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19827
*** This Radio Bug Can Steal Laptop Crypto Keys, Fits Inside a Pita ***
---------------------------------------------
The list of paranoia-inducing threats to your computer�s security grows daily: Keyloggers, trojans, infected USB sticks, ransomware�and now the rogue falafel sandwich.
---------------------------------------------
http://www.wired.com/2015/06/radio-bug-can-steal-laptop-crypto-keys-fits-in…
*** mTAN-Trojaner hat es erneut auf Android-Nutzer abgesehen ***
---------------------------------------------
Gefälschte E-Mails im Namen der Postbank machen aktuell die Runde und fordern Nutzer dazu auf, eine SSL-Zertifikat-App zu installieren. Dahinter verbirgt sich jedoch ein Trojaner, der unter anderem mTANs für Online-Banking mitschneidet.
---------------------------------------------
http://heise.de/-2721682
*** Moose Malware-Part 1 ***
---------------------------------------------
In this article series, we will learn about a famous Linux family of malware known as MOOSE, which is used to steal unencrypted traffic over the wire and infect other devices automatically. This malware steals HTTP cookies and performs ..
---------------------------------------------
http://resources.infosecinstitute.com/moose-malware-part-1/
*** Edges for file renames and process kills. ***
---------------------------------------------
With build 47 ProcDOT introduced brand new edges to visualize situations where a file is being renamed or a process is being killed by some thread. While the latter was quite easy to implement it�s the renaming of files which stands out of the mass of typical frames/events in terms of ProcDOT�s animation capabilities.
---------------------------------------------
http://procdot.com/blog_20150623.htm
*** Support-Ende beim Windows Server 2003 am 14. Juli ***
---------------------------------------------
Länger als Windows XP hat Microsoft sein Server-Betriebssystem derselben Generation mit Sicherheits-Updates versorgt. Aber am 14. Juli ist damit endgültig Schluss.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Support-Ende-beim-Windows-Server-200…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 19-06-2015 18:00 − Montag 22-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Owning Internet Printing - A Case Study in Modern Software Exploitation ***
---------------------------------------------
Modern exploit mitigations draw attackers into a game of diminishing marginal returns. With each additional mitigation added, a subset of software bugs become unexploitable, ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case…
*** Cacti Input Validation Flaw Permits Cross-Site Scripting and SQL Injection Attacks ***
---------------------------------------------
The software does not properly filter HTML code from user-supplied input before displaying the input [CVE-2015-2665]. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The ..
---------------------------------------------
http://www.securitytracker.com/id/1032672
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39432http://tools.cisco.com/security/center/viewAlert.x?alertId=39431http://tools.cisco.com/security/center/viewAlert.x?alertId=39422http://tools.cisco.com/security/center/viewAlert.x?alertId=39424http://tools.cisco.com/security/center/viewAlert.x?alertId=39423
*** Banking Trojan has targeted Bundestag ***
---------------------------------------------
After the initial reports on the attacks on the Bundestag (German Federal Parliament), variants of the Swatbanker family are now putting the Bundestags intranet on a watch list. The operators of the botnet are apparently trying to steal access data and server responses associated with this ..
---------------------------------------------
https://blog.gdatasoftware.com/blog/article/banking-trojan-has-targeted-bun…
*** Microsoft website dedicated to online privacy gets hacked ***
---------------------------------------------
Digital Constitution was running outdated of version of WordPress.
---------------------------------------------
http://arstechnica.com/security/2015/06/microsoft-website-dedicated-to-onli…
*** Microsoft: Meine Lücken schließ' ich nicht ***
---------------------------------------------
Sicherheitsexperten geben Details zu Lücken in Internet Explorer heraus, weil Microsoft die Lücken nicht schließen will.
---------------------------------------------
http://heise.de/-2718449
*** Standardschlüssel gefährdet SAPs Datenbank Hana ***
---------------------------------------------
Bei der Installation wird die Benutzerdatenbank in SAPs Hana mit dem stets gleichen Standardschlüssel abgesichert. Weil dieser nur selten geändert wird, könnten sich Unberechtigte leicht Zugriff auf die dort gespeicherten Administratorkonten verschaffen.
---------------------------------------------
http://www.golem.de/news/it-sicherheit-standardschluessel-gefaehrdet-saps-d…
*** VMware Workstation: Der Einbruch �über Port COM1 ***
---------------------------------------------
Über Schwachstellen in VMwares Workstation und Player ist ein vollständiger Zugriff auf das Wirtssystem aus einem Gastsystem heraus möglich. VMware hat bereits Updates veröffentlicht.
---------------------------------------------
http://www.golem.de/news/vmware-workstation-der-einbruch-ueber-port-com1-15…
*** Advertising: The Digital Turf War on your Desktop ***
---------------------------------------------
https://blog.malwarebytes.org/privacy-2/2015/06/advertising-the-digital-tur…
*** XARA-Lücke: Apple kündigt Fix für iOS und OS X an ***
---------------------------------------------
Das Sicherheitsproblem, über das unter anderem Passwörter ausgelesen werden könnten, soll demnächst in der Software behoben werden. Zudem versucht sich der iPhone-Hersteller an anderen Lösungen.
---------------------------------------------
http://heise.de/-2718624
*** The most common information security mistakes of e-commerces ***
---------------------------------------------
Almost every month a new incident involving a big retailer, e-commerce or web platform makes the news headlines. Most retail fraud is now committed online, and in 2014 alone hackers managed to steal more than 61 million records from ..
---------------------------------------------
https://www.htbridge.com/blog/the-most-common-information-security-mistakes…
*** Adware for OS X distributes Trojans ***
---------------------------------------------
Lately, reports about distribution of new malicious and potentially dangerous programs for OS X have been emerging with great frequency. Doctor Web security researches have registered a growing number of various adware and installers ..
---------------------------------------------
http://news.drweb.com/show/?i=9502&lng=en&c=9
*** Steal That Car in 60 Seconds ***
---------------------------------------------
Introduction Cars are everywhere and they are being upgraded with new technology as often as any other device we use. Taking some inspiration from the movie Knight and Day, ..
---------------------------------------------
http://resources.infosecinstitute.com/the-car-in-60-seconds/
*** NSA spionierte österreichische Antiviren-Hersteller aus ***
---------------------------------------------
Ikarus und Emsisoft genannt – NSA überwachte E-Mails an Firmen, um Entdeckung von Schadprogrammen mitzubekommen
---------------------------------------------
http://derstandard.at/2000017842807
*** Magnitude EK: Traffic Analysis ***
---------------------------------------------
Hello and welcome! Recently I have been skilling up in malware analysis. Specifically, my focus has been centred on client-side exploit kits, such common kits include: Angler, Nuclear, Magnitude, Neutrino, RIG... There are quite a few reasons for my new found ..
---------------------------------------------
http://www.fuzzysecurity.com/tutorials/21.html
*** Android Activtity Security ***
---------------------------------------------
Each Android Application is made up of Activity, Service, Content Provider and Broadcast Receiver, which are the basic components of Android. Among those components, An Activity is ..
---------------------------------------------
http://translate.wooyun.io/2015/06/22/android-activtity-security.html
*** A month with BADONIONS ***
---------------------------------------------
A few weeks ago I got the idea of testing how much sniffing is going on in the Tor network by setting up a phishing site where I login with unique password and then store them. I ..
---------------------------------------------
https://chloe.re/2015/06/20/a-month-with-badonions/
*** Poseidon and Backoff POS � the links and similarities ***
---------------------------------------------
Poseidon, also known as FindPOS, is a malware family designed for Windows point-of-sale systems. Poseidon scans the memory for running processes and employs keystroke logging ..
---------------------------------------------
https://blog.team-cymru.org/2015/06/poseidon-and-the-backoff-pos-link
*** Bypassing Microsoft EMET 5.2 - a neverending story? ***
---------------------------------------------
The experts of the SEC Consult Vulnerability Lab managed to adapt the EMET 5.0 / 5.1 bypasses to additionally work against the latest Microsoft EMET version which is 5.2. Results of the research were already presented this year at ..
---------------------------------------------
http://blog.sec-consult.com/2015/06/bypassing-microsoft-emet-52-neverending…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 18-06-2015 18:00 − Freitag 19-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** So Long, and Thanks for All the Domains ***
---------------------------------------------
While Trojans like Dyre and Dridex are dominating malware-related news, we take the time to have a closer look at Tinba (Tiny Banker, Zusy, Illi), yet another Trojan which targets Windows users. In the first part of this post, we...
---------------------------------------------
http://securityblog.switch.ch/2015/06/18/so-long-and-thanks-for-all-the-dom…
*** Understanding type confusion vulnerabilities: CVE-2015-0336 ***
---------------------------------------------
In March 2014, we observed a patched Adobe Flash vulnerability (CVE-2015-0336) being exploited in the wild. Adobe released the patch on March 12, 2014, and exploit code using this vulnerability first appeared about a week later. To help stay protected: Keep your Microsoft security software, such as Windows Defender for Windows 8.1 up-to-date. Keep your third-party software, such as Adobe Flash Player, up-to-date. Be cautious when browsing potentially malicious or compromised websites.
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/06/18/understanding-type-confu…
*** Tapatalk-Plug-in liest Daten von Forennutzern aus ***
---------------------------------------------
Wie die Administratoren des HardwareLuxx-Forums entdeckten, liest das Plug-in der Mobil-App die E-Mail-Adressen ihrer 200.000 Nutzer auf Anfrage aus und schickt diese an eigene Server. Tapatalk hält das Ganze für ein Versehen.
---------------------------------------------
http://heise.de/-2716662
*** Paper: Beta exploit pack: one more piece of crimeware for the infection road! ***
---------------------------------------------
Exploit kit currently being tested focuses primarily on Flash Player exploits.Nuclear, Angler, Magnitude and Rig. Security researchers know were talking about exploit kits (or browser exploit packs), toolkits that automate the exploitation of client-side vulnerabilities and thus facilitate infection through drive-by downloads.Today, we publish an article by researchers Aditya K. Sood and Rohit Bansal, in which they look at a new exploit kit, Beta. Though it is still in a testing phase, Aditya...
---------------------------------------------
http://www.virusbtn.com/blog/2015/06_19.xml?rss
*** SAP Hana users warned of security vulnerability ***
---------------------------------------------
Hard on the heels of the release of a newly updated version of SAP Hana, a security researcher has warned of a potentially serious vulnerability in the in-memory platform. "If an attacker can exploit this vulnerability, he can get access to all encrypted data stored in an SAP Hana database," said Alexander Polyakov, CTO with ERPScan, which presented the details Thursday at the Black Hat Sessions XIII conference in the Netherlands.
---------------------------------------------
http://www.cio.com/article/2937953/sap-hana-users-warned-of-security-vulner…
*** Identifying Your Prey ***
---------------------------------------------
User hunting is one of my favorite phases of an engagement. Whether it's performed for lateral spread and escalation, or to demonstrate impact by tracking down incident responders and executives, we end up hunting for users on nearly every assessment we conduct. I presented this topic at the Shmoocon '15 Firetalks, and published the "I Hunt Sys Admins" post to help highlight some of the ways we track down where users are located in Windows domains.
---------------------------------------------
http://www.verisgroup.com/2015/06/17/identifying-your-prey/
*** an awesome list of honeypot resources ***
---------------------------------------------
A curated list of awesome honeypots, tools, components and much more. The list is divided into categories such as web, services, and others, focusing on open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the guide.
---------------------------------------------
https://github.com/paralax/awesome-honeypots
*** The Samsung SwiftKey Vulnerability - What You Need To Know, And How To Protect Yourself ***
---------------------------------------------
Recently, researchers announced that a vulnerability in Samsung Android devices had been found which allowed attackers to run malicious code on vulnerable devices if they became the targets of a man-in-the-middle attack. In this post we will explain how this vulnerability works, and what can users do to protect themselves. The Vulnerability The stock Android...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/Y8_n4zFsafI/
*** Security CheatSheets - A collection of cheatsheets for various infosec tools and topics ***
---------------------------------------------
These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of these cheatsheets are to aid penetration testers/CTF participants/security enthusiasts in remembering commands that are useful, but not frequently used. Most of the tools that will be covered have been included in our class and are available in Kali Linux.
---------------------------------------------
http://www.kitploit.com/2015/06/security-cheatsheets-collection-of.html
*** Bundestag: Linksfraktion veröffentlicht Malware-Analyse ***
---------------------------------------------
Die Linksfraktion veröffentlicht im Zusammenhang mit dem Bundestags-Hack eine Analyse von Malware, die auf ihren Servern gefunden wurde. Darin wird eine Verbindung zur russischen Organisation APT28 nahegelegt. Doch wirklich überzeugend sind die Belege dafür nicht.
---------------------------------------------
http://www.golem.de/news/bundestag-linksfraktion-veroeffentlicht-malware-an…
*** Bugtraq: ZTE ZXV10 W300 v3.1.0c_DR0 - UI Session Delete Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535797
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Content Manager Enterprise Edition (CVE-2015-0478, CVE-2015-0488, CVE-2015-1916, CVE-2015-2808) ***
http://www.ibm.com/support/docview.wss?uid=swg21960248
*** IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM InfoSphere Discovery (CVE-2015-0488) ***
http://www.ibm.com/support/docview.wss?uid=swg21903544
*** IBM Security Bulletin: Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0230) ***
http://www.ibm.com/support/docview.wss?uid=swg21959294
*** IBM Security Bulletin: Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server uses an insecure hashing scheme for handling user passwords (CVE-2015-1913) ***
http://www.ibm.com/support/docview.wss?uid=swg21959298
*** IBM Security Bulletin: Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0227) ***
http://www.ibm.com/support/docview.wss?uid=swg21959291
*** IBM Security Bulletin: GNU C library (glibc) vulnerabilities affect IBM SmartCloud Entry (CVE-2014-6040 CVE-2014-7817) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1022093
*** Wind River VXWorks TCP Predictability Vulnerability in ICS Devices ***
---------------------------------------------
This advisory provides mitigation details for a TCP predictability vulnerability identified in Wind River's VxWorks.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
*** Cisco WebEx Meeting Center Web-Based Administrative Interface User Enumeration Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39420
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 17-06-2015 18:00 − Donnerstag 18-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** OS X and iOS Unauthorized Cross Application Resource Access (XARA), (Thu, Jun 18th) ***
---------------------------------------------
The last couple of days, a paper with details about XARA vulnerabilities in OS X and iOS is getting a lot of attention [1]. If you havent seen the term XARA before, then this is probably because cross-application-resource-access was normal in the past. Different applications has access to each others data as long as the same user ran them. But more recently, operating systems like OS X and iOS made attempts to sandbox applications and isolate applications from each other even if the same user...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19815&rss
*** Apple OS X and iOS in the vulnerability spotlight - meet "CORED," also known as "XARA" ***
---------------------------------------------
The security issue of the week has arrived in iOS and OS X, and its attracted a funky name already. The researchers called it XARA, but others had different ideas, and dubbed it "CORED." As in "Apple CORED."
---------------------------------------------
http://feedproxy.google.com/~r/nakedsecurity/~3/Q4IwUfvQIVM/
*** IT-Sicherheitskonferenz FIRST: Ohne Vertrauen geht nichts, aber das Vertrauen geht ***
---------------------------------------------
Die FIRST-Konferenz in Berlin beschäftigte sich damit, wie die Sicherheit von Computernetzen verbessert werden kann. Am Ende stand die Erkenntnis, dass die Arbeit komplizierter wird, weil Staaten zunehmend in IT-Sicherheit eingreifen.
---------------------------------------------
http://heise.de/-2716841
*** Caching Out: The Value of Shimcache for Investigators ***
---------------------------------------------
During a recent investigation, we found references to timestamps associated with probable malicious files that preceded the earliest known date of compromise. These Application Compatibility Cache (“Shimcache”) timestamps were the only evidence linked to this timeframe.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2015/06/caching_out_the_val.ht…
*** Uncovering Tor users: where anonymity ends in the Darknet ***
---------------------------------------------
Intelligence services have not disclosed any technical details of how they detained cybercriminals who created Tor sites to distribute illegal goods; in particular, they are not giving any clues how they identify cybercriminals who act anonymously. This may mean that the implementation of the Tor Darknet contains some vulnerabilities and/or configuration defects that make it possible to unmask any Tor user. In this research, we will present practical examples to demonstrate how Tor users may...
---------------------------------------------
http://securelist.com/analysis/publications/70673/uncovering-tor-users-wher…
*** Drupal-Lücken erlauben das Kapern von Admin-Konten ***
---------------------------------------------
In Drupal 6 und 7 klaffen vier Sicherheitslücken. Die schwerwiegendste erlaubt es Angreifer, Admin-Konten des CMS über OpenID zu kapern. Updates, welche die Lücken schließen, stehen zum Download bereit.
---------------------------------------------
http://heise.de/-2715975
*** Drupal Core - Critical - Multiple Vulnerabilities - SA-CORE-2015-002 ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CORE-2015-002Project: Drupal core Version: 6.x, 7.xDate: 2015-June-17Security risk: 15/25 ( Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Access bypass, Information Disclosure, Open Redirect, Multiple vulnerabilitiesDescriptionImpersonation (OpenID module - Drupal 6 and 7 - Critical)A vulnerability was found in the OpenID module that allows a malicious user to log in as other users on the site, including administrators, and hijack their
---------------------------------------------
https://www.drupal.org/SA-CORE-2015-002
*** Security Advisories for Drupal Third-Party Modules ***
---------------------------------------------
https://www.drupal.org/security/contrib
*** Bugtraq: [security bulletin] HPSBGN03350 rev.1 - HP SiteScope Using RC4, Remote Disclosure of Information ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535785
*** Bugtraq: [security bulletin] HPSBGN03338 rev.1 - HP Service Manager running RC4, Remote Disclosure of Information ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535786
*** Cisco IOS XR IPv6 Packet Processing Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39383
*** Cisco IOS XR SSH Disconnect Error Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39402
*** Symantec Endpoint Protection Manager and Client Issues ***
---------------------------------------------
 Revisions None Severity CVSS2Base ScoreImpactExploitabilityCVSS2 VectorSEPM Auth User Blind SQLi in PHP prepared state...
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** [R2] PHP < 5.4.41 Vulnerabilities Affect Tenable SecurityCenter ***
---------------------------------------------
http://www.tenable.com/security/tns-2015-06
*** Rack denial of service ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/103917
*** SQL Injection in EXT:sb_akronymmanager ***
---------------------------------------------
It has been discovered that the extension "Akronymmanager" (sb_akronymmanager) is susceptible to SQL Injection
---------------------------------------------
http://www.typo3.org/news/article/sql-injection-in-extsb-akronymmanager/
*** pure-ftpd 1.0.39 remote denial of service in glob_() ***
---------------------------------------------
Topic: pure-ftpd 1.0.39 remote denial of service in glob_() Risk: Medium Text:Version 1.0.40 of pure-FTPd fixes a potential denial of service issue. From the NEWS file: - The process handling a user...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060101
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 16-06-2015 18:00 − Mittwoch 17-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Unpatched OS X, iOS flaws allow password, token theft from keychain, apps ***
---------------------------------------------
Six researchers from Indiana University Bloomington, Peking University and Georgia Tech have recently published a paper in which they detail the existence of critical security weaknesses in Apples OS...
---------------------------------------------
http://www.net-security.org/secworld.php?id=18523
*** Security: Unverschlüsselte App-Updates gefährden Samsungs Smartphones ***
---------------------------------------------
Wenn Apps ihre Aktualisierungen unverschlüsselt abholen, sind sie leicht zu manipulieren. Vor allem bei systemnahen Anwendungen ist das ein gravierendes Problem, wie ein aktueller Fall belegt, der vor allem die Galaxy-Reihe von Samsung betrifft.
---------------------------------------------
http://www.golem.de/news/security-unverschluesselte-app-updates-gefaehrden-…
*** CVE-2014-4114 and an Interesting AV Bypass Technique, (Tue, Jun 16th) ***
---------------------------------------------
Citizenlabs recently reported on a CVE-2014-4114 campaign against pro-democracy / pro-Tibetian groups in Hong Kong. The attacks happening should not surprise anyone, nor that the attacks were sophisticated. The vulnerability itself was patched with MS14-060 and has been used by APT and crime groups for sometime. Trend Micro wrote a good write-up of the issue here. What is interesting is what, in effect, is an anti-virus bypass that was employed by the actors. This bypass was discussed in this...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19809&rss
*** VU#155412: Samsung Galaxy S phones fail to properly validate Swiftkey language pack updates ***
---------------------------------------------
Vulnerability Note VU#155412 Samsung Galaxy S phones fail to properly validate Swiftkey language pack updates Original Release date: 16 Jun 2015 | Last revised: 16 Jun 2015 Overview Samsung Galaxy S phones, including the S4 Mini, S4, S5, and S6, fail to properly validate Swiftkey language pack updates. Description CWE-345: Insufficient Verification of Data Authenticity - CVE-2015-2865Samsung Galaxy S phones, including the S4 Mini, S4, S5, and S6, are pre-installed with a version of Swiftkey...
---------------------------------------------
http://www.kb.cert.org/vuls/id/155412
*** EMC Unified Infrastructure Manager/Provisioning Authentication Flaw Lets Remote Users Access the System ***
---------------------------------------------
http://www.securitytracker.com/id/1032589
*** Red Hat OpenSSL Locking Error in ssleay_rand_bytes() Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1032587
*** Vulnerabilities in Cisco Products ***
---------------------------------------------
*** Cisco Cloud Portal Appliance Pregenerated Default Host Keys Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39380
*** Cisco Prime Collaboration Manager SQL Injection Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39365
*** Cisco Prime Collaboration Assurance Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=31998
*** Cisco Adaptive Security Appliance Encrypted IPSec or IKEv2 Packet Modification Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39366
*** [HTB23261]: OS Command Injection in Vesta Control Panel ***
---------------------------------------------
Product: Vesta Control Panel v0.9.8Vulnerability Type: OS Command Injection [CWE-78]Risk level: Critical Creater: http://vestacp.comAdvisory Publication: May 20, 2015 [without technical details]Public Disclosure: June 17, 2015 CVE Reference: CVE-2015-4117 CVSSv2 Base Score: 9 (AV:N/AC:L/Au:S/C:C/I:C/A:C) Vulnerability Details: High-Tech Bridge Security Research Lab discovered critical vulnerability in Vesta Control Panel, which can be exploited to execute arbitrary system commands and gain...
---------------------------------------------
https://www.htbridge.com/advisory/HTB23261
*** VU#842780: Vesta Control Panel is vulnerable to cross-site request forgery ***
---------------------------------------------
Vulnerability Note VU#842780 Vesta Control Panel is vulnerable to cross-site request forgery Original Release date: 16 Jun 2015 | Last revised: 16 Jun 2015 Overview Vesta Control Panel is vulnerable to a cross-site request forgery (CSRF) attack. Description CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2015-2861Vesta Control Panel contains a cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has
---------------------------------------------
http://www.kb.cert.org/vuls/id/842780
*** Bugtraq: ESA-2015-043: RSA Validation Manager Security Update for Multiple Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535777
*** GarrettCom Magnum Series Devices Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for multiple vulnerabilities in GarrettCom's Magnum 6k and Magnum 10k product lines.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-167-01-0
*** Security update available for Adobe Photoshop CC ***
---------------------------------------------
Adobe has released an update for Photoshop CC for Windows and Macintosh. This update addresses vulnerabilities that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system.
---------------------------------------------
https://helpx.adobe.com/security/products/photoshop/apsb15-12.html
*** Security update available for Adobe Bridge CC ***
---------------------------------------------
Adobe has released an update for Adobe Bridge CC for Windows and Macintosh. This update addresses vulnerabilities that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system.
---------------------------------------------
https://helpx.adobe.com/security/products/bridge/apsb15-13.html
*** Bugtraq: VCE3570: VCE Vision(TM) Intelligent Operations Cryptographic and Cleartext Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535781
*** [R1] PHP < 5.4.41 Vulnerabilities Affect Tenable SecurityCenter ***
---------------------------------------------
June 15, 2015
---------------------------------------------
http://www.tenable.com/security/tns-2015-06
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 15-06-2015 18:00 − Dienstag 16-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Dude, where's my heap? ***
---------------------------------------------
Guest posted by Ivan Fratric, spraying 1TB of memoryThe ability to place controlled content to a predictable location in memory can be an important primitive in exploitation of memory corruption vulnerabilities. A technique that is commonly used to this end in browser exploitation is heap spraying: By allocating a large amount of memory an attacker ensures that some of the allocations happen in a predictable memory region. In order to break this technique, in Windows 8 Microsoft introduced High...
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/06/dude-wheres-my-heap.html
*** RFC 7540 - HTTP/2 protocol, (Mon, Jun 15th) ***
---------------------------------------------
RFC 7540 has been out for a month now. What should we expect with this new version? 1. New frame: HTTP/2 implements a binary protocol with the following frame structure: Length: The length of the frame payload expressed as an unsigned 24-bit integer. Values greater than 2^14 must not be sent unless the receiver has set a larger value for SETTINGS_MAX_FRAME_SIZE parameter. Type: The 8-bit type of the frame. It determines the format and semantics of the frame.">Length: The length of the...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19799&rss
*** LastPass Security Notice ***
---------------------------------------------
We want to notify our community that on Friday, our team discovered and blocked suspicious activity on our network. In our investigation, we have found no evidence that encrypted user vault data was taken, nor that LastPass user accounts were accessed. The investigation has shown, however, that LastPass account email addresses, password reminders, server per user salts, and authentication hashes were compromised.
---------------------------------------------
https://blog.lastpass.com/2015/06/lastpass-security-notice.html/
*** Blackhats exploiting MacKeeper hole to foist dangerous trojan ***
---------------------------------------------
Peskware now net nasty Last months MacKeeper vulnerability is now being exploited in the wild to hijack Apple machines, according to BAE security researcher Sergei Shevchenko.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/16/blackhats_e…
*** Odd HTTP User Agents, (Tue, Jun 16th) ***
---------------------------------------------
Many web application firewalls do block odd user agents. However, decent vulnerability scanners will try to evade these simple protections by trying to emulate the user agent string of commonly used browsers. To figure out if I can distinguish bad from good, I compared some of the logs from our honeypotsto logs from a normalweb server (isc.sans.edu). Many of the top user agents hitting the honeypot are hardly seen on normal web sites, allowing me to identify possible vulnerability scanners.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19805&rss
*** Phone hacking blitz hammers UK.bizs poor VoIP handsets ***
---------------------------------------------
If I ever get my hands on those phreaking kids who hacked my phones... UK businesses are getting disproportionately targeted by a surge of attacks against Voice over IP (VoIP) systems.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/16/voip_hackin…
*** iOS Application Security Part 45 - Enhancements in Damn Vulnerable iOS app version 2.0 ***
---------------------------------------------
In this article, i would like to give a quick walkthrough of the new vulnerabilities and challenges that we have added in version 2.0 of Damn Vulnerable iOS app. In the Insecure Data storage section, we have added challenges for the following databases. Realm Database Couchbase Lite YapDatabase We have also added a new section...
---------------------------------------------
http://resources.infosecinstitute.com/ios-application-security-part-45-enha…
*** DSA-3289 p7zip - security update ***
---------------------------------------------
Alexander Cherepanov discovered that p7zip is susceptible to adirectory traversal vulnerability. While extracting an archive, itwill extract symlinks and then follow them if they are referenced infurther entries. This can be exploited by a rogue archive to writefiles outside the current directory.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3289
*** VU#101500: Retrospect Backup Client uses weak password hashing ***
---------------------------------------------
Vulnerability Note VU#101500 Retrospect Backup Client uses weak password hashing Original Release date: 15 Jun 2015 | Last revised: 15 Jun 2015 Overview Retrospect Backup Client is a client to a network-based backup utility. This client stores passwords in a hashed format that is weak and susceptible to collision, allowing an attacker to generate a password hash collision and gain access to the targets backup files. Description CWE-916: Use of Password Hash With Insufficient Computational...
---------------------------------------------
http://www.kb.cert.org/vuls/id/101500
*** VU#626420: Pearson ProctorCache contains hard coded credentials ***
---------------------------------------------
Vulnerability Note VU#626420 Pearson ProctorCache contains hard coded credentials Original Release date: 16 Jun 2015 | Last revised: 16 Jun 2015 Overview The Pearson ProctorCache software uses a hard coded password for administrative tasks. Description The ProctorCache is designed to cache the testing content, as well as cache the responses and maintain a client list of active test-takers. ProctorCache is a server software package installed locally within the LAN on a Windows system.CWE-259:
---------------------------------------------
http://www.kb.cert.org/vuls/id/626420
*** Bugtraq: ESA-2015-106: EMC Unified Infrastructure Manager/Provisioning (UIM/P) Authentication Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535776
*** Security Advisory: MIT Kerberos 5 vulnerability CVE-2014-5355 ***
---------------------------------------------
(SOL16743)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/700/sol16743.htm…
*** RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-15-162-01 RLE Nova Wind Turbine HMI Unsecure Credentials Vulnerability that was published June 11, 2015, on the NCCIC/ICS-CERT web site. This updated advisory provides publicly disclosed vulnerabilities and mitigation measures for the RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-162-01A
*** IBM Security Bulletins ***
---------------------------------------------
Vulnerability in Diffie-Hellman ciphers affects TS3400 (CVE-2015-4000)
Vulnerability in Diffie-Hellman ciphers affects TS2900 (CVE-2015-4000)
Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Metrics Manager (CVE-2015-4000)
Vulnerability in Diffie-Hellman ciphers affects the IBM Installation Manager and IBM Packaging Utility (CVE-2015-4000)
Vulnerability with Diffie-Hellman ciphers may affect Lotus Quickr 8.5 for WebSphere Portal (CVE-2015-4000)
Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli System Automation for Integrated Operations Management (CVE-2015-0491, CVE-2015-0459, CVE-2015-0469, CVE-2015-0458, CVE-2015-0480, CVE-2015-0488, CVE-2015-0478, CVE-2015-047...)
IBM QRadar Incident Forensics 7.2.4 is vulnerable to a cross site scripting vulnerability. (CVE-2015-1919)
Vulnerabilities in OpenSSL affect IBM Campaign, IBM ContactOptimization (CVE-2015-0209, CVE-2015-0286, CVE-2015-0288, CVE-2015-0292, CVE-2015-0293)
Open Source Apache Tomcat prior to 6.0.42 as used in IBM QRadar Security Information and Event Manager 7.1 MR2, and 7.2.4 is vulnerable to HTTP request smuggling. (CVE-2014-0227)
Vulnerabilities in OpenSSL affect IBM Campaign, IBM ContactOptimization (CVE-2014-3569)
IBM Tealeaf Customer Experience is affected by a vulnerability in OpenSSL (CVE-2014-3511, CVE-2014-3512)
Vulnerability in Diffie-Hellman ciphers affects IBM Operations Analytics - Predictive Insights (CVE-2015-4000)
Vulnerability in OpenSSL affects IBM XIV Storage System Gen3 (CVE-2014-3570)
Multiple vulnerabilities in IBM SDK Java Technology Edition affect IBM Business Process Manager and WebSphere Lombardi Edition April 2015 CPU
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/?lang=en_us
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 12-06-2015 18:00 − Montag 15-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Hey kids, who wants to pwn a million BIOSes? ***
---------------------------------------------
IT security bods warn of dysfunctional ecosystem, fraught with vulnerability The overlooked task of patching PC BIOS and UEFI firmware vulnerabilities leaves corporations wide open to attack, a new paper by security researchers warns.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/12/bios_securi…
*** Oh look - JavaScript Droppers ***
---------------------------------------------
In a typical drive-by-download attack scenario the shellcode would download and execute a malware binary. The malware binary is usually wrapped in a dropper that unpacks or de-obfuscates and executes it. Droppers' main goal is to launch malware without being detected by antiviruses and HIPS. Nowadays the most popular way of covert launching would probably...
---------------------------------------------
http://labs.bromium.com/2015/06/12/oh-look-javascript-droppers/
*** NTP für Windows: Schaltsekunde könnte Probleme bereiten ***
---------------------------------------------
Wer den NTP-Client für Windows installiert hat, sollte vor dem 30. Juni ein Update durchführen
---------------------------------------------
http://derstandard.at/2000017430786
*** Windows Server 2003 End of Life: You Can't RIP ***
---------------------------------------------
Windows XP reached end of support last year and now it's time for another end of life: Windows Server 2003. On July 14, 2015, this widely deployed Microsoft operating system will reach its end of life - a long run since its launch in April 2003. Estimates on the number of still-active Windows Server 2003 users vary from...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/FwOEN1rriTc/
*** OPM hack: Vast amounts of extremely sensitive data stolen ***
---------------------------------------------
The extent of the breach suffered by the US Office of Personnel Management has apparently widened. Reports are coming in that the hackers have not only accessed Social Security numbers, job assign...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/FaMAmsBY66Y/secworld.php
*** Dnstwist variiert und testet Domainnamen ***
---------------------------------------------
Wer überwachen will, wie Vertipper- und Phishing-Domains für einen Domainnamen verbreitet sind, kann das Python-Skript Dnstwist nutzen. Es übernimmt viel Handarbeit und hilft bei der Analyse.
---------------------------------------------
http://heise.de/-2690418
*** The top mistakes banks make defending against hackers ***
---------------------------------------------
Many financial institutions fail to perform comprehensive risk analysis and assessment, exposing their companies and clients to enormous risk.
---------------------------------------------
https://www.htbridge.com/blog/the-top-mistakes-banks-make-defending-against…
*** Call to participate in the EU28 Cloud Security Conference ***
---------------------------------------------
On June 16, in Riga, the Ministry of Defence of the Republic of Latvia and the European Union Agency for Network and Information Security (ENISA) will organise the EU28 Cloud Security Conference: Reaching the Cloud Era in the European Union. The participants of the conference will discuss the cloud security in the two parallel tracks: "Legal & Compliance" and "Technologies and Solutions".
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/call-to-participate-in-the-eu28…
*** The Duqu 2.0 persistence module ***
---------------------------------------------
We have described how Duqu 2.0 does not have a normal "persistence" mechanism. This can lead users to conclude that flushing out the malware is as simple as rebooting all the infected machines. In reality, things are a bit more complicated.
---------------------------------------------
http://securelist.com/blog/research/70641/the-duqu-2-0-persistence-module/
*** Duqu 2.0 Attackers Used Stolen Foxconn Certificate to Sign Driver ***
---------------------------------------------
The attackers behind the recently disclosed Duqu 2.0 APT have used stolen digital certificates to help sneak their malware past security defenses, and one of the certificates used in the attacks was issued to Foxconn, the Chinese company that manufactures products for Apple, BlackBerry, Dell, and many other companies. Researchers at Kaspersky Lab, who discovered...
---------------------------------------------
http://threatpost.com/duqu-2-0-attackers-used-stolen-foxconn-certificate-to…
*** Massive route leak causes Internet slowdown ***
---------------------------------------------
Earlier today a massive route leak initiated by Telekom Malaysia (AS4788) caused significant network problems for the global routing system. Primarily affected was Level3 (AS3549 - formerly known as Global Crossing) and their customers. Below are some of the details as we know them now.
---------------------------------------------
https://www.bgpmon.net/massive-route-leak-cause-internet-slowdown/
*** Cisco issues 16 patches to pop pesky peccant packets ***
---------------------------------------------
Remote code execution for some, denial of service for the rest of us Cisco has issued a string of patches for 16 faults including a fix for a possible remote code execution in its IOS and IOS XE routing software.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/15/cisco_ipv6_…
*** Vulnerabilities in Cisco Products ***
---------------------------------------------
*** Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco Email Security Appliance Anti-Spam Scanner Bypass Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39339
*** Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39343
*** Cisco Virtualization Experience Client 6215 Devices Command Injection Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39347
*** Novell ZENworks Mobile Management Input Validation Flaw Permits Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1032576
*** Novell Messenger 3.0 Support Pack 1 ***
---------------------------------------------
Abstract: Novell Messenger 3.0 Support Pack 1 has been released. Please be aware that there are security fixes to Messengers server and client components (see the change log below and the Readme documentation on the web). It is recommended that they are updated on an expedited basis.Document ID: 5212230Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:consoleone1.3.6h_windows.zip (46.82 MB)nm301_full_linux_multi.tar.gz (269.54 MB)nm301_client_mac_multi.zip (40.62...
---------------------------------------------
https://download.novell.com/Download?buildid=o8Y11QiTuc4~
*** DSA-3285 qemu-kvm - security update ***
---------------------------------------------
Several vulnerabilities were discovered in qemu-kvm, a fullvirtualization solution on x86 hardware.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3285
*** DSA-3284 qemu - security update ***
---------------------------------------------
Several vulnerabilities were discovered in qemu, a fast processoremulator.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3284
*** DSA-3288 libav - security update ***
---------------------------------------------
Several security issues have been corrected in multiple demuxers anddecoders of the libav multimedia library. A full list of the changes isavailable at https://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v11.4
---------------------------------------------
https://www.debian.org/security/2015/dsa-3288
*** DSA-3287 openssl - security update ***
---------------------------------------------
Multiple vulnerabilities were discovered in OpenSSL, a Secure SocketsLayer toolkit.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3287
*** DSA-3286 xen - security update ***
---------------------------------------------
Multiple security issues have been found in the Xen virtualisationsolution:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3286
*** Vulnerabilities in multiple third party TYPO3 CMS extensions ***
---------------------------------------------
*** SQL Injection vulnerability in extension FAQ - Frequently Asked Questions (js_faq) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-…
*** SQL Injection vulnerability in extension Developer Log (devlog) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-…
*** SQL Injection vulnerability in extension Smoelenboek (ncgov_smoelenboek) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-…
*** SQL Injection vulnerability in extension Store Locator (locator) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-…
*** SQL Injection vulnerability in extension wt_directory (wt_directory) ***
http://www.typo3.org/news/article/sql-injection-vulnerability-in-extension-…
*** Arbitrary Code Execution in extension Frontend User Upload (feupload) ***
http://www.typo3.org/news/article/arbitrary-code-execution-in-extension-fro…
*** Cross-Site Scripting in extension BE User Log (beko_beuserlog) ***
http://www.typo3.org/news/article/cross-site-scripting-in-extension-be-user…
*** Arbitrary Code Execution in extension Job Fair (jobfair) ***
http://www.typo3.org/news/article/arbitrary-code-execution-in-extension-job…
*** Security Advisory - Web UI Authentication Vulnerability in Huawei E5756S ***
---------------------------------------------
Jun 15, 2015 18:00
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Filezilla 3.11.0.2 sftp module denial of service vulnerability ***
---------------------------------------------
Topic: Filezilla 3.11.0.2 sftp module denial of service vulnerability Risk: Medium Text: # Exploit title: filezilla 3.11.0.2 sftp module denial of service vulnerability # Date: 5-6-2015 # Vendor homepage: http...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060077
*** putty v0.64 denial of service vulnerability ***
---------------------------------------------
Topic: putty v0.64 denial of service vulnerability Risk: Medium Text: # Exploit title: putty v0.64 denial of service vulnerability # Date: 5-6-2015 # Vendor homepage: http://www.chiark.green...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060076
*** E-Detective Lawful Interception System multiple security vulnerabilities ***
---------------------------------------------
Topic: E-Detective Lawful Interception System multiple security vulnerabilities Risk: Medium Text:Advisory: E-Detective Lawful Interception System multiple security vulnerabilities Date: 14/06/2015 CVE: ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015060075
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 11-06-2015 18:00 − Freitag 12-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Gamarue dropping Lethic bot ***
---------------------------------------------
The Gamarue (aka Andromeda) botnet is a highly modular botnet family that allows attackers to take complete control of an infected system and perform a range of malicious activity by downloading additional payloads. In this blog, we will cover a recent Gamarue ..
---------------------------------------------
http://research.zscaler.com/2015/06/gamarue-dropping-lethic-bot.html
*** Popcash Malvertising Leads to CryptoWall ***
---------------------------------------------
End users face the harsh reality of malvertising with CryptoWall ransomware dropped on their systems.
---------------------------------------------
https://blog.malwarebytes.org/malvertising-2/2015/06/popcash-malvertising-l…
*** RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability ***
---------------------------------------------
This advisory provides publicly disclosed vulnerabilities and mitigation measures for the RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-162-01
*** Microsoft flags Ask toolbar as unwanted and dangerous ***
---------------------------------------------
>From this month on, all versions of Ask.coms infamous browser toolbar except the very last will be detected as unwanted ..
---------------------------------------------
http://www.net-security.org/secworld.php?id=18506
*** The June 2015 issue of our SWITCH Security Report is available! ***
---------------------------------------------
Dear Reader! A new issue of our monthly SWITCH Security Report has just been released. The topics covered in this report are: What do tax authorities and contact sites have in ..
---------------------------------------------
http://securityblog.switch.ch/2015/06/12/the-june-2015-issue-of-our-switch-…
*** Integrating PaX into Android ***
---------------------------------------------
The PaX project provides many exploit mitigation features to harden the Linux kernel far beyond the baseline security features provided by upstream. Android is close enough to a normal Linux distribution for it to work quite well out-of-the-box ..
---------------------------------------------
https://copperhead.co/2015/06/11/android-pax
*** Phisher setzen auf Geo-Blocking ***
---------------------------------------------
Damit Phishing-Seiten länger überleben, lassen sich manche von ihnen nur aus dem Land abrufen, auf das es die Cyber-Ganoven abgesehen haben. Phishing-Filterdienste bleiben deshalb außen vor und schöpfen keinen Verdacht.
---------------------------------------------
http://www.heise.de/security/meldung/Phisher-setzen-auf-Geo-Blocking-268948…
*** Dyre Configuration Dumper ***
---------------------------------------------
It�s been over a year since Dyre first appeared, and with a rise of infections in 2015, it doesn�t look like the attackers are stopping anytime soon. At PhishMe we�ve been ..
---------------------------------------------
http://phishme.com/dyre-configuration-dumper/
*** OpenSSL-Update verursacht ABI-Probleme ***
---------------------------------------------
OpenSSL veröffentlicht Updates für kleinere Sicherheitslücken - dabei ist den Entwicklern ein Fehler unterlaufen: Durch eine veränderte Datenstruktur ändert sich die Binärschnittstelle der Bibliothek, was zu Fehlfunktionen führen kann.
---------------------------------------------
http://www.golem.de/news/sicherheitsluecken-openssl-update-verursacht-abi-p…
*** How Heartbleed couldve been found ***
---------------------------------------------
tl;dr With a reasonably simple fuzzing setup I was able to rediscover the Heartbleed bug. This uses state-of-the-art fuzzing and memory protection technology (american fuzzy lop and Address Sanitizer), but it doesnt require any prior knowledge about ..
---------------------------------------------
https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 10-06-2015 18:00 − Donnerstag 11-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Increase in CryptoWall 3.0 from malicious spam and Angler exploit kit, (Thu, Jun 11th) ***
---------------------------------------------
Introduction Since Monday2015-05-25(a bitmore than 2 weeks ago), weve seen a significantamount of CryptoWall 3.0 ransomware from">) and theAngler exploit kit (EK). A malspam campaign pushing CryptoWall 3.0 started as early as Monday 2015-05-25, but it hasincreased significantly since Monday 2015-06-08. The CryptoWall3.0push from Angler EK appears to have started around the same time. Both campaigns (malspam and Angler EK) were active as recently as Wednesday 2015-06-10. The timing of...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19785&rss
*** Factsheet: Software has an expiry date ***
---------------------------------------------
Software vendors regularly make announcements that certain versions of software will no longer be supported after a particular date. Such dates are known as End-of-Life. After the End-of-Life, software is no longer supported and can therefore not be considered to be secure. The NCSC advises to update systems after the announcement as soon as possible.
---------------------------------------------
https://www.ncsc.nl/english/services/expertise-advice/knowledge-sharing/fac…
*** Cyberangriff: Bundestag benötigt komplett neues Computer-Netzwerk ***
---------------------------------------------
Das Computer-Netzwerk im Bundestag ist hinüber. Der Cyberangriff auf den deutschen Bundestag hat weitreichendere Folgen als bisher angenommen. Das Parlament muss ein völlig neues Computer-Netzwerk errichten.
---------------------------------------------
http://www.golem.de/news/cyberangriff-bundestag-benoetigt-komplett-neues-co…
*** Bundestag: "Von einem Totalschaden kann keine Rede sein" ***
---------------------------------------------
Nur 15 Rechner sollen von dem Hacker-Angriff auf den Bundestag betroffen sein. Das berichtet der Unionsabgeordnete Thomas Jarzombek und beruft sich auf das BSI.
---------------------------------------------
http://www.golem.de/news/bundestag-von-einem-totalschaden-kann-keine-rede-s…
*** MSRT June 2015: BrobanDel ***
---------------------------------------------
Providing further protections for our customers, this month we added three new malware families and two variants to the Microsoft Malicious Software Removal Tool (MSRT): Win32/Bagopos Win32/BrobanDel Win32/Gatak PWS:Win32/OnLineGames.AH PWS:Win32/OnLineGames.MV Gatak is a family of information-stealing malware that collects sensitive information and sends it to a remote attacker, if a system is compromised. Bagopos is another information-stealing malware family that targets credit card...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/06/09/msrt-june-2015-brobandel…
*** Windows 10 to offer application developers new malware defenses ***
---------------------------------------------
Application developers can now actively participate in malware defense - in a new way to help protect customers from dynamic script-based malware and non-traditional avenues of cyberattack. Microsoft is making that possible through the Antimalware Scan Interface (AMSI) - a generic interface standard that allows applications and services to integrate with any antimalware product present on a machine. AMSI is currently available through the Windows 10 Technical Preview, and will be fully...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/06/09/windows-10-to-offer-appl…
*** Advances in Scripting Security and Protection in Windows 10 and PowerShell V5 ***
---------------------------------------------
In the last several releases of Windows, we've been working hard to make the platform much more powerful for administrators, developers, and power users alike. PowerShell is an incredibly useful and powerful language for managing Windows domains. Unfortunately, attackers can take advantage of these same properties when performing "post-exploitation" activities (actions that are performed after a system has been compromised). The PowerShell team, recognizing this behavior, have
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2015/06/10/advances-in-scripting-sec…
*** CSDanube ***
---------------------------------------------
CERT.at ist keine isolierte Einrichtung, im Gegenteil: Wir kooperieren in diversen Kreisen mit anderen Institutionen und Firmen. Das reicht von unserer Einbettung in die Umsetzung der ÖSCS, lokalen Partnern in der Industrie und Forschung bis hin zur globalen Vernetzung der CERTs. In diesem Kontext nehmen wir an einem Projekt teil, dass im Rahmen des START Programms der Danube Region Strategy gefördert wird: Es geht bei diesem Projekt darum, dass die CERTs der Region...
---------------------------------------------
http://www.cert.at/services/blog/20150611115640-1547.html
*** Security Advisory: Object Injection Vulnerability in WooCommerce ***
---------------------------------------------
Security Risk: Dangerous Exploitation Level: Easy/Remote DREAD Score: 8/10 Vulnerability: Object Injection Patched Version: 2.3.11 During a routine audit for our WAF, we discovered a dangerous Object Injection vulnerability which could, in certain contexts, be used by an attacker to download any file on the vulnerable server. Are you at risk? The vulnerability is only...
---------------------------------------------
https://blog.sucuri.net/2015/06/security-advisory-object-injection-vulnerab…
*** Hospira Plum A+ and Symbiq Infusion Systems Vulnerabilities ***
---------------------------------------------
This advisory provides publicly disclosed vulnerabilities and compensating measures for the Hospira Plum A+ and Symbiq Infusion System that are similar to vulnerabilities identified in the Hospira LifeCare PCA Infusion System discussed in the updated advisory ICSA-15-125-01B Hospira LifeCare PCA Infusion System Vulnerabilities.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-161-01
*** HPSBUX03337 SSRT102066 rev.1 - HP-UX Apache Web Server Suite running Apache Web Server, Tomcat v6.x, or PHP v5.4.x, Remote Denial of Service (DoS) and Other Vulnerabilities ***
---------------------------------------------
Potential security vulnerabilities have been identified with the HP-UX Apache Web Server Suite, Tomcat Servlet Engine, and PHP. These could be exploited remotely to create a Denial of Service (DoS) and other vulnerabilities.
---------------------------------------------
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04686230
*** Cisco IOS XR telnetd Packet Processing Denial of Service Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39293
*** Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39280
*** Cisco Identity Services Engine Improper Web Page Controls Privilege Escalation Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39299
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 09-06-2015 18:00 − Mittwoch 10-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39256http://tools.cisco.com/security/center/viewAlert.x?alertId=39257http://tools.cisco.com/security/center/viewAlert.x?alertId=39240
*** MS15-JUN - Microsoft Security Bulletin Summary for June 2015 - Version: 1.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS15-JUN
*** VMSA-2015-0004 ***
---------------------------------------------
VMware Workstation, Fusion and Horizon View Client updates address critical security issues ..
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2015-0004.html
*** Vawtrak Uses Tor2Web making hard to track down its servers ***
---------------------------------------------
Security experts at Fortinet uncovered a new strain of the Vawtrak banking Trojan is implementing an obscuring mechanism based on the Tor2Web service. The authors of the banking Trojan Vawtrak are adopting a new tactic to hide the ..
---------------------------------------------
http://securityaffairs.co/wordpress/37682/malware/vawtrak-uses-tor2web.html
*** iOS und OS X: Apple könnte HTTPS für Apps erzwingen ***
---------------------------------------------
Entwickler von Apps für iOS und OS X sollten "so schnell wie möglich" auf sichere Verbindungen per HTTPS wechseln, empfiehlt Apple. Das Unternehmen könnte die Verschlüsselung gar für die Aufnahme im App Store erzwingen.
---------------------------------------------
http://www.golem.de/news/ios-und-os-x-apple-koennte-https-fuer-apps-erzwing…
*** Schlag gegen internationale Bande von Cyber-Kriminellen in Europa ***
---------------------------------------------
http://derstandard.at/2000017259662
*** N-Tron 702W Hard-Coded SSH and HTTPS Encryption Keys ***
---------------------------------------------
This advisory provides mitigation details for hard-coded SSH and HTTPS encryption keys in the N-Tron 702-W Industrial Wireless Access Point device.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-160-01
*** Sinapsi eSolar Light Plaintext Passwords Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for plain text passwords in the Sinapsi eSolar Light application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-160-02
*** Adobe, Microsoft Issue Critical Security Fixes ***
---------------------------------------------
Adobe today released software updates to plug at least 13 security holes in its Flash Player software. Separately, Microsoft pushed out fixes for at least three dozen flaws ..
---------------------------------------------
http://krebsonsecurity.com/2015/06/adobe-microsoft-issue-critical-security-…
*** The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns ***
---------------------------------------------
Kaspersky Lab uncovers Duqu 2.0 � a highly sophisticated malware platform exploiting up to three zero-day vulnerabilities.
---------------------------------------------
http://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophist…
*** Duqu 2.0 ***
---------------------------------------------
In our full report, available at http://www.crysys.hu/duqu2/duqu2.pdf, we point out numerous similarities that we discovered between Duqu and Duqu 2.0, ..
---------------------------------------------
http://blog.crysys.hu/2015/06/duqu-2-0/
*** Microsoft pusht HTTPS beim Internet Explorer und Edge-Webbrowser ***
---------------------------------------------
Ab sofort sollen der Internet Explorer und Webbrowser von Windows 10 Edge das verschlüsselte Surfen über HTTPS vorantreiben. Dafür hat Microsoft jetzt Updates verteilt, die HSTS einführen.
---------------------------------------------
http://heise.de/-2687051
*** Xen Security Advisory CVE-2015-3209 / XSA-135 ***
---------------------------------------------
The QEMU security team has predisclosed the following advisory: pcnet_transmit loads a transmit-frame descriptor from the guest into the /tmd/ local variable to recover a length field, a status field and a guest-physical location of the associated ..
---------------------------------------------
http://www.openwall.com/lists/oss-security/2015/06/10/3
*** Russische Hacker sollen hinter Cyber-Angriff auf TV-Sender stecken ***
---------------------------------------------
Nicht – wie bisher angenommen – der Islamistischer Staat (IS), sondern russische Profi-Hacker sollen im April den Sendebetrieb von TV5 lahm gelegt haben. Die platzierte IS-Propaganda sei möglicherweise nur ein Täuschungsmanöver gewesen.
---------------------------------------------
http://heise.de/-2687434
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 08-06-2015 18:00 − Dienstag 09-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Bug Bounties in Crosshairs of Proposed US Wassenaar Rules ***
---------------------------------------------
Bug bounties and rewards programs provide researchers with a measure of income, and if the proposed Wassenaar rules are implemented in the U.S., that initiatives could be adversely impacted.
---------------------------------------------
http://threatpost.com/bug-bounties-in-crosshairs-of-proposed-us-wassenaar-r…
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39210http://tools.cisco.com/security/center/viewAlert.x?alertId=38883http://tools.cisco.com/security/center/viewAlert.x?alertId=39233http://tools.cisco.com/security/center/viewAlert.x?alertId=39192
*** Fast look at Sundown EK ***
---------------------------------------------
Disclaimer : There is nothing worth a post there...except mentionning this EK is around. I would put that "kit" in the same ..
---------------------------------------------
http://malware.dontneedcoffee.com/2015/06/fast-look-at-sundown-ek.html
*** New Episode of Punkey PoS Malware Airs ***
---------------------------------------------
Reruns from the 1980s are all the rage these days, and like the sitcom its based on, weve encountered a second run from the Punkey Point of Sale malware as part of an ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/New-Episode-of-Punkey-P…
*** Website der US-Armee wegen Hackerangriffs vorübergehend stillgelegt ***
---------------------------------------------
Wegen eines Hackerangriffs hat die US-Armee ihre Website vorübergehend stillgelegt. Nach der Entdeckung der Cyberattacke seien "geeignete Vorsichtsmaßnahmen" ergriffen ..
---------------------------------------------
http://derstandard.at/2000017173834
*** Pin und Aktivierungssperre: Apple erhöht Sicherheit von iOS und der Apple Watch ***
---------------------------------------------
Apple führt bei iOS 9 längere Pin-Codes ein, mit denen die mobilen Geräte vor unbefugtem Zugriff geschützt werden. Wer TouchID verwendet, muss ein sechsstelliges Kennwort eingeben und die Apple Watch erhält die geforderte Aktivierungssperre.
---------------------------------------------
http://www.golem.de/news/pin-und-aktivierungssperre-apple-erhoeht-sicherhei…
*** Amazon will SSL-Zertifizierungstelle werden ***
---------------------------------------------
Amazons SSL-Zertifizierungstelle soll Server- und EV-Zertifikate ausstellen und sich dabei nicht auf Amazon-Kunden beschränken.
---------------------------------------------
http://heise.de/-2683851
*** iOS: Schwachstelle in Apple Mail ermöglicht offenbar raffiniertes iCoud-Phishing ***
---------------------------------------------
Ein Angreifer kann die Lücke nach Angabe eines Entwicklers dazu nutzen, den iCloud-Anmeldedialog zu imitieren, der öfters in iOS erscheint. Apple ist angeblich seit Monaten über das Problem informiert.
---------------------------------------------
http://heise.de/-2684896
*** Security updates available for Adobe Flash Player (APSB15-11) ***
---------------------------------------------
A Security Bulletin (APSB15-11) has been published regarding security updates for Adobe Flash Player. These updates address critical vulnerabilities, and Adobe recommends users update their product installations to the latest versions using ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1200
*** Asus schützt seine Router vor Exploit-Kit ***
---------------------------------------------
Nachdem kürzlich ein Exploit-Kit aufgetaucht ist, dass über 50 Router-Modelle verschiedener Hersteller angreifen kann, hat Asus nun Firmware-Updates für 16 Router herausgebracht.
---------------------------------------------
http://heise.de/-2684612
*** SweetCAPTCHA Service used to Distribute Adware ***
---------------------------------------------
SweetCaptcha is free CAPTCHA service that offers to match sweet-looking images instead of making you recognize distorted digits and characters. It has integration with many website ..
---------------------------------------------
https://blog.sucuri.net/2015/06/sweetcaptcha-service-used-to-distribute-adw…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 05-06-2015 18:00 − Montag 08-06-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** �UnfriendAlert� wants your Facebook Credentials ***
---------------------------------------------
For our first "PUP Friday" post, we talked about UnfriendAlert, a program that purports to notify users ..
---------------------------------------------
https://blog.malwarebytes.org/online-security/2015/06/unfriendalert-wants-y…
*** Changes in Oracle Database 12c password hashes ***
---------------------------------------------
Oracle has made improvements to user password hashes within Oracle Database 12c. By using a PBKDF2-based SHA512 hashing algorithm, instead of simple SHA1 hash, password ..
---------------------------------------------
http://trustwave.com/Resources/SpiderLabs-Blog/Changes-in-Oracle-Database-1…
*** [Honeypot Alert] Fritz!Box � Remote Command Execution Exploit Attempt ***
---------------------------------------------
Our web honeypots picked up some exploit attempts for a remote command execution vulnerability in FRITZ!Box, a series of routers produced by AVM. This exploit targets router ..
---------------------------------------------
http://trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz!Box-%…
*** Checking for BACNet devices inside corporate networks ***
---------------------------------------------
Building automation Networks are very common today for intelligent buildings. They interconnect several type of devices like escalators, elevators, power circuits, heating, ventilating and air conditioning (HVAC) to the main control ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19771
*** Insider vs. Outsider Threats: Identify and Prevent ***
---------------------------------------------
In my last article, we discussed on a step-by-step approach on APT attacks. The origin of any kind of cyber-attack is through an external or an internal source. Multiple sophisticated insider attacks resulted in the exfiltration of ..
---------------------------------------------
http://resources.infosecinstitute.com/insider-vs-outsider-threats-identify-…
*** Antiquated environment and bad security practices aided OPM hackers ***
---------------------------------------------
By now, youve all heard about the massive breach at the US Office of Personnel Managements (OPM), and that the attackers have accessed (and likely made off with) personal information ..
---------------------------------------------
http://www.net-security.org/secworld.php?id=18484
*** Plex verschl�sselt Verbindung zur eigenen Medienzentrale ***
---------------------------------------------
Den bisher größte Einsatz von Sicherheitszertifikaten heftet sich die Medienzentrale Plex auf die eigenen Fahnen. In einer Kooperation mit DigiCert bekommen sämtliche Nutzer der Software ein kostenloses SSL/TLS-Zertifikat für ihren Server ausgestellt.
---------------------------------------------
http://derstandard.at/2000017144835
*** DSA-3281 - Debian Security Team PGP/GPG key change notice ***
---------------------------------------------
This is a notice that the Debian Security Team has changed its PGP/GPGcontact key because of a periodic regular key rollover.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3281
*** Matryoshka dolls: analysing a packer for CTB locker ***
---------------------------------------------
We recently encountered a phishing campaign distributing CTB locker. Victims were sent an e-mail that appeared to be from a Dutch webshop, with the e-mail describing a Fifa15 order for Playstation 3. While no one uses PS3 anymore , there were users who ..
---------------------------------------------
https://www.dearbytes.com/en/nieuws/matroesjka-poppen-ctb-locker/
*** Raub im Zug: Datendiebstahl - ganz analog ***
---------------------------------------------
Banden stehlen Handys und Laptops von Managern, um die Besitzer oder deren Firmen mit den erbeuteten Daten zu erpressen.
---------------------------------------------
http://www.golem.de/news/raub-im-zug-datendiebstahl-ganz-analog-1506-114530…
*** Malware zapft Kreditkartendaten von Oracle-Kassensystemen ab ***
---------------------------------------------
Ein weiterer Schädling nistet sich in Point-of-Sales-Terminals ein und kopiert die Daten ahnungsloser Kreditkarten-Nutzer. MalaumPOS hat es auf ein weit verbreitetes Kassensystem von Oracle abgesehen.
---------------------------------------------
http://heise.de/-2680638
*** Bugtraq: strongswan security update ***
---------------------------------------------
Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec
suite used to establish IPsec protected links. When an IKEv2 client authenticates the server with certificates and the client authenticates itself to the server using pre-shared key or EAP,
the constraints on the ..
---------------------------------------------
http://www.securityfocus.com/archive/1/535708
*** Zeus Isn�t Dead, New Version Evades All Antivirus Detection Tools ***
---------------------------------------------
The venerable Zeus banking Trojan has been killed off many times; disappearing from the global Internet time and time again only to reappear with new modifications designed ..
---------------------------------------------
http://www.pcrisk.com/internet-threat-news/9068-zeus-evades-all-antivirus-d…
*** Many Drug Pumps Open to Variety of Security Flaws ***
---------------------------------------------
In April, a security researcher disclosed a litany of severe vulnerabilities in the PCA3 drug-infusion pump manufactured by a company named Hospira. He went so far as to ..
---------------------------------------------
http://threatpost.com/many-drug-pumps-open-to-variety-of-security-flaws/113…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 03-06-2015 18:00 − Freitag 05-06-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Zero-Day Disclosed in Unity Web Player ***
---------------------------------------------
A zero-day vulnerability has been disclosed in the popular Unity Web Player browser plugin. The flaw allows an attacker crossdomain access to websites and services using the victims credentials.
---------------------------------------------
http://threatpost.com/zero-day-disclosed-in-unity-web-player/113124
*** PCI Council releases PA-DSS 3.1, nixes SSL, early TLS ***
---------------------------------------------
The PCI Security Standards Council revisions to PA-DSS addresses SSL vulnerabilities.
---------------------------------------------
http://feedproxy.google.com/~r/SCMagazineHome/~3/Ybnmzlufdo4/
*** Embedded: Geldautomaten sollen von XP auf Windows 10 updaten ***
---------------------------------------------
Die Branchenorganisation ATM Industry Association ruft die Hersteller dazu auf, bei Geldautomaten Windows 8 und 8.1. zu überspringen. Auf Windows XP ausruhen sollen sie sich nicht.
---------------------------------------------
http://www.golem.de/news/embedded-geldautomaten-sollen-von-xp-auf-windows-1…
*** ICS Amsterdam 2015 ***
---------------------------------------------
SANS ICS Amsterdam 2015 hosts five dedicated training courses for those tasked with securing Industrial Control Systems as well as a two day ICS Security Summit. This specialist training event takes place at the Radisson Blue Amsterdam, from September 22nd - 28th.
---------------------------------------------
https://www.sans.org/event/ics-amsterdam-2015
*** Critical vulnerabilities in JSON Web Token libraries ***
---------------------------------------------
Great. So, what's wrong with that? ... Meet the "none" algorithm.
---------------------------------------------
http://ab0files.com/critical-vulnerabilities-in-json-web-token-libraries
*** Achtung: Offene Intranets verraten zu viel ***
---------------------------------------------
Viele Organisationen haben ein eigenes Intranet. Manche stellen versehentlich vertrauliche Dokumente online, die über Google auffindbar sind. Wir haben uns per Google Beispiele herausgepickt.
---------------------------------------------
http://heise.de/-2680058
*** Asprox / Kuluoz Botnet Analysis ***
---------------------------------------------
Introduction Kuluoz, aka Asprox, is a spam botnet that emerged in 2007. It has been known for sending mass of phishing emails used in conjunction with social engineering lures (e.g. booking confirmations, postal-themed spam, etc.) This article presents a view on the malware and its capabilities, how it communicates with the CnC, encryption schemes used,...
---------------------------------------------
http://resources.infosecinstitute.com/asprox-kuluoz-botnet-analysis/
*** WLAN-Trick soll Apple-Pay-Nutzern Kreditkartendaten entlocken ***
---------------------------------------------
Angreifer können die automatische WLAN-Verbindungsaufnahme von iOS dazu nutzen, um mit einem manipulierten Apple-Pay-Dialog auf Kreditkartenfang zu gehen, warnt eine Sicherheitsfirma.
---------------------------------------------
http://heise.de/-2680369
*** IBM Security Bulletins ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/?lang=en_us
*** McAfee ePolicy Orchestrator SSL/TLS spoofing ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/103610
*** Vulnerabilities in Cisco Products ***
---------------------------------------------
*** Cisco FireSIGHT Management Center XSS and HTML Injection Vulnerabilities ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39171
*** Cisco ONS 15454 System Software Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39172
*** Cisco Edge 340 Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39187
*** Cisco TelePresence SX20 HTTP Response Splitting Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39210
*** XZERES 442SR Wind Turbine CSRF Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a cross-site request forgery vulnerability in XZERES's 442SR turbine generator operating system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-155-01
*** Bugtraq: CA20150604-01: Security Notice for CA Common Services ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535684
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 02-06-2015 18:00 − Mittwoch 03-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Your Website Hacked but No Signs of Infection ***
---------------------------------------------
Imagine for a moment, you have a suspicion that you have somehow been hacked. You see that something is off, but you feel as if you are missing something. This is the emotionally draining world that many live in, with a paranoia and concern that grips you once you see and recognize that something is not right.
---------------------------------------------
http://feedproxy.google.com/~r/sucuri/blog/~3/0D6hUcbKq34/your-website-hack…
*** Holy SSH-it! Microsoft promises secure logins for Windows PowerShell ***
---------------------------------------------
Now that the door has hit Ballmer on the way out, OpenSSH support is go Microsoft has finally decided to add support for SSH to PowerShell, allowing people to log into Windows systems and use software remotely over an encrypted connection.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/02/openssh_win…
*** Bug des Tages: Skype hat eine "SMS des Todes" ***
---------------------------------------------
Sending the characters "http://:" (without the quotes) crashes Skype, and receiving a message with those characters makes it crash any time you try to sign in again.
---------------------------------------------
http://blog.fefe.de/?ts=ab900965
*** Good Patch Management Is Crucial to Cybersecurity in ICS ***
---------------------------------------------
A good cybersecurity strategy for industrial control systems (ICS) must include both a systematic approach to patch management and compensating cybersecurity controls for when patching is not an option. Patch management resolves bugs, operability, reliability,...
---------------------------------------------
http://feedproxy.google.com/~r/PaloAltoNetworks/~3/tK1mqdG1qkA/
*** IoT Devices Hosted On Vulnerable Clouds In Bad Neighborhoods ***
---------------------------------------------
OpenDNS report finds that organizations may be more susceptible to Internet of Things devices than they realize.
---------------------------------------------
http://www.darkreading.com/cloud/iot-devices-hosted-on-vulnerable-clouds-in…
*** Mass break-in: researchers catch 22 more routers for the SOHOpeless list ***
---------------------------------------------
A business model ripe for the bin Yet another disclosure tips 22 SOHO routers in the security bin, with everything from privilege escalation and authentication bypass to hard-coded credential backdoors.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/06/03/mass_breaki…
*** Piwik: Unberechtigte können Webseiten-Statistiken abrufen ***
---------------------------------------------
Installationen der Google-Analytics-Alternative Piwik sind häufig nicht korrekt konfiguriert und Dritte können ohne viel Aufwand Abrufstatistiken einsehen und sogar herunterladen.
---------------------------------------------
http://heise.de/-2678572
*** SSH: Sechs Jahre alter Bug bedroht Github-Repositories ***
---------------------------------------------
Ein Debian-Bug aus dem Jahr 2008 hinterlässt immer noch Spuren. Eine Analyse der öffentlichen SSH-Schlüssel bei Github zeigt: Mittels angreifbarer Schlüssel hätten Angreifer die Repositories von Projekten wie Python und Firmen wie Spotify oder Yandex manipulieren können.
---------------------------------------------
http://www.golem.de/news/ssh-sechs-jahre-alter-bug-bedroht-github-repositor…
*** Emergency Security Band-Aids with Systemtap ***
---------------------------------------------
Software security vulnerabilities are a fact of life. So is the subsequent publicity, package updates, and suffering service restarts. Administrators are used to it, and users bear it, and it's a default and traditional method. On the other hand, in...
---------------------------------------------
https://securityblog.redhat.com/2015/06/03/emergency-security-band-aids-wit…
*** Krypto-Trojaner überlegt es sich anders und entschlüsselt alles wieder ***
---------------------------------------------
Der Erpressungs-Trojaner Locker ist erst seit wenigen Tagen im Umlauf. Und schon ist seine Karriere wieder vorbei: Er hat vergangenen Dienstag den Befehl erhalten, alle verschlüsselten Dateien wiederherzustellen.
---------------------------------------------
http://heise.de/-2678669
*** Hackers Scan All Tor Hidden Services To Find Weaknesses In The Dark Web ***
---------------------------------------------
If you go down to the deep web today, you'll be following hot on the heels of a digital beast. In a matter of hours last week, the entire semi-anonymising Tor network, where activists and criminals alike try to hide from the gaze of their respective authorities, was traversed by PunkSPIDER, an automated scanner that pokes websites to uncover vulnerabilities.
---------------------------------------------
http://www.forbes.com/sites/thomasbrewster/2015/06/01/dark-web-vulnerabilit…
*** DSA-3277 wireshark - security update ***
---------------------------------------------
Multiple vulnerabilities were discovered in the dissectors/parsers forLBMR, web sockets, WCP, X11, IEEE 802.11 and Android Logcat, which couldresult in denial of service.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3277
*** Vulnerabilities in Cisco Products ***
---------------------------------------------
*** Cisco Unified MeetingPlace Microsoft Outlook Reflected Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39161
*** Cisco Unified MeetingPlace Session ID Information Disclosure Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39162
*** Cisco AnyConnect Secure Mobility Client Privilege Escalation Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39158
*** Cisco Adaptive Security Appliance XAUTH Bypass Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39157
*** Cisco Unified MeetingPlace Arbitrary File Download Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39163
*** Beckwith Electric TCP Initial Sequence Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a TCP initial sequence numbers vulnerability in multiple Beckwith Electric products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01
*** Moxa SoftCMS Buffer Overflow Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a buffer overflow vulnerability in the Moxa SoftCMS software package.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-153-02
*** [HTB23258]: Local PHP File Inclusion in ResourceSpace ***
---------------------------------------------
Product: ResourceSpace v7.1.6513Vulnerability Type: PHP File Inclusion [CWE-98]Risk level: High Creater: Montala LimitedAdvisory Publication: May 6, 2015 [without technical details]Public Disclosure: June 3, 2015 CVE Reference: CVE-2015-3648 CVSSv2 Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C) Vulnerability Details: High-Tech Bridge Security Research Lab discovered vulnerability in ResourceSpace, which can be exploited to include arbitrary local PHP file, execute PHP code, and compromise
---------------------------------------------
https://www.htbridge.com/advisory/HTB23258
*** USN-2626-1: Qt vulnerabilities ***
---------------------------------------------
Ubuntu Security Notice USN-2626-13rd June, 2015qt4-x11, qtbase-opensource-src vulnerabilitiesA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.04 Ubuntu 14.10 Ubuntu 14.04 LTS Ubuntu 12.04 LTSSummaryQt could be made to crash or run programs as your login if it opened aspecially crafted file.Software description qt4-x11 - Qt 4 libraries qtbase-opensource-src - Qt 5 libraries DetailsWolfgang Schenk discovered that Qt incorrectly handled certain malformedGIF...
---------------------------------------------
http://www.ubuntu.com/usn/usn-2626-1/
Next End-of-Shift report on 2015-06-05
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 01-06-2015 18:00 − Dienstag 02-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Understanding Flash Exploitation and the Alleged CVE-2015-0359 Exploit ***
---------------------------------------------
What follows is a detailed analysis of the root cause of a vulnerability we call CVE-2015-X, as well as a step-by-step explanation of how to trigger it. For more on Flash vulnerabilities, we also invite you...
---------------------------------------------
http://feedproxy.google.com/~r/PaloAltoNetworks/~3/JsuXUOWrYYM/
*** DYRE Banking Malware Upsurges; Europe and North America Most Affected ***
---------------------------------------------
Online banking users in Europe and North America are experiencing the upsurge of DYRE, a malware family notorious for the multiple ways it steals data and its ties to parcel mule scams, among others. There has been a 125% increase of DYRE-related infections worldwide this quarter compared to the last, proving that cybercriminal interest in...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/HyDW9pkWWws/
*** Malvertising infected millions of users in 2015 ***
---------------------------------------------
New research from Malwarebytes has found that malvertising is one of the primary infection vectors used to reach millions of consumers this year. The analysis looked at the three large scale zero-...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/9go1s-jFKtc/malware_news.…
*** Playing with IP Reputation with Dshield & OSSEC ***
---------------------------------------------
[This blogpost has also been published as a guest diary on isc.sans.org] When investigating incidents or searching for malicious activity in your logs, IP reputation is a nice way to increase the reliability of generated alerts. It can help to prioritize incidents. Let's take an example with a WordPress blog. It will, sooner or later, be targeted by a brute-force attack on the default /wp-admin page. In...
---------------------------------------------
http://blog.rootshell.be/2015/06/02/playing-with-ip-reputation-with-dshield…
*** Bugtraq: WebDrive 12.2 (B4172) - Buffer Overflow Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/535663
*** Red Hat JBoss Fuse and A-MQ XML External Entity Processing Flaw Lets Remote Users Obtain Potentially Sensitive Files ***
---------------------------------------------
http://www.securitytracker.com/id/1032442
*** Xen Security Advisories XSA-128, XSA-129, XSA-130, XSA-131 ***
---------------------------------------------
Potential unintended writes to host MSI message data field via qemu, PCI MSI mask bits inadvertently exposed to guests, Guest triggerable qemu MSI-X pass-through error messages, Unmediated PCI register access in qemu
---------------------------------------------
http://xenbits.xen.org/xsa/
*** USN-2625-1: Apache HTTP Server update ***
---------------------------------------------
Ubuntu Security Notice USN-2625-12nd June, 2015apache2 updateA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTSSummarySeveral security improvements have been made to the Apache HTTP Server.Software description apache2 - Apache HTTP server DetailsAs a security improvement, this update makes the following changes tothe Apache package in Ubuntu 12.04 LTS:Added support for ECC keys and ECDH ciphers.The SSLProtocol configuration directive now allows specifying
---------------------------------------------
http://www.ubuntu.com/usn/usn-2625-1/
*** USN-2624-1: OpenSSL update ***
---------------------------------------------
Ubuntu Security Notice USN-2624-11st June, 2015openssl updateA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.04 Ubuntu 14.10 Ubuntu 14.04 LTS Ubuntu 12.04 LTSSummaryThe export cipher suites have been disabled in OpenSSL.Software description openssl - Secure Socket Layer (SSL) cryptographic library and tools DetailsAs a security improvement, this update removes the export cipher suitesfrom the default cipher list to prevent their use in possible
---------------------------------------------
http://www.ubuntu.com/usn/usn-2624-1/
*** Cisco Headend Digital Broadband Delivery System Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=39133
*** HPSBGN03269 rev.2 - HP StoreAll OS, Remote Code Execution ***
---------------------------------------------
A potential security vulnerability has been identified with HP StoreAll OS. This is the GNU C Library (glibc) vulnerability known as "GHOST" which could be exploited remotely resulting in execution of code.
---------------------------------------------
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04599438
*** PCRE Heap Overflow in Regex Processing Lets Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1032453
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 29-05-2015 18:00 − Montag 01-06-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Which malware lures work best? ***
---------------------------------------------
More often than not, malware peddlers main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial to achieving that goal. Two researc...
---------------------------------------------
http://feedproxy.google.com/~r/HelpNetSecurity/~3/SXwL_z3NcUM/malware_news.…
*** New Android NFC Attack Could Steal Money From Credit Cards Anytime Your Phone Is Near ***
---------------------------------------------
Your NFC capable Android smartphone could be the newest weapon hackers use to steal money from the credit cards in your pocket, researchers find. In a presentation at Hack In The Box Security Conference in Amsterdam, security researchers Ricardo J. Rodriguez and Jose Vila presented a demo of a real world attack, to which all NFC capable Android phones are vulnerable. This attack, delivered through poisoned apps, exploits the NFC feature allowing unethical hackers to steal money from...
---------------------------------------------
http://www.idigitaltimes.com/new-android-nfc-attack-could-steal-money-credi…
*** Crypto flaws in Blockchain Android app sent Bitcoins to the wrong address ***
---------------------------------------------
A comedy of programming errors could prove catastrophic for affected users.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/9dMUjIT6yyo/
*** HITB Amsterdam Wrap-Up Day #2 ***
---------------------------------------------
I left Amsterdam after the closing keynote and I just arrived at home. This is my quick wrap-up for the second day of Hack in the Box! The second keynote was presented by John Matherly: "The return of the Dragons". John is the guy behind Shodan, the popular devices search engine. Shodan started because Nmap was not designed to scan the whole Internet. With Shodan, Stateless...
---------------------------------------------
http://blog.rootshell.be/2015/05/29/hitb-amsterdam-wrap-up-day-2-2/
*** Adventures in Social Engineering: The Evil Reference ***
---------------------------------------------
I recently completed a social engineering gig targeting four bank locations. After a phone call and a few e-mails, I was able to grab some victims NTLMv2 domain hashed credentials. The Approach I developed a fictitious persona to help me...
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Adventures-in-Social-En…
*** Locker Ransomware Author Allegedly Releases Database Dump of Private Keys ***
---------------------------------------------
Allegedly, the author of the "Locker" ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts to the public. Allegedly, the author of the "Locker" ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts worldwide to the public. The "author" claims that...
---------------------------------------------
http://securityaffairs.co/wordpress/37346/cyber-crime/locker-ransomware-db-…
*** Malware Evolution Calls for Actor Attribution? ***
---------------------------------------------
What makes one novel strain of malicious software more dangerous or noteworthy than another? Is it the sheer capability and feature set of the new malware, or are these qualities meaningless without also considering the skills, intentions and ingenuity of the person wielding it? Most experts probably would say it's important to consider attribution insofar as it is knowable, but it's remarkable how seldom companies that regularly publish reports on the latest criminal innovations go...
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/8rYlMnG_kmU/
*** Intelligente Städte: "Smart wäre, wenn man den ganzen Quatsch lassen würde" ***
---------------------------------------------
Der White-Hat-Hacker Felix Lindner ist entsetzt, wie wenig Wert Politik und Industrie auf den Schutz der digital vernetzten Stadt vor Cyberattacken legen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Intelligente-Staedte-Smart-waere-wen…
*** Researchers discover hidden shell in Hola VPN software ***
---------------------------------------------
Hola, an Israeli company that develops a browser plug-in promoted heavily as a means to bypass region locks on Web-based content and anonymous surfing, faced a considerable amount of backlash last week - after it was discovered they were selling access to their users connections in what one researcher called "a poorly secured botnet."On Friday, 24-hours after the quasi-botnet operation was disclosed, a group of researchers released details on a number of critical vulnerabilities in...
---------------------------------------------
http://www.csoonline.com/article/2929192/data-protection/researchers-discov…
*** Unzählige Apps speichern private Daten unsicher in der Cloud ***
---------------------------------------------
Auf den Cloud-Servern von Apple und Co. schlummern 56 Millionen nicht optimal geschützte Datensätze. Angreifer könnten vergleichsweise einfach Fotos, Adressdaten und weitere Infos abgreifen.
---------------------------------------------
http://heise.de/-2671988
*** Blue Coat: SSL Visibility Appliance web based vulnerabilities, (Sun, May 31st) ***
---------------------------------------------
Blue Coat has released a security advisory for SSL Visibility Appliance. The SSL Visibility Appliance is susceptible to multiple web-based vulnerabilities in the administration console. A remote attacker can use these vulnerabilities to obtain administrative access to the SSL Visibility Appliance. All versions of SSL Visibility prior to 3.8.4 are vulnerable. The vulnerabilities exist in the WebUI are: Cross-Site Request Forgery (CVE-2015-2852): Cross-site request forgery (CSRF) vulnerability...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19749&rss
*** JSA10681 - 2015-05 Out of Cycle Security Bulletin: "Logjam" passive attack on sub-1024 DH groups, and active downgrade attack of TLS to DHE_EXPORT (CVE-2015-4000) ***
---------------------------------------------
Affected Products: Junos OS (XNM-SSL)*, WXOS
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10681&actp=RSS
*** Vulnerabilities in Cisco Products ***
---------------------------------------------
*** Cisco Headend Digital Broadband Delivery System HTTP Response-Splitting Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38863
*** Cisco Conductor for Videoscape and Cisco Headend System Release HTTP Injection Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38945
*** Cisco Headend System Release Archive File Download Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38944
*** Cisco Headend System Release UDP TFTP and DHCP Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38938
*** Cisco Unified MeetingPlace XML Processing Information Disclosure Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=39130
*** Multiple Cisco Products TCP Flood Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/viewAlert.x?alertId=38943
*** Security Advisory: cURL and libcurl vulnerability CVE-2015-3148 ***
---------------------------------------------
(SOL16707)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/700/sol16707.htm…
*** Security Advisory: cURL and libcurl vulnerability CVE-2015-3143 ***
---------------------------------------------
(SOL16704)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/16000/700/sol16704.htm…
*** Novell Messenger 3.0 Support Pack 1 ***
---------------------------------------------
Abstract: Novell Messenger 3.0 Support Pack 1 has been released. Please be aware that there are security fixes to Messengers server and client components (see the change log below and the Readme documentation on the web). It is recommended that they are updated on an expedited basis.Document ID: 5211030Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:consoleone1.3.6h_windows.zip (46.82 MB)nm301_full_linux_multi.tar.gz (269.53 MB)nm301_client_mac_multi.zip (40.61
---------------------------------------------
https://download.novell.com/Download?buildid=j6RbJAJrtC4~
*** IDM 4.5 MSGW Driver 4.0.1.0 ***
---------------------------------------------
Abstract: This is a patch for the Managed System Gateway Driver (MSGW) for Identity Manager. It installs on Identity Manager version 4.5 but can be used on IDM 4.0.2. The version of this driver is 4.0.1.0Document ID: 5211010Security Alert: YesDistribution Type: Field Test FileEntitlement Required: NoFiles:IDM45_MSGW_4010.zip (4.68 MB)Products:Identity Manager 4.0.2Identity Manager 4.5Superceded Patches:IDM 4.0.2 MSGW Driver Version 4.0.0.6
---------------------------------------------
https://download.novell.com/Download?buildid=UQgGwYtht9c~
*** PHP Integer Overflows Let Remote Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1032433
*** PHP Multipart POST Request Processing Flaw Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1032432
*** PHP Functions That Permit Null Characters in Path Values May Let Remote Users Bypass Access Controls ***
---------------------------------------------
http://www.securitytracker.com/id/1032431
*** Security Notice - Statement on Security Researchers Revealing Security Vulnerabilities in Huawei SOHO Products on Packet Storm Website ***
---------------------------------------------
May 30, 2015 17:23
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-notices…
*** Huawei Wimax CPE Bm632w Hidden Backdoor ***
---------------------------------------------
Topic: Huawei Wimax CPE Bm632w Hidden Backdoor Risk: High Text:Exploit Title : Huawei Wimax CPE Bm632w Hidden Backdoor Date : 30 May 2015 Exploit Author : Koorosh Ghorbani Site : http://8...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015050183
*** Security Notice - Statement on Security Researchers Revealing Security Vulnerability in Huawei CPE Products on cxsecurity Website ***
---------------------------------------------
Jun 01, 2015 14:48
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-notices…
*** DSA-3275 fusionforge - security update ***
---------------------------------------------
Ansgar Burchardt discovered that the Git plugin for FusionForge, aweb-based project-management and collaboration software, does notsufficiently validate user provided input as parameter to the method tocreate secondary Git repositories. A remote attacker can use this flawto execute arbitrary code as root via a specially crafted URL.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3275
*** DSA-3276 symfony - security update ***
---------------------------------------------
Jakub Zalas discovered that Symfony, a framework to create websites andweb applications, was vulnerable to restriction bypass. It wasaffecting applications with ESI or SSI support enabled, that use theFragmentListener. A malicious user could call any controller via the/_fragment path by providing an invalid hash in the URL (or removingit), bypassing URL signing and security rules.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3276
*** ESC 8832 Data Controller Session Hijacking ***
---------------------------------------------
Topic: ESC 8832 Data Controller Session Hijacking Risk: Medium Text:=begin # Exploit Title: ESC 8832 Data Controller multiple vulnerabilities # Date: 2014-05-29 # Platform: SCADA / Web Applica...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015050181