=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 29-09-2015 18:00 − Mittwoch 30-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Analyzing Black Hat URL Shorteners ***
---------------------------------------------
Hackers are known to use URL shortening services to obfuscate their real landing pages. It's very effective in clickbait scams on social networks. Some hackers think that using URL shorteners in site injections makes it less likely to be ..
---------------------------------------------
https://blog.sucuri.net/2015/09/analyzing-black-hat-url-shorteners.html
*** Updated PClock Ransomware Still Comes Up Short ***
---------------------------------------------
In recent years, ransomware families are often glamorized as being some of the most dangerous types of malware. They've certainly caused a wealth of damage to end users with some of the ..
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/09/updated-pclock-ransomwar…
*** New Tactic Finds RAT Operators Fast ***
---------------------------------------------
Low tolerance for latency makes RAT operators less likely to use proxies, easier to track back home.
---------------------------------------------
http://www.darkreading.com/analytics/new-tactic-finds-rat-operators-fast/d/…
*** Tricks for DLL analysis ***
---------------------------------------------
Very often I get questions on how to perform analysis on DLL files. The reason being that it is easier to perform behavioral analysis on executables, either using external sandboxes or a vmware with tools like the ones from the Sysinternals ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20195
*** Honeywell Experion PKS Directory Traversal Vulnerability ***
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01
*** Mitsubishi Electric MELSEC FX-Series Controllers Denial of Service ***
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-146-01
*** Baxter SIGMA Spectrum Infusion System Vulnerabilities ***
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-181-01
*** RSA Web Threat Detection Bugs Let Remote Authenticated Users Obtain the AnnoDB Password and Local Users Gain Root Privileges ***
---------------------------------------------
Two vulnerabilities were reported in RSA Web Threat Detection. A local user can obtain root privileges on the target system. A remote authenticated user can obtain passwords on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1033672
*** RSA Certificate Manager and Registration Manager Input Validation Flaw in OneStep Component Lets Remote Users Traverse the Directory to View Files on the Target System ***
---------------------------------------------
A vulnerability was reported in RSA Certificate Manager and RSA Registration Manager. A remote user can view files on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1033671
*** freeswitch Heap Overflow ***
---------------------------------------------
A carefully crafted json string supplied to cJSON_Parse will trigger a
heap overflow with user controlled data. The underlying vulnerability occurs in the parse_string function.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015090190
*** Kontodaten via App ergaunert: Salzburgerin geschädigt ***
---------------------------------------------
http://derstandard.at/2000022994264
*** WordPress Malware - VisitorTracker Campaign Update ***
---------------------------------------------
For the last 3 weeks we have been tracking a malware campaign that has been compromising thousands of WordPress sites with the VisitorTracker malware code. We initially ..
---------------------------------------------
https://blog.sucuri.net/2015/09/wordpress-malware-visitortracker-campaign-u…
*** Companies leave vulnerabilities unpatched for up to 120 days ***
---------------------------------------------
Kenna studied the proliferation of non-targeted attacks and companies' ability to mitigate these threats through the timely remediation of security vulnerabilities ..
---------------------------------------------
http://www.net-security.org/secworld.php?id=18911
*** Security Advisory - Multiple Vulnerabilities in Huawei FusionServer Products ***
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Multiple vulnerabilities in Typo3 extensions ***
---------------------------------------------
http://www.typo3.org/news/article/sql-injection-in-extension-httpbl-blockin…http://www.typo3.org/news/article/cross-site-request-forgery-in-extension-t…http://www.typo3.org/news/article/cross-site-scripting-in-extension-news-sy…http://www.typo3.org/news/article/information-disclosure-in-extension-ldap-…
*** Pwn The Docs: Vulnerability in readthedocs.org ***
---------------------------------------------
If youre not familiar with readthedocs.org its a really popular place for developers to post documentation on their open source code. Its a really great platform and we in fact use it regularly. Honestly, Ive struggled with whether I want to release this vulnerability because its maintained by a few dudes ..
---------------------------------------------
http://alex.hyperiongray.com/posts/302352-pwn-the-docs
*** The Cost of a Data Breach: How Harmful Can a Data Breach Be? ***
---------------------------------------------
There is this belief that businesses that have suffered a data security breach very often do not recover. But is that really so? What does it take to actually destroy a company with a data breach? Before we go to the analysis, ..
---------------------------------------------
http://resources.infosecinstitute.com/the-cost-of-a-data-breach-how-harmful…
*** That Big Security Fix for Credit Cards Won't Stop Fraud ***
---------------------------------------------
The new chip cards and readers wont stop card fraud but will simply shift it to a different area.
---------------------------------------------
http://www.wired.com/2015/09/big-security-fix-credit-cards-wont-stop-fraud/
*** User Education, Carrot vs. Stick ***
---------------------------------------------
It's a perennial problem, after hours of presentations, online training, reminder emails, poster campaigns and memos, the phone rings, and a senior member of staff has opened a malicious email attachment, ..
---------------------------------------------
https://blog.team-cymru.org/2015/09/user-education-carrot-vs-stick/
*** Sicherheitslücken gestopft: SAP macht HANA sicherer ***
---------------------------------------------
SAP hat im Mai und April dieses Jahres zwölf Sicherheitslücken in der In-Memory-Plattform HANA geschlossen. Onapsis hat die Lücken erst jetzt gebündelt offengeleg, geht aus einer am gestrigen Dienstag veröffentlichten Sicherheitswarnung von Onapsis hervor.
---------------------------------------------
http://heise.de/-2835049
*** Europol: Cyber-Kriminelle werden immer aggressiver ***
---------------------------------------------
In Den Haag beraten 300 Experten von Europol und Interpol über wirksame Strategien gegen die Internet-Kriminalität.
---------------------------------------------
http://heise.de/-2835263
*** Russian hacker, nabbed in Spain, cops 4+ years for Citadel botnet ***
---------------------------------------------
Should have stayed under the skirt of Mother Russia. Just a thought Dimitry Belorossov - a Russian cyber-criminal who used the Citadel banking trojan - has been ..
---------------------------------------------
www.theregister.co.uk/2015/09/30/rainerfox_sentenced/
*** New 'Ghost Push' Variants Sport Guard Code; Malware Creator Published Over 600 Bad Android Apps ***
---------------------------------------------
Halloween is still a month from now and yet Android users are already being haunted by the previously reported 'Ghost Push' malware, which roots ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/new-ghost-push-v…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 28-09-2015 18:00 − Dienstag 29-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Hacker nutzen Imgur-Lücke beim Angriff auf Reddit und 8chan ***
---------------------------------------------
Eine Lücke in einem beliebten Bilder-Hoster wie Imgur kann fatale Folgen haben. Wie im vorliegenden Fall, als Hacker über Bande die Nutzer von Reddit und 8chan ins Visier nahmen.
---------------------------------------------
http://heise.de/-2828142
*** Revisiting Apple IPC: (1) Distributed Objects ***
---------------------------------------------
Earlier this year I gave a talk at the inaugural Jailbreak Security Summit entitled Auditing and Exploiting Apple IPC [ slides | video ]. As part of my research for that talk I wanted to find at least one bug involving each of the available IPC mechanisms on OS X/iOS; many of which remain unexplored and poorly-documented from ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/09/revisiting-apple-ipc-1-distri…
*** Regaining Control Over Edge ***
---------------------------------------------
Getting stuck in a loop is no fun especially when it makes your browser unusable. Microsoft Edge has a bigger chance of that happening due to its default settings.
---------------------------------------------
https://blog.malwarebytes.org/online-security/2015/09/regaining-control-ove…
*** CryptoWall's 'Customer Journey' Sounds Like A Real Nightmare ***
---------------------------------------------
The latest episode of Radiolab has what is without a doubt the best malware victim interview I've ever heard. Inna Simone's computer was infected by CryptoWall late last year and based on her telling of it, the worst part of the experience was trying to buy the Bitcoin she needed to pay off the extortionists.
---------------------------------------------
https://labsblog.f-secure.com/2015/09/28/cryptowalls-customer-journey/
*** ZDI-15-451: InduSoft Web Studio Remote Agent Remote Code Execution Vulnerability ***
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-451/
*** VeraCrypt Patched Against Two Critical TrueCrypt Flaws ***
---------------------------------------------
Two privilege escalation vulnerabilities in the last TrueCrypt build were discovered by James Forshaw of Google Project Zero, and patched in VeraCrypt.
---------------------------------------------
http://threatpost.com/veracrypt-patched-against-two-critical-truecrypt-flaw…
*** Oysters tablet comes preinstalled with Trojanized Android firmware ***
---------------------------------------------
Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you buy from ..
---------------------------------------------
http://www.net-security.org/malware_news.php?id=3115
*** NodeBB v0.8.2 - Client Side Cross Site Web Vulnerability ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015090182
*** Lebenswichtige medizinische Geräte ungeschützt im Internet ***
---------------------------------------------
Herzschrittmacher, Infusionsgeräte, Magnetresonanztomographen: Sicherheitsforscher haben Zehntausende medizinische Geräte entdeckt, die über das Internet leicht angegriffen werden können - weil sie meist noch mit Windows XP laufen. Die Forscher setzten Defibrillatoren und MRTs als Honeypots ein.
---------------------------------------------
http://www.golem.de/news/it-sicherheit-lebenswichtige-medizinische-geraete-…
*** Abusing GDI for ring0 exploit primitives ***
---------------------------------------------
Not long ago I came across a certain font related vulnerability, it was a 0day being exploited in the wild. The vulnerability was in a driver I was somewhat familiar with ATFMD.SYS.
---------------------------------------------
https://blog.coresecurity.com/2015/09/28/abusing-gdi-for-ring0-exploit-prim…
*** Botnet preying on Linux computers delivers potent DDoS attacks ***
---------------------------------------------
XOR DDoS bombards as many as 20 targets per day, sometimes with 150 GBpS of traffic.
---------------------------------------------
http://arstechnica.com/security/2015/09/botnet-preying-on-linux-computers-d…
*** There is an app commandlet for that ***
---------------------------------------------
Allegedly dubbed as Microsoft's post-exploitation language powershell is Microsoft attempt to provide good command-line interface for administrators, developers and power users. Despite being 8 years old it only recently started getting widespread adoption with enterprises moving on to Windows 7 and 2008 environments.
---------------------------------------------
https://dfirblog.wordpress.com/2015/09/27/dissecting-powershell-attacks/
*** Reverse Engineering Virtual Machine Protected Binaries ***
---------------------------------------------
In code obfuscation, a virtual machine is a mechanism used to execute a different instruction set than the one used by machine that runs the program. For example, a virtual machine can support executing the ARM instruction set on a 32-bit x86 architecture. Virtual machines used in code obfuscation are completely ..
---------------------------------------------
http://resources.infosecinstitute.com/reverse-engineering-virtual-machine-p…
*** Disclosing Vulnerabilities, Using Data Dumps & Sharing Threat Intelligence ***
---------------------------------------------
In recent years, there has been an explosion in the number of information security conferences held around the world. Despite this, the weeks leading up to Black Hat in Las Vegas are still reserved for some of the most significant security announcements, advancements and hacks of ..
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/disclosing-vulnerabili…
*** ATM Skimmer Gang Firebombed Antivirus Firm ***
---------------------------------------------
Its notable whenever cybercime spills over into real-world, physical attacks. This is the story of a Russian security firm whose operations were pelted with Molotov cocktail attacks after exposing an organized crime gang that developed and sold malicious software to steal cash from ATMs.
---------------------------------------------
http://krebsonsecurity.com/2015/09/atm-skimmer-gang-firebombed-antivirus-fi…
*** Warning: Malicious emails claiming to be from Doctor Web ***
---------------------------------------------
Virus makers often use names of well-known anti-virus companies to gain their victims trust and make them install some malicious program on their computers. At the end of September, cybercriminals employed this method to distribute a dangerous Trojan designed ..
---------------------------------------------
http://news.drweb.com/show/?i=9631&lng=en&c=9
*** Security Advisory 2015-01: Vulnerability in OTRS iPhoneHandle interface allows user with valid session privilege escalation ***
---------------------------------------------
September 29, 2015 - Please read carefully and check if the version of your OTRS system is affected by this vulnerability. Please send information regarding vulnerabilities in OTRS to: security(a)otrs.org PGP Key pub 2048R/9C227C6B 2011-03-21 [expires at: 2016-03-02] uid OTRS Security Team GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22
---------------------------------------------
https://www.otrs.com/security-advisory-2015-01-vulnerability-in-otrs-iphone…
*** Security Advisory 2015-02: Scheduler Process ID File Access ***
---------------------------------------------
September 29, 2015 - Please read carefully and check if the version of your OTRS system is affected by this vulnerability. Please send information regarding vulnerabilities in OTRS to: security(a)otrs.org PGP Key pub 2048R/9C227C6B 2011-03-21 [expires at: 2016-03-02] uid OTRS Security Team GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22
---------------------------------------------
https://www.otrs.com/security-advisory-2015-02-scheduler-process-id-file-ac…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 25-09-2015 18:00 − Montag 28-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Fake online Avast scanner ***
---------------------------------------------
Thanks to a tip from a friend, we came across a fake online scanner that abuses the good name of Avast. The idea to get you to visit this site is by waiting for someone to make a typo and end up at facebooksecuryti(dot)com. The site shows a ..
---------------------------------------------
https://blog.malwarebytes.org/social-engineering/2015/09/fake-online-avast-…
*** Compromised WordPress Campaign - Spyware Edition ***
---------------------------------------------
The Zscaler security research team started investigating multiple WordPress related security events earlier this month and came across a new widespread compromised WordPress campaign leading to the download of unwanted applications. This has been briefly covered by dynamoo and has been reported by some users on official WordPress forums.
---------------------------------------------
http://research.zscaler.com/2015/09/compromised-wordpress-campaign-spyware.…
*** Cisco TelePresence Server Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
A vulnerability in the web interface of Cisco TelePresence Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against the user of the web interface.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41128
*** Banks: Card Breach at Hilton Hotel Properties ***
---------------------------------------------
Multiple sources in the banking industry say they have traced a pattern of credit card fraud that suggests hackers have compromised point-of-sale registers in gift shops and restaurants at a large number of Hilton Hotel and franchise properties across the United States. Hilton says it is investigating the claims.
---------------------------------------------
http://krebsonsecurity.com/2015/09/banks-card-breach-at-hilton-hotel-proper…
*** Splunk Input Validation Flaw in Splunk Web Lets Remote Conduct Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1033655
*** McAfee Enterprise Security Manager Filename Processing Flaw Lets Remote Authenticated Users Execute Arbitrary Commands on the Target System ***
---------------------------------------------
http://www.securitytracker.com/id/1033654
*** Android Security Symposium - Videos online ***
---------------------------------------------
The Android Security Symposium was a huge success and we are happy that the Videos are available online now. Thank you to Usmile for making this possible!
---------------------------------------------
https://www.sba-research.org/2015/09/26/android-security-symposium-videos-o…
*** Yahoo! Launches Free Web Application Security Scanner ***
---------------------------------------------
Yahoo! has open-sourced Gryffin - a Web Application Security Scanner - in an aim to improve the safety of the Web for everyone. Currently in its beta, Project Gryffin has made available on Github under the BSD-style license that Yahoo! has been using for a ..
---------------------------------------------
https://thehackernews.com/2015/09/web-application-security-scanner.html
*** Android 6.0: Wie Google den Nutzern die Kontrolle zurückgeben will ***
---------------------------------------------
Das neue Berechtigungsmodell von "Marshmallow" bringt signifikante Verbesserungen
---------------------------------------------
http://derstandard.at/2000022756525
*** Git-1.9.5 ssh-agent.exe Buffer Overflow ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015090161
*** Kim Jong Un: Ein Mobilfunknetz nur für mich ***
---------------------------------------------
Ein eigenes Mobilfunknetz für die nordkoreanische Führung: Was nach einem merkwürdigen Statussymbol klingt, soll die Sicherheit der Regierungskommunikation in dem abgeschotteten Land erhöhen.
---------------------------------------------
http://www.golem.de/news/kimg-jong-un-ein-mobilfunknetz-nur-fuer-mich-1509-…
*** How I hacked my IP camera, and found this backdoor account ***
---------------------------------------------
The time has come. I bought my second IoT device - in the form of a cheap IP camera. As it was the cheapest among all others, my expectations regarding security was low. But this camera was still able to surprise me. Maybe I will disclose the camera model used in my hack in this blog later, but first ..
---------------------------------------------
http://jumpespjump.blogspot.co.at/2015/09/how-i-hacked-my-ip-camera-and-fou…
*** 332M Kick Ass pirates get asses kicked by scareware ass-kickers ***
---------------------------------------------
Welcome to internet technical support. Please give us your computer The worlds most popular pirate torrent site KickAss Torrents is serving scareware advertising, helping dodgy call centre operators con users into handing over remote access to their machines.
---------------------------------------------
www.theregister.co.uk/2015/09/28/332m_kick_ass_pirates_get_asses_kicked_by_…
*** HTTP Evasions Explained - Part 3 - Chunked Transfer ***
---------------------------------------------
This is the third article in a series which will explain the evasions done by HTTP Evader. It covers the failure of several firewalls (and some browsers) to support the Transfer-Encoding chunked in the correct way. For example it is possible to bypass ..
---------------------------------------------
http://noxxi.de/research/http-evader-explained-3-chunked.html
*** Mobile Ad Networks as DDoS Vectors: A Case Study ***
---------------------------------------------
CloudFlare servers are constantly being targeted by DDoSes. We see everything from attempted DNS reflection attacks to L7 HTTP floods involving large botnets.
---------------------------------------------
https://blog.cloudflare.com/mobile-ad-networks-as-ddos-vectors/
*** Android-Sicherheit: Fehlende Updates als Achillesferse ***
---------------------------------------------
Hersteller nehmen ihre Verantwortung nicht wahr - Zeit für die Politik zu handeln
---------------------------------------------
http://derstandard.at/2000022489460
*** Microsoft: Weniger als 1 Prozent aller Windows-PCs mit Malware infiziert ***
---------------------------------------------
Dem Leiter von Microsofts Antiviren-Abteilung zufolge finden sich lediglich auf 0,6 Prozent aller vom ihm untersuchten ..
---------------------------------------------
http://heise.de/-2824369
*** Saudi Arabia: They liked Hacking Team so much they tried to buy the company ***
---------------------------------------------
Might be nice to avoid new spy tech export laws The Saudi Arabian government came close to buying a majority stake in Italian surveillance software firm Hacking Team last year.
---------------------------------------------
www.theregister.co.uk/2015/09/28/saudi_arabia_hacking_team/
*** Cybercrime-Bekämpfung: "Kooperation ist der Schlüssel" ***
---------------------------------------------
Interpol-Direktor Noboru Nakatani sprach sich am Montag in Wien für eine bessere Zusammenarbeit zwischen Behörden und Wirtschaft bei der Bekämpfung von Cyberkriminalität aus.
---------------------------------------------
http://futurezone.at/digital-life/cybercrime-bekaempfung-kooperation-ist-de…
*** (Angebliche) Sicherheitslücke: Remote Code Execution durch infizierte Winrar-Archive ***
---------------------------------------------
Selbst entpackende Archive können mit einfachen Mitteln mit Schadcode infiziert werden, der dann auf dem Rechner der Nutzer ausgeführt wird. Die Winrar-Entwickler geben jedoch Entwarnung und kritisieren die Veröffentlichung.
---------------------------------------------
http://www.golem.de/news/angebliche-sicherheitsluecke-remote-code-execution…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 24-09-2015 18:00 − Freitag 25-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Google's Three Tips for Sabotaging the Cybercrime Economy ***
---------------------------------------------
In a broad study, a team of Googlers and academic researchers suggest attacking the cybercrime supply chain.The post Google's Three Tips for Sabotaging the Cybercrime Economy appeared first on WIRED.
---------------------------------------------
http://www.wired.com/2015/09/google-offers-3-lessons-crippling-online-crime…
*** Facebook-Betrüger locken mit Dislike-Button ***
---------------------------------------------
Klicken Sie hier, wenn Sie als Erster den neuen Dislike-Knopf testen wollen: So funktioniert eine neue Betrugsmasche auf Facebook. Auf den Link sollten Sie aber nicht klicken.
---------------------------------------------
http://futurezone.at/digital-life/facebook-betrueger-locken-mit-dislike-but…
*** Multiple XSS vulnerabilities in FortiManager GUI ***
---------------------------------------------
http://www.fortiguard.com/advisory/multiple-xss-vulnerabilities-in-fortiman…
*** Microsoft puts a bullet in blundering D-Links leaked key that made malware VIPs on PCs ***
---------------------------------------------
Private code-signing cert revoked at last Microsoft has finally revoked D-Links leaked code-signing key, which gave malware the red carpet treatment on millions of Windows PCs.
---------------------------------------------
www.theregister.co.uk/2015/09/24/dlink_key_revoked/
*** SSL Malvertising Campaign Targets Top Adult Sites ***
---------------------------------------------
A long running malvertising campaign hits major adult sites with a carefully crafted advert.
---------------------------------------------
https://blog.malwarebytes.org/malvertising-2/2015/09/ssl-malvertising-campa…
*** Cryptowar: Hintertür für verschlüsselte Smartphone-Daten gesucht ***
---------------------------------------------
Experten haben im Auftrag der US-Regierung darüber nachgedacht, wie Behörden Zugang zu verschlüsselten Daten auf Smartphones bekommen können - und vier Optionen entwickelt. Doch alle bringen große technische Probleme mit sich.
---------------------------------------------
http://www.golem.de/news/cryptowar-hintertuer-fuer-verschluesselte-smartpho…
*** Security: Cookies können Sicherheitslücke sein ***
---------------------------------------------
Alle gängigen Browser sind über manipulierte Cookies angreifbar. Angreifer können mit einem Man-in-the-Middle-Angriff vertrauliche Nutzerdaten auslesen.
---------------------------------------------
http://www.golem.de/news/security-cookies-sind-eine-sicherheitsluecke-1509-…
*** Windows 10 IoT: Verschlüsselung für das Internet der Dinge ***
---------------------------------------------
Nutzer von IoT-Core können ihre Daten künftig mit Bitlocker verschlüsseln und Elektromotoren steuern. Ausserdem kann das Betriebssystem jetzt im Paket mit dem Raspberry-Pi 2 bestellt werden.
---------------------------------------------
http://www.golem.de/news/windows-10-iot-verschluesselung-fuer-das-internet-…
*** Aktuelle Masche: Spam über Bande ***
---------------------------------------------
Durch den Missbrauch von Beschwerde-Formularen oder Bug-Tracking-Systemen umgehen Spammer die Spam-Filter - auch die mühsam antrainierten der Anwender.
---------------------------------------------
http://heise.de/-2826159
*** Endress+Hauser Fieldcare/CodeWrights HART Comm DTM XML Injection Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for two vulnerabilities within the Endress+Hauser HART DTM software libraries.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-267-01
*** Belkin vergisst PGP-Schlüssel in Lichtschalter-Firmware ***
---------------------------------------------
Ein Lichtschalter mit Linux-Firmware. Praktisch, dachte sich Linux-Kernelentwickler Matthew Garrett und warf einen Blick auf die Software. Was er fand, überraschte ihn allerdings sehr: Den PGP-Key, mit dem Belkin seine Firmware unterschreibt.
---------------------------------------------
http://heise.de/-2826218
*** l+f: Ormandy auf Killing Spree ***
---------------------------------------------
Nach NOD32 und Kaspersky ist nun Avast an der Reihe.
---------------------------------------------
http://heise.de/-2826654
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 23-09-2015 18:00 − Donnerstag 24-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Cisco IOS and IOS XE Software SSH Version 2 RSA-Based User Authentication Bypass Vulnerability ***
---------------------------------------------
A vulnerability in the SSH version 2 (SSHv2) protocol implementation of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to bypass user authentication.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco AnyConnect Secure Mobility Client for Linux and Mac OS X Privilege Escalation Vulnerability ***
---------------------------------------------
A vulnerability in the code responsible for the self-updating feature of Cisco AnyConnect Secure Mobility Client for Linux and the Cisco AnyConnect Secure Mobility Client for Mac OS X could allow an authenticated, local ..
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41135
*** Bidding for Breaches, Redefining Targeted Attacks ***
---------------------------------------------
A growing community of private and highly-vetted cybercrime forums is redefining the very meaning of "targeted attacks." These bid-and-ask forums match crooks who are looking for access to specific data, resources or systems within major corporations with hired muscle who are up to the task or who already have access to those resources.
---------------------------------------------
http://krebsonsecurity.com/2015/09/bidding-for-breaches-redefining-targeted…
*** Custom Sidebars 2.1.0.1 - XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/8196
*** Multiple vulnerabilities in Kaseya Virtual System Administrator ***
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-450/http://www.zerodayinitiative.com/advisories/ZDI-15-449/http://www.zerodayinitiative.com/advisories/ZDI-15-448/
*** Healthcare Organizations Twice As Likely To Experience Data Theft ***
---------------------------------------------
Bad guys very willing to invest in attacking medical data, but healthcare not very willing to invest in defending it.
---------------------------------------------
http://www.darkreading.com/risk/healthcare-organizations-twice-as-likely-to…
*** Chinese Actors Use '3102' Malware in Attacks on US Government and EU Media ***
---------------------------------------------
On May 6 and May 11, 2015, Unit 42 observed two targeted attacks, the first against the U.S. government and the second on a European media company. Threat actors delivered the same document via ..
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/09/chinese-actors-use-3102-…
*** An Update on Nuclear (Reverse) Engineering ***
---------------------------------------------
Although Angler continues to be the leading exploit kit, Nuclear is a significant threat to web surfers and seems to have been very active lately. ThreatLabZ recently encountered a Nuclear campaign originating from a variety of compromised ..
---------------------------------------------
http://research.zscaler.com/2015/09/an-update-on-nuclear-reverse-engineerin…
*** Quaverse RAT: Remote-Access-as-a-Service ***
---------------------------------------------
Quaverse RAT or QRAT is a fairly new Remote Access Tool (RAT) introduced in May 2015. This RAT is marketed as an undetectable Java RAT. As you might expect from a RAT, the tool is capable of grabbing passwords, ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Quaverse-RAT--Remote-Ac…
*** UltraEdit 22.20 Buffer Overflow ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2015090142
*** Fingerabdrücke von Millionen US-Bediensteten gestohlen ***
---------------------------------------------
Eine China zugeschriebene Hacker-Attacke auf die US-Bundespersonalbehörde OPM war noch schwerer als ohnehin schon gedacht. Demnach verschafften sich die Cyber-Angreifer neben ..
---------------------------------------------
http://derstandard.at/2000022711754
*** Tracking Administrator Sessions in Windows Environments ***
---------------------------------------------
Tracking users with privileged access is a critical task in your security policy (SANS Critical Security Control #12). If the key point is to restrict the number of 'power users' to the lowest, it's not always easy. Most of them ..
---------------------------------------------
https://blog.rootshell.be/2015/09/24/tracking-administrator-sessions-in-win…
*** Exploiting Corporate Printers ***
---------------------------------------------
Printer exploitation and vulnerability in printers are serious problems, similar to those faced with computers and other hard drive devices, since they are connected to the network like other devices. Nowadays, most corporate offices or organizations ..
---------------------------------------------
http://resources.infosecinstitute.com/exploiting-corporate-printers/
*** General HTML5 Security ***
---------------------------------------------
HTML5 is a living standard and new features are being added as we speak. New features will continue to arrive and browsers will keep becoming better and better at supporting them. However, those new features also bring with them new opportunities for ..
---------------------------------------------
http://resources.infosecinstitute.com/general-html5-security/
*** XcodeGhost: Apple veröffentlicht "Top 25" der infizierten Apps ***
---------------------------------------------
Apple hat die 25 populärsten unter den kompromittierten Apps genannt, für manche ist bereits ein Update erhältlich. Die Einschätzungen zur Gesamtzahl der durch XcodeGhost betroffenen iOS-Programme variieren weiterhin deutlich.
---------------------------------------------
http://heise.de/-2824927
*** Kovter malware learns from Poweliks with persistent fileless registry update ***
---------------------------------------------
A variant of the Kovter malware is the first to use Trojan.Poweliks' pioneering tricks by residing only in the registry to evade detection.
---------------------------------------------
http://www.symantec.com/connect/blogs/kovter-malware-learns-poweliks-persis…
*** One Year After Shellshock, Are Your Servers and Devices Safer? ***
---------------------------------------------
Security researchers were the first to respond during the Shellshock attacks of 2014. After news of the fatal flaw in the prevalent Bash (Bourne Again Shell)- found in most versions of the Unix and Linux operating systems as well as in Mac OSX - was released, ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/one-year-after-s…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 22-09-2015 18:00 − Mittwoch 23-09-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Cisco AnyConnect Secure Mobility Client for Windows Privilege Escalation Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41136
*** Bypass Developed for Microsoft Memory Protection, Control Flow Guard ***
---------------------------------------------
A researcher at Bromium is expected at DerbyCon to disclose a memory corruption mitigation bypass of Microsoft Control Flow Guard.
---------------------------------------------
http://threatpost.com/bypass-developed-for-microsoft-memory-protection-cont…
*** Hack Brief: Mobile Manager's Security Hole Would Let Hackers Wipe Phones ***
---------------------------------------------
The vulnerability in the SAP Afaria mobile management system affected all mobile phones used by 6,300 companies.
---------------------------------------------
http://www.wired.com/2015/09/hack-brief-popular-mobile-phone-manager-open-l…
*** Cisco TelePresence Video Communication Server Cross-Site Request Forgery Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41128
*** Making our users unlearn what we taught them, (Wed, Sep 23rd) ***
---------------------------------------------
Remember back in the ancient days, when macro viruses were rampant, and we security geeks instructed our flock of virus scared users to never click on a .DOC attachment in an email, but that a .PDF was perfectly fine? Fast forward a couple ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=20177
*** Hackers upload bot code to Imgur in 8Chan attack ***
---------------------------------------------
A nasty vulnerability in Imgur was used by attackers to hide malicious code in images, commandeer visitors browsers, and hose the 4Chan and 8Chan image ..
---------------------------------------------
www.theregister.co.uk/2015/09/23/imgur_attack/
*** New security features in HPs printers can detect rogue BIOS and firmware modifications ***
---------------------------------------------
HP refers to this capability as "self-healing security," but its actually a set of code integrity checking mechanisms that security researchers have asked embedded ..
---------------------------------------------
http://www.infoworld.com/article/2985389/printers/hp-adds-protection-agains…
*** Kaspersky: Mo Unpackers, Mo Problems. ***
---------------------------------------------
As well as fuzzing, I've been auditing and reviewing the design, resulting in identifying multiple major flaws that Kaspersky are actively working on resolving. These issues affect everything from network intrusion detection, ssl interception ..
---------------------------------------------
http://googleprojectzero.blogspot.de/2015/09/kaspersky-mo-unpackers-mo-prob…
*** PHP Malware Finder ***
---------------------------------------------
PHP-malware-finder does its very best to detect obfuscated/dodgy code as well as files using PHP functions often used in malwares/webshells. ... Detection is performed by crawling the filesystem and testing files against a set of YARA rules. Yes, its that simple!
---------------------------------------------
https://github.com/nbs-system/php-malware-finder
*** .htaccess Tricks in Global.asa Files ***
---------------------------------------------
As you might know a lot of hacks use Apache configuration .htaccess files to override default web site behavior: add conditional redirects, create virtual paths (e.g mod_rewrite), auto-append code to PHP scripts, etc. In the world of IIS/ASP there is also an equivalent - Global.asa ..
---------------------------------------------
https://blog.sucuri.net/2015/09/htaccess-tricks-in-global-asa-files.html
*** XCodeGhost iOS app infection toll rises to FOUR THOUSAND ***
---------------------------------------------
The number of XCodeGhost-infected iOS apps, initially pegged at 39, has exploded to more than 4,000. ... The Register has asked FireEye for the names of some of the prominent affected ..
---------------------------------------------
http://www.theregister.co.uk/2015/09/23/xcodeghost_ios_app_infection_toll_r…
*** iOS 9: Erneut Umgehung der Gerätesperre möglich ***
---------------------------------------------
Neues Betriebssystem, neuer Trick: Erneut wurde ein Lockscreen-Bug entdeckt, mit dem der Zugriff auf Daten von iPhone & Co. auch ohne Eingabe von PIN-Code oder Fingerabdruckfreigabe möglich ist.
---------------------------------------------
http://heise.de/-2824001
*** Security: Lenovo sammelt seit fast einem Jahr Nutzerdaten ***
---------------------------------------------
Ein dritter Fall von fraglichem Umgang mit Nutzerdaten ist bei Lenovo bekanntgeworden. Auf Geräten der Thinkpad-, Thinkcentre- und Thinkstation-Modellreihen kann sich Lenovo-Software befinden, die seit fast einem Jahr das Nutzerverhalten beobachtet.
---------------------------------------------
http://www.golem.de/news/security-lenovo-sammelt-nutzerdaten-seit-fast-eine…
*** Firefox 41 ist da: Mehr Sicherheit und Instant Messaging ***
---------------------------------------------
http://derstandard.at/2000022666280
*** Reflected Cross-Site Scripting (XSS) in iTop ***
---------------------------------------------
High-Tech Bridge Security Research Lab discovered vulnerability in iTop, which can be exploited to perform Cross-Site Scripting (XSS) attacks against web application users. iTop is a critical application, which is used to cover the entire set of ITIL processes. Successful attack on this web ..
---------------------------------------------
https://www.htbridge.com/advisory/HTB23268
*** ENISA Cyber Europe 2014 - After Action Report ***
---------------------------------------------
ENISAs After Action Report of the pan-European cybersecurity exercise Cyber Europe 2014 (CE2014) was approved by the EU Member States and gives a high-level overview of the complex cybersecurity exercise that was carried out in 2014. The full after action report includes an engaging action plan which ENISA and Member States are committed to implement.
---------------------------------------------
https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-coo…
*** Open-Xchange Security Advisory 2015-09-23 ***
---------------------------------------------
Vulnerability Details: Dialogs for printing content were vulnerable to execute injected script code at object properties that get printed. Risk: Malicious script code can be executed within a users context. This can lead to session hijacking ..
---------------------------------------------
http://www.securityfocus.com/archive/1/536523
*** Apple will betroffene Nutzer über XcodeGhost-Apps informieren ***
---------------------------------------------
Der iPhone-Hersteller hat eine 'Top 25'-Liste der infizierten Apps angekündigt und will Angriffen in XcodeGhost-Manier die Grundlage entziehen. Nutzer sollen zudem in Kenntnis gesetzt werden, wenn sie kompromittierte Apps heruntergeladen haben.
---------------------------------------------
http://heise.de/-2824328
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 21-09-2015 18:00 − Dienstag 22-09-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Leaked D-Link security key allows hackers to disguise malware as legit ***
---------------------------------------------
A leak of a major technology companys security key has been discovered, allowing hackers to convince Windows that their malware is legit.
...
While the key expired in early September, that still means that potential cyber-criminals had six months with which to sign their malware with D-Link's leaked key and bypass Microsoft Windows security measures by masquerading as a trusted piece of software.
---------------------------------------------
http://www.scmagazine.com/leaked-d-link-security-key-allows-hackers-to-disg…
*** Apple watchOS2 Includes Host of Code-Execution Patches ***
---------------------------------------------
Apple watchOS2 arrived with a host of security patches, including fixes for more than a dozen code-execution bugs.
---------------------------------------------
http://threatpost.com/apple-watchos2-includes-host-of-code-execution-patche…
*** How Exploit Kit Operators are Misusing Diffie-Hellman Key Exchange ***
---------------------------------------------
Feedback from the Trend Micro Smart Protection Network has allowed us to discover that the notorious Angler and Nuclear exploit kits have included the latest Flash vulnerability (CVE-2015-5560) in their regular update. This means that systems with Adobe Flash Player 18.0.0.209 and earlier are vulnerable; however users running the latest version of Flash (18.0.0.232) are not affected.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/XRj7PRLQnjU/
*** Swiss Advertising network compromised and distributing a Trojan ***
---------------------------------------------
On September 11, 2015, MELANI / GovCERT.ch got informed by security researcher Kafeine about a popular advertising network in Switzerland that obviously got compromised by cybercriminals, leading to an exploit kit called Niteris. ... While investigating the incident, we noticed that the Exploit Kit that was injected into the Ad network was only serving malware when the visitor had a German or French User-Agent (HTTP Header Accept-Language).
---------------------------------------------
http://www.govcert.admin.ch/blog/13/swiss-advertising-network-compromised-a…
*** Xen Security Advisory 142 - libxl fails to honour readonly flag on disks with qemu-xen ***
---------------------------------------------
Callers of libxl can specify that a disk should be read-only to the guest. However, there is no code in libxl to pass this information to qemu-xen (the upstream-based qemu); and indeed there is no way in qemu to make a disk read-only. ... Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images.
---------------------------------------------
http://lists.xenproject.org/archives/html/xen-announce/2015-09/msg00003.html
*** NCSC publishes revised ICT security guidelines for web applications ***
---------------------------------------------
In February 2012 the National Cyber Security Centre (NCSC) published the ICT security guidelines for web applications, a guide to developing, administering and providing web applications and the associated infrastructure more securely. The guidelines are broadly applicable to ICT solutions based on web applications.
---------------------------------------------
https://www.ncsc.nl/english/current-topics/news/ncsc-publishes-revised-ict-…
*** Cisco Spark Mobile Application Man-in-the-Middle Vulnerability ***
---------------------------------------------
A vulnerability in the Cisco Spark mobile application could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against the affected device.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41127
*** HOW TO: Setting up Encrypted Communications Channels in Oracle Database ***
---------------------------------------------
In this article, I will explain how to set up an encrypted communications channel in Oracle Database. This is the third in a series of blog posts Ive published about encryption as it relates to databases.
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/HOW-TO--Setting-up-Encr…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Tivoli Workload Scheduler (CVE-2015-0478 and others) ***
http://www.ibm.com/support/docview.wss?uid=swg21966551
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM Algorithmics One Core, Algo Risk Application, and Counterparty Credit Risk (CVE-2015-2808) ***
http://www.ibm.com/support/docview.wss?uid=swg21965555
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in NTP, Hivex, glibc, libuser, BIND affect IBM SmartCloud Provisioning for IBM Software Virtual Appliance ***
http://www.ibm.com/support/docview.wss?uid=swg21966274
---------------------------------------------
*** IBM Security Bulletin: Cross-Site Scripting vulnerabilities affect IBM Emptoris Strategic Supply Management Platform, Emptoris ***
http://www.ibm.com/support/docview.wss?uid=swg21966754
---------------------------------------------
*** IBM Security Bulletin: OpenSSH vulnerability affects IBM WebSphere Cast Iron ***
http://www.ibm.com/support/docview.wss?uid=swg21967077
---------------------------------------------
*** IBM Security Bulletin: Vulnerability with Diffie-Hellman ciphers may affect IBM Algorithmics One Core, Algo Risk Application, and Counterparty Credit Risk (CVE-2015-4000) ***
http://www.ibm.com/support/docview.wss?uid=swg21965554
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Struts affects SAN Volume Controller and Storwize Family (CVE-2015-1831) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005335
---------------------------------------------
*** Security Bulletin: Venom vulnerability affects IBM Flex System Manager (FSM) (CVE-2015-3456) ***
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098681
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in IBM Java SDK affects IBM SAN Volume Controller and Storwize Family (CVE-2015-0488, CVE-2015-2808, CVE-2015-1916, CVE-2015-0204) ***
http://www.ibm.com/support/docview.wss?uid=ssg1S1005334
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 18-09-2015 18:00 − Montag 21-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** Unconventional Malvertising Attack Uses New Tricks ***
---------------------------------------------
Cyber criminals are creative when using their creative, as seen in this malvertising campaign experimenting with new obfuscation tricks.
---------------------------------------------
https://blog.malwarebytes.org/malvertising-2/2015/09/unconventional-malvert…
*** Cisco Unity Connection Web Interface SQL Injection Vulnerability ***
---------------------------------------------
A vulnerability in the web interface of Cisco Unity Connection (UC) could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41074
*** Cisco ASR 9000 Series Aggregation Services Routers Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the DHCP version 6 (DHCPv6) server implementation of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41101
*** DSA-3361 qemu - security update ***
---------------------------------------------
Several vulnerabilities were discovered in qemu, a fast processoremulator.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3361
*** Insistent router botnet ***
---------------------------------------------
Not so long ago, monitoring attackers in our telnet honeypots helped reveal an interesting botnet composed of ASUS brand home routers. A botnet trying to log into our SSH honeypot running on Turris routers most frequently in the last two weeks is a botnet whose IP addresses, according to Shodan, often have one common characteristic: they respond with cookie AIROS_SESSIONID on port 80. This cookie points at AirOS running on Ubiquiti airRouter.
---------------------------------------------
http://en.blog.nic.cz/2015/09/18/insistent-router-botnet/
*** Harman-Kardon Uconnect Vulnerability ***
---------------------------------------------
This advisory is a follow-up to the ICS-ALERT titled ICS-ALERT-15-203-01 FCA Uconnect Vulnerability that was published July 22, 2015, on the NCCIC/ICS-CERT web site. This advisory provides mitigation details for an unauthorized remote access to Fiat-Chrysler Automobile US (FCA US) LLC Uconnect telematics infotainment system.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-260-01
*** Deutsche Cyber-Sicherheitsorganisation DCSO gegründet ***
---------------------------------------------
Vier deutsche DAX-Konzerne wollen sich in Deutschland um die Cyber-Sicherheit kümmern. Volkswagen, Allianz, BASF und Bayer gründen einen eigenen Sicherheits-Dienstleister.
---------------------------------------------
http://heise.de/-2821882
*** AVG Antivirus Plans to Collect & Sell Your Personal Data to Advertisers ***
---------------------------------------------
We at The Hacker News are big fans of Security Software - The first thing we install while setting our Computers and Devices. Thanks to Free Security Software that protects Internet users without paying for their security. But, Remember: Nothing comes for FREE "Free" is just a relative term, as one of the worlds most popular anti-virus companies is now admitting.
---------------------------------------------
http://thehackernews.com/2015/09/avg-antivirus.html
*** Certificate Transparency: Symantec stellt falsches Google-Zertifikat aus ***
---------------------------------------------
Offenbar zu Testzwecken ist von Symantec unberechtigterweise ein gültiges TLS-Zertifikat für Google.com ausgestellt worden. Entdeckt hat Google das über die Logs des Certificate-Transparency-Systems.
---------------------------------------------
http://www.golem.de/news/certificate-transparency-symantec-stellt-falsches-…
*** Brief survey on methods for attacking Tor hidden service ***
---------------------------------------------
cently, MIT published an article for their recent work of identifying the hidden service of Tor by circuit fingerprinting with website fingerprinting to eventually trace down the hidden service users. This paper has been discussed on reddit and many other forums, and the question that whether Tor can be compromised becomes hot again. Here I want to have a brief overview of recent research on the methods and attempts for attacking Tor hidden services over the past years.
---------------------------------------------
http://translate.wooyun.io/2015/09/19/Brief-survey-on-methods-for-attacking…
*** SYNful Knock ***
---------------------------------------------
Introduction On 15 September 2015, FireEye published information about potentially compromised Cisco routers under the name SYNful Knock. As soon as Shadowserver became aware of these potential compromises, Shadowserver and Cisco worked together and cooperated to scan the internet to detect this affected routers to allow a more accurate notification of the affected end-users.
---------------------------------------------
http://blog.shadowserver.org/2015/09/21/synful-knock/
*** Inside Target Corp., Days After 2013 Breach ***
---------------------------------------------
In December 2013, just days after a data breach exposed 40 million customer debit and credit card accounts, Target Corp. hired security experts at Verizon to probe its networks for weaknesses. The results of that confidential investigation -- until now never publicly revealed -- confirm what pundits have long suspected: Once inside Targets network, there was nothing stop attackers from gaining direct and complete access to every single cash register in every Target store.
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/yLzOrODU9Vc/
*** BitPay Hacked, 5 000 Bitcoins Stolen ***
---------------------------------------------
Bitcoin payments processor BitPay Inc. is the latest victim in a series of massive hacking scandals that have rocked the cryptocurrency community. The Atlanta-based Bitpay was hacked on three separate occasions in December of 2014. More than 5 000 bitcoins were stolen. Subsequent to this, BitPay sent a claim to its insurer Massachusetts Bay Insurance Company, and the latter declined to pay. The matter is now in court.
---------------------------------------------
https://www.cryptocoinsnews.com/bitpay-hacked-5-000-bitcoins-stolen/
*** App Store: Apple bestätigt "XcodeGhost"-Infektionen ***
---------------------------------------------
Der Konzern hat laut eigenen Angaben infizierte Apps aus einem Onlineladen entfernt. Ob es alle sind, weiß niemand.
---------------------------------------------
http://heise.de/-2822207
*** Risiko Firmware ***
---------------------------------------------
Firmware ist nur was für Profis? Von wegen: Heute hängen alltägliche Dinge im Internet und lassen sich darüber fernsteuern. Wenn die Heizungsanlage durchdreht und der DSL-Router für Angreifer offen steht, ist nicht selten veraltete Firmware schuld.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Risiko-Firmware-2822449.html?wt_mc=r…
*** Typo3 über XSS-Lücke verwundbar ***
---------------------------------------------
In Typo3 klafft eine Schwachstelle, über die Angreifer JavaScript in das Content Management System schmuggeln können.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Typo3-ueber-XSS-Luecke-verwundbar-28…
*** Cisco Wireless LAN Controller RADIUS Packet of Disconnect Vulnerability ***
---------------------------------------------
A vulnerability in the RADIUS implementation of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition by disconnecting user sessions.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41102
*** Security Updates Available for Adobe Flash Player (APSB15-23) ***
---------------------------------------------
A security bulletin (APSB15-23) has been published regarding security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1273
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 17-09-2015 18:00 − Freitag 18-09-2015 17:55
Handler: Alexander Riepl
Co-Handler: n/a
*** Important security notice regarding signing key and distribution of Red Hat Ceph Storage on Ubuntu and CentOS ***
---------------------------------------------
Last week, Red Hat investigated an intrusion on the sites of both the Ceph community project (ceph.com) and Inktank (download.inktank.com), which were hosted on a computer system outside of Red Hat infrastructure. download.inktank.com provided ..
---------------------------------------------
https://securityblog.redhat.com/2015/09/17/important-security-notice-regard…
*** Analyzing Proxy Based Spam Networks ***
---------------------------------------------
We are no strangers to Blackhat SEO techniques, we've actually spent a great deal of time working and sharing various bits of information related to Blackhat SEO techniques over the years. What we haven't shared, however, is the idea of Proxy-based Spam Networks (PSN). It's not because it wasn't interesting, it's ..
---------------------------------------------
https://blog.sucuri.net/2015/09/analyzing-proxy-based-spam-networks.html
*** Cisco Prime Network Registrar Privilege Escalation Vulnerability ***
---------------------------------------------
A vulnerability in the default configuration of the Cisco Prime Network Registrar (CPNR) virtual appliance (OVA) which could allow an authenticated, local attacker to gain root privileges.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=41041
*** WordPress Malware - Active VisitorTracker Campaign ***
---------------------------------------------
We are seeing a large number of WordPress sites compromised with the 'visitorTracker_isMob' malware code. This campaign started 15 days ago, but only in the last few days have we started to see it gain traction; really affecting a large number of ..
---------------------------------------------
https://blog.sucuri.net/2015/09/wordpress-malware-active-visitortracker-cam…
*** WP Shop <= 3.4.3.18 - Cross-Site Scripting (XSS) & CSRF ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/8192
*** Researchers seek ransomware samples for their generic solution ***
---------------------------------------------
VB2015 presentation to include demonstration of technique against recent samples.The scary hack thats on the rise is how Wireds Kim Zetter described ransomware in an overview article posted yesterday. Indeed, encrypting your files and demanding a ransom to decrypt them has become a very lucrative cybercriminal ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/09_18.xml
*** Router Security / SYNful Knock ***
---------------------------------------------
Wir bekamen Anfragen zum Thema SYNful Knock. Uns war das keine Warnung wert, daher fasst dieser Blogpost unseren Standpunkt zusammen:Management Summary Der SYNful Knock Angriff ist keine neue Kategorie von Bedrohungen. Es gibt ..
---------------------------------------------
http://www.cert.at/services/blog/20150918112023-1598.html
*** Sicherheitslücke: D-Link vergisst private Code-Signing-Schlüssel im Quellcode ***
---------------------------------------------
Dem Hardwarehersteller D-Link ist ein peinlicher Fehler unterlaufen. Im Quellcode der Firmware für eine Überwachungskamera vergaßen die Entwickler private Code-Signing-Schlüssel. Der Hersteller hat bereits reagiert.
---------------------------------------------
http://www.golem.de/news/peinlich-d-link-vergisst-private-code-signing-schl…
*** Pwnage Per Port - 22/open/tcp//ssh ***
---------------------------------------------
Hello and welcome to the first installment of Pwnage Per Port! Today we will be discussing the oh-so-important SSH service which runs (most commonly) on TCP port 22. Not sure what Pwnage Per Port is? Head on over here for a quick rundown on what you can expect!
---------------------------------------------
http://l.avala.mp/blog/pwnage-per-port-22opentcpssh/
*** Triaging PowerShell Exploitation with Rekall ***
---------------------------------------------
David recently published his article Spotting the Adversary so I figured Id continue the trend and focus on Blue Team tactics in this post.
---------------------------------------------
http://www.redblue.team/2015/09/triaging-powershell-exploitation-with.html
*** Cisco ASA Software Version Information Disclosure Vulnerability ***
---------------------------------------------
A vulnerability in the SSL VPN code of Cisco ASA Software could allow an unauthenticated, remote attacker to obtain information about the Cisco ASA Software version. This information could be used for reconnaissance attacks.
---------------------------------------------
http://tools.cisco.com/security/center/viewAlert.x?alertId=35946
*** Kritische Sicherheitslücke: Bug in Bugzilla ***
---------------------------------------------
Die Bugverwaltung von Firefox gibt schon zum zweiten Mal im September vertrauliche Daten preis - doch diesmal sind auch andere Projekte betroffen. Ein Patch steht bereit.
---------------------------------------------
http://www.golem.de/news/kritische-sicherheitsluecke-bug-in-bugzilla-1509-1…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 16-09-2015 18:00 − Donnerstag 17-09-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** A Brief Introduction to #totalhash ***
---------------------------------------------
#totalhash is Team Cymru's malware analysis database, providing static and dynamic analysis of malware samples free for non-commercial use. Haven't tried #totalhash yet? Here's a brief video with a few highlights on how to upload samples, search our database, and go down the rabbit hole ..
---------------------------------------------
https://blog.team-cymru.org/2015/09/a-brief-introduction-to-totalhash/
*** Bugtraq: [security bulletin] HPSBGN03393 rev.2 - HP Operations Manager i, Remote Code Execution ***
---------------------------------------------
http://www.securityfocus.com/archive/1/536478
*** Stagefrightened? ***
---------------------------------------------
There's been a lot of attention recently around a number of vulnerabilities in Android's libstagefright. There's been a lot of confusion about the remote exploitability of the issues, especially on modern devices. In this blog post we will demonstrate an exploit for one of the libstagefright vulnerabilities ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2015/09/stagefrightened.html
*** ZDI-15-444: Symantec Web Gateway Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-444/
*** ZDI-15-443: Symantec Web Gateway Arbitrary PHP File Upload Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway. Authentication is required to exploit this vulnerability, however it can be bypassed via reflected cross-site scripting.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-443/
*** ZDI-15-445: (0Day) Avira Management Console Update Manager Service HTTP Header Use-After-Free Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Avira Management Console. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-445/
*** CMS Updater - Moderately Critical - Multiple vulnerabilities - SA-CONTRIB-2015-150 ***
---------------------------------------------
The module does not sufficiently protect the settings page allowing any user with the permission "access administration pages" to change settings.
---------------------------------------------
https://www.drupal.org/node/2569599
*** Drupal 7 driver for SQL Server and SQL Azure - Moderately Critical - SQL Injection - SA-CONTRIB-2015-148 ***
---------------------------------------------
Certain characters aren't properly escaped by the Drupal database API. A malicious user may be able to access restricted information by performing a specially-crafted search.
---------------------------------------------
https://www.drupal.org/node/2569577
*** Who's Behind Bluetooth Skimming in Mexico? ***
---------------------------------------------
In the previous two stories, I documented the damage wrought by an organized crime gang in Mexico that has been systematically bribing ATM technicians to install Bluetooth skimming components that allow thieves to steal card and PIN data wirelessly. What follows is a look at a mysterious new ATM company in Mexico that sources say may be tied to the skimming activity.
---------------------------------------------
http://krebsonsecurity.com/2015/09/whos-behind-bluetooth-skimming-in-mexico/
*** iTunes 12.3: Mehr Sicherheit, weniger Fehler und ein grosser Download ***
---------------------------------------------
Zusammen mit iOS 9 hat Apple auch eine neue Version von iTunes freigegeben. Apple beseitigte insbesondere unter Windows Sicherheitslücken, die sogar das Abgreifen von verschlüsselten Zugangsdaten im Netzwerk erlaubten. Zudem erhöht Apple die Sicherheit bei der Verwendung von Apple IDs.
---------------------------------------------
http://www.golem.de/news/itunes-12-3-mehr-sicherheit-weniger-fehler-und-ein…
*** Behind the scenes at BruCON, a European hacker conference ***
---------------------------------------------
Setting up a local conference seems to be a popular way for infosec pros that havent got the time or means to travel to bring the people they want to meet and the knowledge they want to attain ..
---------------------------------------------
http://www.net-security.org/secworld.php?id=18863
*** Seven years of malware linked to Russian state-backed cyber espionage ***
---------------------------------------------
F-Secure report details "The Dukes" malware family and its Russian connections. For the past seven years, a cyber-espionage group operating out of Russia ..
---------------------------------------------
http://arstechnica.com/security/2015/09/seven-years-of-malware-linked-to-ru…
*** Throwback Thursday: Virus Writer and Distributors Attributable Viruses ***
---------------------------------------------
This Throwback Thursday, we turn the clock back to July 1990, when VB looked at virus origins and some of the rare cases of attributable viruses.This week saw the confession of a former teenage virus writer: the author of the Leprosy ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/09_17.xml
*** Studie: In den USA droht ein Wahlmaschinen-Debakel ***
---------------------------------------------
on den 50 US-Staaten werden 43 im kommenden Jahr besonders fehleranfällige Wahlcomputer einsetzen, die mindestens zehn Jahre alt sind, heißt es in einer Analyse der New York University. Dies berge große Risiken.
---------------------------------------------
http://heise.de/-2820268
*** MMD-0042-2015 - Polymorphic in ELF malware: Linux/Xor.DDOS ***
---------------------------------------------
The threat of Linux/XOR.DDoS, a China-made ELF backdoor ddoser malware, its still on going. I received a good question from (I assumed from a victim of infection) asked about why the found malware is not the same as what was firstly executed ELF malware binary. This writing is short and covering ..
---------------------------------------------
http://blog.malwaremustdie.org/2015/09/mmd-0042-2015-polymorphic-in-elf.html
*** HTTP Evasions Explained - Part 2 - Deflate Compression ***
---------------------------------------------
This is the second article in a series which will explain the evasions done by HTTP Evader. It covers the failure of several firewalls to support content some compressions supported by all or most browsers, notable the deflate compression. In short, it is possible to bypass the malware inspection of several firewalls by simply sending a response compressed by deflate:
---------------------------------------------
http://noxxi.de/research/http-evader-explained-2-deflate.html