=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 01-03-2016 18:00 − Mittwoch 02-03-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Threat Actors Behind "Shrouded Crossbow" Create BIFROSE for UNIX ***
---------------------------------------------
We recently came across a variant of the BIFROSE malware that has been rewritten for UNIX and UNIX-like systems. This is the latest tool developed by attackers behind operation Shrouded Crossbow, which have produced other BIFROSE variants such as KIVARS and KIVARS x64. UNIX-based operating systems are widely used in servers, workstations, and even mobile devices. With a lot of highly confidential data found in these servers and devices, a UNIX version of BIFROSE can certainly be classified as a...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/m3eM40z3oI8/
*** Cachebleed-Angriff: CPU-Cache kann private Schlüssel verraten ***
---------------------------------------------
Forschern ist es gelungen, RSA-Verschlüsselungsoperationen von OpenSSL mittels eines Cache-Timing-Angriffs zu belauschen und so den privaten Key zu knacken. Der Cachebleed-Angriff nutzt dabei Zugriffskonflikte auf den Cache-Speicher.
---------------------------------------------
http://www.golem.de/news/cachebleed-angriff-cpu-cache-kann-private-schluess…
*** Let's ride with TeslaCrypt ***
---------------------------------------------
TeslaCrypt is a ransomware spread by e-mails or exploit kits. It encrypts your files and asks you to pay in order to retrieve the decryption key. The current version is 3.0. Many analysis are already available on the Internet. In this article we are focusing on two aspects of TeslaCrypt: - The attack vector - The web callback...
---------------------------------------------
http://thisissecurity.net/2016/03/02/lets-ride-with-teslacrypt/
*** Security: Angebliche Locky-Warnung vom BKA ist ein Trojaner ***
---------------------------------------------
Die Angst vor Locky wird jetzt offenbar von Kriminellen ausgenutzt. In einer angeblich vom Bundeskriminalamt stammenden Mail wird vor dem Kryptotrojaner gewarnt und ein Werkzeug zur Entfernung angeboten - das selbst Malware enthält.
---------------------------------------------
http://www.golem.de/news/security-angebliche-locky-warnung-vom-bka-ist-ein-…
*** $17 smartwatch sends something to random Chinese IP address ***
---------------------------------------------
Samsung Gear 2 also has some problems, researcher says RSA bsides A cheap smart watch often peddled on eBay uses a pairing app for Android or iOS that contains a backdoor that quietly connects to an unknown Chinese IP address.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/03/02/chinese_bac…
*** iPhone-Fingerabdruck lässt sich mit Plastilin austricksen ***
---------------------------------------------
Ein Hersteller von Fingerabdrucksensoren zeigt, wie einfach Apples Touch-ID mit gefälschten Fingerabdrücken zu umgehen ist.
---------------------------------------------
http://futurezone.at/produkte/iphone-fingerabdruck-laesst-sich-mit-plastili…
*** Der DROWN Angriff auf SSL/TLS ***
---------------------------------------------
Es ist wieder soweit: Es gibt einen Presserummel rund um eine neu entdeckte Schwachstelle in SSL/TLS. Es gibt einen Namen (DROWN = Decrypting RSA with Obsolete and Weakened eNcryption) und ein fancy Logo. Nachzulesen ist alles unter: [...] Wir haben uns das angesehen und beschlossen, dazu keine offizielle Warnung zu publizieren. Das Problem ist nicht so dringend und dramatisch, wie manche...
---------------------------------------------
http://www.cert.at/services/blog/20160302151126-1688.html
*** Django Bugs Let Remote Users Conduct Redirect and Cross-Site Scripting Attacks and Determine Valid Usernames ***
---------------------------------------------
http://www.securitytracker.com/id/1035152
*** DFN-CERT-2016-0366: Perl: Mehrere Schwachstellen ermöglichen u.a. die Ausführung beliebigen Programmcodes mit Benutzerrechten ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-0366/
*** Intel Security - Security Bulletin: Protected resource access bypass vulnerability resolved in multiple McAfee endpoint products for Microsoft Windows ***
---------------------------------------------
Multiple McAfee endpoint products include a private mechanism to access settings and files protected by self-protection rules. This mechanism is not sufficiently secure and may be misused to access registry keys and files that should be protected from tampering.
---------------------------------------------
https://kc.mcafee.com/corporate/index?page=content&id=SB10151
*** Schneider Electric Building Operation Application Server Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a vulnerability in servers programmed with Schneider Electric's StruxureWare Building Operation software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-061-01
*** Rockwell Automation Allen-Bradley CompactLogix Reflective Cross-Site Scripiting ***
---------------------------------------------
This advisory is a follow-up to the alert titled ICS-ALERT-15-225-01A Rockwell Automation 1766-L32 Series Vulnerability that was published August 13, 2015, on the NCCIC/ICS-CERT web site. This advisory contains mitigation details for a cross-site scripting vulnerability in Rockwell Automation's CompactLogix application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-061-02
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco NX-OS Software TCP Netstack Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Nexus 3000 Series and 3500 Platform Switches Insecure Default Credentials Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Web Security Appliance HTTPS Packet Processing Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco NX-OS Software SNMP Packet Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco FireSIGHT System Software Convert Timing Channel Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco FireSIGHT System Software Device Management UI Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Privileged Identity Manager Virtual Appliance (CVE-2015-7547) ***
http://www.ibm.com/support/docview.wss?uid=swg21978009
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail affected by glibc, getaddrinfo stack-based buffer overflow (CVE-2015-7547) ***
http://www.ibm.com/support/docview.wss?uid=swg21977368
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in MD5 Signature and Hash Algorithm affects IBM Marketing Platform, IBM Campaign, IBM Predictive Insight, IBM Contact Optimization, IBM Marketing Operations (CVE-2015-7575) ***
http://www.ibm.com/support/docview.wss?uid=swg21976886
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in the GSKit component of IBM Tivoli Storage Manager Fastback for Workstations (CVE-2016-0201) ***
http://www.ibm.com/support/docview.wss?uid=swg21974685
---------------------------------------------
*** Security Bulletin: Vulnerabilities in OpenSSL and MD5 Signature and Hash Algorithm (CVE-2015-7575) affect IBM System Networking RackSwitch products. ***
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5099210
---------------------------------------------
*** Security Bulletin: Multiple vulnerabilities, including MD5 Signature and Hash Algorithm (CVE-2015-7575), affect IBM Flex System Networking Switches ***
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5099200
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in libpng affect IBM Cognos Metrics Manager (CVE-2015-8126, CVE-2015-8472, CVE-2015-8540) ***
http://www.ibm.com/support/docview.wss?uid=swg21976924
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in MD5 Signature and Hash Algorithm affects IBM Client Application Access (CVE-2015-7575) ***
http://www.ibm.com/support/docview.wss?uid=swg21977618
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 29-02-2016 18:00 − Dienstag 01-03-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Bleichenbacher-Angriff: Drown entschlüsselt mit uraltem SSL-Protokoll ***
---------------------------------------------
Kein moderner Browser unterstützt das alte SSL-Protokoll Version 2. Trotzdem kann es zum Sicherheitsrisiko werden, solange Server es aus Kompatibilitätsgründen unterstützen. Es muss nicht einmal derselbe Server sein.
---------------------------------------------
http://www.golem.de/news/bleichenbacher-angriff-drown-entschluesselt-mit-ur…
*** The Definitive Guide on Win32 to NT Path Conversion ***
---------------------------------------------
Posted by James Forshaw, path'ological reverse engineer. How the Win32 APIs process file paths on Windows NT is a tale filled with backwards compatibility hacks, weird behaviour, and beauty. Incorrect handling of Win32 paths can lead to security vulnerabilities. This blog post is to try and give a definitive* guide on the different types of paths supported by the OS. I'm going to try and avoid discussion of quirks in the underlying filesystem implementations (such as NTFS...
---------------------------------------------
http://googleprojectzero.blogspot.com/2016/02/the-definitive-guide-on-win32…
*** De-obfuscating malicious Vbscripts ***
---------------------------------------------
With the returned popularity of visual basic as a first attack vector in mind, we took a look at de-obfuscating a few recent vbs files starting with a very easy one and progressing to a lot more complex script.Categories: Malware AnalysisTags: bankerclickerde-obfuscatedecryptdroppermalwareobfuscationPieter Arntztrojanvbsvbscriptworm(Read more...)
---------------------------------------------
https://blog.malwarebytes.org/intelligence/2016/02/de-obfuscating-malicious…
*** Look Into Locky ***
---------------------------------------------
Some sources say that Locky is the latest ransomware created and released in the wild by Dridex gang. Our studies indicate that it is well prepared, which means that the threat actor/s behind it has invested for it.Categories: Malware AnalysisTags: Lockyransomware(Read more...)
---------------------------------------------
https://blog.malwarebytes.org/intelligence/2016/03/look-into-locky/
*** OpenSSL Security Advisories ***
---------------------------------------------
CVE-2016-0800 (OpenSSL advisory) [High severity]
CVE-2016-0705 (OpenSSL advisory) [Low severity]
CVE-2016-0798 (OpenSSL advisory) [Low severity]
CVE-2016-0797 (OpenSSL advisory) [Low severity]
CVE-2016-0799 (OpenSSL advisory) [Low severity]
CVE-2016-0702 (OpenSSL advisory) [Low severity]
CVE-2016-0703 (OpenSSL advisory) [High severity]
CVE-2016-0704 (OpenSSL advisory) [Moderate severity]
---------------------------------------------
https://openssl.org/news/vulnerabilities.html
*** VU#938151: Forwarding Loop Attacks in Content Delivery Networks may result in denial of service ***
---------------------------------------------
Vulnerability Note VU#938151 Forwarding Loop Attacks in Content Delivery Networks may result in denial of service Original Release date: 29 Feb 2016 | Last revised: 29 Feb 2016 Overview Content Delivery Networks (CDNs) may in some scenarios be manipulated into a forwarding loop, which consumes server resources and causes a denial of service (DoS) on the network. Description CWE-400: Uncontrolled Resource Consumption (Resource Exhaustion)Content Delivery Networks (CDNs) are used to improve...
---------------------------------------------
http://www.kb.cert.org/vuls/id/938151
*** F5 Security Advisory: Multiple NTP vulnerabilities CVE-2015-8139 and CVE-2015-8140 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/00/sol00329831.html?…
*** Bugtraq: [security bulletin] HPSBUX03552 SSRT102983 rev.1 - HP-UX BIND running Named, Remote Denial of Service (DoS) ***
---------------------------------------------
http://www.securityfocus.com/archive/1/537659
*** DFN-CERT-2016-0355: phpMyAdmin: Mehrere Schwachstellen ermöglichen u.a. das Umgehen von Sicherheitsvorkehrungen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-0355/
*** Bugtraq: [SYSS-2016-009] Sophos UTM 525 Web Application Firewall - Cross-Site Scripting in ***
---------------------------------------------
http://www.securityfocus.com/archive/1/537662
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in the GSKit component of Tivoli Network Manager IP Edition (CVE-2016-0201) ***
http://www.ibm.com/support/docview.wss?uid=swg21974785
---------------------------------------------
*** IBM Security Bulletin: Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool ***
http://www.ibm.com/support/docview.wss?uid=swg21976103
---------------------------------------------
*** IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Access Manager for Web (CVE-2015-7547) ***
http://www.ibm.com/support/docview.wss?uid=swg21977374
---------------------------------------------
*** IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Access Manager for Mobile (CVE-2015-7547) ***
http://www.ibm.com/support/docview.wss?uid=swg21977372
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in IBM Java SDK affect IBM Tivoli Access Manager for e-business and IBM Security Access Manager for Web 7.0 software (CVE-2016-0603) ***
http://www.ibm.com/support/docview.wss?uid=swg21978024
---------------------------------------------
*** IBM Security Bulletin: Cross-Site scripting vulnerability in IBM Business Process Manager document list control (CVE-2016-0227) ***
http://www.ibm.com/support/docview.wss?uid=swg21978058
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM OS Images for Red Hat Linux Systems, AIX, and Windows. (CVE-2015-7575) ***
http://www.ibm.com/support/docview.wss?uid=swg21977880
---------------------------------------------
*** IBM Security Bulletin:A vulnerability in IBM Java SDK affects IBM Image Construction and Composition Tool. (CVE-2015-7575) ***
http://www.ibm.com/support/docview.wss?uid=swg21977647
---------------------------------------------
*** IBM Security Bulletin:A vulnerability in IBM Java SDK affects IBM Workload Deployer. (CVE-2015-7575) ***
http://www.ibm.com/support/docview.wss?uid=swg21977646
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM SmartCloud Entry (CVE-2016-0475 CVE-2016-0448 CVE-2015-7575 CVE-2016-0466) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1023408
---------------------------------------------
*** Security Bulletin: Vulnerability in IBM Java SDK affects IBM System Networking Switch Center (CVE-2015-7575) ***
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5099203
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in IBM Java SDK affects IBM PureApplication System. (CVE-2015-7575) ***
http://www.ibm.com/support/docview.wss?uid=swg21978026
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Access Manager for Mobile ***
http://www.ibm.com/support/docview.wss?uid=swg21976765
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Access Manager for Web and IBM Tivoli Access Manager for e-business ***
http://www.ibm.com/support/docview.wss?uid=swg21976678
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects Rational Software Architect, Software Architect for WebSphere Software & Rational Software Architect RealTime ***
http://www.ibm.com/support/docview.wss?uid=swg21976894
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in Apache ActiveMQ affects IBM Tivoli System Automation Application Manager (CVE-2015-5254) ***
http://www.ibm.com/support/docview.wss?uid=swg21977546
---------------------------------------------