=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 28-04-2022 18:00 − Freitag 29-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Ransomware und Wiper: Cyberangriffe auf deutsche Windenergieunternehmen ∗∗∗
---------------------------------------------
Seit Beginn des Ukrainekrieges sind Windkraftanlagen-Hersteller Opfer von Cyberangriffen geworden. Besonders schwer hatten es die Angreifer wohl nicht.
---------------------------------------------
https://www.golem.de/news/ransomware-und-wiper-cyberangriffe-auf-deutsche-w…
∗∗∗ Sicherheitsupdates: Angreifer könnten Firewalls von Cisco neu starten lassen ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für Cisco Firepower Threat Defense und Adaptive Security Appliance.
---------------------------------------------
https://heise.de/-7069408
∗∗∗ Angreifer könnten in Installationsprozess von Sonicwall Global VPN einsteigen ∗∗∗
---------------------------------------------
Sicherheitslücken gefährden Sonicwall Global VPN Client und Sonicos. Sicherheitsupdates stehen zum Download bereit.
---------------------------------------------
https://heise.de/-7069729
∗∗∗ Videokonferenzen: Schwachstellen in Zoom ermöglichen Rechteausweitung und mehr ∗∗∗
---------------------------------------------
Mehrere Schwachstellen in der Zoom-Software könnten Angreifern ermöglichen, ihre Rechte im System auszuweiten oder unbefugt Informationen abzugreifen.
---------------------------------------------
https://heise.de/-7069420
∗∗∗ Studie: Active Directory je nach Branche unterschiedlich angreifbar ∗∗∗
---------------------------------------------
Einer Befragung von IT-Verantwortlichen zufolge spielt bei der Absicherung des Active Directory die Branche eine Rolle. Auch ist die Unternehmensgröße relevant.
---------------------------------------------
https://heise.de/-7069098
∗∗∗ EmoCheck now detects new 64-bit versions of Emotet malware ∗∗∗
---------------------------------------------
The Japan CERT has released a new version of their EmoCheck utility to detect new 64-bit versions of the Emotet malware that began infecting users this month.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emocheck-now-detects-new-64-…
∗∗∗ Colibri Loaders Unique Persistence Technique Using Get-Variable Cmdlet ∗∗∗
---------------------------------------------
Recently there has been a lot of talk on Twitter regarding the Colibri Loader and its persistence mechanism, which somehow uses the Powershell's Get-Variable cmdlet. According to MSDN, Get-Variable is a Powershell cmdlet that gets the PowerShell variables in the current console.
In short, on Windows 10 or later systems, Colibri Loader drops its copy in %APPDATA%\Local\Microsoft\WindowsApps directory with the name Get-Variable.exe. It then creates a scheduled task to run Powershell in a hidden manner using powershell.exe -windowstyle hidden
To the naked eye, it looks that only Powershell is running, but this scheduled task somehow triggers Colibri Loader to run.
---------------------------------------------
https://fourcore.io/blogs/colibri-loader-powershell-get-variable-persistence
∗∗∗ Using Passive DNS sources for Reconnaissance and Enumeration, (Fri, Apr 29th) ∗∗∗
---------------------------------------------
In so many penetration tests or assessments, the client gives you a set of subnets and says "go for it". This all seems reasonable, until you realize that if you have a website, there might be dozens or hundreds of websites hosted there, each only accessible by their DNS name.
---------------------------------------------
https://isc.sans.edu/diary/rss/28596
∗∗∗ Don’t expect to get your data back from the Onyx ransomware group ∗∗∗
---------------------------------------------
Ransomware groups in recent years have ramped up the threats against victims to incentivize them to pay the ransom in return for their stolen and encrypted data. But a new crew is essentially destroying files larger than 2MB, so data in those files is lost even if the ransom is paid.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2022/04/29/onyx-ransomw…
∗∗∗ Bypassing LDAP Channel Binding with StartTLS ∗∗∗
---------------------------------------------
Active Directory LDAP implements StartTLS and it can be used to bypass the Channel Binding requirement of LDAPS for some relay attacks such as the creation of a machine account if LDAP signing is not required by the domain controller.
---------------------------------------------
https://offsec.almond.consulting/bypassing-ldap-channel-binding-with-startt…
∗∗∗ New APT Group Earth Berberoka Targets Gambling Websites With Old and New Malware ∗∗∗
---------------------------------------------
We recently discovered a new advanced persistent threat (APT) group that we have dubbed Earth Berberoka (aka GamblingPuppet).
---------------------------------------------
https://www.trendmicro.com/en_us/research/22/d/new-apt-group-earth-berberok…
∗∗∗ The Package Analysis Project: Scalable detection of malicious open source packages ∗∗∗
---------------------------------------------
Despite open source software’s essential role in all software built today, it’s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software. Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute.
---------------------------------------------
http://security.googleblog.com/2022/04/the-package-analysis-project-scalabl…
∗∗∗ Analyzing VSTO Office Files ∗∗∗
---------------------------------------------
VSTO Office files are Office document files linked to a Visual Studio Office File application. When opened, they launch a custom .NET application. There are various ways to achieve this, including methods to serve the VSTO files via an external web server. An article was recently published on the creation of these document files for [...]
---------------------------------------------
https://blog.nviso.eu/2022/04/29/analyzing-vsto-office-files/
∗∗∗ Trello From the Other Side: Tracking APT29 Phishing Campaigns ∗∗∗
---------------------------------------------
Since early 2021, Mandiant has been tracking extensive APT29 phishing campaigns targeting diplomatic organizations in Europe, the Americas, and Asia. This blog post discusses our recent observations related to the identification of two new malware families in 2022, BEATDROP and BOOMMIC, as well as APT29’s efforts to evade detection through retooling and abuse of Atlassian's Trello service.
---------------------------------------------
https://www.mandiant.com/resources/tracking-apt29-phishing-campaigns
=====================
= Vulnerabilities =
=====================
∗∗∗ SonicWall Global VPN Client DLL Search Order Hijacking via Application Installer ∗∗∗
---------------------------------------------
SonicWall Global VPN Client 4.10.7 installer (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability in one of the installer components. Successful exploitation via a local attacker could result in command execution in the target system.
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0036
∗∗∗ AC500 V3 CODESYS VULNERABILITIES ∗∗∗
---------------------------------------------
All AC500 V3 products with firmware version smaller than 3.6.0 are affected by these vulnerabilities: CVE-2022-22513, CVE-2022-22514, CVE-2022-22515, CVE-2022-22517, CVE-2022-22518 and CVE-2022-22519.
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=3ADR010997&Language…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (dhcp, gzip, podman, rsync, and usd), Mageia (firefox/nss/rootcerts, kernel, kernel-linus, and thunderbird), Oracle (container-tools:2.0, container-tools:3.0, mariadb:10.3, and zlib), Red Hat (Red Hat OpenStack Platform 16.2 (python-twisted), xmlrpc-c, and zlib), SUSE (glib2, nodejs12, nodejs14, python-paramiko, python-pip, and python-requests), and Ubuntu (curl, ghostscript, libsdl1.2, libsdl2, mutt, networkd-dispatcher, and webkit2gtk).
---------------------------------------------
https://lwn.net/Articles/893102/
∗∗∗ Endress+Hauser: FieldPort SFP50 Memory Corruption in Bluetooth Controller Firmware ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2022-006/
∗∗∗ Microsoft Edge: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0521
∗∗∗ Mattermost security updates 6.6.1, 6.5.1, 6.4.3, 6.3.8 (ESR) released ∗∗∗
---------------------------------------------
https://mattermost.com/blog/mattermost-security-update-6-6-1-released/
∗∗∗ Security Bulletin: IBM App Connect Enterprise Certified Container operands may be vulnerable to directory traversal due to CVE-2022-24785 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: Information disclosure vulnerability affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) – CVE-2022-0155, CVE-2022-0536, CVE-2021-3749 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-vu…
∗∗∗ Security Bulletin: IBM App Connect Enterprise Certified Container IntegrationServer components that use Designer flows may be vulnerable to CVE-2022-1233 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: IBM App Connect Enterprise Certified Container IntegrationServer components that use Designer flows may be vulnerable to CVE-2022-1243 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: Multiple vulnerabilities in Linux Kernel affect IBM QRadar SIEM (CVE-2021-22543, CVE-2021-3653, CVE-2021-3656, CVE-2021-37576) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM App Connect Enterprise Certified Container DesignerAuthoring operands may be vulnerable to arbitrary code execution due to CVE-2022-25645 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: IBM App Connect Enterprise Certified Container operands may be vulnerable to denial of service due to CVE-2022-0778 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: Denial of Service Vulnerability in Golang Go affects IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift (CVE-2022-24921) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-denial-of-service-vulnera…
∗∗∗ Security Bulletin: UC Deploy Container images may contain non-unique https certificates and database encryption key. (CVE-2021-39082 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-uc-deploy-container-image…
∗∗∗ Security Bulletin: Content Collector for Email is affected by a embedded WebSphere Application Server Admin Console ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-content-collector-for-ema…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 27-04-2022 18:00 − Donnerstag 28-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ security.txt: Kontaktinfos für IT-Sicherheitsmeldungen standardisiert ∗∗∗
---------------------------------------------
Ein RFC beschreibt, wie Webseiten über die Datei security.txt Kontaktinformationen für Sicherheitsforscher bereitstellen können.
---------------------------------------------
https://www.golem.de/news/security-txt-kontaktinfos-fuer-it-sicherheitsmeld…
∗∗∗ Azure Database for PostgreSQL Flexible Server Privilege Escalation and Remote Code Execution ∗∗∗
---------------------------------------------
MSRC was informed by Wiz, a cloud security vendor, under Coordinated Vulnerability Disclosure (CVD) of an issue with the Azure Database for PostgreSQL Flexible Server that could result in unauthorized cross-account database access in a region. [...] This was mitigated within 48 hours (on January 13, 2022).
---------------------------------------------
https://msrc-blog.microsoft.com/2022/04/28/azure-database-for-postgresql-fl…
∗∗∗ A Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809, (Thu, Apr 28th) ∗∗∗
---------------------------------------------
After Microsoft patched and went public with CVE-2022-26809, the recent RPC vulnerability, we set up a complete Windows 10 system exposing port 445/TCP "to the world." The system is not patched for the RPC vulnerability. And to keep things more interesting, we are forwarding traffic from a subset of our honeypots to the system. This gives us a pretty nice cross-section and keeps the system pretty busy. Other than not applying the April patches, the system isn't particularly vulnerable and is left in the default configuration (firewall disabled, of course).
So what did we get?
---------------------------------------------
https://isc.sans.edu/diary/rss/28594
∗∗∗ This isnt Optimus Primes Bumblebee but its Still Transforming ∗∗∗
---------------------------------------------
Proofpoint has tracked a new malware loader called Bumblebee used by multiple crimeware threat actors previously observed delivering BazaLoader and IcedID.
---------------------------------------------
https://www.proofpoint.com/us/blog/threat-insight/bumblebee-is-still-transf…
∗∗∗ Nimbuspwn detector ∗∗∗
---------------------------------------------
This tool performs several tests to determine whether the system is possibly vulnerable to Nimbuspwn (CVE-2022-29799 & CVE-2022-29800), a vulnerability in the networkd-dispatcher daemon discovered by the Microsoft 365 Defender Research Team.
---------------------------------------------
https://github.com/jfrog/nimbuspwn-tools
∗∗∗ QNAP customers urged to disable AFP to protect against severe vulnerabilities ∗∗∗
---------------------------------------------
MacOS users that have a network-attached storage (NAS) device made by QNAP are being advised to disable the Apple Filing Protocol (AFP) on their devices until some severe vulnerabilities have been fixed.
---------------------------------------------
https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/04/qnap-cus…
∗∗∗ LAPSUS$: Recent techniques, tactics and procedures ∗∗∗
---------------------------------------------
This post describes the techniques, tactics and procedures we observed during recent LAPSUS$ incidents.
---------------------------------------------
https://research.nccgroup.com/2022/04/28/lapsus-recent-techniques-tactics-a…
∗∗∗ Neue Cyberspionage‑Kampagnen der TA410 Gruppe ∗∗∗
---------------------------------------------
ESET-Forscher enthüllen ein detailliertes Profil der APT-Gruppe TA410: Wir glauben, dass diese Cyberspionage-Dachgruppe aus drei verschiedenen Teams besteht, die unterschiedliche Tools verwenden, darunter eine neue Version der von ESET entdeckten FlowCloud-Spionage-Backdoor.
---------------------------------------------
https://www.welivesecurity.com/deutsch/2022/04/27/cyberspionage-unter-dem-t…
∗∗∗ CISA and FBI Update Advisory on Destructive Malware Targeting Organizations in Ukraine ∗∗∗
---------------------------------------------
CISA and the Federal Bureau of Investigation (FBI) have updated joint Cybersecurity Advisory AA22-057A: Destructive Malware Targeting Organizations in Ukraine, originally released February 26, 2022. The advisory has been updated to include additional indicators of compromise for WhisperGate and technical details for HermeticWiper, IsaacWiper, HermeticWizard, and CaddyWiper destructive malware.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/28/cisa-and-fbi-upda…
=====================
= Vulnerabilities =
=====================
∗∗∗ VU#730007: Tychon is vulnerable to privilege escalation due to OPENSSLDIR location ∗∗∗
---------------------------------------------
Tychon includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory that my be controllable by an unprivileged user on Windows. Tychon contains a privileged service that uses this OpenSSL component. A user who can place a specially-crafted openssl.cnf file at an appropriate path may be able to achieve arbitrary code execution with SYSTEM privileges.
---------------------------------------------
https://kb.cert.org/vuls/id/730007
∗∗∗ VU#411271: Qt allows for privilege escalation due to hard-coding of qt_prfxpath value ∗∗∗
---------------------------------------------
Prior to version 5.14, Qt hard-codes the qt_prfxpath value to a fixed value, which may lead to privilege escalation vulnerabilities in Windows software that uses Qt.
---------------------------------------------
https://kb.cert.org/vuls/id/411271
∗∗∗ IBM Security Bulletins 2022-04-27 ∗∗∗
---------------------------------------------
IBM InfoSphere Information Server, IBM Watson for IBM Cloud Pak, Liberty for Java for IBM Cloud, IBM Cloud Transformation Advisor, WebSphere Application Server, IBM Spectrum Discover, IBM Integration Bus, IBM App Connect Enterprise, IBM Netezza Platform Server, IBM PowerVM Novalink, IBM Spectrum Scale SMB protocol
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Cisco Security Advisories 2022-04-27 ∗∗∗
---------------------------------------------
Cisco released 17 Security Advisories (11 High, 6 Medium Severity)
---------------------------------------------
https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&secur…
∗∗∗ PHP Object Injection Vulnerability in Booking Calendar Plugin ∗∗∗
---------------------------------------------
On April 18, 2022, the Wordfence Threat Intelligence team initiated the responsible disclosure process for an Object Injection vulnerability in the Booking Calendar plugin for WordPress, which has over 60,000 installations. We received a response the same day and sent over our full disclosure early the next day, on April 19, 2022. A patched version of the plugin, 9.1.1, was released on April 21, 2022.
---------------------------------------------
https://www.wordfence.com/blog/2022/04/php-object-injection-in-booking-cale…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium, golang-1.7, and golang-1.8), Fedora (bettercap, chisel, containerd, doctl, gobuster, golang-contrib-opencensus-resource, golang-github-appc-docker2aci, golang-github-appc-spec, golang-github-containerd-continuity, golang-github-containerd-stargz-snapshotter, golang-github-coredns-corefile-migration, golang-github-envoyproxy-protoc-gen-validate, golang-github-francoispqt-gojay, golang-github-gogo-googleapis, golang-github-gohugoio-testmodbuilder, golang-github-google-containerregistry, golang-github-google-slothfs, golang-github-googleapis-gnostic, golang-github-googlecloudplatform-cloudsql-proxy, golang-github-grpc-ecosystem-gateway-2, golang-github-haproxytech-client-native, golang-github-haproxytech-dataplaneapi, golang-github-instrumenta-kubeval, golang-github-intel-goresctrl, golang-github-oklog, golang-github-pact-foundation, golang-github-prometheus, golang-github-prometheus-alertmanager, golang-github-prometheus-node-exporter, golang-github-prometheus-tsdb, golang-github-redteampentesting-monsoon, golang-github-spf13-cobra, golang-github-xordataexchange-crypt, golang-gopkg-src-d-git-4, golang-k8s-apiextensions-apiserver, golang-k8s-code-generator, golang-k8s-kube-aggregator, golang-k8s-sample-apiserver, golang-k8s-sample-controller, golang-mongodb-mongo-driver, golang-storj-drpc, golang-x-perf, gopass, grpcurl, onionscan, shellz, shhgit, snowcrash, stb, thunderbird, and xq), Oracle (gzip, kernel, and polkit), Slackware (curl), SUSE (buildah, cifs-utils, firewalld, golang-github-prometheus-prometheus, libaom, and webkit2gtk3), and Ubuntu (nginx and thunderbird).
---------------------------------------------
https://lwn.net/Articles/893001/
∗∗∗ Synology-SA-22:06 Netatalk ∗∗∗
---------------------------------------------
Multiple vulnerabilities allow remote attackers to obtain sensitive information and possibly execute arbitrary code via a susceptible version of Synology DiskStation Manager (DSM) and Synology Router Manager (SRM).
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_22_06
∗∗∗ CVE-2022-23812: NPM Package node-ipc With Malicious Code Found in Russia and Belarus ∗∗∗
---------------------------------------------
Malicious code, also known as protestware, within certain versions of the package was causing chaos among Russia and Belarus based developers—overwriting their entire file system with a heart emoji. These versions (10.1.0 and 10.1.2) are now tracked under CVE-2022-23812.
---------------------------------------------
https://orca.security/resources/blog/cve-2022-23812-protestware-malicious-c…
∗∗∗ ZDI-22-622: Sante DICOM Viewer Pro J2K File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-22-622/
∗∗∗ Johnson Controls Metasys ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-118-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 26-04-2022 18:00 − Mittwoch 27-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Emotet malware now installs via PowerShell in Windows shortcut files ∗∗∗
---------------------------------------------
The Emotet botnet is now using Windows shortcut files (.LNK) containing PowerShell commands to infect victims computers, moving away from Microsoft Office macros that are now disabled by default.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emotet-malware-now-installs-…
∗∗∗ RIG Exploit Kit drops RedLine malware via Internet Explorer bug ∗∗∗
---------------------------------------------
Threat analysts have uncovered yet another large-scale campaign delivering the RedLine stealer malware onto worldwide targets.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/rig-exploit-kit-drops-redlin…
∗∗∗ MITRE ATT&CK v11 - a small update that can help (not just) with detection engineering, (Wed, Apr 27th) ∗∗∗
---------------------------------------------
On Monday, a new version of the framework was released, which (among other changes) extends its content a little in order to make its use more straightforward when it comes to mapping of existing detections and for implementation of new ones.
---------------------------------------------
https://isc.sans.edu/diary/rss/28590
∗∗∗ Encrypting our way to SSRF in VMWare Workspace One UEM (CVE-2021-22054) ∗∗∗
---------------------------------------------
We discovered a pre-authentication vulnerability that allowed us to make arbitrary HTTP requests, including requests with any HTTP method and request body.
---------------------------------------------
https://blog.assetnote.io/2022/04/27/vmware-workspace-one-uem-ssrf/
∗∗∗ Npm-Schwachstelle "Package Planting": Vertrauen ist gut, Kontrolle ist besser ∗∗∗
---------------------------------------------
Eine als Package Planting bezeichnete Sicherheitslücke im Paketmanager npm erlaubte laut Aquasec, die Vertrauenswürdigkeit bekannter Maintainer zu missbrauchen.
---------------------------------------------
https://heise.de/-7066873
∗∗∗ Knapp die Hälfte der Ransomware-Opfer zahlt Lösegeld ∗∗∗
---------------------------------------------
Die Zahl der von Erpressungstrojanern angegriffenen Mittelständler weltweit steigt. Und viele von ihnen zahlen Lösegeld - oft in siebenstelliger Höhe.
---------------------------------------------
https://heise.de/-7067219
∗∗∗ Webinar: Sicher bezahlen im Internet ∗∗∗
---------------------------------------------
Am Dienstag, den 3. Mai 2022 von 18:30 – 20:00 Uhr findet das kostenlose Webinar zum Thema „Sicher bezahlen im Internet" statt.
---------------------------------------------
https://www.watchlist-internet.at/news/webinar-sicher-bezahlen-im-internet/
∗∗∗ Betrügerische Anrufe zu Investitionsmöglichkeiten und Bitcoin ∗∗∗
---------------------------------------------
Vermehrt werden der Watchlist Internet aktuell betrügerische Anrufe gemeldet. Kriminelle versuchen durch diese Anrufe Opfer für Investment-Betrugsmaschen zu gewinnen.
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-anrufe-zu-investition…
∗∗∗ AA22-117A: 2021 Top Routinely Exploited Vulnerabilities ∗∗∗
---------------------------------------------
This advisory provides details on the top 15 Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.
---------------------------------------------
https://us-cert.cisa.gov/ncas/alerts/aa22-117a
=====================
= Vulnerabilities =
=====================
∗∗∗ New Nimbuspwn Linux vulnerability gives hackers root privileges ∗∗∗
---------------------------------------------
A new set of vulnerabilities collectively tracked as Nimbuspwn could let local attackers escalate privileges on Linux systems to deploy malware ranging from backdoors to ransomware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-nimbuspwn-linux-vulnerab…
∗∗∗ CVE-2022-26148 Grafana Vulnerability in NetApp Products ∗∗∗
---------------------------------------------
Multiple NetApp products incorporate Grafana. Grafana versions through 7.3.4 are susceptible to a vulnerability which when successfully exploited could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS).
---------------------------------------------
https://security.netapp.com/advisory/ntap-20220425-0005/
∗∗∗ Schadcode könnte Nvidias Embedded-System Jetson gefährlich werden ∗∗∗
---------------------------------------------
Sicherheitsupdates schließen Lücken in verschiedenen Jetson-Systemen von Nvidia.
---------------------------------------------
https://heise.de/-7067304
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Mageia (virtualbox), Red Hat (container-tools:2.0, container-tools:3.0, gzip, kernel, kernel-rt, kpatch-patch, mariadb:10.3, mariadb:10.5, maven-shared-utils, polkit, vim, xmlrpc-c, and zlib), Scientific Linux (maven-shared-utils), SUSE (ant, go1.17, go1.18, kernel, and xen), and Ubuntu (fribidi, git, libcroco, libsepol, linux, linux-gcp, linux-ibm, linux-lowlatency, openjdk-17, and openjdk-lts).
---------------------------------------------
https://lwn.net/Articles/892802/
∗∗∗ Chrome 101.0.4951.41 fixt 30 Schwachstellen ∗∗∗
---------------------------------------------
Google hat zum 26. April 2022 Updates des Google Chrome 101.0.4951.41 für Windows und Mac auf dem Desktop im Stable Channel freigegeben. Das ist der neue 101-Entwicklungszweig, wobei das Update 30, zum Teil als Hoch eingestufte Schwachstellen schließt.
---------------------------------------------
https://www.borncity.com/blog/2022/04/27/chrome-101-0-4951-41-fixt-30-schwa…
∗∗∗ Security Advisory - Buffer Overflow Vulnerabilities In Huawei Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2022/huawei-sa-20220427-…
∗∗∗ Security Bulletin: UrbanCode Deploy users with create-resource permission for the standard resource type may create child resources inheriting custom types (CVE-2022-22315). ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-urbancode-deploy-users-wi…
∗∗∗ Security Bulletin: Dojo vulnerability in WebSphere Liberty affects SPSS Collaboration and Deployment Services (CVE-2021-23450) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-dojo-vulnerability-in-web…
∗∗∗ K51975973: Eclipse Jetty vulnerability CVE-2021-34428 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K51975973
∗∗∗ PILZ: PMC programming tool 2.x.x affected by multiple vulnerabilities ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-055/
∗∗∗ PILZ: PMC programming tool 3.x.x affected by multiple vulnerabilities ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-061/
∗∗∗ PILZ: Multiple vulnerabilities in CODESYS V2 and V3 runtime system ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-054/
∗∗∗ BENDER/EBEE: Multiple Charge Controller Vulnerabilities ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2021-047/
∗∗∗ Miele: Security vulnerability in Benchmark Programming Tool ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2022-015/
∗∗∗ Improper Control of Generation of Code in Bosch MATRIX ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-309239-bt.html
∗∗∗ Vulnerability in routers FL MGUARD and TC MGUARD ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-982696.html
∗∗∗ SonicOS Content Filtering Service and SNMP feature affected by multiple vulnerabilities ∗∗∗
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 25-04-2022 18:00 − Dienstag 26-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Emotet war kaputt, infiziert jetzt aber wieder vermehrt Windows-Computer ∗∗∗
---------------------------------------------
Die hoch entwickelte Schadsoftware Emotet baut nach einem Fehler seine Attacken weltweit weiter aus.
---------------------------------------------
https://heise.de/-7064903
∗∗∗ Virustotal: Einbrecher führen eigenen Code auf Googles Servern aus ∗∗∗
---------------------------------------------
Update 26.04.2022 16:00 Uhr: Der Virustotal-Gründer Bernardo Quintero twitterte, dass keine VT-Maschinen direkt betroffen waren. Es handelte sich um Dritthersteller-und Partner-Maschinen etwa bei Antivirus-Herstellern, die die Daten von Virustotal für ihre Zwecke analysieren, erläutert Quintero dort.
---------------------------------------------
https://heise.de/-7065048
∗∗∗ Welpen kaufen im Internet: bulldogge-franzosische-welpen.com ist Betrug ∗∗∗
---------------------------------------------
Wer im Internet nach Welpen sucht, stößt höchstwahrscheinlich auf betrügerische Online-Shops für Welpen. „bulldogge-franzosische-welpen.com“ ist ein solcher Shop. Dort werden bezaubernde Welpen geboten, sogar mit Papieren. 900 Euro kostet eine französische Bulldogge. Doch Vorsicht: Sie erhalten trotz Bezahlung keinen Welpen.
---------------------------------------------
https://www.watchlist-internet.at/news/welpen-kaufen-im-internet-bulldogge-…
∗∗∗ Hackers exploit critical VMware RCE flaw to install backdoors ∗∗∗
---------------------------------------------
Advanced hackers are actively exploiting a critical remote code execution (RCE) vulnerability, CVE-2022-22954, that affects in VMware Workspace ONE Access (formerly called VMware Identity Manager).
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-vmw…
∗∗∗ Phishing goes KISS: Don’t let plain and simple messages catch you out! ∗∗∗
---------------------------------------------
Sometimes we receive phishing tricks that we grudgingly have to admit are better than average, just because theyre uncomplicated.
---------------------------------------------
https://nakedsecurity.sophos.com/2022/04/25/phishing-goes-kiss-dont-let-pla…
∗∗∗ WSO2 RCE exploited in the wild, (Tue, Apr 26th) ∗∗∗
---------------------------------------------
While investigating a malicious crypto-mining case, I discovered that attackers implanted the payload exploiting a recently patched RCE vulnerability (CVE-2022-29464) affecting multiple WSO2 products, including API Manager. The vulnerability was discovered by Orange Tsai and responsibly disclosed to WSO2.
---------------------------------------------
https://isc.sans.edu/diary/rss/28586
∗∗∗ Over 18.8 million IPs vulnerable to Middlebox TCP reflection DDoS attacks ∗∗∗
---------------------------------------------
We recently began scanning for middlebox devices that are vulnerable to Middlebox TCP reflection, which can be abused for DDoS amplification attacks. Our results are now shared daily, filtered for your network or constituency in the new Vulnerable DDoS Middlebox. We uncover over 18,800,000 IPv4 addresses responding to our Middlebox probes. In some cases the amplification rates can exceed 10,000!
---------------------------------------------
https://www.shadowserver.org/news/over-18-8-million-ips-vulnerable-to-middl…
∗∗∗ Conti Ransomware Activity Surges Despite Exposure of Groups Operations ∗∗∗
---------------------------------------------
Conti ransomware activity has surged in the past weeks despite the recent exposure of the group’s operations by a pro-Ukraine hacktivist.
---------------------------------------------
https://www.securityweek.com/conti-ransomware-activity-surges-despite-expos…
∗∗∗ Lapsus$: The script kiddies are alright ∗∗∗
---------------------------------------------
One afternoon last month, the regional head of security for the identity management platform Okta, an Australian named Brett Winterford, was in the middle of a client meeting when his phone sprang to life. “The first message said, ‘It looks like you’re going to have a bad day,’” he recently recalled. “And the second message [...]
---------------------------------------------
https://therecord.media/lapsus-the-script-kiddies-are-alright/
∗∗∗ New Malware of Lazarus Threat Actor Group Exploiting INITECH Process ∗∗∗
---------------------------------------------
The AhnLab ASEC analysis team has discovered that there are 47 companies and institutions—including defense companies—infected with the malware distributed by the Lazarus group in the first quarter of 2022. Considering the severity of the situation, the team has been monitoring the infection cases. In systems of the organizations infected with the malware, it was found that malicious behaviors stemmed from the process of INITECH (inisafecrosswebexsvc.exe), [...]
---------------------------------------------
https://asec.ahnlab.com/en/33801/
∗∗∗ Evasive Phishing Techniques Threat Actors Use to Circumvent Defense Mechanisms ∗∗∗
---------------------------------------------
Phishing continues to be the number one threat faced by companies of all sizes, and one of the main entry points threat actors use to infiltrate networks. As defenses continue to evolve, so do the tactics threat actors use to circumvent those defenses. In this article, the GoSecure Titan® Inbox Detection & Response (IDR) team shares examples of tactics threat actors have used to bypass anti-phishing defenses.
---------------------------------------------
https://www.gosecure.net/blog/2022/04/26/evasive-phishing-techniques-threat…
∗∗∗ Attacker Adds Evasive Technique to Their Ongoing Attacks on NPM ∗∗∗
---------------------------------------------
A few weeks ago, we wrote about a new threat actor we called RED-LILI and described their capabilities, including an in-depth walkthrough of the automated system for publishing malicious NPM packages from automatically created user accounts. After our publication, we [...]
---------------------------------------------
https://checkmarx.com/blog/attacker-adds-evasive-technique-to-their-ongoing…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ffmpeg), Fedora (htmldoc, moby-engine, plantuml, and zchunk), Oracle (java-1.8.0-openjdk, java-17-openjdk, and kernel), Red Hat (java-1.8.0-openjdk), Scientific Linux (java-1.8.0-openjdk), Slackware (freerdp), SUSE (kernel, mutt, SUSE Manager Client Tools, and xen), and Ubuntu (barbican and git).
---------------------------------------------
https://lwn.net/Articles/892674/
∗∗∗ Hitachi Energy System Data Manager ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Integer Overflow or Wraparound, Reachable Assertion, Type Confusion, Uncontrolled Recursion, and Observable Discrepancy vulnerabilities in Hitachi Energy System Data Manager products.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-116-01
∗∗∗ Mitsubishi Electric MELSEC and MELIPC Series (Update B) ∗∗∗
---------------------------------------------
This updated advisory is a follow up to the advisory update titled ICSA-21-334-02 Mitsubishi Electric MELSEC and MELIPC Series (Update A) that was published January 27, 2022, to the ICS webpage on www.cisa.gov/uscert. This advisory contains mitigations for Uncontrolled Resource Consumption, Improper Handling of Length Parameter Inconsistency, and Improper Input Validation vulnerabilities in Mitsubishi Electric MELSEC and MELIPC Series software management platforms.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02
∗∗∗ CISA Adds Seven Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/25/cisa-adds-seven-k…
∗∗∗ K53648360: Linux kernel vulnerability CVE-2022-27666 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K53648360
∗∗∗ Pepperl+Fuchs: Vulnerability in multiple VisuNet devices ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2022-012/
∗∗∗ TYPO3 Extensions: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0499
∗∗∗ Security Bulletin: IBM Security Verify Password Synchronization Plug-in for Windows AD is vulnerable to a denial of service vulnerability (CVE-2022-22323, CVE-2022-22312) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-verify-passw…
∗∗∗ Security Bulletin: Crypto Hardware Initialization and Maintenance is vulnerable to arbitrary code execution due to Apache Log4j (CVE-2021-44832) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-crypto-hardware-initializ…
∗∗∗ Security Bulletin: IBM Robotic Process Automation may be vulnerable to an exposure of sensitive information by an aunauthorized actor through follow-redirects (CVE-2022-0536) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-robotic-process-autom…
∗∗∗ Security Bulletin: IBM Cognos Analytics has addressed multiple vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cognos-analytics-has-…
∗∗∗ Security Bulletin: Due to use of IBM SDK, Java Technology Edition, IBM Tivoli Application Dependency Discovery Manager (TADDM) is vulnerable to denial of service ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-due-to-use-of-ibm-sdk-jav…
∗∗∗ Security Bulletin: IBM QRadar SIEM is vulnerable to using components with Known Vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulner…
∗∗∗ Security Bulletin: Vulnerability in Apache Tomcat affects IBM Process Mining (CVE-2022-23181) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-t…
∗∗∗ Security Bulletin: IBM QRadar SIEM is vulnerable to using components with known vulnerabilities (CVE-2022-22345, CVE-2020-8022, CVE-2021-33813, CVE-2020-9488) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulner…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 22-04-2022 18:00 − Montag 25-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Einbruch in kritische Infrastrukturen: Experten zeigen, wie einfach es ist ∗∗∗
---------------------------------------------
Niederländische Forscher haben beim Hackerwettbewerb Pwn2Own demonstriert, wie leicht sich Industriesoftware übernehmen lässt, die zentrale Dienste steuert.
---------------------------------------------
https://heise.de/-7062641
∗∗∗ Netzwerkspeicher: Apple-Protokolle reißen Sicherheitslücken in Qnap-NAS ∗∗∗
---------------------------------------------
Die Unterstützung von Apples Netzwerkprotokollen durch netatalk in Qnap-NAS-Systemen bringt teils kritische Sicherheitslücken mit. Erste Updates stehen bereit.
---------------------------------------------
https://heise.de/-7064336
∗∗∗ Hacker-Gruppe Lapsus$ soll Sourcecode von T-Mobile kopiert haben ∗∗∗
---------------------------------------------
Angreifer sind mit erbeuteten Zugangsdaten in Computer-Systeme von T-Mobile eingebrochen. Kundendaten sollen nicht betroffen sein.
---------------------------------------------
https://heise.de/-7063836
∗∗∗ Fake-E-Mail von Spotify: Kriminelle versuchen Ihr Konto zu übernehmen ∗∗∗
---------------------------------------------
Kriminelle versenden momentan gefälschte Spotify-E-Mails, um Ihr Konto zu übernehmen und Kreditkartendaten zu stehlen. Nutzer:innen erhalten vom Absender „Spotify-Rechnung“ ein Schreiben, in dem ein Problem mit Ihrer Zahlung vorgetäuscht wird. Im E-Mail werden Sie gebeten, auf einen Button zu klicken. Dieser führt dann auf eine gefälschte Spotify-Login-Seite. Daten, die dort eingetippt werden, landen direkt bei Kriminellen.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-e-mail-von-spotify-kriminelle-v…
∗∗∗ New powerful Prynt Stealer malware sells for just $100 per month ∗∗∗
---------------------------------------------
Threat analysts have spotted yet another addition to the growing space of info-stealer malware infections, named Prynt Stealer, which offers powerful capabilities and extra keylogger and clipper modules.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-powerful-prynt-stealer-m…
∗∗∗ DDoS attacks in Q1 2022 ∗∗∗
---------------------------------------------
Against the backdrop of the conflict between Russia and Ukraine, the number of DDoS attacks in Q1 2022 increased by 4.5 times against Q1 2021. A significant proportion of them were by hacktivists.
---------------------------------------------
https://securelist.com/ddos-attacks-in-q1-2022/106358/
∗∗∗ Are Roku Streaming Devices Safe from Exploitation?, (Sat, Apr 23rd) ∗∗∗
---------------------------------------------
I have noticed in the past several weeks random scans specifically for Roku streaming devices (and likely other types) captured by my honeypot. If they can be compromised, what can be gain? Settings like stored payment information, personal information (email/password), subscription, App selected, etc. Like any other devices, it is important to keep the OS and Apps up-to-date.
---------------------------------------------
https://isc.sans.edu/diary/rss/28578
∗∗∗ Simple PDF Linking to Malicious Content, (Mon, Apr 25th) ∗∗∗
---------------------------------------------
Last week, I found an interesting piece of phishing based on a PDF file. Today, most of the PDF files that are delivered to end-user are not malicious, I mean that they dont contain an exploit to trigger a vulnerability and infect the victims computer. They are just used as a transport mechanism to deliver more malicious content. Yesterday, Didier analyzed the same kind of Word document[1]. They are more and more common because they are (usually) not blocked by common filters at the perimeter.
---------------------------------------------
https://isc.sans.edu/diary/rss/28582
∗∗∗ Researcher Releases PoC for Recent Java Cryptographic Vulnerability ∗∗∗
---------------------------------------------
A proof-of-concept (PoC) code demonstrating a newly disclosed digital signature bypass vulnerability in Java has been shared online. The high-severity flaw in question, CVE-2022-21449 (CVSS score: 7.5), impacts the following versions of Java SE and Oracle GraalVM Enterprise Edition - [...]
---------------------------------------------
https://thehackernews.com/2022/04/researcher-releases-poc-for-recent-java.h…
∗∗∗ Defeating BazarLoader Anti-Analysis Techniques ∗∗∗
---------------------------------------------
Anti-analysis techniques make it harder for malware analysts to do their work. We cover BazarLoader anti-analysis techniques and how to defeat them.
---------------------------------------------
https://unit42.paloaltonetworks.com/bazarloader-anti-analysis-techniques/
∗∗∗ Webcam hacking: How to know if someone may be spying on you through your webcam ∗∗∗
---------------------------------------------
Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera.
---------------------------------------------
https://www.welivesecurity.com/2022/04/25/webcam-hacking-how-know-someone-s…
∗∗∗ Quantum Ransomware ∗∗∗
---------------------------------------------
In one of the fastest ransomware cases we have observed, in under four hours the threat actors went from initial access, to domain wide ransomware. The initial access vector for [...]
---------------------------------------------
https://thedfirreport.com/2022/04/25/quantum-ransomware/
∗∗∗ FBI Releases IOCs Associated with BlackCat/ALPHV Ransomware ∗∗∗
---------------------------------------------
The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with attacks involving BlackCat/ALPHV, a Ransomware-as-a-Service that has compromised at least 60 entities worldwide. CISA encourages users and administrators to review the IOCs and technical details in FBI Flash CU-000167-MW and apply the recommended mitigations.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/22/fbi-releases-iocs…
∗∗∗ Malware analysis report on SparrowDoor malware ∗∗∗
---------------------------------------------
A technical analysis of a new variant of the SparrowDoor malware.
---------------------------------------------
https://www.ncsc.gov.uk/report/mar-sparrowdoor
=====================
= Vulnerabilities =
=====================
∗∗∗ Critical Bug in Everscale Wallet Couldve Let Attackers Steal Cryptocurrencies ∗∗∗
---------------------------------------------
A security vulnerability has been disclosed in the web version of the Ever Surf wallet that, if successfully weaponized, could allow an attacker to gain full control over a victims wallet.
---------------------------------------------
https://thehackernews.com/2022/04/critical-bug-in-everscale-wallet.html
∗∗∗ IBM Security Bulletins 2022-04-22 ∗∗∗
---------------------------------------------
IBM Cloud Private, IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data, IBM Sterling File Gateway, IBM Watson Explorer, IBM Planning Analytics, IBM App Connect Enterprise
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ IBM schließt kritische Sicherheitslücken in Cognos Analytics ∗∗∗
---------------------------------------------
In der Business-Intelligence-Software IBM Cognos Analytics könnten Angreifer unter anderem Schadcode einschleusen. Aktualisierte Software behebt die Probleme.
---------------------------------------------
https://heise.de/-7063645
∗∗∗ Sicherheitsupdates Atlassian Jira: Angreifer könnten Authentifizierung umgehen ∗∗∗
---------------------------------------------
Die Entwickler haben eine kritische Sicherheitslücke im Projektmanagement-Tool Jira geschlossen.
---------------------------------------------
https://heise.de/-7063649
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (kernel, kernel-headers, kernel-tools, libinput, podman-tui, and vim), Mageia (git, gzip/xz, libdxfrw, libinput, librecad, and openscad), and SUSE (dnsmasq, git, libinput, libslirp, libxml2, netty, podofo, SDL, SDL2, and tomcat).
---------------------------------------------
https://lwn.net/Articles/892536/
∗∗∗ Opportunistic Exploitation of WSO2 CVE-2022-29464 ∗∗∗
---------------------------------------------
On April 18, 2022, MITRE published CVE-2022-29464, an unrestricted file upload vulnerability affecting various WSO2 products.
---------------------------------------------
https://www.rapid7.com/blog/post/2022/04/22/opportunistic-exploitation-of-w…
∗∗∗ FreeRADIUS: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0496
∗∗∗ Multiple Vulnerabilities in Netatalk ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-22-12
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 20-04-2022 18:00 − Donnerstag 21-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Microsoft Exchange servers hacked to deploy Hive ransomware ∗∗∗
---------------------------------------------
A Hive ransomware affiliate has been targeting Microsoft Exchange servers vulnerable to ProxyShell security issues to deploy various backdoors, including Cobalt Strike beacon.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-h…
∗∗∗ REvils TOR sites come alive to redirect to new ransomware operation ∗∗∗
---------------------------------------------
REvil ransomwares servers in the TOR network are back up after months of inactivity and redirect to a new operation that appears to have started since at least mid-December last year.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/revils-tor-sites-come-alive-…
∗∗∗ Multi-Cryptocurrency Clipboard Swapper, (Thu, Apr 21st) ∗∗∗
---------------------------------------------
It’s not the first time that I found a piece of code that monitors the clipboard and swap the BTC address found with the attacker's one. This time, the script that I found supports a lot of cryptocurrencies!
---------------------------------------------
https://isc.sans.edu/diary/rss/28574
∗∗∗ Mitigating the top 10 security threats to GCP using the CIS Google Cloud Platform Foundation Benchmark ∗∗∗
---------------------------------------------
This time we will take a closer look at what the CIS Google Cloud Platform Foundation Benchmark offers against 10 of the most common GCP misconfigurations that NCC Group comes across during client assessments.
---------------------------------------------
https://research.nccgroup.com/2022/04/20/mitigating-the-top-10-security-thr…
∗∗∗ Two OpenWrt updates ∗∗∗
---------------------------------------------
The OpenWrt 21.02.3 and 19.07.10 updates have been released. These updates contain some security fixes and improved device support.
---------------------------------------------
https://lwn.net/Articles/892161/
∗∗∗ Willhaben, ebay, Vinted & Co. im Fokus von Kriminellen! ∗∗∗
---------------------------------------------
Egal ob Sie etwas kaufen oder verkaufen wollen – nehmen Sie sich vor der Abzocke auf Kleinanzeigenplattformen in Acht! Wenn Sie dazu aufgefordert werden, die Transaktion mithilfe eines Kurierdienstes abzuwickeln, brechen Sie den Kontakt ab.
---------------------------------------------
https://www.watchlist-internet.at/news/willhaben-ebay-vinted-co-im-fokus-vo…
∗∗∗ Abusing Azure Container Registry Tasks ∗∗∗
---------------------------------------------
In this post, I will explain how one Azure service supporting DevOps can start in a very solid “secure by default” state, but then quickly descend into a very dangerous configured state.
---------------------------------------------
https://posts.specterops.io/abusing-azure-container-registry-tasks-1f407bfa…
∗∗∗ Understanding Cobalt Strike Profiles - Updated for Cobalt Strike 4.6 ∗∗∗
---------------------------------------------
A deep dive into specifics around cobalt strike malleable c2 profiles and key information that is new in cobalt strike 4.6
---------------------------------------------
https://blog.zsec.uk/cobalt-strike-profiles/
∗∗∗ TeamTNT targeting AWS, Alibaba ∗∗∗
---------------------------------------------
TeamTNT is actively modifying its scripts after they were made public by security researchers. These scripts primarily target Amazon Web Services, but can also run in on-premise, container, or other forms of Linux instances.
---------------------------------------------
http://blog.talosintelligence.com/2022/04/teamtnt-targeting-aws-alibaba.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Security Advisories 2022-04-20 ∗∗∗
---------------------------------------------
Cisco published 12 Security Advisories (3 High, 9 Medium Severity)
---------------------------------------------
https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&secur…
∗∗∗ Statischer SSH-Schlüssel macht Cloudsicherheitssystem Cisco Umbrella zu schaffen ∗∗∗
---------------------------------------------
Wichtige Sicherheitsupdates für Hard- und Software von Cisco schließen mehrere Lücken. Angreifer könnten Admin-Zugangsdaten mitschneiden.
---------------------------------------------
https://heise.de/-7061311
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (frr, grafana, gzip, and pdns), Oracle (java-11-openjdk), Red Hat (java-11-openjdk and kernel), Scientific Linux (java-11-openjdk), SUSE (dcraw, GraphicsMagick, gzip, kernel, nbd, netty, qemu, SDL, and xen), and Ubuntu (libinput, linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle, linux-oracle-5.13, linux-raspi, linux, linux-aws, linux-aws-hwe, linux-azure,[...]
---------------------------------------------
https://lwn.net/Articles/892214/
∗∗∗ Drupal core - Moderately critical - Access bypass - SA-CORE-2022-009 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-core-2022-009
∗∗∗ Drupal core - Moderately critical - Improper input validation - SA-CORE-2022-008 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-core-2022-008
∗∗∗ Security Bulletin: IBM Maximo Asset Management and the IBM Maximo Manage application in IBM Maximo Application Suite are vulnerable to cross-site scripting (CVE-2022-22436) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-manageme…
∗∗∗ Security Bulletin: IBM Maximo Asset Management and the IBM Maximo Manage application in IBM Maximo Application Suite are vulnerable to cross-site scripting (CVE-2022-22435) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-manageme…
∗∗∗ Security Bulletin: Vulnerability in OpenSSL affect App Connect Professional. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-openssl-…
∗∗∗ Security Bulletin: Vulnerability in OpenSSL affects IBM Integrated Analytics System. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-openssl-…
∗∗∗ Security Bulletin: Multiple vulnerabilities may affect IBM Robotic Process Automation ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: App Connect Professional is affected by GNU C Library vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-app-connect-professional-…
∗∗∗ Security Bulletin: App Connect Professional is affected by GNU C Library vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-app-connect-professional-…
∗∗∗ Security Bulletin: Vulnerability in Linux Kernel affects IBM Integrated Analytics System. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-linux-ke…
∗∗∗ Security Bulletin: IBM Emptoris Supplier Lifecycle Management vulnerable to unspecified vulnerability due to Oracle Database Server (CVE-2021-35576) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-emptoris-supplier-lif…
∗∗∗ Security Bulletin: App Connect Professional is affected by GNU C Library vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-app-connect-professional-…
∗∗∗ Security Bulletin: IBM QRadar Use Case Manager app is vulnerable to using components with known vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-use-case-manag…
∗∗∗ Security Bulletin: IBM® Db2® is affected by multiple vulnerabilities in the included Expat 3rd party library (CVE-2022-23852 and CVE-2022-23990) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-is-affected-by-mu…
∗∗∗ Security Bulletin: A Vulnerability in IBM WebSphere Application Server – Liberty affects IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-we…
∗∗∗ Jira Security Advisory 2022-04-20 ∗∗∗
---------------------------------------------
https://confluence.atlassian.com/jira/jira-security-advisory-2022-04-20-111…
∗∗∗ Delta Electronics ASDA-Soft ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-111-01
∗∗∗ Johnson Controls Metasys SCT Pro ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-111-02
∗∗∗ Hitachi Energy MicroSCADA Pro/X SYS600 ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-111-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 19-04-2022 18:00 − Mittwoch 20-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ CISA warns of attackers now exploiting Windows Print Spooler bug ∗∗∗
---------------------------------------------
The Cybersecurity and Infrastructure Security Agency (CISA) has added three new security flaws to its list of actively exploited bugs, including a local privilege escalation bug in the Windows Print Spooler.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cisa-warns-of-attackers-now-…
∗∗∗ Emotet botnet switches to 64-bit modules, increases activity ∗∗∗
---------------------------------------------
The Emotet malware is having a burst in distribution and is likely to soon switch to new payloads that are currently detected by fewer antivirus engines.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emotet-botnet-switches-to-64…
∗∗∗ Google: 2021 war Rekordjahr für entdeckte Zero Days ∗∗∗
---------------------------------------------
Laut Google ändert sich die Ursache der Sicherheitslücken selbst aber kaum. Größtes Problem bleiben Speicherfehler.
---------------------------------------------
https://www.golem.de/news/google-2021-war-rekordjahr-fuer-entdeckte-zero-da…
∗∗∗ "aa" distribution Qakbot (Qbot) infection with DarkVNC traffic, (Wed, Apr 20th) ∗∗∗
---------------------------------------------
Chain of Events and IOCs of a Qakbot infection.
---------------------------------------------
https://isc.sans.edu/diary/rss/28568
∗∗∗ Phishing-Welle zu Online-Banking rollt durch Postfächer ∗∗∗
---------------------------------------------
Aktuell rollt eine Phishing-Welle durch österreichische E-Mail-Postfächer, mit der es Kriminelle vor allem auf Online-Banking-Daten abgesehen haben.
---------------------------------------------
https://www.watchlist-internet.at/news/phishing-welle-zu-online-banking-rol…
∗∗∗ CISA Releases Secure Cloud Business Applications (SCuBA) Guidance Documents for Public Comment ∗∗∗
---------------------------------------------
CISA has released draft versions of two guidance documents—along with a request for comment (RFC)—that are a part of the recently launched Secure Cloud Business Applications (SCuBA) project.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/19/cisa-releases-sec…
∗∗∗ Investigating an engineering workstation – Part 3 ∗∗∗
---------------------------------------------
In our third blog post we will focus on information we can get from the projects itself.
---------------------------------------------
https://blog.nviso.eu/2022/04/20/investigating-an-engineering-workstation-p…
=====================
= Vulnerabilities =
=====================
∗∗∗ Elliptische Kurven: Java-Signaturprüfung lässt sich mit Nullen austricksen ∗∗∗
---------------------------------------------
Bei der Prüfung von ECDSA-Signaturen in Java fand sich ein Fehler, der dazu führt, dass man eine immer gültige Signatur erstellen kann.
---------------------------------------------
https://www.golem.de/news/elliptische-kurven-java-signaturpruefung-laesst-s…
∗∗∗ Oracle stellt 520 Sicherheitspatches für sein Software-Portfolio bereit ∗∗∗
---------------------------------------------
Admins von Oracle-Anwendungen sollten die verfügbaren Aktualisierungen installieren, um zum Teil kritische Sicherheitslücken zu schließen.
---------------------------------------------
https://heise.de/-6746906
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (condor), Red Hat (389-ds:1.4, container-tools:2.0, kernel, kernel-rt, and kpatch-patch), SUSE (chrony, containerd, expat, git, icedtea-web, jsoup, jsr-305, kernel, libeconf, shadow and util-linux, protobuf, python-libxml2-python, python3, slirp4netns, sssd, vim, and wpa_supplicant), and Ubuntu (bash).
---------------------------------------------
https://lwn.net/Articles/892047/
∗∗∗ AWSs Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation ∗∗∗
---------------------------------------------
We identified severe security issues within AWS Log4Shell hot patch solutions. We provide a root cause analysis and overview of fixes and mitigations.
---------------------------------------------
https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/
∗∗∗ SSA-254054: Spring Framework Vulnerability (Spring4Shell or SpringShell, CVE-2022-22965) - Impact to Siemens Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-254054.txt
∗∗∗ Security Bulletin: IBM Emptoris Strategic Supply Management Platform is vulnerable to unspecified vulnerability due to Oracle Database Server (CVE-2021-35576) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-emptoris-strategic-su…
∗∗∗ Security Bulletin: IBM Security Guardium Insights is affected by Node.js vulnerability (CVE-2021-22939) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-ins…
∗∗∗ Security Bulletin: Due to use of IBM SDK, Java Technology Edition, IBM Tivoli Application Dependency Discovery Manager (TADDM) is vulnerable to denial of service ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-due-to-use-of-ibm-sdk-jav…
∗∗∗ Security Bulletin: IBM Emptoris Sourcing is vulnerable to unspecified vulnerability due to Oracle Database Server (CVE-2021-35576) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-emptoris-sourcing-is-…
∗∗∗ Security Bulletin: IBM Emptoris Contract Management is vulnerable to unspecified vulnerability due to Oracle Database Server (CVE-2021-35576) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-emptoris-contract-man…
∗∗∗ Security Bulletin: IBM Emptoris Program Management is vulnerable to unspecified vulnerability due to Oracle Database Server (CVE-2021-35576) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-emptoris-program-mana…
∗∗∗ April 19, 2022 TNS-2022-09 [R1] Tenable.sc 5.21.0 Fixes Multiple Third-Party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2022-09
∗∗∗ Veritas NetBackup: Schwachstelle ermöglicht Cross-Site Scripting ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0474
∗∗∗ Interlogix Hills ComNav ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-109-01
∗∗∗ Automated Logic WebCTRL ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-109-02
∗∗∗ FANUC ROBOGUIDE Simulation Platform ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-109-03
∗∗∗ Elcomplus SmartPPT SCADA ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-109-04
∗∗∗ Multiple ctrlX CORE vulnerabilities ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-029150.html
∗∗∗ MISP 2.4.158 security fix and general improvement release ∗∗∗
---------------------------------------------
https://github.com/MISP/MISP/releases/tag/v2.4.158
∗∗∗ Multiple Vulnerabilities in Apache HTTP Server ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-22-11
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 15-04-2022 18:00 − Dienstag 19-04-2022 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Freier Decryptor für Yanlouwang-Ransomware ∗∗∗
---------------------------------------------
Sicherheitsanbieter Kaspersky hat in der Verschlüsselung der Yanlouwang-Ransomware eine Schwachstelle entdeckt. In Folge dieser Schwachstelle kann die Verschlüsselung von Dateien unter bestimmten Voraussetzungen geknackt werden. Jedenfalls steht ein kostenloser Decryptor für die Yanlouwang-Ransomware zur Verfügung.
---------------------------------------------
https://www.borncity.com/blog/2022/04/19/freier-decryptor-fr-yanlouwang-ran…
∗∗∗ Achtung unseriös: hondrox.com, hondrox.eu & hondrox.shop ∗∗∗
---------------------------------------------
Auf der Suche nach Behandlungsmöglichkeiten bei Gelenkschmerzen stoßen Sie möglicherweise auf „Hondrox“. Ein Spray, der die „Wiederherstellung der Knorpel in den Gelenken“ sowie Schmerzlinderung verspricht. Auf hondrox.com, hondrox.eu und hondrox.shop wird dieses vermeintliche Wundermittel angeboten. Doch Vorsicht: Diese Online-Shops sind unseriös. Sie verschwenden Ihr Geld!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-unserioes-hondroxcom-hondrox…
∗∗∗ GitHub-Sicherheitslücke: OAuth-Token von Heroku und Travis-CI kompromittiert ∗∗∗
---------------------------------------------
Unauthorisierte Zugriffe auf die npm-Infrastruktur haben kriminelle Aktivitäten enttarnt. Betroffenen sind OAuth-Token von Heroku und Travis-CI.
---------------------------------------------
https://heise.de/-6703708
∗∗∗ Sicherheit fürs Anmelden: Was bei Kennwörtern, FIDO2 und TOTP zu beachten ist ∗∗∗
---------------------------------------------
In der Theorie sind zweite Faktoren einfach. In der praktischen Umsetzung tauchen aber diverse Fragen auf – die häufigsten haben wir zusammengetragen.
---------------------------------------------
https://heise.de/-6660829
∗∗∗ Lenovo System Update könnte Schadcode auf Computer lassen ∗∗∗
---------------------------------------------
Lenovo hat Sicherheitslücken in einer Anwendung und verschiedenen BIOS-Versionen geschlossen und Hintertüren entfernt.
---------------------------------------------
https://heise.de/-6740544
∗∗∗ Studie: Ciscos Webex telefoniert auch stummgeschaltet nach Hause ∗∗∗
---------------------------------------------
Bei einer Untersuchung der Stummschaltefunktion von Videokonferenzsoftware fiel Ciscos Webex negativ auf.
---------------------------------------------
https://www.golem.de/news/studie-ciscos-webex-telefoniert-auch-stummgeschal…
∗∗∗ New stealthy BotenaGo malware variant targets DVR devices ∗∗∗
---------------------------------------------
Threat analysts have spotted a new variant of the BotenaGo botnet malware, and its the stealthiest seen so far, running undetected by any anti-virus engine.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-stealthy-botenago-malwar…
∗∗∗ Managing container vulnerability risks: Tools and best practices ∗∗∗
---------------------------------------------
Containers are quickly becoming the de facto form of compute and workload deployments in the cloud-native ecosystem. The latest Cloud Native Computing Foundation (CNCF) Cloud Native Survey shows that 96% of organizations are either actively using containers and Kubernetes or are evaluating them. Containers have well-known benefits such as portability, consistency and efficiency, but they aren’t without security concerns.
---------------------------------------------
https://www.csoonline.com/article/3656702/managing-container-vulnerability-…
∗∗∗ Sysmons RegistryEvent (Value Set), (Mon, Apr 18th) ∗∗∗
---------------------------------------------
A colleague asked me about Sysmon's event ID 13 RegistryEvent (Value Set). They wanted to know if binary data could be recorded in event 13.
---------------------------------------------
https://isc.sans.edu/diary/rss/28558
∗∗∗ Why you shouldn’t automate your VirusTotal uploads ∗∗∗
---------------------------------------------
Security teams use VirusTotal as a second opinion scanner, but its not advisable to upload documents to VirusTotal as that may result in a breach of confidence and exposure of confidential data.
---------------------------------------------
https://blog.malwarebytes.com/101/2022/04/why-you-shouldnt-automate-your-vi…
∗∗∗ How vx-underground is building a hacker’s dream library ∗∗∗
---------------------------------------------
When malware repository vx-underground launched in 2019, it hardly made a splash in the hacking world. "I had no success really," said its founder, who goes by the online moniker smelly_vx.
---------------------------------------------
https://therecord.media/how-vx-underground-is-building-a-hackers-dream-libr…
∗∗∗ Stories from the SOC - Lateral movement using default accounts ∗∗∗
---------------------------------------------
The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If this account is not properly secured, attackers may leverage it to conduct privilege escalation and lateral movement.
---------------------------------------------
https://cybersecurity.att.com/blogs/security-essentials/stories-from-the-so…
=====================
= Vulnerabilities =
=====================
∗∗∗ Angreifer könnten sich als Admins an Cisco Wireless LAN Controller anmelden ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für unter anderem Cisco IOS XE, SD-WAN und WLC. Eine Lücke gilt als kritisch.
---------------------------------------------
https://heise.de/-6737709
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (abcm2ps and chromium), Fedora (cacti, cacti-spine, and fribidi), and Mageia (crun, docker-containerd, libarchive, mediawiki, and ruby).
---------------------------------------------
https://lwn.net/Articles/891725/
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (gzip and xz-utils), Fedora (dhcp and rsync), Mageia (chromium-browser-stable), openSUSE (chromium), SUSE (gzip, openjpeg2, and zabbix), and Ubuntu (klibc).
---------------------------------------------
https://lwn.net/Articles/891818/
∗∗∗ Elcomplus SmartPPT SCADA Server ∗∗∗
---------------------------------------------
This advisory contains mitigations for Cross-site Scripting, Unauthorized Exposure to Sensitive Information, Unrestricted Upload of File with Dangerous Type, Path Traversal, and Cross-site Request Forgery vulnerabilities in the Elcomplus SmartPPT SCADA Server voice and data dispatch software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-109-05
∗∗∗ Multiple RTOS (Update E) ∗∗∗
---------------------------------------------
Update E:
Windriver VxWorks – Update in progress
The following devices use Windriver VxWorks as their RTOS:
Hitachi Energy GMS600 – See public advisory.
Hitachi Energy PWC600 – See public advisory.
Hitachi Energy REB500 – See public advisory.
Hitachi Energy Relion 670, 650 series and SAM600-IO – See public advisory
Hitachi Energy RTU500 series CMU – Updates available for some firmware versions – See public advisory.
Hitachi Energy Modular Switchgear Monitoring System MSM – Protect your network – See public advisory.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04
∗∗∗ Delta Controls enteliTOUCH 3.40.3935 Cookie User Password Disclosure ∗∗∗
---------------------------------------------
https://cxsecurity.com/issue/WLB-2022040067
∗∗∗ Delta Controls enteliTOUCH 3.40.3935 Cross Site Scripting ∗∗∗
---------------------------------------------
https://cxsecurity.com/issue/WLB-2022040065
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ K56105136: BIND vulnerability CVE-2022-0396 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K56105136
∗∗∗ K21054458: Eclipse Jetty vulnerability CVE-2017-7656 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K21054458
∗∗∗ Asterisk: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0456
∗∗∗ 7-Zip: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0459
∗∗∗ Microsoft Edge: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0458
∗∗∗ MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0461
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 14-04-2022 18:00 − Freitag 15-04-2022 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Sicherheit: Best Practice, zum Updaten von Windows Domain Controllern ∗∗∗
---------------------------------------------
In Unternehmensumgebungen werden oft Windows Server eingesetzt, die als Domain Controller (DC) fungieren. Domänencontroller sind für viele Unternehmen nach wie vor (trotz Trend zur Azure-Coud, so Microsoft) ein zentraler Bestandteil der Infrastruktur. Und die in der Active Directory gespeicherten Identitäten [...]
---------------------------------------------
https://www.borncity.com/blog/2022/04/15/sicherheit-best-practice-zum-updat…
∗∗∗ Vorsicht vor ungerechtfertigten Kreditkartenabbuchungen von medianess.co ∗∗∗
---------------------------------------------
Ein QR-Code wird gescannt, ein Programm heruntergeladen oder eine App am Handy installiert. Konsument:innen berichten von ganz alltäglichen Situationen, in denen sie plötzlich auf der Seite medianess.co landen und aufgefordert werden ihre Kreditkartendaten einzugeben. Einige Tage später stellen sie verwundert fest, dass sie ein ungewolltes Abo abgeschlossen haben. Wir erklären Ihnen, wie Sie die ungerechtfertigten Abbuchungen beenden können und Ihr Geld zurückerhalten.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-ungerechtfertigten-kred…
∗∗∗ CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers ∗∗∗
---------------------------------------------
This blog post is my analysis of a vulnerability exploited in the wild and patched in early 2021. Like the writeup published last week looking at an ASN.1 parser bug, this blog post is based on the notes I took as I was analyzing the patch and trying to understand the XNU vouchers subsystem. I hope that this writeup serves as the missing documentation for how some of the internals of the voucher subsystem works and its quirks which lead to this vulnerability.
---------------------------------------------
https://googleprojectzero.blogspot.com/2022/04/cve-2021-1782-ios-in-wild-vu…
∗∗∗ Gaining Visibility Within Container Clusters ∗∗∗
---------------------------------------------
Service mesh platforms can be used to provide insight into the container processes and their network operations within K8s clusters.
---------------------------------------------
https://unit42.paloaltonetworks.com/visibility-k8s-clusters/
∗∗∗ CISA Adds Nine Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CISA has added nine new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow on the of the "Date Added to Catalog" column, which will sort by descending dates.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/15/cisa-adds-nine-kn…
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerability in Spring Cloud Function Framework Affecting Cisco Products: March 2022 ∗∗∗
---------------------------------------------
On March 29, 2022, the following critical vulnerability in the Spring Cloud Function Framework affecting releases 3.1.6, 3.2.2, and older unsupported releases was disclosed: CVE-2022-22963: Remote code execution in Spring Cloud Function by malicious Spring Expression For a description of this vulnerability, see VMware Spring Framework Security Vulnerability Report.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (fribidi and python-django), Fedora (postgresql-jdbc, stargz-snapshotter, and thunderbird), Slackware (git, gzip, and xz), and SUSE (kernel, SDL2, and tomcat).
---------------------------------------------
https://lwn.net/Articles/891453/
∗∗∗ Johnson Controls Metasys ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Incomplete Cleanup vulnerability in the Johnson Controls Metasys ADS/ADX/OAS servers for building management systems.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-104-02
∗∗∗ Red Lion DA50N ∗∗∗
---------------------------------------------
This advisory contains mitigation for Insufficient Verification of Data Authenticity, Weak Password Requirements, Use of Unmaintained Third-Party Components, and Insufficiently Protected Credentials vulnerabilities in the Red Lion DA50N networking gateway.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-104-03
∗∗∗ Siemens SCALANCE FragAttacks ∗∗∗
---------------------------------------------
This advisory contains mitigations for Improper Authentication, Injection, Improper Validation of Integrity Check, and Improper Input Validation vulnerabilities in the Siemens SCALANCE FragAttacks.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-104-04
∗∗∗ Siemens OpenSSL Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
This advisory contains mitigations for a NULL Pointer Dereference vulnerability in the Siemens OpenSSL.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-104-05
∗∗∗ Delta Electronics DMARS ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Restriction of XML External Entity Reference vulnerability in the Delta Electronics DMARS program development tool.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-104-01
∗∗∗ Juniper Networks Releases Security Updates for Multiple Products ∗∗∗
---------------------------------------------
Juniper Networks has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the Juniper Networks security advisories page and apply the necessary updates.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/14/juniper-networks-…
∗∗∗ Chrome 100.0.4896.127 fixt 0-day Schwachstelle CVE-2022-1364 ∗∗∗
---------------------------------------------
Google hat zum 14. April 2022 Notfall-Updates des Google Chrome 100.0.4896.127 für Android, sowie für Windows und Mac auf dem Desktop im Stable Channel freigegeben. Das Update schließt die 0-day-Schwachstelle CVE-2022-1364, die bereits Exploits existieren.
---------------------------------------------
https://www.borncity.com/blog/2022/04/15/chrome-100-0-4896-127-fixt-ausgenu…
∗∗∗ OpenSSL Infinite loop when parsing certificates CVE-2022-0778 ∗∗∗
---------------------------------------------
A vulnerability CVE-2022-0778 was found in OpenSSL that allows to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate leads to a DoS (Denial of service) attack. SonicWall is investigating its product line to determine which products and cloud services may be affected by this vulnerability.
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
∗∗∗ Security Bulletin: IBM Sterling B2B Integrator vulnerable to multiple vulnerabilities due to Spring Security ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-b2b-integrat…
∗∗∗ Security Bulletin: Due to use of Apache Storm IBM Tivoli Network Manager is vulnerable to arbiraty code execution ( CVE-2021-38294, CVE-2021-40865 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-due-to-use-of-apache-stor…
∗∗∗ Security Bulletin: IBM Security Guardium is affected by multiple vulnerabilities in Apache Thrift ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-…
∗∗∗ Security Bulletin: Publicly disclosed vulnerabilities in Plexus-utils affect IBM Netezza Analytics ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulner…
∗∗∗ Security Bulletin: OpenSSL for IBM i is vulnerable to a denial of service due to a flaw in the BN_mod_sqrt() function (CVE-2022-0778) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-openssl-for-ibm-i-is-vuln…
∗∗∗ Security Bulletin: Multiple Vulnerabilities in node.js ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily