=====================
= End-of-Day report =
=====================
Timeframe: Montag 30-01-2023 18:00 − Dienstag 31-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Exploit released for critical VMware vRealize RCE vulnerability ∗∗∗
---------------------------------------------
Horizon3 security researchers have released proof-of-concept (PoC) code for a VMware vRealize Log Insight vulnerability chain that allows attackers to gain remote code execution on unpatched appliances.
VMware patched four security vulnerabilities in its vRealize log analysis tool last week, two being critical and allowing remote attackers to execute code on compromised devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/exploit-released-for-critica…
∗∗∗ Github Desktop & Atom: Signaturschlüssel von Github entwendet ∗∗∗
---------------------------------------------
Auf Github wurden Signaturschlüssel entwendet, die bald zurückgerufen werden. Betroffen sind Github Desktop und Atom für Mac, die den Dienst einstellen. (Github, Security)
---------------------------------------------
https://www.golem.de/news/github-desktop-atom-signaturschluessel-von-github…
∗∗∗ Prilex modification now targeting contactless credit card transactions ∗∗∗
---------------------------------------------
Kaspersky discovers three new variants of the Prilex PoS malware capable of blocking contactless NFC transactions on an infected device.
---------------------------------------------
https://securelist.com/prilex-modification-now-targeting-contactless-credit…
∗∗∗ Microsoft Investigation – Threat actor consent phishing campaign abusing the verified publisher process ∗∗∗
---------------------------------------------
On December 15th, 2022, Microsoft became aware of a consent phishing campaign involving threat actors fraudulently impersonating legitimate companies when enrolling in the Microsoft Cloud Partner Program (MCPP) (formerly known as Microsoft Partner Network (MPN)).
---------------------------------------------
https://msrc-blog.microsoft.com/2023/01/31/threat-actor-consent-phishing-ca…
∗∗∗ Decoding DNS over HTTP(s) Requests, (Mon, Jan 30th) ∗∗∗
---------------------------------------------
I have written before about scans for DNS over HTTP(s) (DoH) servers. DoH is now widely supported in different browsers and recursive resolvers. It has been an important piece in the puzzle to evade various censorship regimes, in particular, the "Big Chinese Firewall". Malware has at times used DoH, but often uses its own HTTP(s) based resolvers that do not necessarily comply with the official DoH standard.
---------------------------------------------
https://isc.sans.edu/diary/rss/29488
∗∗∗ Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years ∗∗∗
---------------------------------------------
A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to deploy a wide range of malware such as TrickBot, Emotet, AZORult, Agent Tesla, FormBook, Cerber, Maze, and REvil over the years."TrickGate managed to stay under the radar for years because it is transformative – it undergoes changes periodically
---------------------------------------------
https://thehackernews.com/2023/01/researchers-uncover-packer-that-helped.ht…
∗∗∗ Chromebook SH1MMER exploit promises admin jailbreak ∗∗∗
---------------------------------------------
Schools laptops are out if this one gets around, but beware bricking Users of enterprise-managed Chromebooks now, for better or worse, have a way to break the shackles of administrative control through an exploit called SHI1MMER.…
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2023/01/30/chromebook_e…
∗∗∗ Forthcoming OpenSSL Releases ∗∗∗
---------------------------------------------
The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 3.0.8, 1.1.1t and 1.0.2zg.[..] These releases will be made available on Tuesday 7th February 2023 between 1300-1700 UTC. These are security-fix releases. The highest severity issue fixed in each of these three releases is High
---------------------------------------------
https://mta.openssl.org/pipermail/openssl-announce/2023-January/000248.html
∗∗∗ Abstandhalten zu undurchsichtigen Multi-Level-Marketing-Angeboten wie shopwithme.biz ∗∗∗
---------------------------------------------
Wer sich aktuell auf sozialen Medien wie Facebook, YouTube oder TikTok bewegt, kommt an Werbevideos, die das große Geld versprechen, kaum vorbei. Mit minimalem Aufwand und revolutionären Methoden sollen Sie ganz einfach Unsummen an Geld verdienen können. Ähnliches verspricht man beispielsweise bei shopwithme.biz. Ein genauerer Blick lässt vermuten: Hier verdient man nicht durch den Verkauf von Produkten, sondern durch die Anwerbung neuer Kundschaft. Wir raten hier
---------------------------------------------
https://www.watchlist-internet.at/news/abstandhalten-zu-undurchsichtigen-mu…
∗∗∗ A Phishing Page that Changes According to the User’s Email Address (Using Favicon) ∗∗∗
---------------------------------------------
The ASEC analysis team continuously monitors phishing emails, and we have been detecting multiple phishing emails that are distributed with a changing icon to reflect the mail account service entered by the user.
---------------------------------------------
https://asec.ahnlab.com/en/46786/
=====================
= Vulnerabilities =
=====================
∗∗∗ [20230101] - Core - CSRF within post-installation messages ∗∗∗
---------------------------------------------
Severity: Low
Versions: 4.0.0-4.2.6
Exploit type: CSRF
Description: A missing token check causes a CSRF vulnerability in the handling of post-installation messages. Affected Installs Joomla! CMS versions 4.0.0-4.2.6
Solution: Upgrade to version 4.2.7
---------------------------------------------
https://developer.joomla.org:443/security-centre/890-20230101-core-csrf-wit…
∗∗∗ [20230102] - Core - Missing ACL checks for com_actionlogs ∗∗∗
---------------------------------------------
Severity: Low
Versions: 4.0.0-4.2.6
Exploit type: Incorrect Access Control
Description: A missing ACL check allows non super-admin users to access com_actionlogs.
Solution: Upgrade to version 4.2.7
---------------------------------------------
https://developer.joomla.org:443/security-centre/891-20230102-core-missing-…
∗∗∗ VMSA-2023-0002 ∗∗∗
---------------------------------------------
CVSSv3 Range: 6.5
CVE(s): CVE-2023-20856
Synopsis: VMware vRealize Operations (vROps) update addresses a CSRF bypass vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2023-0002.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (bind, firefox, java-1.8.0-openjdk, java-11-openjdk, kernel, libXpm, pki-core, sssd, sudo, thunderbird, tigervnc, and xorg-x11-server), Debian (cinder, glance, libarchive, libhtml-stripscripts-perl, modsecurity-crs, node-moment, node-qs, nova, ruby-git, ruby-rack, and tiff), Fedora (java-17-openjdk, rust-bat, rust-cargo-c, rust-git-delta, rust-gitui, rust-pore, rust-silver, rust-tokei, and seamonkey), Oracle (libksba), Red Hat (kernel, kernel-rt, kpatch-patch, libksba, and pcs), Scientific Linux (libksba), SUSE (apache2-mod_auth_openidc, ghostscript, libarchive, nginx, python, vim, and xen), and Ubuntu (cinder, glance, linux-raspi, nova, python-future, and sudo).
---------------------------------------------
https://lwn.net/Articles/921765/
∗∗∗ [R1] Tenable Plugin Feed ID #202212212055 Fixes Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside.
---------------------------------------------
https://www.tenable.com/security/tns-2023-04
∗∗∗ WordPress Vulnerability & Patch Roundup January 2023 ∗∗∗
---------------------------------------------
* SiteGround Security – SQL injection
* ExactMetrics – Cross Site Scripting (XSS)
* Enable Media Replace – Arbitrary File Upload
* Spectra WordPress Gutenberg Blocks – Stored Cross Site Scripting
* GiveWP – SQL Injection
* Better Font Awesome – Cross Site Scripting (XSS)
* LearnPress – SQL Injection
* Royal Elementor Addons and Templates – Cross Site Scripting (XSS)
* Strong Testimonials – Stored Cross Site Scripting (XSS)
* HUSKY (formerly WOOF) – PHP Object Injection
* WP Show Posts – Cross Site Scripting (XSS)
* Widgets for Google Reviews – Cross Site Scripting (XSS)
* Strong Testimonials – Cross Site Scripting (XSS)
* Simple Sitemap – Cross Site Scripting (XSS)
* Contextual Related Posts – Stored Cross Site Scripting (XSS)
* Stream – Broken Access Control
* Customer Reviews for WooCommerce – Cross Site Scripting (XSS)
* Themify Portfolio Post – Stored Cross Site Scripting
* Spotlight Social Media Feeds – Stored Cross Site Scripting (XSS)
* RSS Aggregator by Feedzy – Stored Cross Site Scripting (XSS)
---------------------------------------------
https://blog.sucuri.net/2023/01/wordpress-vulnerability-patch-roundup-janua…
∗∗∗ IBM Security Bulletins) ∗∗∗
---------------------------------------------
* IBM UrbanCode Deploy (UCD) is vulnerable to cross-site scripting ( CVE-2022-46771 )
* IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Golang Go (CVE-2022-24921, CVE-2022-28327, CVE-2022-24675)
* IBM WebSphere Application Server is vulnerable to a remote code execution vulnerability (CVE-2023-23477)
* Multiple vulnerabilities affect IBM Sterling External Authentication Server
* Multiple vulnerabilities in Mozilla Firefox affect IBM Cloud Pak for Multicloud Management Monitoring.
* Multiple vulnerabilities in libcURL affect IBM Rational ClearCase ( CVE-2022-42915, CVE-2022-42916, CVE-2022-32221, CVE-2022-35252, * * CVE-2022-32205, CVE-2022-32206, CVE-2022-32207 )
* IBM Sterling Secure Proxy vulnerable to multiple issues
* Multiple vulnerabilities in OpenSSL affects IBM Rational ClearCase (CVE-2022-2097, CVE-2022-2068)
* A vulnerability in the IBM Java Runtime affects IBM Rational ClearCase (CVE-2022-21626)
* Automation Assets in IBM Cloud Pak for Integration is vulnerable to remote code execution due to jsonwebtoken CVE-2022-23529
* Automation Assets in IBM Cloud Pak for Integration is vulnerable to CSS injection due to Swagger CVE-2019-17495
* Automation Assets in IBM Cloud Pak for Integration is vulnerable to denial of service due to protobuf CVE-2022-1941
* Platform Navigator and Automation Assets in IBM Cloud Pak for Integration is vulnerable to multiple Go vulnerabilities
* IBM Watson Knowledge Catalog on Cloud Pak for Data is vulnerable to SQL injection (CVE-2022-41731)
* IBM Virtualization Engine TS7700 is vulnerable to a denial of service threat due to use of IBM\u00ae SDK Java\u2122 Technology Edition, Version 8 (CVE-2022-21626)
* Multiple vulnerabilities affect IBM Db2\u00ae on Cloud Pak for Data and Db2 Warehouse\u00ae on Cloud Pak for Data
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in XStream
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in PyPA Wheel
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Node.js json5
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Node.js
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Certifi
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Node.js decode-uri-component
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in PostgreSQL
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in WebSphere Application Server Liberty
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Apache Tomcat
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Apache Spark
* Multiple Vulnerabilities in Java packages affect IBM Voice Gateway
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in HSQLDB
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Google Protocol Buffers
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Java
* IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in TensorFlow
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Delta Electronics DOPSoft ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-23-031-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 27-01-2023 18:00 − Montag 30-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Jetzt patchen! Sicherheitsforscher kombinieren Lücken in VMware vRealize Log ∗∗∗
---------------------------------------------
Angreifer könnten zeitnah vRealize Log von VMware ins Visier nehmen und Schadcode mit Root-Rechten ausführen. Sicherheitsupdates sind verfügbar.
---------------------------------------------
https://heise.de/-7474931
∗∗∗ Vorsicht vor gefälschten FinanzOnline-Benachrichtigungen ∗∗∗
---------------------------------------------
Kriminelle versenden gefälschte FinanzOnline-E-Mails. Aktuell sind uns zwei Varianten bekannt: In einem Mail wird behauptet, dass Sie eine Erstattung aus dem Sozialfonds erhalten. In einem anderen Mail steht, dass Sie eine Rückerstattung erhalten und einen QR-Code scannen müssen. Folgen Sie nicht den Anweisungen, es handelt sich um Betrug.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-gefaelschten-finanzonli…
∗∗∗ Malware PlugX infiziert USB-Geräte ∗∗∗
---------------------------------------------
Sicherheitsforscher der Unit 42 von Palo Alto Networks haben Cyberangriffe mit neuer Variante der altbekannten Schadsoftware beobachtet. Die mutmaßlich aus China stammende PlugX-Malware ist aufgefallen, weil diese Variante alle angeschlossenen USB-Wechselmediengeräte wie Disketten-, Daumen- oder Flash-Laufwerke sowie alle weiteren Systeme [...]
---------------------------------------------
https://www.borncity.com/blog/2023/01/28/malware-plugx-infiziert-usb-gerte/
∗∗∗ Laufwerksverschlüsselung per BitLocker: Das sollten Sie beachten ∗∗∗
---------------------------------------------
Die Geräteverschlüsselung von Microsoft schützt Ihre Daten vor unerwünschten Zugriffen. Zuweilen greift BitLocker automatisch, oft muss man selbst Hand anlegen.
---------------------------------------------
https://heise.de/-7467041
∗∗∗ Shady reward apps on Google Play amass 20 million downloads ∗∗∗
---------------------------------------------
A new category of activity tracking applications has been having massive success recently on Google Play, Androids official app store, having been downloaded on over 20 million devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/shady-reward-apps-on-google-…
∗∗∗ SaaS Rootkit Exploits Hidden Rules in Microsoft 365 ∗∗∗
---------------------------------------------
A vulnerability within Microsofts OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
---------------------------------------------
https://www.darkreading.com/vulnerabilities-threats/saas-rootkit-exploits-h…
∗∗∗ Gootkit Malware Continues to Evolve with New Components and Obfuscations ∗∗∗
---------------------------------------------
The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new components and obfuscations to their infection chains. Google-owned Mandiant is monitoring the activity cluster under the moniker UNC2565, noting that the usage of the malware is "exclusive to this group.
---------------------------------------------
https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html
∗∗∗ Titan Stealer: A New Golang-Based Information Stealer Malware Emerges ∗∗∗
---------------------------------------------
A new Golang-based information stealer malware dubbed Titan Stealer is being advertised by threat actors through their Telegram channel. "The stealer is capable of stealing a variety of information from infected Windows machines, including credential data from browsers and crypto wallets, FTP client details, screenshots, system information, and grabbed files," [...]
---------------------------------------------
https://thehackernews.com/2023/01/titan-stealer-new-golang-based.html
∗∗∗ Asking MEMORY.DMP and Volatility to make up ∗∗∗
---------------------------------------------
A few days ago Ive posted RE category write-ups from the KnightCTF 2023. Another category Ive looked at – quite intensely at that – was forensics. While this blog post isnt a write-up for that category, I still wanted (and well, was asked to actually) write down some steps I took to make Volatility work with MEMORY.DMP file provided in the "Take care of this" challenge series. Or actually steps I took to convert MEMORY.DMP into something volatility could work with.
---------------------------------------------
https://gynvael.coldwind.pl/?id=762
∗∗∗ Analysis Report on Malware Distributed via Microsoft OneNote ∗∗∗
---------------------------------------------
This document is an analysis report on malware that is being actively distributed using Microsoft OneNote. The ASEC analysis team identified the rapidly increasing trend of OneNote malware distribution from November 2022 and has classified the malware according to the level of intricacy based on the screen that appears when the file is actually opened.
---------------------------------------------
https://asec.ahnlab.com/en/46457/
=====================
= Vulnerabilities =
=====================
∗∗∗ Qnap-NAS: Kritische Sicherheitslücke ermöglicht Unterjubeln von Schadcode ∗∗∗
---------------------------------------------
In Qnap-Netzwerkgeräten mit QTS- und QuTS-hero-Betriebssystem könnten Angreifer Schadcode einschleusen und ausführen. Updates schließen die kritische Lücke.
---------------------------------------------
https://heise.de/-7475288
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (curl, dojo, git, lemonldap-ng, libapache-session-browseable-perl, libapache-session-ldap-perl, libzen, node-object-path, openjdk-11, sofia-sip, tiff, tor, and varnish), Fedora (libgit2, open62541, pgadmin4, rubygem-git, rust-bat, rust-cargo-c, rust-git-delta, rust-gitui, rust-libgit2-sys, rust-libgit2-sys0.12, rust-pore, rust-pretty-git-prompt, rust-rd-agent, rust-rd-hashd, rust-resctl-bench, rust-resctl-demo, rust-silver, and rust-tokei), Scientific
---------------------------------------------
https://lwn.net/Articles/921620/
∗∗∗ CERT-Warnung: Standard KeePass-Setup ermöglicht Passwort-Klau (CVE-2023-24055) ∗∗∗
---------------------------------------------
Kurzer Hinweis bzw. Warnung an Nutzer des KeePass Password Safe zur Verwaltung von Kennwörtern und Zugangsdaten. Das Cyber Emergency Response Team aus Belgien (CERT.be) hat am 27. Januar 2023 eine Warnung zu KeePass veröffentlicht. Im Standard-Setup sind Schreibzugriffe auf die [...]
---------------------------------------------
https://www.borncity.com/blog/2023/01/30/cert-warnung-standard-keepass-setu…
∗∗∗ IBM Planning Analytics Workspace is affected by vulnerabilties ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6848023
∗∗∗ Enterprise Content Management System Monitor is affected by a vulnerability in Eclipse Openj9 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6890603
∗∗∗ Due to the use of XStream, IBM Tivoli Netcool Configuration Manager is vulnerable to Denial of Service (DoS) attacks (CVE-2022-40153) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6890629
∗∗∗ IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in LibTIFF ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6855093
∗∗∗ IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Go ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6855105
∗∗∗ IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in LibTIFF ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6855099
∗∗∗ IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in LibTIFF ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6855097
∗∗∗ IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in FasterXML jackson-databind ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6855101
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 26-01-2023 18:00 − Freitag 27-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ ProxyShell & Co.: Microsoft gibt Tipps, um Exchange Server abzusichern ∗∗∗
---------------------------------------------
Vor dem Hintergrund mehrerer kritischer Sicherheitslücken und Attacken auf Exchange Server zeigt Microsoft, welche Updates Admins dringend installieren müssen.
---------------------------------------------
https://heise.de/-7472639
∗∗∗ CPUs von Intel und ARM: Linux und der Umgang mit datenabhängigem Timing ∗∗∗
---------------------------------------------
Wenn die Dauer von Operationen von den Daten abhängt, ermöglicht dies Timing-Attacken auf Informationen. Wie geht Linux damit um?
---------------------------------------------
https://www.golem.de/news/cpus-von-intel-und-arm-linux-und-der-umgang-mit-d…
∗∗∗ Bitwarden password vaults targeted in Google ads phishing attack ∗∗∗
---------------------------------------------
Bitwarden and other password managers are being targeted in Google ads phishing campaigns to steal users password vault credentials.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/bitwarden-password-vaults-ta…
∗∗∗ Live Linux IR with UAC, (Thu, Jan 26th) ∗∗∗
---------------------------------------------
The other day, I was looking for Linux IR scripts and ran across the tool Unix-like Artifacts Collector or UAC(1) created by Thiago Lahr. As you would expect, it gathers most live stats but also collects Virtual box and Docker info and other data on the system. [...] With any tool, you should always test to understand how it affects your system. I ran a simple file timeline collection before and after to see what changes were made.
---------------------------------------------
https://isc.sans.edu/diary/rss/29480
∗∗∗ WhatsApp hijackers take over your account while you sleep ∗∗∗
---------------------------------------------
Theres an easy way to protect yourself. Heres how.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2023/01/protect-your-whatsapp-accoun…
∗∗∗ "2.6 million DuoLingo account entries" up for sale ∗∗∗
---------------------------------------------
We take a look at claims of large amounts of DuoLingo user data up for sale, supposedly scraped from publicly available sources.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2023/01/2.6-million-duolingo-account…
∗∗∗ Tourismusbranche im Visier von Kriminellen: Cyberangriffe über booking.com ∗∗∗
---------------------------------------------
Der Hotelverband Deutschland, der französische Hotelverband GNI und die Wirtschaftskammer Österreich warnen vor zwei unterschiedlichen Betrugsversuchen über die Kommunikationskanäle von booking.com. Die Angriffe zielen darauf ab, das Computer-System der Unterkünfte mit Schadsoftware zu infizieren oder Kunden:innendaten abzugreifen.
---------------------------------------------
https://www.watchlist-internet.at/news/tourismusbranche-im-visier-von-krimi…
∗∗∗ Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms ∗∗∗
---------------------------------------------
We recap our research on privilege escalation and powerful permissions in Kubernetes and analyze the ways various platforms have addressed it.
---------------------------------------------
https://unit42.paloaltonetworks.com/kubernetes-privilege-escalation/
∗∗∗ A Blog with NoName ∗∗∗
---------------------------------------------
Further Insight into the Hacktivist Operation Targeting NATO and Affiliated Nations
---------------------------------------------
https://www.team-cymru.com/post/a-blog-with-noname
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (bind9, chromium, and modsecurity-apache), Fedora (libgit2, mediawiki, and redis), Oracle (go-toolset:ol8, java-1.8.0-openjdk, systemd, and thunderbird), Red Hat (java-1.8.0-openjdk and redhat-ds:12), SUSE (apache2, bluez, chromium, ffmpeg-4, glib2, haproxy, kernel, libXpm, podman, python-py, python-setuptools, samba, xen, xrdp, and xterm), and Ubuntu (samba).
---------------------------------------------
https://lwn.net/Articles/921477/
∗∗∗ CISA Releases Eight Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2023/01/26/cisa-releases-eig…
∗∗∗ IBM InfoSphere Information Server is vulnerable to cross-site scripting (CVE-2022-47983) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857695
∗∗∗ Security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for January 2023 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857999
∗∗∗ IBM App Connect Enterprise Certified Container may be vulnerable to denial of service due to [CVE-2022-42898] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6858007
∗∗∗ IBM App Connect Enterprise Certified Container operator and operands may be vulnerable to denial of service due to [CVE-2022-27664] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6858011
∗∗∗ IBM App Connect Enterprise Certified Container operator and operands may be vulnerable to denial of service due to [CVE-2022-32189] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6858009
∗∗∗ IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance may be vulnerable to [CVE-2022-23491] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6858005
∗∗∗ TADDM affected by multiple vulnerabilities due to IBM Java and its runtime ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6858015
∗∗∗ Multiple vulnerabilities in IBM Java Runtime affect Watson Explorer and Watson Explorer Content Analytics Studio (CVE-2022-21626) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6847951
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 25-01-2023 18:00 − Donnerstag 26-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Exploit released for critical Windows CryptoAPI spoofing bug ∗∗∗
---------------------------------------------
Proof of concept exploit code has been released by Akamai researchers for a critical Windows CryptoAPI vulnerability discovered by the NSA and U.K.s NCSC allowing MD5-collision certificate spoofing. Tracked as CVE-2022-34689, this security flaw was addressed with security updates released in August 2022 [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/exploit-released-for-critica…
∗∗∗ PY#RATION: New Python-based RAT Uses WebSocket for C2 and Data Exfiltration ∗∗∗
---------------------------------------------
Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a Python-based remote access trojan (RAT) to gain control over compromised systems since at least August 2022."This malware is unique in its utilization of WebSockets to avoid detection and for both command-and-control (C2) communication and exfiltration," Securonix said in a report [..]
---------------------------------------------
https://thehackernews.com/2023/01/pyration-new-python-based-rat-utilizes.ht…
∗∗∗ Massive Supply-Chain-Attacke auf Router von Asus, D-Link & Co. beobachtet ∗∗∗
---------------------------------------------
Angreifer haben derzeit weltweit eine kritische Schwachstelle in Wireless-SoCs von Realtek im Visier. In Deutschland soll es Millionen Attacken gegeben haben. [...] Von der Lücke sind rund 190 IoT-Modelle von 66 Herstellern betroffen. Eine Auflistung von betroffenen Geräten findet man in der ursprünglichen Warnmeldung am Ende des Beitrags. Sicherheitspatches von Realtek sind schon seit Sommer 2021 verfügbar.
---------------------------------------------
https://heise.de/-7471324
∗∗∗ Cybercrime: Polizei zerschlägt Ransomware-Gruppe "Hive" ∗∗∗
---------------------------------------------
Deutsche Ermittler haben in Zusammenarbeit mit den Behörden in den Niederlanden und den USA die Kontrolle über das Ransomware-Netzwerk "Hive" übernommen.
---------------------------------------------
https://heise.de/-7472192
∗∗∗ Chinese PlugX Malware Hidden in Your USB Devices? ∗∗∗
---------------------------------------------
The PlugX malware stood out to us as this variant infects any attached removable USB media devices such as floppy, thumb or flash drives and any additional systems the USB is later plugged into.
This PlugX malware also hides actor files in a USB device using a novel technique that works even on the most recent Windows operating systems (OS) at the time of writing this post.
---------------------------------------------
https://unit42.paloaltonetworks.com/plugx-variants-in-usbs/
∗∗∗ AA23-025A: Protecting Against Malicious Use of Remote Monitoring and Management Software ∗∗∗
---------------------------------------------
The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) (hereafter referred to as the “authoring organizations”) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders about malicious use of legitimate remote monitoring and management (RMM) software.
---------------------------------------------
https://us-cert.cisa.gov/ncas/alerts/aa23-025a
∗∗∗ Achtung: Phishing zur Kontensperrung zielt auf Ing-Banking-Kunden (Jan. 2023) ∗∗∗
---------------------------------------------
us gegebenem Anlass greife ich die nächste Phishing-Kampagne hier im Blog auf, die sich an Kunden von Banken richtet. Kunden der Online-Bank Ing erhalten in einer Kampagne eine Phishing-Mail mit dem Hinweis, dass das Konto gesperrt worden sei, weil nicht auf eine Nachricht der Bank reagiert worden sei.
---------------------------------------------
https://www.borncity.com/blog/2023/01/26/achtung-phishing-zur-kontensperrun…
∗∗∗ New Mimic Ransomware Abuses Everything APIs for its Encryption Process ∗∗∗
---------------------------------------------
Trend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything, a Windows filename search engine developed by Voidtools that offers quick searching and real-time updates for minimal resource usage.
---------------------------------------------
https://www.trendmicro.com/en_us/research/23/a/new-mimic-ransomware-abuses-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Sicherheitsupdate BIND: Angreifer könnten DNS-Server mit Anfragen überfluten ∗∗∗
---------------------------------------------
Die Entwickler haben in der DNS-Software auf Open-Source-Basis BIND drei DoS-Lücken geschlossen.
---------------------------------------------
https://heise.de/-7471773
∗∗∗ Wordpress-Plug-in: Kritische Lücke in Learnpress auf 75.000 Webseiten ∗∗∗
---------------------------------------------
Das Wordpress-Plug-in Learnpress kommt auf über 100.000 Webseiten zum Einsatz. Mangels installierter Updates sind 75.000 davon für Kompromittierung anfällig.
---------------------------------------------
https://heise.de/-7471283
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (git), Fedora (libXpm and redis), Oracle (bind, firefox, grub2, java-1.8.0-openjdk, java-11-openjdk, kernel, libtasn1, libXpm, and sssd), Red Hat (thunderbird), SUSE (freeradius-server, kernel, libzypp-plugin-appdata, python-certifi, and xen), and Ubuntu (bind9, krb5, linux-raspi, linux-raspi-5.4, and privoxy).
---------------------------------------------
https://lwn.net/Articles/921345/
∗∗∗ libcurl as used by IBM QRadar Wincollect agent is vulnerable to denial of service (CVE-2022-43552, CVE-2022-43551) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857685
∗∗∗ IBM App Connect Enterprise Certified Container operator and operands may be vulnerable to query parameter smuggling due to [CVE-2022-2880] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857849
∗∗∗ IBM App Connect Enterprise Certified Container operator and operands may be vulnerable to denial of service due to [CVE-2022-2879] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857851
∗∗∗ IBM App Connect Enterprise Certified Container operator and operands may be vulnerable to denial of service due to [CVE-2022-41715] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857853
∗∗∗ IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance may be vulnerable to elevated privileges due to [CVE-2022-42919] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857847
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 24-01-2023 18:00 − Mittwoch 25-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Vorsicht vor Phishing-Mails von FinanzOnline und ID Austria ∗∗∗
---------------------------------------------
Betrüger*innen versuchen mit gefälschten Mails an sensible Daten zu kommen.
---------------------------------------------
https://futurezone.at/digital-life/phishing-mails-finanzonline-id-austria-v…
∗∗∗ GoTo-Hacker erbeuten verschlüsselte Backups inklusive Schlüssel ∗∗∗
---------------------------------------------
GoTo, ein Anbieter für Software-as-a-Service und Remote-Work-Tools, veröffentlicht weitere Erkenntnisse über einen IT-Sicherheitsvorfall.
---------------------------------------------
https://heise.de/-7470609
∗∗∗ OTORIO DCOM Hardening Toolkit für Windows für OT-Systeme veröffentlicht ∗∗∗
---------------------------------------------
In Microsofts Windows DCOM-Implementierung gibt es eine Schwachstelle, die eine Umgehung der Sicherheitsfunktionen ermöglicht. Microsoft hat das dokumentiert und gepatcht, und will im März 2023 aber einen letzten einen Patch freigeben. Sicherheitsanbieter OTORIO hat im Vorfeld ein OpenSource DCOM Hardening Toolkit für OT-Systeme veröffentlicht, mit dem Unternehmen ihre DCOM-Umgebungen analysieren und ggf. härten können.
---------------------------------------------
https://www.borncity.com/blog/2023/01/25/otorio-dcom-hardening-toolkit-fr-w…
∗∗∗ Recovery-Scam durch betrugsdezernat.com und betrugsdezernat.org! ∗∗∗
---------------------------------------------
Wer auf betrügerischen Investment-Plattformen Geld verloren hat, wünscht sich meist nichts mehr, als sämtliche Einzahlungen zurückerhalten zu können. Darauf setzen auch die Kriminellen, die schon hinter dem Investitionsbetrug steckten. Sie geben sich als (häufig erfundene) Behörden aus und behaupten, das verlorene Geld festgesetzt zu haben. Eine kleine Vorauszahlung der Opfer soll zur Rückbuchung aller Verluste führen.
---------------------------------------------
https://www.watchlist-internet.at/news/recovery-scam-durch-betrugsdezernatc…
∗∗∗ Senden Sie Ihre Daten nicht an gewerbe-datenanzeiger.at! ∗∗∗
---------------------------------------------
Haben auch Sie eine Nachricht von Gewerbe Datenanzeiger bekommen, die Sie auffordert, Ihre Firmendaten preiszugeben? Ignorieren Sie die Nachricht, wenn Sie antworten, schließen Sie ein teures Abo in Höhe von 1.992 € ab!
---------------------------------------------
https://www.watchlist-internet.at/news/senden-sie-ihre-daten-nicht-an-gewer…
∗∗∗ Ransomware access brokers use Google ads to breach your network ∗∗∗
---------------------------------------------
A threat actor tracked as DEV-0569 uses Google Ads in widespread, ongoing advertising campaigns to distribute malware, steal victims passwords, and ultimately breach networks for ransomware attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ransomware-access-brokers-us…
∗∗∗ New stealthy Python RAT malware targets Windows in attacks ∗∗∗
---------------------------------------------
A new Python-based malware has been spotted in the wild featuring remote access trojan (RAT) capabilities to give its operators control over the breached systems.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-stealthy-python-rat-malw…
∗∗∗ Lessons Learned from the Windows Remote Desktop Honeypot Report ∗∗∗
---------------------------------------------
Over several weeks in October of 2022, Specops collected 4.6 million attempted passwords on their Windows Remote Desktop honeypot system. Here is what they learned.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/lessons-learned-from-the-win…
∗∗∗ A First Malicious OneNote Document, (Wed, Jan 25th) ∗∗∗
---------------------------------------------
Attackers are always trying to find new ways to deliver malware to victims. They recently started sending Microsoft OneNote files in massive phishing campaigns[1].
---------------------------------------------
https://isc.sans.edu/diary/rss/29470
∗∗∗ Massive Campaign Uses Hacked WordPress Sites as Platform for Black Hat Ad Network ∗∗∗
---------------------------------------------
Every so often attackers register a new domain to host their malware. In many cases, these new domains are associated with specific malware campaigns, often related to redirecting legitimate website traffic to third party sites of their choosing - including tech support scams, adult dating, phishing, or drive-by-downloads. Since late December, our team has been tracking a new spike in WordPress website infections related to the following malicious domain: [...]
---------------------------------------------
https://blog.sucuri.net/2023/01/massive-campaign-uses-hacked-wordpress-site…
∗∗∗ At the Edge of Tier Zero: The Curious Case of the RODC ∗∗∗
---------------------------------------------
The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t have adequate security to host a Domain Controller but still require directory services for resources in those locations. A branch office is the classic use case. While RODCs, by definition, are not part of the set of resources that can control “enterprise identities”, known as Tier Zero, we have seen cases where there is a privilege escalation path from an RODC to domain dominance.
---------------------------------------------
https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-th…
∗∗∗ Vulnerability of Zyxel switches posed serious risk for business processes of many companies ∗∗∗
---------------------------------------------
The issue received a CVSSv3 score of 8.2, qualifying it as high severity
---------------------------------------------
https://www.ptsecurity.com/ww-en/about/news/vulnerability-of-zyxel-switches…
∗∗∗ Attacking The Supply Chain: Developer ∗∗∗
---------------------------------------------
In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.
---------------------------------------------
https://www.trendmicro.com/en_us/research/23/a/attacking-the-supply-chain-d…
=====================
= Vulnerabilities =
=====================
∗∗∗ Xen Security Advisory CVE-2022-42330 / XSA-425 ∗∗∗
---------------------------------------------
Guests can cause Xenstore crash via soft reset
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-425.html
∗∗∗ Kritische Schadcode-Lücken in Logging-Tool VMware vRealize Log geschlossen ∗∗∗
---------------------------------------------
Netzwerk-Admins sollten ihre Systeme mit VMware vRealize Log auf den aktuellen Stand bringen, um Angreifer auszusperren.
---------------------------------------------
https://heise.de/-7470157
∗∗∗ Kritische Sicherheitslücke: Neuere Lexmark-Drucker ermöglichen Codeschmuggel ∗∗∗
---------------------------------------------
Lexmark warnt vor Sicherheitslücken in seinen Druckern. Neuere Modelle ermöglichten Angreifern, Schadcode einzuschleusen und auszuführen. Updates stehen bereit.
---------------------------------------------
https://heise.de/-7470640
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libde265, nodejs, and swift), Fedora (nautilus), Oracle (bash, bind, curl, dbus, expat, firefox, go-toolset, golang, java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, libreoffice, libtiff, libxml2, libXpm, nodejs, nodejs-nodemon, postgresql-jdbc, qemu, ruby:2.5, sqlite, sssd, sudo, and usbguard), Red Hat (bind, go-toolset-1.18, go-toolset:rhel8, kernel, kernel-rt, kpatch-patch, pcs, sssd, and virt:rhel, virt-devel:rhel), Scientific Linux (bind,
---------------------------------------------
https://lwn.net/Articles/921194/
∗∗∗ [R1] Tenable.sc 6.0.0 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2023-03
∗∗∗ IBM Security Verify Governance, Identity Manager virtual appliance component uses weaker than expected cryptography (CVE-2022-22462) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857339
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server shipped with IBM Tivoli System Automation Application Manager (CVE-2022-40750) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857579
∗∗∗ IBM MQ could allow an authenticated and authorized user to cause a denial of service to the MQTT channels. (CVE-2022-31772) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6833806
∗∗∗ IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from libxml2, expat, libtasn1 and systemd ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857613
∗∗∗ Multiple vulnerabilities in OpenSSL affect IBM InfoSphere Information Server ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857607
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 23-01-2023 18:00 − Dienstag 24-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hackers use Golang source code interpreter to evade detection ∗∗∗
---------------------------------------------
A Chinese-speaking hacking group tracked as DragonSpark was observed employing Golang source code interpretation to evade detection while launching espionage attacks against organizations in East Asia.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-use-golang-source-co…
∗∗∗ Microsoft 365 to block downloaded Excel XLL add-ins to boost security ∗∗∗
---------------------------------------------
Microsoft is working on adding XLL add-in protection for Microsoft 365 customers by including automated blocking of all such files downloaded from the Internet.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-365-to-block-down…
∗∗∗ Emotet Malware Makes a Comeback with New Evasion Techniques ∗∗∗
---------------------------------------------
The Emotet malware operation has continued to refine its tactics in an effort to fly under the radar, while also acting as a conduit for other dangerous malware such as Bumblebee and IcedID.
---------------------------------------------
https://thehackernews.com/2023/01/emotet-malware-makes-comeback-with-new.ht…
∗∗∗ Identitätsdiebstahl: Erste Hilfe bei Onlinebetrug unter Ihrem Namen ∗∗∗
---------------------------------------------
Kriminelle kaufen mit illegal erworbenen Login-Daten auf Ihre Rechnung ein oder posten Beschimpfungen in Ihrem Namen? Das sollten Sie jetzt tun.
---------------------------------------------
https://heise.de/-7452745
∗∗∗ A security audit of Git ∗∗∗
---------------------------------------------
The Open Source Technology Improvement Fund has announced the completion of a security audit of the Git source.
---------------------------------------------
https://lwn.net/Articles/921067/
∗∗∗ OSINT your OT suppliers ∗∗∗
---------------------------------------------
There is much talk about supply chain security and reviewing your suppliers for cyber security. But how much information do they intentionally and unintentionally leak about your organisation online?
---------------------------------------------
https://www.pentestpartners.com/security-blog/osint-your-ot-suppliers/
∗∗∗ Facebook: E-Bike-Gewinnspiele sind Fake ∗∗∗
---------------------------------------------
Mit „Danke“ kommentieren und E-Bike gewinnen: Dieses Gewinnspiel macht gerade auf Facebook die Runde. Angeblich haben die Fahrräder kleine Kratzer, die Motoren funktionieren aber einwandfrei. Vorsicht: Das Gewinnspiel ist Fake.
---------------------------------------------
https://www.watchlist-internet.at/news/facebook-e-bike-gewinnspiele-sind-fa…
∗∗∗ Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats ∗∗∗
---------------------------------------------
We observed a recent spate of supply chain attacks attempting to exploit CVE-2021-35394, affecting IoT devices with chipsets made by Realtek.
---------------------------------------------
https://unit42.paloaltonetworks.com/realtek-sdk-vulnerability/
∗∗∗ Vice Society Ransomware Group Targets Manufacturing Companies ∗∗∗
---------------------------------------------
In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry.
---------------------------------------------
https://www.trendmicro.com/en_us/research/23/a/vice-society-ransomware-grou…
∗∗∗ A step-by-step introduction to the use of ROP gadgets to bypass DEP ∗∗∗
---------------------------------------------
DEP (Data Execution Prevention) is a memory protection feature that allows the system to mark memory pages as non-executable. ROP (Return-oriented programming) is an exploit technique that allows an attacker to execute shellcode with protections such as DEP enabled.
---------------------------------------------
https://cybergeeks.tech/a-step-by-step-introduction-to-the-use-of-rop-gadge…
=====================
= Vulnerabilities =
=====================
∗∗∗ Sicherheitsupdate: Symantec Endpoint Protection als Sprungbrett für Angreifer ∗∗∗
---------------------------------------------
Aufgrund einer Schwachstelle könnten Angreifer Windows-PCs mit Sicherheitssoftware von Symantec attackieren.
---------------------------------------------
https://heise.de/-7468961
∗∗∗ iOS 16.3, iPadOS 16.3 und macOS 13.2: Welche Lücken Apple stopft ∗∗∗
---------------------------------------------
Erneut bekommen Macs, iPhones und iPads jede Menge Sicherheitsfixes. Zu den Details schweigt sich Apple teilweise mal wieder aus.
---------------------------------------------
https://heise.de/-7469023
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel and spip), Fedora (kernel), Mageia (chromium-browser-stable, docker, firefox, jpegoptim, nautilus, net-snmp, phoronix-test-suite, php, php-smarty, samba, sdl2, sudo, tor, viewvc, vim, virtualbox, and x11-server), Red Hat (bash, curl, dbus, expat, firefox, go-toolset, golang, java-1.8.0-openjdk, java-17-openjdk, kernel, kernel-rt, kpatch-patch, libreoffice, libtasn1, libtiff, libxml2, libXpm, nodejs, nodejs-nodemon, pcs, postgresql-jdbc, [...]
---------------------------------------------
https://lwn.net/Articles/921024/
∗∗∗ Critical Vulnerabilities Patched in OpenText Enterprise Content Management System ∗∗∗
---------------------------------------------
Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.
---------------------------------------------
https://www.securityweek.com/critical-vulnerabilities-patched-opentext-ente…
∗∗∗ Pgpool-II vulnerable to information disclosure ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN72418815/
∗∗∗ pgAdmin 4 vulnerable to directory traversal ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN01398015/
∗∗∗ VMSA-2023-0001 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2023-0001.html
∗∗∗ XINJE XD ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-23-024-01
∗∗∗ SOCOMEC MODULYS GP ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-23-024-02
∗∗∗ IBM WebSphere Application Server traditional container is vulnerable to information disclosure (CVE-2022-43917) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857007
∗∗∗ Vulnerability in NX-OS Firmware used by IBM c-type SAN directors and switches. ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857039
∗∗∗ FileNet Content Manager GraphQL jackson-databind security vulnerabilities, affected but not vulnerable ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857047
∗∗∗ Multiple vulnerabilities in OpenSSL affect AIX ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6857295
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 20-01-2023 18:00 − Montag 23-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Anmeldung bei ManageEngine ServiceDesk Plus MSP mit beliebigem Passwort möglich ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für die Helpdesk-Software ManageEngine ServiceDesk Plus MSP von Zoho.
---------------------------------------------
https://heise.de/-7467650
∗∗∗ "Cyberkriminelle" verschaffen sich Zugang zu Sky-Kundenkonten ∗∗∗
---------------------------------------------
Der Pay-TV-Anbieter Sky bestätigt, dass sich bösartige Akteure Zugriff zu Kundenkonten verschafft haben. Details gibt es noch nicht, der Schaden ist unklar.
---------------------------------------------
https://heise.de/-7468078
∗∗∗ Vorsicht vor Betrug bei der Wohnungssuche im Ausland ∗∗∗
---------------------------------------------
Sie planen ein Auslandssemester oder suchen für einen befristeten Zeitraum eine Wohnung oder ein WG-Zimmer? Nehmen Sie sich vor günstigen Traumwohnungen in Acht! Dahinter könnte eine Betrugsmasche stecken. Finger weg, wenn Sie ohne Besichtigung eine Zahlung leisten müssen, die angeblich von TripAdvisor, Airbnb oder Booking.com verwaltet wird. Sie verlieren Ihr Geld und stehen ohne Wohnung da.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-bei-der-wohnungssuche-fuer-…
∗∗∗ Massive ad-fraud op dismantled after hitting millions of iOS devices ∗∗∗
---------------------------------------------
A massive ad fraud operation dubbed Vastflux that spoofed more than 1,700 applications from 120 publishers, mostly for iOS, has been disrupted by security researchers at cybersecurity company HUMAN.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/massive-ad-fraud-op-dismantl…
∗∗∗ Whos Resolving This Domain?, (Mon, Jan 23rd) ∗∗∗
---------------------------------------------
Challenge of the day: To find the process that resolved a specific domain. And this is not always easy!
---------------------------------------------
https://isc.sans.edu/diary/rss/29462
∗∗∗ Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks ∗∗∗
---------------------------------------------
The legitimate command-and-control (C2) framework known as Sliver is gaining more traction from threat actors as it emerges as an open source alternative to Cobalt Strike and Metasploit. The findings come from Cybereason, which detailed its inner workings in an exhaustive analysis last week.
---------------------------------------------
https://thehackernews.com/2023/01/threat-actors-turn-to-sliver-as-open.html
∗∗∗ ShareFinder: How Threat Actors Discover File Shares ∗∗∗
---------------------------------------------
Many of our reports focus on adversarial Tactics, Techniques, and Procedures (TTPs) along with the tools associated with them. After gaining a foothold in an environment, one challenge for all [...]
---------------------------------------------
https://thedfirreport.com/2023/01/23/sharefinder-how-threat-actors-discover…
∗∗∗ Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation ∗∗∗
---------------------------------------------
Starting in July of 2022, the Windows CSRSS process entered the consciousness of the infosec community as the source of several local privilege escalation vulnerabilities in Microsoft Windows. The first public information appeared on July 12 with the release of the patch for CVE-2022-22047, which was being actively exploited. Shortly thereafter, Microsoft published an article providing some technical details [...]
---------------------------------------------
https://www.thezdi.com/blog/2023/1/23/activation-context-cache-poisoning-ex…
∗∗∗ Inglourious Drivers - A Journey of Finding Vulnerabilities in Drivers ∗∗∗
---------------------------------------------
TL;DR I discovered multiple bugs in OEM vendors for peripheral devices, which affected many users of these OEM vendors (Razer, EVGA, MSI, AMI). Many of the vulnerabilities originated in a [...]
---------------------------------------------
https://www.cyberark.com/resources/threat-research-blog/inglourious-drivers…
=====================
= Vulnerabilities =
=====================
∗∗∗ Unter Attacke: Sicherheitsleck in GTA V ermöglicht Codeschmuggel ∗∗∗
---------------------------------------------
Angreifer missbrauchen eine Sicherheitslücke im Spiel GTA V, um die Statistiken von Opfern zu verändern. Sie könnten jedoch Schadcode unterzuschieben.
---------------------------------------------
https://heise.de/-7467685
∗∗∗ Technical Advisory – U-Boot – Unchecked Download Size and Direction in USB DFU (CVE-2022-2347) ∗∗∗
---------------------------------------------
U-Boot is a popular and feature-rich bootloader for embedded systems. It includes optional support for the USB Device Firmware Update (DFU) protocol, which can be used by devices to download new firmware, or upload their current firmware. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and [...]
---------------------------------------------
https://research.nccgroup.com/2023/01/20/technical-advisory-u-boot-unchecke…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (powerline-gitstatus, tiff, and trafficserver), Fedora (dotnet6.0, firefox, git, kernel, libXpm, rust, sudo, upx, and yarnpkg), Mageia (kernel and kernel-linus), Red Hat (firefox, java-11-openjdk, and sudo), Slackware (mozilla and seamonkey), SUSE (cacti, cacti-spine, samba, and tor), and Ubuntu (firefox, php7.2, php7.4, php8.1, and python-setuptools, setuptools).
---------------------------------------------
https://lwn.net/Articles/920829/
∗∗∗ A CVE-2022-21626 vulnerability in IBM Java Runtime affects IBM Process Designer 8.5.7 shipped with IBM Business Automation Workflow ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856759
∗∗∗ Multiple vulnerability affect IBM Business Automation Workflow - CVE-2022-42003, CVE-2022-42004 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856761
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 19-01-2023 18:00 − Freitag 20-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Exploit released for critical ManageEngine RCE bug, patch now ∗∗∗
---------------------------------------------
Proof-of-concept exploit code is now available for a remote code execution (RCE) vulnerability in multiple Zoho ManageEngine products.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/exploit-released-for-critica…
∗∗∗ Exploiting null-dereferences in the Linux kernel ∗∗∗
---------------------------------------------
While the null-dereference bug itself was fixed in October 2022, the more important fix was the introduction of an oops limit which causes the kernel to panic if too many oopses occur. While this patch is already upstream, it is important that distributed kernels also inherit this oops limit and backport it to LTS releases if we want to avoid treating such null-dereference bugs as full-fledged security issues in the future.
---------------------------------------------
https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences…
∗∗∗ Importance of signing in Windows environments, (Fri, Jan 20th) ∗∗∗
---------------------------------------------
NTLM relaying has been a plague in Windows environments for many years and we have witnessed many exploits that rely on the fact that it is possible to relay NTLM authentication attempts to various target services.
---------------------------------------------
https://isc.sans.edu/diary/rss/29456
∗∗∗ Vulnerable WordPress Sites Compromised with Different Database Infections ∗∗∗
---------------------------------------------
Vulnerabilities within WordPress can lead to compromise, and oftentimes known vulnerabilities are utilized to infect WordPress sites with more than one infection. It is common for out of date websites to be attacked by multiple threat actors or targeted by the same attacker using multiple different channels. We recently came across a database injection that has two different pieces of malware accomplishing two unrelated goals.
---------------------------------------------
https://blog.sucuri.net/2023/01/vulnerable-wordpress-sites-compromised-with…
∗∗∗ New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability ∗∗∗
---------------------------------------------
Earlier this month, Fortinet disclosed that unknown hacking groups have capitalized on the shortcoming to target governments and other large organizations with a generic Linux implant capable of delivering additional payloads and executing commands sent by a remote server.
---------------------------------------------
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.ht…
∗∗∗ Neue Love-Scam Masche: Wenn die Internetbekanntschaft Sie zum Online-Handel überredet ∗∗∗
---------------------------------------------
Betrügerische Internetbekanntschaften versuchen auf unterschiedlichsten Wegen an Ihr Geld zu kommen. Bei einer neuen Masche erschleichen sich die Kriminellen Ihr Vertrauen, um Sie später auf den Online-Marktplatz haremark.
---------------------------------------------
https://www.watchlist-internet.at/news/neue-love-scam-masche-wenn-die-inter…
∗∗∗ CVE-2022-35690: Unauthenticated RCE in Adobe ColdFusion ∗∗∗
---------------------------------------------
n this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Lucas Miller and Dusan Stevanovic of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in Adobe ColdFusion.
---------------------------------------------
https://www.thezdi.com/blog/2023/1/18/cve-2022-35690-unauthenticated-rce-in…
∗∗∗ NCSC to retire Logging Made Easy ∗∗∗
---------------------------------------------
The NCSC is retiring Logging Made Easy (LME). After 31 March 2023, we will no longer support LME, and the GitHub page will close shortly after.
---------------------------------------------
https://www.ncsc.gov.uk/blog-post/ncsc-to-retire-logging-made-easy
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco: Hochriskantes Sicherheitsleck in Unified Communications Manager ∗∗∗
---------------------------------------------
In der Unified Communications Manager-Software von Cisco klafft eine Sicherheitslücke mit hohem Risiko. Der Hersteller stellt Updates zum Schließen bereit.
---------------------------------------------
https://heise.de/-7465203
∗∗∗ Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434) ∗∗∗
---------------------------------------------
The Galaxy App Store is an alternative application store that comes pre-installed on Samsung Android devices. Several Android applications are available on both the Galaxy App Store and Google App Store, and users have the option to use either store to install specific applications.
---------------------------------------------
https://research.nccgroup.com/2023/01/20/technical-advisory-multiple-vulner…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (lava and libitext5-java), Oracle (java-11-openjdk, java-17-openjdk, and libreoffice), SUSE (firefox, git, mozilla-nss, postgresql-jdbc, and sudo), and Ubuntu (git, linux-aws-5.4, linux-gkeop, linux-hwe-5.4, linux-oracle, linux-snapdragon, linux-azure, linux-gkeop, linux-intel-iotg, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle-5.15, and linux-bluefield).
---------------------------------------------
https://lwn.net/Articles/920646/
∗∗∗ Vulnerability Spotlight: XSS vulnerability in Ghost CMS ∗∗∗
---------------------------------------------
The TALOS-2022-1686 (CVE-2022-47194-CVE-2022-47197) shows that several XSS vulnerabilities could lead to privilege escalation.
---------------------------------------------
https://blog.talosintelligence.com/vulnerability-spotlight-xss-vulnerabilit…
∗∗∗ Hitachi Energy PCU400 ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-23-019-01
∗∗∗ ;">uniFLOW MOM Tech Support Potential Data Exposure Vulnerability – 20 January 2023 ∗∗∗
---------------------------------------------
https://www.canon-europe.com/support/product-security-latest-news/
∗∗∗ Vulnerability in minimatch affects IBM Process Mining . CVE-2022-3517 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856471
∗∗∗ Content Manager Enterprise Edition is affected by a vulnerability in FasterXML jackson ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856659
∗∗∗ Content Manager Enterprise Edition is affected by a vulnerability in FasterXML jackson ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856661
∗∗∗ Liberty is vulnerable to denial of service due to GraphQL Java affecting IBM TXSeries for Multiplatforms ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856687
∗∗∗ IBM UrbanCode Release is affected by CVE-2022-42252 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856719
∗∗∗ IBM UrbanCode Release is affected by CVE-2022-42252 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856717
∗∗∗ IBM UrbanCode Release is affected by CVE-2022-34305 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856713
∗∗∗ IBM UrbanCode Release is affected by CVE-2022-45143 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856721
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 18-01-2023 18:00 − Donnerstag 19-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Illegal Solaris darknet market hijacked by competitor Kraken ∗∗∗
---------------------------------------------
Solaris, a large darknet marketplace focused on drugs and illegal substances, has been taken over by a smaller competitor named Kraken, who claims to have hacked it on January 13, 2022.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/illegal-solaris-darknet-mark…
∗∗∗ Microsoft investigates bug behind unresponsive Windows Start Menu ∗∗∗
---------------------------------------------
Microsoft is investigating an issue causing the Windows taskbar and Start Menu to become unresponsive and triggering Outlook and Teams login problems.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-investigates-bug-…
∗∗∗ PayPal accounts breached in large-scale credential stuffing attack ∗∗∗
---------------------------------------------
PayPal is sending out notices of a data breach to thousands of users who had their accounts accessed by credential stuffing actors, resulting in the compromise of some personal data.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/paypal-accounts-breached-in-…
∗∗∗ New Blank Image attack hides phishing scripts in SVG files ∗∗∗
---------------------------------------------
An unusual phishing technique has been observed in the wild, hiding empty SVG files inside HTML attachments pretending to be DocuSign documents.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-blank-image-attack-hides…
∗∗∗ Roaming Mantis implements new DNS changer in its malicious mobile app in 2022 ∗∗∗
---------------------------------------------
Roaming Mantis (a.k.a Shaoye) is a long-term cyberattack campaign that uses malicious Android package (APK) files to control infected Android devices and steal data.
---------------------------------------------
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/1…
∗∗∗ SPF and DMARC use on 100k most popular domains, (Thu, Jan 19th) ∗∗∗
---------------------------------------------
Not too long ago, I wrote a diary discussing SPF and DMARC use on GOV subdomains in different ccTLDs around the world. The results werent too optimistic, it turned out that only about 42% of gov.cctld domains had a valid SPF record published and only about 19% of such domains had a valid DMARC record published.
---------------------------------------------
https://isc.sans.edu/diary/rss/29452
∗∗∗ Android Users Beware: New Hook Malware with RAT Capabilities Emerges ∗∗∗
---------------------------------------------
The threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new capabilities to access files stored in the devices and create a remote interactive session.
---------------------------------------------
https://thehackernews.com/2023/01/android-users-beware-new-hook-malware.html
∗∗∗ CircleCI: Malware stole GitHub OAuth keys, bypassing 2FA ∗∗∗
---------------------------------------------
CircleCI, a big name in the DevOps space, has released an incident report about a data breach it experienced early this month.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2023/01/circleci-malware-stole-githu…
∗∗∗ Pwned or Bot ∗∗∗
---------------------------------------------
Its fascinating to see how creative people can get with breached data. Of course theres all the nasty stuff (phishing, identity theft, spam), but there are also some amazingly positive uses for data illegally taken from someone elses system.
---------------------------------------------
https://www.troyhunt.com/pwned-or-bot/
∗∗∗ LockBit ransomware – what you need to know ∗∗∗
---------------------------------------------
It is the worlds most active ransomware group - responsible for an estimated 40% of all ransomware infections worldwide. Find out what you need to know about LockBit in my article on the Tripwire State of Security blog.
---------------------------------------------
https://www.tripwire.com/state-of-security/lockbit-ransomware-what-you-need…
∗∗∗ Windows 11 22H2: Systemwiederherstellung verursacht "This app can’t open"-Fehler ∗∗∗
---------------------------------------------
Ich höre zwar immer wieder "läuft ohne Probleme", aber für den Fall der Fälle, also falls Windows 11 22H2 mal Schluckauf haben sollte und den Fehler "Diese App kann nicht geöffnet werden" zeigt, da hätte ich was zur Ursache. Hochoffiziell von Microsoft als Fehler bestätigt.
---------------------------------------------
https://www.borncity.com/blog/2023/01/19/windows-11-22h2-systemwiederherste…
∗∗∗ Windows 10: "Schlagloch" Windows PE-Patch zum Fix der Bitlocker-Bypass-Schwachstelle CVE-2022-41099 ∗∗∗
---------------------------------------------
Nachtrag zum Januar 2023 Patchday für Windows. Es gibt in der Windows PE-Umgebung von Windows 10 eine Schwachstelle (CVE-2022-41099), die eine Umgehung der Bitlocker-Verschlüsselung umgeht. Zum Fixen muss die Windows PE-Umgebung der Clients manuell aktualisiert werden.
---------------------------------------------
https://www.borncity.com/blog/2023/01/19/windows-10-schlagloch-windows-pe-p…
∗∗∗ Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest ∗∗∗
---------------------------------------------
In this blog, we’ll tackle encrypting AWS in transit and at rest.
---------------------------------------------
https://cybersecurity.att.com/blogs/security-essentials/improve-your-aws-se…
∗∗∗ Following the LNK metadata trail ∗∗∗
---------------------------------------------
While tracking some prevalent commodity malware threat actors, Talos observed the popularization of malicious LNK files as their initial access method to download and execute payloads.
---------------------------------------------
https://blog.talosintelligence.com/following-the-lnk-metadata-trail/
∗∗∗ Darth Vidar: The Dark Side of Evolving Threat Infrastructure ∗∗∗
---------------------------------------------
Vidar is an info-stealer malware, which was first spotted in the wild in late 2018 by the security researcher Fumik0. Upon initial inspection, the identified sample appeared to be Arkei (another info-stealer), however differences in both the sample’s code and C2 communications were observed.
---------------------------------------------
https://www.team-cymru.com/post/darth-vidar-the-dark-side-of-evolving-threa…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, libitext5-java, sudo, and webkit2gtk), Fedora (firefox and qemu), Red Hat (java-11-openjdk and java-17-openjdk), Slackware (sudo), SUSE (sudo), and Ubuntu (python-urllib3 and sudo).
---------------------------------------------
https://lwn.net/Articles/920478/
∗∗∗ Cisco Patches High-Severity SQL Injection Vulnerability in Unified CM ∗∗∗
---------------------------------------------
Cisco on Wednesday announced patches for a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).
---------------------------------------------
https://www.securityweek.com/cisco-patches-high-severity-sql-injection-vuln…
∗∗∗ CSRF Vulnerability in Kudu SCM Allowed Code Execution in Azure Services ∗∗∗
---------------------------------------------
A cross-site request forgery (CSRF) vulnerability impacting the source control management (SCM) service Kudu could be exploited to achieve remote code execution (RCE) in multiple Azure services, cloud infrastructure security firm Ermetic has discovered.
---------------------------------------------
https://www.securityweek.com/csrf-vulnerability-kudu-scm-allowed-code-execu…
∗∗∗ Drupal core - Moderately critical - Information Disclosure - SA-CORE-2023-001 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-core-2023-001
∗∗∗ [R1] Nessus Version 8.15.8 Fixes One Vulnerability ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2023-02
∗∗∗ Vulnerability in SANNav Software used by IBM b-type SAN directors and switches. ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856209
∗∗∗ IBM Security Guardium is affected by a gson-1.7.1.jar vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856221
∗∗∗ IBM Security Guardium is affected by a denial of service vulnerability (CVE-2022-25647) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856221
∗∗∗ IBM Cloud Pak for Security includes components with multiple known vulnerabilities (CVE-2022-48195, CVE-2022-29577, CVE-2022-28367, CVE-2015-6420) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856401
∗∗∗ IBM Cloud Pak for Security includes components with multiple known vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856409
∗∗∗ IBM Cloud Pak for Security (CP4S) is vulnerable to information disclosure (CVE-2021-39011) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856403
∗∗∗ IBM Cloud Pak for Security (CP4S) is vulnerable to information disclosure (CVE-2021-39089) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856405
∗∗∗ IBM Cloud Pak for Security (CP4S) is vulnerable to information disclosure (CVE-2021-39090) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856407
∗∗∗ Multiple vulnerabilities in IBM Java - OpenJ9 affect IBM Tivoli System Automation for Multiplatforms (CVE-2021-28167) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856439
∗∗∗ Multiple vulnerabilities in IBM Java - OpenJ9 affect IBM Tivoli System Automation Application Manager (CVE-2021-28167) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856443
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 17-01-2023 18:00 − Mittwoch 18-01-2023 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ RC4 Is Still Considered Harmful ∗∗∗
---------------------------------------------
Ive been spending a lot of time researching Windows authentication implementations, specifically Kerberos. In June 2022 I found an interesting issue number 2310 with the handling of RC4 encryption that allowed you to authenticate as another user if you could either interpose on the Kerberos network traffic to and from the KDC or directly if the user was configured to disable typical pre-authentication requirements. This blog post goes into more detail [...]
---------------------------------------------
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harm…
∗∗∗ Malicious Google Ad --> Fake Notepad++ Page --> Aurora Stealer malware, (Wed, Jan 18th) ∗∗∗
---------------------------------------------
https://isc.sans.edu/diary/rss/29448
∗∗∗ Is WordPress Secure? ∗∗∗
---------------------------------------------
According to W3Techs, 43.2% of all websites on the internet use WordPress. And of all websites that use a CMS (Content Management System) more than half (64%) leverage WordPress to power their blog or website. Unfortunately, since WordPress has such a large market share it has also become a prime target for attackers. You might be wondering whether WordPress is safe to use. And the short answer is yes - WordPress core is safe to use, but only if you maintain it to the latest version and [...]
---------------------------------------------
https://blog.sucuri.net/2023/01/is-wordpress-secure.html
∗∗∗ CISA Warns of Flaws in Siemens, GE Digital, and Contec Industrial Control Systems ∗∗∗
---------------------------------------------
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published four Industrial Control Systems (ICS) advisories, calling out several security flaws affecting products from Siemens, GE Digital, and Contec. The most critical of the issues have been identified in Siemens SINEC INS that could lead to remote code execution via a path traversal flaw (CVE-2022-45092, CVSS score: 9.9)
---------------------------------------------
https://thehackernews.com/2023/01/cisa-warns-of-flaws-in-siemens-ge.html
∗∗∗ Jetzt patchen! Tausende Firewalls von Sophos angreifbar ∗∗∗
---------------------------------------------
Sicherheitsforscher haben das Internet auf verwundbare Sophos-Firewalls gescannt und sind fündig geworden. Sicherheitspatches gibt es seit Dezember 2022.
---------------------------------------------
https://heise.de/-7462565
∗∗∗ MSI-Motherboards sollen trotz aktivem Secure Boot manipulierte Systeme starten ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat herausgefunden, dass der Schutzmechanismus Secure Boot auf MSI-Motherboards standardmäßig aktiv ist, aber trotzdem alles durchwinkt.
---------------------------------------------
https://heise.de/-7462913
∗∗∗ Hochriskante Sicherheitslücken in Qt "nur ein Bug" ∗∗∗
---------------------------------------------
IT-Sicherheitsforscher von Cisco Thalos haben hochriskante Sicherheitslücken in Qt-QML gefunden. Qt sieht App-Entwickler am Zuge und stuft sie nur als Bug ein.
---------------------------------------------
https://heise.de/-7462956
∗∗∗ Vendors Actively Bypass Security Patch for Year-Old Magento Vulnerability ∗∗∗
---------------------------------------------
Vendors and agencies are actively bypassing the security patch that Adobe released in February 2022 to address CVE-2022-24086, a critical mail template vulnerability in Adobe Commerce and Magento stores, ecommerce security firm Sansec warns.
---------------------------------------------
https://www.securityweek.com/vendors-actively-bypass-security-patch-year-ol…
∗∗∗ The Defender’s Guide to Windows Services ∗∗∗
---------------------------------------------
This is the second installment of the Defender’s Guide series. In keeping with the theme, we are discussing Windows Services, the underlying technology, common attack vectors, and methods of securing/monitoring them.
---------------------------------------------
https://posts.specterops.io/the-defenders-guide-to-windows-services-67c1711…
∗∗∗ Silo, or not silo, that is the question ∗∗∗
---------------------------------------------
As we (security folks) were working on the hardening of WSUS update servers, we had to answer an interesting question dealing with how to best isolate a sensitive server like WSUS on on-premises Active Directory. The question was: should I put my WSUS server into my T0 silo?
---------------------------------------------
https://medium.com/tenable-techblog/silo-or-not-silo-that-is-the-question-d…
∗∗∗ Elastic IP Transfer: Identifying and Mitigating Risks from a New Attack-Vector on AWS ∗∗∗
---------------------------------------------
Elastic IPs (EIPs) are public and static IPv4 addresses provided by AWS. EIPs can be viewed as a pool of IPv4 addresses, accessible from the internet, that can be used in numerous ways. Once an EIP is allocated to an AWS account, it can be associated with a single compute instance or an elastic network [...]
---------------------------------------------
https://orca.security/resources/blog/elastic-ip-transfer-attack-vector-on-a…
∗∗∗ An in-depth HTTP Strict Transport Security Tutorial ∗∗∗
---------------------------------------------
HSTS is an Internet standard and policy that tells the browser to only interact with a website using a secure HTTPS connection. Check out this article to learn how to leverage the security of your website and customers’ data and the security benefits you’ll gain from doing so.
---------------------------------------------
https://www.trendmicro.com/en_us/devops/23/a/http-strict-transport-security…
∗∗∗ Kriminelle versprechen Geld für Haarspenden auf Job-Börsen, aber zahlen nicht! ∗∗∗
---------------------------------------------
Wenn Sie auf Facebook in diversen Job-Börsen nach einer Beschäftigung suchen, stoßen Sie womöglich auf ein verlockendes Angebot für Ihre Haare. Um für Krebskranke Perücken anzufertigen, ist man bereit, Ihnen bis zu 2000 Euro für Ihre Haare zu bezahlen. Achtung: Wenn Sie hier Kontakt aufnehmen, gibt man Ihnen genaue Anweisungen zum Abschneiden Ihrer Haare und verspricht eine Bezahlung bei Abholung. Doch dann sind Ihre Haare ab, Sie werden blockiert und [...]
---------------------------------------------
https://www.watchlist-internet.at/news/kriminelle-versprechen-geld-fuer-haa…
=====================
= Vulnerabilities =
=====================
∗∗∗ Patchday: Sicherheitslücken in über 100 Oracle-Produkten ∗∗∗
---------------------------------------------
Das erste Oracle Critical Patch Update des Jahres 2023 liefert Beschreibungen und Updates für Sicherheitslücken in mehr als 100 Produkten des Unternehmens.
---------------------------------------------
https://heise.de/-7462438
∗∗∗ Versionsverwaltung: Git schließt zwei kritische Lücken in Version 2.39 ∗∗∗
---------------------------------------------
Sicherheitsforscher haben Lücken in Git entdeckt, durch die beliebiger Code ausgeführt werden konnte. Patches stehen bereit, Nutzer sollten umgehend updaten.
---------------------------------------------
https://heise.de/-7462680
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (awstats), Oracle (dpdk, libxml2, postgresql:10, systemd, and virt:ol and virt-devel:rhel), Red Hat (kernel), Slackware (git, httpd, libXpm, and mozilla), SUSE (libzypp-plugin-appdata), and Ubuntu (git, libxpm, linux-ibm-5.4, linux-oem-5.14, and ruby2.3).
---------------------------------------------
https://lwn.net/Articles/920318/
∗∗∗ Remote Code Execution Vulnerabilities Found in TP-Link, NetComm Routers ∗∗∗
---------------------------------------------
Vulnerabilities identified in TP-Link and NetComm router models could be exploited to achieve remote code execution (RCE).Two security defects were identified in TP-Link WR710N-V1-151022 and Archer-C5-V2-160201 SOHO (small office/home office) routers, allowing attackers to execute code, crash devices, or guess login credentials.
---------------------------------------------
https://www.securityweek.com/remote-code-execution-vulnerabilities-found-tp…
∗∗∗ IBM Navigator for i is vulnerable to log file access, obtaining file attributes, and SQL Injection attacks due to multiple vulnerabilities. ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6850801
∗∗∗ Security Advisory - System Command Injection Vulnerability in a Huawei Printer Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-sciviahpp…
∗∗∗ Security Advisory - Misinterpretation of Input in a Huawei Printer Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-moiiahpp-…
∗∗∗ Security Advisory - Data Processing Error Vulnerability in a Huawei Band ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-dpeviahb-…
∗∗∗ Security Advisory - Buffer Overflow Vulnerability in a Huawei Printer Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-boviahpp-…
∗∗∗ Security Advisory - System Command Injection Vulnerability in a Huawei Printer Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-sciviahpp…
∗∗∗ Security Advisory - Misinterpretation of Input Vulnerability in Huawei Printer ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-moivihp-5…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily