=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-07-2024 18:00 − Mittwoch 31-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Black Basta ransomware switches to more evasive custom malware ∗∗∗
---------------------------------------------
The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/black-basta-ransomware-switc…
∗∗∗ Fraud ring pushes 600+ fake web shops via Facebook ads ∗∗∗
---------------------------------------------
A malicious fraud campaign dubbed "ERIAKOS" promotes more than 600 fake web shops through Facebook advertisements to steal visitors personal and financial information.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fraud-ring-pushes-600-plus-f…
∗∗∗ Kampf gegen Cyberkriminalität: Spamhaus Project wirft Cloudflare Untätigkeit vor ∗∗∗
---------------------------------------------
Laut Spamhaus macht sich Cloudflare "das Leben leicht", indem es Beschwerden über böswillige Aktivitäten weiterreicht, statt selber Maßnahmen einzuleiten.
---------------------------------------------
https://www.golem.de/news/kampf-gegen-cyberkriminalitaet-spamhaus-project-w…
∗∗∗ Apple Patches Everything. July 2024 Edition ∗∗∗
---------------------------------------------
Yesterday, Apple released patches across all of its operating systems. A standalone patch for Safari was released to address WebKit problems in older macOS versions. Apple does not provide CVSS scores or severity ratings. The ratings ..
---------------------------------------------
https://isc.sans.edu/forums/diary/Apple+Patches+Everything+July+2024+Editio…
∗∗∗ SYS01 Infostealer and Rilide Malware Likely Developed by the Same Threat Actor ∗∗∗
---------------------------------------------
Drawing on extensive proprietary research, Trustwave SpiderLabs believes the threat actors behind the Facebook malvertising infostealer SYS01 are the same group that developed the previously reported Rilide malware.
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/sys01-infos…
∗∗∗ Five months after takedown, LockBit is a shadow of its former self ∗∗∗
---------------------------------------------
An unprecedented period for an unparalleled force in cybercrime Feature For roughly two years, LockBits ransomware operation was by far the most prolific of its kind, until the fateful events of February. After claiming thousands of victims, extorting hundreds of millions of dollars, and building a robust army of sophisticated cybercriminals, the lifes ..
---------------------------------------------
https://www.theregister.com/2024/07/31/five_months_after_lockbit/
∗∗∗ ThreatLabz Ransomware Report: Unveiling a $75M Ransom Payout Amid Rising Attacks ∗∗∗
---------------------------------------------
Ransomware has been a daunting threat to organizations worldwide for decades. Recent trends show that ransomware attacks continue to grow more advanced and persistent. It’s become increasingly clear that no one is spared as cybercriminals carry out attacks that even target the children of corporate executives to force ransom payments. Despite the ..
---------------------------------------------
https://www.zscaler.com/blogs/security-research/threatlabz-ransomware-repor…
∗∗∗ Don’t Let Your Domain Name Become a “Sitting Duck” ∗∗∗
---------------------------------------------
More than a million domain names -- including many registered by Fortune 100 firms and brand protection companies -- are vulnerable to takeover by cybercriminals thanks to authentication weaknesses at a number of large web hosting providers and domain registrars, new research finds.
---------------------------------------------
https://krebsonsecurity.com/2024/07/dont-let-your-domain-name-become-a-sitt…
∗∗∗ Deutschland bestellt chinesischen Botschafter wegen Cyberangriff ein ∗∗∗
---------------------------------------------
Die Attacke ereignete sich im Jahr 2021 und kann laut Nachrichtendiensten chinesischen staatlichen Akteuren zugeordnet werden
---------------------------------------------
https://www.derstandard.at/story/3000000230669/deutschland-bestellt-chinesi…
∗∗∗ DigiCert Certificate Revocations ∗∗∗
---------------------------------------------
DigiCert, a certificate authority (CA) organization, is revoking a subset of transport layer security (TLS) certificates due to a non-compliance issue with domain control verification (DCV). Revocation of these certificates may cause temporary disruptions to websites, services, and applications relying on these certificates for secure ..
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/07/30/digicert-certificate-rev…
∗∗∗ Cyber-Angriff und Bug Ursache des Microsoft Cloud-Ausfalls vom 30.7.2024 ∗∗∗
---------------------------------------------
Am 30. Juli 2024 kam es weltweit zu einem partiellen Ausfall der Microsoft Cloud-Dienste (Azure, Microsoft 365 etc.). Ich hatte berichtet – aber nicht alle Nutzer waren betroffen. Nun hat Microsoft einen Post Incident-Report vorgelegt ..
---------------------------------------------
https://www.borncity.com/blog/2024/07/31/cyber-angriff-und-bug-ursache-des-…
∗∗∗ Moderne Sklaverei: Mann monatelang festgehalten und zu Online-Betrug gezwungen ∗∗∗
---------------------------------------------
Ein IT-Spezialist wurde monatelang unter Folter dazu gezwungen, sich als eine reiche Frau aus Singapur auszugeben. Das berichtet das Wall Street Journal.
---------------------------------------------
https://heise.de/-9818990
∗∗∗ Statt "schalke04" und "1234": Passkeys werden immer beliebter ∗∗∗
---------------------------------------------
Die passwortlose Authentifizierung etabliert sich, wie aktuelle Zahlen nahelegen. Insbesondere Kunden bei Amazon, eBay und Co. setzen Passkeys inzwischen ein.
---------------------------------------------
https://heise.de/-9819866
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (xdg-desktop-portal-hyprland), Red Hat (freeradius, freeradius:3.0, git-lfs, httpd, kernel, openssh, and varnish:6), SUSE (cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont, ..
---------------------------------------------
https://lwn.net/Articles/984080/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-07-2024 18:00 − Dienstag 30-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ New Specula tool uses Outlook for remote code execution in Windows ∗∗∗
---------------------------------------------
Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm TrustedSec.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-specula-tool-uses-outloo…
∗∗∗ DigiCert mass-revoking TLS certificates due to domain validation bug ∗∗∗
---------------------------------------------
DigiCert is warning that it will be mass-revoking SSL/TLS certificates due to a bug in how the company verified if a customer owned or operated a domain and requires impacted customers to reissue certificates within 24 hours.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/digicert-mass-revoking-tls-c…
∗∗∗ Post-CrowdStrike, Microsoft to discourage use of kernel drivers by security tools ∗∗∗
---------------------------------------------
Microsoft has vowed to reduce cybersecurity vendors' reliance on kernel-mode code, which was at the heart of the CrowdStrike super-snafu this month.
---------------------------------------------
https://www.theregister.com/2024/07/29/microsoft_crowdstrike_kernel_mode/
∗∗∗ Vorsicht vor plötzlichen Erbschaften ∗∗∗
---------------------------------------------
Eine unbekannte Person kontaktiert Sie per E-Mail oder über Soziale Netzwerke. Sie stellt sich beispielsweise als „Gouverneur der Bank von Thailand“ vor und behauptet, dass Sie eine große Summe Geld erben werden. Um glaubwürdig zu wirken, schickt die Person als Beweis Ausweiskopien, Zertifikate und KI-generierte Videobotschaften. Ignorieren Sie solche Nachrichten, es handelt sich um Betrug!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-ploetzlichen-erbschafte…
∗∗∗ Deep Sea Phishing Pt. 2 ∗∗∗
---------------------------------------------
I wanted to write this blog about several good techniques for endpoint detection and response (EDR) evasion; however, as I was writing about how to evade EDRs, I was hit with an epiphany: “EDR evasion is all about looking like legitimate software” — ph3eds, 2024
---------------------------------------------
https://posts.specterops.io/deep-sea-phishing-pt-2-29c48f1e214e?source=rss-…
∗∗∗ Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 1 ∗∗∗
---------------------------------------------
In this blog series, we will discuss two additional techniques that take advantage of legacy functionality within Windows and provide various examples through the over 20 vulnerabilities that we found. We will also address some failures despite efforts and explanations from our side with various vendors.
---------------------------------------------
https://www.thezdi.com/blog/2024/7/29/breaking-barriers-and-assumptions-tec…
∗∗∗ Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List ∗∗∗
---------------------------------------------
USDoD hacker scrapes and leaks a 100,000-line Indicator of Compromise (IoC) list from CrowdStrike, revealing detailed threat intelligence data. The leak, posted on Breach Forums, includes critical insights into the Mispadu malware and SAMBASPIDER threat actor.
---------------------------------------------
https://hackread.com/hacker-scrapes-publishes-crowdstrike-ioc-list/
∗∗∗ Dont RegreSSH An Anti-Pavlovian Approach to Celebrity Vulns ∗∗∗
---------------------------------------------
Before Crowdstrike caused the world to melt down for a few days, the talk of the security town was a recent OpenSSH vulnerability. Lets revisit CVE-2024-6387.
---------------------------------------------
https://www.bitsight.com/blog/dont-regressh-anti-pavlovian-approach-celebri…
=====================
= Vulnerabilities =
=====================
∗∗∗ Kritische Sicherheitslücke in VMware ESXi - aktiv ausgenutzt - Update verfügbar ∗∗∗
---------------------------------------------
Sicherheitsforscher:innen von Microsoft haben eine kritische Sicherheitslücke in VMware ESXi entdeckt, deren Ausnutzung es Angreifer:innen ermöglicht die vollständige Kontrolle über einen von der Schwachstelle betroffenen Hypervisor zu übernehmen. Die Lücke wird bereits aktiv für Ransomware-Angriffe missbraucht. CVE-Nummer(n): CVE-2024-37085
---------------------------------------------
https://www.cert.at/de/warnungen/2024/7/kritische-sicherheitslucke-in-vmwar…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (curl), Mageia (virtualbox), Oracle (squid), Red Hat (kernel), SUSE (apache2, bind, cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, devscripts, espeak-ng, freerdp, ghostscript, gnome-shell, gtk2, gtk3, java-11-openjdk, java-17-openjdk, kubevirt, libgit2, openssl-3, orc, p7zip, python-dnspython, and shadow), and Ubuntu (kernel, linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-nvidia, linux-oem-6.8, linux-raspi, linux, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-raspi, linux-xilinx-zynqmp, linux-aws, linux-aws-5.4, linux-aws-5.15, linux-ibm, linux-ibm-5.15, linux-raspi, linux-gcp-5.15, and linux-lowlatency).
---------------------------------------------
https://lwn.net/Articles/983935/
∗∗∗ WordPress Vulnerability & Patch Roundup July 2024 ∗∗∗
---------------------------------------------
https://blog.sucuri.net/2024/07/wordpress-vulnerability-patch-roundup-july-…
∗∗∗ ManageEngine (Exchange Reporter Plus, Exchange Reporter Plus) Family July 2024 Security Update Advisory ∗∗∗
---------------------------------------------
https://asec.ahnlab.com/en/80826/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 26-07-2024 18:00 − Montag 29-07-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Mehr als 3.000 Hotels betroffen: API-Lücke lässt Angreifer Hoteltüren öffnen ∗∗∗
---------------------------------------------
In vielen Hotels können Gäste heute per Smartphone einchecken und die Türen der gebuchten Zimmer öffnen. Eine API-Schwachstelle zeigt, wie schnell das zum Problem werden kann.
---------------------------------------------
https://www.golem.de/news/mehr-als-3-000-hotels-betroffen-api-luecke-laesst…
∗∗∗ Sicherheitslücke: Whatsapp für Windows führt Skripte ohne Warnung aus ∗∗∗
---------------------------------------------
In der Regel blockiert Whatsapp das Öffnen ausführbarer Dateien direkt aus dem Chat heraus. Bei Python- und PHP-Skripten ist das offenkundig nicht der Fall. [..] Ein Patch ist vorerst nicht zu erwarten, so dass Nutzer achtsam bleiben sollten.
---------------------------------------------
https://www.golem.de/news/sicherheitsluecke-whatsapp-fuer-windows-fuehrt-sk…
∗∗∗ Mandrake spyware sneaks onto Google Play again, flying under the radar for two years ∗∗∗
---------------------------------------------
Mandrake spyware threat actors resume attacks with new functionality targeting Android devices while being publicly available on Google Play.
---------------------------------------------
https://securelist.com/mandrake-apps-return-to-google-play/113147/
∗∗∗ Create Your Own BSOD: NotMyFault, (Sat, Jul 27th) ∗∗∗
---------------------------------------------
With all the Blue Screen Of Death screenshots we saw lately, I got the idea to write about Sysinternals' tool NotMyFault.
---------------------------------------------
https://isc.sans.edu/diary/rss/31120
∗∗∗ CrowdStrike Outage Themed Maldoc, (Mon, Jul 29th) ∗∗∗
---------------------------------------------
I found a malicious Word document with VBA code using the CrowdStrike outage for social engineering purposes. It's an .ASD file (AutoRecover file).
---------------------------------------------
https://isc.sans.edu/diary/rss/31116
∗∗∗ Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails ∗∗∗
---------------------------------------------
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoints defenses to send millions of messages spoofing various legitimate companies.
---------------------------------------------
https://thehackernews.com/2024/07/proofpoint-email-routing-flaw-exploited.h…
∗∗∗ Millions of Websites Susceptible XSS Attack via OAuth Implementation Flaw ∗∗∗
---------------------------------------------
Researchers discovered and published details of an XSS attack that could potentially impact millions of websites around the world.
---------------------------------------------
https://www.securityweek.com/millions-of-websites-susceptible-xss-attack-vi…
∗∗∗ CISA Adds Three Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CVE-2024-4879 ServiceNow Improper Input Validation Vulnerability,
CVE-2024-5217 ServiceNow Incomplete List of Disallowed Inputs Vulnerability,
CVE-2023-45249 Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/07/29/cisa-adds-three-known-ex…
∗∗∗ Angreifer nutzen Schadcode-Lücke in Acronis Cyber Infrastructure aus ∗∗∗
---------------------------------------------
In mehreren aktualisierten Versionen von Acronis Cyber Infrastructure haben die Entwickler eine kritische Lücke geschlossen.
---------------------------------------------
https://heise.de/-9816667
=====================
= Vulnerabilities =
=====================
∗∗∗ Wiedergabe reicht aus: MacOS-Lücke ermöglicht Schadcode-Attacke per Video ∗∗∗
---------------------------------------------
Das Abspielen eines Videos im Browser oder einer anderen Anwendung reicht aus, um sich unter MacOS eine Malware einzufangen. Ursache ist eine Lücke in einem Videodecoder.
---------------------------------------------
https://www.golem.de/news/wiedergabe-reicht-aus-macos-luecke-ermoeglicht-sc…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (java-11-openjdk), Debian (bind9), Fedora (darkhttpd, mod_http2, and python-scrapy), Red Hat (python3.11, rhc-worker-script, and thunderbird), SUSE (assimp, gh, opera, python-Django, and python-nltk), and Ubuntu (edk2, linux, linux-aws, linux-gcp, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-nvidia-6.5, linux-oracle, linux-raspi, and lua5.4).
---------------------------------------------
https://lwn.net/Articles/983816/
∗∗∗ Sicherheitsupdate schützt SolarWinds Platform vor möglichen Attacken ∗∗∗
---------------------------------------------
Angreifer können die IT-Verwaltungssoftware SolarWinds Platform attackieren. Die Entwickler haben mehrere Schwachstellen geschlossen. [..] Aus den Details zur Version 2024.2.1 geht hervor, dass eine Lücke (CVE-2022-37601) in webpack.js als "kritisch" gilt. Hier können Angreifer auf einem nicht näher beschriebenen Weg eigenen Code ausführen.
---------------------------------------------
https://heise.de/-9816342
∗∗∗ ABB: 2024-07-26: Cyber Security Advisory - CODESYS OPC DA Server 3.5 Insecure storage of passwords ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=3ADR011267&Language…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-07-2024 18:00 − Freitag 26-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Mit Test-Key für Secure Boot: PC-Hersteller liefern unsichere UEFI-Firmware aus ∗∗∗
---------------------------------------------
Betroffen sind angeblich fast 900 verschiedene Systeme namhafter Hersteller wie Lenovo, Dell und HP. Anfällige Firmwares reichen zurück bis ins Jahr 2012.
---------------------------------------------
https://www.golem.de/news/mit-test-key-fuer-secure-boot-pc-hersteller-liefe…
∗∗∗ Forscher warnen: Daten aus gelöschten und privaten Github-Repos frei abrufbar ∗∗∗
---------------------------------------------
Github-Repositories enthalten nicht selten sensible Daten. Ein Repo zu löschen oder auf privat zu stellen, schützt aber nicht immer vor einem Fremdzugriff.
---------------------------------------------
https://www.golem.de/news/forscher-warnen-daten-aus-geloeschten-und-private…
∗∗∗ ExelaStealer Delivered "From Russia With Love" ∗∗∗
---------------------------------------------
Some simple PowerShell scripts might deliver nasty content if executed by the target. I found a very simple ..
---------------------------------------------
https://isc.sans.edu/diary/ExelaStealer+Delivered+From+Russia+With+Love/311…
∗∗∗ Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining ∗∗∗
---------------------------------------------
Cybersecurity researchers are sounding the alarm over an ongoing campaign that is leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining.Cloud security Wiz is tracking the activity under the name ..
---------------------------------------------
https://thehackernews.com/2024/07/ongoing-cyberattack-targets-exposed.html
∗∗∗ Zahlreiche Fake-Shops geben sich als Lidl aus ∗∗∗
---------------------------------------------
Kriminelle registrieren aktuell zahlreiche Fake-Shops, die den Namen und das Logo des Supermarkt-Discounters Lidl missbrauchen. Mit zeitlich begrenzten Angeboten werden die Opfer unter Druck gesetzt. Doch wer hier bestellt, verliert sein Geld und erhält keine Ware.
---------------------------------------------
https://www.watchlist-internet.at/news/zahlreiche-fake-shops-geben-sich-als…
∗∗∗ Scam Attacks Taking Advantage of the Popularity of the Generative AI Wave ∗∗∗
---------------------------------------------
A direct correlation between GenAI’s explosive popularity and scam attacks is addressed in this article, using plentiful data and a case study of network abuse.
---------------------------------------------
https://unit42.paloaltonetworks.com/cybersquatting-using-genai-keywords/
∗∗∗ France launches large-scale operation to fight cyber spying ahead of Olympics ∗∗∗
---------------------------------------------
French authorities launched a major operation to clean the country’s computer systems of malware believed to have affected several thousand users, “particularly for espionage purposes,” Paris’s top prosecutor announced shortly before the start of the Olympics.
---------------------------------------------
https://therecord.media/france-combat-cyber-spying-operation-olympics
∗∗∗ LummaC2 Malware Abusing the Game Platform ‘Steam’ ∗∗∗
---------------------------------------------
LummaC2 is an Infostealer that is being actively distributed, disguised as illegal programs (e.g. cracks, keygens, and game hacking programs) available from distribution websites, YouTube, and LinkedIn using the SEO poisoning technique. Recently, it has also been distributed via search engine ads, posing as web pages of Notion, Slack, ..
---------------------------------------------
https://asec.ahnlab.com/en/68309/
∗∗∗ Weiterer EU-Abgeordneter im Fokus Cyberkrimineller ∗∗∗
---------------------------------------------
Der deutsche EU-Parlamentarier Daniel Freund (Grüne) war zwei Wochen vor der Europawahl Ziel einer versuchten Ausspähung mit dem Staatstrojaner Candiru.
---------------------------------------------
https://heise.de/-9813814
∗∗∗ Jetzt patchen!: Angreifer attackieren Now Platform von ServiceNow ∗∗∗
---------------------------------------------
Die Cloud Computing Plattform von ServiceNow ist derzeit im Visier von Angreifern und sie nutzen kritische Sicherheitslücken aus.
---------------------------------------------
https://heise.de/-9814238
=====================
= Vulnerabilities =
=====================
∗∗∗ ORC vulnerable to stack-based buffer overflow ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN02030803/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
https://lwn.net/Articles/983523/
∗∗∗ CVE-2024-6922: Automation Anywhere Automation 360 Server-Side Request Forgery ∗∗∗
---------------------------------------------
https://www.rapid7.com/blog/post/2024/07/26/cve-2024-6922-automation-anywhe…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-07-2024 18:00 − Donnerstag 25-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ KnowBe4 mistakenly hires North Korean hacker, faces infostealer attack ∗∗∗
---------------------------------------------
American cybersecurity company KnowBe4 says a person it recently hired as a Principal Software Engineer turned out to be a North Korean state actor who attempted to install information-stealing on its devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/knowbe4-mistakenly-hires-nor…
∗∗∗ French police push PlugX malware self-destruct payload to clean PCs ∗∗∗
---------------------------------------------
The French police and Europol are pushing out a "disinfection solution" that automatically removes the PlugX malware from infected devices in France.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/french-police-push-plugx-mal…
∗∗∗ How a cheap barcode scanner helped fix CrowdStriked Windows PCs in a flash ∗∗∗
---------------------------------------------
Not long after Windows PCs and servers at the Australian limb of audit and tax advisory Grant Thornton started BSODing last Friday, senior systems engineer Rob Woltz remembered a small but important fact: When PCs boot, they consider barcode scanners no differently to keyboards.
---------------------------------------------
https://www.theregister.com/2024/07/25/crowdstrike_remediation_with_barcode…
∗∗∗ XWorm Hidden With Process Hollowing ∗∗∗
---------------------------------------------
XWorm is not a brand-new malware family. Its a common RAT (Remote Access Tool) re-use regularly in new campaigns. Yesterday, I found a sample that behaves like a dropper and runs the malware using the Process Hollowing technique.
---------------------------------------------
https://isc.sans.edu/diary/rss/31112
∗∗∗ Kriminelle werben mit Fake-Profilen von Finanzexperten für betrügerische Investmentplattformen ∗∗∗
---------------------------------------------
Der österreichische Finanzjournalist und Unternehmer Niko Jilch betreibt verschiedene Informationskanäle zu Finanzen, Geldanlage und Bitcoin. Seine Reichweite und Bekanntheit nutzen mittlerweile aber auch Kriminelle, um Privatanleger:innen auf betrügerische Investmentplattformen zu locken.
---------------------------------------------
https://www.watchlist-internet.at/news/kriminelle-werben-mit-fake-profilen-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Progress warns of critical RCE bug in Telerik Report Server ∗∗∗
---------------------------------------------
Progress Software has warned customers to patch a critical remote code execution security flaw in the Telerik Report Server that can be used to compromise vulnerable devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/progress-warns-of-critical-r…
∗∗∗ Container angreifbar: Docker muss kritische Schwachstelle von 2019 erneut patchen ∗∗∗
---------------------------------------------
Docker hatte die Lücke längst geschlossen. Nur Monate später flog der Patch aber wieder raus. Die Docker Engine ist damit fünf Jahre lang angreifbar gewesen.
---------------------------------------------
https://www.golem.de/news/container-angreifbar-docker-muss-kritische-schwac…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (containernetworking-plugins, cups, edk2, httpd, httpd:2.4, libreoffice, libuv, libvirt, python3, and runc), Fedora (exim, python-zipp, xdg-desktop-portal-hyprland, and xmedcon), Red Hat (cups, fence-agents, freeradius, freeradius:3.0, httpd:2.4, kernel, kernel-rt, nodejs:18, podman, and resource-agents), Slackware (htdig and libxml2), SUSE (exim), and Ubuntu (ocsinventory-server, php-cas, and poppler).
---------------------------------------------
https://lwn.net/Articles/983328/
∗∗∗ Nvidia Patches High-Severity Vulnerabilities in AI, Networking Products ∗∗∗
---------------------------------------------
Nvidia has patched high-severity vulnerabilities in its Jetson, Mellanox OS, OnyX, Skyway, and MetroX products.
---------------------------------------------
https://www.securityweek.com/nvidia-patches-high-severity-vulnerabilities-i…
∗∗∗ Sicherheitsupdates: Aruba EdgeConnect SD-WAN vielfältig attackierbar ∗∗∗
---------------------------------------------
Die Entwickler von HPE haben in Arubas SD-WAN-Lösung EdgeConnect mehrere gefährliche Sicherheitslücken geschlossen.
---------------------------------------------
https://heise.de/-9813256
∗∗∗ Positron Broadcast Signal Processor ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-207-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-07-2024 18:00 − Mittwoch 24-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ BreachForums v1 hacking forum data leak exposes members’ info ∗∗∗
---------------------------------------------
The private member information of the BreachForums v1 hacking forum from 2022 has been leaked online, allowing threat actors and researchers to gain insight into its users.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/breachforums-v1-hacking-foru…
∗∗∗ SocGholish: Fake update puts visitors at risk ∗∗∗
---------------------------------------------
The SocGholish downloader has been a favourite of several cybercrime groups since 2017. It delivers a payload that poses as a browser update. As any piece of malware, it undergoes an evolutionary process. We have taken a look at the latest developments, which targets Wordpress based websites.
---------------------------------------------
https://www.gdatasoftware.com/blog/2024/07/37976-socgholish-fake-update
∗∗∗ Update-Panne bei Microsoft: Windows-Update erfordert Eingabe des Bitlocker-Keys ∗∗∗
---------------------------------------------
Das jüngste Sicherheitsupdate für Windows 10, 11 und gängige Windows-Server-Versionen führt dazu, dass einige Systeme ohne Bitlocker-Key nicht mehr starten.
---------------------------------------------
https://www.golem.de/news/update-panne-bei-microsoft-windows-update-erforde…
∗∗∗ NIS-2-Richtlinie: Kabinett beschließt strengere Regeln für Cybersicherheit ∗∗∗
---------------------------------------------
Fast 30.000 Firmen in Deutschland müssen künftig die Sicherheitsvorgaben nach der NIS-2-Richtlinie umsetzen.
---------------------------------------------
https://www.golem.de/news/nis-2-richtlinie-kabinett-beschliesst-strengere-r…
∗∗∗ New Exploit Variation Against D-Link NAS Devices (CVE-2024-3273) ∗∗∗
---------------------------------------------
In April, an OS command injection vulnerability in various D-Link NAS devices was made public. The vulnerability, %%CVE:2024-3273%% was exploited soon after it became public. Many of the affected devices are no longer supported.
---------------------------------------------
https://isc.sans.edu/diary/New+Exploit+Variation+Against+DLink+NAS+Devices+…
∗∗∗ Forget security – Googles reCAPTCHA v2 is exploiting users for profit ∗∗∗
---------------------------------------------
Web puzzles dont protect against bots, but humans have spent 819 million unpaid hours solving them Google promotes its reCAPTCHA service as a security mechanism for websites, but researchers affiliated with the University of California, Irvine, argue its harvesting information while extracting human ..
---------------------------------------------
https://www.theregister.com/2024/07/24/googles_recaptchav2_labor/
∗∗∗ A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub ∗∗∗
---------------------------------------------
Cybersecurity researchers have spotted a 3,000-account network on GitHub that is manipulating the platform and spreading ransomware and info stealers.
---------------------------------------------
https://www.wired.com/story/github-malware-spreading-network-stargazer-gobl…
∗∗∗ Siemens Patches Power Grid Product Flaw Allowing Backdoor Deployment ∗∗∗
---------------------------------------------
Siemens has released out-of-band updates to patch two potentially serious vulnerabilities in products used in energy supply.
---------------------------------------------
https://www.securityweek.com/siemens-patches-power-grid-product-flaw-allowi…
∗∗∗ New legislation will help counter the cyber threat to our essential services ∗∗∗
---------------------------------------------
The announcement of the Cyber Security and Resilience Bill is a landmark moment in tackling the growing threat to the UKs critical systems.
---------------------------------------------
https://www.ncsc.gov.uk/blog-post/legislation-help-counter-cyber-threat-cni
∗∗∗ Malware Campaign Lures Users With Fake W2 Form ∗∗∗
---------------------------------------------
Rapid7 has recently observed an ongoing campaign targeting users searching for W2 forms using the Microsoft search engine Bing.
---------------------------------------------
https://www.rapid7.com/blog/post/2024/07/24/malware-campaign-lures-users-wi…
=====================
= Vulnerabilities =
=====================
∗∗∗ ISC Releases Security Advisories for BIND 9 ∗∗∗
---------------------------------------------
The Internet Systems Consortium (ISC) released security advisories to address vulnerabilities affecting multiple versions of ISC’s Berkeley Internet Name Domain (BIND) 9. A cyber threat actor could exploit one of these vulnerabilities to cause a denial-of-service condition.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/07/24/isc-releases-security-ad…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 22-07-2024 18:00 − Dienstag 23-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ US-Ausschuss lädt ein: Crowdstrike-CEO soll für IT-Panne Rede und Antwort stehen ∗∗∗
---------------------------------------------
Millionen von Windows-PCs konnten am Freitag plötzlich nicht mehr starten. Der Heimatschutzausschuss des US-Repräsentantenhauses will genau wissen, wie es dazu kam.
---------------------------------------------
https://www.golem.de/news/us-ausschuss-laedt-ein-crowdstrike-ceo-soll-fuer-…
∗∗∗ Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware ∗∗∗
---------------------------------------------
The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in the country with malware known as HATVIBE and CHERRYSPY.
---------------------------------------------
https://thehackernews.com/2024/07/ukrainian-institutions-targeted-using.html
∗∗∗ Law Enforcement Disrupts DDoS-for-Hire Service DigitalStress ∗∗∗
---------------------------------------------
Authorities in the UK infiltrated and disrupted the DDoS-for-hire service DigitalStress, and one suspect was arrested.
---------------------------------------------
https://www.securityweek.com/law-enforcement-disrupts-ddos-for-hire-service…
∗∗∗ FrostyGoop ICS Malware Left Ukrainian City’s Residents Without Heating ∗∗∗
---------------------------------------------
The FrostyGoop ICS malware was used recently in an attack against a Ukrainian energy firm that resulted in loss of heating for many buildings.
---------------------------------------------
https://www.securityweek.com/frostygoop-ics-malware-left-ukrainian-citys-re…
∗∗∗ Kriminelle nutzen weltweite IT-Ausfälle für Betrugsmaschen ∗∗∗
---------------------------------------------
Vorsicht, wenn Sie Anrufe oder E-Mails im Namen von Crowdstrike oder Microsoft erhalten. Die weltweiten IT-Ausfälle, die durch Crowdstrike verursacht wurden, werden nun von Kriminellen als Vorwand für verschiedene Betrugsmaschen genutzt.
---------------------------------------------
https://www.watchlist-internet.at/news/kriminelle-nutzen-weltweite-it-ausfa…
∗∗∗ Vorsicht vor gefälschten Anfragen im Namen der PORR ∗∗∗
---------------------------------------------
Kriminelle geben sich als Firma PORR aus und versenden betrügerische E-Mail-Anfragen. Sie werden gebeten, ein Angebot zu stellen und dazu die Ausschreibungsunterlagen auf www.ausschreibungen-porr.at zu verwenden. Dieser Link führt jedoch zu einem gefälschten Ondrive-Ordner!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-gefaelschten-anfragen-i…
∗∗∗ Vulnerabilities in LangChain Gen AI ∗∗∗
---------------------------------------------
This article is a detailed study of CVE-2023-46229 and CVE-2023-44467, two vulnerabilities discovered by our researchers affecting generative AI framework LangChain.
---------------------------------------------
https://unit42.paloaltonetworks.com/langchain-vulnerabilities/
∗∗∗ Daggerfly: Espionage Group Makes Major Update to Toolset ∗∗∗
---------------------------------------------
APT group appears to be using a shared framework to create Windows, Linux, macOS, and Android threats.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/threat-intelligence/daggerfl…
∗∗∗ Learning from the Recent Windows/Falcon Sensor Outage: Causes and Potential Improvement Strategies in Linux Using Open Source Solutions ∗∗∗
---------------------------------------------
How can a configuration file crash an OS? Because the real issue is not the configuration file itself, but the kernel driver using it. Let’s take a quick, non-technical tour of the potential reasons behind this situation, how it is addressed in the Linux kernel, and what you as users or customers can do to avoid such issues.
---------------------------------------------
https://www.circl.lu/pub/learning-from-falcon-sensor-outage/
∗∗∗ Exploiting CVE-2024-21412: A Stealer Campaign Unleashed ∗∗∗
---------------------------------------------
FortiGuard Labs has observed a stealer campaign spreading multiple files that exploit CVE-2024-21412 to download malicious executable files.
---------------------------------------------
https://www.fortinet.com/blog/threat-research/exploiting-cve-2024-21412-ste…
∗∗∗ So nicht: Wie sich ein Netzbetreiber in den Totalausfall manövriert hat ∗∗∗
---------------------------------------------
26 Stunden lang sind die Kunden eines großen Netzbetreibers offline. Damit auch Notruf, Banken, Kassen. 2 Jahre später wird deutlich, was schiefgelaufen ist.
---------------------------------------------
https://heise.de/-9808767
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (gtk3 and jpegxl), Red Hat (kpatch-patch and thunderbird), SUSE (apache2, git, gnome-shell, java-11-openjdk, java-21-openjdk, kernel, kernel-firmware, kernel-firmware-nvidia-gspx-G06, libgit2, mozilla-nss, nodejs20, python-Django, and python312), and Ubuntu (linux-aws, linux-aws, linux-aws-5.4, linux-iot, linux-aws-5.15, pymongo, and ruby-rack).
---------------------------------------------
https://lwn.net/Articles/982939/
∗∗∗ Software-Distributionssystem TeamCity erinnert sich an gelöschte Zugangstoken ∗∗∗
---------------------------------------------
Angreifer können an sechs mittlerweile geschlossenen Sicherheitslücken in JetBrain TeamCity ansetzen.
---------------------------------------------
https://heise.de/-9810746
∗∗∗ 10,000 WordPress Sites Affected by High Severity Vulnerabilities in BookingPress WordPress Plugin ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2024/07/10000-wordpress-sites-affected-by-hi…
∗∗∗ National Instruments IO Trace ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-01
∗∗∗ RADIUS Protocol Forgery Vulnerability (Blast-RADIUS) ∗∗∗
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014
∗∗∗ Hitachi Energy AFS/AFR Series Products ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-02
∗∗∗ National Instruments LabVIEW ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 19-07-2024 18:00 − Montag 22-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Attackers Abuse Swap File to Steal Credit Cards ∗∗∗
---------------------------------------------
Bad actors exploited the humble swap file to maintain a persistent credit card skimmer on a Magento e-commerce site. This clever tactic allowed the malware to survive multiple cleanup attempts.
---------------------------------------------
https://blog.sucuri.net/2024/07/attackers-abuse-swap-file-to-steal-credit-c…
∗∗∗ Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware ∗∗∗
---------------------------------------------
Cybersecurity firm CrowdStrike, which is facing the heat for causing worldwide IT disruptions by pushing out a flawed update to Windows devices, is now warning that threat actors are exploiting the situation to distribute Remcos RAT to its customers in Latin America under the guise of providing a hotfix.
---------------------------------------------
https://thehackernews.com/2024/07/cybercriminals-exploit-crowdstrike.html
∗∗∗ SocGholish Malware Exploits BOINC Project for Covert Cyberattacks ∗∗∗
---------------------------------------------
The JavaScript downloader malware known as SocGholish (aka FakeUpdates) is being used to deliver a remote access trojan called AsyncRAT as well as a legitimate open-source project called BOINC.
---------------------------------------------
https://thehackernews.com/2024/07/socgholish-malware-exploits-boinc.html
∗∗∗ PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing ∗∗∗
---------------------------------------------
A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes.
---------------------------------------------
https://thehackernews.com/2024/07/pineapple-and-fluxroot-hacker-groups.html
∗∗∗ From RA Group to RA World: Evolution of a Ransomware Group ∗∗∗
---------------------------------------------
Ransomware gang RA World rebranded from RA Group. We discuss their updated tactics from leak site changes to an analysis of their operational tools.
---------------------------------------------
https://unit42.paloaltonetworks.com/ra-world-ransomware-group-updates-tool-…
∗∗∗ Addressing CrowdStrike on Cloud VMs in AWS with Automated Remediation ∗∗∗
---------------------------------------------
Published guidance instructs administrators to reboot the machine in Safe Mode, delete a specific file, and reboot back to normal mode. Obviously, this isn’t a viable resolution on virtual machines hosted in the public cloud as there is no way to get to Safe Mode.
---------------------------------------------
https://orca.security/resources/blog/crowdstrike-cloud-vm-automated-remedia…
∗∗∗ Crowdstrike-Ausfälle: Microsoft veröffentlicht Wiederherstellungstool ∗∗∗
---------------------------------------------
Microsoft hat ein Image für USB-Sticks veröffentlicht, mit dem sich betroffene Systeme wiederherstellen lassen. Vorausgesetzt, man hat den BitLocker-Key.
---------------------------------------------
https://heise.de/-9808481
=====================
= Vulnerabilities =
=====================
∗∗∗ Telegram zero-day allowed sending malicious Android APKs as videos ∗∗∗
---------------------------------------------
A Telegram for Android zero-day vulnerability dubbed EvilVideo allowed attackers to send malicious Android APK payloads disguised as video files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/telegram-zero-day-allowed-se…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (botan2, chromium, ffmpeg, fluent-bit, gtk3, httpd, suricata, tcpreplay, and thunderbird), Mageia (apache, chromium-browser-stable, libfm & libfm-qt, and thunderbird), Oracle (firefox, java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, java-21-openjdk, kernel, libndp, qt5-qtbase, ruby, skopeo, thunderbird, and virt:ol and virt-devel:rhel), Red Hat (containernetworking-plugins, firefox, libndp, qt5-qtbase, and thunderbird), SUSE (caddy,[...]
---------------------------------------------
https://lwn.net/Articles/982845/
∗∗∗ Sicherheitsupdates: Angreifer können Sonicwall-Firewalls lahmlegen ∗∗∗
---------------------------------------------
Einige Firewalls von Sonicwall sind verwundbar. Attacken könnten bevorstehen.
---------------------------------------------
https://heise.de/-9808904
∗∗∗ BIOS-Sicherheitslücke gefährdet unzählige HP-PCs ∗∗∗
---------------------------------------------
Angreifer können viele Desktopcomputer von HP mit Schadcode attackieren.
---------------------------------------------
https://heise.de/-9809134
∗∗∗ SSA-071402 V1.0: Multiple Vulnerabilities in SICAM Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/html/ssa-071402.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 18-07-2024 18:00 − Freitag 19-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Wieso weltweit zahlreiche IT-Systeme durch zwei Fehler am 19. Juli 2024 ausfielen ∗∗∗
---------------------------------------------
Am 19. Juli 2024 kam es weltweit zu zahlreichen Störungen an IT-Systemen. Der Betrieb an Flughäfen stand, Banken konnten nicht mehr arbeiten, Züge fielen aus, und Firmen schickten ihre Mitarbeiter nach Hause (z.B. Tegut), weil die IT-Systeme nicht mehr gingen. Es war aber kein Cyberangriff, sondern das gleichzeitige Auftreten zweier Fehler – unabhängig voneinander, die zum Ausfall von Funktionen führte.
---------------------------------------------
https://www.borncity.com/blog/2024/07/19/wieso-weltweit-zahlreiche-it-syste…
∗∗∗ Recent Splunk Enterprise Vulnerability Easy to Exploit: Security Firm ∗∗∗
---------------------------------------------
SonicWall warns that a simple GET request is enough to exploit a recent Splunk Enterprise vulnerability.
---------------------------------------------
https://www.securityweek.com/recent-splunk-enterprise-vulnerability-easy-to…
∗∗∗ Fake-SMS: „Ihre Registrierung für die Unternehmensservice Portal ID läuft ab“ ∗∗∗
---------------------------------------------
Kriminelle senden aktuell SMS an Unternehmer:innen und geben sich dabei als Unternehmensservice Portal (USP) aus. Es wird behauptet, dass die ID für das Portal abläuft - und zwar schon morgen. Tatsächlich versuchen Kriminelle hier, an Ihre Daten zu kommen.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-sms-ihre-registrierung-fuer-die…
∗∗∗ HotPage: Story of a signed, vulnerable, ad-injecting driver ∗∗∗
---------------------------------------------
The analysis of this rather generic-looking piece of malware has proven, once again, that adware developers are still willing to go the extra mile to achieve their goals. Not only that, these have developed a kernel component with a large set of techniques to manipulate processes, but they also went through the requirements imposed by Microsoft to obtain a code-signing certificate for their driver component.
---------------------------------------------
https://www.welivesecurity.com/en/eset-research/hotpage-story-signed-vulner…
∗∗∗ Play Ransomware Group’s New Linux Variant Targets ESXi, Shows Ties With Prolific Puma ∗∗∗
---------------------------------------------
Trend Micro threat hunters discovered that the Play ransomware group has been deploying a new Linux variant that targets ESXi environments.
---------------------------------------------
https://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-va…
∗∗∗ APT41 Has Arisen From the DUST ∗∗∗
---------------------------------------------
In collaboration with Google’s Threat Analysis Group (TAG), Mandiant has observed a sustained campaign by the advanced persistent threat group APT41 targeting and successfully compromising multiple organizations operating within the global shipping and logistics, media and entertainment, technology, and automotive sectors. The majority of organizations were operating in Italy, Spain, Taiwan, Thailand, Turkey, and the United Kingdom.
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (firefox, java-1.8.0-openjdk, java-17-openjdk, java-21-openjdk, libndp, openssh, qt5-qtbase, ruby, skopeo, and thunderbird), Debian (thunderbird), Fedora (dotnet6.0, httpd, python-django, python-django4.2, qt6-qtbase, rapidjson, and ruby), Red Hat (389-ds-base, firefox, java-1.8.0-openjdk, java-11-openjdk, libndp, qt5-qtbase, and thunderbird), Slackware (httpd), SUSE (apache2, chromium, and kernel), and Ubuntu (apache2, linux-aws, linux-azure-fde, linux-azure-fde-5.15, linux-hwe-5.15, linux-aws-6.5, linux-lowlatency-hwe-6.5, linux-oracle-6.5, linux-starfive-6.5, and linux-raspi, linux-raspi-5.4).
---------------------------------------------
https://lwn.net/Articles/982559/
∗∗∗ SonicWall SMA100 NetExtender Windows Client Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update. SonicWall strongly advises SSL VPN NetExtender client users to upgrade to the latest release version. IMPORTANT: This vulnerability does not affect SonicWall firewall (SonicOS) products. CVE: CVE-2024-29014
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011
∗∗∗ Atlassian Bamboo: Angreifer können Entwicklungsumgebungen kompromittieren ∗∗∗
---------------------------------------------
Es sind Attacken auf Atlassian Bamboo Data Center und Server vorstellbar. Dagegen abgesicherte Version sind erschienen.
---------------------------------------------
https://heise.de/-9806185
∗∗∗ Schlupfloch für Schadcode in Ivanti Endpoint Manager geschlossen ∗∗∗
---------------------------------------------
Stimmen die Voraussetzungen, sind Attacken auf Ivanti Endpoint Manager möglich. Ein Sicherheitspatch schafft Abhilfe. [..] In einem Beitrag schreiben die Entwickler, dass von der Lücke (CVE-2024-37381 "hoch") EPM 2024 flat betroffen ist. Unklar ist, ob davon auch andere Versionen bedroht sind. Im späteren Verlauf schreiben sie, dass das Sicherheitsproblem in zukünftigen EPM-Ausgaben gelöst wird.
---------------------------------------------
https://heise.de/-9806384
∗∗∗ Bosch: "regreSSHion" OpenSSH vulnerability in PRC7000 ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-258444.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 17-07-2024 18:00 − Donnerstag 18-07-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ SolarWinds fixes 8 critical bugs in access rights audit software ∗∗∗
---------------------------------------------
SolarWinds has fixed eight critical vulnerabilities in its Access Rights Manager (ARM) software, six of which allowed attackers to gain remote code execution (RCE) on vulnerable devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/solarwinds-fixes-8-critical-…
∗∗∗ Cisco-Schwachstelle: Secure Email Gateway ist vor allem secure, außer vor Mails ∗∗∗
---------------------------------------------
Eine E-Mail mit einem speziell gestalteten Anhang reicht aus, um ein anfälliges Gateway zu infiltrieren und es zum Absturz zu bringen oder Schadcode auszuführen.
---------------------------------------------
https://www.golem.de/news/cisco-schwachstelle-secure-email-gateway-ist-vor-…
∗∗∗ Forensik-Tool Cellebrite: Diese Smartphones kann das FBI knacken ∗∗∗
---------------------------------------------
Kürzlich hat das FBI das Smartphone des Trump-Attentäters geknackt. Geleakte Dokumente von Cellebrite zeigen, bei welchen Geräten das grundsätzlich möglich ist.
---------------------------------------------
https://www.golem.de/news/forensik-tool-cellebrite-diese-smartphones-kann-d…
∗∗∗ Criminal Gang Physically Assaulting People for Their Cryptocurrency ∗∗∗
---------------------------------------------
This is pretty horrific: a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement and the criminal complaint laying out charges against St. Felix focused largely on a single theft of cryptocurrency from an elderly North Carolina couple, whose home ..
---------------------------------------------
https://www.schneier.com/blog/archives/2024/07/criminal-gang-physically-ass…
∗∗∗ SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks ∗∗∗
---------------------------------------------
Cybersecurity researchers have uncovered security shortcomings in SAP AI Core cloud-based platform for creating and deploying predictive artificial intelligence (AI) workflows that could be exploited to get hold of access tokens and customer data. The five vulnerabilities have been collectively dubbed SAPwned by cloud ..
---------------------------------------------
https://thehackernews.com/2024/07/sap-ai-core-vulnerabilities-expose.html
∗∗∗ TAG-100: New Threat Actor Uses Open-Source Tools for Widespread Attacks ∗∗∗
---------------------------------------------
Unknown threat actors have been observed leveraging open-source tools as part of a suspected cyber espionage campaign targeting global government and private sector organizations. Recorded Futures Insikt Group is tracking the activity ..
---------------------------------------------
https://thehackernews.com/2024/07/tag-100-new-threat-actor-uses-open.html
∗∗∗ Container Breakouts: Escape Techniques in Cloud Environments ∗∗∗
---------------------------------------------
Unit 42 researchers test container escape methods and possible impacts within a Kubernetes cluster using a containerd container runtime.
---------------------------------------------
https://unit42.paloaltonetworks.com/container-escape-techniques/
∗∗∗ Windows Patchday-Nachlese: MSHTML 0-day-Schwachstelle CVE-2024-38112 durch Malware ausgenutzt ∗∗∗
---------------------------------------------
Noch ein kleiner Nachtrag zum Juli 2024 Patchday bei Microsoft. Mit den Sicherheitsupdates hat Microsoft auch eine MSHTML Spoofing-Schwachstelle geschlossen. Es gab die Information, dass diese Schwachstelle (CVE-2024-38112) durch ..
---------------------------------------------
https://www.borncity.com/blog/2024/07/18/windows-patchday-nachlese-mshtml-0…
∗∗∗ FIN7 Cybercrime Gang Evolves with Ransomware and Hacking Tools ∗∗∗
---------------------------------------------
FIN7, a notorious cybercrime gang, is back with a new bag of tricks!
---------------------------------------------
https://hackread.com/fin7-cybercrime-gang-ransomware-hacking-tools/
∗∗∗ CISA Releases Playbook for Infrastructure Resilience Planning ∗∗∗
---------------------------------------------
Today, the Cybersecurity and Infrastructure Security Agency (CISA) released a companion guide to the Infrastructure Resilience Planning Framework (IRPF), which provides guidance on how local governments and the private sector can ..
---------------------------------------------
https://www.cisa.gov/news-events/news/cisa-releases-playbook-infrastructure…
∗∗∗ Critical Patch Update: Oracles Quartalsupdate liefert 386 Sicherheitspatches ∗∗∗
---------------------------------------------
Angreifer können kritische Lücken in unter anderem Oracle HTTP Server oder MySQL Cluster ausnutzen.
---------------------------------------------
https://heise.de/-9804741
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Security Advisories 2024-07-18 ∗∗∗
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/publicationListing.x
∗∗∗ Heap-based buffer overflow vulnerability in SonicOS IPSec VPN ∗∗∗
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012
∗∗∗ CVE-2024-5321 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/126161
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 16-07-2024 18:00 − Mittwoch 17-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks ∗∗∗
---------------------------------------------
The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin into its arsenal, Microsoft has revealed. Scattered Spider is the designation given to a threat actor that's known for its ..
---------------------------------------------
https://thehackernews.com/2024/07/scattered-spider-adopts-ransomhub-and.html
∗∗∗ Ransomware continues to pile on costs for critical infrastructure victims ∗∗∗
---------------------------------------------
Millions more spent without any improvement in recovery times Costs associated with ransomware attacks on critical national infrastructure (CNI) organizations skyrocketed in the past year.
---------------------------------------------
https://www.theregister.com/2024/07/17/ransomware_continues_to_pile_on/
∗∗∗ Anlagebetrug: Vorsicht vor E-Mails mit Entschädigungsversprechen ∗∗∗
---------------------------------------------
Sie haben in der Vergangenheit durch Anlagebetrug Geld verloren? Vorsicht: Sie sind noch immer im Visier von Kriminellen. Diese kontaktieren nämlich ehemalige Opfer mit der Behauptung, dass Ihr Geld gefunden wurde. Ignorieren Sie solche Angebote und gehen Sie nicht darauf ein, sonst verlieren Sie erneut Geld!
---------------------------------------------
https://www.watchlist-internet.at/news/anlagebetrug-vorsicht-vor-e-mails-mi…
∗∗∗ ‘GhostEmperor’ returns: Mysterious Chinese hacking group spotted for first time in two years ∗∗∗
---------------------------------------------
An elusive and highly covert Chinese hacking group tracked as GhostEmperor - notorious for its sophisticated supply-chain attacks targeting telecommunications and government entities in Southeast Asia - has been spotted for the first time in more than two years. And according to the researchers, the group has gotten even better at evading detection.
---------------------------------------------
https://therecord.media/ghostemperor-spotted-first-time-in-two-years
∗∗∗ Reverse-Proxy-Phishing-Angriffe trotz Phishing-Schutz ∗∗∗
---------------------------------------------
Weltweit lässt sich eine Zunahme von Phishing und Reverse-Proxy-Phishing-Angriffen konstatieren. Anbieter von Sicherheitslösungen haben damit begonnen, fortschrittlichere Erkennungsmethoden zu implementieren. Aber reicht das aus, um entschlossene und ausgebuffte Angreifer abzuwehren? Kuba Gretzky hat sich auf der ..
---------------------------------------------
https://www.borncity.com/blog/2024/07/17/reverse-proxy-phishing-angriffe-an…
∗∗∗ Private HTS Program Continuously Used in Attacks ∗∗∗
---------------------------------------------
AhnLab SEcurity intelligence Center (ASEC) has previously covered a case where Quasar RAT was distributed through private home trading systems (HTS) in the blog post “Quasar RAT Being Distributed by Private HTS Program“. The same threat actor has been continuously distributing malware, and attack cases have been confirmed even recently. Similar to the previous ..
---------------------------------------------
https://asec.ahnlab.com/en/67969/
∗∗∗ Root-Sicherheitslücke bedroht KI-Gadget Rabbit R1 ∗∗∗
---------------------------------------------
Angreifer können das KI-Gadget Rabbit R1 über den Android-Exploit Kamakiri komplett kompromittieren. Bislang gibt es keinen Sicherheitspatch.
---------------------------------------------
https://heise.de/-9803666
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-5731-1 linux - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00142.html
∗∗∗ Oracle Critical Patch Update Advisory - July 2024 ∗∗∗
---------------------------------------------
https://www.oracle.com/security-alerts/cpujul2024.html
∗∗∗ Security Vulnerabilities fixed in Thunderbird 115.13 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2024-31/
∗∗∗ Security Vulnerabilities fixed in Thunderbird 128 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2024-32/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 15-07-2024 18:00 − Dienstag 16-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Zwei Tage nach Attentat: FBI knackt Smartphone des Trump-Schützen ∗∗∗
---------------------------------------------
Ein Attentat auf Donald Trump sorgte am Wochenende für Aufsehen. Das FBI ist nun in der Lage, die Inhalte des Smartphones des Schützen zu analysieren.
---------------------------------------------
https://www.golem.de/news/zwei-tage-nach-attentat-fbi-knackt-smartphone-des…
∗∗∗ "Reply-chain phishing" with a twist, (Tue, Jul 16th) ∗∗∗
---------------------------------------------
Few weeks ago, I was asked by a customer to take a look at a phishing message which contained a link that one of their employees clicked on. The concern was whether the linked-to site was only a generic credential stealing web page or something targeted/potentially more dangerous. Luckily, it was only a run-of-the-mill phishing kit login page, nevertheless, the e-mail message itself turned out to be somewhat more interesting, since although it didn’t look like anything special, it did make it to the recipient’s inbox, instead of the e-mail quarantine where it should have ended up.
---------------------------------------------
https://isc.sans.edu/diary/rss/31084
∗∗∗ Konfety Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins ∗∗∗
---------------------------------------------
Details have emerged about a "massive ad fraud operation" that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities.
---------------------------------------------
https://thehackernews.com/2024/07/konfety-ad-fraud-uses-250-google-play.html
∗∗∗ DarkGate, the Swiss Army knife of malware, sees boom after rival Qbot crushed ∗∗∗
---------------------------------------------
Meet the new boss, same as the old boss The DarkGate malware family has become more prevalent in recent months, after one of its main competitors was taken down by the FBI.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/07/16/darkgate_mal…
∗∗∗ Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages ∗∗∗
---------------------------------------------
A hacker group called “NullBulge” says it stole more than a terabyte of Disneys internal Slack messages and files from nearly 10,000 channels in an apparent protest over AI-generated art.
---------------------------------------------
https://www.wired.com/story/disney-slack-leak-nullbulge/
∗∗∗ Kaspersky Leaving US Following Government Ban ∗∗∗
---------------------------------------------
Kaspersky is shutting down operations in the US and laying off employees following the recent Commerce Department ban.
---------------------------------------------
https://www.securityweek.com/kaspersky-leaving-us-following-government-ban/
∗∗∗ Beware of BadPack: One Weird Trick Being Used Against Android Devices ∗∗∗
---------------------------------------------
Our data shows a pattern of APK malware bundled as BadPack files. We discuss how this technique is used to garble malicious Android files, creating challenges for analysts.
---------------------------------------------
https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/
∗∗∗ Check Point Research Reports Highest Increase of Global Cyber Attacks seen in last two years – a 30% Increase in Q2 2024 Global Cyber Attacks ∗∗∗
---------------------------------------------
Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry and geography. These cyber attack numbers were driven by a variety of reasons, ranging from the continued increase in digital transformation and the growing sophistication of cybercriminals using advanced techniques like AI and machine learning.
---------------------------------------------
https://blog.checkpoint.com/research/check-point-research-reports-highest-i…
∗∗∗ Punch Card Hacking – Exploring a Mainframe Attack Vector ∗∗∗
---------------------------------------------
Mainframes are the unseen workhorses that carry the load for many services we use on a daily basis: Withdrawing money from an ATM, credit card payments, and airline reservations to name just a few of the high volume workloads that are primarily handled by mainframes. [..] In this article, we demonstrate an entry level technique for penetration testers to get started using a different twist on a familiar technology to attack these computing giants.
---------------------------------------------
https://blog.nviso.eu/2024/07/16/punch-card-hacking-exploring-a-mainframe-a…
=====================
= Vulnerabilities =
=====================
∗∗∗ Xen Security Advisory CVE-2024-31144 / XSA-459 ∗∗∗
---------------------------------------------
If a fraudulent metadata backup has been written into an SR which also contains a legitimate metadata backup, and an administrator explicitly chooses to restore from backup, the fraudulent metadata might be consumed instead of the legitimate metadata.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-459.html
∗∗∗ Xen Security Advisory CVE-2024-31143 / XSA-458 ∗∗∗
---------------------------------------------
Denial of Service (DoS) affecting the entire host, crashes, information leaks, or elevation of privilege all cannot be ruled out.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-458.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel), Fedora (erlang-jose, mingw-python-certifi, and yt-dlp), Mageia (firefox, nss, libreoffice, sendmail, and tomcat), Red Hat (firefox, ghostscript, git-lfs, kernel, kernel-rt, ruby, and skopeo), SUSE (Botan, cockpit, kernel, nodejs18, p7zip, python3, and tomcat), and Ubuntu (ghostscript, linux, linux-azure, linux-azure-5.15, linux-gcp, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-ibm, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-nvidia, linux-oracle, linux-azure-6.5, linux-gcp-6.5, and linux-gke, linux-nvidia).
---------------------------------------------
https://lwn.net/Articles/982169/
∗∗∗ Rockwell Automation Pavilion 8 ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-198-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 12-07-2024 18:00 − Montag 15-07-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Neue Absenderadresse für unsere täglichen Mails an Netzbetreiber ∗∗∗
---------------------------------------------
Wir versenden jeden Tag zwischen 150 und 250 Mails an unsere Kontakte bei Netzbetreibern in Österreich, um diese über Probleme in ihren Netzen zu informieren, die wir (bzw. unsere Datenquellen) dort gefunden haben. [..] Jetzt haben wir uns dazu entschlossen, den gleichen Weg zu nehmen, den schon viele andere Firmen beschritten haben: Wir senden ab sofort diese Mails nicht mehr von team(a)cert.at als Absender, sondern von noreply(a)cert.at aus. [..] Echte Rückfragen sollten weiterhin an team(a)cert.at gerichtet werden.
---------------------------------------------
https://www.cert.at/de/blog/2024/7/neuer-absender-fuer-notifications
∗∗∗ Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD ∗∗∗
---------------------------------------------
On patch Tuesday last week, Microsoft released an update for CVE-2024-38112, which they said was being exploited in the wild. We at the Trend Micro Zero Day Initiative (ZDI) agree with them because that’s what we told them back in May when we detected this exploit in the wild and reported it to Microsoft. However, you may notice that no one from Trend or ZDI was acknowledged by Microsoft. This case has become a microcosm of the problems with coordinated vulnerability disclosure (CVD) as vendors push for coordinated disclosure from researchers but rarely practice any coordination regarding the fix. This lack of transparency from vendors often leaves researchers who practice CVD with more questions than answers.
---------------------------------------------
https://www.thezdi.com/blog/2024/7/15/uncoordinated-vulnerability-disclosur…
∗∗∗ Microsoft Says Windows Not Impacted by regreSSHion as Second OpenSSH Bug Is Found ∗∗∗
---------------------------------------------
Microsoft confirmed last week that Windows is not affected by the vulnerability.
---------------------------------------------
https://www.securityweek.com/microsoft-says-windows-not-impacted-by-regress…
∗∗∗ ClickFix Deception: A Social Engineering Tactic to Deploy Malware ∗∗∗
---------------------------------------------
The HTML file masquerades as a Word document, displaying an error prompt to deceive users. [..] In a nutshell, clicking on the “How to fix” button triggers the execution of JavaScript code that copies the PowerShell script directly onto the clipboard. [..] Once the script is pasted and executed in the PowerShell terminal, it allows the malware to infiltrate the victim’s system, potentially leading to data theft, system compromise, or further propagation of the malware.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-s…
∗∗∗ DNS hijacks target crypto platforms registered with Squarespace ∗∗∗
---------------------------------------------
A wave of coordinated DNS hijacking attacks targets decentralized finance (DeFi) cryptocurrency domains using the Squarespace registrar, redirecting visitors to phishing sites hosting wallet drainers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/dns-hijacks-target-crypto-pl…
∗∗∗ June Windows Server updates break Microsoft 365 Defender features ∗∗∗
---------------------------------------------
Microsoft has confirmed that Windows Server updates from last months Patch Tuesday break some Microsoft 365 Defender features that use the network data reporting service.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/june-windows-server-updates…
∗∗∗ Facebook ads for Windows desktop themes push info-stealing malware ∗∗∗
---------------------------------------------
Cybercriminals use Facebook business pages and advertisements to promote fake Windows themes that infect unsuspecting users with the SYS01 password-stealing malware. [..] While using Facebook advertisements to push information-stealing malware is not new, the social media platform's massive reach makes these campaigns a significant threat.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/facebook-ads-for-windows-the…
∗∗∗ Knot Resolver 6 News: DoS protection – operator’s overview ∗∗∗
---------------------------------------------
The team behind Knot Resolver, the scalable caching DNS resolver, is hard at work developing a complex solution for protecting DNS servers and other participants on the Internet alike against denial-of-service attacks. This effort is a part of the ongoing DNS4EU project, co-funded by the European Union1, which we are a proud part of. [..] As usual with projects from CZ.NIC, all of this code is also free and open source under the GPL license, so everyone is free to study and adapt it for their own exciting purposes.
---------------------------------------------
https://en.blog.nic.cz/2024/07/15/knot-resolver-6-news-dos-protection-opera…
∗∗∗ 16-bit Hash Collisions in .xls Spreadsheets, (Sat, Jul 13th) ∗∗∗
---------------------------------------------
Since the hashing algorithm used for the protection of .xls files produces a 16-bit integer with its highest bit set, there are 32768 (0x8000) possible hash values (called verifier), and thus ample chance to generate hash collisions. I generated such a list, and included it in an update of my oledump plugin plugin_biff.py.
---------------------------------------------
https://isc.sans.edu/diary/rss/31066
∗∗∗ Protected OOXML Spreadsheets, (Mon, Jul 15th) ∗∗∗
---------------------------------------------
I was asked a question about the protection of an .xlsm spreadsheet [..]
---------------------------------------------
https://isc.sans.edu/diary/rss/31070
∗∗∗ CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool ∗∗∗
---------------------------------------------
A threat actor that was previously observed using an open-source network mapping tool has greatly expanded their operations to infect over 1,500 victims. Sysdig, which is tracking the cluster under the name CRYSTALRAY, said the activities have witnessed a tenfold surge, adding it includes "mass scanning, exploiting multiple vulnerabilities, and placing backdoors using multiple [open-source software] security tools."
---------------------------------------------
https://thehackernews.com/2024/07/crystalray-hackers-infect-over-1500.html
∗∗∗ CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks ∗∗∗
---------------------------------------------
Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched.
---------------------------------------------
https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (cups, krb5, pgadmin4, python3.6, and yarnpkg), Mageia (freeradius, kernel, kmod-xtables-addons, kmod-virtualbox, and dwarves, kernel-linus, and squid), Red Hat (ghostscript, kernel, and less), SUSE (avahi, c-ares, cairo, cups, fdo-client, gdk-pixbuf, git, libarchive, openvswitch3, podman, polkit, python-black, python-Jinja2, python-urllib3, skopeo, squashfs, tiff, traceroute, and wget), and Ubuntu (linux, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-ibm, linux-ibm-5.4, linux-kvm).
---------------------------------------------
https://lwn.net/Articles/982029/
∗∗∗ Admin-Lücke bedroht Palo Alto Networks Migration-Tool Expedition ∗∗∗
---------------------------------------------
Verschiedene Cybersicherheitsprodukte von Palo Alto Networks sind verwundbar. Sicherheitsupdates sind verfügbar.
---------------------------------------------
https://heise.de/-9800845
∗∗∗ Wireshark 4.2.6 Released, (Sun, Jul 14th) ∗∗∗
---------------------------------------------
https://isc.sans.edu/diary/rss/31068
∗∗∗ 2024-07-15: Cyber Security Advisory -Mint Workbench I Unquoted Service Path Enumeration ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7912&Lan…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 11-07-2024 18:00 − Freitag 12-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Nach Social-Media-Drama: Signal patcht eine seit 2018 bekannte Schwachstelle ∗∗∗
---------------------------------------------
Durch die Schwachstelle können andere Anwendungen auf Signal-Chats zugreifen. Bekannt ist das Problem schon seit sechs Jahren. Nun soll endlich ein Fix kommen.
---------------------------------------------
https://www.golem.de/news/nach-social-media-drama-signal-patcht-seit-sechs-…
∗∗∗ Understanding SSH Honeypot Logs: Attackers Fingerprinting Honeypots ∗∗∗
---------------------------------------------
Some of the commands observed can be confusing for a novice looking at ssh honeypot logs. Sure, you have some obvious commands like "uname -a" to fingerprint the kernel. However, other commands are less intuitive and are not commands a normal user would use. I am trying to summarize some of the more common ones here, focusing on commands attackers use to figure out if they are inside a honeypot.
---------------------------------------------
https://isc.sans.edu/diary/Understanding+SSH+Honeypot+Logs+Attackers+Finger…
∗∗∗ 60 New Malicious Packages Uncovered in NuGet Supply Chain Attack ∗∗∗
---------------------------------------------
Threat actors have been observed publishing a new wave of malicious packages to the NuGet package manager as part of an ongoing campaign that began in August 2023, while also adding a new layer of stealth to evade detection.The fresh packages, about 60 in number and spanning 290 versions, demonstrate a refined approach from the ..
---------------------------------------------
https://thehackernews.com/2024/07/60-new-malicious-packages-uncovered-in.ht…
∗∗∗ Critical Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments ∗∗∗
---------------------------------------------
A critical security issue has been disclosed in the Exim mail transfer agent that could enable threat actors to deliver malicious attachments to target users inboxes.The vulnerability, tracked as CVE-2024-39929, has a CVSS ..
---------------------------------------------
https://thehackernews.com/2024/07/critical-exim-mail-server-vulnerability.h…
∗∗∗ Telefonbetrug: Scam Anruf von Anwälten im Umlauf ∗∗∗
---------------------------------------------
Der Betrüger fälscht die Telefonnummer einer renommierten Anwaltskanzlei in der Umgebung und ruft das Opfer an. Im Gespräch gibt sich der vermeintliche Anwalt als eine echte Person aus, die ..
---------------------------------------------
https://blog.zettasecure.com/telefonbetrug-scam-anruf-von-anwaelten-im-umla…
∗∗∗ AT&T wurde Opfer eines riesigen Hackerangriffs ∗∗∗
---------------------------------------------
Verbindungsdaten von 109 Millionen Kunden wurden von unbekannten Angreifern heruntergeladen
---------------------------------------------
https://www.derstandard.at/story/3000000228237/att-wurde-opfer-eines-riesig…
∗∗∗ Apple sends new warning about mercenary spyware attacks to iPhone users. Should you worry now? ∗∗∗
---------------------------------------------
Though mercenary spyware attacks are rare and typically sent only to targeted individuals, Apple has alerted iPhone users about them for the second time this year.
---------------------------------------------
https://www.zdnet.com/article/apple-warns-of-mercenary-spyware-attacks-agai…
∗∗∗ mSpy: Dritter Hack seit 2010 legt Millionen Nutzerdaten offen ∗∗∗
---------------------------------------------
Es heißt ja "Aller guten Dinge sind drei" – was aber hier wohl eher nicht zutrifft. Der Anbieter von Smartphone-Überwachung, mySpy, ist erneut durch ein Datenleck auf Grund eines Hacks aufgefallen (der dritte Vorfall seit 2010). Ein ..
---------------------------------------------
https://www.borncity.com/blog/2024/07/12/mspy-dritter-hack-seit-2010-legt-m…
∗∗∗ Checking in on the state of cybersecurity and the Olympics ∗∗∗
---------------------------------------------
Even if a threat actor isn’t successful in some widespread breach that makes international headlines, even smaller-scale threats and actors are just hoping to cause chaos.
---------------------------------------------
https://blog.talosintelligence.com/threat-source-newsletter-july-12-2024/
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-5729-1 apache2 - security update ∗∗∗
---------------------------------------------
Multiple vulnerabilities have been discovered in the Apache HTTP server,which may result in authentication bypass, execution of scripts in directories not directly reachable by any URL, server-side request forgery or denial of service.
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00140.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 10-07-2024 18:00 − Donnerstag 11-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Datenleck: Millionen von 2FA-SMS standen frei zugänglich im Netz ∗∗∗
---------------------------------------------
Die vom CCC entdeckten SMS haben wohl neben internen Verwaltungs- und Abrechnungsdaten auf einer ungesicherten S3-Instanz eines Dienstleisters gelegen.
---------------------------------------------
https://www.golem.de/news/datenleck-millionen-von-2fa-sms-standen-frei-zuga…
∗∗∗ You had a year to patch this Veeam flaw and now its going to hurt ∗∗∗
---------------------------------------------
LockBit variant targets backup software - which you may remember is supposed to help you recover from ransomware Yet another new ransomware gang, this one dubbed EstateRansomware, is exploiting a ..
---------------------------------------------
https://www.theregister.com/2024/07/11/estate_ransomware_veeam_bug/
∗∗∗ Achtung: Phishingversuche im Namen von Bitpanda! ∗∗∗
---------------------------------------------
Derzeit kursieren vermehrt Phishingmails und SMS, die vortäuschen, vom Finanzdienstleister BitPanda versendet worden zu sein. Geben Sie keine persönlichen Daten oder Codes weiter, sonst geben Sie Kriminellen Zugang zu Ihrem Wallet!
---------------------------------------------
https://www.watchlist-internet.at/news/phishingversuche-bitpanda/
∗∗∗ E-Mail genügt: Outlook-Lücke gibt Angreifern Zugriff aufs System ∗∗∗
---------------------------------------------
Gefahr insbesondere bei Mails von "vertrauenswürdigen Absendern" – Patch steht bereit
---------------------------------------------
https://www.derstandard.at/story/3000000228006/e-mail-genuegt-outlook-lueck…
∗∗∗ Impact of data breaches is fueling scam campaigns ∗∗∗
---------------------------------------------
Data breaches have become one of the most crucial threats to organizations across the globe, and they’ve only become more prevalent and serious over time. A data breach occurs when unauthorized ..
---------------------------------------------
https://blog.talosintelligence.com/data-breaches-fueling-scam-campaigns/
∗∗∗ CISA and FBI Release Secure by Design Alert on Eliminating OS Command Injection Vulnerabilities ∗∗∗
---------------------------------------------
Today, CISA and FBI are releasing their newest Secure by Design Alert in the series, Eliminating OS Command Injection Vulnerabilities, in response to recent well-publicized threat actor campaigns that exploited OS command injection ..
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/07/10/cisa-and-fbi-release-sec…
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-5728-1 exim4 - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00139.html
∗∗∗ DSA-5727-1 firefox-esr - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00138.html
∗∗∗ 2024-07 Security Bulletin: Junos OS Evolved: Execution of a specific CLI command will cause a crash in the AFT manager (CVE-2024-39513) ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos…
∗∗∗ 2024-07 Security Bulletin: Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash (CVE-2024-39554) ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos…
∗∗∗ NetScaler Console, Agent and SDX Security Bulletin for CVE-2024-6235 and CVE-2024-6236 ∗∗∗
---------------------------------------------
https://support.citrix.com/article/CTX677998/netscaler-console-agent-and-sd…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 09-07-2024 18:00 − Mittwoch 10-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Ticket Heist network of 700 domains sells fake Olympic Games tickets ∗∗∗
---------------------------------------------
A large-scale fraud campaign with over 700 domain names is likely targeting Russian-speaking users looking to purchase tickets for the Summer Olympics in Paris.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ticket-heist-network-of-700-…
∗∗∗ Im Klartext: Linksys-Router senden wohl WLAN-Passwörter an US-Server ∗∗∗
---------------------------------------------
Eine Verbraucherorganisation hat zwei Routermodelle von Linksys getestet. Beide übermitteln wohl sensible Daten an einen Server in den USA. Einen Patch gibt es bisher nicht.
---------------------------------------------
https://www.golem.de/news/im-klartext-linksys-router-senden-wohl-wlan-passw…
∗∗∗ Cyberangriff trifft IT-Konzern: 49 Systeme von Fujitsu mit Malware infiziert ∗∗∗
---------------------------------------------
Cyberkriminellen ist es gelungen, interne Systeme von Fujitsu zu infiltrieren. Potenziell sind auch Kundendaten abgeflossen. Viele Details nennt der Konzern aber nicht.
---------------------------------------------
https://www.golem.de/news/cyberangriff-trifft-it-konzern-49-systeme-von-fuj…
∗∗∗ Finding Honeypot Data Clusters Using DBSCAN: Part 1 ∗∗∗
---------------------------------------------
Sometimes data needs to be transformed or different tools need to be used so that it can be compared with other data. Some honeypot data is easy to compare since there is no customized information such as randomly generated file names, IP addresses, etc.
---------------------------------------------
https://isc.sans.edu/diary/Finding+Honeypot+Data+Clusters+Using+DBSCAN+Part…
∗∗∗ Ransomware crews investing in custom data stealing malware ∗∗∗
---------------------------------------------
BlackByte, LockBit among the criminals using bespoke tools As ransomware crews increasingly shift beyond just encrypting victims files and demanding a payment to unlock them, instead swiping sensitive info straight away, some of the ..
---------------------------------------------
https://www.theregister.com/2024/07/10/ransomware_data_exfil_malware/
∗∗∗ Google Is Adding Passkey Support for Its Most Vulnerable Users ∗∗∗
---------------------------------------------
Google is bringing the password-killing “passkey” tech to its Advanced Protection Program users more than a year after rolling them out broadly.
---------------------------------------------
https://www.wired.com/story/google-passkey-advance-protection-program/
∗∗∗ Augen auf beim Ticketkauf ∗∗∗
---------------------------------------------
Wie Betrüger beliebte Ticketplattformen für ihre finsteren Zwecke missbrauchen
---------------------------------------------
https://www.welivesecurity.com/de/tipps-ratgeber/augen-auf-beim-ticketkauf/
∗∗∗ Largest Patch Tuesday in 3 months includes 5 critical vulnerabilities ∗∗∗
---------------------------------------------
This is the largest Patch Tuesday since April, when Microsoft patched 150 vulnerabilities.
---------------------------------------------
https://blog.talosintelligence.com/microsoft-patch-tuesday-july-2024/
∗∗∗ Inside the ransomware playbook: Analyzing attack chains and mapping common TTPs ∗∗∗
---------------------------------------------
Based on a comprehensive review of more than a dozen prominent ransomware groups, we identified several commonalities in TTPs, along with several notable differences and outliers.
---------------------------------------------
https://blog.talosintelligence.com/common-ransomware-actor-ttps-playbooks/
∗∗∗ Eldorado Ransomware Targeting Windows and Linux with New Malware ∗∗∗
---------------------------------------------
Another day, another threat against Windows and Linux systems!
---------------------------------------------
https://hackread.com/eldorado-ransomware-windows-linux-malware/
∗∗∗ CVE-2024-38021: Moniker RCE Vulnerability Uncovered in Microsoft Outlook ∗∗∗
---------------------------------------------
Morphisec researchers have identified a significant vulnerability, CVE-2024-38021 — a zero-click remote code execution (RCE) vulnerability that impacts most Microsoft Outlook applications.
---------------------------------------------
https://blog.morphisec.com/cve-2024-38021-microsoft-outlook-moniker-rce-vul…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (buildah, gvisor-tap-vsock, kernel-rt, libreswan, linux-firmware, pki-core, and podman), Fedora (firefox and jpegxl), Gentoo (Buildah, HarfBuzz, and LIVE555 Media Server), Oracle (buildah, gvisor-tap-vsock, kernel, libreswan, and podman), Red Hat (containernetworking-plugins, dotnet6.0, dotnet8.0, fence-agents, kernel, libreswan, libvirt, perl-HTTP-Tiny, python39:3.9, toolbox, and virt:rhel and virt-devel:rhel modules), SUSE (firefox,
---------------------------------------------
https://lwn.net/Articles/981508/
∗∗∗ [20240705] - Core - XSS in com_fields default field value ∗∗∗
---------------------------------------------
https://developer.joomla.org:443/security-centre/939-20240705-core-xss-in-c…
∗∗∗ [20240704] - Core - XSS in Wrapper extensions ∗∗∗
---------------------------------------------
https://developer.joomla.org:443/security-centre/938-20240704-core-xss-in-w…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 08-07-2024 18:00 − Dienstag 09-07-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories ∗∗∗
---------------------------------------------
Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what appears to be an instance of a "complex and persistent" supply chain ..
---------------------------------------------
https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.h…
∗∗∗ Houthi rebels are operating their own GuardZoo spyware ∗∗∗
---------------------------------------------
Fairly low budget, unsophisticated malware, say researchers, but it can collect the same data as Pegasus ..
---------------------------------------------
https://www.theregister.com/2024/07/09/houthi_rebels_malware/
∗∗∗ People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action ∗∗∗
---------------------------------------------
The following Advisory provides a sample of significant case studies of this adversary’s techniques in action against two victim networks. The case studies are consequential for cybersecurity practitioners to ..
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-190a
∗∗∗ Vulnerability discovered in RADIUS protocol ∗∗∗
---------------------------------------------
On 9 July 2024, a vulnerability in the RADIUS protocol was published that allows an attacker to manipulate RADIUS server responses and thus gain unauthorized access.
---------------------------------------------
https://www.dfn.de/en/blastradius-newsmeldung/
∗∗∗ Exploring Compiled V8 JavaScript Usage in Malware ∗∗∗
---------------------------------------------
In this article, we give you a basic understanding of how V8 compiled code is used not just in regular apps but also for malicious purposes.
---------------------------------------------
https://research.checkpoint.com/2024/exploring-compiled-v8-javascript-usage…
∗∗∗ Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella ∗∗∗
---------------------------------------------
Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with Microsoft products and services. Over the past ..
---------------------------------------------
https://www.helpnetsecurity.com/2024/07/09/microsoft-cybersecurity-dilemma/
∗∗∗ Mitarbeiter:innen wollen Gehaltskonto ändern? Vorsicht vor Betrug! ∗∗∗
---------------------------------------------
Kriminelle haben es aktuell auf die Lohnzahlungen Ihrer Angestellten abgesehen. Per E-Mail treten sie mit der zuständigen Abteilung Ihres Unternehmens in Kontakt und versuchen, eine Änderung der IBAN zum Empfang der Gehälter zu erwirken. Klappt der Betrug, landet das Geld in den Taschen Krimineller und wird erst bemerkt, wenn die Auszahlung des Gehalts nie bei der tatsächlich angestellten Person eingeht.
---------------------------------------------
https://www.watchlist-internet.at/news/gehaltskonto-aendern-betrug/
∗∗∗ "Ich hab doch nur gschaut .. (bis sich eine bessere Gelegenheit bietet)!" ∗∗∗
---------------------------------------------
Angriffe mit (vermeintlich) hacktivistischer Motivation sind inzwischen ein fester Bestandteil des digitalen Hintergrundrauschens. Das ist nicht erst seit Beginn des russischen Angriffskrieges auf die Ukraine der Fall, jedoch hat die Zahl von Attacken durch Bedrohungsakteure, welche im Sinne ihrer "Sache" für eine der Seiten innerhalb ..
---------------------------------------------
https://www.cert.at/de/blog/2024/7/industriesteueranlagen-und-fernwartung-d…
∗∗∗ Amazon Prime Day: Vorsicht vor Phishing und falschen Amazon-Webseiten ∗∗∗
---------------------------------------------
Mehr als 1.230 neue Amazon-bezogene Domains wurden im Juni 2024 registriert, 85 Prozent davon werden als bösartig oder verdächtig eingestuft.
---------------------------------------------
https://www.zdnet.de/88416929/amazon-prime-day-vorsicht-vor-phishing-und-fa…
∗∗∗ New group exploits public cloud services to spy on Russian agencies, Kaspersky says ∗∗∗
---------------------------------------------
Researchers say they have discovered a new hacker group, dubbed CloudSorcerer, that uses “a sophisticated cyberespionage tool” to steal data from Russian government agencies.
---------------------------------------------
https://therecord.media/cloudsorcerer-apt-kaspersky-research
∗∗∗ Wordpress-Plug-in mit 150.000 Installation ermöglicht beliebige Dateiuploads ∗∗∗
---------------------------------------------
In einem Wordpress-Plug-in mit 150.000 Installationen wurde eine Sicherheitslücke entdeckt, die das Hochladen beliebiger Dateien erlaubt.
---------------------------------------------
https://heise.de/-9794927
∗∗∗ Ransomware: Entschlüsselungstool für Muse, DarkRace und DoNex veröffentlicht ∗∗∗
---------------------------------------------
Opfer der Verschlüsselungstrojaner Muse, DarkRace und DoNex können ab sofort, ohne Lösegeld zu zahlen, wieder auf ihre Daten zugreifen.
---------------------------------------------
https://heise.de/-9795098
∗∗∗ Patchday: SAP rüstet Unternehmenssoftware gegen etwaige Angriffe ∗∗∗
---------------------------------------------
Es sind wichtige Sicherheitsupdates unter anderem für SAP Commerce und NetWeaver erschienen.
---------------------------------------------
https://heise.de/-9795171
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (virt:rhel and virt-devel:rhel), Fedora (ghostscript, golang, httpd, libnbd, netatalk, rust-sequoia-chameleon-gnupg, rust-sequoia-gpg-agent, rust-sequoia-keystore, rust-sequoia-openpgp, and rust-sequoia-sq), Mageia (apache), Red Hat (booth, buildah, edk2, fence-agents, git, gvisor-tap-vsock, kernel, kernel-rt, less, libreswan, linux-firmware, openssh, pki-core, podman, postgresql-jdbc, python3, tpm2-tss, virt:rhel, and virt:rhel and virt-devel:rhel
---------------------------------------------
https://lwn.net/Articles/981285/
∗∗∗ Another OpenSSH remote code execution vulnerability ∗∗∗
---------------------------------------------
https://lwn.net/Articles/981287/
∗∗∗ Security Vulnerabilities fixed in Firefox ESR 115.13 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2024-30/
∗∗∗ Security Vulnerabilities fixed in Firefox 128 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2024-29/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 05-07-2024 18:00 − Montag 08-07-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Fast 10 Milliarden Passwörter: Gigantischer Passwort-Leak wirft Fragen auf ∗∗∗
---------------------------------------------
In einem Hackerforum ist eine fast 50 GByte große Passwortliste namens Rockyou2024 aufgetaucht. [..] Das erhebliche Sicherheitsrisiko, vor dem einige Medien warnen, scheint von Rockyou2024 allerdings nicht auszugehen. [..] "Sorry, hier gibt es nichts zu sehen. Das ist einfach nur minderwertiger Müll – sowohl die 'geleakte' Datei als auch die Berichterstattung darüber", so Karlslunds Fazit.
---------------------------------------------
https://www.golem.de/news/fast-10-milliarden-passwoerter-gigantischer-passw…
∗∗∗ Nach Cyberangriff: Warnmail von Microsoft landet bei vielen Kunden im Spam ∗∗∗
---------------------------------------------
Seit Juni informiert Microsoft betroffene Kunden über bei einem Cyberangriff abgeflossene E-Mails. So ganz reibungslos läuft das offenbar noch nicht. [..] "Überprüfen Sie Ihre E-Mail-Protokolle (einschließlich Exchange Online) auf eine E-Mail von mbsupport(a)microsoft.com", warnt der Forscher.
---------------------------------------------
https://www.golem.de/news/nach-cyberangriff-warnmail-von-microsoft-landet-b…
∗∗∗ Nach Cyberangriff: Hacker erpressen Ticketmaster und verschenken Tickets ∗∗∗
---------------------------------------------
Die Angreifer behaupten, Ticket-Barcodes im Gesamtwert von mehr als 22 Milliarden US-Dollar erbeutet zu haben. Für Taylor-Swift-Konzerte stehen schon einige im Netz.
---------------------------------------------
https://www.golem.de/news/nach-cyberangriff-hacker-erpressen-ticketmaster-u…
∗∗∗ Booking.com: Aufforderung zur erneuten Buchungsbestätigung ist Betrug ∗∗∗
---------------------------------------------
Vorsicht, wenn Sie im Nachrichtenportal von booking.com trotz bestätigter Buchung aufgefordert werden, die Buchung erneut zu bestätigen. Dahinter stecken Kriminelle, die sich Zugang zum Buchungssystem des Hotels verschafft haben. Klicken Sie nicht auf den Link und antworten Sie nicht!
---------------------------------------------
https://www.watchlist-internet.at/news/bookingcom-aufforderung-zur-erneuten…
∗∗∗ Schadcode-Attacken auf Multifunktionsdrucker von Toshiba und Sharp möglich ∗∗∗
---------------------------------------------
Angreifer können hunderte Multifunktionsdrucker von Toshiba und Sharp ins Visier nehmen. Sicherheitsupdates sind verfügbar. [..] Toshiba hat bereits Mitte Juni 2024 Informationen zu den Schwachstellen und betroffenen Modellen bekannt gegeben. Der Sicherheitsforscher hat seine Informationen erst kürzlich veröffentlicht.
---------------------------------------------
https://heise.de/-9793179
∗∗∗ Kunai: Keep an Eye on your Linux Hosts Activity, (Mon, Jul 8th) ∗∗∗
---------------------------------------------
Last week, I attended « Pass The Salt », a conference focussing on open-source software and cybersecurity. I participated in a very interesting workshop about « Kunai ». This tool, developed by Quentin Jérôme from CIRCL (the Luxembourg CERT) aims to replace SysmonForLinux. Its goal is to record and log system activity but in a more «Linux-oriented» flavor. It was presented for the first time at hack.lu in 2023 and it now reaches enough maturity to be tested and deployed on some Linux hosts.
---------------------------------------------
https://isc.sans.edu/diary/rss/31054
∗∗∗ Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies ∗∗∗
---------------------------------------------
The supply chain attack targeting the widely-used Polyfill[.]io JavaScript library is broader in scope than previously thought, with new findings from Censys showing that over 380,000 hosts are embedding a polyfill script linking to the malicious domain as of July 2, 2024. [..] "Approximately 237,700, are located within the Hetzner network (AS24940), primarily in Germany," it noted. "This is not surprising – Hetzner is a popular web hosting service, and many website developers leverage it."
---------------------------------------------
https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
∗∗∗ Tool: AtomDucky ∗∗∗
---------------------------------------------
Atom Ducky is a HID device controlled through a web browser. Its designed to function as a wirelessly operated Rubber Ducky, personal authenticator, or casual keyboard. Its primary aim is to help ethical hackers gain knowledge about Rubber Ducky devices while integrating their use into everyday life.
---------------------------------------------
https://www.reddit.com/r/netsec/comments/1drhkc0/atom_ducky_wifi_rubber_duc…
∗∗∗ Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough ∗∗∗
---------------------------------------------
In July 2023, the Oligo Research Team disclosed multiple new critical vulnerabilities to Pytorch maintainers Amazon and Meta, including CVE-2023-43654 (CVSS 9.8). [..] Want the deep dive, full story with technical walkthrough for the PyTorch (TorchServe) ShellTorch vulnerabilities CVE-2023-43654 (CVSS: 9.8) and CVE-2022-1471 (CVSS: 9.9)? You’re in the right place.
---------------------------------------------
https://www.oligo.security/blog/shelltorch-explained-multiple-vulnerabiliti…
∗∗∗ Kimsuky Group’s New Backdoor (HappyDoor) ∗∗∗
---------------------------------------------
This report is a summarized version of “Analysis Report of Kimsuky Group’s HappyDoor Malware” introduced in AhnLab Threat Intelligence Platform (TIP), containing key information for analyzing breaches. The report in AhnLab TIP includes details on encoding & encryption methods, packet structure, and more in addition to the characteristics and features of the malware.
---------------------------------------------
https://asec.ahnlab.com/en/67660/
∗∗∗ The Current State of Browser Cookies ∗∗∗
---------------------------------------------
Well, almost every other website uses cookies. According to W3Techs, as of June 24, 2024, 41.3% of all websites use cookies with some of the most prominent providers included in that list, such as Google, Facebook, Microsoft and Apple. [..] Although cookies are being used to save sensitive data, they are still stored in a way that enables attackers to leak them easily and use them for malicious purposes.
---------------------------------------------
https://www.cyberark.com/resources/threat-research-blog/the-current-state-o…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (openssh), Debian (krb5), Fedora (yt-dlp), Gentoo (firefox, KDE Plasma Workspaces, Stellarium, thunderbird, and X.Org X11 library), Mageia (python-js2py and znc), Oracle (389-ds, c-ares, container-tools, cups, go-toolset, httpd:2.4/httpd, iperf3, kernel, less, libreoffice, libuv, nghttp2, openldap, openssh, python-idna, python-jinja2, python-pillow, python3, python3.11-PyMySQL, and xmlrpc-c), Red Hat (kernel, kernel-rt, openssh, and virt:rhel and virt-devel:rhel modules), and SUSE (go1.21, go1.22, krb5, kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t, netty3, opera, and python-urllib3).
---------------------------------------------
https://lwn.net/Articles/981119/
∗∗∗ Mastodon: Sicherheitslücke ermöglicht unbefugten Zugriff auf Posts ∗∗∗
---------------------------------------------
Neue Versionen der Mastodon-Serversoftware schließen eine als hochriskant eingestufte Sicherheitslücke. Angreifer können sich unbefugten Zugriff auf Posts verschaffen. [..] Der Fehler tritt demnach ab Mastodon 2.6.0 auf. Die Entwickler haben die Versionen Mastodon 4.2.10 sowie 4.1.18 veröffentlicht. [..] Nähere Details wollen die Mastodon-Entwickler laut Sicherheitsmitteilung am Montag kommender Woche, den 15. Juli, veröffentlichen.
---------------------------------------------
https://heise.de/-9792706
∗∗∗ Mattermost security updates 9.9.1 / 9.8.2 / 9.7.6 / 9.5.7 (ESR) released ∗∗∗
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-9-9-1-9-8-2-9-7-6-9…
∗∗∗ MSI Center: Schwachstelle CVE-2024-37726 ermöglicht System-Privilegien ∗∗∗
---------------------------------------------
https://www.borncity.com/blog/2024/07/06/msi-center-schwachstelle-cve-2024-…
∗∗∗ K000140257: OpenSSL vulnerability CVE-2024-4741 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000140257
∗∗∗ Vulnerability Summary for the Week of July 1, 2024 ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/bulletins/sb24-190
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 04-07-2024 18:00 − Freitag 05-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ New Eldorado ransomware targets Windows, VMware ESXi VMs ∗∗∗
---------------------------------------------
A new ransomware-as-a-service (RaaS) called Eldorado emerged in March and comes with locker variants for VMware ESXi and Windows.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-eldorado-ransomware-targ…
∗∗∗ Turla: A Master’s Art of Evasion ∗∗∗
---------------------------------------------
Turla, a well-known piece of malware, has taken to weaponising LNK-files to infect computers. We have observed a current example of this.
---------------------------------------------
https://www.gdatasoftware.com/blog/2024/07/37977-turla-evasion-lnk-files
∗∗∗ New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks ∗∗∗
---------------------------------------------
Cybersecurity researchers have uncovered a new botnet called Zergeca thats capable of conducting distributed denial-of-service (DDoS) attacks. Written in Golang, the botnet is so named for its reference to a string named "ootheca" present in the command-and-control (C2) servers ("ootheca[.]pw" and "ootheca[.]top").
---------------------------------------------
https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.h…
∗∗∗ Latest Ghostscript vulnerability haunts experts as the next big breach enabler ∗∗∗
---------------------------------------------
Theres also chatter about whether medium severity scare is actually code red nightmare Infosec circles are awash with chatter about a vulnerability in Ghostscript some experts believe could be the cause of several major breaches in the coming months.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/07/05/ghostscript_…
∗∗∗ Binance-Kund:innen aufgepasst: SMS zu Login-Versuch ist Fake ∗∗∗
---------------------------------------------
Aktuell erreichen uns Meldungen über eine SMS im Namen der Handelsplattform Binance: Angeblich gibt es einen Login-Versuch aus Malta oder einem anderen Land. Es wird um einen Rückruf gebeten. Ignorieren Sie die SMS. Kriminelle versuchen Ihr Konto zu kapern und an Ihr Geld zu kommen.
---------------------------------------------
https://www.watchlist-internet.at/news/binance-login-fake/
∗∗∗ TeamViewer gibt Entwarnung: Keine Kundendaten beim Hack im Juni 2024 abgeflossen ∗∗∗
---------------------------------------------
Der Hack des Fernwartungsanbieters TeamViewer scheint wohl glimpflicher abgegangen zu sein, als befürchtet. Ein staatlicher Akteur (APT29) hatte zwar Zugriff auf die interne IT-Umgebung des Unternehmens. Aber weder die Produktivumgebung mit den Quellen und Binärdateien der Fernwartungssoftware noch Kundendaten scheinen betroffen. Das hat der Anbieter in einem nunmehr dritten Statusupdate bekannt gegeben.
---------------------------------------------
https://www.borncity.com/blog/2024/07/05/teamviewer-gibt-entwarnung-keine-k…
∗∗∗ Turning Jenkins Into a Cryptomining Machine From an Attackers Perspective ∗∗∗
---------------------------------------------
In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly.
---------------------------------------------
https://www.trendmicro.com/en_us/research/24/g/turning-jenkins-into-a-crypt…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (cockpit, python-astropy, python3-docs, and python3.12), Gentoo (BusyBox, GNU Coreutils, GraphicsMagick, podman, PuTTY, Sofia-SIP, TigerVNC, and WebKitGTK+), Mageia (chromium-browser-stable and openvpn), SUSE (cockpit, krb5, and netatalk), and Ubuntu (kopanocore, libreoffice, linux-aws, linux-oem-6.8, linux-aws-5.15, linux-azure, linux-azure-4.15, linux-lowlatency, linux-lowlatency-hwe-6.5, linux-oracle, linux-starfive-6.5, and virtuoso-opensource).
---------------------------------------------
https://lwn.net/Articles/980855/
∗∗∗ ZDI-24-897: Trend Micro Apex One modOSCE SQL Injection Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-897/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 03-07-2024 18:00 − Donnerstag 04-07-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ MikroTik Router als DDoS Quellen: Zahlen für Österreich ∗∗∗
---------------------------------------------
OVH beschreibt ausführlich in einem Blogbeitrag, dass sie es in letzter Zeit öfters mit DDoS-Angriffen zu tun hatten, die sie auf kompromittierte MikroTik Router zurückführen. Es geht hier um ernsthafte Bandbreiten und Packets/Sekunde: kein Wunder, wenn es die Angreifer geschafft haben, gute angebundene Router für ihre Zwecke einzuspannen. [..] Ich habe das als Anlass genommen, mal in unserer Datenbasis (basierend auf Scans von Shadowserver) nachzuschauen, wie es um diese Geräte in Österreich bestellt ist: MikroTik Router, die per SNMP ihre Modellnummern verraten.
---------------------------------------------
https://www.cert.at/de/aktuelles/2024/7/mikrotik-snmp
∗∗∗ Authy: Hacker greifen Millionen von Telefonnummern über eine ungesicherte API ab ∗∗∗
---------------------------------------------
Nachdem Kriminelle eine CSV-Datei mit Telefonnummern von angeblich 33 Millionen Authy-Nutzern geleakt haben, drohen unter anderem SMS-Phishing-Attacken.
---------------------------------------------
https://heise.de/-9789229
∗∗∗ Backup-Fiasko in Indonesien: Hacker verschenken Schlüssel und entschuldigen sich ∗∗∗
---------------------------------------------
Ein Ransomwareangriff bereitet Indonesien enorme Probleme. Die Lage ist sogar derart prekär, dass die Angreifer den Behörden nun die Hand reichen.
---------------------------------------------
https://www.golem.de/news/backup-fiasko-in-indonesien-hacker-verschenken-sc…
∗∗∗ Neues zum Hack des Qualys-Blogs ∗∗∗
---------------------------------------------
Qualys hat nun (auf meinen Bericht) zum Hack des Unternehmensblogs reagiert und geantwortet. Keine Kunden- und Unternehmensdaten gefährdet, nur a bisserl Spam im Blog, der bei einem Drittanbieter lief.
---------------------------------------------
https://www.borncity.com/blog/2024/07/04/neues-zum-hack-des-qualys-blogs/
∗∗∗ Attack Cases Against HTTP File Server (HFS) (CVE-2024-23692) ∗∗∗
---------------------------------------------
HTTP File Server (HFS) is a program that provides a simple type of web service. [..] Recently, the remote code execution vulnerability CVE-2024-23692 in the HFS program that provides web services was announced. Attack cases against vulnerable versions of HFS continue to be detected ever since. Because HFS is exposed to the public in order to enable users to connect to the HFS web server and download files, it can be a target for external attacks if it has a vulnerability.
---------------------------------------------
https://asec.ahnlab.com/en/67650/
∗∗∗ WordPress User Enumeration: Risks & Mitigation Steps ∗∗∗
---------------------------------------------
In this post, we’re diving deep into WordPress user enumeration. We’ll break down what it is, why it’s a problem, and most importantly — how to prevent a compromise.
---------------------------------------------
https://blog.sucuri.net/2024/07/wordpress-user-enumeration.html
∗∗∗ The Not-So-Secret Network Access Broker x999xx ∗∗∗
---------------------------------------------
Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain old-school Russian hackers it is not uncommon to find major players who have done little to prevent people from figuring out who they are in real life. A case study in this phenomenon is "x999xx," the nickname chosen by a venerated Russian hacker who specializes in providing the initial network access to various ransomware groups.
---------------------------------------------
https://krebsonsecurity.com/2024/07/the-not-so-secret-network-access-broker…
∗∗∗ Dissecting GootLoader With Node.js ∗∗∗
---------------------------------------------
We demonstrate effective methods to circumvent anti-analysis evasion techniques from GootLoader, a backdoor and loader malware distributed through fake forum posts.
---------------------------------------------
https://unit42.paloaltonetworks.com/javascript-malware-gootloader/
∗∗∗ No room for error: Don’t get stung by these common Booking.com scams ∗∗∗
---------------------------------------------
>From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation.
---------------------------------------------
https://www.welivesecurity.com/en/scams/common-bookingcom-scams/
∗∗∗ Senate leader demands answers from CISA on Ivanti-enabled hack of sensitive systems ∗∗∗
---------------------------------------------
Sen. Charles Grassley (R-IA) on Wednesday sent Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly a stern letter seeking documentation and answers relating to a January hack of the agency’s Chemical Security Assessment Tool (CSAT) along with the breach of a second sensitive system. Grassley noted that the cyberattack led to “malicious activity” potentially compromising some of the country’s most sensitive industrial and critical infrastructure information.
---------------------------------------------
https://therecord.media/senator-grassley-cisa-letter-hack
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (389-ds, c-ares, container-tools, cups, fontforge, go-toolset, iperf3, less, libreoffice, libuv, nghttp2, openldap, python-idna, python-jinja2, python-pillow, python3, python3.11-PyMySQL, qemu-kvm, and xmlrpc-c), Debian (znc), Fedora (firmitas and libnbd), Mageia (dcmtk, krb5, libcdio, and openssh), Oracle (golang, openssh, pki-core, and qemu-kvm), Red Hat (openssh), SUSE (apache2-mod_auth_openidc, emacs, go1.21, go1.22, krb5, openCryptoki, and openssh), and Ubuntu (linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux, linux-aws, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux-xilinx-zynqmp, linux, linux-aws, linux-kvm, linux-lts-xenial, linux, linux-gcp, linux-gcp-6.5, linux-laptop, linux-nvidia-6.5, linux-raspi, linux, linux-gcp, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-xilinx-zynqmp, linux, linux-ibm, linux-lowlatency, linux-nvidia, linux-raspi, linux-aws, linux-aws-6.5, linux-oem-6.5, linux-oracle, linux-oracle-6.5, linux-starfive, linux-aws, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-ibm, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-oracle, linux-oracle-5.15, linux-azure, linux-azure, linux-azure-6.5, linux-bluefield, linux-iot, linux-gcp, linux-intel, linux-hwe-5.15, and php7.0 and php7.2).
---------------------------------------------
https://lwn.net/Articles/980755/
∗∗∗ Citrix: Cloud Software Group Security Advisory for CVE-2024-6387 ∗∗∗
---------------------------------------------
https://support.citrix.com/article/CTX678072/cloud-software-group-security-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 02-07-2024 18:00 − Mittwoch 03-07-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Europol takes down 593 Cobalt Strike servers used by cybercriminals ∗∗∗
---------------------------------------------
Europol coordinated a joint law enforcement action known as Operation Morpheus, which led to the takedown of almost 600 Cobalt Strike servers used by cybercriminals to infiltrate victims networks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/europol-takes-down-593-cobal…
∗∗∗ Cyberangriff: Hacker erbeuten Daten von TÜV Rheinland ∗∗∗
---------------------------------------------
Einer Ransomwarebande ist es gelungen, in ein Schulungsnetzwerk des TÜV Rheinland einzudringen. Dabei sind womöglich Zugangsdaten abgeflossen.
---------------------------------------------
https://www.golem.de/news/cyberangriff-hacker-erbeuten-daten-von-tuev-rhein…
∗∗∗ South Korean ERP Vendors Server Hacked to Spread Xctdoor Malware ∗∗∗
---------------------------------------------
An unnamed South Korean enterprise resource planning (ERP) vendors product update server has been found to be compromised to deliver a Go-based backdoor dubbed Xctdoor.The AhnLab Security Intelligence Center (ASEC), which identified ..
---------------------------------------------
https://thehackernews.com/2024/07/south-korean-erp-vendors-server-hacked.ht…
∗∗∗ Hijacked: How hacked YouTube channels spread scams and malware ∗∗∗
---------------------------------------------
Here's how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform.
---------------------------------------------
https://www.welivesecurity.com/en/scams/hijacked-hacked-youtube-channels-sc…
∗∗∗ LockBit claims cyberattack on Croatia’s largest hospital ∗∗∗
---------------------------------------------
The LockBit ransomware gang has claimed responsibility for a cyberattack on Croatia’s largest hospital, which forced it to shut down IT systems for a day. The group claims to have gained access to patient and employee information, medical records, organ and donor data and contracts signed with external companies.
---------------------------------------------
https://therecord.media/lockbit-claims-cyberattack-croatia-hospital
∗∗∗ Wurde der Blog von Qualys gehackt? (2. Juli 2024) ∗∗∗
---------------------------------------------
Kurze Information zu Qualys, ein Technologieunternehmen mit Dienstleistungsangeboten im Bereich Cloud-Sicherheit und Compliance. Es steht die Frage im Raum, ob die mit ihrem Blog womöglich gehackt wurden.
---------------------------------------------
https://www.borncity.com/blog/2024/07/03/wurde-der-blog-von-qualys-gehackt-…
∗∗∗ Cisco NX-OS: Update gegen seit April angegriffene Sicherheitslücke ∗∗∗
---------------------------------------------
Im Cisco NX-OS mehrerer Nexus- und MDS-Switches wird eine Sicherheitslücke bereits seit April angegriffen. Jetzt stellt Cisco ein Update bereit.
---------------------------------------------
https://heise.de/-9787532
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerabilities in PanelView Plus devices could lead to remote code execution ∗∗∗
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2024/07/02/vulnerabilities-in…
∗∗∗ Unpatched RCE Vulnerabilities in Gogs: Argument Injection in the Built-In SSH Server ∗∗∗
---------------------------------------------
https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vu…
∗∗∗ Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (regreSSHion): July 2024 ∗∗∗
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ [R1] Tenable Identity Exposure Version 3.59.5 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2024-11
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 01-07-2024 18:00 − Dienstag 02-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Latest Intel CPUs impacted by new Indirector side-channel attack ∗∗∗
---------------------------------------------
Modern Intel processors, including chips from the Raptor Lake and the Alder Lake generations are susceptible to a new type of a high-precision Branch Target Injection (BTI) attack dubbed Indirector, which could be used to steal sensitive information from the CPU.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/latest-intel-cpus-impacted-b…
∗∗∗ Zahlungsaufforderung von Tecom für Erotikdienstleistungen ignorieren ∗∗∗
---------------------------------------------
In letzter Zeit werden uns vermehrt SMS-Nachrichten von Tecom gemeldet. Darin werden 90 Euro für Erotikdienstleistungen gefordert. Der Betrag soll auf ein tschechisches Konto überwiesen oder in bar per Einschreiben bezahlt werden. Bezahlen Sie nicht, es handelt sich um Betrug!
---------------------------------------------
https://www.watchlist-internet.at/news/zahlungsaufforderung-von-tecom-fuer-…
∗∗∗ Getting Unauthenticated Remote Code Execution on the Logsign Unified SecOps Platform ∗∗∗
---------------------------------------------
This blog looks at two separate vulnerabilities that can be combined to achieve remote, unauthenticated code execution on the web server via HTTP requests. [..] Logsign patched these and other vulnerabilities with version 6.4.8.
---------------------------------------------
https://www.thezdi.com/blog/2024/7/1/getting-unauthenticated-remote-code-ex…
∗∗∗ The End of Passwords? Embrace the Future with Passkeys. ∗∗∗
---------------------------------------------
Passkeys will become the new norm in a few years. Users will realize that passkeys simplify their lives, and companies and users alike will appreciate the reduced risk of breaches from phishing or brute-force attacks. However, building user trust in passkeys remains a challenge, like the adoption of password managers.
---------------------------------------------
https://blog.nviso.eu/2024/07/02/the-end-of-passwords-embrace-the-future-wi…
∗∗∗ Modern Cryptographic Attacks: A Guide for the Perplexed ∗∗∗
---------------------------------------------
In this write-up, we lay out in simple terms: “Classic Flavor” modern cryptanalysis (e.g. meet-in-the-middle attacks, Birthday Attack on CBC) [..] Side Channel Attacks (e.g. Timing Attacks, an honorable mention for SPECTRE) [..] Attacks on RSA (e.g. Bleichenbacher’s attack, related message attacks, Coppersmith’s method)
---------------------------------------------
https://research.checkpoint.com/2024/modern-cryptographic-attacks-a-guide-f…
∗∗∗ CocoaPods: Anfällig für Supply-Chain-Angriffe in "zahllosen" Mac- und iOS-Apps ∗∗∗
---------------------------------------------
Der Dependency-Manager auf Open-Source-Basis steckt in Millionen von Swift- und Objective-C-Programmen. [..] Eva Security fand heraus, dass CocoaPods bereits im Jahr 2014 alle Pods auf einen neuen "Trunk Server" auf GitHub migriert hat. Dabei wurden die Autoren jeder Bibliothek einfach zurückgesetzt. CocoaPods forderte die Entwickler dann auf, ihre jeweilige Bibliothek zu "claimen". Allerdings taten dies nicht alle.
---------------------------------------------
https://heise.de/-9786099
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco NX-OS Software CLI Command Injection Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. [..} To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. [..] In April 2024, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild. [..] CVE-2024-20399
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (httpd:2.4/httpd), Arch Linux (openssh), Fedora (cups, emacs, and python-urllib3), Gentoo (OpenSSH), Mageia (ffmpeg, gdb, openssl, python-idna, and python-imageio), Red Hat (golang and kernel), SUSE (booth, libreoffice, openssl-1_1-livepatches, podman, python-arcomplete, python-Fabric, python-PyGithub, python- antlr4-python3-runtime, python-avro, python-chardet, python-distro, python- docker, python-fakeredis, python-fixedint, pyth, python-Js2Py, python310, python39, and squid), and Ubuntu (cups and netplan.io).
---------------------------------------------
https://lwn.net/Articles/980393/
∗∗∗ QNAP: Vulnerability in OpenSSH ∗∗∗
---------------------------------------------
A remote code execution (RCE) vulnerability in OpenSSH has been reported to affect QTS 5.2.0 Release Candidate and QuTS hero h5.2. [..] QNAP is actively investigating this issue and working on a solution. We will fix the issue in the official releases of QTS 5.2.0 and QuTS hero h5.2.0.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-24-31
∗∗∗ Juniper: Notfall-Update für Junos OS auf SRX-Baureihe ∗∗∗
---------------------------------------------
Juniper Networks schließt eine als hochriskant eingestufte DoS-Lücke im Juniper OS der SRX-Geräte mit einem Update außer der Reihe. [..] Nachdem bereits am Freitag Notfall-Updates von Juniper Networks für Session Smart Router nötig waren, legt das Unternehmen nun mit einem Update außer der Reihe für das Junos OS auf Geräten der SRX-Baureihe nach. Sie dichten eine Denial-of-Service-Sicherheitslücke ab. [..] CVE-2024-21586
---------------------------------------------
https://heise.de/-9785970
∗∗∗ Android: Google schließt teils kritische Lücken am Juli-Patchday ∗∗∗
---------------------------------------------
Google hat Updates für Android 12, 12L, 13 und 14 im Rahmen des Juli-Patchdays veröffentlicht. Sie schließen Rechteausweitungs-Lücken. [..] Wie immer müssen sich Smartphone-Besitzer etwas gedulden, bis die Android-Aktualisierungen sich als Firmware-Updates für ihr eingesetztes Gerät materialisieren. Selbst für Googles hauseigene Pixel-Smartphones steht das Juli-Update zum Meldungszeitpunkt noch aus.
---------------------------------------------
https://heise.de/-9786995
∗∗∗ Splunk Security Advisories 2024-07-01 ∗∗∗
---------------------------------------------
https://advisory.splunk.com/advisories
∗∗∗ ICONICS and Mitsubishi Electric Products ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03
∗∗∗ Johnson Controls Kantech Door Controllers ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01
∗∗∗ mySCADA myPRO ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 28-06-2024 18:00 − Montag 01-07-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Roles in Cybersecurity: CSIRTs / LE / others ∗∗∗
---------------------------------------------
Back in January 2024, I was asked by the Belgian EU Presidency to moderate a panel during their high-level conference on cyber security in Brussels. The topic was the relationship between cyber security and law enforcement: how do CSIRTs and the police / public prosecutors cooperate, what works here and where are the fault lines in this collaboration. As the moderator, I wasn’t in the position to really present my own view on some of the issues, so I’m using this blogpost to document my thinking regarding the CSIRT/LE division of labour. From that starting point, this text kind of turned into a rant on what’s wrong with IT Security.
---------------------------------------------
https://www.cert.at/en/blog/2024/7/csirt-le-military
∗∗∗ NIS2 - Implementing Acts ∗∗∗
---------------------------------------------
Es liegen endlich Entwürfe für die Implementing Acts zur NIS 2 Richtline vor, die Umsetzungsdetails regeln werden. Genauer gesagt: es geht um Kriterien, wann ein Vorfall meldepflichtig wird und Maßnahmen zum Risikomanagement. Seitens der EU gibt es ein öffentliches Konsultationsverfahren dazu, das bis zum 25. Juli offen ist. Die Entwürfe sind auch über diese Webseite abrufbar.
---------------------------------------------
https://www.cert.at/de/blog/2024/6/nis2-implementing-acts
∗∗∗ Vorsicht vor gefälschten Gewinnspielen zur UEFA EURO 2024 ∗∗∗
---------------------------------------------
Kriminelle verbreiten per E-Mail gefälschte Gewinnspiele zur UEFA EURO 2024. In der E-Mail heißt es, dass man eine UEFA EURO 2024 Mystery Box gewinnen kann, wenn man auf den Link klickt und an einer kurzen Umfrage teilnimmt. Vorsicht: Kriminelle stehlen Ihre Daten und Sie tappen in eine Abo-Falle!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-gefaelschten-gewinnspie…
∗∗∗ Hackers exploit critical D-Link DIR-859 router flaw to steal passwords ∗∗∗
---------------------------------------------
Hackers are exploiting a critical vulnerability that affects all D-Link DIR-859 WiFi routers to collect account information from the device, including passwords. The security issue was disclosed in January and is currently tracked as CVE-2024-0769 (9.8 severity score) - a path traversal flaw that leads to information disclosure.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-d-l…
∗∗∗ Dev rejects CVE severity, makes his GitHub repo read-only ∗∗∗
---------------------------------------------
The popular open source project, ip had its GitHub repository archived, or made "read-only" by its developer as a result of a dubious CVE report filed for his project. Unfortunately, open-source developers have recently been met with an uptick in debatable or outright bogus CVEs filed for their projects.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/dev-rejects-cve-severity-mak…
∗∗∗ Fake IT support sites push malicious PowerShell scripts as Windows fixes ∗∗∗
---------------------------------------------
Fake IT support sites promote malicious PowerShell "fixes" for common Windows errors, like the 0x80070643 error, to infect devices with information-stealing malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fake-it-support-sites-push-m…
∗∗∗ Router makers support portal responds with MetaMask phishing ∗∗∗
---------------------------------------------
BleepingComputer has verified that the helpdesk portal of a router manufacturer is currently sending MetaMask phishing emails in response to newly filed support tickets, in what appears to be a compromise.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/router-makers-support-portal…
∗∗∗ Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data ∗∗∗
---------------------------------------------
[..] threat actor known as Kimsuky has been linked to the use of a new malicious Google Chrome extension thats designed to steal sensitive information as part of an ongoing intelligence collection effort.
---------------------------------------------
https://thehackernews.com/2024/06/kimsuky-using-translatext-chrome.html
∗∗∗ CapraRAT Spyware Disguised as Popular Apps Threatens Android Users ∗∗∗
---------------------------------------------
The threat actor known as Transparent Tribe has continued to unleash malware-laced Android apps as part of a social engineering campaign to target individuals of interest. [..] The list of new malicious APK files identified by SentinelOne is as follows - Crazy Game, Sexy Videos, TikToks, Weapons
---------------------------------------------
https://thehackernews.com/2024/07/caprarat-spyware-disguised-as-popular.html
∗∗∗ Unveiling Qilin/Agenda Ransomware - A Deep Dive into Modern Cyber Threats ∗∗∗
---------------------------------------------
Agenda ransomware, also known as 'Qilin,' first emerged in July 2022. Written in Golang, Agenda supports multiple encryption modes, all controlled by its operators. The Agenda ransomware actors use double extortion tactics, demanding payment for both a decryptor and the non-release of stolen data. This ransomware primarily targets large enterprises and high-value organizations, focusing particularly on the healthcare and education sectors in Africa and Asia.
---------------------------------------------
https://sec-consult.com/blog/detail/unveiling-qilin-agenda-ransomware-a-dee…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (dcmtk, edk2, emacs, glibc, gunicorn, libmojolicious-perl, openssh, org-mode, pdns-recursor, tryton-client, and tryton-server), Fedora (freeipa, kitty, libreswan, mingw-gstreamer1, mingw-gstreamer1-plugins-bad-free, mingw-gstreamer1-plugins-base, mingw-gstreamer1-plugins-good, mingw-poppler, and mingw-python-urllib3), Gentoo (cpio, cryptography, GNU Emacs, Org Mode, GStreamer, GStreamer Plugins, Liferea, Pixman, SDL_ttf, SSSD, and Zsh), Oracle (pki-core), Red Hat (httpd:2.4, libreswan, and pki-core), SUSE (glib2 and kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t), and Ubuntu (espeak-ng, libcdio, and openssh).
---------------------------------------------
https://lwn.net/Articles/980252/
∗∗∗ regreSSHion: Remote Unauthenticated Code Execution Vulnerability (CVE-2024-6387) in OpenSSH server ∗∗∗
---------------------------------------------
Eine kritische Schwachstelle (CVE-2024-6387) wurde im OpenSSH Server (sshd) auf glibc-basierten Linux-Systemen getestet. Diese Sicherheitslücke ermöglicht es einem nicht authentifizierten Angreifer potentiell, über eine Race-Condition im Signalhandler beliebigen Code als root auf dem betroffenen System auszuführen. OpenBSD-basierte Systeme sind nicht betroffen. Obwohl die Schwachstelle als Remote Code Execution (RCE) eingestuft wird, ist ihre Ausnutzung äußerst komplex. [..] Betroffen sind OpenSSH-Versionen früher als 4.4p1, es sei denn, sie wurden gegen die Schwachstellen CVE-2006-5051 und CVE-2008-4109 gepatcht, sowie OpenSSH-Versionen von 8.5p1 bis einschließlich 9.8p1.
---------------------------------------------
https://www.cert.at/de/aktuelles/2024/7/regresshion-remote-unauthenticated-…
∗∗∗ IP-Telefonie: Avaya IP Office stopft kritische Sicherheitslecks ∗∗∗
---------------------------------------------
Updates für Avaya IP Office dichten Sicherheitslecks in der Software ab. Angreifer können dadurch Schadcode einschleusen.
---------------------------------------------
https://heise.de/-9784229
∗∗∗ ABB: 2024-07-01: Cyber Security Advisory -ASPECT system operating with default credentials while exposed to the Internet ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101&Lan…
∗∗∗ Kubernetes: Invalid entry in vulnerability feed ∗∗∗
---------------------------------------------
https://github.com/kubernetes/website/issues/47003
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily