=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 13-08-2025 18:00 − Donnerstag 14-08-2025 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Spike in Fortinet VPN brute-force attacks raises zero-day concerns ∗∗∗
---------------------------------------------
A massive spike in brute-force attacks targeted Fortinet SSL VPNs earlier this month, followed by a switch to FortiManager, marked a deliberate shift in targeting that has historically preceded new vulnerability disclosures.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/spike-in-fortinet-vpn-brute-…
∗∗∗ New downgrade attack can bypass FIDO auth in Microsoft Entra ID ∗∗∗
---------------------------------------------
Security researchers have created a new FIDO downgrade attack against Microsoft Entra ID that tricks users into authenticating with weaker login methods, making them susceptible to phishing and session hijacking.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-downgrade-attack-can-byp…
∗∗∗ When Hackers Call: Social Engineering, Abusing Brave Support, and EncryptHub’s Expanding Arsenal ∗∗∗
---------------------------------------------
Trustwave SpiderLabs researchers have recently identified an EncryptHub campaign that combines social engineering with abuse of the Brave Support platform to deliver malicious payloads via the CVE-2025-26633 vulnerability. In this blog post, we will break down the techniques used in the campaign and highlight the new tools employed by the threat group.
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/when-hacker…
∗∗∗ A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode ∗∗∗
---------------------------------------------
The motivation behind writing this post is that we want to provide the kind of resource that we wouldve liked to have seen more of when starting our own careers in malware research.
---------------------------------------------
https://github.com/PaloAltoNetworks/Unit42-Threat-Intelligence-Article-Info…
∗∗∗ Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks ∗∗∗
---------------------------------------------
Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies.
---------------------------------------------
https://www.trendmicro.com/en_us/research/25/h/crypto24-ransomware-stealth-…
=====================
= Vulnerabilities =
=====================
∗∗∗ N-central 2025.3.1 ∗∗∗
---------------------------------------------
This release includes a critical security fix for CVE-2025-8875 and CVE-2025-8876. These vulnerabilities require authentication to exploit.
---------------------------------------------
https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel, python3.11-setuptools, thunderbird, and toolbox), Debian (chromium), Fedora (open62541 and perl-Authen-SASL), Oracle (git, kernel, konsole, and webkit2gtk3), SUSE (framework-inputmodule-control and poppler), and Ubuntu (apache2, mysql-8.0, mysql-8.4, node-qs, request-tracker5, and ruby-sidekiq).
---------------------------------------------
https://lwn.net/Articles/1033737/
∗∗∗ Rockwell Automation Security Advisories 14.08.2025 ∗∗∗
---------------------------------------------
Rockwell Automation has released 6 new security advisories (3x Critical, 3x High)
---------------------------------------------
https://www.rockwellautomation.com/en-us/trust-center/security-advisories.h…
∗∗∗ Sicherheitspatches: Angreifer können Schadcode auf GitLab-Servern verankern ∗∗∗
---------------------------------------------
Die GitLab-Entwickler haben insgesamt zwölf Sicherheitslücken geschlossen. Angreifer können Systeme kompromittieren. [..] In einer Warnmeldung versichern die Verantwortlichen, dass GitLab.com bereits abgesichert sei. Sie empfehlen, dass Admins von On-premise-Instanzen die reparierten Ausgaben 18.0.6, 18.1.4 oder 18.2.2 zeitnah installieren sollten. Noch gibt es keine Informationen, ob bereits Attacken laufen.
---------------------------------------------
https://heise.de/-10523017
∗∗∗ Nvidia stopft Sicherheitslücken in KI-Software ∗∗∗
---------------------------------------------
In diverser KI-Software von Nvidia haben die Entwickler Sicherheitslücken gefunden. Diese stellen teils ein hohes Risiko dar. [..] Betroffen sind die Nvidia-Projekte Apex, Isaac-GR00T, Megatron LM, Merlin Transformers4Rec, NeMo Framework sowie WebDataset.
---------------------------------------------
https://heise.de/-10524310
∗∗∗ Foxit PDF Reader: Präparierte PDFs können Schadcode auf PCs schleusen ∗∗∗
---------------------------------------------
Sicherheitsupdates für Foxit PDF Reader und Editor schließen mehrere Sicherheitslücken. [..] Im schlimmsten Fall kann Schadcode auf Systeme gelangen und diese vollständig kompromittieren. Das kann etwa über mit JavaScript präparierte PDFs erfolgen (etwa CVE-2025-55313 "hoch"). Dabei ist aber davon auszugehen, dass Opfer mitspielen und so eine Datei öffnen müssen, damit eine Attacke eingeleitet werden kann.
---------------------------------------------
https://heise.de/-10524778
∗∗∗ Drupal: Layout Builder Advanced Permissions - Moderately critical - Access bypass - SA-CONTRIB-2025-097 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2025-097
∗∗∗ Drupal: Authenticator Login - Highly critical - Access bypass - SA-CONTRIB-2025-096 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2025-096
∗∗∗ Drupal: Authenticator Login - Highly critical - Access bypass - SA-CONTRIB-2025-096 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2025-096
∗∗∗ ABB: 2025-08-12: Cyber Security Advisory -ABB AbilityTM zenon Remote Transport Vulnerability ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=2NGA002743&Language…
∗∗∗ ABB: 2025-08-11: Cyber Security Advisory -ELSB/BLBA ASPECT advisory several CVEs ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&Lan…
∗∗∗ TYPO3-PSA-2025-001: Sanitization bypass in SVG Sanitizer ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2025-001
∗∗∗ Siemens: SSA-395458 V1.0: Account Hijacking Vulnerability in Mendix SAML Module ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/html/ssa-395458.html
∗∗∗ Wordfence Intelligence Weekly WordPress Vulnerability Report (August 4, 2025 to August 10, 2025) ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2025/08/wordfence-intelligence-weekly-wordpr…
∗∗∗ Bosch: Vulnerabilities in ctrlX OS - Setup ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-129652.html
∗∗∗ Bosch: Denial of Service on Rexroth Fieldbus Couplers ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-757244.html
∗∗∗ Kubernetes: CVE-2025-5187 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/133471
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 12-08-2025 18:00 − Mittwoch 13-08-2025 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Docker Hub still hosts dozens of Linux images with the XZ backdoor ∗∗∗
---------------------------------------------
The XZ-Utils backdoor, first discovered in March 2024, is still present in at least 35 Linux images on Docker Hub, potentially putting users, organizations, and their data at risk.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozen…
∗∗∗ New trends in phishing and scams: how AI and social media are changing the game ∗∗∗
---------------------------------------------
Common tactics in phishing and scams in 2025: learn about the use of AI and deepfakes, phishing via Telegram, Google Translate and Blob URLs, biometric data theft, and more.
---------------------------------------------
https://securelist.com/new-phishing-and-scam-trends-in-2025/117217/
∗∗∗ Geld zurück nach Krypto-Betrug? Vorsicht vor Recovery Scam! ∗∗∗
---------------------------------------------
Was einmal geklappt hat, kann wieder funktionieren. Darauf hoffen Kriminelle und kontaktieren jene Menschen, denen sie in der Vergangenheit durch Krypto- bzw. Investmentbetrug geschadet haben. Sie geben sich als Agentur, Behörde etc. aus, die dabei helfen kann, das verlorene Geld zurückzuholen.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-recovery-scam/
∗∗∗ The MedusaLocker ransomware gang is hiring penetration testers ∗∗∗
---------------------------------------------
MedusaLocker, the ransomware-as-a-service group that has been active since 2019 is openly recruiting for penetration testers to help it compromise more businesses.
---------------------------------------------
https://www.fortra.com/blog/medusalocker-ransomware-gang-hiring-penetration…
∗∗∗ Malvertising campaign leads to PS1Bot, a multi-stage malware framework ∗∗∗
---------------------------------------------
Cisco Talos has observed an ongoing malware campaign that seeks to infect victims with a multi-stage malware framework, implemented in PowerShell and C#, which we are referring to as “PS1Bot.”
---------------------------------------------
https://blog.talosintelligence.com/ps1bot-malvertising-campaign/
∗∗∗ Microsoft Patchday August 2025: Sicherheitseinschätzungen von Tenable ∗∗∗
---------------------------------------------
Zum 12. August 2025 hat Microsoft zum Patchday Sicherheitsupdates für die noch im Support befindlichen Produkte veröffentlich und Schwachstellen geschlossen. [..] Inzwischen liegt mir eine Einschätzung seitens Tenable im Hinblick auf die Auswirkungen der Schwachstellen vor, die ich hier einfach zur Information in den Blog einstelle.
---------------------------------------------
https://www.borncity.com/blog/2025/08/13/microsoft-patchday-august-2025-sic…
=====================
= Vulnerabilities =
=====================
∗∗∗ Exchange Server Sicherheitsupdates August 2025 ∗∗∗
---------------------------------------------
Microsoft hat zum 12. August 2025 das "August 2025" Sicherheitsupdate für Exchange Server freigegeben. Das Sicherheitsupdate gilt Exchange Server 2016, Exchange Server 2019, und erstmals für Exchange Server Subscription Edition (SE).
---------------------------------------------
https://www.borncity.com/blog/2025/08/12/exchange-server-sicherheitsupdates…
∗∗∗ Microsoft Security Update Summary (12. August 2025) ∗∗∗
---------------------------------------------
Microsoft hat am 12. August 2025 Sicherheitsupdates für Windows-Clients und -Server, für Office – sowie für weitere Produkte – veröffentlicht. Die Sicherheitsupdates beseitigen 107 Schwachstellen (CVEs), eine davon wurde als 0-day klassifiziert und war öffentlich bekannt.
---------------------------------------------
https://www.borncity.com/blog/2025/08/12/microsoft-security-update-summary-…
∗∗∗ Angriff über Websites: Kritische Grafik-Schwachstellen gefährden Windows-Nutzer ∗∗∗
---------------------------------------------
Während sich CVE-2025-50165 nur auf Windows 11 24H2 und Windows Server 2025 bezieht, ist die Zahl der anfälligen Systeme im Falle von CVE-2025-53766 deutlich höher. [..] Beide lassen sich demnach über das Netzwerk ausnutzen und erfordern vorab keinerlei Authentifizierung oder Nutzerinteraktion. Die Angriffskomplexität ist laut Microsoft jeweils gering.
---------------------------------------------
https://www.golem.de/news/angriff-ueber-websites-kritische-grafik-schwachst…
∗∗∗ AMD und Intel stopfen zahlreiche Sicherheitslücken ∗∗∗
---------------------------------------------
AMD und Intel haben im August Updates herausgegeben, die zahlreiche Sicherheitslücken in VGA- sowie Netzwerktreibern und Prozessoren schließen.
---------------------------------------------
https://heise.de/-10520732
∗∗∗ Patchday: Mehrere Fortinet-Produkte sind angreifbar ∗∗∗
---------------------------------------------
Am gefährlichsten gilt einer Warnmeldung zufolge eine "kritische" Sicherheitslücke (CVE-2025-25256) in der IT-Sicherheitslösung FortiSIEM. An dieser Stelle können Angreifer ohne Authentifizierung mit präparierten CLI-Anfragen ansetzen, um Schadcode auszuführen. [..] Wie ein Sicherheitsforscher in einem Beitrag schreibt, können Angreifer die Authentifizierung von FortiWeb-Firewalls umgehen.
---------------------------------------------
https://heise.de/-10519770
∗∗∗ Zoom: Windows-Clients ermöglichen Angriffe aus dem Netz ∗∗∗
---------------------------------------------
Zwei Sicherheitslücken meldet Zoom in den Windows-Clients. Sie ermöglicht Angreifern aus dem Netz ohne vorherige Anmeldung, ihre Rechte auszuweiten. [..] Details dazu, wie Angriffe aussehen könnten, nennen sie hingegen nicht.
---------------------------------------------
https://heise.de/-10520206
∗∗∗ Adobe Patch Tuesday Fixes Over 60 Vulnerabilities Across 13 Products ∗∗∗
---------------------------------------------
Adobe has issued a new set of security patches addressing more than 60 vulnerabilities across 13 of its widely used software products. This update, part of the company’s routine Adobe Patch Tuesday cycle, includes critical fixes for applications ranging from Adobe Commerce and Illustrator to its Substance 3D suite.
---------------------------------------------
https://thecyberexpress.com/adobe-security-update-2/
∗∗∗ VU#767506: HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames ∗∗∗
---------------------------------------------
OverviewA vulnerability has been discovered within many HTTP/2 implementations allowing for denial of service (DoS) attacks through HTTP/2 control frames. This vulnerability is colloquially known as "MadeYouReset" and is tracked as CVE-2025-8671. [..] Various vendors have provided patches and statements to address the vulnerability. Please review their statements below.
---------------------------------------------
https://kb.cert.org/vuls/id/767506
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (apache2, kernel, linux-6.1, openjdk-17, and pgpool2), Fedora (glib2, matrix-synapse, openjpeg, python3-docs, and python3.13), Oracle (gdk-pixbuf2, glibc, java-1.8.0-openjdk, kernel, libxml2, python-requests, python3.11-setuptools, and thunderbird), SUSE (amber-cli, apache-commons-lang3, eclipse-jgit, go1.23, go1.24, govulncheck-vulndb, grub2, icinga2, kubernetes1.23, libgcrypt, python3, python313, sccache, slurm, tiff, and webkit2gtk3), and Ubuntu (linux-oracle).
---------------------------------------------
https://lwn.net/Articles/1033588/
∗∗∗ Palo Alto Networks Security Advisories 2025-08-13 ∗∗∗
---------------------------------------------
https://security.paloaltonetworks.com/
∗∗∗ f5: K000152635: Quarterly Security Notification (August 2025) ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000152635
∗∗∗ Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-02
∗∗∗ Santesoft Sante PACS Server ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01
∗∗∗ AVEVA PI Integrator ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-04
∗∗∗ Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01
∗∗∗ Schneider Electric EcoStruxure Power Monitoring Expert ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Montag 11-08-2025 18:00 − Dienstag 12-08-2025 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Netherlands: Citrix Netscaler flaw CVE-2025-6543 exploited to breach orgs ∗∗∗
---------------------------------------------
The Netherlands National Cyber Security Centre (NCSC) is warning that a critical Citrix NetScaler vulnerability tracked as CVE-2025-6543 was exploited to breach "critical organizations" in the country.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler…
∗∗∗ Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug ∗∗∗
---------------------------------------------
Over 3,300 Citrix NetScaler devices remain unpatched against a critical vulnerability that allows attackers to bypass authentication by hijacking user sessions, nearly two months after patches were released.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices…
∗∗∗ Scam hunter scammed by tax office impersonators ∗∗∗
---------------------------------------------
Scam hunter Julie-Anne Kearns, who helps scam victims online, opened up about a tax scam she fell for herself.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2025/08/scam-hunter-scammed-by-tax-o…
∗∗∗ Russian-Linked Curly COMrades Deploy MucorAgent Malware in Europe ∗∗∗
---------------------------------------------
A new report from Bitdefender reveals the Russian-linked hacking group Curly COMrades is targeting Eastern Europe with a new backdoor called MucorAgent. Learn how they’re using advanced tactics to steal data.
---------------------------------------------
https://hackread.com/russian-curly-comrades-mucoragent-malware-europe/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Advisory Ivanti Connect Secure, Policy Secure & ZTA Gateways (Multiple CVEs) ∗∗∗
---------------------------------------------
Ivanti has released updates for Ivanti Connect Secure which addresses medium, high, and critical vulnerabilities. At the time of disclosure, there have been no reports of customers being exploited by this vulnerability.
---------------------------------------------
https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect…
∗∗∗ August Security Advisory Ivanti Virtual Application Delivery Controller (vADC previously vTM) (CVE-2025-8310) ∗∗∗
---------------------------------------------
Ivanti has released updates for Ivanti Virtual Application Delivery Controller (vADC), previously Virtual Traffic Manager (vTM), which addresses one medium severity vulnerability. Successful exploitation could lead to account takeover. At the time of disclosure, there have been no reports of customers being exploited by this vulnerability.
---------------------------------------------
https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Virtual…
∗∗∗ 40,000 WordPress Sites Affected by Arbitrary File Read Vulnerability in UiCore Elements WordPress Plugin ∗∗∗
---------------------------------------------
On June 13th, 2025, we received a submission for an Arbitrary File Read vulnerability in UiCore Elements, a WordPress plugin with more than 40,000 active installations. This vulnerability makes it possible for an unauthenticated attacker to read arbitrary files on the server, which can contain sensitive information. During the disclosure process, our investigation revealed that the vulnerability leveraged an underlying issue in Elementor’s import functionality.
---------------------------------------------
https://www.wordfence.com/blog/2025/08/40000-wordpress-sites-affected-by-ar…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel, kernel-rt, and python-requests), Debian (ca-certificates-java), Fedora (chromium, clash-meta, mingw-python3, openjpeg, php-adodb, and toolbox), Mageia (kernel and kernel-linus), SUSE (chromium, ImageMagick, libgcrypt, libssh, libxml2, opensc, postgresql14, and postgresql16), and Ubuntu (dnsmasq, linux-gcp-6.8, linux-raspi, linux-oracle-6.14, and openjdk-17).
---------------------------------------------
https://lwn.net/Articles/1033445/
∗∗∗ Vtenext 25.02: A three-way path to RCE ∗∗∗
---------------------------------------------
Multiple vulnerabilities in vtenext 25.02 and prior versions allow unauthenticated attackers to bypass authentication through three separate vectors, ultimately leading to remote code execution on the underlying server.
---------------------------------------------
https://blog.sicuranext.com/vtenext-25-02-a-three-way-path-to-rce/
∗∗∗ OMSA-2025-0004: Omnissa Workspace ONE UEM addresses multiple vulnerabilities (CVE-2025-25229, CVE-2025-25231) ∗∗∗
---------------------------------------------
https://www.omnissa.com/omsa-2025-0004/
∗∗∗ OMSA-2025-0003: Omnissa Secure Email Gateway (SEG) updates address Server-Side Request Forgery (SSRF) vulnerability (CVE-2025-25235) ∗∗∗
---------------------------------------------
https://www.omnissa.com/omsa-2025-0003/
∗∗∗ Matrix protocol vulnerabilities fixed in room version 12 ∗∗∗
---------------------------------------------
https://matrix.org/blog/2025/08/security-release/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 08-08-2025 18:00 − Montag 11-08-2025 18:00
Handler: Felician Fuchs
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks ∗∗∗
---------------------------------------------
A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. [..] The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/winrar-zero-day-flaw-exploit…
∗∗∗ Command Injection in Jenkins via Git Parameter (CVE-2025-53652) ∗∗∗
---------------------------------------------
On July 9, Jenkins disclosed CVE-2025-53652 (aka SECURITY-34191), one of 31 plugin vulnerabilities announced that day. [..] was disclosed as medium severity, but it enables command injection via the Jenkins Git Parameter plugin. [..] Around 15,000 Jenkins servers appear to allow unauthenticated access, making RCE viable in the wild. [..] The patch can be disabled, so detection remains important even after upgrading.
---------------------------------------------
https://www.vulncheck.com/blog/git-parameter-rce
∗∗∗ EU law to protect journalists from spyware takes effect ∗∗∗
---------------------------------------------
Critics from press freedom groups say member states have not taken steps to give the law any teeth.
---------------------------------------------
https://therecord.media/eu-law-to-protect-journalists-from-spyware-takes-ef…
∗∗∗ Sicherheitslücken: Hacker knackt Auto über Webportal des Herstellers ∗∗∗
---------------------------------------------
Er konnte nicht nur aus der Ferne unzählige fremde Autos orten, entriegeln und starten, sondern auch nach Belieben die Halterdaten abfragen. [..] Zveare stellte seine Entdeckungen am vergangenen Sonntag auf der Def Con in Las Vegas vor. Den Angaben zufolge konnte er sich in dem besagten Händlerportal ein "nationales Administratorkonto" erstellen und erhielt damit einen weitreichenden Zugriff, der "nur wenigen ausgewählten Unternehmensnutzern vorbehalten ist" und "eine Vielzahl von lustigen Exploits" ermöglichte.
---------------------------------------------
https://www.golem.de/news/sicherheitsluecken-hacker-knackt-auto-ueber-webpo…
∗∗∗ Spionage: Rauchwarnmelder in Abhörwanzen verwandelt ∗∗∗
---------------------------------------------
Zwei junge Sicherheitsforscher haben im Rahmen der Def Con in Las Vegas Sicherheitslücken in smarten Rauchwarnmeldern des Typs Halo 3C aufgedeckt. [..] Der Hersteller der Halo-3C-Warnmelder hört auf den Namen IPVideo und ist laut der Webseite seit 2023 Teil von Motorola Solutions. Das Unternehmen hat dem Wired-Bericht zufolge bereits ein Firmwareupdate bereitgestellt, um die von Garcia und seinem Kollegen entdeckten Sicherheitslücken zu schließen. Mit der Cloud verbundene Geräte sollen das Update automatisch erhalten.
---------------------------------------------
https://www.golem.de/news/spionage-smarte-rauchwarnmelder-in-abhoerwanzen-v…
∗∗∗ Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models ∗∗∗
---------------------------------------------
Cybersecurity researchers have uncovered multiple security flaws in Dells ControlVault3 firmware and its associated Windows APIs that could have been abused by attackers to bypass Windows login, extract cryptographic keys, as well as maintain access even after a fresh operating system install by deploying undetectable malicious implants into the firmware. [..] Attackers can chain the vulnerabilities, which were presented at the Black Hat USA security conference, to escalate their privileges after initial access, bypass authentication controls, and maintain persistence on compromised systems that survive operating system updates or reinstallations.
---------------------------------------------
https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
∗∗∗ DEF CON hackers plug security holes in US water systems amid tsunami of threats ∗∗∗
---------------------------------------------
A DEF CON hacker walks into a small-town water facility … no, this is not the setup for a joke or a (super-geeky) odd-couple rom-com. It's a true story that happened at five utilities across four states.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/08/10/def_con_hack…
∗∗∗ libarchive: Sicherheitslücke entpuppt sich als kritisch ∗∗∗
---------------------------------------------
In der Open-Source-Kompressionsbibliothek libarchive klafft eine Sicherheitslücke, die zunächst als lediglich niedriges Risiko eingestuft wurde. [..] Die ursprüngliche Meldung der Lücke an das libarchive-Projekt durch Tobias Stöckmann mitsamt eines Proof-of-Concept-Exploits fand bereits am 10. Mai dieses Jahres statt. Am 20. Mai haben die Entwickler die Version 3.8.0 von libarchive herausgegeben. Die öffentliche Schwachstellenmeldung erfolgte am 9. Juni ebenfalls auf Github. Dort wurde auch die CVE-Nummer CVE-2025-5914 zugewiesen, jedoch zunächst mit dem Schweregrad CVSS 3.9, Risiko "niedrig", wie Red Hat die Lücke einordnete.
---------------------------------------------
https://www.heise.de/news/libarchive-Sicherheitsluecke-entpuppt-sich-als-kr…
∗∗∗ Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild ∗∗∗
---------------------------------------------
CVE-2025-32433 allows for remote code execution in sshd for certain versions of Erlang programming language’s OTP. We reproduced this CVE and share our findings.
---------------------------------------------
https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/
∗∗∗ BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons ∗∗∗
---------------------------------------------
A new class of USB-based attacks has come to light. [..] Attackers can now exploit vulnerabilities in commonly used USB webcams running embedded Linux, transforming them into BadUSB devices capable of injecting keystrokes and executing covert operations independently of the host operating system.
---------------------------------------------
https://thecyberexpress.com/badcam-linux-webcam/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base and libxml2), Debian (distro-info-data, gnutls28, modsecurity-crs, and node-tmp), Fedora (chromium, incus, perl, perl-Devel-Cover, perl-PAR-Packer, polymake, varnish, and xen), Red Hat (kernel, kernel-rt, and rhc), and SUSE (chromedriver, ffmpeg-4, go1.23, go1.24, go1.25, govulncheck-vulndb, himmelblau, iperf, keylime-ima-policy, net-tools, sqlite3, texmaker, tomcat, and zabbix).
---------------------------------------------
https://lwn.net/Articles/1033328/
∗∗∗ SQUID-2025:1 Buffer Overflow in URN Handling ∗∗∗
---------------------------------------------
https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3
∗∗∗ Xerox® FreeFlow® Core v8.0.5 ∗∗∗
---------------------------------------------
https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Se…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 07-08-2025 18:00 − Freitag 08-08-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ New EDR killer tool used by eight different ransomware groups ∗∗∗
---------------------------------------------
A new Endpoint Detection and Response (EDR) killer that is considered to be the evolution of 'EDRKillShifter,' developed by RansomHub, has been observed in attacks by eight different ransomware gangs. Such tools help ransomware operators turn off security products on breached systems so they can deploy payloads, escalate privileges, attempt lateral movement, and ultimately encrypt devices on the network without being detected.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-…
∗∗∗ Why blow up satellites when you can just hack them? ∗∗∗
---------------------------------------------
Four countries have now tested anti-satellite missiles (the US, China, Russia, and India), but it's much easier and cheaper just to hack them. In a briefing at the Black Hat conference in Las Vegas, Milenko Starcik and Andrzej Olchawa from German biz VisionSpace Technologies demonstrated how easy it is by exploiting software vulnerabilities in the software used in the satellites themselves, as well as the ground stations that control them.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/08/07/balck_hat_sa…
∗∗∗ US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms ∗∗∗
---------------------------------------------
U.S. law enforcement agencies provided new details on an operation that dismantled critical infrastructure used by the BlackSuit ransomware gang after the organization’s leak site was replaced with a takedown banner nearly two weeks ago. The group — which rebranded from its Royal name after a devastating 2023 attack that shut down the city of Dallas — successfully attacked more than 450 entities in the U.S. Since emerging in 2022, the gang secured more than $370 million in ransom payments, according to U.S. investigators.
---------------------------------------------
https://therecord.media/us-confirms-blacksuit-takedown
∗∗∗ Abusing Ubuntu 24.04 features for root privilege escalation ∗∗∗
---------------------------------------------
With the recent release of Ubuntu 24.04, we at Snyk Security Labs thought it would be interesting to examine the latest version of this Linux distribution to see if we could find any interesting privilege escalation vulnerabilities. In this post, we have seen that it only takes the leveraging of one small vulnerability, combined with a number of features, to achieve a chain of exploitation resulting in a full privilege escalation. Even where security controls are in place preventing the direct exploitation of a small vulnerability it may still be possible to finesse limited exploitation potential into a much greater impact.
---------------------------------------------
https://labs.snyk.io/resources/abusing-ubuntu-root-privilege-escalation/
∗∗∗ Oops Safari, I think You Spilled Something ∗∗∗
---------------------------------------------
In February 2023, researchers at Exodus Intelligence discovered a bug in the Data Flow Graph (DFG) compiler of WebKit, the browser engine used by Safari. This bug, CVE-2024-44308, was patched by Apple in November 2024. While it was alive, its exploit was chained with PAC and APRR bypasses on Apple Silicon to yield renderer remote code execution capabilities on macOS and iOS. Such capabilities, and many others including LPEs and RCEs on Windows and Linux, are available to Exodus’ customers.
---------------------------------------------
https://blog.exodusintel.com/2025/08/04/oops-safari-i-think-you-spilled-som…
∗∗∗ 60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign ∗∗∗
---------------------------------------------
Socket’s Threat Research Team has uncovered a long-running supply chain attack in the RubyGems ecosystem. Since at least March 2023, a threat actor using the aliases zon, nowon, kwonsoonje, and soonje has published 60 malicious gems posing as automation tools for Instagram, Twitter/X, TikTok, WordPress, Telegram, Kakao, and Naver. These gems deliver their advertised functionality, such as bulk posting or engagement, but covertly exfiltrate credentials (usernames and passwords) to threat actor-controlled infrastructure, which classifies them as infostealer malware.
---------------------------------------------
https://socket.dev/blog/60-malicious-ruby-gems-used-in-targeted-credential-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (gdk-pixbuf2, glibc, kernel, kernel-rt, libxml2, and opentelemetry-collector), Fedora (firefox, mingw-opencv, moby-engine, varnish, webkitgtk, xen, and yarnpkg), Oracle (firefox, gdk-pixbuf2, glibc, kernel, libblockdev, libxml2, python-requests, python3.12-setuptools, and qt5-qt3d), Red Hat (libxml2, pcs, and sudo), and SUSE (agama, chromium, dpkg, ghostscript, iperf, kubo, libIex-3_3-32, libpoppler-cpp2, libsoup, libtiff-devel-32bit, nginx, python-urllib3, ruby2.5, tgt, traefik, and traefik2).
---------------------------------------------
https://lwn.net/Articles/1033009/
∗∗∗ CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability ∗∗∗
---------------------------------------------
Today, CISA issued Emergency Directive (ED) 25-02: Mitigate Microsoft Exchange Vulnerability in response to CVE-2025-53786, a vulnerability in Microsoft Exchange server hybrid deployments. ED 25-02 directs all Federal Civilian Executive Branch (FCEB) agencies with Microsoft Exchange hybrid environments to implement required mitigations by 9:00 AM EDT on Monday, August 11, 2025. This vulnerability presents significant risk to all organizations operating Microsoft Exchange hybrid-joined configurations that have not yet implemented the April 2025 patch guidance.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/08/07/cisa-issues-ed-25-02-mit…
∗∗∗ CISA Releases Ten Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/08/07/cisa-releases-ten-indust…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 06-08-2025 18:00 − Donnerstag 07-08-2025 18:00
Handler: Felician Fuchs
Co-Handler: Guenes Holler
=====================
= News =
=====================
∗∗∗ New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations ∗∗∗
---------------------------------------------
A new post-exploitation command-and-control (C2) evasion method called Ghost Calls abuses TURN servers used by conferencing apps like Zoom and Microsoft Teams to tunnel traffic through trusted infrastructure.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuse…
∗∗∗ Wave of 150 crypto-draining extensions hits Firefox add-on store ∗∗∗
---------------------------------------------
A malicious campaign dubbed GreedyBear has snuck onto the Mozilla add-ons store, targeting Firefox users with 150 malicious extensions and stealing an estimated $1,000,000 from unsuspecting victims.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/wave-of-150-crypto-draining-…
∗∗∗ Critical Zero-Day Bugs Crack Open CyberArk, HashiCorp Password Vaults ∗∗∗
---------------------------------------------
Secrets managers hold all the keys to an enterprises kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities.
---------------------------------------------
https://www.darkreading.com/cybersecurity-operations/critical-zero-day-bugs…
∗∗∗ Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft ∗∗∗
---------------------------------------------
Cybersecurity researchers have demonstrated an "end-to-end privilege escalation chain" in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lateral movement, access sensitive data, and seize control of the cloud environment.
---------------------------------------------
https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
∗∗∗ How To Find SQL Injection Vulnerabilities in WordPress Plugins and Themes ∗∗∗
---------------------------------------------
SQL Injection (SQLi), a vulnerability almost as old as database-driven web applications themselves (CWE-89), persists as a classic example of failing to neutralize user-supplied input before its used in a SQL query. So why does this well-understood vulnerability type continue to exist?
---------------------------------------------
https://www.wordfence.com/blog/2025/08/how-to-find-sql-injection-vulnerabil…
∗∗∗ New Promptware Attack Hijacks User’s Gemini AI Via Google Calendar Invite ∗∗∗
---------------------------------------------
Cybersecurity researchers demonstrate a new attack on Google Gemini AI for Workspace. Discover how a simple calendar invite can be used to perform phishing, steal emails, and even control home appliances.
---------------------------------------------
https://hackread.com/promptware-attack-hijack-gemini-ai-google-calendar-inv…
∗∗∗ Unveiling a New Variant of the DarkCloud Campaign ∗∗∗
---------------------------------------------
In early July 2025, a new DarkCloud campaign was observed in the wild by Fortinet’s FortiGuard Labs team. It began with a phishing email containing an attached RAR archive. I subsequently investigated this campaign and conducted a step-by-step analysis.
---------------------------------------------
https://feeds.fortinet.com/~/922857380/0/fortinet/blogs~Unveiling-a-New-Var…
∗∗∗ HTTP/1.1 must die: the desync endgame ∗∗∗
---------------------------------------------
Upstream HTTP/1.1 is inherently insecure and regularly exposes millions of websites to hostile takeover. Six years of attempted mitigations have hidden the issue, but failed to fix it. This paper introduces several novel classes of HTTP desync attack capable of mass compromise of user credentials.
---------------------------------------------
https://portswigger.net/research/http1-must-die
∗∗∗ Malicious npm Packages Target WhatsApp Developers with Remote Kill Switch ∗∗∗
---------------------------------------------
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.
---------------------------------------------
https://socket.dev/blog/malicious-npm-packages-target-whatsapp-developers-w…
=====================
= Vulnerabilities =
=====================
∗∗∗ 6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks.
---------------------------------------------
https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (glibc, kernel, libxml2, python-requests, and python-setuptools), Debian (chromium), Fedora (chromium, firefox, gdk-pixbuf2, iputils, libsoup3, libssh, perl, perl-Devel-Cover, perl-PAR-Packer, polymake, and poppler), Gentoo (Composer and Spreadsheet-ParseExcel), Oracle (glibc, kernel, libxml2, python-setuptools, sqlite, and virt:rhel and virt-devel:rhel), Red Hat (libxml2), SUSE (grub2, libarchive, libgcrypt, and python311), and Ubuntu (cifs-utils and poppler).
---------------------------------------------
https://lwn.net/Articles/1032861/
∗∗∗ Erhöhte Bedrohungsaktivität gegen SonicWall Gen 7 Firewalls mit SSLVPN - Sofortmaßnahmen empfohlen ∗∗∗
---------------------------------------------
Update: 07. August 2025 Ergänzung von technischen Indikatoren für eine forensische Untersuchung möglicherweise betroffener Geräte sowie Informationen zu der angeblich relevanten Schwachstelle.
---------------------------------------------
https://www.cert.at/de/warnungen/2025/8/erhohte-bedrohungsaktivitat-gegen-s…
∗∗∗ Sicherheitslücken: Angreifer können IBM Tivoli Monitoring crashen lassen ∗∗∗
---------------------------------------------
IBMs IT-Verwaltungssoftware Tivoli Monitoring ist verwundbar und Angreifer können an zwei Sicherheitslücken ansetzen. Ein Update zum Schließen der Lücken steht zum Download bereit.
---------------------------------------------
https://heise.de/-10513072
∗∗∗ EG4 Electronics EG4 Inverters ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-07
∗∗∗ Dreame Technology iOS and Android Mobile Applications ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-06
∗∗∗ Packet Power EMX and EG ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-05
∗∗∗ Rockwell Automation Arena ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-04
∗∗∗ Burk Technology ARC Solo ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-03
∗∗∗ Johnson Controls FX80 and FX90 ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-02
∗∗∗ Delta Electronics DIAView ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 05-08-2025 18:00 − Mittwoch 06-08-2025 18:00
Handler: Felician Fuchs
Co-Handler: Guenes Holler
=====================
= News =
=====================
∗∗∗ Driver of destruction: How a legitimate driver is being used to take down AV processes ∗∗∗
---------------------------------------------
In an incident response case, Kaspersky experts discovered new malware that terminates AV processes by abusing the legitimate ThrottleStop driver.
---------------------------------------------
https://securelist.com/av-killer-exploiting-throttlestop-sys/117026/
∗∗∗ CISA Adds 3 D-Link Router Flaws to KEV Catalog After Active Exploitation Reports ∗∗∗
---------------------------------------------
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old security flaws impacting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild.
---------------------------------------------
https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.ht…
∗∗∗ CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures ∗∗∗
---------------------------------------------
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called UAC-0099 targeting government agencies, the defense forces, and enterprises of the defense-industrial complex in the country.
---------------------------------------------
https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
∗∗∗ GenAI Used For Phishing Websites Impersonating Brazil’s Government ∗∗∗
---------------------------------------------
In this blog post, ThreatLabz explores a campaign that uses generative AI tools like DeepSite AI and BlackBox AI to create malicious replicas of Brazil's State Department of Traffic and Ministry of Education.
---------------------------------------------
https://www.zscaler.com/blogs/security-research/genai-used-phishing-website…
∗∗∗ Kriminelle versenden gefälschte Zahlungsaufforderungen im Namen der WKO ∗∗∗
---------------------------------------------
Die Wirtschatfskammer Österreich (WKO) ist erneut Ziel einer Phishing-Attacke geworden. Aktuell kursiert eine betrügerische E-Mail, die vorgibt, von der WKO zu stammen. In der E-Mail wird der Eindruck erweckt, dass eine ausstehende Mitgliedsrechnung bezahlt werden müsse. Das Ziel der Attacke ist es, an persönliche Informationen und Log-in-Daten zu kommen.
---------------------------------------------
https://www.watchlist-internet.at/news/kriminelle-versenden-gefaelschte-zah…
∗∗∗ Makop Ransomware Identified in Attacks in South Korea ∗∗∗
---------------------------------------------
AhnLab SEcurity intelligence Center (ASEC) recently identified cases of Makop ransomware attacks targeting South Korean users. The Makop ransomware has been distributed to South Korean users by disguising as resumes or emails related to copyrights for several years. Recently, it has been reported that the ransomware is exploiting RDP for attacks.
---------------------------------------------
https://asec.ahnlab.com/en/89397/
∗∗∗ The Cost of a Call: From Voice Phishing to Data Extortion ∗∗∗
---------------------------------------------
In June, one of Google’s corporate Salesforce instances was impacted by similar UNC6040 activity described in this post. Google responded to the activity, performed an impact analysis and began mitigations. The instance was used to store contact information and related notes for small and medium businesses.
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-dat…
=====================
= Vulnerabilities =
=====================
∗∗∗ Experience Manager: Adobe patcht 90 Tage nicht und bringt nun Notfallupdate ∗∗∗
---------------------------------------------
Da Proof-of-Concept-Code im Umlauf ist, könnten Angriffe auf Adobe Experience Manager bevorstehen. Angreifer können an zwei Sicherheitslücken [..] ansetzen, um Systeme zu attackieren. Die Schwachstellen sind seit April dieses Jahres bekannt, Sicherheitspatches gibt es aber erst jetzt.
---------------------------------------------
https://www.heise.de/news/Experience-Manager-Adobe-patcht-90-Tage-nicht-und…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel and python3.12-setuptools), Fedora (perl-Crypt-CBC and unbound), Gentoo (FontForge, GPL Ghostscript, Mozilla Network Security Service (NSS), and PAM), Oracle (gdk-pixbuf2, jq, kernel, mod_security, ncurses, python-requests, and python3-setuptools), Red Hat (python-requests and socat), SUSE (docker, kernel-livepatch-MICRO-6-0-RT_Update_2, kernel-livepatch-MICRO-6-0-RT_Update_4, kernel-livepatch-MICRO-6-0-RT_Update_5, kernel-livepatch-MICRO-6-0-RT_Update_6, kernel-livepatch-MICRO-6-0-RT_Update_7, kernel-livepatch-MICRO-6-0_Update_2, kernel-livepatch-MICRO-6-0_Update_4, kernel-livepatch-MICRO-6-0_Update_5, kernel-livepatch-MICRO-6-0_Update_6, kubeshark-cli, libgcrypt, pam-config, perl, python-requests, python311, and python313), and Ubuntu (linux-raspi).
---------------------------------------------
https://lwn.net/Articles/1032700/
∗∗∗ Docker: Sicherheitsalptraum MCP – sechs Lücken identifiziert ∗∗∗
---------------------------------------------
Die Containerplattform Docker warnt vor Sicherheitsrisiken, die sich durch die Nutzung von MCP-Quellen ergeben und Angreifern leichten Zugriff auf Dateien, Datenbanken, Netzwerk und Secrets eröffnen. Außerdem können die Täter weitreichend Befehle absetzen und schädlichen Code einschleusen.
---------------------------------------------
https://heise.de/-10510262
∗∗∗ Sicherheitsupdates: Root-Attacken auf Dell PowerProtect und Unity möglich ∗∗∗
---------------------------------------------
Um möglichen Attacken vorzubeugen, sollten Admins Dell PowerProtect Data Domain und Unity, UnityVSA sowie Unity XT auf den aktuellen Stand bringen. Geschieht das nicht, können Angreifer unter anderem mit Root-Rechten auf Instanzen zugreifen und diese kompromittieren.
---------------------------------------------
https://heise.de/-10511706
∗∗∗ JVN: Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN16547726/
∗∗∗ ZDI-25-771: Trend Micro Apex One Console Command Injection Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-771/
∗∗∗ ZDI-25-807: (0Day) AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-807/
∗∗∗ Stable Channel Update for Desktop ∗∗∗
---------------------------------------------
http://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desk…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 04-08-2025 18:00 − Dienstag 05-08-2025 18:00
Handler: Felician Fuchs
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Android gets patches for Qualcomm flaws exploited in attacks ∗∗∗
---------------------------------------------
Google has released security patches for six vulnerabilities in Androids August 2025 security update, including two Qualcomm flaws exploited in targeted attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/android-gets-patches-for-qua…
∗∗∗ Stealing Machine Keys for fun and profit (or riding the SharePoint wave) ∗∗∗
---------------------------------------------
About 10 days ago exploits for Microsoft SharePoint (CVE-2025-53770, CVE-2025-53771) started being publicly abused ..
---------------------------------------------
https://isc.sans.edu/diary/Stealing+Machine+Keys+for+fun+and+profit+or+ridi…
∗∗∗ Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor ∗∗∗
---------------------------------------------
Plague malware has been around for months without tripping alarms Updated Researchers at German infosec services company Nextron Threat have spotted malware that creates a highly-persistent Linux backdoor and say antivirus engines do not flag the code as malicious.
---------------------------------------------
https://www.theregister.com/2025/08/05/plague_linux_backdoor/
∗∗∗ CrowdStrike investigated 320 North Korean IT worker cases in the past year ∗∗∗
---------------------------------------------
Threat hunters saw North Korean operatives almost daily, reflecting a 220% year-over-year increase in activity, CrowdStrike said in a new report.
---------------------------------------------
https://cyberscoop.com/crowdstrike-north-korean-operatives/
∗∗∗ Mozilla: Phishing-Attacken auf Add-on-Entwickler beobachtet ∗∗∗
---------------------------------------------
Zurzeit haben es Kriminelle auf Add-on-Entwickler abgesehen, die Erweiterungen für Firefox erstellen.
---------------------------------------------
https://www.heise.de/news/Mozilla-warnt-vor-Phishing-Attacken-auf-Add-on-En…
∗∗∗ From code to stolen wallets: How hackers are trapping AI development tools ∗∗∗
---------------------------------------------
When AI becomes a target At a time when AI technology is developing rapidly, AI has been increasingly integrated into our daily lives. However, due ..
---------------------------------------------
https://blog.360totalsecurity.com/en/from-code-to-stolen-wallets-how-hacker…
∗∗∗ Achtung Fake-Shop: vorwerk-deutschland.de ∗∗∗
---------------------------------------------
Auf vorwerk-deutschland.de freuen sich viele Kund:innen über ein Schnäppchen. Der neue Thermomix TM7 wird dort zu einem günstigeren Preis angeboten. Doch Vorsicht: Es handelt sich um einen Fake-Shop, der nur Zahlung per Vorkasse akzeptiert. Wer hier bestellt, verliert sein Geld und erhält keine Ware.
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-fake-shop-vorwerk-deutschlan…
∗∗∗ Ukrainische Hacker erbeuteten Geheimdokumente über das neueste russische Atom-U-Boot ∗∗∗
---------------------------------------------
Die erbeuteten Daten umfassen Besatzungslisten, Einsatzdaten und Baupläne. Laut dem ukrainischen Geheimdienst wurden auch die Schwächen des U-Boots offengelegt
---------------------------------------------
https://www.derstandard.at/story/3000000282244/ukrainische-hacker-erbeutete…
∗∗∗ Erhöhte Bedrohungsaktivität gegen SonicWall Gen 7 Firewalls mit SSLVPN - Sofortmaßnahmen empfohlen ∗∗∗
---------------------------------------------
SonicWall berichtet über eine deutliche Zunahme von Sicherheitsvorfällen in den letzten 96 Stunden, die Gen 7 SonicWall Firewalls mit aktiviertem SSLVPN betreffen. Die Bedrohungsaktivität wurde sowohl intern als auch von externen Organisationen und Unternehmen wie Arctic Wolf, Google Mandiant und Huntress gemeldet. Es ist noch nicht ..
---------------------------------------------
https://www.cert.at/de/warnungen/2025/8/erhohte-bedrohungsaktivitat-gegen-s…
∗∗∗ From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira ∗∗∗
---------------------------------------------
Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery ..
---------------------------------------------
https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumbleb…
∗∗∗ Cursor IDE: Persistent Code Execution via MCP Trust Bypass ∗∗∗
---------------------------------------------
Check Point Research uncovered a persistent remote code execution vulnerability in Cursor, a fast-growing AI-powered coding platform trusted by developers worldwide. MCP Vulnerability Cursor allows attackers to gain long-term, silent access to ..
---------------------------------------------
https://blog.checkpoint.com/research/cursor-ide-persistent-code-execution-v…
∗∗∗ Vietnamese-speaking hackers appear to be running global data theft operation through Telegram ∗∗∗
---------------------------------------------
A combination of phishing lures, a previously spotted infostealer and Telegram bots are fueling a campaign by apparent Vietnamese-speaking hackers to capture and sell sensitive data globally.
---------------------------------------------
https://therecord.media/pxa-infostealer-telegram-bots-vietnamese-speaking-h…
∗∗∗ Neue Insights zum SharePoint-Gate: Mitarbeiter aus China für die Wartung ∗∗∗
---------------------------------------------
Seit dem SharePoint-Desaster im Juli 2025, bei dem Schwachstellen angegriffen wurden, gibt es fast jeden Tag neue Enthüllungen. Es wurde spekuliert, dass mutmaßlich chinesische Hacker vorab auf interne ..
---------------------------------------------
https://www.borncity.com/blog/2025/08/05/neue-insights-zum-sharepoint-gate-…
∗∗∗ Microsoft Recall erfasst weiterhin (Juli 2025) Kreditkartendaten und Passwörter ∗∗∗
---------------------------------------------
Ist es eine Überraschung? Nein, keine Überraschung, sondern zu erwarten. Die Spionagefunktion Recall, die Microsoft auf die Windows-Systeme drückt, erfasst weiterhin Sensitives wie Kreditkartendaten und Passwörter. Und dies, ..
---------------------------------------------
https://www.borncity.com/blog/2025/08/05/microsoft-recall-erfasst-weiterhin…
∗∗∗ Detection Engineering: Practicing Detection-as-Code – Validation – Part 3 ∗∗∗
---------------------------------------------
In this part, we focus on implementing validation checks to improve consistency and ensure a minimum level of quality within the detection repository. Setting up validation pipelines is a key step, as it helps enforce the defined standards, reduce errors, and ensure that detections are reliable and consistent.
---------------------------------------------
https://blog.nviso.eu/2025/08/05/detection-engineering-practicing-detection…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 01-08-2025 18:00 − Montag 04-08-2025 18:00
Handler: Felician Fuchs
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Pi-hole discloses data breach triggered by WordPress plugin flaw ∗∗∗
---------------------------------------------
Pi-hole, a popular network-level ad-blocker, has disclosed that donor names and email addresses were exposed through a security vulnerability in the GiveWP WordPress donation plugin.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/pi-hole-discloses-data-breac…
∗∗∗ Mozilla warns of phishing attacks targeting add-on developers ∗∗∗
---------------------------------------------
Mozilla has warned browser extension developers of an active phishing campaign targeting accounts on its official AMO (addons.mozilla.org) repository.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/mozilla-warns-of-phishing-at…
∗∗∗ New Plague Linux malware stealthily maintains SSH access ∗∗∗
---------------------------------------------
A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access and bypass authentication on compromised systems.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors…
∗∗∗ Exchange: China wirft den USA Militär-Hacking vor ∗∗∗
---------------------------------------------
China beschuldigt US-Geheimdienste, über ein Jahr lang Microsoft Exchange-Schwachstellen ausgenutzt zu haben, um Militärdaten zu stehlen.
---------------------------------------------
https://www.golem.de/news/exchange-china-wirft-den-usa-militaer-hacking-vor…
∗∗∗ CISA roasts unnamed critical national infrastructure body for shoddy security hygiene ∗∗∗
---------------------------------------------
Plaintext passwords, shared admin accounts, and insufficient logging rampant at mystery org CISA is using the findings from a recent probe of an unidentified critical infrastructure organization to warn about the dangers of getting cybersecurity seriously wrong.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/08/02/cisa_coast_g…
∗∗∗ Lazarus Group rises again, this time with malware-laden fake FOSS ∗∗∗
---------------------------------------------
Software supply chain management vendor Sonatype last week published research in which it claimed that Lazarus Group has created hundreds of “shadow downloads” that appear to be popular open source software development tools but are full of malware.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/08/04/infosec_in_b…
∗∗∗ Gefälschte Rückerstattungs-Mails im Namen der WKO ∗∗∗
---------------------------------------------
Derzeit werden E-Mails mit dem Betreff „Ihr möglicher Erstattungsbetrag von bis zu 476 Euro“ an zahlreiche Mitglieder der Wirtschaftskammer Österreich (WKO) versendet. Darin wird behauptet, dass möglicherweise ein Rückerstattungsanspruch der Mitgliederbeiträge besteht, den man über einen Link prüfen kann. Achtung: Der Link führt zu einer betrügerischen Website, auf der persönliche Daten gestohlen werden.
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-e-mails-zu-rueckersta…
∗∗∗ Akira Ransomware Exploiting Potential Zero-Day in SonicWall SSL VPN ∗∗∗
---------------------------------------------
Artic Wolf also suggest that the attacks could be exploiting an undetermined security flaw in the appliances, meaning a Zero-Day vulnerability, given that some of the incidents affected SonicWall devices which were fully patched.
---------------------------------------------
https://www.truesec.com/hub/blog/akira-ransomware-exploiting-potential-zero…
∗∗∗ Doch Sicherheitsvorfall bei Logitech-Partnerliste ∗∗∗
---------------------------------------------
Es hat einen Sicherheitsvorfall bei einem Dienstleister gegeben, der für die Firma Logitech die Logitech-Partner betreut. Logitech-Partner erhielten die Tage eine Betrugs-Mail, die vor dem Risiko eines Angriffs auf eine MetaMask-Wallet warnte, aber einen Phishing-Link enthielt.
---------------------------------------------
https://www.borncity.com/blog/2025/08/03/doch-sicherheitsvorfall-bei-logite…
∗∗∗ New Attack Uses Windows Shortcut Files to Install REMCOS Backdoor ∗∗∗
---------------------------------------------
Security firm Point Wild has exposed a new malware campaign using malicious LNK files to install the REMCOS backdoor. This report details how attackers disguise files to gain full system control.
---------------------------------------------
https://hackread.com/attack-windows-shortcut-files-install-remcos-backdoor/
∗∗∗ When Flatpak’s Sandbox Cracks: Real‑Life Security Issues Beyond the Ideal ∗∗∗
---------------------------------------------
Flatpak’s sandbox model is robust in design, but imperfect in deployment. Sandboxes dissolved through misconfiguration, vulnerabilities like CVE‑2024‑32462, and symlink exploits illustrate the friction between ideal and actual protection.
---------------------------------------------
https://www.linuxjournal.com/content/when-flatpaks-sandbox-cracks-real-life…
=====================
= Vulnerabilities =
=====================
∗∗∗ Sicherheitsupdate: Phishingangriffe auf IBM Operational Decision Manager möglich ∗∗∗
---------------------------------------------
IBMs Businesstool Operational Decision Manager ist verwundbar. In aktuellen Versionen haben die Entwickler zwei Sicherheitslücken geschlossen.
---------------------------------------------
https://www.heise.de/news/Sicherheitsupdate-Phishingangriffe-auf-IBM-Operat…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (java-21-openjdk, kernel, libxml2, and lz4), Debian (exempi, ruby-graphql, and sope), Fedora (binutils, chromium, gdk-pixbuf2, libsoup3, poppler, and reposurgeon), Mageia (glib2.0 and wxgtk), Oracle (jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base and libxml2), Red Hat (kernel, pandoc, pcs, qemu-kvm, redis, and rsync), SUSE (chromedriver, coreutils, cosign, docker, gdk-pixbuf-devel, glib2, gnutls, grub2, gstreamer-plugins-base, helm, ignition, java-21-openjdk, jbigkit, jq, kernel, kubernetes1.28, kwctl, libxml2, nvidia-open-driver-G06-signed, opensc, pam-config, protobuf, python310, tgt, and valkey), and Ubuntu (linux-iot).
---------------------------------------------
https://lwn.net/Articles/1032371/
∗∗∗ Breaking NVIDIA Triton: CVE-2025-23319 - A Vulnerability Chain Leading to AI Server Takeover ∗∗∗
---------------------------------------------
Wiz Research discovers a critical vulnerability chain allowing unauthenticated attackers to take over NVIDIAs Triton Inference Server.
---------------------------------------------
https://www.wiz.io/blog/nvidia-triton-cve-2025-23319-vuln-chain-to-ai-server
∗∗∗ Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape ∗∗∗
---------------------------------------------
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
---------------------------------------------
https://socket.dev/blog/nestjs-rce-vuln
∗∗∗ VU#317469: Partner Software/Partner Web does not sanitize Report files and Note content, allowing for XSS and RCE ∗∗∗
---------------------------------------------
https://kb.cert.org/vuls/id/317469
∗∗∗ WebKitGTK and WPE WebKit Security Advisory WSA-2025-0005 ∗∗∗
---------------------------------------------
https://webkitgtk.org/security/WSA-2025-0005.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 31-07-2025 18:00 − Freitag 01-08-2025 18:00
Handler: Guenes Holler
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Microsoft to disable Excel workbook links to blocked file types ∗∗∗
---------------------------------------------
Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026. [..] After the rollout, Excel workbooks referencing blocked file types will display a #BLOCKED error or fail to refresh, eliminating security risks associated with accessing unsupported or high-risk file types, including, but not limited to, phishing attacks that utilize workbooks to redirect targets to malicious payloads.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-to-disable-extern…
∗∗∗ Kali Linux can now run in Apple containers on macOS systems ∗∗∗
---------------------------------------------
Cybersecurity professionals and researchers can now launch Kali Linux in a virtualized container on macOS Sequoia using Apples new containerization framework.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/kali-linux-can-now-run-in-ap…
∗∗∗ Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses.
---------------------------------------------
https://thehackernews.com/2025/07/experts-detect-multi-layer-redirect.html
∗∗∗ Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts ∗∗∗
---------------------------------------------
Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks. "The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign," Proofpoint said in a Thursday report.
---------------------------------------------
https://thehackernews.com/2025/08/attackers-use-fake-oauth-apps-with.html
∗∗∗ Huawei, at the heart of the Post outage ∗∗∗
---------------------------------------------
The cyberattack that hit Post (and Luxembourg) last week is believed to have targeted Huawei routers and their operating software. The presence of the Chinese giant at the heart of the infrastructure raises questions. The public company says it is reserving its answers for the MPs and ministers who will meet this Thursday at 10am in parliament.
---------------------------------------------
https://en.paperjam.lu/article/huawei-at-the-heart-of-the-post-outage
∗∗∗ CISA Releases Open-Source Eviction Strategies Tool for Cyber Incident Response ∗∗∗
---------------------------------------------
“How an organization approaches remediation and eviction of an incident is critically important to a successful response effort. Over the years, we have seen organizations struggle with identifying the right steps to take and the correct sequencing of actions to properly evict advanced adversaries from their enterprises,” said Jermaine Roebuck, Associate Director for Threat Hunting, CISA. “This tool will level the playing field by making it easier for IT staff and cyber defenders to coordinate efforts and achieve a successful eviction. I encourage public and private sector organizations to incorporate this capability into their incident response plans.”
---------------------------------------------
https://www.cisa.gov/news-events/news/cisa-releases-open-source-eviction-st…
∗∗∗ CISA and USCG Issue Joint Advisory to Strengthen Cyber Hygiene in Critical Infrastructure ∗∗∗
---------------------------------------------
CISA, in partnership with the U.S. Coast Guard (USCG), released a joint Cybersecurity Advisory aimed at helping critical infrastructure organizations improve their cyber hygiene. [..] CISA and USCG are sharing their findings and associated mitigations to assist other critical infrastructure organizations identify potential similar issues and take proactive measures to improve their cybersecurity posture. The mitigations include best practices such as not storing passwords or credentials in plaintext, avoiding sharing local administrator account credentials, and implementing comprehensive logging.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/07/31/cisa-and-uscg-issue-join…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (firefox and thunderbird), Debian (libcommons-lang-java, node-form-data, redis, and sope), Fedora (chromium), Mageia (slurm), Oracle (apache-commons-beanutils, firefox, kernel, redis:6, and thunderbird), Red Hat (kernel, kernel-rt, libxml2, and redis), SUSE (chromium, docker, ffmpeg-7, gnutls, kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t, libgcrypt, rav1e, and sccache), and Ubuntu (linux-lowlatency, linux-lowlatency-hwe-6.8).
---------------------------------------------
https://lwn.net/Articles/1032174/
∗∗∗ WordPress Vulnerability & Patch Roundup — July 2025 ∗∗∗
---------------------------------------------
https://blog.sucuri.net/2025/07/wordpress-vulnerability-patch-roundup-july-…
∗∗∗ Rockwell Automation Lifecycle Services with VMware ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-212-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily