=====================
= End-of-Day report =
=====================
Timeframe: Montag 15-09-2025 18:00 − Dienstag 16-09-2025 18:00
Handler: Felician Fuchs
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Neuer NPM-Großangriff: Selbst-vermehrende Malware infiziert Dutzende Pakete ∗∗∗
---------------------------------------------
Verschiedene IT-Sicherheitsunternehmen warnen vor neuen Angriffen auf das npm-Ökosystem rund um node.js. Mehrere Dutzend Pakete (mindestens 40, in einem Bericht gar an die 150) sind mit einer Malware infiziert, die geheime Daten stiehlt und über einen Webhook ausleitet. Zudem repliziert sich die Schadsoftware selbsttätig – und ist somit ein Wurm. [..] Unklar ist noch, wo der Angriff begann – einen klaren "Patient Null" nennen die drei analysierenden Unternehmen nicht. [..] JavaScript-Entwickler und insbesondere die Verwalter von auf npm gehosteten Paketen sollten größte Vorsicht walten lassen und die umfangreiche Liste infizierter Pakete konsultieren.
---------------------------------------------
https://heise.de/-10651111
∗∗∗ Apple backports zero-day patches to older iPhones and iPads ∗∗∗
---------------------------------------------
Apple has released security updates to backport patches released last month to older iPhones and iPads, addressing a zero-day bug that was exploited in "extremely sophisticated" attacks. This security flaw is the same one Apple has patched for devices running iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, and macOS (Sequoia 15.6.1, Sonoma 14.7.8, and Ventura 13.7.8) on August 20.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/apple-backports-zero-day-pat…
∗∗∗ Patchstatus unklar: Angreifer attackieren Fertigungsmanagementtool DELMIA Apriso ∗∗∗
---------------------------------------------
DELMIA Apriso ist eine Manufacturing-Operations-Management-Software (MOM) und ein Manufacturing Execution System (MES) [..] Der Anbieter der Software, Dassault Systèmes, erwähnte die Sicherheitslücke (CVE-2025-5086 "kritisch") bereits im Juni dieses Jahres in einer äußerst knapp formulierten Warnmeldung. [..] Anfang September warnte nun ein Sicherheitsforscher des SANS-Institut Internet Strom Center in einem Beitrag vor Exploitversuchen. [..] Unklar bleibt auch, ob es einen Sicherheitspatch gibt.
---------------------------------------------
https://www.heise.de/news/Patchstatus-unklar-Attacken-auf-Fertigungsmanagem…
∗∗∗ IServ: Schullösung mit Schwäche inbegriffen? ∗∗∗
---------------------------------------------
Am 8. September 2025 ist jemandem aufgefallen, dass das Web-Frontend des IServ-Schul-Servers der IServ GmbH eine "Benutzeraufzählung" im weitesten Sinne ermöglicht. Gibt jemand den Namen einer Person an der IServ-Anmeldeseite einer Schule ein, und versucht er eine Anmeldung, ohne das Passwort zu kennen, schlägt diese Anmeldung natürlich fehl. Noch ist also alles im grünen Bereich, da dieser Anmeldeversuch abgewiesen wird. Das Problem liegt darin, dass sich die Antworten dieser fehlgeschlagenen Anmeldeversuche unterscheiden, nachdem, ob das Benutzerkonto existiert oder nicht und hängt angeblich noch von anderen Bedingungen ab.
---------------------------------------------
https://www.borncity.com/blog/2025/09/16/iserve-schulloesung-mit-schwaeche-…
∗∗∗ Microsoft: Exchange 2016 and 2019 reach end of support in 30 days ∗∗∗
---------------------------------------------
Microsoft has reminded administrators again that Exchange 2016 and Exchange 2019 will reach the end of extended support next month and has provided guidance for decommissioning outdated servers.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-2016-and…
∗∗∗ Phoenix: Neue Rowhammer-Variante verleiht Angreifern Root-Rechte ∗∗∗
---------------------------------------------
Forscher von Google und der ETH Zürich haben eine neue Variante des Rowhammer-Angriffs vorgestellt. Sie betrifft auch moderne DDR5-RAM-Module, die eigentlich vor entsprechenden Attacken geschützt sein sollten. [..] Die Phoenix genannte Angriffstechnik greift laut Informationsseite der Entdecker(öffnet im neuen Fenster) auf eine Schwachstelle bei den Rowhammer-Abwehrmaßnahmen zurück, die bestimmte Refresh-Intervalle des Speichers nicht abdecken.
---------------------------------------------
https://www.golem.de/news/phoenix-neue-rowhammer-variante-verleiht-angreife…
∗∗∗ RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT ∗∗∗
---------------------------------------------
Kaspersky GReAT expert takes a closer look at the RevengeHotels threat actors new campaign, including AI-generated scripts, targeted phishing, and VenomRAT.
---------------------------------------------
https://securelist.com/revengehotels-attacks-with-ai-and-venomrat-across-la…
∗∗∗ New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site ∗∗∗
---------------------------------------------
Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. "The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection," Acronis security researcher Eliad Kimhy said in a report shared with The Hacker News.
---------------------------------------------
https://thehackernews.com/2025/09/new-filefix-variant-delivers-stealc.html
∗∗∗ SmokeLoader Rises From the Ashes ∗∗∗
---------------------------------------------
Active since 2011, SmokeLoader (aka Smoke or Dofoil) is a popular malware loader that is designed to deliver second-stage payloads such as trojans, ransomware, and information stealers. [..] In May 2024, Operation Endgame, an international collaboration between law enforcement and private industry (which included Zscaler ThreatLabz) dismantled numerous instances of SmokeLoader and remotely removed the malware from infected systems. [..] ThreatLabz has identified two new SmokeLoader versions that are being used by multiple threat groups.
---------------------------------------------
https://www.zscaler.com/blogs/security-research/smokeloader-rises-ashes
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel and kernel-rt), Debian (node-sha.js and python-django), Fedora (chromium, cups, exiv2, perl-Catalyst-Authentication-Credential-HTTP, perl-Catalyst-Plugin-Session, perl-Plack-Middleware-Session, and qemu), Red Hat (container-tools:rhel8, podman, and udisks2), SUSE (cargo-audit, cargo-c, cargo-packaging, and kernel-devel), and Ubuntu (libcpanel-json-xs-perl, libjson-xs-perl, rubygems, sqlite3, and vim).
---------------------------------------------
https://lwn.net/Articles/1038325/
∗∗∗ Spring Security and Spring Framework Release Fixes for CVE-2025-41248 and CVE-2025-41249 ∗∗∗
---------------------------------------------
https://spring.io/blog/2025/09/15/spring-framework-and-spring-security-fixe…
∗∗∗ LG WebOS TV Path Traversal, Authentication Bypass and Full Device Takeover ∗∗∗
---------------------------------------------
https://ssd-disclosure.com/lg-webos-tv-path-traversal-authentication-bypass…
∗∗∗ Mozilla Security Advisories September 16, 2025 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/
∗∗∗ TYPO3-EXT-SA-2025-013: Vulnerability in bundled package in extension "Base Excel" (base_excel) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2025-013
∗∗∗ TYPO3-EXT-SA-2025-012: Cross-Site Scripting in extension "Form to Database" (form_to_database) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2025-012
∗∗∗ Synology-SA-25:11 Safe Access ∗∗∗
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_25_11
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 12-09-2025 18:00 − Montag 15-09-2025 18:00
Handler: Felician Fuchs
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Microsoft reminds of Windows 10 support ending in 30 days ∗∗∗
---------------------------------------------
On Friday, Microsoft reminded customers once again that Windows 10 will reach its end of support in 30 days, on October 14.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-reminds-of-window…
∗∗∗ Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers ∗∗∗
---------------------------------------------
Kaspersky experts discuss the Model Context Protocol used for AI integration. We describe the MCPs architecture, attack vectors and follow a proof of concept to see how it can be abused.
---------------------------------------------
https://securelist.com/model-context-protocol-for-ai-integration-abused-in-…
∗∗∗ A Cyberattack Victim Notification Framework ∗∗∗
---------------------------------------------
When cyber incidents occur, victims should be notified in a timely manner so they have the opportunity to assess and remediate any harm. However, providing notifications has proven a challenge across industry.
---------------------------------------------
https://www.schneier.com/blog/archives/2025/09/a-cyberattack-victim-notific…
∗∗∗ Lawsuit About WhatsApp Security ∗∗∗
---------------------------------------------
Attaullah Baig, WhatsApp’s former head of security, has filed a whistleblower lawsuit alleging that Facebook deliberately failed to fix a bunch of security flaws, in violation of its 2019 settlement agreement with the Federal Trade Commission.
---------------------------------------------
https://www.schneier.com/blog/archives/2025/09/lawsuit-about-whatsapp-secur…
∗∗∗ FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks ∗∗∗
---------------------------------------------
The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for a string of data theft and extortion attacks. "Both groups have recently been observed targeting organizations Salesforce platforms via different initial access mechanisms," the FBI said.
---------------------------------------------
https://thehackernews.com/2025/09/fbi-warns-of-unc6040-and-unc6395.html
∗∗∗ All your vulns are belong to us! CISA wants to maintain gov control of CVE program ∗∗∗
---------------------------------------------
Get ready for a fight over who steers the global standard for vulnerability identification The Cybersecurity and Infrastructure Security Agency (CISA) nearly let the Common Vulnerabilities and Exposures (CVE) program lapse earlier this year, but a new "vision" document it released this week signals that it now wants more control over the global standard for vulnerability identification.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/09/12/cisas_vision…
∗∗∗ Docker Image Security – Teil 2: Minimale und sichere Docker Images ∗∗∗
---------------------------------------------
Distroless Images reduzieren Paketgrößen drastisch, indem sie unnötige Komponenten wie Bash und Paketmanager weglassen. Das erhöht Performance und Sicherheit.
---------------------------------------------
https://www.heise.de/hintergrund/Docker-Image-Security-Teil-2-Minimale-und-…
∗∗∗ Cyberkriminelle: "Scattered Lapsus$ Hunters" haben keine Lust mehr ∗∗∗
---------------------------------------------
Die Bande machte zuletzt durch Cyberangriffe auf Jaguar und Marks & Spencer von sich reden, die immense Schäden verursachten. Nicht alle halten die Füße still.
---------------------------------------------
https://www.heise.de/news/Cybergang-Scattered-Lapsus-Hunters-kuendigt-Absch…
∗∗∗ Angreifer können IT-Sicherheitslösung IBM QRadar SIEM lahmlegen ∗∗∗
---------------------------------------------
Verschiedene Komponenten in IBMs IT-Sicherheitslösung QRadar SIEM sind verwundbar. Nutzen Angreifer die Schwachstellen erfolgreich aus, können sie unter anderem DoS-Zustände erzeugen, sodass Dienste abstürzen. Fällt dadurch der eigentlich durch die Anwendung versprochene Schutz weg, kann das fatale Folgen haben.
---------------------------------------------
https://www.heise.de/news/Angreifer-koennen-IT-Sicherheitsloesung-IBM-QRada…
∗∗∗ Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain ∗∗∗
---------------------------------------------
Effective OAuth token management is crucial for supply chain security, preventing breaches caused by dormant integrations, insecure storage or lack of rotation.
---------------------------------------------
https://unit42.paloaltonetworks.com/third-party-supply-chain-token-manageme…
∗∗∗ npm-Hack: Angreifer schauen weitgehend in die Röhre ∗∗∗
---------------------------------------------
Es war zwar ein Desaster im Hinblick auf die Kompromittierung einer Lieferkette – der Hack eines npm-Entwicklerkontos samt Injektion von Schadcode. Der Angreifer scheint aber mit ziemlich leeren Händen aus der Sache rausgegangen zu sein – er soll, je nach Quelle zwischen 65 und 600 US-Dollar an Kryptogeld gestohlen haben.
---------------------------------------------
https://www.borncity.com/blog/2025/09/14/npm-hack-angreifer-schauen-weitgeh…
∗∗∗ New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts ∗∗∗
---------------------------------------------
Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique to bypass MFA and how to protect yourself from attacks targeting Microsoft and Google accounts.
---------------------------------------------
https://hackread.com/voidproxy-phishing-service-bypasses-mfa-microsoft-goog…
∗∗∗ Qrator Labs Mitigated Record L7 DDoS Attack from 5.76M-Device Botnet ∗∗∗
---------------------------------------------
Qrator Labs blocked a record L7 DDoS attack from a 5.76M-device botnet targeting government systems, showing rapid global growth since March.
---------------------------------------------
https://hackread.com/qrator-labs-mitigate-l7-ddos-attack-5-76m-botnet/
∗∗∗ 600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet ∗∗∗
---------------------------------------------
Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations. Full details available on the GFW Report.
---------------------------------------------
https://hackread.com/great-firewall-of-china-data-published-largest-leak/
∗∗∗ ShadowSilk Data Exfiltration Attack ∗∗∗
---------------------------------------------
FortiGuard Labs’ network telemetry has observed active exploitation of known vulnerabilities in Drupal Core and the WP-Automatic WordPress plugin for initial access. Following compromise, attackers deploy multiple web shells and utilities to enable lateral movement, privilege escalation, and the installation of remote access trojans (RATs).
---------------------------------------------
https://fortiguard.fortinet.com/outbreak-alert/shadowsilk-data-exfiltration
∗∗∗ Phishing campaign targeting crates.io users ∗∗∗
---------------------------------------------
We received multiple reports of a phishing campaign targeting crates.io users (from the rustfoundation.dev domain name), mentioning a compromise of our infrastructure and asking users to authenticate to limit damage to their crates.
---------------------------------------------
https://blog.rust-lang.org/2025/09/12/crates-io-phishing-campaign/
∗∗∗ The Internet Coup ∗∗∗
---------------------------------------------
A Technical Analysis on How a Chinese Company is Exporting The Great Firewall to Autocratic Regimes.
---------------------------------------------
https://interseclab.org/research/the-internet-coup/
=====================
= Vulnerabilities =
=====================
∗∗∗ Lücke in Microsoft Agentic AI und Visual Studio kann Schadcode passieren lassen ∗∗∗
---------------------------------------------
Angreifer können an einer Schwachstelle in Microsoft Agentic AI und Visual Studio ansetzen. Klappt eine Attacke, können sie Schadcode ausführen und Systeme mit hoher Wahrscheinlichkeit vollständig kompromittieren. Ein Sicherheitsupdate steht zum Download bereit.
---------------------------------------------
https://www.heise.de/news/Schadcode-Schlupfloch-in-Microsoft-Agentic-AI-und…
∗∗∗ Jetzt patchen! Attacken auf Android-Smartphones von Samsung beobachtet ∗∗∗
---------------------------------------------
Derzeit nutzen Angreifer eine Sicherheitslücke in Samsung-Smarthpones mit Android 13, 14, 15 und 16 aus. Darüber kann Schadcode auf Geräte gelangen. Ein Sicherheitspatch ist für ausgewählte Geräte verfügbar.
---------------------------------------------
https://www.heise.de/news/Jetzt-patchen-Attacken-auf-Android-Smartphones-vo…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (cups, kernel, and mysql-selinux and mysql8.4), Debian (cjson, jetty9, and shibboleth-sp), Fedora (bustle, cef, checkpointctl, chromium, civetweb, cups, forgejo, jupyterlab, kernel, libsixel, linenoise, maturin, niri, perl-Cpanel-JSON-XS, python-uv-build, ruff, rust-busd, rust-crypto-auditing-agent, rust-crypto-auditing-client, rust-crypto-auditing-event-broker, rust-matchers, rust-monitord, rust-monitord-exporter, rust-secret-service, rust-tracing-subscriber, rustup, tcpreplay, tuigreet, udisks2, uv, and xwayland-satellite), Oracle (cups, gdk-pixbuf2, kernel, mysql-selinux and mysql8.4, and php:8.2), Red Hat (kernel, kernel-rt, and multiple packages), Slackware (cups, kernel, and patch), and SUSE (busybox, busybox-links, chromedriver, chromium, cups-filters, curl, go1.25, jasper, java-11-openj9, java-17-openj9, java-1_8_0-openjdk, kernel, kernel-devel, kubo, libssh-config, orthanc-gdcm, python-aiohttp, python-eventlet, python-h2, and xen).
---------------------------------------------
https://lwn.net/Articles/1038231/
∗∗∗ CVE-2025-58434: Critical FlowiseAI Flaw Enables Full Account Takeover ∗∗∗
---------------------------------------------
A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk of complete account compromise. Tracked as CVE-2025-58434, this vulnerability affects both the cloud-hosted version of FlowiseAI and self-hosted deployments that expose the relevant API endpoints.
---------------------------------------------
https://thecyberexpress.com/cve-2025-58434/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 11-09-2025 18:00 − Freitag 12-09-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Panama Ministry of Economy discloses breach claimed by INC ransomware ∗∗∗
---------------------------------------------
Panama's Ministry of Economy and Finance (MEF) has disclosed that one of its computers may have been compromised in a cyberattack. The government noted that it activated the security procedures for these situations, stating that the incident has been contained and didn't impact core systems that are vital to its operations.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/panama-ministry-of-economy-d…
∗∗∗ Vidar Infostealer Back with a Vengeance ∗∗∗
---------------------------------------------
The long-running Vidar infostealer has evolved with new obfuscation techniques. That is according to researchers at cybersecurity vendor Aryaka, which published research last week dedicated to a fresh campaign involving the malware-as-a-service Vidar that has emerged in recent weeks. First tracked in late 2018, Vidar is an infostealer that enables affiliates to grab credentials, operating system details, cookies, sensitive financial data, various authentication tokens, and more from compromised environments.
---------------------------------------------
https://www.darkreading.com/endpoint-security/vidar-infostealer-back-with-v…
∗∗∗ Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence ∗∗∗
---------------------------------------------
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called "gross cybersecurity negligence" that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks.
---------------------------------------------
https://thehackernews.com/2025/09/senator-wyden-urges-ftc-to-probe.html
∗∗∗ New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems using a now-patched vulnerability disclosed earlier this year.
---------------------------------------------
https://thehackernews.com/2025/09/new-hybridpetya-ransomware-bypasses.html
∗∗∗ Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms ∗∗∗
---------------------------------------------
Apple has notified users in France of a spyware campaign targeting their devices, according to the Computer Emergency Response Team of France (CERT-FR). The agency said the alerts were sent out on September 3, 2025, making it the fourth time this year that Apple has notified citizens in the county that at least one of the devices linked to their iCloud accounts may have been compromised as part of highly-targeted attacks.
---------------------------------------------
https://thehackernews.com/2025/09/apple-warns-french-users-of-fourth.html
∗∗∗ Huntresss hilarious attacker surveillance splits infosec community ∗∗∗
---------------------------------------------
Security outfit Huntress has been forced onto the defensive after its latest research – described by senior staff as "hilarious" – split opinion across the cybersecurity community.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/09/12/huntress_att…
∗∗∗ Bulletproof Host Stark Industries Evades EU Sanctions ∗∗∗
---------------------------------------------
In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new findings show those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.
---------------------------------------------
https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evade…
∗∗∗ Swiss government looks to undercut privacy tech, stoking fears of mass surveillance ∗∗∗
---------------------------------------------
The Swiss government could soon require service providers with more than 5,000 users to collect government-issued identification, retain subscriber data for six months and, in many cases, disable encryption.
---------------------------------------------
https://therecord.media/switzerland-digital-privacy-law-proton-privacy-surv…
∗∗∗ Wurden Router-URLs sphairon.box und zyxel.box gekapert? ∗∗∗
---------------------------------------------
Ich stelle mal ein Thema hier in den Blog, das mir jetzt von zwei Lesern gemeldet wurde und mich an einen alten Vorfall bei AVM zur fritz.box-URL erinnert. Es sieht so aus, dass die von Routern (Zyxel, Sphairon) zum Zugriff auf die Router-Funktionen verwendeten URLs sphairon.box und zyxel.box durch registrierte Domains gekapert wurden. Die Zielseiten sind als "malicious" einzustufen.
---------------------------------------------
https://www.borncity.com/blog/2025/09/12/wurden-router-urls-sphairon-box-un…
∗∗∗ EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks ∗∗∗
---------------------------------------------
Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide.
---------------------------------------------
https://www.trendmicro.com/en_us/research/25/i/evilai.html
∗∗∗ Muck Stealer Malware Used Alongside Phishing in New Attack Waves ∗∗∗
---------------------------------------------
A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise RAT, and SimpleHelp RAT in dual-threat attacks, making them harder to defend against.
---------------------------------------------
https://hackread.com/muck-stealer-malware-phishing-new-attack-waves/
∗∗∗ Social Engineering & KI: Cyberkriminelle rekrutieren im Darknet ∗∗∗
---------------------------------------------
Cyberkriminelle suchen im Darknet verstärkt nach Experten für Social Engineering und KI. Ein Hinweis darauf, auf welche Bedrohungen Firmen achten sollten.
---------------------------------------------
https://heise.de/-10642617
∗∗∗ ChillyHell macOS Backdoor Resurfaces ∗∗∗
---------------------------------------------
In 2025, cybersecurity researchers uncovered a deeply concerning threat targeting macOS systems called ChillyHell—a modular backdoor malware that had managed to fly under the radar for years by cleverly abusing macOS security mechanisms and Apple’s own notarization process.
---------------------------------------------
https://thecyberthrone.in/2025/09/11/chillyhell-macos-backdoor-resurfaces/
=====================
= Vulnerabilities =
=====================
∗∗∗ Samsung patches actively exploited zero-day reported by WhatsApp ∗∗∗
---------------------------------------------
Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android devices. Tracked as CVE-2025-21043, this critical security flaw affects Samsung devices running Android 13 or later and was reported by the security teams of Meta and WhatsApp on August 13.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/samsung-patches-actively-exp…
∗∗∗ Jetzt patchen! Erneut Attacken auf SonicWall-Firewalls beobachtet ∗∗∗
---------------------------------------------
Die "kritische" Sicherheitslücke (CVE-2024-40766) ist seit August vergangenen Jahres bekannt. Wiederholt ist die Schwachstelle in bestimmten Firewalls von SonicWall im Visier von Angreifern. Sicherheitsupdates sind bereits seit rund einem Jahr verfügbar, aber offensichtlich weiterhin nicht flächendeckend installiert.
---------------------------------------------
https://www.heise.de/news/Jetzt-patchen-Erneut-Attacken-auf-SonicWall-Firew…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (cups, imagemagick, libcpanel-json-xs-perl, and libjson-xs-perl), Fedora (checkpointctl, chromium, civetweb, glycin, kernel, libssh, ruff, rust-secret-service, snapshot, and uv), Mageia (curl), Red Hat (kernel), SUSE (cups, curl, perl-Cpanel-JSON-XS, regionServiceClientConfigAzure, regionServiceClientConfigEC2, regionServiceClientConfigGCE, trivy, and xen), and Ubuntu (cups, node-cipher-base, and qemu).
---------------------------------------------
https://lwn.net/Articles/1037919/
∗∗∗ CISA Releases Eleven Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/09/11/cisa-releases-eleven-ind…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 10-09-2025 18:00 − Donnerstag 11-09-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ New VMScape attack breaks guest-host isolation on AMD, Intel CPUs ∗∗∗
---------------------------------------------
A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU hypervisor process running on modern AMD or Intel CPUs.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-vmscape-attack-breaks-gu…
∗∗∗ K2 Think AI Model Jailbroken Mere Hours After Release ∗∗∗
---------------------------------------------
Researchers discovered that measures designed to make AI more transparent to users and regulators can also make it easier for bad actors to abuse.
---------------------------------------------
https://www.darkreading.com/application-security/k2-think-llm-jailbroken
∗∗∗ Ordner öffnen reicht: Beliebter KI-Code-Editor führt automatisch Schadcode aus ∗∗∗
---------------------------------------------
Wer den KI-Code-Editor Cursor verwendet, sollte beim Öffnen fremder Repos vorsichtig sein. Es kann unbemerkt Malware ausgeführt werden.
---------------------------------------------
https://www.golem.de/news/ordner-oeffnen-reicht-beliebter-ki-code-editor-fu…
∗∗∗ Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake "Meta Verified" browser extensions named SocialMetrics Pro that claim to unlock the blue check badge for Facebook and Instagram profiles.
---------------------------------------------
https://thehackernews.com/2025/09/fake-madgicx-plus-and-socialmetrics.html
∗∗∗ Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks ∗∗∗
---------------------------------------------
Affiliates of the Akira ransomware gang are again exploiting a critical SonicWall vulnerability abused last summer, after a suspected zero-day flaw actually turned out to be related to a year-old bug.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/09/10/akira_ransom…
∗∗∗ Beijing went to EggStreme lengths to attack Philippines military, researchers say ∗∗∗
---------------------------------------------
‘EggStreme’ framework looks like the sort of thing Beijing would find handy in its ongoing territorial beefs Infosec outfit Bitdefender says it’s spotted a strain of in-memory malware that looks like the work of Chinese advanced persistent threat groups that wanted to achieve persistent access at a “military company” in the Philippines.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/09/11/eggstreme_ma…
∗∗∗ Technical Analysis of kkRAT ∗∗∗
---------------------------------------------
Zscaler ThreatLabz has identified a malware campaign targeting Chinese-speaking users, which has been active since early May 2025. The campaign delivers three types of malware: ValleyRAT, FatalRAT, and a new Remote Access Trojan (RAT) that ThreatLabz named kkRAT.
---------------------------------------------
https://www.zscaler.com/blogs/security-research/technical-analysis-kkrat
∗∗∗ The Great NPM Heist – September 2025 ∗∗∗
---------------------------------------------
On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.
---------------------------------------------
https://blog.checkpoint.com/crypto/the-great-npm-heist-september-2025/
∗∗∗ Global Cyber Threats August 2025: Agriculture in the Crosshairs ∗∗∗
---------------------------------------------
In August 2025, the global cyber threat landscape presented a complex interplay of stability and alarming new challenges. Organizations around the world confronted an average of nearly 2,000 cyber attacks each week—a slight 1% decrease from July but a stark 10% rise compared to the same month last year.
---------------------------------------------
https://blog.checkpoint.com/research/global-cyber-threats-august-2025-agric…
∗∗∗ How the Infamous APT 1 Report Exposing China’s PLA Hackers Came to Be ∗∗∗
---------------------------------------------
This is the first in a series of pieces I’ll publish that take an in-depth look at significant events, people and cases in security and surveillance from the past.
---------------------------------------------
https://www.zetter-zeroday.com/how-the-infamous-apt-1-report-exposing-china…
∗∗∗ CyberVolk Ransomware: Analysis of Double Encryption Structure and Disguised Decryption Logic ∗∗∗
---------------------------------------------
The CyberVolk ransomware, which first emerged in May 2024, has been launching attacks on public institutions and key infrastructures of various countries, posing a continuous threat. The ransomware is particularly notable for its pro-Russia nature, as it primarily targets anti-Russian countries, making it a geopolitically significant cyber threat.
---------------------------------------------
https://asec.ahnlab.com/en/90077/
∗∗∗ Trigona Rebranding Suspicions and Global Threats, and BlackNevas Ransomware Analysis ∗∗∗
---------------------------------------------
BlackNevas has been continuously launching ransomware attacks against companies in various industries and countries, including South Korea. This post provides a technical analysis on the characteristics, encryption methods, and reasons why BlackNevas encrypts files in a way that makes them impossible to decrypt.
---------------------------------------------
https://asec.ahnlab.com/en/90080/
∗∗∗ New Fileless Malware Attack Uses AsyncRAT for Credential Theft ∗∗∗
---------------------------------------------
LevelBlue Labs reports AsyncRAT delivered through a fileless attack chain using ScreenConnect, enabling credential theft and persistence.
---------------------------------------------
https://hackread.com/fileless-malware-attack-asyncrat-credential-theft/
∗∗∗ CISA Presents Vision for the Common Vulnerabilities and Exposures (CVE) Program ∗∗∗
---------------------------------------------
Agency Unveils Upcoming Program Enhancements: Strengthening Partnerships, Modernization, Transparency and Elevating Data Quality and Responsiveness.
---------------------------------------------
https://www.cisa.gov/news-events/news/cisa-presents-vision-common-vulnerabi…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the Address Resolution Protocol (ARP) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a broadcast storm, leading to a denial of service (DoS) condition on an affected device.
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ DuckDB NPM packages 1.3.3 and 1.29.2 compromised with malware ∗∗∗
---------------------------------------------
The DuckDB distribution for Node.js on npm was compromised with malware (along with several other packages). An attacker published new versions of four of duckdb’s packages that included malicious code to interfere with cryptocoin transactions.
---------------------------------------------
https://github.com/duckdb/duckdb-node/security/advisories/GHSA-w62p-hx95-gf…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (python3.12-cryptography), Debian (chromium, hsqldb1.8.0, and imagemagick), Fedora (bustle, cef, maturin, rust-busd, rust-crypto-auditing-agent, rust-crypto-auditing-client, rust-crypto-auditing-event-broker, rust-monitord, rust-monitord-exporter, rustup, tuigreet, and wireshark), Oracle (kernel, microcode_ctl, and python3.12-cryptography), Red Hat (httpd:2.4 and multiple packages), SUSE (coreutils, curl, dpkg, ffmpeg-4, glib2, gnutls, go1.23-openssl, go1.24-openssl, go1.25-openssl, grub2, ImageMagick, jbigkit, kernel, libxslt, Mesa, opensc, opera, perl-JSON-XS, polkit, postgresql16, protobuf, python311, python311-deepdiff, sqlite3, ucode-intel, and warewulf4), and Ubuntu (bind9 and libxml2).
---------------------------------------------
https://lwn.net/Articles/1037777/
∗∗∗ Unauthentifizierte SQL Injection Schwachstelle im Shibboleth Service Provider (SP) (ODBC Interface) ∗∗∗
---------------------------------------------
SEC Consult hat eine unauthentifizierte SQL-Injection-Schwachstelle im Shibboleth Service Provider (SP) in der ODBC Schnittstelle identifiziert, die ein Angreifer ausnutzen könnte, um beliebige Datensätze aus der Datenbank mit den Rechten des Datenbankbenutzers auszulesen.
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/unauthentifizierte-sq…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 09-09-2025 18:00 − Mittwoch 10-09-2025 18:00
Handler: Felician Fuchs
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Phishing im Namen der WKO: Sensible Daten im Visier ∗∗∗
---------------------------------------------
Kriminelle kopieren aktuell eine echte E-Mail-Nachricht der Wirtschaftskammer Österreich. Über ein angehängtes HTML-Dokument wollen sie Ihre Opfer auf ein Fake-Portal locken und dort sensible Daten erbeuten. Wir zeigen Ihnen, woran Sie den Betrugsversuch erkennen können.
---------------------------------------------
https://www.watchlist-internet.at/news/phishing-wko/
∗∗∗ You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819) ∗∗∗
---------------------------------------------
Today, inside this hellscape we call the Internet, a mean person has discovered a zero-day(s) in FreePBX (now lovingly called CVE-2025-57819). But they didn’t stop there - the dastardly individual(s) then proceeded to exploit FreePBX hosts en-masse. [..] Today, we are publishing our Detection Artefact Generator which you can find here.
---------------------------------------------
https://labs.watchtowr.com/you-already-have-our-personal-data-take-our-phon…
∗∗∗ US Investment in Spyware Is Skyrocketing ∗∗∗
---------------------------------------------
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
---------------------------------------------
https://www.wired.com/story/us-spyware-investment/
∗∗∗ CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote access trojan (RAT) named ZynorRAT that can target both Windows and Linux systems.
---------------------------------------------
https://thehackernews.com/2025/09/chillyhell-macos-backdoor-and-zynorrat.ht…
∗∗∗ Pwn My Ride: Exploring the CarPlay Attack Surface ∗∗∗
---------------------------------------------
At the recent DefCon conference, we had the opportunity to present Pwn My Ride, a comprehensive exploration of the Apple CarPlay attack surface. With vehicles becoming increasingly connected, the security of in-car systems like CarPlay is critical.
---------------------------------------------
https://www.oligo.security/blog/pwn-my-ride-exploring-the-carplay-attack-su…
∗∗∗ Kerberoasting ∗∗∗
---------------------------------------------
These “Kerberoasting” attacks have been around for ages: the technique and name is credited to Tim Medin who presented it in 2014 (and many popular blogs followed up on it) but the vulnerabilities themselves are much older. [..] I’ll bet most Windows people already know this stuff, but I only happened to learn about it today, after seeing a letter from Senator Wyden to Microsoft, describing how this vulnerability was used in the May 2024 ransomware attack on the Ascension Health hospital system.
---------------------------------------------
https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/
∗∗∗ New Linux Botnet Combines Cryptomining and DDoS Attacks ∗∗∗
---------------------------------------------
Cyble threat intelligence researchers have identified a sophisticated Linux botnet built for cryptocurrency mining, remote command execution, and dozens of DDoS attack types. Cyble Research and Intelligence Labs (CRIL) researchers have dubbed the campaign “Luno.”
---------------------------------------------
https://thecyberexpress.com/linux-botnet-combines-cryptomining-and-ddos/
∗∗∗ Apple Introduces Memory Integrity Enforcement in iPhone 17 to Fight Spyware Exploits ∗∗∗
---------------------------------------------
Apple has introduced Memory Integrity Enforcement (MIE), a system-wide security feature designed to crush one of the most persistent threats to iPhone users—that of Spyware. The company describes MIE as “the most significant upgrade to memory safety in the history of consumer operating systems.”
---------------------------------------------
https://thecyberexpress.com/memory-integrity-enforcement-in-iphone-17/
=====================
= Vulnerabilities =
=====================
∗∗∗ Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days ∗∗∗
---------------------------------------------
Today is Microsofts September 2025 Patch Tuesday, which includes security updates for 81 flaws, including two publicly disclosed zero-day vulnerabilities. [..] The two publicly disclosed zero-days are: CVE-2025-55234 - Windows SMB Elevation of Privilege Vulnerability [..] CVE-2024-21907 - VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.Json
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-september-2025-pa…
∗∗∗ Patchday Adobe: Lücken in Acrobat & Co. können Schadcode auf PCs lassen ∗∗∗
---------------------------------------------
Auflistung der Sicherheitspatches: Acrobat and Reader, After Effects, ColdFusion, Commerce, Dreamweaver, Experience Manager, Premiere Pro, Substance 3D Modeler, Substance 3D Viewer
---------------------------------------------
https://www.heise.de/news/Patchday-Adobe-Luecken-in-Acrobat-Co-koennen-Scha…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (buildah, containers-common, glycin, loupe, podman, rust-matchers, and rust-tracing-subscriber), Red Hat (fence-agents, jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base, pki-deps:10.6, python-requests, python3.12-cryptography, redis:6, redis:7, and resource-agents), Slackware (libssh), SUSE (aide, cloud-init, iperf, java-1_8_0-openjdk, jq, kernel-devel, python-deepdiff, regionServiceClientConfigAzure, regionServiceClientConfigEC2, and regionServiceClientConfigGCE), and Ubuntu (gnutls28).
---------------------------------------------
https://lwn.net/Articles/1037471/
∗∗∗ CISA Releases Fourteen Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
ICSA-25-252-01 Rockwell Automation ThinManager,
ICSA-25-252-02 ABB Cylon Aspect BMS/BAS,
ICSA-25-252-03 Rockwell Automation Stratix IOS,
ICSA-25-252-04 Rockwell Automation FactoryTalk Optix,
ICSA-25-252-05 Rockwell Automation FactoryTalk Activation Manager,
ICSA-25-252-06 Rockwell Automation CompactLogix® 5480,
ICSA-25-252-07 Rockwell Automation ControlLogix 5580,
ICSA-25-252-08 Rockwell Automation Analytics LogixAI,
ICSA-25-252-09 Rockwell Automation 1783-NATR
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/09/09/cisa-releases-fourteen-i…
∗∗∗ Google Chrome: Stable Channel Update for Desktop ∗∗∗
---------------------------------------------
http://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desk…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Montag 08-09-2025 18:00 − Dienstag 09-09-2025 18:00
Handler: Felician Fuchs
Co-Handler: Guenes Holler
=====================
= News =
=====================
∗∗∗ TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last month, said its designed to block other actors from accessing the Docker API from the internet.
---------------------------------------------
https://thehackernews.com/2025/09/tor-based-cryptojacking-attack-expands.ht…
∗∗∗ GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies ∗∗∗
---------------------------------------------
Salesloft has revealed that the data breach linked to its Drift application started with the compromise of its GitHub account. Google-owned Mandiant, which began an investigation into the incident, said the threat actor, tracked as UNC6395, accessed the Salesloft GitHub account from March through June 2025. Its currently not known how the digital intruders gained access to the GitHub account.
---------------------------------------------
https://thehackernews.com/2025/09/github-account-compromise-led-to.html
∗∗∗ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities ∗∗∗
---------------------------------------------
A new Android malware called RatOn evolved from a basic tool capable of conducting Near Field Communication (NFC) attacks to a sophisticated remote access trojan with Automated Transfer System (ATS) capabilities to conduct device fraud.
---------------------------------------------
https://thehackernews.com/2025/09/raton-android-malware-detected-with-nfc.h…
∗∗∗ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks ∗∗∗
---------------------------------------------
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsofts Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest.
---------------------------------------------
https://thehackernews.com/2025/09/axios-abuse-and-salty-2fa-kits-fuel.html
∗∗∗ Salt Typhoon and UNC4841: Silent Push Discovers New Domains; Urges Defenders to Check Telemetry and Log Data ∗∗∗
---------------------------------------------
Silent Push has identified dozens of previously unreported domains, all aiming to obtain long-term, stealthy access to targeted organizations, used by the Chinese APT group, Salt Typhoon, along with some related People’s Republic of China (PRC) state-backed threat actors.
---------------------------------------------
https://www.silentpush.com/blog/salt-typhoon-2025/
∗∗∗ BSI warnt: "Digitale Angriffsflächen im Automobilsektor wachsen rasant" ∗∗∗
---------------------------------------------
Digitale Dienste, Over-the-Air-Updates, KI und vernetzte Steuergeräte prägen Fahrzeugarchitekturen, weiß das BSI. Hersteller und Ausrüster müssten vorsorgen.
---------------------------------------------
https://www.heise.de/news/BSI-warnt-Digitale-Angriffsflaechen-im-Automobils…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel and kernel-rt), Debian (openafs and qemu), Fedora (buildah, containers-common, podman, python-flask, and snapshot), Mageia (postgresql, python-django, and udisks2), Oracle (kernel and libxml2), Red Hat (apache-commons-beanutils, firefox, httpd, httpd:2.4, kernel, kernel-rt, mod_http2, qt5-qt3d, and thunderbird), Slackware (libxml2), SUSE (firebird, go1.25-openssl, ImageMagick, microcode_ctl, netty, netty-tcnative, and ovmf), and Ubuntu (libetpan and postgresql-14, postgresql-16, postgresql-17).
---------------------------------------------
https://lwn.net/Articles/1037308/
∗∗∗ Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed ∗∗∗
---------------------------------------------
An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide.
---------------------------------------------
https://www.trendmicro.com/en_us/research/25/i/unmasking-the-gentlemen-rans…
∗∗∗ Zero-Day in Sitecore Exploited to Deploy WEEPSTEEL Malware ∗∗∗
---------------------------------------------
Hackers exploit a Sitecore zero-day (CVE-2025-53690) to deploy WEEPSTEEL Malware via ViewState attacks, enabling Remote Code Execution (RCE).
---------------------------------------------
https://hackread.com/zero-day-sitecore-exploited-deploy-weepsteel-malware/
∗∗∗ OpenAI Paper: Halluzinationen offenbar unumgänglich ∗∗∗
---------------------------------------------
In einem neuen, wissenschaftlichen Paper, das OpenAI veröffentlicht hat, geht es um Halluzinationen. Das sind falsche Informationen und Zusammenhänge, die Large Language Models (LLMs) und damit auch KI-Chatbots ausgeben. Alle KI-Unternehmen arbeiten daran, Halluzinationen möglichst gering zu halten. Sie ganz auszuschalten, scheint hingegen unmöglich. Das schreibt nun auch OpenAI selbst.
---------------------------------------------
https://heise.de/-10637744
∗∗∗ LockBit Attempts Comeback with LockBit 5.0 Ransomware Release ∗∗∗
---------------------------------------------
LockBit was once the most feared ransomware group until global law enforcement action sent the group into decline last year. Now the threat group hopes to mount a comeback with LockBit 5.0.
---------------------------------------------
https://thecyberexpress.com/lockbit-5-0-ransomware/
=====================
= Vulnerabilities =
=====================
∗∗∗ Adobe patches critical SessionReaper flaw in Magento eCommerce platform ∗∗∗
---------------------------------------------
Adobe is warning of a critical vulnerability (CVE-2025-54236) in its Commerce and Magento Open Source platforms that researchers call SessionReaper and describe as one of " the most severe" flaws in the history of the product.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/adobe-patches-critical-sessi…
∗∗∗ Populäre JavaScript Pakete manipuliert ∗∗∗
---------------------------------------------
Eine Reihe populärer JavaScript Pakete wurde kürzlich manipuliert um Krypotwährungstransaktionen zu manipulieren. Ursache dieses Supply-Chain-Angriffs scheint eine erfolgreiche Phishing Attacke gegen den Maintainer dieser Pakete und dessen NPM Konto gewesen zu sein. Manipulierte Versionen der betroffenen Pakete wurden bereits zurückgezogen.
---------------------------------------------
https://www.cert.at/de/aktuelles/2025/9/populare-javascript-pakete-manipuli…
∗∗∗ September 2025 Security Update ∗∗∗
---------------------------------------------
Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM) and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access.
---------------------------------------------
https://www.ivanti.com/blog/september-2025-security-update
∗∗∗ SAP Security Patch Day – September 2025 ∗∗∗
---------------------------------------------
SAP has released its September 2025 security patch package containing 26 security notes addressing critical vulnerabilities across enterprise SAP environments. This release includes four HotNews vulnerabilities with CVSS ratings up to 10.0, four High priority issues, sixteen Medium priority fixes, and two Low priority updates. The patches affect NetWeaver AS Java, S/4HANA, SAP HCM, Business Planning and Consolidation, Commerce Cloud, and SAP Business One.
---------------------------------------------
https://redrays.io/blog/sap-security-patch-day-september-2025/
∗∗∗ VU#461364: Hiawatha open-source web server has multiple vulnerabilities ∗∗∗
---------------------------------------------
https://kb.cert.org/vuls/id/461364
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 05-09-2025 18:00 − Montag 08-09-2025 18:00
Handler: Guenes Holler
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ iCloud Calendar abused to send phishing emails from Apple’s servers ∗∗∗
---------------------------------------------
iCloud Calendar invites are being abused to send callback phishing emails disguised as purchase notifications directly from Apple's email servers, making them more likely to bypass spam filters to land in targets' inboxes.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-se…
∗∗∗ Fraunhofer SIT gibt auf: Die Volksverschlüsselung wird eingestellt ∗∗∗
---------------------------------------------
Die Volksverschlüsselung, eine gemeinsame Initiative des Fraunhofer-Instituts für Sichere Informationstechnologie (SIT) und der Deutschen Telekom, wird nach rund zehnjährigem Bestehen zum 31. Januar 2026 eingestellt. Das geht aus einer Mitteilung auf der zugehörigen Webseite(öffnet im neuen Fenster) hervor. Ziel der Volksverschlüsselung war es, Ende-zu-Ende-verschlüsselte Kommunikation benutzerfreundlicher zu machen. Doch das Projekt stieß schon zum Start auf Kritik.
---------------------------------------------
https://www.golem.de/news/fraunhofer-sit-gibt-auf-die-volksverschluesselung…
∗∗∗ Noisy Bear Campaign Targeting Kazakhstan Energy Sector Outed as a Planned Phishing Test ∗∗∗
---------------------------------------------
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed Operation BarrelFire, is tied to a new threat group tracked by Seqrite Labs as Noisy Bear. The threat actor has been active since at least April 2025.
---------------------------------------------
https://thehackernews.com/2025/09/noisy-bear-targets-kazakhstan-energy.html
∗∗∗ GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms ∗∗∗
---------------------------------------------
Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on search engines like Google to deliver malware to unsuspecting users looking for popular tools like GitHub Desktop. While malvertising campaigns have become commonplace in recent years, the latest activity gives it a little twist of its own: Embedding a GitHub commit into a page URL containing altered links that point to attacker-controlled infrastructure.
---------------------------------------------
https://thehackernews.com/2025/09/gpugate-malware-uses-google-ads-and.html
∗∗∗ Netflix-Phishing-Mail im Umlauf ∗∗∗
---------------------------------------------
Derzeit kursiert eine E-Mail, die angeblich von Netflix stammt. Darin wird behauptet, eine Aktualisierung der Kontodaten sei erforderlich. Andernfalls würden 8,99 € fällig und der Zugang würde eingeschränkt werden. Vorsicht: Es handelt sich um eine Fälschung! Die Nachricht führt auf eine Phishing-Website, über die Kriminelle versuchen, Kontodaten zu stehlen.
---------------------------------------------
https://www.watchlist-internet.at/news/netflix-phishing-mail-im-umlauf-1/
∗∗∗ Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs ∗∗∗
---------------------------------------------
The intrusion began in September 2024 with a download of a malicious file mimicking the EarthTime application by DeskSoft. Upon execution, SectopRAT was deployed which opened a connection to its command and control (C2) infrastructure. The threat actor established persistence by relocating the malicious file and placing a shortcut in the Startup folder, configured to trigger on user logon. They further elevated access by creating a new local account and assigning it local administrative privileges.
---------------------------------------------
https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-con…
∗∗∗ GhostAction Attack Steals 3,325 Secrets from GitHub Projects ∗∗∗
---------------------------------------------
On September 2, 2025, a GitHub user known as Grommash9 committed a new workflow file to the FastUUID project. The file, labelled “Github Actions Security,” appeared similar to routine automation scripts but was later found to contain malicious code designed to collect CI/CD secrets and send them to an external server.
---------------------------------------------
https://hackread.com/ghostaction-attack-steals-github-projects-secrets/
∗∗∗ Lazarus Group Deploys Malware With ClickFix Scam in Fake Job Interviews ∗∗∗
---------------------------------------------
A recent investigation by SentinelLABS and internet intelligence platform Validin reveals that North Korean threat actors behind the Contagious Interview campaign are actively abusing public cybersecurity platforms like Validin, Maltrail, and VirusTotal to improve their malicious activities.
---------------------------------------------
https://hackread.com/lazarus-group-malware-clickfix-scam-fake-job-interview/
∗∗∗ MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access ∗∗∗
---------------------------------------------
FortiGuard Labs recently discovered a phishing campaign that employs multiple advanced evasion techniques. These include the use of an Easy Programming Language (EPL) to develop a staged payload, concealing malicious operations and disabling security tools to prevent alert triggers, securing Command and Control (C2) communications using mutual TLS (mTLS), supporting various methods for deploying additional payloads, and even installing popular remote access tools to grant attackers complete control over the compromised system.
---------------------------------------------
https://feeds.fortinet.com/~/924516446/0/fortinet/blogs~MostereRAT-Deployed…
∗∗∗ Ecovacs Deebot: Angreifer können beliebigen Code einschleusen ∗∗∗
---------------------------------------------
Schwachstellenbeschreibungen vom Wochenende erörtern teils hochriskante Sicherheitslücken in Staubsaugerrobotern aus dem Hause Ecovacs. Für die betroffenen Deebot-Modelle stehen bereits seit einiger Zeit Updates bereit, die die Sicherheitslecks abdichten. Besitzer sollten sicherstellen, die Basisstationen und Saugroboter auf den aktuellen Stand zu bringen.
---------------------------------------------
https://heise.de/-10636233
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium, libhtp, modsecurity-apache, shibboleth-sp, and wireless-regdb), Fedora (chromium, kea, tcpreplay, and yq), Mageia (rootcerts, nspr, nss & firefox and thunderbird), Red Hat (python3), and SUSE (7zip, chromedriver, go1.25, libQt5Pdf5, libsixel-bash-completion, libsoup2, libwireshark18, netty, rav1e, and trivy).
---------------------------------------------
https://lwn.net/Articles/1037157/
∗∗∗ RICOH Streamline NX vulnerable to tampering with operation history ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN75307484/
∗∗∗ CVE-2025-8699: NFC Card Vulnerability Exploitation Leading to Free Top-Up in KioSoft "Stored Value" Unattended Payment Solution ∗∗∗
---------------------------------------------
https://sec-consult.com/vulnerability-lab/advisory/nfc-card-vulnerability-e…
∗∗∗ Beckhoff Security Advisory 2025-001: CVE-2025-41701 ∗∗∗
---------------------------------------------
https://download.beckhoff.com/download/document/product-security/Advisories…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 04-09-2025 18:00 − Freitag 05-09-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest. ∗∗∗
---------------------------------------------
Everything to know about the mishap that threatened to expose millions of users queries.
---------------------------------------------
https://arstechnica.com/information-technology/2025/09/the-number-of-mis-is…
∗∗∗ Max severity Argo CD API flaw leaks repository credentials ∗∗∗
---------------------------------------------
An Argo CD vulnerability allows API tokens with even low project-level get permissions to access API endpoints and retrieve all repository credentials associated with the project.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/max-severity-argo-cd-api-fla…
∗∗∗ Seit Mai 2024 bekannt: TP-Link bestätigt Zero-Day-Lücke in Archer-Routern ∗∗∗
---------------------------------------------
Es sind auch hierzulande angebotene TP-Link-Modelle betroffen. Angreifer können unter Umständen aus der Ferne Schadcode einschleusen.
---------------------------------------------
https://www.golem.de/news/seit-mai-2024-bekannt-tp-link-bestaetigt-zero-day…
∗∗∗ IT threat evolution in Q2 2025. Mobile statistics ∗∗∗
---------------------------------------------
The report contains statistics on mobile threats (malware, adware, and unwanted software for Android) for Q2 2025, as well as a description of the most notable malware types identified during the reporting period.
---------------------------------------------
https://securelist.com/malware-report-q2-2025-mobile-statistics/117349/
∗∗∗ IT threat evolution in Q2 2025. Non-mobile statistics ∗∗∗
---------------------------------------------
The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q2 2025.
---------------------------------------------
https://securelist.com/malware-report-q2-2025-pc-iot-statistics/117421/
∗∗∗ SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild ∗∗∗
---------------------------------------------
A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in the wild.The command injection vulnerability, tracked as CVE-2025-42957 (CVSS score: 9.9), was fixed by SAP as part of ..
---------------------------------------------
https://thehackernews.com/2025/09/sap-s4hana-critical-vulnerability-cve.html
∗∗∗ Schwachstellen: KI- und Netzwerktechnik von Nvidia ist angreifbar ∗∗∗
---------------------------------------------
Sicherheitsupdates schließen Lücken in unter anderem Nvidias KI-Plattformen DGX und HGX.
---------------------------------------------
https://www.heise.de/news/Sicherheitsluecken-Nvidia-KI-und-Netzwerktechnik-…
∗∗∗ Stealerium-Malware macht heimlich Webcam-Fotos für Erpressung ∗∗∗
---------------------------------------------
Die frei verfügbare Malware Stealerium erkennt Pornokonsum und fertigt heimlich Webcam-Aufnahmen an. Cyberkriminelle nutzen die Fotos für Erpressung.
---------------------------------------------
https://www.heise.de/news/Malware-fotografiert-Nutzer-heimlich-bei-Porno-Ko…
∗∗∗ Cyberattack forces Jaguar Land Rover to tell staff to stay at home ∗∗∗
---------------------------------------------
Luxury automaker Jaguar Land Rover says employees should stay home through the weekend as it works to mitigate the impact of a cyberattack.
---------------------------------------------
https://therecord.media/jaguar-land-rover-cyberattack-workers-stay-home
∗∗∗ SEO fraud-as-a-service scheme hijacks Windows servers to promote gambling websites ∗∗∗
---------------------------------------------
A malware campaign dubbed GhostRedirector by researchers at ESET attempts to compromise websites to drive traffic to gambling sites.
---------------------------------------------
https://therecord.media/seo-scheme-windows-malware-gambling-sites-ghostredi…
∗∗∗ Scammers Exploit Grok AI With Video Ad Scam to Push Malware on X ∗∗∗
---------------------------------------------
Researchers at Guardio Labs have uncovered a new “Grokking” scam where attackers trick Grok AI into spreading malicious…
---------------------------------------------
https://hackread.com/scammers-exploit-grok-ai-video-ad-scam-x-malware/
∗∗∗ Microsoft erzwingt mehr Multifaktorauthentifizierung ∗∗∗
---------------------------------------------
Microsoft aktualisiert die Pläne für "Phase 2" der erzwungenen Multifaktorauthentifizierung für Azure. Am 1.10. sind mehr Dienste fällig.
---------------------------------------------
https://heise.de/-10633932
∗∗∗ Czechia Warns of Chinese Data Transfers and Remote Administration for Espionage ∗∗∗
---------------------------------------------
Czechia’s national cybersecurity watchdog has issued a warning about foreign cyber operations, focussed on Chinese data transfers and remote administration, urging both government bodies and private businesses to bolster defenses amid rising espionage campaigns tied to China and Russia. The alert, published this week by the National Cyber and I..
---------------------------------------------
https://thecyberexpress.com/czechia-warns-of-chinese-data-transfer/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (udisks2), Oracle (httpd:2.4 and kernel), Red Hat (python-requests), and SUSE (chromium, gn, dcmtk, firefox, himmelblau, nginx, perl-Authen-SASL, perl-Crypt-URandom, postgresql15, python-Django, and python-maturin).
---------------------------------------------
https://lwn.net/Articles/1036907/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 03-09-2025 18:00 − Donnerstag 04-09-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Mis-issued certificates for 1.1.1.1 DNS service pose a threat to the Internet ∗∗∗
---------------------------------------------
The three certificates were issued in May but only came to light Wednesday.
---------------------------------------------
https://arstechnica.com/security/2025/09/mis-issued-certificates-for-1-1-1-…
∗∗∗ Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn ∗∗∗
---------------------------------------------
A new specimen of “infostealer” malware offers a disturbing feature: It monitors a targets browser for NSFW content, then takes simultaneous screenshots and webcam photos of the victim.
---------------------------------------------
https://www.wired.com/story/stealerium-infostealer-porn-sextortion/
∗∗∗ Serientäter bekennen sich zu IT-Angriff auf Jaguar Land Rover ∗∗∗
---------------------------------------------
Drei britische Verbrecherbanden haben sich offenbar zusammengetan. Sie prahlen mit der IT-Attacke auf Jaguar Land Rover.
---------------------------------------------
https://www.heise.de/news/Serientaeter-bekennen-sich-zu-IT-Angriff-auf-Jagu…
∗∗∗ Kritische Infrastrukturen: Attacken auf industrielle Kontrollsysteme möglich ∗∗∗
---------------------------------------------
Es sind wichtige Sicherheitsupdates für industrielle Kontrollsysteme von unter anderem Hitachi erschienen. Ein Patch steht aber noch aus.
---------------------------------------------
https://www.heise.de/news/Kritische-Infrastrukturen-Attacken-auf-industriel…
∗∗∗ TP-Link warns of botnet infecting routers and targeting Microsoft 365 accounts ∗∗∗
---------------------------------------------
The Quad7 botnet is adding End-of-Life TP-Link routers to its arsenal and using them to steal Microsoft 365 accounts.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2025/09/tp-link-warns-of-botnet-infe…
∗∗∗ Microsoft-Support-Betrug: Phishing-Falle statt Online-Hilfe ∗∗∗
---------------------------------------------
Drängt ein Pop-up-Fenster zu einem Anruf bei der Microsoft-Helpline, ist allerhöchste Vorsicht angesagt! Hinter der Aufforderung warten nämlich keine IT-Expert:innen darauf, bei Computerproblemen weiterzuhelfen. Vielmehr wollen Kriminelle auf diesem Weg Zugriff auf das Konto ihrer Opfer bekommen.
---------------------------------------------
https://www.watchlist-internet.at/news/microsoft-support-betrug/
∗∗∗ Scattered Lapsus$ Hunters Demand Google Fire Security Experts or Face Data Leak ∗∗∗
---------------------------------------------
Scattered Lapsus$ Hunters threaten Google, demanding that two security experts, Austin Larsen of Google’s Threat Intelligence Group and Charles Carmakal of Mandiant, be fired or they will leak alleged stolen Google data.
---------------------------------------------
https://hackread.com/scattered-lapsus-hunters-google-fire-experts-data-leak/
∗∗∗ 25,000 IPs Scanned Cisco ASA Devices — New Vulnerability Potentially Incoming ∗∗∗
---------------------------------------------
GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a significant elevation above baseline, typically registering at less than 500 IPs per day.
---------------------------------------------
https://www.greynoise.io/blog/scanning-surge-cisco-asa-devices
∗∗∗ ViewState Deserialization Zero-Day Vulnerability in Sitecore Products (CVE-2025-53690) ∗∗∗
---------------------------------------------
In a recent investigation, Mandiant Threat Defense discovered an active ViewState deserialization attack affecting Sitecore deployments leveraging a sample machine key that had been exposed in Sitecore deployment guides from 2017 and earlier. An attacker leveraged the exposed ASP.NET machine keys to perform remote code ..
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserial…
∗∗∗ Cookie Chaos: How to bypass __Host and __Secure cookie prefixes ∗∗∗
---------------------------------------------
Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and ..
---------------------------------------------
https://portswigger.net/research/cookie-chaos-how-to-bypass-host-and-secure…
∗∗∗ Linux Kernel SMB 0-Day Vulnerability CVE-2025-37899 Uncovered Using ChatGPT o3 ∗∗∗
---------------------------------------------
For the first time, a zero-day vulnerability in the Linux kernel has been discovered using a large language model, OpenAI’s o3. Discovered by security researcher Sean Heelan and assigned ..
---------------------------------------------
https://www.upwind.io/feed/linux-kernel-smb-0-day-vulnerability-cve-2025-37…
∗∗∗ s1ngularitys Aftermath: AI, TTPs, and Impact in the Nx Supply Chain Attack ∗∗∗
---------------------------------------------
A deeper look at the Nx supply chain attack: analyzing the performance of AI-powered malware, calculating incident impact, and sharing novel TTPs for further investigation.
---------------------------------------------
https://www.wiz.io/blog/s1ngularitys-aftermath
∗∗∗ Nx Investigation Reveals GitHub Actions Workflow Exploit Led to npm Token Theft, Prompting Switch to Trusted Publishing ∗∗∗
---------------------------------------------
On August 26, 2025, the JavaScript ecosystem witnessed a watershed moment in supply chain security. The popular Nx build system, with over 4.6 million weekly downloads, fell victim to an attack that stole thousands of credentials and pioneered a disturbing new technique: weaponizing AI developer tools for scaling reconnaissance and data theft.The Nx team ..
---------------------------------------------
https://socket.dev/blog/nx-supply-chain-attack-investigation-github-actions…
∗∗∗ Exploit development for IBM i ∗∗∗
---------------------------------------------
At TROOPERS24, we demonstrated how IBM i systems – still widely used in enterprise environments – can be compromised in both authenticated and unauthenticated scenarios, using only built-in services and a basic understanding of the underlying mechanisms. Despite being labeled “legacy,” these systems remain active in finance, logistics, and manufacturing, often handling critical workloads with little attention paid to their security posture.
---------------------------------------------
https://blog.silentsignal.eu/2025/09/04/Exploit-development-for-IBM-i/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 02-09-2025 18:00 − Mittwoch 03-09-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hackers breach fintech firm in attempted $130M bank heist ∗∗∗
---------------------------------------------
Hackers tried to steal $130 million from Evertecs Brazilian subsidiary Sinqia S.A.after gaining unauthorized access to its environment on the central banks real-time payment system (Pix).
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-breach-fintech-firm-…
∗∗∗ What Is a Passkey? Here’s How to Set Up and Use Them (2025) ∗∗∗
---------------------------------------------
Passkeys were built to enable a password-free future. Heres what they are and how you can start using them.
---------------------------------------------
https://www.wired.com/story/what-is-a-passkey-and-how-to-use-them/
∗∗∗ Patchday: Kritische Schadcode-Lücke bedroht Android 15 und 16 ∗∗∗
---------------------------------------------
Wichtige Sicherheitsupdates schließen mehrere Sicherheitslücken in verschiedenen Android-Versionen.
---------------------------------------------
https://www.heise.de/news/Patchday-Kritische-Schadcode-Luecke-bedroht-Andro…
∗∗∗ Phishing-Alarm: FinanzOnline droht nicht mit der Pfändung des Hausrats! ∗∗∗
---------------------------------------------
Eine höchst aktuelle Phishing-Welle im Namen von FinanzOnline sorgt für große Verunsicherung. Die zentrale Drohung: Pfändung des Hausrats durch den Gerichtsvollzieher! Klingt besorgniserregend, ist in Wahrheit aber nichts anderes als ein Betrugsversuch. Wir erklären, ..
---------------------------------------------
https://www.watchlist-internet.at/news/phishing-alarm-finanzonline-pfaendun…
∗∗∗ Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust ∗∗∗
---------------------------------------------
Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution.
---------------------------------------------
https://unit42.paloaltonetworks.com/model-namespace-reuse/
∗∗∗ Digitale Souveränität: Cloud Edition. ∗∗∗
---------------------------------------------
Das erratische Verhalten der aktuellen US-Regierung hat die Sorgen um die Abhängigkeit Europas von den großen US-Cloudbetreibern verstärkt. In der EU haben sowohl die Kommission als auch das Parlament Dokumente zu diesem Thema vorgelegt, heuer hat die Kommission bereits um Ideen zu einem Cloud and AI Development Act gebeten. Auch in Deutschland ..
---------------------------------------------
https://www.cert.at/de/blog/2025/9/digitale-souveranitat-cloud-edition
∗∗∗ Cloudflare, Zscaler among companies impacted by Salesloft Drift incident ∗∗∗
---------------------------------------------
Multiple tech firms have publicly detailed how incidents involving the third-party Salesloft Drift tool have exposed customer data.
---------------------------------------------
https://therecord.media/salesloft-drift-breach-cloudflare-zscaler-palo-alto…
∗∗∗ Corruption case against ousted cyber chief is ‘revenge,’ Ukraine’s security service says ∗∗∗
---------------------------------------------
Ukraine’s security service is accusing the country’s anti-corruption agencies of seeking “revenge” by bringing charges against Illia Vitiuk, the former head of the agency’s cybersecurity unit.
---------------------------------------------
https://therecord.media/corruption-case-against-ousted-cyber
∗∗∗ Cloudflare Mitigates Largest Ever Recorded DDoS Attack at 11.5 Tbps ∗∗∗
---------------------------------------------
Cloudflare mitigated the largest DDoS attack ever recorded, an 11.5 Tbps flood that lasted 35 seconds without disrupting…
---------------------------------------------
https://hackread.com/cloudflare-mitigates-largest-ddos-attack-11-5-tbps/
∗∗∗ CISA, NSA and 19 International Partners Release Shared Vision of Software Bill of Materials for Cybersecurity Guide ∗∗∗
---------------------------------------------
CISA, NSA, and 19 international partners release a shared vision of Software Bill of Materials (SBOM) highlighting the importance of SBOM in securing global supply chains & enhancing software resilience worldwide.
---------------------------------------------
https://www.cisa.gov/news-events/news/cisa-nsa-and-19-international-partner…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (httpd, kernel, and kernel-rt), Debian (python-eventlet and python-h2), Mageia (aide, gnutls, tomcat, and vim), Oracle (httpd, mod_http2, postgresql:15, python3.11, python3.12, python3.9, and udisks2), Red Hat (kernel, postgresql, postgresql:12, and postgresql:15), SUSE (dcmtk, jupyter-bqplot-jupyterlab, kured, libudisks2-0, munge, python-eventlet, python-future, python311-eventlet, rekor, traefik2, and ucode-intel), and Ubuntu (linux-aws, ..
---------------------------------------------
https://lwn.net/Articles/1036567/
∗∗∗ Vulnerability & Patch Roundup — August 2025 ∗∗∗
---------------------------------------------
https://blog.sucuri.net/2025/08/vulnerability-patch-roundup-august-2025.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/