=====================
= End-of-Day report =
=====================
Timeframe: Montag 24-03-2025 18:00 − Dienstag 25-03-2025 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Browser-in-the-Browser attacks target CS2 players Steam accounts ∗∗∗
---------------------------------------------
A new phishing campaign targets Counter-Strike 2 players utilizing Browser-in-the-Browser (BitB) attacks that display a realistic window that mimics Steams login page.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/browser-in-the-browser-attac…
∗∗∗ Open-sourcing OpenPubkey SSH (OPKSSH): integrating single sign-on with SSH ∗∗∗
---------------------------------------------
OPKSSH (OpenPubkey SSH) is now open-sourced as part of the OpenPubkey project.
---------------------------------------------
https://blog.cloudflare.com/open-sourcing-openpubkey-ssh-opkssh-integrating…
∗∗∗ Zero Day: Russische Firma zahlt für Telegram-Lücken Millionen ∗∗∗
---------------------------------------------
Die stetig wachsende Nutzerbasis macht die Plattform auch für Cyberangriffe immer interessanter. Aus diesem Grund bietet der russische Schwachstellenhändler Operation Zero mittlerweile bis zu vier Millionen US-Dollar für ungepatchte Sicherheitslücken in Telegram.
---------------------------------------------
https://www.golem.de/news/zero-day-russische-firma-zahlt-millionen-fuer-tel…
∗∗∗ Achtung: Phishing-Mails im Namen des Wiener Tourismusverbands! ∗∗∗
---------------------------------------------
Aktuell kursieren E-Mails im Namen der Buchhaltung, die dazu auffordern, Rechnungen aufgrund technischer Probleme direkt per E-Mail zu senden. Vorsicht: Diese E-Mails stammen nicht von Mitarbeitenden des Wiener Tourismusverband sondern von Kriminellen!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-phishing-mails-im-namen-des-…
∗∗∗ Oracle angeblich gehackt: Nutzerdaten im Darknet zum Verkauf ∗∗∗
---------------------------------------------
Sicherheitsforscher von CloudSEK berichten, dass im Darknet sensible Daten von rund 140.000 Oracle-Kunden zum Verkauf stehen. Diese Informationen sollen aus einer Cyberattacke stammen. Dem Hard- und Softwarehersteller zufolge hat es keinen IT-Sicherheitsvorfall gegeben.
---------------------------------------------
https://heise.de/-10327980
∗∗∗ US-Behörde stoppt Gelder für Lets Encrypt und Tor ‒ Open Tech Fund wehrt sich ∗∗∗
---------------------------------------------
Nach einem Dekret von US-Präsident Trump erhält der Open Technology Fund keine Fördermittel mehr. Deswegen zieht die Organisation jetzt vor Gericht.
---------------------------------------------
https://heise.de/-10328226
∗∗∗ Fake Hiring Challenge for Developers Steals Sensitive Data ∗∗∗
---------------------------------------------
Cyble threat intelligence researchers have uncovered a GitHub repository masquerading as a hiring coding challenge that tricks developers into downloading a backdoor to steal sensitive data. [..] There is evidence that the campaign may be expanding beyond a fake hiring challenge for developers, as Cyble Research and Intelligence Labs (CRIL) researchers also found invoice-themed lures.
---------------------------------------------
https://thecyberexpress.com/fake-hiring-challenge-targets-developers/
=====================
= Vulnerabilities =
=====================
∗∗∗ Notable vulnerabilities in Next.js (CVE-2025-29927) and CrushFTP ∗∗∗
---------------------------------------------
On Friday, March 21, 2025, file transfer software maker CrushFTP disclosed a new vulnerability to customers via email. While the email [...] indicates only CrushFTP v11 is affected by the still-CVE-less (as of March 25) unauthenticated port access vulnerability, the extremely sparse vendor advisory indicates that both CrushFTP v10 and v11 are affected. According to the vendor, the issue is not exploitable if customers have the DMZ function of CrushFTP in place.
---------------------------------------------
https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-…
∗∗∗ RCE Vulnerabilities in k8s Ingress NGINX (9.8 CVE for ingress-nginx) ∗∗∗
---------------------------------------------
Wiz Research discovered CVE-2025-1097, CVE-2025-1098, CVE-2025-24514 and CVE-2025-1974, a series of unauthenticated Remote Code Execution vulnerabilities in Ingress NGINX Controller for Kubernetes dubbed #IngressNightmare. Exploitation of these vulnerabilities leads to unauthorized access to all secrets stored across all namespaces in the Kubernetes cluster by attackers, which can result in cluster takeover.
---------------------------------------------
https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities
∗∗∗ Kubernetes: CVE-2025-1974 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/131009
∗∗∗ Kubernetes: CVE-2025-1098 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/131008
∗∗∗ Kubernetes: CVE-2025-1097 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/131007
∗∗∗ Kubernetes: CVE-2025-24514 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/131006
∗∗∗ Kubernetes: CVE-2025-24513 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/131005
∗∗∗ Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day) - and Free Micropatches for it ∗∗∗
---------------------------------------------
https://blog.0patch.com/2025/03/scf-file-ntlm-hash-disclosure.html
∗∗∗ Rockwell Automation 440G TLS-Z ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-084-03
∗∗∗ Rockwell Automation Verve Asset Manager ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-084-02
∗∗∗ ABB RMC-100 ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-084-01
∗∗∗ Inaba Denki Sangyo CHOCO TEI WATCHER Mini ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-084-04
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 21-03-2025 18:00 − Montag 24-03-2025 18:00
Handler: Felician Fuchs
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ FBI warnings are true—fake file converters do push malware ∗∗∗
---------------------------------------------
The FBI is warning that fake online document converters are being used to steal peoples information and, in worst-case scenarios, lead to ransomware attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-f…
∗∗∗ Cloudflare now blocks all unencrypted traffic to its API endpoints ∗∗∗
---------------------------------------------
Cloudflare announced that it closed all HTTP connections and it is now accepting only secure, HTTPS connections for api.cloudflare.com.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cloudflare-now-blocks-all-un…
∗∗∗ Trusted Signing: Hacker signieren Windows-Malware über Microsoft-Plattform ∗∗∗
---------------------------------------------
Forscher haben Malware entdeckt, die über Microsofts neue Trusted-Signing-Plattform signiert wurde. Windows-Systeme lassen sich damit leichter infizieren.
---------------------------------------------
https://www.golem.de/news/trusted-signing-microsoft-dienst-zum-signieren-vo…
∗∗∗ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories CI/CD Secrets Exposed ∗∗∗
---------------------------------------------
The supply chain attack involving the GitHub Action "tj-actions/changed-files" started as a highly-targeted attack against one of Coinbases open-source projects, before evolving into something more widespread in scope."The payload was focused on ..
---------------------------------------------
https://thehackernews.com/2025/03/github-supply-chain-breach-coinbase.html
∗∗∗ Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks ∗∗∗
---------------------------------------------
A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions.The vulnerability, tracked as CVE-2025-29927, carries a CVSS score of 9.1 ..
---------------------------------------------
https://thehackernews.com/2025/03/critical-nextjs-vulnerability-allows.html
∗∗∗ Oracle Cloud says its not true someone broke into its login servers and stole data ∗∗∗
---------------------------------------------
Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information stolen.
---------------------------------------------
https://www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credenti…
∗∗∗ Verfassungsschutz: Deutsche NGOs Ziel von russischen Cyberangriffen ∗∗∗
---------------------------------------------
Das Bundesamt für Verfassungsschutz hat einige zivilgesellschaftliche Organisationen alarmiert, dass sie verstärkt im Fokus russischer Cyberattacken stünden.
---------------------------------------------
https://www.heise.de/news/Verfassungsschutz-warnt-NGOs-vor-zunehmenden-russ…
∗∗∗ Google Maps: Falsche Schlüsseldienste und Co. spähen Nutzer aus ∗∗∗
---------------------------------------------
Der Navigationsdienst Google Maps klagt gegen unechte Geschäfte auf seiner Plattform, die Nutzerdaten abschöpften und verkauften.
---------------------------------------------
https://heise.de/-10325360
∗∗∗ How to find Next.js on your network ∗∗∗
---------------------------------------------
On March 22nd, 2025, Next.js disclosed an authentication bypass vulnerability in the middleware layer. Exploitation is trivial and can be achieved by sending an extra HTTP header. For specifics, please see ..
---------------------------------------------
https://www.runzero.com/blog/next-js/
∗∗∗ Next.js Patches Critical Middleware Vulnerability (CVE-2025-29927) ∗∗∗
---------------------------------------------
This weekend, the Next.js team released emergency patches addressing a critical vulnerability (CVE-2025-29927) that allowed attackers to bypass middleware-based security checks, including authentication and ..
---------------------------------------------
https://socket.dev/blog/next-js-patches-critical-middleware-vulnerability
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 20-03-2025 18:00 − Freitag 21-03-2025 18:00
Handler: Felician Fuchs
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Angreifer machen sich an Hintertür in Cisco Smart Licensing Utility zu schaffen ∗∗∗
---------------------------------------------
Wie Sicherheitsforscher berichten, fangen Angreifer derzeit an, zwei Schwachstellen in Cisco Smart Licensing Utility auszunutzen. Darüber verschaffen sie sich Zugang mit Adminrechten. Sicherheitspatches sind schon länger verfügbar. [..] Die „kritischen“ Lücken (CVE-2024-20439, CVE-2024-20440) sind seit Anfang September 2024 bekannt.
---------------------------------------------
https://heise.de/-10323893
∗∗∗ VSCode extensions found downloading early-stage ransomware ∗∗∗
---------------------------------------------
Two malicious VSCode Marketplace extensions were found deploying in-development ransomware from a remote server, exposing critical gaps in Microsofts review process.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/vscode-extensions-found-down…
∗∗∗ Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates ∗∗∗
---------------------------------------------
The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools.
---------------------------------------------
https://thehackernews.com/2025/03/medusa-ransomware-uses-malicious-driver.h…
∗∗∗ How to Avoid US-Based Digital Services—and Why You Might Want To ∗∗∗
---------------------------------------------
Amid growing concerns over Big Tech firms aligning with Trump administration policies, people are starting to move their digital lives to services based overseas. Heres what you need to know.
---------------------------------------------
https://www.wired.com/story/trump-era-digital-expat/
∗∗∗ Fake-Shops wie eu.stanlaystore.com locken mit günstigen Stanley Cups ∗∗∗
---------------------------------------------
Stanley Cups gehören aktuell zu den beliebtesten Thermoskannen auf dem Markt. Leider machen sich auch Kriminelle die hohe Nachfrage zunutze und bieten die trendigen Becher in Fake-Shops an. Wie zum Beispiel die Website eu.stanlaystore.com, die mit unschlagbar günstigen Preisen lockt.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-shops-wie-eustanlaystorecom-loc…
∗∗∗ Achtung Phishing: So funktioniert der neue Debitkarten-Betrug ∗∗∗
---------------------------------------------
Kriminelle versenden derzeit vermehrt gefälschte E-Mails im Namen der Erste Bank. Darin wird behauptet, dass Ihre Debitkarte veraltet sei und Sie eine neue Karte beantragen müssen. Mit dieser Betrugsmasche versuchen Kriminelle, an Ihre Debitkarte samt PIN zu gelangen!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-phishing-so-funktioniert-der…
∗∗∗ GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident: Threat Assessment (Updated 3/21) ∗∗∗
---------------------------------------------
Updated March 20: The recent compromise of the GitHub action tj-actions/changed-files and additional actions within the reviewdog organization has captured the attention of the GitHub community, marking another major software supply chain attack. Our team conducted an in-depth investigation into this incident and uncovered many more details about how the attack occurred and its timeline. [..] Our team also discovered that the initial attack targeted Coinbase. The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for further compromises. However, the attacker was not able to use Coinbase secrets or publish packages.
---------------------------------------------
https://unit42.paloaltonetworks.com/github-actions-supply-chain-attack/
∗∗∗ Major web services go dark in Russia amid reported Cloudflare block ∗∗∗
---------------------------------------------
Website outages were observed across Russia this week, with regulators attributing them to issues with foreign servers. Observers said the problems might be tied to Russian government moves to block Cloudflare services.
---------------------------------------------
https://therecord.media/russia-websites-dark-reported-cloudflare-block
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerability in NAKIVO Backup & Replication ∗∗∗
---------------------------------------------
A vulnerability has been discovered in NAKIVO Backup & Replication 10.11.3.86570 and earlier. [..] We have already removed the affected versions from App Center and requested NAKIVO to provide a fixed version as soon as possible.
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-25-08
∗∗∗ Siemens: SSA-656895 V1.2 (Last Update: 2025-03-20): Open Redirect Vulnerability in Teamcenter ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/html/ssa-656895.html
∗∗∗ [R1] Nessus Agent Version 10.8.3 Fixes One Vulnerability ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2025-02
∗∗∗ F5: K000150484: Apache Tomcat vulnerability CVE-2025-24813 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000150484
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 19-03-2025 18:00 − Donnerstag 20-03-2025 18:00
Handler: Felician Fuchs
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ HellCat hackers go on a worldwide Jira hacking spree ∗∗∗
---------------------------------------------
Swiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat targets Jira servers worldwide using compromised credentials.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hellcat-hackers-go-on-a-worl…
∗∗∗ Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data ∗∗∗
---------------------------------------------
The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new report from The Citizen Lab. [..] In these attacks, targets were added to a WhatsApp group, and then sent a PDF document, which is subsequently parsed automatically to trigger the now-patched zero-day vulnerability and load the Graphite spyware.
---------------------------------------------
https://thehackernews.com/2025/03/six-governments-likely-use-israeli.html
∗∗∗ Phishing-Versuche im Namen der Oberbank – „Bitte aktualisieren Sie Ihre persönlichen Informationen“ ∗∗∗
---------------------------------------------
Mit Fake-SMS-Nachrichten versuchen Kriminelle gerade verstärkt, Opfer auf gefälschte Kundenportale der Oberbank zu leiten. Ziel der Phishing-Attacke sind sensible Bankdaten. Hier erfahren Sie, wie der Betrugsversuch abläuft und wie Sie den Fake erkennen. Außerdem erklären wir, was Sie tun können, falls Sie Ihre persönlichen Informationen bereits an die Betrüger:innen übermittelt haben.
---------------------------------------------
https://www.watchlist-internet.at/news/persoenlichen-informationen-phishing…
∗∗∗ Presseaussendung: Fake-Shops, Produktpiraterie und Co. als Bedrohung für den österreichischen Onlinehandel ∗∗∗
---------------------------------------------
Fake-Shops, Markenfälschungen, Produktpiraterie oder Verletzungen des geistigen Eigentums: Die Bedrohungen im E-Commerce sind vielfältig und können für österreichische Unternehmer:innen nicht nur zu finanziellen Verlusten durch betrügerische Konkurrenz führen, sondern auch das Vertrauen der Kund:innen in den Online-Handel als Ganzes untergraben.
---------------------------------------------
https://www.watchlist-internet.at/news/presseaussendung-bedrohungen-fuer-de…
∗∗∗ UK sets timeline for country’s transition to quantum-resistant encryption ∗∗∗
---------------------------------------------
The U.K. National Cyber Security Centre issued new guidance to help organizations transition to cryptographic algorithms and protocols that can protect data threatened by quantum computing.
---------------------------------------------
https://therecord.media/uk-ncsc-quantum-resistant-algorithms-transition
=====================
= Vulnerabilities =
=====================
∗∗∗ WordPress security plugin WP Ghost vulnerable to remote code execution bug ∗∗∗
---------------------------------------------
Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated attackers to remotely execute code and hijack servers. [..] The flaw, tracked as CVE-2025-26909, impacts all versions of WP Ghost up to 5.4.01 and stems from insufficient input validation in the 'showFile()' function. Exploiting the flaw could allow attackers to include arbitrary files via manipulated URL paths.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/wordpress-security-plugin-wp…
∗∗∗ Google warnt: Kritische Sicherheitslücke in Chrome gefährdet Nutzer ∗∗∗
---------------------------------------------
Google hat wichtige Sicherheitsupdates für seinen Webbrowser Chrome veröffentlicht. [..] Mit Details zu der als CVE-2025-2476 registrierten Schwachstelle hält sich Google in seiner Versionsankündigung aus Sicherheitsgründen noch zurück.
---------------------------------------------
https://www.golem.de/news/google-warnt-kritische-sicherheitsluecke-in-chrom…
∗∗∗ Veeam Backup & Replication RCE-Schwachstelle CVE-2025-23120 ∗∗∗
---------------------------------------------
Nutzer von Veeam Backup & Replication müssen reagieren. Der Anbieter Veeam hat zum 19. März 2025 über eine Remote Code Execution (RCE) Schwachstelle CVE-2025-23120 in verschiedenen Versionen des genannten Produkts informiert. Es gibt Sicherheitsupdates, um diese Schwachstelle zu schließen.
---------------------------------------------
https://www.borncity.com/blog/2025/03/19/veeam-backup-replication-rce-schwa…
∗∗∗ ZDI-25-175: (0Day) Luxion KeyShot USDC File Parsing Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-175/
∗∗∗ ZDI-25-174: (0Day) Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-174/
∗∗∗ Schwerwiegende Sicherheitslücken bedrohen Serverbetriebssystem IBM AIX ∗∗∗
---------------------------------------------
https://www.heise.de/news/Schwerwiegende-Sicherheitsluecken-bedrohen-Server…
∗∗∗ WebKitGTK and WPE WebKit Security Advisory WSA-2025-0002 ∗∗∗
---------------------------------------------
https://webkitgtk.org/security/WSA-2025-0002.html
∗∗∗ SMA Sunny Portal ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-079-04
∗∗∗ Santesoft Sante DICOM Viewer Pro ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-079-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 18-03-2025 18:00 − Mittwoch 19-03-2025 18:00
Handler: Alexander Riepl
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Malicious Android Vapor apps on Google Play installed 60 million times ∗∗∗
---------------------------------------------
Over 300 malicious Android applications downloaded 60 million items from Google Play acted as adware or attempted to steal credentials and credit card information.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malicious-android-vapor-apps…
∗∗∗ Why its time for phishing prevention to move beyond email ∗∗∗
---------------------------------------------
While phishing has evolved, email security hasnt kept up. Attackers now bypass MFA & detection tools with advanced phishing kits, making credential theft harder to prevent. Learn how Push Securitys browser-based security stops attacks as they happen.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/why-its-time-for-phishing-pr…
∗∗∗ iOS-Nutzer gefährdet: Phishing-Lücke in Passwords-App erst nach Monaten gepatcht ∗∗∗
---------------------------------------------
Apples Passwords-App hat Weiterleitungen zur Passwortänderung über unsicheres HTTP abgewickelt. Angreifer hätten auf Phishingseiten umleiten können.
---------------------------------------------
https://www.golem.de/news/unsicheres-http-ios-nutzer-durch-phishing-luecke-…
∗∗∗ Malware im Anmarsch: Ungepatchte Windows-Lücke wird seit 8 Jahren ausgenutzt ∗∗∗
---------------------------------------------
Hacker nutzen die Schwachstelle schon mindestens seit 2017 aus. Ein Patch ist bisher nicht in Sicht. Auch Ziele in Deutschland sind bereits attackiert worden.
---------------------------------------------
https://www.golem.de/news/malware-im-anmarsch-ungepatchte-windows-luecke-wi…
∗∗∗ Arcane stealer: We want all your data ∗∗∗
---------------------------------------------
The new Arcane stealer spreads via YouTube and Discord, collecting data from many applications, including VPN and gaming clients, network utilities, messaging apps, and browsers.
---------------------------------------------
https://securelist.com/arcane-stealer/115919/
∗∗∗ Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source ∗∗∗
---------------------------------------------
Today, were thrilled to announce the launch of OSV-Scanner V2.0.0, following the announcement of the beta version. This V2 release builds upon the foundation we laid with OSV-SCALIBR and adds significant new capabilities ..
---------------------------------------------
https://security.googleblog.com/2025/03/announcing-osv-scanner-v2-vulnerabi…
∗∗∗ Buying browser extensions for fun and profit ∗∗∗
---------------------------------------------
Your browser extensions could be secretly sold to malicious actors without your knowledge. What starts as helpful tools created by passionate developers can transform into dangerous spyware when sold to the highest bidder. As these extensions grow to hundreds of thousands of users, their creators—overwhelmed by maintenance and lacking ..
---------------------------------------------
https://secureannex.com/blog/buying-browser-extensions/
∗∗∗ Which passwords are attackers using against RDP ports right now? ∗∗∗
---------------------------------------------
The Specops research team has been analyzing 15 million passwords being used to attack RDP ports, in live attacks happening against networks right now. Our team have found the ten most common passwords attackers are using and analyzed their wordlists for the most common complexity rules and password lengths. We shared the results of a ..
---------------------------------------------
https://specopssoft.com/blog/passwords-used-in-attacking-rdp-ports/
∗∗∗ AMOS and Lumma stealers actively spread to Reddit users ∗∗∗
---------------------------------------------
Reddit users from trading and crypto subreddits are being lured into installing malware disguised as premium cracked software.
---------------------------------------------
https://www.malwarebytes.com/blog/scams/2025/03/amos-and-lumma-stealers-act…
∗∗∗ Website-Kidnapping: So schützen Sie Ihre Website vor Hackingangriffen! ∗∗∗
---------------------------------------------
Immer öfter geraten österreichische Unternehmen ins Visier von Kriminellen, die ihre Website unbemerkt manipulieren, um Kund:innen auf Fake-Shops oder andere illegale Inhalte weiterzuleiten. Besonders gefährdet sind kleine und mittlere Unternehmen (KMU), da sie oft nicht über ausreichende IT-Sicherheitsmaßnahmen verfügen.
---------------------------------------------
https://www.watchlist-internet.at/news/website-kidnapping-so-schuetzen-sie-…
∗∗∗ Russland vergiftet KI-Chatbots wie ChatGPT gezielt mit Propaganda ∗∗∗
---------------------------------------------
Rund 3,6 Millionen Artikel des russischen Pravda-Netzwerks sollen in das Trainingsmaterial westlicher KI-Systeme eingeflossen sein. So werden Fake News via KI verbreitet
---------------------------------------------
https://www.derstandard.at/story/3000000261876/russland-vergiftet-ki-chatbo…
∗∗∗ The Citizen Lab’s director dissects spyware and the ‘proliferating’ market for it ∗∗∗
---------------------------------------------
In an interview with Recorded Future News, Deibert explained the technical aspects of the Citizen Lab’s methods and how spyware companies continue to evolve to evade detection.
---------------------------------------------
https://therecord.media/ron-deibert-citizen-lab-spyware-interview
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-25-149: Adobe Acrobat Reader DC AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-271561.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-149/
∗∗∗ ZDI-25-151: Progress Software Kemp LoadMaster mangle Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software Kemp LoadMaster. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-1758.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-151/
∗∗∗ ZDI-25-150: Microsoft Windows MSC File Insufficient UI Warning Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-26633.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-150/
∗∗∗ ZDI-25-172: Apple macOS MOV File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-24124.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-172/
∗∗∗ Multiple Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based Products ∗∗∗
---------------------------------------------
Autodesk AutoCAD and certain AutoCAD-based products are affected by multiple vulnerabilities. Exploitation of these vulnerabilities can lead to code execution. Exploitation of these vulnerabilities requires user interaction.
---------------------------------------------
https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 17-03-2025 18:00 − Dienstag 18-03-2025 18:00
Handler: Alexander Riepl
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Critical AMI MegaRAC bug can let attackers hijack, brick servers ∗∗∗
---------------------------------------------
A new critical severity vulnerability found in American Megatrends Internationals MegaRAC Baseboard Management Controller (BMC) software can let attackers hijack and potentially brick vulnerable servers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/critical-ami-megarac-bug-can…
∗∗∗ StilachiRAT analysis: From system reconnaissance to cryptocurrency theft ∗∗∗
---------------------------------------------
Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll module that contains the RAT capabilities and summarizes ..
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analys…
∗∗∗ New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious ..
---------------------------------------------
https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html
∗∗∗ Britische Hintertüren: Verdacht nach Apple auch bei Google ∗∗∗
---------------------------------------------
Britische Überwacher verlangen weltweiten Zugriff auf Apple-Backups. Apple darf das nicht bestätigen und ist damit offenbar kein Einzelfall.
---------------------------------------------
https://www.heise.de/news/Auch-Google-kann-britischen-Ueberwachungsbefehl-n…
∗∗∗ FBI-Warnung: Betrügerische Online-Dateikonverter schleusen Trojaner in Dokumente ∗∗∗
---------------------------------------------
Wer kostenlose Onlinedienste zum Umwandeln von etwa Textdateien nutzt, kann sich Malware einfangen. Darauf weist das FBI hin.
---------------------------------------------
https://www.heise.de/news/Malwareverteiler-FBI-warnt-vor-betruegerischen-On…
∗∗∗ Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds ∗∗∗
---------------------------------------------
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst ..
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/bogus-deepseek-ai-inst…
∗∗∗ Betrügerisches Gewinnspiel: Abofalle statt günstigem Thermomix! ∗∗∗
---------------------------------------------
Frau S. wünscht sich schon lange einen Thermomix. Bisher schreckte sie jedoch der hohe Preis der Küchenmaschine ab. Umso größer ist ihre Freude, als sie im Internet sieht, dass sie nach der Teilnahme an einer Umfrage den Thermomix für nur zwei Euro erhalten kann. Doch Vorsicht: Statt eines günstigen Thermomix erwartet sie eine teure Abofalle!
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerisches-gewinnspiel-abofalle…
∗∗∗ Google-Mutter Alphabet bietet für Cybersecurity-Startup Wiz 30 Milliarden Dollar ∗∗∗
---------------------------------------------
Es wäre die größte Transaktion von Alphabet. Ein Angebot über 23 Milliarden Dollar war im Vorjahr abgelehnt worden
---------------------------------------------
https://www.derstandard.at/story/3000000261775/wsj-alphabet-bietet-f252r-cy…
∗∗∗ Crypto exchange OKX shuts down tool used by North Korean hackers to launder stolen funds ∗∗∗
---------------------------------------------
OKX said it detected a coordinated effort by one of North Korea’s most prolific hacking outfits to misuse its decentralized finance (DeFi) services.
---------------------------------------------
https://therecord.media/crypto-okx-shuts-down-exchange
∗∗∗ Password reuse is rampant: nearly half of observed user logins are compromised ∗∗∗
---------------------------------------------
Accessing private content online, whether it's checking email or streaming your favorite show, almost always starts with a “login” step. Beneath this everyday task lies a widespread human mistake we still have not resolved: password reuse. Many users recycle passwords across multiple services, creating a ripple effect of risk when their credentials are leaked.
---------------------------------------------
https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-comprom…
∗∗∗ Offline PKI using 3 YubiKeys and an ARM single board computer ∗∗∗
---------------------------------------------
An offline PKI enhances security by physically isolating the certificate authority from network threats. A YubiKey is a low-cost solution to store a root certificate. You also need an air-gapped environment to operate the root CA.
---------------------------------------------
https://vincent.bernat.ch/en/blog/2025-offline-pki-yubikeys
∗∗∗ Security Risks of Setting Access Control Allow Origin: * ∗∗∗
---------------------------------------------
Wildcard CORS: convenient or careless? What are the ACTUAL scenarios that could lead to a loose CORS policy being exploited?
---------------------------------------------
https://projectblack.io/blog/security-risks-of-setting-access-control-allow…
=====================
= Vulnerabilities =
=====================
∗∗∗ TYPO3-EXT-SA-2025-003: Multiple vulnerabilities in extension “[clickstorm] SEO” (cs_seo) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2025-003
∗∗∗ TYPO3-EXT-SA-2025-002: Cross-Site Scripting in extension “Additional TCA” (additional_tca) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-ext-sa-2025-002
∗∗∗ Varnish Enterprise vulnerability in MSE4 when handling range requests ∗∗∗
---------------------------------------------
https://docs.varnish-software.com/security/VEV00001/
∗∗∗ HTTP/1 client-side desync vulnerability ∗∗∗
---------------------------------------------
https://docs.varnish-software.com/security/VSV00015/
∗∗∗ Schneider Electric EcoStruxure Power Automation System ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-25-077-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 14-03-2025 18:00 − Montag 17-03-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Coinbase phishing email tricks users with fake wallet migration ∗∗∗
---------------------------------------------
A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/coinbase-phishing-email-tric…
∗∗∗ Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts ∗∗∗
---------------------------------------------
Cybercriminals are promoting malicious Microsoft OAuth apps that masquerade as Adobe and DocuSign apps to deliver malware and steal Microsoft 365 accounts credentials.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malicious-adobe-docusign-oau…
∗∗∗ Mirai Bot now incroporating (malformed?) DrayTek Vigor Router Exploits, (Sun, Mar 16th) ∗∗∗
---------------------------------------------
Last October, Forescout published a report disclosing several vulnerabilities in DrayTek routers. According to Forescount, about 700,000 devices were exposed to these vulnerabilities ..
---------------------------------------------
https://isc.sans.edu/diary/Mirai+Bot+now+incroporating+malformed+DrayTek+Vi…
∗∗∗ Credit Card Skimmer and Backdoor on WordPress E-commerce Site ∗∗∗
---------------------------------------------
The battle against e-commerce malware continues to intensify, with attackers deploying increasingly sophisticated tactics. In a recent case at Sucuri, a customer reported suspicious files and unexpected behavior on their WordPress site. Upon deeper analysis, we discovered a complicated infection involving multiple components: a credit card skimmer, a ..
---------------------------------------------
https://blog.sucuri.net/2025/03/credit-card-skimmer-and-backdoor-on-wordpre…
∗∗∗ Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal ∗∗∗
---------------------------------------------
Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as "time" related utilities, but harboring hidden functionality to steal sensitive data such as ..
---------------------------------------------
https://thehackernews.com/2025/03/malicious-pypi-packages-stole-cloud.html
∗∗∗ Microsoft wouldnt look at a bug report without a video. Researcher maliciously complied ∗∗∗
---------------------------------------------
Maddening techno loop, Zoolander reference, and 14 minutes of time wasted A vulnerability analyst and prominent member of the infosec industry has blasted Microsoft for refusing to look at a bug report unless he submitted a video alongside a written explanation.
---------------------------------------------
https://www.theregister.com/2025/03/17/microsoft_bug_report_troll/
∗∗∗ Fake-Sicherheitswarnung: Betrüger versuchen Github-Konten zu kapern ∗∗∗
---------------------------------------------
Sicherheitsforscher berichten über Angriffsversuche auf rund 12.000 Github-Repositories. Dabei wollen Angreifer die volle Kontrolle über Konten erlangen.
---------------------------------------------
https://www.heise.de/news/Fake-Sicherheitswarnung-Betrueger-versuchen-Githu…
∗∗∗ ClickFix: How to Infect Your PC in Three Easy Steps ∗∗∗
---------------------------------------------
A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed "ClickFix," the visitor to a hacked or malicious website is asked to distinguish ..
---------------------------------------------
https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three…
∗∗∗ RCS: Apple und Google einigen sich auf Ende-zu-Ende-verschlüsselte Kommunikation ∗∗∗
---------------------------------------------
Neue Version des SMS-Nachfolgers unterstützt sichere Verschlüsselung, die beiden Branchengrößen wollen das bei Android und iPhone übernehmen
---------------------------------------------
https://www.derstandard.at/story/3000000261679/rcs-apple-und-google-einigen…
∗∗∗ Telegram CEO confirms leaving France amid criminal probe ∗∗∗
---------------------------------------------
The Russian-born founder and owner of the messaging app Telegram said he returned to Dubai after spending several months in France due to a criminal investigation related to activity on the app.
---------------------------------------------
https://therecord.media/telegram-pavel-durov-leaves-france-amid-probe
∗∗∗ Mora_001 ransomware gang exploiting Fortinet bug spotlighted by CISA in January ∗∗∗
---------------------------------------------
Two vulnerabilities impacting Fortinet products are being exploited by a new ransomware operation with ties to the LockBit ransomware group.
---------------------------------------------
https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lo…
∗∗∗ Scammers Pose as Cl0p Ransomware to Send Fake Extortion Letters ∗∗∗
---------------------------------------------
Scammers are sending fake extortion and ransom demands while posing as ransomware gangs, including the notorious Cl0p ransomware.
---------------------------------------------
https://hackread.com/scammers-pose-cl0p-ransomware-fake-extortion-letters/
∗∗∗ BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique ∗∗∗
---------------------------------------------
The Rise of Browser in the Middle (BitM): BitM attacks offer a streamlined approach, allowing attackers to quickly compromise sessions across various web applications.MFA Remains Crucial, But Not Invulnerable: ..
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/session-stealing-b…
∗∗∗ Supply Chain Security Risk: GitHub Action tj-actions/changed-files Compromised ∗∗∗
---------------------------------------------
On March 14th, 2025, security researchers discovered a critical software supply chain vulnerability in the widely-used GitHub Action tj-actions/changed-files (CVE-2025-30066). This vulnerability allows remote attackers ..
---------------------------------------------
https://blog.aquasec.com/supply-chain-security-threat-github-action-tj-acti…
∗∗∗ Bypassing Authentication Like It’s The ‘90s - Pre-Auth RCE Chain(s) in Kentico Xperience CMS ∗∗∗
---------------------------------------------
I recently joined watchTowr, and it is, therefore, time - time for my first watchTowr Labs blogpost, previously teased in a tweet of a pre-auth RCE chain affecting some ‘unknown software’. Joining the team, I wanted to maintain the trail of destruction left by the watchTowr Labs team, ..
---------------------------------------------
https://labs.watchtowr.com/bypassing-authentication-like-its-the-90s-pre-au…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (opensaml and php8.2), Fedora (chromium, ctk, dcmtk, expat, ffmpeg, firefox, fscrypt, gdcm, InsightToolkit, kitty, libssh2, libxml2, linux-firmware, man2html, nextcloud, OpenImageIO, php, podman-tui, python-django, python-django5, python-gunicorn, python-jinja2, python-spotipy, python3.6, qt6-qtwebengine, thunderbird, tigervnc, vim, vyper, xen, xorg-x11-server, and xorg-x11-server-Xwayland), Mageia (freetype2, ghostscript, and man2html), ..
---------------------------------------------
https://lwn.net/Articles/1014437/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 13-03-2025 18:00 − Freitag 14-03-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New SuperBlack ransomware exploits Fortinet auth bypass flaws ∗∗∗
---------------------------------------------
A new ransomware operator named Mora_001 is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-superblack-ransomware-ex…
∗∗∗ Ransomware gang creates tool to automate VPN brute-force attacks ∗∗∗
---------------------------------------------
The Black Basta ransomware operation created an automated brute-forcing framework dubbed BRUTED to breach edge networking devices like firewalls and VPNs.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/black-basta-ransomware-creat…
∗∗∗ Jailbreaking is (mostly) simpler than you think ∗∗∗
---------------------------------------------
Today, we are sharing insights on a simple, optimization-free jailbreak method called Context Compliance Attack (CCA), that has proven effective against most leading AI systems. We are disseminating this research to promote awareness and encourage system designers to implement appropriate safeguards.
---------------------------------------------
https://msrc.microsoft.com/blog/2025/03/jailbreaking-is-mostly-simpler-than…
∗∗∗ CISA: We didnt fire red teams, we just unhired a bunch of them ∗∗∗
---------------------------------------------
Agency tries to save face as it also pulls essential funding for election security initiatives Uncle Sams cybersecurity agency is trying to save face by seeking to clear up what its calling "inaccurate reporting" after a former senior pen-tester claimed the organization axed two red teams.
---------------------------------------------
https://www.theregister.com/2025/03/13/cisa_red_team_layoffs/
∗∗∗ A New Era of Attacks on Encryption Is Starting to Heat Up ∗∗∗
---------------------------------------------
The UK, France, Sweden, and EU have made fresh attacks on end-to-end encryption. Some of the attacks are more “crude” than those in recent years, experts say.
---------------------------------------------
https://www.wired.com/story/a-new-era-of-attacks-on-encryption-is-starting-…
∗∗∗ Fernzugriff: Ivanti Secure Access Client als Einfallstor für Angreifer ∗∗∗
---------------------------------------------
Ein Sicherheitsupdate schließt unter Windows eine Lücke in Ivanti Secure Access Client.
---------------------------------------------
https://www.heise.de/news/Fernzugriff-Ivanti-Secure-Access-Client-als-Einfa…
∗∗∗ Off the Beaten Path: Recent Unusual Malware ∗∗∗
---------------------------------------------
Three unusual malware samples analyzed here include an ISS backdoor developed in a rare language, a bootkit and a Windows implant of a post-exploit framework.
---------------------------------------------
https://unit42.paloaltonetworks.com/unusual-malware/
∗∗∗ Ransomware attack takes down health system network in Micronesia ∗∗∗
---------------------------------------------
One of the four states that make up the Pacific nation of Micronesia is battling against ransomware hackers who have forced all of the computers used by its government health agency offline.
---------------------------------------------
https://therecord.media/ransomware-attack-micronesia-health-system
∗∗∗ Europes telecoms sector under increased threat from cyber spies, warns Denmark ∗∗∗
---------------------------------------------
State-sponsored cyber espionage is a bigger threat than ever to Europes telecommunications networks, according to a new assessment from Denmarks government.
---------------------------------------------
https://therecord.media/europe-increased-cyber-espionage-telecoms-denmark-r…
∗∗∗ Alleged Russian LockBit developer extradited from Israel, appears in New Jersey court ∗∗∗
---------------------------------------------
Rostislav Panev, who was arrested in Israel in August 2024 on U.S. charges related to dozens of LockBit ransomware attacks, has been extradited and appeared in a New Jersey federal court, authorities said.
---------------------------------------------
https://therecord.media/lockbit-alleged-russian-developer-extradited-us-isr…
∗∗∗ SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware ∗∗∗
---------------------------------------------
Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks.
---------------------------------------------
https://www.trendmicro.com/en_us/research/25/c/socgholishs-intrusion-techni…
∗∗∗ Recursion kills: The story behind CVE-2024-8176 / Expat 2.7.0 released, includes security fixes ∗∗∗
---------------------------------------------
Expat 2.7.0 has been released earlier today. I will make this a more detailed post than usual because in many ways there is more to tell about this release than the average libexpat release: there is a story this time
---------------------------------------------
https://blog.hartwork.org/posts/expat-2-7-0-released/
∗∗∗ Memory Corruption in Delphi ∗∗∗
---------------------------------------------
Our team at Include Security is often asked to examine applications coded in languages that are usually considered “unsafe”, such as C and C++, due to their lack of memory safety functionality. Critical aspects of reviewing such code include identifying where bounds-checking, input validation, and pointer handling/dereferencing are ..
---------------------------------------------
https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/
∗∗∗ My Scammer Girlfriend: Baiting A Romance Fraudster ∗∗∗
---------------------------------------------
At the beginning of the year, a spate of very similar mails appeared in my spam-box. Although originating from different addresses (and sent to different recipients), they all appeared to be the opener for the same romance scam campaign.
---------------------------------------------
https://www.bentasker.co.uk/posts/blog/security/seducing-a-romance-scammer.…
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-25-135: Adobe Acrobat Reader DC AcroForm Use of Uninitialized Variable Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27162.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-135/
∗∗∗ ZDI-25-134: Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-24431.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-134/
∗∗∗ ZDI-25-133: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27174.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-133/
∗∗∗ ZDI-25-132: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27159.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-132/
∗∗∗ ZDI-25-131: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27160.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-131/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 12-03-2025 18:00 − Donnerstag 13-03-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ No Project Is an Island: Why You Need SBOMs and Dependency Management ∗∗∗
---------------------------------------------
The system you develop and maintain does not exist in isolation. Providing SBOMs for our work is our way to show we care. Software is a relatively recent phenomenon. For a long time, you could credibly say most of its existence, software was poorly understood by society and industry at large. There was ..
---------------------------------------------
https://bsdly.blogspot.com/2025/03/no-project-is-island-why-you-need-sboms.…
∗∗∗ Facebook discloses FreeType 2 flaw exploited in attacks ∗∗∗
---------------------------------------------
Facebook is warning that a FreeType vulnerability in all versions up to 2.13 can lead to arbitrary code execution, with reports that the flaw has been exploited in attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-…
∗∗∗ Flugticketgroßhändler: Cyberangriff legt Buchungssystem von Aerticket lahm ∗∗∗
---------------------------------------------
Nach einem Hackerangriff ist das Buchungssystem von Aerticket vorerst unbrauchbar. Eine schnelle Wiederherstellung ist wohl nicht zu erwarten.
---------------------------------------------
https://www.golem.de/news/flugticketgrosshaendler-cyberangriff-legt-buchung…
∗∗∗ Head Mare and Twelve join forces to attack Russian entities ∗∗∗
---------------------------------------------
We analyze the activities of the Head Mare hacktivist group, which has been attacking Russian companies jointly with Twelve.
---------------------------------------------
https://securelist.com/head-mare-twelve-collaboration/115887/
∗∗∗ Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware ∗∗∗
---------------------------------------------
Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The campaign uses a social engineering technique called ClickFix to deliver multiple credential-stealing malware ..
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-…
∗∗∗ Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand ∗∗∗
---------------------------------------------
Feds warn gang still rampant and now cracked 300+ victims around the world A crook who distributes the Medusa ransomware tried to make a victim cough up three payments instead of the usual two, according to a government advisory on how to defend against the malware and the gangs who wield it.
---------------------------------------------
https://www.theregister.com/2025/03/13/medusa_ransomware_infects_300_critic…
∗∗∗ DeepSeek can be gently persuaded to spit out malware code ∗∗∗
---------------------------------------------
It might need polishing, but a useful find for any budding cybercrooks out there DeepSeeks flagship R1 model is capable of generating a working keylogger and basic ransomware code, just as long as a techie is on hand to tinker with it a little.
---------------------------------------------
https://www.theregister.com/2025/03/13/deepseek_malware_code/
∗∗∗ Sicherheitslücken: Gitlab-Entwickler raten zu zügigem Update ∗∗∗
---------------------------------------------
Es sind wichtige Sicherheitsupdates für die Softwareentwicklungsplattform Gitlab erschienen.
---------------------------------------------
https://www.heise.de/news/Sicherheitsluecken-Gitlab-Entwickler-raten-zu-zue…
∗∗∗ Sicherheitsupdates: Root-Sicherheitslücke bedroht Cisco-ASR-Router ∗∗∗
---------------------------------------------
Der Netzwerkausrüster Cisco hat mehrere Schwachstellen geschlossen, über die Angreifer etwa ASR-Router attackieren können.
---------------------------------------------
https://www.heise.de/news/Sicherheitsupdates-Root-Sicherheitsluecke-bedroht…
∗∗∗ Schadcode-Sicherheitslücken bedrohen FortiOS, FortiSandbox & Co. ∗∗∗
---------------------------------------------
Mehrere Produkte von Fortinet sind attackierbar. Sicherheitspatches schaffen Abhilfe.
---------------------------------------------
https://www.heise.de/news/Schadcode-Sicherheitsluecken-bedrohen-FortiOS-For…
∗∗∗ Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims ∗∗∗
---------------------------------------------
We identified a campaign spreading thousands of sca crypto investment platforms through websites and mobile apps, possibly through a standardized toolkit.
---------------------------------------------
https://unit42.paloaltonetworks.com/fraud-crypto-platforms-campaign/
∗∗∗ #StopRansomware: Medusa Ransomware ∗∗∗
---------------------------------------------
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025.
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a
∗∗∗ Signal no longer cooperating with Ukraine on Russian cyberthreats, official says ∗∗∗
---------------------------------------------
The encrypted messaging app Signal has stopped responding to requests from Ukrainian law enforcement regarding Russian cyberthreats, a Ukrainian official claimed, warning that the shift is aiding Moscow’s intelligence efforts.
---------------------------------------------
https://therecord.media/signal-no-longer-cooperating-with-ukraine
∗∗∗ Abusing with style: Leveraging cascading style sheets for evasion and tracking ∗∗∗
---------------------------------------------
Cascading Style Sheets (CSS) are ever present in modern day web browsing, however its far from their own use. This blog will detail the ways adversaries use CSS in email campaigns for evasion and tracking.
---------------------------------------------
https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/
∗∗∗ Statement on CISAs Red Team ∗∗∗
---------------------------------------------
CISA’s Red Team is among the best in the world and remains laser focused on helping our federal and critical infrastructure partners identify and mitigate their most significant vulnerabilities and weaknesses. This has not changed.
---------------------------------------------
https://www.cisa.gov/news-events/news/statement-cisas-red-team
∗∗∗ PCI DSS FAQ SAQ WTF BBQ... ∗∗∗
---------------------------------------------
I was trying to come up with a sensible title for this blog post, but I feel this one mirrors the thoughts and feelings of many of us about recent events in the PCI DSS compliance space! There have been some significant changes in ..
---------------------------------------------
https://scotthelme.ghost.io/pci-dss-faq-saq-wtf-bbq/
∗∗∗ Sign in as anyone: Bypassing SAML SSO authentication with parser differentials ∗∗∗
---------------------------------------------
Critical authentication bypass vulnerabilities (CVE-2025-25291 + CVE-2025-25292) were discovered in ruby-saml up to version 1.17.0. In this blog post, well shed light on how these vulnerabilities that rely on a parser differential were uncovered.
---------------------------------------------
https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentic…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium), Fedora (ffmpeg, qt6-qtwebengine, tigervnc, and xorg-x11-server-Xwayland), Red Hat (fence-agents and libxml2), SUSE (amazon-ssm-agent, ark, chromium, fake-gcs-server, gerbera, google-guest-agent, google-osconfig-agent, grafana, kernel, libtinyxml2-10, podman, python311, python312, restic, ruby3.4-rubygem-rack, and thunderbird), and Ubuntu (jinja2, linux-azure, linux-azure-4.15, linux-lts-xenial, linux-nvidia, linux-nvidia-6.8, ..
---------------------------------------------
https://lwn.net/Articles/1014042/
∗∗∗ ZDI-25-129: PDF-XChange Editor RTF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2231.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-129/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 11-03-2025 18:00 − Mittwoch 12-03-2025 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ iPhone-Nutzer attackiert: Aktiv ausgenutzte Webkit-Lücke gefährdet Apple-Geräte ∗∗∗
---------------------------------------------
Angreifer können durch die Schwachstelle aus der Web-Content-Sandbox von Webkit ausbrechen. Apple verteilt Notfallupdates für iOS, MacOS und Safari.
---------------------------------------------
https://www.golem.de/news/iphone-nutzer-attackiert-aktiv-ausgenutzte-webkit…
∗∗∗ Scans for VMWare Hybrid Cloud Extension (HCX) API (Log4j - not brute forcing), (Wed, Mar 12th) ∗∗∗
---------------------------------------------
Today, I noticed increased scans for the VMWare Hyprid Cloud Extension (HCX) "sessions" endpoint. These endpoints are sometimes associated with exploit attempts for various VMWare ..
---------------------------------------------
https://isc.sans.edu/diary/Scans+for+VMWare+Hybrid+Cloud+Extension+HCX+API+…
∗∗∗ Uneinheitliche Cybersicherheitsstandards: Kommunen ohne klare Strategie ∗∗∗
---------------------------------------------
Aktuell gibt es bei der IT-Sicherheit von Kommunen noch viele Mängel. Eine Studie klärt über die Defizite und mögliche Maßnahmen auf.
---------------------------------------------
https://www.heise.de/news/Uneinheitliche-Cybersicherheitsstandards-Kommunen…
∗∗∗ Microsoft-Patchday: 5 kritische Windows-Lücken, 6 andere bereits ausgenutzt ∗∗∗
---------------------------------------------
Zum Patchday im März 205 veröffentlicht Microsoft Korrekturen für insgesamt 57 CVE-Einträge. Sie betreffen Windows, Office, Visual Studio, Azure und mehr.
---------------------------------------------
https://www.heise.de/news/Microsoft-Patchday-5-kritische-Windows-Luecken-6-…
∗∗∗ Take control of Cache-Control and local caching ∗∗∗
---------------------------------------------
TL;DR Caching speeds up website content delivery What caching directives are and how to use them The No-cache directive does not prevent caching The No-store directive prevents caching ..
---------------------------------------------
https://www.pentestpartners.com/security-blog/take-control-of-cache-control…
∗∗∗ Phishing-Falle: Es droht keine dauerhafte Deaktivierung Ihres GMX-Kontos! ∗∗∗
---------------------------------------------
Von Ihrer E-Mail-Adresse werden angeblich „falsche E-Mails“ versendet? Wenn Sie nicht innerhalb von 24 Stunden reagieren, wird ihr GMX-Konto dauerhaft deaktiviert? Keine Sorge, nichts von dem ist wahr, nichts wird passieren. Vielmehr haben Sie ein Phishing-Mail erhalten, das Sie ignorieren können und unverzüglich löschen sollten.
---------------------------------------------
https://www.watchlist-internet.at/news/phishing-deaktivierung-gmx/
∗∗∗ Etwas Dringendes für den Chef erledigen? Vorsicht, Phishing! ∗∗∗
---------------------------------------------
Kriminelle versenden betrügerische E-Mails, in denen sie sich als Vorgesetzte ausgeben. Sie werden aufgefordert, eine dringende Aufgabe zu erledigen und auf die E-Mail zu antworten. Wir raten zur Vorsicht: Eine Antwort kann großen Schaden anrichten! Ignorieren Sie die Nachricht und informieren Sie die IT-Abteilung.
---------------------------------------------
https://www.watchlist-internet.at/news/phishing-unternehmen/
∗∗∗ Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers ∗∗∗
---------------------------------------------
In mid 2024, Mandiant discovered threat actors deployed custom backdoors on Juniper Networks’ Junos OS routers. Mandiant attributed these backdoors to the China-nexus espionage group, UNC3886. Mandiant uncovered several TINYSHELL-based backdoors operating on Juniper Networks’ Junos OS routers. The backdoors had varying ..
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espion…
=====================
= Vulnerabilities =
=====================
∗∗∗ iOS 18.3.2 and iPadOS 18.3.2 ∗∗∗
---------------------------------------------
/en-us/122281
∗∗∗ macOS Sequoia 15.3.2 ∗∗∗
---------------------------------------------
/en-us/122283
∗∗∗ visionOS 2.3.2 ∗∗∗
---------------------------------------------
/en-us/122284
∗∗∗ Safari 18.3.1 ∗∗∗
---------------------------------------------
/en-us/122285
∗∗∗ 2025-03 Out-of-Cycle Security Bulletin: Junos OS: A local attacker with shell access can execute arbitrary code (CVE-2025-21590) ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-B…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily