=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 16-12-2021 18:00 − Freitag 17-12-2021 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Log4j attackers switch to RMI to inject code and mine Monero ∗∗∗
---------------------------------------------
Some threat actors exploiting the Apache Log4j vulnerability have switched from LDAP callback URLs to RMI or even used both in a single request for maximum chances of success.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/log4j-attackers-switch-to-rm…
∗∗∗ Log4j Scanning and CVE-2021-44228 Exploitation - Latest Observations (2021-12-16) ∗∗∗
---------------------------------------------
After our recent Special Report and blog post about vulnerable log4j servers, a quick and dirty update on the “log4shell” mass scanning and attempted CVE-2021-44228 exploitation activity we have been seeing across our global honeypot sensor network between Sunday December 11th and Thursday December 16th, including a quick analysis of the top ten Malware Callback URIs observed and server distribution.
---------------------------------------------
https://www.shadowserver.org/news/log4j-scanning-and-cve-2021-44228-exploit…
∗∗∗ How to Find and Fix a WordPress Pharma Hack ∗∗∗
---------------------------------------------
Did you know that one quarter of all spam emails are accredited to pharmaceutical ads? Pharma hacks go beyond the inbox and spam websites by redirecting traffic and adding fake keywords and subdomains to the search results. Why, and how did the medical world get tangled up in spam emails, SEO spam, redirects, and website spam injection? The answer is - money.
---------------------------------------------
https://blog.sucuri.net/2021/12/how-to-find-and-fix-a-wordpress-pharma-hack…
∗∗∗ SWITCH Security Report November/December 2021 ∗∗∗
---------------------------------------------
Dear Reader The latest issue of our bi-monthly SWITCH Security Report is available. The main topics of the current report are: GoldDust but no nuggets: seven REvil partners caught, but the real orchestrators are still out there / EasyHack? Data belonging to COVID-19 loan recipients stolen from EasyGov platform / Tor under siege: massive de-anonymisation attacks target Tor network [...]
---------------------------------------------
https://securityblog.switch.ch/2021/12/17/switch-security-report-2021-10-11/
∗∗∗ Kritische Lücke bedroht Desktop-Management-System VMware Workspace ONE UEM ∗∗∗
---------------------------------------------
Angreifer könnten auf Servern liegende Informationen einsehen. Dagegen abgesicherte Versionen von VMwares Management-Software sind erschienen.
---------------------------------------------
https://heise.de/-6297742
∗∗∗ CISA orders federal agencies to mitigate Log4J vulnerabilities in emergency directive ∗∗∗
---------------------------------------------
CISA had previously given civilian federal agencies until December 24 to apply any patches.
---------------------------------------------
https://www.zdnet.com/article/cisa-orders-federal-agencies-to-mitigate-log4…
∗∗∗ NSA and CISA Release Final Part IV of Guidance on Securing 5G Cloud Infrastructures ∗∗∗
---------------------------------------------
CISA has announced the joint National Security Agency (NSA) and CISA publication of the final of a four-part series, Security Guidance for 5G Cloud Infrastructures. Part IV: Ensure Integrity of Cloud Infrastructure focuses on platform integrity, microservices infrastructure integrity, launch time integrity, and build time security to ensure that 5G cloud resources are not modified without authorization.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/16/nsa-and-cisa-rele…
∗∗∗ Conti ransomware group adopts Log4Shell exploit ∗∗∗
---------------------------------------------
The Conti gang has become the first professional ransomware operation to adopt and incorporate the Log4Shell vulnerability in their daily operations.
---------------------------------------------
https://therecord.media/conti-ransomware-group-adopts-log4shell-exploit/
∗∗∗ Insides zu Irlands Health Service Executive Ransomware-Fall im Mai 2021 ∗∗∗
---------------------------------------------
Heute ist Türchen Nummer 17 im Sicherheits-Adventskalender dran. Ich habe da einen besonderen "Leckerbissen" für Administratoren hinterlegt. Im Mai 2021 gab es einen Ransomware-Angriff auf die Gesundheitsbehörden Irlands (Health Service Executive, HSE). PricewaterhouseCoopers hat kürzlich eine Analyse vorgelegt, was da [...]
---------------------------------------------
https://www.borncity.com/blog/2021/12/17/insides-zu-irlands-health-service-…
=====================
= Vulnerabilities =
=====================
∗∗∗ UNIVERGE DT Series vulnerable to missing encryption of sensitive data ∗∗∗
---------------------------------------------
UNIVERGE IP Phone DT Series and PC tools for DT Series maintainers (IP Phone Manager and Data Maintenance Tool) provided by NEC Platforms, Ltd. contain a missing encryption vulnerability.
---------------------------------------------
https://jvn.jp/en/jp/JVN13464252/
∗∗∗ An update on the Apache Log4j CVE-2021-44228 vulnerability ∗∗∗
---------------------------------------------
Update December 17, 11:37 am IBM is focused on the original CVE-2021-44228 as the prevalent risk, requiring our attention and our customers’ attention. With so much active industry research on Log4j, we will continually see mitigation and remediation recommendations. We continue to review the latest information and share updates accordingly.
---------------------------------------------
https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-4422…
∗∗∗ VMSA-2021-0028 ∗∗∗
---------------------------------------------
Revised advisory with updates to multiple products. In addition, added CVE-2021-45046 information and noted alignment with new Apache Software Foundation guidance.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0028.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel), Fedora (dr_libs, libsndfile, and podman), openSUSE (fetchmail, log4j, log4j12, logback, python3, and seamonkey), Oracle (go-toolset:ol8, idm:DL1, and nodejs:16), Red Hat (go-toolset-1.16 and go-toolset-1.16-golang, ipa, rh-postgresql12-postgresql, rh-postgresql13-postgresql, and samba), Slackware (xorg), SUSE (log4j, log4j12, and python3), and Ubuntu (apache-log4j2 and openjdk-8, openjdk-lts).
---------------------------------------------
https://lwn.net/Articles/879020/
∗∗∗ Xylem AquaView ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Use of Hard-coded Credentials vulnerability in the Xylem AquaView SCADA system.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-350-01
∗∗∗ Delta Electronics CNCSoft ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Out-of-bounds Read vulnerability in Delta Electronics CNCSoft industrial automation software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-350-02
∗∗∗ Wibu-Systems CodeMeter Runtime ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Privilege Management vulnerability in the Wibu-Systems CodeMeter Runtime server.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-350-03
∗∗∗ Mitsubishi Electric GX Works2 ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Handling of Length Parameter Inconsistency vulnerability in #Mitsubishi Electrics GX Works2 engineering software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-350-04
∗∗∗ Mitsubishi Electric FA Engineering Software ∗∗∗
---------------------------------------------
This advisory contains mitigations for Out-of-bounds Read, and Integer Underflow vulnerabilities in Mitsubishi Electrics FA Engineering Software engineering software.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-350-05
∗∗∗ Security Bulletin: Vulnerability in Apache Log4j affects IBM Spectrum Protect Plus (CVE-2021-44228) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-l…
∗∗∗ Security Bulletin: IBM MQ Blockchain bridge dependencies are vulnerable to an issue in Apache Log4j (CVE-2021-45046) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-blockchain-bridge-…
∗∗∗ Security Bulletin: Apache Log4J vulnerabilities affect IBM Cloud Object Storage File Access (CVE-2021-44228) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilit…
∗∗∗ K32171392: Apache Log4j2 vulnerability CVE-2021-45046 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K32171392
∗∗∗ Logback: Schwachstelle ermöglicht Codeausführung ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1295
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 15-12-2021 18:00 − Donnerstag 16-12-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Large-scale phishing study shows who bites the bait more often ∗∗∗
---------------------------------------------
A large-scale phishing study involving 14,733 participants over a 15-month experiment has produced some surprising findings that contradict previous research results that formed the basis for popular industry practices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/large-scale-phishing-study-s…
∗∗∗ Emotet starts dropping Cobalt Strike again for faster attacks ∗∗∗
---------------------------------------------
Right in time for the holidays, the notorious Emotet malware is once again directly installing Cobalt Strike beacons for rapid cyberattacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emotet-starts-dropping-cobal…
∗∗∗ Hive ransomware enters big league with hundreds breached in four months ∗∗∗
---------------------------------------------
The Hive ransomware gang is more active and aggressive than its leak site shows, with affiliates attacking an average of three companies every day since the operation became known in late June.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hive-ransomware-enters-big-l…
∗∗∗ A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution ∗∗∗
---------------------------------------------
Earlier this year, Citizen Lab managed to capture an NSO iMessage-based zero-click exploit being used to target a Saudi activist. In this two-part blog post series we will describe for the first time how an in-the-wild zero-click iMessage exploit works.
---------------------------------------------
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-cl…
∗∗∗ PseudoManuscrypt: a mass-scale spyware attack campaign ∗∗∗
---------------------------------------------
Kaspersky ICS CERT experts identified malware whose loader has some similarities to the Manuscrypt malware, which is part of the Lazarus APT group’s arsenal.
---------------------------------------------
https://securelist.com/pseudomanuscrypt-a-mass-scale-spyware-attack-campaig…
∗∗∗ 'DarkWatchman' RAT Shows Evolution in Fileless Malware ∗∗∗
---------------------------------------------
The new tool manipulates Windows Registry in unique ways to evade security detections and is likely being used by ransomware groups for initial network access.
---------------------------------------------
https://threatpost.com/darkwatchman-rat-evolution-fileless-malware/177091/
∗∗∗ How the "Contact Forms" campaign tricks people, (Thu, Dec 16th) ∗∗∗
---------------------------------------------
"Contact Forms" is a campaign that uses a web site's contact form to email malicious links disguised as some sort of legal complaint.
---------------------------------------------
https://isc.sans.edu/diary/rss/28142
∗∗∗ Log4j-Lücke: Erste Angriffe mit Ransomware und von staatlicher Akteuren ∗∗∗
---------------------------------------------
Die bisherigen Angriffsversuche waren wohl vor allem Tests. Doch jetzt wird es Ernst. Cybercrime und Geheimdienste nutzen die Lücke gezielt für ihre Zwecke.
---------------------------------------------
https://heise.de/-6296549
∗∗∗ When is a Scrape a Breach? ∗∗∗
---------------------------------------------
A decade and a bit ago during my tenure at Pfizer, a colleague's laptop containing information about customers, healthcare providers and other vendors was stolen from their car. It's not clear if the car was locked or not. Is this a data breach?
---------------------------------------------
https://www.troyhunt.com/when-is-a-scrape-a-breach/
∗∗∗ Achtung: giesswein-outdoor.de ist ein Fake-Shop! ∗∗∗
---------------------------------------------
Die Webseite giesswein-outdoor.de sieht auf den ersten Blick sehr seriös aus. Doch tatsächlich handelt es sich um einen Fake-Shop, der das österreichische Unternehmen Giesswein imitiert.
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-giesswein-outdoorde-ist-ein-…
∗∗∗ The dirty dozen of Latin America: From Amavaldo to Zumanek ∗∗∗
---------------------------------------------
The grand finale of our series dedicated to demystifying Latin American banking trojans.
---------------------------------------------
https://www.welivesecurity.com/2021/12/15/dirty-dozen-latin-america-amavald…
∗∗∗ Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware ∗∗∗
---------------------------------------------
New ransomware used in mid-November attack, ConnectWise was likely infection vector.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/no…
∗∗∗ Phorpiex botnet is back with a new Twizt: Hijacking Hundreds of crypto transactions ∗∗∗
---------------------------------------------
Check Point Research (CPR) spots a botnet variant that has stolen nearly half a million dollars’ worth of cryptocurrency through a technique called “crypto clipping”. The new variant, named Twizt and a descendant of Phorpiex, steals cryptocurrency during transactions by automatically substituting the intended wallet address with the threat actor’s wallet address.
---------------------------------------------
https://blog.checkpoint.com/2021/12/16/phorpiex-botnet-is-back-with-a-new-t…
=====================
= Vulnerabilities =
=====================
∗∗∗ Lenovo laptops vulnerable to bug allowing admin privileges ∗∗∗
---------------------------------------------
Lenovo laptops, including ThinkPad and Yoga models, are vulnerable to a privilege elevation bug in the ImControllerService service allowing attackers to execute commands with admin privileges.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/lenovo-laptops-vulnerable-to…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (apache-log4j2 and mediawiki), Fedora (libmysofa, libolm, and vim), Oracle (httpd), Red Hat (go-toolset:rhel8), and Ubuntu (apache-log4j2 and mumble).
---------------------------------------------
https://lwn.net/Articles/878844/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ SSA-714170: Apache Log4j Vulnerabilities (Log4Shell, CVE-2021-44228, CVE-2021-45046) - Impact to SPPA-T3000 ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/txt/ssa-714170.txt
∗∗∗ TYPO3-PSA-2021-004: Statement on Recent log4j/log4shell Vulnerabilities (CVE-2021-44228) ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2021-004
∗∗∗ TYPO3-PSA-2021-003: Mitigation of Cache Poisoning Caused by Untrusted URL Query Parameters ∗∗∗
---------------------------------------------
https://typo3.org/security/advisory/typo3-psa-2021-003
∗∗∗ MediaWiki: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-1290
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 14-12-2021 18:00 − Mittwoch 15-12-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New ransomware now being deployed in Log4Shell attacks ∗∗∗
---------------------------------------------
The first public case of the Log4j Log4Shell vulnerability used to download and install ransomware has been discovered by researchers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-ransomware-now-being-dep…
∗∗∗ Simple but Undetected PowerShell Backdoor, (Wed, Dec 15th) ∗∗∗
---------------------------------------------
For a while, most security people agree on the fact that antivirus products are not enough for effective protection against malicious code. If they can block many threats, some of them remain undetected by classic technologies. Here is another example with a simple but effective PowerShell backdoor that I spotted yesterday.
---------------------------------------------
https://isc.sans.edu/diary/rss/28138
∗∗∗ GitHubs Antwort auf die kritische Log4j-Lücke ∗∗∗
---------------------------------------------
Zu der kritischen Sicherheitslücke im Log4j-Logging-Framework hat der Code-Hoster Sicherheitshinweise veröffentlicht. Ein Update auf Log4j 2.16 schafft Abhilfe.
---------------------------------------------
https://heise.de/-6294120
∗∗∗ Patchday: Kritische Sicherheitslücken in SAP-Geschäftssoftware ∗∗∗
---------------------------------------------
15 Sicherheitslücken melden die Walldorfer zum Dezember-Patchday in ihrer Business-Software. Viele schätzt SAP als hohes oder gar kritisches Risiko ein.
---------------------------------------------
https://heise.de/-6294773
∗∗∗ Patchday: Adobe schließt kritische Lücken in Experience Manager & Co. ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für verschiedene Anwendungen von Adobe. In einigen Fällen könnten Angreifer Schadcode auf Computern ausführen.
---------------------------------------------
https://heise.de/-6295316
∗∗∗ Patchday: Sechs Windows-Lücken öffentlich bekannt, durch eine schlüpft Emotet ∗∗∗
---------------------------------------------
Microsoft schließt zahlreiche Sicherheitslücken in beispielsweise Azure, Office und Windows. Darunter sind auch als kritisch eingestufte Lücken.
---------------------------------------------
https://heise.de/-6295264
∗∗∗ Neue Probleme - Log4j-Patch genügt nicht ∗∗∗
---------------------------------------------
Version 2.15.0 von Log4j sollte die Log4Shell-Sicherheitslücke schließen. Das reichte jedoch nicht. Log4j 2.16.0 behebt nun noch eine weitere Schwachstelle.
---------------------------------------------
https://heise.de/-6295343
∗∗∗ Immediate Steps to Strengthen Critical Infrastructure against Potential Cyberattacks ∗∗∗
---------------------------------------------
CISA has released CISA Insights: Preparing For and Mitigating Potential Cyber Threats to provide critical infrastructure leaders with steps to proactively strengthen their organization’s operational resiliency against sophisticated threat
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/15/immediate-steps-s…
∗∗∗ No Unaccompanied Miners: Supply Chain Compromises Through Node.js Packages ∗∗∗
---------------------------------------------
NPM modules are a valuable target for threat actors due to their popularity amongst developers. They also have a high prevalence of complex dependencies, where one package installs another as a dependency often without the knowledge of the developer.
---------------------------------------------
https://www.mandiant.com/resources/supply-chain-node-js
=====================
= Vulnerabilities =
=====================
∗∗∗ Log4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046) ∗∗∗
---------------------------------------------
After the log4j maintainers released version 2.15.0 to address the Log4Shell vulnerability, an additional attack vector was identified and reported in CVE-2021-45046.
---------------------------------------------
https://www.lunasec.io/docs/blog/log4j-zero-day-update-on-cve-2021-45046/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
Apache Log4J information, WebSphere Application Server, i2 Analyze, i2 Connect, Analyst’s Notebook Premium, Security Access Manager, Security Verify Access, App Connect, Integration Bus, QRadar SIEM Application Framework, Sterling File Gateway, Cloud Transformation Advisor, MQ Blockchain bridge, WebSphere Cast Iron, Power System, Rational Asset Analyzer, Disconnected Log Collector, SPSS Statistics, Power HMC
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Intel Product Advisory for Apache Log4j2 Vulnerabilities (CVE-2021-44228 & CVE-2021-45046) ∗∗∗
---------------------------------------------
Security vulnerabilities in Apache Log4j2 for some Intel® products may allow escalation of privilege or denial of service.
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ Apache log4j vulnerabilities (Log4Shell) – impact on ABB products ∗∗∗
---------------------------------------------
ABB is still investigating the potentially affected products and to date ABB has identified the following products which are likely affected by the vulnerabilities in log4j (ABB products not listed are initially evaluated as not impacted).
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&Language…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (libopenmpt), openSUSE (icu.691, log4j, nim, postgresql10, and xorg-x11-server), Red Hat (idm:DL1), SUSE (gettext-runtime, icu.691, runc, storm, storm-kit, and xorg-x11-server), and Ubuntu (xorg-server, xorg-server-hwe-18.04, xwayland).
---------------------------------------------
https://lwn.net/Articles/878749/
∗∗∗ Security Advisory - Intel Microarchitectural Data Sampling (MDS) vulnerabilities ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20190712-…
∗∗∗ Security Advisory - Apache log4j2 remote code execution vulnerability in some Huawei products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20211215-…
∗∗∗ Zoom Video Communications Zoom Client: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-1277
∗∗∗ OpenSSL: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-1282
∗∗∗ Authentication Bypass Vulnerabilities in FPC2 and SMM Firmware ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500458-AUTHENTICATION-BYPASS-V…
∗∗∗ Lenovo Vantage Component Vulnerabilities ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500461-LENOVO-VANTAGE-COMPONEN…
∗∗∗ TLB Poisoning Attacks on AMD Secure Encrypted Virtualization (SEV) ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500459-TLB-POISONING-ATTACKS-O…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 10-12-2021 18:00 − Montag 13-12-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Schutz vor Log4j-Lücke – was hilft jetzt und was eher nicht ∗∗∗
---------------------------------------------
"Warnstufe Rot" für Anwender und Firmen, doch was bedeutet das konkret? So testen Sie Dienste auf die Log4j-Lücke und reduzieren ihr Risiko vor Angriffen.
---------------------------------------------
https://heise.de/-6292961
∗∗∗ log4j-scan ∗∗∗
---------------------------------------------
We have been researching the Log4J RCE (CVE-2021-44228) since it was released, and we worked in preventing this vulnerability with our customers. We are open-sourcing an open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability.
---------------------------------------------
https://github.com/fullhunt/log4j-scan
∗∗∗ Ten families of malicious samples are spreading using the Log4j2 vulnerability Now ∗∗∗
---------------------------------------------
On December 11, 2021, at 8:00 pm, we published a blog disclosing Mirai and Muhstik botnet samples propagating through Log4j2 RCE vulnerability[1]. Over the past 2 days, we have captured samples from other families, and now the list of families has exceeded 10.
---------------------------------------------
https://blog.netlab.360.com/ten-families-of-malicious-samples-are-spreading…
∗∗∗ log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228 ∗∗∗
---------------------------------------------
tl;dr Run add our new tool, -javaagent:log4j-jndi-be-gone-1.0.0-standalone.jar to all of your JVM Java stuff to stop log4j from loading classes remotely over LDAP. This will prevent malicious inputs from triggering the “Log4Shell” vulnerability and gaining remote code execution on your systems. In this post, we first offer some context on the vulnerability, the released fixes [...]
---------------------------------------------
https://research.nccgroup.com/2021/12/12/log4j-jndi-be-gone-a-simple-mitiga…
∗∗∗ Malicious PyPI packages with over 10,000 downloads taken down ∗∗∗
---------------------------------------------
The Python Package Index (PyPI) registry has removed three malicious Python packages aimed at exfiltrating environment variables and dropping trojans on the infected machines. These malicious packages are estimated to have generated over 10,000 downloads and mirrors put together, according to the researchers report.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-with…
∗∗∗ Karakurt: A New Emerging Data Theft and Cyber Extortion Hacking Group ∗∗∗
---------------------------------------------
A previously undocumented, financially motivated threat group has been connected to a string of data theft and extortion attacks on over 40 entities between September and November 2021. The hacker collective, which goes by the self-proclaimed name Karakurt and was first identified in June 2021, is capable of modifying its tactics and techniques to adapt to the targeted environment, [...]
---------------------------------------------
https://thehackernews.com/2021/12/karakurt-new-emerging-data-theft-and.html
∗∗∗ HANCITOR DOC drops via CLIPBOARD ∗∗∗
---------------------------------------------
Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as FickerStealer, Pony, CobaltStrike, Cuba Ransomware, and many more. Recently at McAfee Labs, we observed Hancitor Doc VBA (Visual Basic for Applications) samples dropping the payload using the Windows clipboard through Selection.Copy method.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/hancitor-doc-drops-via…
∗∗∗ Diavol Ransomware ∗∗∗
---------------------------------------------
In the past, threat actors have used BazarLoader to deploy Ryuk and Conti ransomware, as reported on many occasions. In this intrusion, however, a BazarLoader infection resulted in deployment of Diavol Ransomware.
---------------------------------------------
https://thedfirreport.com/2021/12/13/diavol-ransomware/
∗∗∗ Bugs in the Cloud: How One Vulnerability Exposed 'Offline' Devices to a Security Risk ∗∗∗
---------------------------------------------
The post Bugs in the Cloud: How One Vulnerability Exposed ‘Offline’ Devices to a Security Risk appeared first on Claroty.
---------------------------------------------
https://claroty.com/2021/12/13/blog-research-bugs-in-the-cloud-how-one-vuln…
∗∗∗ Von wegen Darknet – Ransomware-Gangs setzen Opfer per Social Media unter Druck ∗∗∗
---------------------------------------------
Ransomware-Gruppen nutzen soziale Netzwerkkanäle, um ihre Angriffe zu bewerben und damit ihre Opfer weiter zur Lösegeldzahlung unter Druck zu setzen.
---------------------------------------------
https://blog.emsisoft.com/de/39431/von-wegen-darknet-ransomware-gangs-setze…
∗∗∗ Now You Serial, Now You Don't — Systematically Hunting for Deserialization Exploits ∗∗∗
---------------------------------------------
Deserialization vulnerabilities are a class of bugs that have plagued multiple languages and applications over the years. These include Exchange (CVE-2021-42321), Zoho ManageEngine (CVE-2020-10189), Jira (CVE-2020-36239), Telerik (CVE-2019-18935), Jenkins (CVE-2016-9299), and more. Fundamentally, these bugs are a result of applications placing too much trust in data that a user (or attacker) can tamper with.
---------------------------------------------
https://www.mandiant.com/resources/hunting-deserialization-exploits
=====================
= Vulnerabilities =
=====================
∗∗∗ Log4j Vulnerability (CVE-2021-44228) ∗∗∗
---------------------------------------------
This repo contains operational information regarding the vulnerability in the Log4j logging library (CVE-2021-44228).
---------------------------------------------
https://github.com/NCSC-NL/log4shell
∗∗∗ VMSA-2021-0028 ∗∗∗
---------------------------------------------
[...] Synopsis: VMware Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0028.html
∗∗∗ Log4j Zero-Day Vulnerability ∗∗∗
---------------------------------------------
IBM X-Force Incident Command is following a recent disclosure regarding a vulnerability in the in the Log4j Java library. A report by LunaSec details the vulnerability as well as mitigation strategies for the vulnerability.
---------------------------------------------
https://exchange.xforce.ibmcloud.com/collection/4daa3df4f73a51590efced7fb90…
∗∗∗ Bugs in billions of WiFi, Bluetooth chips allow password, data theft ∗∗∗
---------------------------------------------
Researchers at the University of Darmstadt, Brescia, CNIT, and the Secure Mobile Networking Lab, have published a paper that proves its possible to extract passwords and manipulate traffic on a WiFi chip by targeting a devices Bluetooth component.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/bugs-in-billions-of-wifi-blu…
∗∗∗ IBM Security Bulletins 2021-12-10 - 2021-13 ∗∗∗
---------------------------------------------
WebSphere Application Server, Rational Application Developer for WebSphere, Spectrum Copy Data Management, Tivoli Netcool, Spectrum Protect, i2 Analystss Notebook, Decision Optimization Center, ILOG CPLEX Optimization Studio, PowerVM, Db2
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (chromium, firefox, gitlab, grafana, grafana-agent, thunderbird, and vivaldi), Debian (apache-log4j2, privoxy, and wireshark), Fedora (firefox, grub2, mariadb, mod_auth_openidc, rust-drg, rust-tiny_http, and rust-tiny_http0.6), Mageia (chromium-browser-stable, curaengine, fetchmail, firefox, libvirt, log4j, opencontainers-runc, python-django, speex, and thunderbird), openSUSE (clamav, firefox, glib-networking, glibc, gmp, ImageMagick, log4j, [...]
---------------------------------------------
https://lwn.net/Articles/878520/
∗∗∗ CISA Adds Thirteen Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CISA has added thirteen new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/10/cisa-adds-thirtee…
∗∗∗ Oracle Security Alert for CVE-2021-44228 - 10 December 2021 ∗∗∗
---------------------------------------------
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
∗∗∗ Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Citrix Security Advisory for Apache CVE-2021-44228 ∗∗∗
---------------------------------------------
https://support.citrix.com/article/CTX335705
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 09-12-2021 18:00 − Freitag 10-12-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Kritische Zero-Day-Lücke in Log4j gefährdet zahlreiche Server und Apps ∗∗∗
---------------------------------------------
Eine Zero-Day-Schwachstelle in Apaches Log4j ermöglicht Angreifern, etwa auf Servern von Cloud-Diensten oder in Anwendungen Schadcode einzuschmuggeln.
---------------------------------------------
https://heise.de/-6291653
∗∗∗ Dark Mirai botnet targeting RCE on popular TP-Link router ∗∗∗
---------------------------------------------
The botnet known as Dark Mirai (aka MANGA) has been observed exploiting a new vulnerability on the TP-Link TL-WR840N EU V5, a popular inexpensive home router released in 2017.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/dark-mirai-botnet-targeting-…
∗∗∗ Python Shellcode Injection From JSON Data, (Fri, Dec 10th) ∗∗∗
---------------------------------------------
My hunting rules detected a niece piece of Python code. It's interesting to see how the code is simple, not deeply obfuscated, and with a very low VT score: 2/56![1]. I see more and more malicious Python code targeting the Windows environments. Thanks to the library ctypes[2], Python is able to use any native API calls provided by DLLs.
---------------------------------------------
https://isc.sans.edu/diary/rss/28118
∗∗∗ Click "OK" to defeat MFA ∗∗∗
---------------------------------------------
A sophisticated threat actor has been using a very unsophisticated method to defeat multi-factor authentication.
---------------------------------------------
https://blog.malwarebytes.com/reports/2021/12/click-ok-to-defeat-mfa/
∗∗∗ 1.6 Million WordPress Sites Hit With 13.7 Million Attacks In 36 Hours From 16,000 IPs ∗∗∗
---------------------------------------------
Today, on December 9, 2021, our Threat Intelligence team noticed a drastic uptick in attacks targeting vulnerabilities that make it possible for attackers to update arbitrary options on vulnerable sites. This led us into an investigation which uncovered an active attack targeting over a million WordPress sites.
---------------------------------------------
https://www.wordfence.com/blog/2021/12/massive-wordpress-attack-campaign/
∗∗∗ Winterurlaub geplant? Buchen Sie nicht über dein-berghuettenurlaub.de! ∗∗∗
---------------------------------------------
Bald ist der Lockdown in Österreich vorbei. Dementsprechend freuen sich wohl schon einige auf eine Auszeit über Weihnachten oder Silvester. Was wäre aufgrund der aktuellen Corona-Lage besser geeignet als eine einsame Hütte? Doch Vorsicht, wer online eine solche Hütte buchen will, könnte auf betrügerische Seiten stoßen!
---------------------------------------------
https://www.watchlist-internet.at/news/winterurlaub-geplant-buchen-sie-nich…
∗∗∗ This old malware has just picked up some nasty new tricks ∗∗∗
---------------------------------------------
The crafty Qakbot trojan has added ransomware delivery to its malware building blocks.
---------------------------------------------
https://www.zdnet.com/article/this-decade-old-malware-has-picked-up-some-na…
∗∗∗ Microsoft launches center for reporting malicious drivers ∗∗∗
---------------------------------------------
Microsoft has launched this week a special web portal where users and researchers can report malicious drivers to the companys security team.
---------------------------------------------
https://therecord.media/microsoft-launches-center-for-reporting-malicious-d…
∗∗∗ Twitter-Thread zur log4j-Schwachstelle ∗∗∗
---------------------------------------------
https://twitter.com/TimPhSchaefers/status/1469271197993115655
=====================
= Vulnerabilities =
=====================
∗∗∗ RCE in log4j, Log4Shell, or how things can get bad quickly, (Fri, Dec 10th) ∗∗∗
---------------------------------------------
If you have been following developments on Twitter and various other security sources, by now you have undoubtedly heard about the latest vulnerability in the very popular Apache log4j library.
---------------------------------------------
https://isc.sans.edu/diary/rss/28120
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (python-babel), Fedora (golang-github-opencontainers-image-spec and libmysofa), openSUSE (hiredis), Oracle (firefox and thunderbird), Red Hat (thunderbird and virt:8.2 and virt-devel:8.2), Scientific Linux (thunderbird), SUSE (kernel-rt and xen), and Ubuntu (firefox).
---------------------------------------------
https://lwn.net/Articles/878279/
∗∗∗ WD Updates SanDisk SecureAccess to Prevent Dictionary, Brute Force Attacks ∗∗∗
---------------------------------------------
Western Digital has updated its SanDisk SecureAccess product to address vulnerabilities that can be exploited to gain access to user data through brute force and dictionary attacks.
---------------------------------------------
https://www.securityweek.com/wd-updates-sandisk-secureaccess-prevent-dictio…
∗∗∗ Cisco Releases Security Advisory for Multiple Products Affected by Apache HTTP Server Vulnerabilities ∗∗∗
---------------------------------------------
Cisco has released a security advisory to address Cisco products affected by multiple vulnerabilities in Apache HTTP Server 2.4.48 and earlier releases. An unauthenticated remote attacker could exploit this vulnerability to take control of an affected system.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/09/cisco-releases-se…
∗∗∗ Schwachstellen in Oracle-Datenbankservern (SYSS-2021-061/-062) ∗∗∗
---------------------------------------------
In Oracle-Datenbankservern wurden Schwachstellen identifiziert. Sie erlauben es Angreifern, Zugang zur Datenbank von legitimen Benutzern zu erhalten.
---------------------------------------------
https://www.syss.de/pentest-blog/syss-2021-061/syss-2021-062
∗∗∗ TR-65 - Vulnerabilities and Exploitation of Log4j (Remote code injection in Log4j) ∗∗∗
---------------------------------------------
CVE-2021-44228 vulnerability enables remote code injection on systems running Log4j. The attacker has to trigger a log entry generation containing a JNDI request. The vulnerability can be exploited without authentication. The exploit needs to be processed by Log4j. Impacted Log4j versions are: 2.0 to 2.14.1.
---------------------------------------------
https://www.circl.lu/pub/tr-65
∗∗∗ Trend Micro Produkte: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1266
∗∗∗ Security Bulletin: IBM® Db2® could allow a local user elevated privileges due to allowing modification of columns of existing tasks (CVE-2021-38926) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-could-allow-a-loc…
∗∗∗ Security Bulletin: IBM App Connect Enterprise v11 is affected by vulnerabilities in Node.js (CVE-2021-23358) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: Vulnerabilities in Node.js, IBM WebSphere Application Server Liberty, and OpenSSL affect IBM Spectrum Control ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (Dec. 2021 V1) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM® Db2® may be vulnerable to an Information Disclosure when using the LOAD utility as under certain circumstances the LOAD utility does not enforce directory restrictions. (CVE-2021-20373) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-may-be-vulnerable…
∗∗∗ Security Bulletin: IBM® Db2® is vulnerable to an information disclosure as it uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. (CVE-2021-39002) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-is-vulnerable-to-…
∗∗∗ Security Bulletin: The PowerVM hypervisor is vulnerable to a carefully crafted IBMi hypervisor call that can lead to a system crash ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-the-powervm-hypervisor-is…
∗∗∗ Security Bulletin: IBM® Db2® is vulnerable to an Information Disclosure as a user with DBADM authority is able to access other databases and read or modify files (CVE-2021-29678) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-is-vulnerable-to-…
∗∗∗ Security Bulletin: The PowerVM hypervisor can allow an attacker that gains service access to the FSP to read and write system memory ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-the-powervm-hypervisor-ca…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 07-12-2021 18:00 − Donnerstag 09-12-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malicious NPM packages are part of a malware “barrage” hitting repositories ∗∗∗
---------------------------------------------
Peoples trust in repositories make them the perfect vectors for malware.
---------------------------------------------
https://arstechnica.com/?p=1818997
∗∗∗ New Cerber ransomware targets Confluence and GitLab servers ∗∗∗
---------------------------------------------
Cerber ransomware is back, as a new ransomware family adopts the old name and targets Atlassian Confluence and GitLab servers using remote code execution vulnerabilities.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-cerber-ransomware-target…
∗∗∗ Grafana fixes zero-day vulnerability after exploits spread over Twitter ∗∗∗
---------------------------------------------
Open-source analytics and interactive visualization solution Grafana received an emergency update today to fix a high-severity, zero-day vulnerability that enabled remote access to local files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/grafana-fixes-zero-day-vulne…
∗∗∗ Emotet now drops Cobalt Strike, fast forwards ransomware attacks ∗∗∗
---------------------------------------------
In a concerning development, the notorious Emotet malware now installs Cobalt Strike beacons directly, giving immediate network access to threat actors and making ransomware attacks imminent.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emotet-now-drops-cobalt-stri…
∗∗∗ The life cycle of phishing pages ∗∗∗
---------------------------------------------
Weve analyzed the life cycle of phishing pages, how they transform during their active period, and the domains where they're located.
---------------------------------------------
https://securelist.com/phishing-page-life-cycle/105171/
∗∗∗ Moobot Botnet Chews Up Hikvision Surveillance Systems ∗∗∗
---------------------------------------------
Attackers are milking unpatched Hikvision video systems to drop a DDoS botnet, researchers warned.
---------------------------------------------
https://threatpost.com/moobot-botnet-hikvision-surveillance-systems/176879/
∗∗∗ PHP Re-Infectors – The Malware that Keeps On Giving ∗∗∗
---------------------------------------------
Attackers have developed some methods for protecting their work as we will explore in this post. We will also look at how you can remove this infection from a compromised website.
---------------------------------------------
https://blog.sucuri.net/2021/12/php-re-infectors-the-malware-that-keeps-on-…
∗∗∗ Over 300,000 MikroTik Devices Found Vulnerable to Remote Hacking Bugs ∗∗∗
---------------------------------------------
At least 300,000 IP addresses associated with MikroTik devices have been found vulnerable to multiple remotely exploitable security vulnerabilities that have since been patched by the popular supplier of routers and wireless ISP devices.
---------------------------------------------
https://thehackernews.com/2021/12/over-300000-mikrotik-devices-found.html
∗∗∗ Microsoft and GitHub OAuth Implementation Vulnerabilities Lead to Redirection Attacks ∗∗∗
---------------------------------------------
Vulnerabilities in Microsoft and others’ popular OAuth2.0 implementations lead to redirection attacks that bypass most phishing detection solutions and email security solutions.
---------------------------------------------
https://www.proofpoint.com/us/blog/cloud-security/microsoft-and-github-oaut…
∗∗∗ Virtualisiertes USB als Sicherheitslücke ∗∗∗
---------------------------------------------
USB+Cloud=Gefahr. Lücken in USB-über-Ethernet-Treibern für Clouddienste erlauben Angreifern, lokal und serverseitig beliebigen Code im Kernel-Modus auszuführen.
---------------------------------------------
https://heise.de/-6289521
∗∗∗ Is your web browser vulnerable to data theft? XS-Leak explained ∗∗∗
---------------------------------------------
IT security researchers recently exposed new cross-site leak (XS-Leak) attacks against modern-day browsers. But what is XS-Leak anyway?
---------------------------------------------
https://blog.malwarebytes.com/explained/2021/12/is-your-web-browser-vulnera…
∗∗∗ Was threat actor KAX17 de-anonymizing the Tor network? ∗∗∗
---------------------------------------------
A threat actor was found to be running a high percentage of the Tor Networks servers.
---------------------------------------------
https://blog.malwarebytes.com/reports/2021/12/was-threat-actor-kax17-de-ano…
∗∗∗ Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering ∗∗∗
---------------------------------------------
Patient zero web threats are malicious URLs that are being seen for the first time. We discuss how to stop them despite attacker cloaking techniques.
---------------------------------------------
https://unit42.paloaltonetworks.com/patient-zero-web-threats/
∗∗∗ CISA Releases Guidance on Protecting Organization-Run Social Media Accounts ∗∗∗
---------------------------------------------
CISA has released Capability Enhancement Guide (CEG): Social Media Account Protection, which details ways to protect the security of organization-run social media accounts.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/12/09/cisa-releases-gui…
∗∗∗ Two Birds with One Stone: An Introduction to V8 and JIT Exploitation ∗∗∗
---------------------------------------------
In this special blog series, ZDI Vulnerability Researcher Hossein Lotfi looks at the exploitation of V8 – Google’s open-source high-performance JavaScript and WebAssembly engine – through the lens of a bug used during Pwn2Own Vancouver 2021.
---------------------------------------------
https://www.thezdi.com/blog/2021/12/6/two-birds-with-one-stone-an-introduct…
∗∗∗ Kernel Karnage – Part 6 (Last Call) ∗∗∗
---------------------------------------------
Having covered process, thread and image callbacks in the previous blogposts, I think it’s only fair if we conclude this topic with registry and object callbacks.
---------------------------------------------
https://blog.nviso.eu/2021/12/09/kernel-karnage-part-6-last-call/
=====================
= Vulnerabilities =
=====================
∗∗∗ SanDisk SecureAccess bug allows brute forcing vault passwords ∗∗∗
---------------------------------------------
Western Digital has fixed a security vulnerability that enabled attackers to brute force SanDisk SecureAccess passwords and access the users protected files.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/sandisk-secureaccess-bug-all…
∗∗∗ IBM Security Bulletins 2021-12-07 and 2021-12-08 ∗∗∗
---------------------------------------------
DB2, WebSphere Application Server, Tivoli Business Service Manager, PowerHA, Guardium Data Encryption, Watson Speech Services, Process Designer, Business Automation Workflow
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Jetzt patchen! Root-Lücke in Fernzugrifflösung SMA 100 von Sonicwall ∗∗∗
---------------------------------------------
Sicherheitsupdates schließen unter anderem kritische Schwachstellen in Secure-Mobile-Access-Appliances.
---------------------------------------------
https://heise.de/-6290012
∗∗∗ FortiOS- und FortiProxy-Updates schließen Sicherheitslücken, Check empfohlen ∗∗∗
---------------------------------------------
Fortinet ist auf ein unterwandertes System gestoßen und empfiehlt Administratoren die Überprüfung auf Einbruchsspuren. Zudem stehen Aktualisierungen bereit.
---------------------------------------------
https://heise.de/-6290546
∗∗∗ LibreOffice zieht Update wegen kritischer Schwachstelle vor ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in der NSS-Bibliothek betrifft auch LibreOffice und ermöglicht das Unterschieben von Schadcode. Updates zur Absicherung stehen bereit.
---------------------------------------------
https://heise.de/-6290069
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (nss), Fedora (rubygem-rmagick), openSUSE (xen), Red Hat (firefox and nss), SUSE (kernel and xen), and Ubuntu (mailman and nss).
---------------------------------------------
https://lwn.net/Articles/878038/
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (firefox, libopenmpt, matrix-synapse, vim, and xen), Mageia (gmp, heimdal, libsndfile, nginx/vsftpd, openjdk, sharpziplib/mono-tools, and vim), Red Hat (java-1.8.0-ibm), Scientific Linux (firefox), SUSE (kernel-rt), and Ubuntu (bluez).
---------------------------------------------
https://lwn.net/Articles/878142/
∗∗∗ Bentley BE-2021-0005: Out-of-bounds and use-after-free vulnerabilities in Bentley MicroStation and Bentley View ∗∗∗
---------------------------------------------
https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
∗∗∗ Helmholz: Remote user enumeration in myREX24/myREX24-virtual ∗∗∗
---------------------------------------------
http://cert.vde.com/de/advisories/VDE-2021-058/
∗∗∗ Helmholz: Privilege Escalation in shDialup ∗∗∗
---------------------------------------------
http://cert.vde.com/de/advisories/VDE-2021-057/
∗∗∗ Hitachi Energy RTU500 OpenLDAP ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-341-01
∗∗∗ Hitachi Energy XMC20 and FOX61x ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-341-02
∗∗∗ FANUC Robot Controllers ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-243-02
∗∗∗ Hillrom Welch Allyn Cardio Products ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-21-343-01
∗∗∗ Hitachi Energy GMS600, PWC600, and Relion ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-343-01
∗∗∗ WECON LeviStudioU ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-343-02
∗∗∗ Multiple Vulnerabilities in Bosch BT software products ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-043434-bt.html
∗∗∗ Stack Buffer Overflow Vulnerability in Surveillance Station ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-46
∗∗∗ Reflected XSS Vulnerability in Kazoo Server ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-54
∗∗∗ Improper Authentication Vulnerability in Qfile ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-21-55
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 06-12-2021 18:00 − Dienstag 07-12-2021 18:00
Handler: Robert Waldner
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Code-Schmuggel-Sicherheitslücke in Windows nur halbherzig geschlossen ∗∗∗
---------------------------------------------
Eine Lücke in Windows, die bösartige Webseiten zum Ausführen von Schadcode missbrauchen könnte, lässt sich trotz Update noch eingeschränkt missbrauchen.
---------------------------------------------
https://heise.de/-6288402
∗∗∗ Achtung: Jobangebote von „ab-group.info“ & „mctrl-marktforschung.com“ sind Fake ∗∗∗
---------------------------------------------
Homeoffice, flexible Arbeitszeiten, frei wählbare Anstellungsverhältnisse und obendrein gut bezahlt. Das versprechen Marktforschungsagenturen wie „ab-group.info“ & „mctrl-marktforschung.com“. Doch Vorsicht: Dabei handelt es sich um betrügerische Jobangebote. Interessierte übermitteln bei einer Bewerbung persönliche Daten sowie Ausweiskopien an Kriminelle. Im schlimmsten Fall werden im eigenen Namen Bankkonten für Kriminelle eröffnet!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-jobangebote-von-ab-groupinfo…
∗∗∗ STOP Ransomware vaccine released to block encryption ∗∗∗
---------------------------------------------
German security software company G DATA has released a vaccine that will block STOP Ransomware from encrypting victims files after infection.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/stop-ransomware-vaccine-rele…
∗∗∗ Apache Kafka Cloud Clusters Expose Sensitive Data for Large Companies ∗∗∗
---------------------------------------------
The culprit is misconfigured Kafdrop interfaces, used for centralized management of the open-source platform.
---------------------------------------------
https://threatpost.com/apache-kafka-cloud-clusters-expose-data/176778/
∗∗∗ WooCommerce Credit Card Swiper Injected Into Random Plugin Files ∗∗∗
---------------------------------------------
It’s that time of year again! While website owners always need to be on guard, the holidays season is when online scams and credit card theft are most rampant. Administrators of ecommerce websites need to be extra vigilant as this case will demonstrate.
---------------------------------------------
https://blog.sucuri.net/2021/12/woocommerce-credit-card-swiper-injected-int…
∗∗∗ Cryptominers arent just a headache – theyre a big neon sign that Bad Things are on your network ∗∗∗
---------------------------------------------
So says Sophos in warning about Tor2Mine Monero malware Cryptominer malware removal is a routine piece of the cybersecurity landscape these days. Yet if criminals are hijacking your compute cycles to mine cryptocurrencies, chances are theres something worse lurking on your network too.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2021/12/07/sophos_tor2m…
∗∗∗ Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm ∗∗∗
---------------------------------------------
Author: Margit Hazenbroek tl;dr An approach to detecting suspicious TLS certificates using an incremental anomaly detection model is discussed. This model utilizes the Half-Space-Trees algorithm and provides our security operations teams (SOC) with the opportunity to detect suspicious behavior, in real-time, even when network traffic is encrypted.
---------------------------------------------
https://blog.fox-it.com/2021/12/07/encryption-does-not-equal-invisibility-d…
∗∗∗ XE Group – Exposed: 8 Years of Hacking & Card Skimming for Profit ∗∗∗
---------------------------------------------
In 2020 and 2021, Volexity identified multiple compromises related to a relatively unknown criminal threat actor that refers to itself as "XE Group". Volexity believes that XE Group is likely a Vietnamese-origin criminal threat actor whose intrusions follow an approximate pattern: Compromise of externally facing services via known exploits (e.g., Telerik UI vulnerabilities) Monetization of these compromises through installation of password theft or credit card skimming code for web [...]
---------------------------------------------
https://www.volexity.com/blog/2021/12/07/xe-group-exposed-8-years-of-hackin…
=====================
= Vulnerabilities =
=====================
∗∗∗ Angreifer attackieren PC-Management-Software Zoho ManageEngine Desktop Central ∗∗∗
---------------------------------------------
Nur die neusten Versionen schützen die Software. Zoho rät zu zügigen Updates.
---------------------------------------------
https://heise.de/-6287937
∗∗∗ 27 flaws in USB-over-network SDK affect millions of cloud users ∗∗∗
---------------------------------------------
Researchers have discovered 27 vulnerabilities in Eltima SDK, a library used by numerous cloud providers to remotely mount a local USB device.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/27-flaws-in-usb-over-network…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (nss), Debian (roundcube and runc), openSUSE (aaa_base, brotli, clamav, glib-networking, gmp, go1.16, hiredis, kernel, mozilla-nss, nodejs12, nodejs14, openexr, openssh, php7, python-Babel, ruby2.5, speex, wireshark, and xen), Oracle (kernel and nss), Red Hat (kpatch-patch, nss, rpm, and thunderbird), SUSE (brotli, clamav, glib-networking, gmp, kernel, mariadb, mozilla-nss, nodejs12, nodejs14, openssh, php7, python-Babel, and wireshark), and Ubuntu [...]
---------------------------------------------
https://lwn.net/Articles/877945/
∗∗∗ QNAP NAS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1252
∗∗∗ Google Android: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-1251
∗∗∗ Security Bulletin: Multiple vulnerabilities in Redis affecting the IBM Event Streams UI ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in IBM Event Streams through Apache Kafka key/password validation (CVE-2021-38153) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-even…
∗∗∗ Security Bulletin: IBM Event Streams affected by multiple vulnerabilities in the Java runtime ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-event-streams-affecte…
∗∗∗ Security Bulletin: A vulnerability in Samba affects IBM Spectrum Scale SMB protocol access method (CVE-2021-20254) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-samba-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in Mozilla Firefox affect IBM Cloud Pak for Multicloud Management Monitoring ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities affect IBM HTTP Server (powered by Apache) for i ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerabilities in Node.js affecting IBM Event Streams (CVE-2021-22960 and CVE-2021-22959) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-j…
∗∗∗ Security Bulletin: Publicly disclosed vulnerabilities from Kernel affect IBM Netezza Host Management ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-publicly-disclosed-vulner…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 03-12-2021 18:00 − Montag 06-12-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Is My Site Hacked? 4 Gut Checks ∗∗∗
---------------------------------------------
Today, we’re looking at 4 quick gut check tests you can do to get the answer to the question, “is my site hacked?”
---------------------------------------------
https://blog.sucuri.net/2021/12/is-my-site-hacked-4-gut-checks.html
∗∗∗ Warning: Yet Another Zoho ManageEngine Product Found Under Active Attacks ∗∗∗
---------------------------------------------
Enterprise software provider Zoho on Friday warned that a newly patched critical flaw in its Desktop Central and Desktop Central MSP is being actively exploited by malicious actors, marking the third security vulnerability in its products to be abused in the wild in a span of four months. The issue, assigned the identifier CVE-2021-44515, is an authentication bypass vulnerability ...
---------------------------------------------
https://thehackernews.com/2021/12/warning-yet-another-zoho-manageengine.html
∗∗∗ Malicious KMSPico Windows Activator Stealing Users Cryptocurrency Wallets ∗∗∗
---------------------------------------------
Users looking to activate Windows without using a digital license or a product key are being targeted by tainted installers to deploy malware designed to plunder credentials and other information in cryptocurrency wallets. The malware, dubbed "CryptBot," is an information stealer capable of obtaining credentials for browsers, cryptocurrency wallets, browser cookies, credit cards, and capturing screenshots from the infected systems.
---------------------------------------------
https://thehackernews.com/2021/12/malicious-kmspico-windows-activator.html
∗∗∗ The Importance of Out-of-Band Networks ∗∗∗
---------------------------------------------
Out-of-band (or "OoB") networks are usually dedicated to management tasks. Many security appliances and servers have dedicated management interfaces that are used to set up, control, and monitor the device. A best practice is to connect those management interfaces to a dedicated network that is not directly connected to the network used to carry applications/users data.
---------------------------------------------
https://isc.sans.edu/diary/rss/28102
∗∗∗ Who Is the Network Access Broker ‘Babam’? ∗∗∗
---------------------------------------------
Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing remote access credentials -- such as usernames and passwords needed to remotely connect to the targets network. In this post well look at the clues left behind by "Babam," the handle chosen by a cybercriminal who has sold such access to ransomware groups on many occasions ...
---------------------------------------------
https://krebsonsecurity.com/2021/12/who-is-the-network-access-broker-babam/
∗∗∗ Emotet’s back and it isn’t wasting any time ∗∗∗
---------------------------------------------
Last month we reported on how another notorious bit of malware, TrickBot, was helping Emotet come back from the dead. And then yesterday, several security researchers saw another huge spike in Emotet’s activity.
---------------------------------------------
https://blog.malwarebytes.com/trojans/2021/12/emotets-back-and-it-isnt-wast…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities ∗∗∗
---------------------------------------------
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following:
- Execute code on the affected device or cause it to reload unexpectedly
- Cause LLDP database corruption on the affected device
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletins 2021-12-03 ∗∗∗
---------------------------------------------
IBM Event Streams, IBM Cloud Automation Manager, IBM Data Studio Client, EDB PostreSQL with IBM, EDB Postgres Advanced Server with IBM, IBM Data Management Platform (Enterprise, Standard), IBM QRadar SIEM
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (isync, lib32-nss, nss, opera, and vivaldi), Debian (gerbv and xen), Fedora (autotrace, chafa, converseen, digikam, dmtx-utils, dvdauthor, eom, kxstitch, libsndfile, nss, pfstools, php-pecl-imagick, psiconv, q, R-magick, rss-glx, rubygem-rmagick, seamonkey, skopeo, synfig, synfigstudio, vdr-scraper2vdr, vdr-skinelchihd, vdr-skinnopacity, vdr-tvguide, vim, vips, and WindowMaker), Mageia (golang, kernel, kernel-linus, mariadb, and vim), openSUSE (aaa_base, python-Pygments, singularity, and tor), Red Hat (nss), Slackware (mozilla), SUSE (aaa_base, kernel, openssh, php74, and xen), and Ubuntu (libmodbus, lrzip, samba, and uriparser).
---------------------------------------------
https://lwn.net/Articles/877821/
∗∗∗ ABB Cyber Security Advisory: OmniCore RobotWare Missing Authentication Vulnerability CVE ID: CVE-2021-22279 ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=SI20265&LanguageCod…
∗∗∗ F5 K50839343: NGINX ModSecurity WAF vulnerability CVE-2021-42717 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K50839343
∗∗∗ F5 K12705583: OpenSSH vulnerability CVE-2021-41617 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K12705583
∗∗∗ Auerswald COMpact Multiple Backdoors ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/
∗∗∗ Auerswald COMpact Arbitrary File Disclosure ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-006/
∗∗∗ Auerswald COMpact Privilege Escalation ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-005/
∗∗∗ Auerswald COMfortel 1400/2600/3600 IP Authentication Bypass ∗∗∗
---------------------------------------------
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily