=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 13-11-2014 18:00 − Freitag 14-11-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Network Hijackers Exploit Technical Loophole ***
---------------------------------------------
Spammers have been working methodically to hijack large chunks of Internet real estate by exploiting a technical and bureaucratic loophole in the way that various regions of the globe keep track of the worlds Internet address ranges.
---------------------------------------------
http://krebsonsecurity.com/2014/11/network-hijackers-exploit-technical-loop…
*** BASHLITE Affects Devices Running on BusyBox ***
---------------------------------------------
When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how attackers used the ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/bashlite-affects…
*** OnionDuke: APT Attacks Via the Tor Network ***
---------------------------------------------
Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way ..
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002764.html
*** The Art of Website Malware Removal - The Basics ***
---------------------------------------------
When talking about defense against malicious hacks, the attack vector is a common topic for Information Security (InfoSec) professionals. The primary concern is to understand the anatomy of the attack and prevent it from happening ..
---------------------------------------------
http://blog.sucuri.net/2014/11/the-art-of-website-malware-removal-the-basic…
*** Android 5: Lollipop verschlüsselt - noch besser ***
---------------------------------------------
Mehr Sicherheit für persönliche Daten: Ab Android 5.0 aktiviert Google die automatische Verschlüsselung. Es ist nur eine von vielen zusätzlichen Sicherheitsfunktionen in Lollipop.
---------------------------------------------
http://www.golem.de/news/android-5-lollipop-verschluesselt-noch-besser-1411…
*** Gefälschte iOS-Apps: Apple sind keine Angriffe bekannt ***
---------------------------------------------
Apple sieht nach einer Warnung vor Hacker-Angriffen mit gefälschten iOS-Apps keinen akuten Handlungsbedarf. "Uns sind keine Kunden bekannt, die von einer solchen Attacke betroffen gewesen wären", erklärte der Konzern gegenüber ..
---------------------------------------------
http://www.heise.de/security/meldung/Gefaelschte-iOS-Apps-Apple-sind-keine-…
*** Son of Stuxnet - The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus ***
---------------------------------------------
Boldizsar Bencsath took a bite from his sandwich and stared at his computer screen. The software he was trying to install on his machine was taking forever to load, and he still had a dozen things to do before the Fall 2011 semester began at the Budapest University of Technology and Economics, where ..
---------------------------------------------
https://firstlook.org/theintercept/2014/11/12/stuxnet/
*** Android und iPhone beim Mobile Pwn2Own gefällt ***
---------------------------------------------
Alle drei grossen Mobil-Betriebssysteme sind bei der diesjährigen Mobile-Ausgabe von HPs Pwn2Own-Wettbewerb erfolgreichen Hacks zum Opfer gefallen. Der Angriff auf Windows Phone ist dabei allerdings im Vergleich noch eher harmlos.
---------------------------------------------
http://www.heise.de/security/meldung/Android-und-iPhone-beim-Mobile-Pwn2Own…
*** SChannel Update and Experimental Vulnerability Scanner (MS14-066), (Fri, Nov 14th) ***
---------------------------------------------
Just a quick update on the SChannel problem (MS14-066, CVE-2014-6321). So far, there is still no public available exploit for the vulnerability, and details are still sparse. But apparently, there is some progress in developing a ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18953
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 12-11-2014 18:00 − Donnerstag 13-11-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** DNSSEC mit zu kurzen RSA-Schlüsseln ***
---------------------------------------------
Unter anderem bei DNSSEC kommen noch sehr oft RSA-Schlüssel mit 1024 Bit zum Einsatz. Das könnte noch gefährlicher sein, als bisher angenommen, warnen Kryptologen.
---------------------------------------------
http://www.heise.de/security/meldung/DNSSEC-mit-zu-kurzen-RSA-Schluesseln-2…
*** Microsoft Patchday November 2014 ***
---------------------------------------------
Normalerweise schreiben wir nichts über die monatlichen Patchdays von Microsoft: wir schreiben ja auch nicht, wenn ein heller Feuerball in der Früh im Osten über den Horizont steigt. Fast jeder IT Verantwortliche kennt das monatliche Spiel: Lesen, bewerten, eventuell testen dann der Rollout der Patches auf Server und Clients. Dieses ..
---------------------------------------------
http://www.cert.at/services/blog/20141112130155-1300.html
*** Evolution of Upatre Trojan Downloader ***
---------------------------------------------
Upatre is a Trojan Downloader family that once installed, is responsible for stealing information and downloading additional malware onto the victim machine. It typically arrives via spammed e-mail messages from the Cutwail Botnet, either as an attachment or via a URL pointing to a remote hosting site. We are also seeing Exploit Kits being used as a vector for Upatre infections in the wild.
---------------------------------------------
http://research.zscaler.com/2014/11/evolution-of-upatre-trojan-downloader.h…
*** SA-CONTRIB-2014-109 - Freelinking - Cross Site Scripting (XSS) ***
---------------------------------------------
The Freelinking module implements a filter framework for easier creation of HTML links to other pages on the site or to external sites. The module does not sanitize the node title when providing a link to the node, opening a Cross Site Scripting (XSS) vulnerability.
---------------------------------------------
https://www.drupal.org/node/2373981
*** SA-CONTRIB-2014-108 - Webform Component Roles - Access Bypass ***
---------------------------------------------
The Webform component module enables site admins to limit visibility or editability of webform components based on user roles. The module doesn't sufficiently check that disabled component values are not modified upon submission of the form.
---------------------------------------------
https://www.drupal.org/node/2373973
*** SA-CONTRIB-2014-107 - Scheduler - Cross Site Scripting ***
---------------------------------------------
The Scheduler module allows nodes to be published and unpublished on specified dates. The module allows administrators to provide additional help text on the content editing form when scheduling is enabled. The module doesn't sufficiently filter the help text which could lead to a Cross Site Scripting (XSS) attack. This vulnerability is mitigated by the fact that an ..
---------------------------------------------
https://www.drupal.org/node/2373961
*** Annus HORRIBILIS! ALL the main TLS stacks now officially pwned in 2014 ***
---------------------------------------------
Critical crypto 0-day not the worst of mega Nov patch batch The appearance of a critical vuln in Microsoft SChannel - patched as part of this years bumper November Patch Tuesday - means that every major TLS stack has now fallen to a critical flaw at some time during this year.
---------------------------------------------
http://www.theregister.co.uk/2014/11/12/ms_crypto_library_megaflaw/
*** Use Protection if Peering Promiscuously ***
---------------------------------------------
Last week, I wrote a blog post discussing the dangers of BGP routing leaks between peers, illustrating the problem using examples of recent snafus between China Telecom and Russia’s Vimpelcom. This follow-up blog post provides three additional examples of misbehaving peers and further demonstrates the impact unmonitored routes can have on Internet performance ..
---------------------------------------------
http://research.dyn.com/2014/11/use-protection-if-peering-promiscuously/
*** Microsoft stopft ein fast zwei Jahrzehnte altes Sicherheitsloch ***
---------------------------------------------
Microsoft hat eine seit fast zwei Jahrzehnten existierende Sicherheitslücke in seinem Windows-Betriebssystem gestopft. Microsoft stufte das Problem in einem am Mittwoch veröffentlichten Sicherheitshinweis als "ernst" ein und stellte ein Update zur Verfügung.
---------------------------------------------
http://derstandard.at/2000008083067
*** Phisher zielen auf Apple-Pay-Interessenten ab ***
---------------------------------------------
Mit einer auf deutschsprachige Nutzer ausgelegten E-Mail wird derzeit nach Apple-ID-Accounts geangelt. Sie laden vorgeblich zur Registrierung für den bislang nur in den USA verfügbaren iPhone-Bezahldienst ein.
---------------------------------------------
http://www.heise.de/security/meldung/Phisher-zielen-auf-Apple-Pay-Interesse…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 11-11-2014 18:00 − Mittwoch 12-11-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Security updates available for Adobe Flash Player (APSB14-24) ***
---------------------------------------------
A Security Bulletin (APSB14-24) has been published regarding security updates for Adobe Flash Player. These updates address critical vulnerabilities, and Adobe recommends users update their product installations to the latest versions using the instructions referenced in the security bulletin.
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1141
*** MS14-NOV - Microsoft Security Bulletin Summary for November 2014 - Version: 1.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-NOV
*** Assessing Risk for the November 2014 Security Updates ***
---------------------------------------------
Today we released fourteen security bulletins addressing 33 unique CVEs. Four bulletins have a maximum severity rating of Critical, eight have a maximum severity rating of Important, and two have a maximum severity rating of Moderate. This table is designed to help you prioritize ..
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-no…
*** Erpressung mit Kinderpornos: Exploit-Kit Angler verteilt Android-Trojaner ***
---------------------------------------------
Ein Virenforscher hat einen perfiden Schädling entdeckt, der Android-Nutzer mit kinderpornografischem Material zu erpressen versucht. Er wird bereits über das verbreitete Exploit-Kit Angler verteilt.
---------------------------------------------
http://www.heise.de/security/meldung/Erpressung-mit-Kinderpornos-Exploit-Ki…
*** Rockwell Automation Connected Components Workbench ActiveX Component Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for two custom ActiveX Component vulnerabilities in Rockwell Automation's Connected Components Workbench application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-294-01
*** Security: Dutzende Schwachstellen in Newsletter-Diensten behoben ***
---------------------------------------------
Die Sicherheitslücken reichen von XSS-Fehlern über unsichere Formulare bis hin zu SQL-Injection-Schwachstellen: In drei weit verbreiteten E-Mail-Marketing- und Newsletter-Diensten haben IT-Sicherheitsexperten zahlreiche Schwachstellen entdeckt. Sie sind in Absprache mit den Herstellern inzwischen behoben worden.
---------------------------------------------
http://www.golem.de/news/security-dutzende-schwachstellen-in-newsletter-die…
*** MSRT November 2014 - Tofsee ***
---------------------------------------------
This month we added the Win32/Tofsee and Win32/Zoxpng malware families to the Malicious Software Removal Tool. Zoxpng is a backdoor component that can execute remote commands from a malicious hacker. It is related to Win32/Hikiti and the other threats added to the MSRT last ..
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/11/11/msrt-november-2014-tofse…
*** The Psychology Behind Why Websites Get Hacked ***
---------------------------------------------
It's an everyday conversation for security professionals that interact with everyday website owners. The one where we have to explain that just because everything seems fine, doesn't mean that the best security practices ..
---------------------------------------------
http://blog.sucuri.net/2014/11/the-psychology-behind-why-websites-get-hacke…
*** Bugtraq: CVE-2014-8731 - RCE in phpMemcachedAdmin <=1.2.2 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533968
*** SAP Governance, Risk and Compliance (SAP GRC) Multiple Critical Vulnerabilities ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014110071
*** Expired antimalware software is nearly as unsafe as having no protection at all ***
---------------------------------------------
Analyzing data to find the root cause of infections has been a long-standing focus of the MMPC. One area weve been investigating is the correlation between endpoint protection and infection rates. Back in version 14 of the Security Intelligence Report (SIRv14), we first published data on infection ..
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/11/12/expired-antimalware-soft…
*** Only Half of USB Devices Have an Unpatchable Flaw, But No One Knows Which Half ***
---------------------------------------------
After testing the USB controller chips of all eight major manufacturers, the researcher who first discovered BadUSB has some good news and some bad news. The post ..
---------------------------------------------
http://www.wired.com/2014/11/badusb-only-affects-half-of-usbs/
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 10-11-2014 18:00 − Dienstag 11-11-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Cisco Unified Communications Manager Remote Mobile Access Subsystem Vulnerability ***
---------------------------------------------
A vulnerability in the Remote Mobile Access Subsystem in Cisco Unified Communications Manager (Cisco Unified CM) could allow an unauthenticated, remote attacker to supply a crafted Transport Layer Security (TLS) certificate that may be accepted by the affected device. The vulnerability is due to improper validation of the SAN field of a TLS certificate. An attacker could exploit this vulnerability by impersonating a VCS core device and supplying a certificate signed by a certificate authority trusted by the Cisco Unified CM that contains crafted values in the SAN field.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Lessons Learn from attacks on Kippo honeypots, (Mon, Nov 10th) ***
---------------------------------------------
A number of my fellow Handlers have discussed Kippo, a SSH honeypot that can record adversarial behaviour, be it human or machine. Normal behaviour against my set of Kippo honeypots is randomly predictable; a mixture of known bad IP ranges, researchers or from behind TOR scanning and probing, would be attackers manually entering information from their jump boxes ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18935
*** Hackerangriff auf US-Post ***
---------------------------------------------
Der staatliche US Postal Service ist Opfer eines Hackerangriffs geworden. Dabei hätten die Angreifer möglicherweise Zugriff auf persönliche Daten von mehr als 800.000 Beschäftigten sowie von Kunden erhalten, die den Kundendienst per Mail oder Telefon kontaktiert hätten, teilte das Unternehmen ..
---------------------------------------------
http://derstandard.at/2000007973390
*** iOS: Schwachstelle erlaubt Installation manipulierter Apps ***
---------------------------------------------
Zum zweiten Mal innerhalb weniger Tage entdeckten Datenexperten eine potenzielle Angriffsmethode für Malware in Apples mobilem Betriebssystem iOS. Die IT-Sicherheitsfirma Fireeye warnt vor einer Infizierung von iPhones oder iPads mit einer Methode namens Masque Attack, die auch ohne Jailbreak funktioniert. Dabei ..
---------------------------------------------
http://www.golem.de/news/ios-schwachstelle-erlaubt-installation-manipuliert…
*** Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong's Pro-Democracy Movement ***
---------------------------------------------
As the pro-democracy movement in Hong Kong has continued, we've been watching for indications of confrontation taking place in cyberspace. Protests began in September and have continued to escalate. In recent weeks, attackers have launched ..
---------------------------------------------
http://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-u…
*** Old-time phishing scams are working just fine, Google finds ***
---------------------------------------------
A new Google study has found that the true masterpieces of phishing are successful 45% of the time. Its just another example of how phishers may be old dogs, but they can sure learn new tricks.
---------------------------------------------
http://nakedsecurity.sophos.com/2014/11/11/old-time-phishing-scams-are-work…
*** Stuxnet: Zero Victims ***
---------------------------------------------
We collected Stuxnet files for two years. After analyzing more than 2,000 of these files, we were able to identify the organizations that were the first victims of the worms different variants in 2009 and 2010. Perhaps an analysis of their activity can explain why they became "patients zero" (the original, or zero, victims).
---------------------------------------------
http://securelist.com/analysis/publications/67483/stuxnet-zero-victims/
*** Important EMET 5.1 Update. Apply before Patches today, (Tue, Nov 11th) ***
---------------------------------------------
Microsoft yesterday release EMET 5.1 . One particular sentence in Microsofts blog post suggests that you should apply this update (if you are using EMET) BEFORE you apply the Interent Explorer patch Microsoft is going to release in a couple of hours: ">If you are using Internet Explorer 11, either on Windows 7 or Windows 8.1, and have deployed EMET 5.0, it is ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18939
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 07-11-2014 18:00 − Montag 10-11-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** WireLurker zielt auch als Windows-Trojaner auf iOS-Geräte ab ***
---------------------------------------------
Nebem dem Mac-Trojaner haben Sicherheitsforscher inzwischen auch eine Windows-Ausführung aufgespürt. Sie hat es ebenfalls auf angeschlossene iPhones oder iPads abgesehen und schleust auf diesen Malware ein.
---------------------------------------------
http://www.heise.de/security/meldung/WireLurker-zielt-auch-als-Windows-Troj…
*** VU#432608: IBM Notes Traveler for Android transmits user credentials over HTTP ***
---------------------------------------------
The IBM Notes Traveler application for Android does not enforce the use of HTTPS for transmitting user credentials, which can allow an attacker to obtain this information.
---------------------------------------------
http://www.kb.cert.org/vuls/id/432608
*** Malicious iframe Injector Found in Adobe Flash File (.SWF) ***
---------------------------------------------
Finding malware in Adobe Flash files (.swf) is nothing new, but it usually affects personal computers, not servers. Typically, a hidden iframe is used to drop a binary browser exploit with .SWF files, infecting the client machine. This time we saw the opposite, where a binary .SWF file injects an invisible iframe. This ..
---------------------------------------------
http://blog.sucuri.net/2014/11/malicious-injector-in-swf-adobe-flash-file.h…
*** Keine Entwarnung beim Router-Farming ***
---------------------------------------------
Laut Mitarbeitern der tschechichen CZ.NIC Labs gibt es weltweit mehr als eine halbe Million Router, die ihre Konfiguration und damit das Zugangspasswort unbemerkt herausgeben. Angreifer können Nutzer der Router auf Phishing-Seiten umleiten.
---------------------------------------------
http://www.heise.de/security/meldung/Keine-Entwarnung-beim-Router-Farming-2…
*** Security: Bilder tausender unsicherer Webcams im Internet zu sehen ***
---------------------------------------------
Menschen zu Hause in ihrem Fernsehsessel oder bei der Arbeit am Rechner: Das zeigt eine Webseite - ohne dass die Betroffenen davon wissen. Die unbekannten Betreiber haben dafür weltweit tausende Webcams angezapft. (Datenschutz, Netzwerk)
---------------------------------------------
http://www.golem.de/news/security-tausende-unsichere-webcams-im-internet-zu…
*** Einfache Lösung zum Live-Patching des Linux-Kernels ***
---------------------------------------------
Red-Hat- und Suse-Mitarbeiter arbeiten gemeinsam an einer Live-Patching-Lösung für den Linux-Kernel. Erster Code wurde jetzt veröffentlicht, kann aber weniger Lücken stopfen als Kpatch und kGraft.
---------------------------------------------
http://www.heise.de/security/meldung/Einfache-Loesung-zum-Live-Patching-des…
*** BND-Kauf von Zero Days: CCC warnt vor "Mitmischen im Schwachstellen-Schwarzmarkt" ***
---------------------------------------------
"An Dreistigkeit kaum zu überbieten": Der Chaos Computer Club kritisiert die angeblichen Pläne des BND zum Ankauf von bislang unbekannten Sicherheitslücken. Das Geld liesse sich viel besser verwenden.
---------------------------------------------
http://www.golem.de/news/bnd-kauf-von-zero-days-ccc-warnt-vor-mitmischen-im…
*** The Dangers of Hosted Scripts - Hacked jQuery Timers ***
---------------------------------------------
Google blacklisted a client's website claiming that malicious content was being displayed from forogozoropoto.2waky.com. A scan didn't reveal anything suspicious. The next step was to check all third-party scripts on the website. Soon we found the offending script. It was hxxp://jquery.offput.ca/js/jquery.timers.js - a jQuery Timers plugin that was ..
---------------------------------------------
http://blog.sucuri.net/2014/11/the-dangers-of-hosted-scripts-hacked-jquery-…
*** Removing Wirelurker from Your iOS or OSX Device ***
---------------------------------------------
In an earlier blog post, we tackled what Wirelurker malware is and its security implications and risks for iOS and OSX devices. Within hours of the discovery of this malware, a Windows-based malware (detected as TROJ_WIRELURK.A) that performs the same attack was also seen in the wild. In this blog post, we'dd like ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/removing-wirelur…
*** Angriff im Hotel-Netz ***
---------------------------------------------
Unter dem Namen Darkhotel berichtet Kaspersky über eine Gruppe von Angreifern mit einer ungewöhnlichen Vorgehensweise: Sie attackieren ihre Opfer auf Auslandsreisen im Netz des Hotels.
---------------------------------------------
http://www.heise.de/security/meldung/Angriff-im-Hotel-Netz-2445108.html
*** TA14-310A: Microsoft Ending Support for Windows Server 2003 Operating System ***
---------------------------------------------
Microsoft is ending support for the Windows Server 2003 operating system on July 14, 2015.[1] After this date, this product will no longer receive:Security patches that help protect PCs from harmful viruses, spyware, and other malicious software.
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA14-310A
*** Verschlüsselung: Parallele Angriffe auf RSA-Schlüssel mit 1.024 Bit ***
---------------------------------------------
Kurze RSA-Schlüssel lassen sich schneller und günstiger brechen, wenn man einen Angriff auf viele Schlüssel gleichzeitig durchführt. Insbesondere bei DNSSEC sind RSA-Schlüssel mit 1.024 Bit noch in breitem Einsatz.
---------------------------------------------
http://www.golem.de/news/verschluesselung-parallele-angriffe-auf-rsa-schlue…
*** EMET 5.1 is available ***
---------------------------------------------
Today, we're releasing the Enhanced Mitigation Experience Toolkit (EMET) 5.1 which will continue to improve your security posture by providing increased application compatibility and hardened mitigations. You can download EMET 5.1 from microsoft.com/emet. Following is the list of the main changes and improvements: Several application compatibility issues ..
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/11/10/emet-5-1-is-available.aspx
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 06-11-2014 18:00 − Freitag 07-11-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Crypto 101 - free book resource, (Thu, Nov 6th) ***
---------------------------------------------
Regular reader and contributor Gebhard sent us a pointer to Crypto 101, an introductory course on cryptography, freely available for programmers of all ages and skill levels byLaurens Van Houtven (lvh) available for everyone, for free, forever. Its a pre-release PDF read of a project that will be released in more formats later. The Crypto 101 course allows you to learn by doing and includes everything you need to understand complete systems such as SSL/TLS: block ciphers, stream ciphers, hash...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18925&rss
*** Metasploit Weekly Wrapup: Another Android Universal XSS ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/11/06/metasploi…
*** Navy gunners unphased by "integer overflow bug" concerns ***
---------------------------------------------
Today, Naked Security received an out-of-the-ordinary email... ..from a vacationing coder with a penchant for fitting geekiness into regular life! We loved his story. We think you will too.
---------------------------------------------
http://nakedsecurity.sophos.com/2014/11/06/navy-gunners-unphased-by-integer…
*** Slides zum Thema DDoS ***
---------------------------------------------
Slides zum Thema DDoS | 5. November 2014 | Das Abwehramt des österreichischen Bundesheeres veranstaltet jedes Jahr eine Konferenz zum Thema IKT-Sicherheit. Dieses Jahr wurde ich eingeladen, einen Vortrag zum Thema DDoS zu halten.In meiner Präsentaion verweise ich auf diverse externe Dokumente, daher wurde ich gebeten, die Slides zum zum Download anzubieten. Autor: Otmar Lendl
---------------------------------------------
http://www.cert.at/services/blog/20141105124802-1293.html
*** Advance Notification Service for the November 2014 Security Bulletin Release ***
---------------------------------------------
Today, we provide advance notification for the release of 16 Security Bulletins. Five of these updates are rated Critical, nine are rated as Important, and two are rated Moderate in severity. These updates are for Microsoft Windows, Internet Explorer, Office, Exchange, .NET Framework, Internet Information Services (IIS), Remote Desktop Protocol (RDP), Active Directory Federation Services (ADFS), Input Method Editor (IME) (Japanese), and Kernel Mode Driver (KMD). As per our monthly process, weve
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/11/06/advance-notification-ser…
*** Chinese Routing Errors Redirect Russian Traffic ***
---------------------------------------------
In recent weeks, Russian President Vladimir Putin announced a plan to enact measures to protect the Internet of Russia. In a speech to the Russian National Security Council he said, "we need to greatly improve the security of domestic communications networks and information resources." Perhaps he should add Internet routing security to his list because,...
---------------------------------------------
http://research.dyn.com/2014/11/chinese-routing-errors-redirect-russian-tra…
*** Frankfurt | 04.12.2014 - SAVE us from IP Spoofing and Prefix Hijacking ***
---------------------------------------------
DDoS reflection attacks are promoted by IP spoofing and there have been several incidents in the last couple of years where huge networks or whole countries were disconnected from the internet after BGP hijacking. Nevertheless there are countermeasure like RPKI, BCP38 and S.A.V.E that not only protect your network but also help to create a more robust internet. Matthias Wählisch (FU Berlin) and Gert Döring (Space.Net) are going to present these approaches and open the discussion with...
---------------------------------------------
http://de-cix.eco.de/2014/events/4-12-frankfurt-spoofing-and-hijacking.html
*** Security Holes in Corporate Networks: Network Vulnerabilities ***
---------------------------------------------
In this blogpost, we will review in detail the possible vectors for an attack launched on a corporate network from an infected computer within it.
---------------------------------------------
http://securelist.com/blog/research/67452/security-holes-in-corporate-netwo…
*** Combat Blackhat SEO Infections with SEO Insights ***
---------------------------------------------
Blackhat SEO spam is the plague of the internet, and the big search engines take it seriously. One of the worst spam tactics on the internet is becoming more common every day: innocent websites are hacked, and their best pages begin linking to spam. These Blackhat SEO spam tactics are fighting for expensive, high-competition keywords...
---------------------------------------------
http://blog.sucuri.net/2014/11/combat-blackhat-seo-infections-with-seo-insi…
*** Macro malware on the rise again ***
---------------------------------------------
Users taught that having to enable enhanced security features is no big deal.When I joined Virus Bulletin almost eight years ago, macro viruses were already a thing of the past, like porn diallers or viruses that did funny things to the characters on your screen: threats that were once a real problem, but that we didnt have to worry about any longer.A few years ago, I even heard a malware researcher bemoan the fact that "kids these days" didnt even know how to analyse macro viruses.
---------------------------------------------
http://www.virusbtn.com/blog/2014/11_07.xml?rss
*** Yosemite Beta ***
---------------------------------------------
When we first announced that future versions of GPGMail would be available for a small fee, we were pretty scared about the reactions. Despite our expectations, weve received mostly positive responses and we would really like to thank you for that. Today were happy to announce that the first beta of GPGMail for Yosemite is finally ready.
---------------------------------------------
https://gpgtools.org/?yosemite
*** GnuPG unterstützt Krypto auf Elliptischen Kurven ***
---------------------------------------------
Das soeben veröffentlichte Release GnuPG 2.1.0 bringt einige neue Funktionen, bessere Abläufe und es schneidet auch ein paar alte Zöpfe ab. Der 2.0er-Zweig wird als stabile Version weiter gepflegt.
---------------------------------------------
http://www.heise.de/security/meldung/GnuPG-unterstuetzt-Krypto-auf-Elliptis…
*** Belkin flings out patch after Metasploit module turns guests to admins ***
---------------------------------------------
Open guest networks turned on by default Belkin has patched a vulnerability in a dual band router that allowed attackers on guest networks to gain root access using an automated tool.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/11/07/belkin_flin…
*** VB2014 video: Attack points in health apps & wearable devices - how safe is your quantified self? ***
---------------------------------------------
Health apps and wearable devices found to make many basic security mistakes."I know a lot of you have a Fitbit device."The geeks attending VB conferences tend to like their gadgets, and many of them have the latest ones, so the claim made by Candid Wüest at the beginning of his VB2014 last-minute presentation Attack points in health apps & wearable devices - how safe is your quantified self? was bound to be accurate. But the Symantec researcher really did know how many...
---------------------------------------------
http://www.virusbtn.com/blog/2014/11_07a.xml?rss
*** Security: Tausende unsichere Webcams im Internet zu sehen ***
---------------------------------------------
Über tausende Webcams sind derzeit Menschen zu Hause in ihrem Fernsehsessel oder bei der Arbeit am Rechner zu sehen - ohne dass sie davon wissen. Die unbekannten Betreiber einer Webseite haben dafür weltweit Überwachungskameras angezapft.
---------------------------------------------
http://www.golem.de/news/security-tausende-unsichere-webcams-im-internet-zu…
*** Vuln: requests-kerberos requests_kerberos/kerberos_.py Remote Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/70909
*** SOL15792: Path MTU discovery vulnerability CVE-2004-1060 ***
---------------------------------------------
Description: Multiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Dont Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack." (CVE-2004-1060) Impact: The BIG-IP system may be vulnerable to denial-of-service (DoS) attacks.
---------------------------------------------
https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15792.html
*** Bugtraq: Open-Xchange Security Advisory 2014-11-07 ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533936
*** [R1] OpenSSL Vulnerabilities (20141015) Affect Tenable Products ***
---------------------------------------------
November 7, 2014
---------------------------------------------
http://www.tenable.com/security/tns-2014-11
*** RSA Web Threat Detection SQL Injection ***
---------------------------------------------
Topic: RSA Web Threat Detection SQL Injection Risk: Medium Text:ESA-2014-135: RSA Web Threat Detection SQL Injection Vulnerability EMC Identifier: ESA-2014-135 CVE Identifier: C...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014110032
*** PHP date_from_ISO8601() buffer overflow ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/98522
*** DSA-3067 qemu-kvm ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3067
*** DSA-3066 qemu ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3066
*** DSA-3065 libxml-security-java ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3065
*** IBM Security Bulletins ***
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 05-11-2014 18:00 − Donnerstag 06-11-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Retefe with a new twist ***
---------------------------------------------
A few months ago, we blogged about the banking trojan Retefe (Blog post in German) that was and still is targeting Switzerland. First off, Retefe is different because it only targets Switzerland, Austria and Sweden (and sometimes Japan). Contrast this...
---------------------------------------------
http://securityblog.switch.ch/2014/11/05/retefe-with-a-new-twist/
*** ENISA calls for Expression of Interest for Membership of the Permanent Stakeholders' Group ***
---------------------------------------------
The Executive Director of European Union Agency for Network and Information Security (ENISA) calls for Expression of Interest for Membership of the Permanent Stakeholders' Group (PSG) to be assigned from February 2015 to August 2017.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/enisa-calls-for-expression-…
*** New ENISA report on Cyber Crisis Cooperation and Management ***
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/enisa-publishes-new-report-on-c…
*** WireLurker malware infects iOS devices through OS X ***
---------------------------------------------
Non-jailbroken devices infected via enterprise provisioning program.Researchers at Palo Alto Networks have published a research paper (PDF) analysing the WireLurker malware that runs on Mac OS X, and which is then used to further infect iOS devices connected to an infected machine.WireLurker is found to have infected 467 apps on the Maiyadi App Store, a third-party store based in China. Infected apps have been downloaded more than 350,000 times. Malware targeting OS X has become increasingly...
---------------------------------------------
http://www.virusbtn.com/blog/2014/11_06.xml?rss
*** VB2014 paper: DMARC - how to use it to improve your email reputation ***
---------------------------------------------
Terry Zink presents case study in which he describes setting a DMARC policy for Microsoft.Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added DMARC - how to use it to improve your email reputation, by Microsofts Terry Zink.Email is a 30-year-old protocol, designed at a time when the Internet was much smaller and you could basically trust anyone. As a consequence, spammers and phishers can easily send email
---------------------------------------------
http://www.virusbtn.com/blog/2014/11_06a.xml?rss
*** ZMap 1.2.1 - The Internet Scanner ***
---------------------------------------------
ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet.
---------------------------------------------
http://hack-tools.blackploit.com/2014/11/zmap-121-internet-scanner.html
*** ICMP Reverse Shell ***
---------------------------------------------
A reverse shell is a type of shell in which the target machine communicates back to the attacking machine. The attacking machine has a listener port on which it receives the connection, which by using, code or command execution is achieved.
---------------------------------------------
http://resources.infosecinstitute.com/icmp-reverse-shell/
*** ZDI-14-373: Trend Micro InterScan Web Security Virtual Appliance Information Disclosure Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to read files from the underlying operating system on vulnerable installations of Trend Micro InterScan Web Security Virtual Appliance web application authentication is required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-373/
*** Vuln: Dell EqualLogic CVE-2013-3304 Directory Traversal Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/70760
*** Bugtraq: ESA-2014-135: RSA Web Threat Detection SQL Injection Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533912
*** Bugtraq: [The ManageOwnage Series, part VI]: 0day database info and superuser credential disclosure in EventLog Analyser ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533916
*** Cisco Unity Connection Information Disclosure Vulnerability ***
---------------------------------------------
CVE-2014-7988
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** [R1] PHP Integer Overflow Affects Tenables SecurityCenter ***
---------------------------------------------
November 5, 2014
---------------------------------------------
http://www.tenable.com/security/tns-2014-10
*** [2014-11-06] XXE & XSS & Arbitrary File Write vulnerabilities in Symantec Endpoint Protection ***
---------------------------------------------
Attackers are able to perform denial-of-service attacks against the Endpoint Protection Manager which directly impacts the effectiveness of the client-side endpoint protection. Furthermore, session identifiers of users can be stolen to impersonate them and gain unauthorized access to the server.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** IBM Security Bulletin: Security vulnerabilities in Node.js modules affect IBM Business Process Manager (BPM) Configuration Editor (CVE-2014-6394, CVE-2014-7191) ***
---------------------------------------------
Security vulnerabilities have been reported for some dependent Node.js modules. IBM Business Process Manager includes a stand-alone tool for editing configuration properties files that is based on open source Node.js technology. CVE(s): CVE-2014-6394 and CVE-2014-7191 Affected product(s) and affected version(s): IBM Business Process Manager Express V8.5.5 IBM Business Process Manager Standard V8.5.5 IBM Business Process Manager Advanced V8.5.5 Refer to the following reference
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple Reflected XSS Vulnerabilities in Tivoli Netcool/Impact ***
---------------------------------------------
IBM Tivoli Netcool Impact is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. CVE(s): CVE-2014-6161 Affected product(s) and affected version(s): IBM Tivoli Netcool Impact 6.1.1 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www.ibm.com/support/docview.wss?uid=swg21689130 X-Force Database: http://xforce.iss.net/xforce/xfdb/97710
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 03-11-2014 18:00 − Dienstag 04-11-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Smuggler - An interactive 802.11 wireless shell without the need for authentication or association ***
---------------------------------------------
I've always been fascinated by wireless communications. The ability to launch seemingly invisible packets of information up into the air without even the need to consider aerodynamics itself seems like some kind of magic. In my quest to become a wireless wizard I started looking at the 802.11 wireless protocol to find out a little more about it. I had always noticed when looking at wireless management frames in various packet dumps that a wealth of additional (and somewhat optional)...
---------------------------------------------
http://blog.spiderlabs.com/2014/11/smuggler-an-interactive-80211-wireless-s…
*** Some samples in Rotten Tomato campaign not effectively executed ***
---------------------------------------------
Researchers at Sophos provided additional details on the malware used in the attacks.
---------------------------------------------
http://www.scmagazine.com/some-samples-in-rotten-tomato-campaign-not-effect…
*** Whois someone else?, (Tue, Nov 4th) ***
---------------------------------------------
A couple of weeks ago, I already covered the situation where a cloud IP address gets re-assigned, and the new owner still sees some of your traffic. Recently, one of our clients had the opposite problem: They had changed their Internet provider, and had held on to the old address range for a decent decay time. They even confirmed with a week-long packet capture that there was no afterglow on the link, and then dismantled the setup. Until last week, when they got an annoyed rant into their...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18911&rss
*** New version of Backoff detected, malware variant dubbed ROM ***
---------------------------------------------
Researchers at Fortinet detailed the new variant on Monday, and urged businesses to keep their AV up to date.
---------------------------------------------
http://www.scmagazine.com/new-version-of-backoff-detected-malware-variant-d…
*** Practical Reflected File Download and JSONP ***
---------------------------------------------
This week introduced us to a new web attack vector, which the researcher dubbed "Reflected File Download" [RFD] . It's a very interesting attack which has potential to do some severe damage, especially in social engineering contexts. Full details of the reflected file download attack can be found here:...
---------------------------------------------
http://blog.davidvassallo.me/2014/11/02/practical-reflected-file-download-a…
*** Content Security Policy Builder ***
---------------------------------------------
Content Security Policy is a new HTML5 web security feature. Your website can now explicitly tell browsers what sources of content - images, scripts, frames etc - are to be trusted. A new Content-Security-Policy HTTP header is used to announce that policy.
---------------------------------------------
https://cspbuilder.info/static/
*** Exploiting CVE-2014-4113 on Windows 8.1 ***
---------------------------------------------
On the 14th of October 2014 both CrowdStrike1 and FireEye2 published a blog post describing a new zero-day privilege escalation vulnerability on Windows. The CrowdStrike article explains that this new vulnerability was identified in the process of tracking a supposedly highly advanced adversary group named HURRICANE PANDA and has been actively exploited in the wild for at least five month. ... So I was curious if and how the vulnerability might be exploitable on the most current version of...
---------------------------------------------
http://dl.packetstormsecurity.net/papers/attack/CVE-2014-4113.pdf
*** Google Releases Nogotofail Tool to Test Network Security ***
---------------------------------------------
The last year has produced a rogues' gallery of vulnerabilities in transport layer security implementations and new attacks on the key protocols, from Heartbleed to the Apple gotofail flaw to the recent POODLE attack. To help developers and security researchers identify applications that are vulnerable to known SSL/TLS attacks and configuration problems, Google is releasing a...
---------------------------------------------
http://threatpost.com/google-releases-nogotofail-tool-to-test-network-secur…
*** Customer confusion over new(ish) gTLDs targeting financial services ***
---------------------------------------------
Introduction For the last decade and a bit, banking customers have been relentlessly targeted by professional phishers with a never-ending barrage of deceitful emails, malicious websites and unstoppable crimeware - each campaign seeking to relieve the victim of their online banking credentials and funds. In the battle for the high-ground, many client-side and server-side security technologies have been invented and consequently circumvented over the years. Now we're about to enter a...
---------------------------------------------
https://www.nccgroup.com/en/blog/2014/11/customer-confusion-over-newish-gtl…
*** Linksys Patches (Most) Routers Running SMART Wi-Fi Firmware ***
---------------------------------------------
Linksys released updates for routers running its SMART Wi-Fi firmware, patching vulnerabilities leading to credential theft and information disclosure. Two popular models, however, remain unpatched.
---------------------------------------------
http://threatpost.com/linksys-patches-most-routers-running-smart-wi-fi-firm…
*** GNU Binutils peXXigen.c denial of service ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/98420
*** ZDI-14-371: (0Day) Denon AVR-3313CI Friendlyname Persistent Cross-Site Scripting Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to insert persistent JavaScript on vulnerable installations of the Denon AVR-3313CI audio/video receivers web portal. Authentication is not required to persist the attack. However, user interaction is required to exploit this vulnerability in that the target must visit a malicious page.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-371/
*** ZDI-14-372: (0Day) Visual Mining NetCharts Server File Upload Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Visual Mining NetCharts Server. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-372/
*** Cisco Unified IP Phone Local Kernel System Call Input Validation Vulnerability ***
---------------------------------------------
cisco-sa-20130109-uipphone
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** DSA-3063 quassel ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3063
*** DSA-3062 wget ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3062
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 31-10-2014 18:00 − Montag 03-11-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** CVE-2014-4115 Analysis: Malicious USB Disks Allow For Possible Whole System Control ***
---------------------------------------------
One of the bulletins that was part of the October 2014 Patch Tuesday cycle was MS14-063 which fixed a vulnerability in the FAT32 disk partition driver that could allow for an attacker to gain administrator rights on affected systems, with only a USB disk with a specially modified file system. This vulnerability as also designated...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/E2Ur54TO5Qo/
*** CSAM Month of False Positives: Appropriately Weighting False and True Positives, (Fri, Oct 31st) ***
---------------------------------------------
This is a guest diary submitted by Chris Sanders. We will gladly forward any responses or please use our comment/forum section to comment publicly.">">If you work with any type of IDS, IPS, or other">detection technology then you have to deal with false positives. One">common">mistake I see people make when managing their indicators and rules is">relying">solely on the rate of false positives that are observed. While...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18905&rss
*** CVE-2012-0158 continues to be used in targeted attacks ***
---------------------------------------------
30-month old vulnerability still a popular way to infect systems.If all you have to worry about are zero-day vulnerabilities, you have got things pretty well sorted. Although it is true that sometimes zero-days are being used to deliver malware (such as the recent use of CVE-2014-4114 by the SandWorm group), in many cases even the more targeted attacks get away with using older, long patched vulnerabilities, exploiting the fact that many users and organisations dont patch as quickly as they
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_31a.xml?rss
*** Reversing D-Link's WPS Pin Algorithm ***
---------------------------------------------
While perusing the latest firmware for D-Link's DIR-810L 80211ac router, I found an interesting bit of code in sbin/ncc, a binary which provides back-end services used by many other processes on the device, including the HTTP and UPnP servers: I first began examining this particular piece of code with the...
---------------------------------------------
http://www.devttys0.com/2014/10/reversing-d-links-wps-pin-algorithm/
*** Adobe: Aktuelle Flash-Sicherheitslücken bereits in Exploit-Kits ***
---------------------------------------------
Es wird wieder Zeit, sich bei Sicherheitslücken verstärkt um Adobes Flashplayer zu kümmern. Zwei gerade erst abgesicherte und gefährliche Sicherheitslöcher sind bereits in aktuelle Exploit-Kits integriert worden. Eset glaubt sogar, dass Flash nun wieder Java in der Beliebtheitsskala ablöst.
---------------------------------------------
http://www.golem.de/news/adobe-aktuelle-flash-sicherheitsluecken-bereits-in…
*** justniffer a Packet Analysis Tool, (Mon, Nov 3rd) ***
---------------------------------------------
Are you looking for another packet sniffer? justniffer is a packet sniffer with some interesting features. According to the author, this packet sniffer can rebuild and save HTTP file content sent over the network. It uses portions of Linux kernel source code for handling all TCP/IP stuff. Precisely, it uses a slightly modified version of the libnids libraries that already include a modified version of Linux code in a more reusable way.[1] The tarball can be downloaded here and a package is
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18907&rss
*** BE2 Custom Plugins, Router Abuse, and Target Profiles ***
---------------------------------------------
The BlackEnergy malware is crimeware turned APT tool and is used in significant geopolitical operations lightly documented over the past year. An even more interesting part of the BlackEnergy story is the relatively unknown custom plugin capabilities to attack ARM...
---------------------------------------------
http://securelist.com/blog/research/67353/be2-custom-plugins-router-abuse-a…
*** Security: Sicherheitslücke in Mac OS X 10.10 entdeckt ***
---------------------------------------------
In Mac OS X 10.10 und 10.8.5 befindet sich eine Sicherheitslücke, die die Übernahme des gesamten Systems ermöglicht. Details hat ihr Entdecker noch nicht veröffentlicht - in Absprache mit Apple.
---------------------------------------------
http://www.golem.de/news/security-sicherheitsluecke-in-mac-os-x-10-10-entde…
*** OpenBSD 5.6 kickt OpenSSL ***
---------------------------------------------
Mit der neuen Version des freien Unix steigen die OpenBSD-Macher von OpenSSL auf LibreSSL um. Dazu kommen zahlreiche kleinere Verbesserungen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/OpenBSD-5-6-kickt-OpenSSL-2441288.ht…
*** Hacking Team: Handbücher zeigen Infektion Über Code Injection und WLAN ***
---------------------------------------------
"Internetüberwachung leicht gemacht": Die italienische Firma Hacking Team gilt neben Finfisher als bekanntester Hersteller von Spionagesoftware. Nun veröffentlichte Handbücher zeigen die Möglichkeiten der Überwachung.
---------------------------------------------
http://www.golem.de/news/hacking-team-handbuecher-zeigen-infektion-ueber-co…
*** RDP Replay ***
---------------------------------------------
Here at Context we work hard to keep our clients safe. During routine client monitoring our analysts noticed some suspicious RDP traffic. It was suspicious for two reasons. Firstly the client was not in the habit of using RDP, and secondly it had a Chinese keyboard layout. This information is available in the ClientData handshake message of non-SSL traffic, and can easily be seen in wireshark.
---------------------------------------------
http://contextis.com/resources/blog/rdp-replay/
*** l+f: Analyse des Drupal-Desasters ***
---------------------------------------------
Wie konnte das nur passieren? Müssen wir alle sterben?
---------------------------------------------
http://www.heise.de/security/meldung/l-f-Analyse-des-Drupal-Desasters-24414…
*** Visa: Kreditkarten-Lücke ermöglicht Abbuchen von einer Million Dollar per NFC ***
---------------------------------------------
Mittels präpariertem Terminal - Forscher stellen Leck auf Sicherheitskonferenz vor - Visa beschwichtigt
---------------------------------------------
http://derstandard.at/2000007655779
*** Ongoing Sophisticated Malware Campaign Compromising ICS (Update A) ***
---------------------------------------------
This alert update is a follow-up to the original NCCIC/ICS-CERT Alert titled ICS-ALERT-14-281-01 Ongoing Sophisticated Malware Campaign Compromising ICS that was published October 28, 2014, on the ICS-CERT web site.
---------------------------------------------
https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-281-01A
*** Bugtraq: [SE-2014-01] Missing patches / inaccurate information regarding Oracle Oct CPU ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533862
*** HP CM3530 Color LaserJet Printer Lets Remote Users Access Data and Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1031153
*** CBI Referral Manager <= 1.2.1 Cross-Site Scripting (XSS) ***
---------------------------------------------
2014-11-01T18:57:24
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7654
*** GB Gallery Slideshow 1.5 - SQL Injection ***
---------------------------------------------
2014-11-02T13:12:44
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7655
*** Vuln: MantisBT Incomplete Fix Multiple SQL Injection Vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/bid/70856
*** VU#210620: uIP and lwIP DNS resolver vulnerable to cache poisoning ***
---------------------------------------------
Vulnerability Note VU#210620 uIP and lwIP DNS resolver vulnerable to cache poisoning Original Release date: 03 Nov 2014 | Last revised: 03 Nov 2014 Overview The DNS resolver implemented in uIP and lwIP is vulnerable to cache poisoning due to non-randomized transaction IDs (TXIDs) and source port reuse. Description CWE-330: Use of Insufficiently Random Values - CVE-2014-4883The DNS resolver implemented in all versions of uIP, as well as lwIP versions 1.4.1 and earlier, is vulnerable to cache...
---------------------------------------------
http://www.kb.cert.org/vuls/id/210620
*** IBM Security Bulletin: Weaker than expected security with Liberty Repository affecting Rational Application Developer for WebSphere Software (CVE-2014-4767) ***
---------------------------------------------
The WebSphere Application Server Liberty profile could provide weaker than expected security when installing features via the Liberty Repository. A remote attacker could exploit this vulnerability using a man-in-the-middle technique to cause the installation of malicious code. CVE(s): CVE-2014-4767 Affected product(s) and affected version(s): IBM Rational Application Developer for WebSphere Software 9.1.0.1 Refer to the following reference URLs for remediation and additional
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple Security vulnerabilities found in WebSphere Commerce XML External Entity (XXE) Processing (CVE-2014-4834, CVE-2014-4769 ) ***
---------------------------------------------
IBM WebSphere Commerce Enterprise, Professional, Express and Developer is vulnerable to a denial of service, caused by issues with detecting recursion during entity expansion. CVE(s): CVE-2014-4834 and CVE-2014-4769 Affected product(s) and affected version(s): WebSphere Commerce V6.0 and V7.0 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin:
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors ***
---------------------------------------------
There are multiple vulnerabilities in OpenSSL that is used by IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139). These issues were disclosed on August 6, 2014 by the OpenSSL Project. CVE(s): CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512 and CVE-2014-5139 Affected...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: IBM Notes Traveler for Android client explicit warning against use of HTTP (CVE-2014-6130) ***
---------------------------------------------
The IBM Notes Traveler client for Android devices allows the end user to connect to their Traveler server over HTTPS (using SSL) or the open HTTP standard. At present, the client application does not explicitly warn the end user if the Traveler administrator has chosen the insecure HTTP variant as the transport medium. CVE(s): CVE-2014-6130 Affected product(s) and affected version(s): All releases of IBM Notes Traveler for Android prior to version 9.0.1.3. Refer to the following...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: IBM Tivoli NetView for z/OS (distributed components) affected by multiple vulnerabilities that have been identified in IBM Runtime Environment, Java Technology Edition, Versions 6 & 7 (CVE-2014-4263 and ***
---------------------------------------------
Vulnerabilities have been identified in IBM Runtime Environment, Java Technology Edition, Versions 6 and 7, utilized by IBM Tivoli NetView for z/OS distributed components. CVE(s): CVE-2014-4263 and CVE-2014-4244 Affected product(s) and affected version(s): This vulnerability is known to affect IBM Tivoli NetView for z/OS v5.3, 5.4, 6.1, 6.2 & 6.2.1 in certain distributed components. Releases/systems/configurations not known to be affected: IBM Tivoli NetView for...
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 30-10-2014 18:00 − Freitag 31-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/: CVE-2014-3371
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Security Advisory - Medium Severity - WP eCommerce WordPress Plugin ***
---------------------------------------------
If you're using the popular WP eCommerce WordPress plugin (2,900,000 downloads), you should update it right away. During a routine audit for our Website Firewall (WAF), we ..
---------------------------------------------
http://blog.sucuri.net/2014/10/security-advisory-medium-severity-wp-ecommer…
*** Nordex NC2 XSS Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a cross-site scripting vulnerability in the Nordex Control 2 (NC2) application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-303-01
*** Meinberg Radio Clocks LANTIME M-Series XSS ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities in the Meinberg Radio Clocks LANTIME M-Series XSS.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-275-01
*** Accuenergy Acuvim II Authentication Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for two authentication vulnerabilities within the Accuenergy AXM-NET Ethernet module's web server.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-275-02
*** [2014-10-31] XXE and XSS vulnerabilities in Scalix Web Access ***
---------------------------------------------
Scalix Web Access is vulnerable to XML external entity injection (XXE) and reflected cross site scripting (XSS) attacks. An unauthenticated attacker can get read access to the filesystem of the Scalix Web Access host and thus obtain sensitive information.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Spotting Malicious Injections in Otherwise Benign Code ***
---------------------------------------------
Being able to spot suspicious code, and then determine whether it is benign or malicious is a very important skill for a security researcher. Every day we scan through megabytes of HTML, JS and PHP. It's quite easy to miss something bad, especially ..
---------------------------------------------
http://blog.sucuri.net/2014/10/spotting-malicious-injections-in-otherwise-b…
*** Setting HoneyTraps with ModSecurity: Adding Fake Cookies ***
---------------------------------------------
This blog post continues with the topic of setting "HoneyTraps" within your web applications to catch attackers. Please review the previous posts for more ..
---------------------------------------------
http://blog.spiderlabs.com/2014/10/setting-honeytraps-with-modsecurity-addi…
*** Facebook geht ins Tor-Netz ***
---------------------------------------------
Das soziale Netz will zukünftig eine Nutzung der Dienste auch über das Anonymisierungsnetz Tor möglich machen. Dafür setzt der Konzern einen eigenen Onion-Dienst im Tor-Netz auf.
---------------------------------------------
http://www.heise.de/security/meldung/Facebook-geht-ins-Tor-Netz-2440221.html
*** Schwachstellen in Samsung Knox ***
---------------------------------------------
Bei einer Analyse von der auf vielen Geräten vorinstallierten Security-App Samsung Knox Personal kamen Mängel ans Licht. Der Hersteller erklärte die App für überholt, Ersatz gibt es allerdings nur für zwei aktuelle Spitzengeräte.
---------------------------------------------
http://www.heise.de/security/meldung/Schwachstellen-in-Samsung-Knox-2440119…
*** Google to kill off SSL 3.0 in Chrome 40 ***
---------------------------------------------
Google plans to remove support for the aging Secure Sockets Layer (SSL) version 3.0 protocol in Google Chrome 40, which is expected to ship in about two months.The decision comes after Google security researchers recently discovered a dangerous design flaw in SSL 3.0. Dubbed "POODLE," the vulnerability ..
---------------------------------------------
http://www.csoonline.com/article/2841837/application-security/google-to-kil…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 29-10-2014 18:00 − Donnerstag 30-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** An In-Depth Look Into Malicious Browser Extensions ***
---------------------------------------------
Malicious browser extensions bring about security risks as these often lead to system infection and unwanted spamming on Facebook. Based on our data, these attacks have notably affected users in Brazil. We have previously reported that cybercriminals are putting malicious browsers in the official Chrome ..
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/mNBK1Z4Uhdo/
*** Cyberangriffe: Neue Spyware kommuniziert über Gmail-Entwürfe ***
---------------------------------------------
Eine neue Malware nutzt die Entwurfsfunktion von Googles E-Mail-Dienst, um Befehle zu empfangen und Daten auszulesen. Wer betroffen ist, lässt sich nur schwer feststellen.
---------------------------------------------
http://www.golem.de/news/cyberangriffe-neue-spyware-kommuniziert-ueber-gmai…
*** SQL-Injection: Sicherheitslücke erlaubt Zugriff auf Sony-Kundendaten ***
---------------------------------------------
Eine SQL-Injection-Lücke erlaubt den Zugriff auf Kundendaten des Playstation Networks. Sony wurde bereits vor zwei Wochen über die Sicherheitslücke informiert, sie wurde jedoch bisher nicht geschlossen. Es ist nicht der erste Vorfall im Playstation-Network.
---------------------------------------------
http://www.golem.de/news/sql-injection-sicherheitsluecke-erlaubt-zugriff-au…
*** Popular Science Website Infected, Serving Malware ***
---------------------------------------------
The website of Popular Science magazine was found infecting users with malware via the RIG exploit kit.
---------------------------------------------
http://threatpost.com/popular-science-website-infected-serving-malware/1090…
*** Poodle: Microsoft "fixt" SSLv3-Verschlüsselung ***
---------------------------------------------
Mit einem von Microsoft bereit gestellten "Fix it" kann man den kaputten Verschlüsselungsstandard SSLv3 im Internet Explorer einfach abschalten. Doch die Schnellhilfe hat ihre Tücken.
---------------------------------------------
http://www.heise.de/security/meldung/Poodle-Microsoft-fixt-SSLv3-Verschlues…
*** Assume 'Every Drupal 7 Site Was Compromised' Unless Patched By Oct. 15 ***
---------------------------------------------
The maintainers of the Drupal content management system are warning users that any site owners who haven't patched a critical vulnerability in Drupal Core disclosed earlier this month should consider their sites to be ..
---------------------------------------------
http://threatpost.com/assume-every-drupal-7-site-was-compromised-unless-pat…
*** Cyber Europe 2014: 29 europäische Länder testen Handlungsfähigkeit gegen Cyberattacken ***
---------------------------------------------
Gegen grenzüberschreitende Cyber-Bedrohungen arbeiten die Europäische Sicherheitsbehörde ENISA, die EU-Mitgliedsstaaten und die Industrie Hand in Hand. Heute läuten sie Phase 2 des bislang grössten europäischen Cyber-Security-Tests ein.
---------------------------------------------
http://www.heise.de/security/meldung/Cyber-Europe-2014-29-europaeische-Laen…
*** Grafikkarte funkt Passwörter durch die Gegend ***
---------------------------------------------
Forscher haben eine Grafikkarte zum UKW-Sender umfunktioniert, das Monitorkabel dient als Antenne. So können sie Air Gap überwinden und Daten an Geräte senden, die eigentlich gar nicht untereinander vernetzt sind.
---------------------------------------------
http://www.heise.de/security/meldung/Grafikkarte-funkt-Passwoerter-durch-di…
*** Reflected File Download - A New Web Attack Vector ***
---------------------------------------------
On October 2014 as part of my talk at the Black Hat Europe 2014 event, I presented a new web attack vector that enables attackers to gain complete control over a victim's machine by virtually downloading a file from trusted ..
---------------------------------------------
http://blog.spiderlabs.com/2014/10/reflected-file-download-the-white-paper.…
*** APT28 - State Sponsored Russian Hacker Group ***
---------------------------------------------
Nearly a decade-long cyber espionage group that targeted a variety of Eastern European governments and security-related organizations including the North Atlantic Treaty Organization (NATO) has been exposed by a security research firm. The US intelligence firm FireEye released its latest Advanced Persistent ..
---------------------------------------------
http://thehackernews.com/2014/10/APT28-Russian-hacker-cyber-espionage.html
*** Ausnutzung der Windows-Sandworm-Lücke eskaliert ***
---------------------------------------------
Kriminelle nutzen die zunächst im Rahmen gezielter Attacken auf NATO-Einrichtungen und Regierungen eingesetzte Sicherheitslücke in Windows nun, um grossflächig Online-Banking-Trojaner zu verteilen.
---------------------------------------------
http://www.heise.de/security/meldung/Ausnutzung-der-Windows-Sandworm-Luecke…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-10-2014 18:00 − Mittwoch 29-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** The dangers of opening suspicious emails: Crowti ransomware ***
---------------------------------------------
The Microsoft Malware Protection Center (MMPC) has seen a spike in number of detections for threats in the Win32/Crowti ransomware this month as the result of new malware campaigns. Crowti is a family of ransomware that when encountered will attempt to encrypt the files on your PC, and then ask for payment ..
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/10/28/the-dangers-of-opening-s…
*** Ongoing Sophisticated Malware Campaign Compromising ICS ***
---------------------------------------------
NCCIC/ICS-CERT has identified a sophisticated malware campaign that has compromised numerous industrial control systems (ICSs) environments using a variant of the BlackEnergy malware. Analysis indicates that this campaign has ..
---------------------------------------------
https://ics-cert.us-cert.gov//alerts/ICS-ALERT-14-281-01
*** Multiple vulnerabilities in Tuleap ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100177http://cxsecurity.com/issue/WLB-2014100176http://cxsecurity.com/issue/WLB-2014100175
*** Weisses Haus: Russische Hacker angeblich in US-Regierungsnetz eingedrungen ***
---------------------------------------------
Angriffe auf die Computernetze von Regierungen kommen weltweit tagtäglich vor. Hackern ist es nun offenbar gelungen, in das nicht abgeschirmte Netz des Weissen Hauses einzudringen.
---------------------------------------------
http://www.golem.de/news/weisses-haus-russische-hacker-angeblich-in-us-regi…
*** Microsoft integriert Data Loss Prevention in Cloud- und Office-Produkte ***
---------------------------------------------
Mit der Ausweitung seiner Sicherheits-Features auf weitere Produkte und Dienste will der Redmonder Konzern für Unternehmen den Verlust vertraulicher Daten weitestmöglich einschränken.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-integriert-Data-Loss-Prevent…
*** [2014-10-29] Multiple critical vulnerabilities in Vizensoft Admin Panel ***
---------------------------------------------
Attackers are able to completely compromise the web application built upon Vizensoft CMS as they can gain access to the system and database level and manage the website as an admin without prior authentication.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** [2014-10-29] Persistent cross site scripting in Confluence RefinedWiki Original Theme ***
---------------------------------------------
By exploiting this vulnerability, users that are able to create or edit content, can attack other users of confluence. An attacker might be able to gain access to otherwise protected information in confluence.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Codeausführung: FTP-Client-Lücke in BSDs, Mac OS X und Linux-Distributionen ***
---------------------------------------------
Eine Sicherheitslücke in dem FTP-Client von NetBSD erlaubt mit einem angepassten Server das Ausführen von Code auf dem Rechner. Betroffen davon sind wohl verschiedene BSD-Derivate, Mac OS X sowie Linux-Distributionen. Ein Patch steht bereit.
---------------------------------------------
http://www.golem.de/news/codeausfuehrung-ftp-client-luecke-in-bsds-mac-os-x…
*** Threat Introduced via Browser Extensions ***
---------------------------------------------
We love investigating unusual hacks. There are so many ways to compromise a website, but often it's the same thing. When we see malicious code on web pages, our usual suspects are: Vulnerabilities in website software Trojanized software ..
---------------------------------------------
http://blog.sucuri.net/2014/10/threat-introduced-via-browser-extensions.html
*** AirHopper: Offline-PC schickt Passwort per UKW an Offline-Handy ***
---------------------------------------------
Israelische Security-Forscher haben einen neuen Weg für eine Seitenkanalattacke auf PCs gefunden. Mit einem Smartphone und einem Desktoprechner, die beide keine Onlineverbindung haben, können sie ein eingetipptes Passwort mitlesen.
---------------------------------------------
http://www.golem.de/news/airhopper-offline-pc-schickt-passwort-per-ukw-an-o…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-10-2014 18:00 − Dienstag 28-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** ddosfrei.de: neue Providerinitiative für sichere Server ***
---------------------------------------------
Mit über 3.500 Angriffen pro Jahr zählen DDoS-Attacken (Distributed Denial of Service-Attacken) laut dem Bundesamt für Sicherheit in der Informationstechnik (BSI) zu den grössten Gefahren für die IT-Sicherheit in Deutschland, Tendenz steigend. Dabei handelt es sich um von vielen Rechnern gleichzeitig erfolgende ..
---------------------------------------------
http://www.eco.de/2014/news/ddosfrei-de-neue-initiative-fuer-sichere-server…
*** TA14-300A: Phishing Campaign Linked with "Dyre" Banking Malware ***
---------------------------------------------
Since mid-October 2014, a phishing campaign has targeted a wide variety of recipients while employing the Dyre/Dyreza banking malware. Elements of this phishing campaign vary from target to target including senders, attachments, exploits, themes, and payload(s) ..
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA14-300A
*** wget Default FTP Retrieval Method Lets Remote Users Create Arbitrary Files and Directories ***
---------------------------------------------
http://www.securitytracker.com/id/1031121
*** TSX improves timing attacks against KASLR ***
---------------------------------------------
Mega biblion mega kakon .. and similarly a long blog is a nuisance, so I managed to squeeze the essence of it into a single sentence, the title. If it is not entirely clear, read on. SMEP A typical privilege escalation exploit based on a kernel vulnerability works by corrupting the kernel ..
---------------------------------------------
http://labs.bromium.com/2014/10/27/tsx-improves-timing-attacks-against-kasl…
*** Immer Ärger mit Samsung-Dienst "Find My Mobile" ***
---------------------------------------------
Erneut wurde ein Sicherheitsproblem in dem Dienst bekannt. Durch die Schwachstelle können Angreifer die Android-Geräte von Samsung unter Umständen aus der Ferne mit einem beliebigen Code sperren.
---------------------------------------------
http://www.heise.de/security/meldung/Immer-Aerger-mit-Samsung-Dienst-Find-M…
*** Verizon: Permaä-Cookie in manipulierten Datenpaketen ***
---------------------------------------------
Die Datenpakete der Kunden des US-Mobilfunkanbieters Verizon enthalten eine eindeutige Identifikationsnummer. Damit sollen einzelne Personen von Verizons Werbekunden identifiziert werden können. Die Aktion läuft bereits seit zwei Jahren, wurde jedoch erst jetzt aufgedeckt.
---------------------------------------------
http://www.golem.de/news/verizon-perma-cookie-in-manipulierten-datenpaketen…
*** Untersuchung: Deutlich mehr Phishing-Attacken auf Apple-Nutzer ***
---------------------------------------------
Laut einem Sicherheitsunternehmen nahmen die Angriffe auf iCloud- und iTunes-Konten im letzten Quartal um fast 250 Prozent zu.
---------------------------------------------
http://www.heise.de/security/meldung/Untersuchung-Deutlich-mehr-Phishing-At…
*** VB2014 paper: Hiding the network behind the network. Botnet proxy business model ***
---------------------------------------------
Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden.Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added Hiding the network behind the network. Botnet proxy business model ..
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_28.xml
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-10-2014 18:00 − Montag 27-10-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** OpenBSD ELF denial of service ***
---------------------------------------------
OpenBSD is vulnerable to a denial of service. A local attacker could exploit this vulnerability using a malicious ELF executable to cause a kernel panic.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/97747
*** A Tale of Two Powerpoint Vulnerabilities ***
---------------------------------------------
It's been already a week after the announcement of the CVE-2014-4114 vulnerability, and the tally of the exploiters have only increased. There are even ..
---------------------------------------------
http://www.f-secure.com/weblog/archives/00002756.html
*** Amplification DDoS attacks most popular, according to Symantec ***
---------------------------------------------
The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.
---------------------------------------------
http://www.scmagazine.com/distributed-denial-of-service-attacks-are-increas…
*** OwnCloud Dev Requests Removal From Ubuntu Repos Over Security Holes ***
---------------------------------------------
ownCloud developer Lukas Reschke has sent an email to the Ubuntu Devel mailing list, requesting that ownCloud (server) is removed from the Ubuntu repositories because the package is old and there are multiple critical security bugs for ..
---------------------------------------------
http://linux.slashdot.org/story/14/10/25/0046256/owncloud-dev-requests-remo…
*** iTunes 12.0.1 for Windows DLL Hijacking ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100154
*** Shellshock-Angriffe auf Mailserver ***
---------------------------------------------
Nach Informationen von heise Security versuchen Cyber-Kriminelle derzeit vermehrt, durch die Shellshock-Lücken in Mailserver einzudringen. Server-Betreiber sollten umgehend handeln.
---------------------------------------------
http://www.heise.de/security/meldung/Shellshock-Angriffe-auf-Mailserver-243…
*** WordPress Count-per-Day Plugin (notes.php) Remote Code Upload ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100161
*** WordPress Download Manager Plugin Arbitrary File Download ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100160
*** Sipgate und Fidor Bank: DDoS-Angriffe waren Erpressungsversuch ***
---------------------------------------------
Mit dem gross angelegten DDoS-Angriff gegen Sipgate sollte Geld erpresst werden. Auch die Fidor Bank aus München war betroffen.
---------------------------------------------
http://www.golem.de/news/sipgate-und-fidor-bank-ddos-angriffe-waren-erpress…
*** ASP Backdoors? Sure! It's not just about PHP ***
---------------------------------------------
I recently came to the realization that it might appear that we're partial to PHP and WordPress. This realization has brought about an overwhelming need to correct that perception. While they do make up an interesting percentage, there are various ..
---------------------------------------------
http://blog.sucuri.net/2014/10/asp-backdoors-its-not-all-about-php.html
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-10-2014 18:00 − Freitag 24-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Operation Pawn Storm: Putting Outlook Web Access Users at Risk ***
---------------------------------------------
In our recently released report, Operation Pawn Storm, we talked about an operation that involved three attack scenarios. For this post, we will talk about the third scenario: phishing emails that redirect victims to fake Outlook Web Access login pages. What's most notable about this is that it is simple, effective, and can be easily replicated. Through one...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/CrAgUjYrv14/
*** Has the "Sandworm" zero-day exploit burrowed back to the surface? ***
---------------------------------------------
You may have noticed that Microsoft recently published a Security Advisory that sounds a lot like the "Sandworm" vulnerability all over again. Paul Ducklin explains...
---------------------------------------------
http://nakedsecurity.sophos.com/2014/10/24/has-the-sandworm-exploit-burrowe…
*** The Insecurity of Things : Part One ***
---------------------------------------------
Everyday we read about some newfangled internet connected device being released. Things we use everyday are being made "smart" with some rushed-to-production software embedded in a cheap micro-controller. Fitness trackers, smoke alarms, televisions, cars, wall-outlets, even water-bottles. Internet connected-water bottles? What a time to be alive!
---------------------------------------------
http://www.xipiter.com/musings/the-insecurity-of-things-part-one
*** The Insecurity of Things: Part Two ***
---------------------------------------------
When we last left off, we were setting the stage for sharing what the Interns found in a handful of "IOT" or internet connected devices they purchased. So well be starting with a simple one. One that only required simple techniques to compromise it. This first device is a "Smart"-Home Controller. For a bit of background on whats going on here, please see "Part One" of this series otherwise were going to jump right in but first a disclaimer:...
---------------------------------------------
http://www.xipiter.com/musings/the-insecurity-of-things-part-two
*** The Case of the Modified Binaries ***
---------------------------------------------
After creating and using a new exitmap module, I found downloaded binaries being patched through a Tor exit node in Russia. Tor is a wonderful tool for protecting the identity of journalists, their sources, and even regular users around the world; however, anonymity does not guarantee security.
---------------------------------------------
http://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/
*** Sipgate: Dienste nach DDoS-Angriff wiederhergestellt ***
---------------------------------------------
Nachdem Sipgate über Nacht seine Dienste teilweise wiederhergestellt hatte, ist das Unternehmen am Freitagmorgen erneut einem DDoS-Angriff ausgesetzt worden. Jetzt sollen die Dienste wieder funktionieren.
---------------------------------------------
http://www.golem.de/news/sipgate-dienste-nach-ddos-angriff-wiederhergestell…
*** QuickTime-Update für Windows schließt Bündel an Sicherheitslücken ***
---------------------------------------------
Insgesamt vier Fehler steckten in der Windows-Version von Apples Multimedia-Unterstützung, die sich von Angreifern über manipulierte Dateien ausnützen lassen sollen.
---------------------------------------------
http://www.heise.de/security/meldung/QuickTime-Update-fuer-Windows-schliess…
*** Manipulating WordPress Plugin Functions to Inject Malware ***
---------------------------------------------
Most authors of website malware usually rely on the same tricks, making it easy for malware researchers to spot obfuscated code, random files that don't belong, and malicious lines injected at the top of a file. However, it can become difficult when the malware is buried deep within the lines of code on normal files.
---------------------------------------------
http://blog.sucuri.net/2014/10/manipulating-wordpress-plugin-functions-to-i…
*** Filr 1.1 - Security Update 1 ***
---------------------------------------------
Abstract: This patch addresses the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability on the Filr 1.1.0 appliance.Document ID: 5194317Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:readme-Filr-1.1.0.654.HP.txt (1.26 kB)Filr-1.1.0.654.HP.zip (5.64 MB)Products:Filr 1.1Superceded Patches: None
---------------------------------------------
https://download.novell.com/Download?buildid=3wpN2nVj2D8~
*** Filr - Security Update 3 ***
---------------------------------------------
Abstract: This patch addresses the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability on the Filr 1.0.0 and 1.0.1 appliances.Document ID: 5194316Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:readme-Filr-1.0.0-SU3.txt (2.49 kB)readme-Filr-1.0.1-SU3.txt (2.49 kB)Filr-1.0.0-SU3.zip (5.64 MB)Filr-1.0.1-SU3.zip (5.64 MB)Products:Filr 1.0Filr 1.0.1Superceded Patches: None
---------------------------------------------
https://download.novell.com/Download?buildid=_N6A9M3Jvig~
*** Cisco IOS and IOS XE Software Ethernet Connectivity Fault Management Vulnerability ***
---------------------------------------------
CVE-2014-3409
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Bugtraq: [SECURITY] [DSA 3055-1] pidgin security update ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533797
*** ZDI-14-368: Apple OS X GateKeeper Bypass Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-368/
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 21-10-2014 18:00 − Mittwoch 22-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Security Advisory 3010060 released ***
---------------------------------------------
Today, we released Security Advisory 3010060 to provide additional protections regarding limited, targeted attacks directed at Microsoft Windows customers. A cyberattacker could cause remote code execution if someone is tricked into opening a maliciously-crafted PowerPoint document that contains an infected Object Linking and Embedding (OLE) file. As part of this Security Advisory, we have included an easy, one-click Fix it solution to address the known cyberattack. Please review the...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/10/21/security-advisory-301006…
*** Android NFC hack allow users to have free rides in public transportation ***
---------------------------------------------
More and more people keep talking about the feature of payments via NFC. The problem in this particular case is that somebody reversed the "Tarjeta BIP!" cards and found a means to re-charge them for free.
---------------------------------------------
http://securelist.com/blog/virus-watch/67283/android-nfc-hack-allow-users-t…
*** SSL-Verschlüsselung: Noch viel Arbeit für Mail-Provider und Banken ***
---------------------------------------------
heise Security hat getestet und festgestellt, dass einige Mail-Provider bereits auf die jüngsten Angriffe auf Verschlüsselung reagiert haben - aber längst nicht alle. Schlimmer noch sieht es bei den Servern für das Online-Banking via HBCI aus.
---------------------------------------------
http://www.heise.de/security/meldung/SSL-Verschluesselung-Noch-viel-Arbeit-…
*** Malvertising Payload Targets Home Routers ***
---------------------------------------------
A few weeks ago we wrote about compromised websites being used to attack your web routers at home by changing DNS settings. In that scenario the attackers embedded iFrames to do the heavy lifting, the short fall with this method is they require a website to inject the iFrame. As is often the case, tacticsRead More
---------------------------------------------
http://blog.sucuri.net/2014/10/malvertising-payload-targets-home-routers.ht…
*** Gezielte Angriffe über Onlinewerbung ***
---------------------------------------------
Datendiebe haben offenbar mit manipulierter Onlinewerbung Rüstungs- und Luftfahrtkonzerne angegriffen. Die Werbung konnte über das so genannte Real Time Bidding gezielt platziert werden.
---------------------------------------------
http://www.golem.de/news/phishing-gezielte-angriffe-ueber-onlinewerbung-141…
*** Netzangriffe: DDoS-Botnetz weitet sich ungebremst aus ***
---------------------------------------------
Ein kürzlich entdecktes Botnetz für DDoS-Angriffe breitet sich nach Angaben von Experten ungehemmt aus. Inzwischen seien auch Windows-Server gefährdet. Der Zweck der darüber gefahrenen Angriffe bleibt aber unklar.
---------------------------------------------
http://www.golem.de/news/netzangriffe-ddos-botnetz-weitet-sich-ungebremst-a…
*** Hostile Subdomain Takeover using Heroku/Github/Desk + more ***
---------------------------------------------
Hackers can claim subdomains with the help of external services. This attack is practically non-traceable, and affects at least 17 large service providers and multiple domains are affected. Find out if you are one of them by using our quick tool, or go through your DNS-entries and remove all which are active and unused OR pointing to External Services which you do not use anymore.
---------------------------------------------
http://blog.detectify.com/post/100600514143/hostile-subdomain-takeover-usin…
*** TYPO3 CMS 4.5.37, 4.7.20, 6.1.12 and 6.2.6 released ***
---------------------------------------------
IMPORTANT: These versions include important security fixes to the TYPO3 core. A security announcement has just been released: http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa…
---------------------------------------------
https://typo3.org/news/article/typo3-cms-4537-4720-6112-and-626-released/
*** Security_Advisory-DLL Hijacking Vulnerability on Huawei USB Modem products ***
---------------------------------------------
Oct 21, 2014 20:23
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** IBM Security Bulletin: Vulnerability in SSLv3 affects IBM WebSphere MQ, IBM WebSphere MQ Internet Pass-Thru and IBM Mobile Messaging and M2M Client Pack (CVE-2014-3566) ***
---------------------------------------------
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled by default in IBM WebSphere MQ. CVE(s): CVE-2014-3566 Affected product(s) and affected version(s): The vulnerability affects all versions and releases of IBM WebSphere MQ, IBM WebSphere MQ Internet Pass-Thru and IBM Mobile Messaging and M2M Client Pack. ---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Bugtraq: FreeBSD Security Advisories ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533773http://www.securityfocus.com/archive/1/533772http://www.securityfocus.com/archive/1/533771http://www.securityfocus.com/archive/1/533770
*** Bugtraq: File Manager v4.2.10 iOS - Code Execution Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533778
*** Files Document & PDF Reader for iOS Ordner Erstellen code execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/97698
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 20-10-2014 18:00 − Dienstag 21-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Apple Multiple Security Updates, (Mon, Oct 20th) ***
---------------------------------------------
Apple released security update today for iOS 8 and Apple TV 7. iOS 8.1 (APPLE-SA-2014-10-20-1 iOS 8.1) is now available for iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later, to addresses the following: Bluetooth CVE-2014-4448 House Arrest CVE-2014-4448 iCloud Data Access CVE-2014-4449 Keyboards CVE-2014-4450 Secure Transport CVE-2014-3566 Apple TV 7.0.1 (APPLE-SA-2014-10-20-2 Apple TV 7.0.1) is now available for Apple TV 3rd generation and later, to address the...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18857&rss
*** Palo Alto Networks boxes spray firewall creds across the net ***
---------------------------------------------
Crummy configurations to blame, Moore hardening offered as remedy Misconfigured user identities for Palo Alto Networks firewalls are leaking onto the public web potentially exposing customer services including VPN and webmail, says security luminary HD Moore.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/10/21/palo_alto_c…
*** Download-Sicherheit: Blackberry muss App-Store nachbessern ***
---------------------------------------------
Wegen fehlender Sicherung der Downloads aus Blackberry World, dem offiziellen App Store für alle Blackberry-10-Modelle, hätte ein Angreifer ganz leicht Schadsoftware auf die Geräte schmuggeln können.
---------------------------------------------
http://www.heise.de/security/meldung/Download-Sicherheit-Blackberry-muss-Ap…
*** CSAM Month of False Positives: Ghosts in the Pentest Report, (Tue, Oct 21st) ***
---------------------------------------------
As part of most vulnerability assessments and penetration tests against a website, we almost always run some kind of scanner. Burp (commercial) and ZAP (free from OWASP) are two commonly used scanners. Once youve done a few website assessments, you start to get a feel for what pages and fields are likely candidates for exploit. But especially if its a vulnerability assessment, where youre trying to cover as many issues as possible (and exploits might even be out of scope), its always a safe bet
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18861&rss
*** Delivering Malicious Android Apps Hidden In Image Files ***
---------------------------------------------
An anonymous reader writes "Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, seemingly innocuous wrapper app. Fortinet malware researcher Axelle Apvrille and reverse engineer Ange Albertini created a custom tool they dubbed AngeCryption, which allows them to encrypt the payload Android application package (APK) and make it look like an image (PNG, JPG) file.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/mKMqgWAvhIM/story01.htm
*** Google Adds Hardware Security Key For Account Protection ***
---------------------------------------------
Google is introducing an improved two-factor authentication system for Gmail and its other services that uses a tiny hardware token that will only work on legitimate Google sites. The new Security Key system is meant to help defeat attacks that rely on highly plausible fake sites that are designed to capture users' credentials. Attackers often go...
---------------------------------------------
http://threatpost.com/google-adds-hardware-security-key-for-account-protect…
*** R7-2014-17: NAT-PMP Implementation and Configuration Vulnerabilities ***
---------------------------------------------
In the summer of 2014, Rapid7 Labs started scanning the public Internet for NAT-PMP as part of Project Sonar. NAT-PMP is a protocol implemented by many SOHO-class routers and networking devices that allows firewall and routing rules to be manipulated to enable internal, assumed trusted users behind a NAT device to allow external users to access internal TCP and UDP services for things like Apple's Back to My Mac and file/media sharing services.
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/10/21/r7-2014-1…
*** Denial-of-service attacks - short but strong ***
---------------------------------------------
DDoS amplification attacks continue to increase as attackers experiment with new protocols. Summary: DDoS amplification attacks continue to increase as attackers experiment with new protocols. read more
---------------------------------------------
http://www.symantec.com/connect/blogs/denial-service-attacks-short-strong
*** [R1] SSLv3 Protocol Vulnerability Affects Tenable Products (POODLE) ***
---------------------------------------------
October 19, 2014
---------------------------------------------
http://www.tenable.com/security/tns-2014-09
*** Vuln: Zend Framework CVE-2014-8088 Authentication Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/70378
*** DSA-3054 mysql-5.5 ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3054
*** Asterisk SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic ***
---------------------------------------------
http://www.securitytracker.com/id/1031078
*** HP Security Bulletins ***
---------------------------------------------
http://www.securityfocus.com/archive/1/533732http://www.securityfocus.com/archive/1/533733http://www.securityfocus.com/archive/1/533736http://www.securityfocus.com/archive/1/533737http://www.securityfocus.com/archive/1/533738http://www.securityfocus.com/archive/1/533739http://www.securityfocus.com/archive/1/533740http://www.securityfocus.com/archive/1/533742http://www.securityfocus.com/archive/1/533754
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 17-10-2014 18:00 − Montag 20-10-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Erneut Sicherheitsupdates für PHP ***
---------------------------------------------
Zum zweiten Mal im laufenden Monat veröffentlichten die PHP-Entwickler sicherheitsrelevante Patches für ihr Projekt. Allein im Versionszweig 5.6 haben sie vier Schwachstellen beseitigt.
---------------------------------------------
http://www.heise.de/security/meldung/Erneut-Sicherheitsupdates-fuer-PHP-242…
*** Spike in Malware Attacks on Aging ATMs ***
---------------------------------------------
This author has long been fascinated with ATM skimmers, custom-made fraud devices designed to steal card data and PINs from unsuspecting users of compromised cash machines. But a recent spike in malicious software capable of infecting and jackpotting ATMs is shifting the focus away from innovative, high-tech skimming devices toward the rapidly aging ATM infrastructure in the United States and abroad.
---------------------------------------------
http://krebsonsecurity.com/2014/10/spike-in-malware-attacks-on-aging-atms/
*** Breaking International Voicemail Security via VVM Exploitation ***
---------------------------------------------
A few days ago, I gave a presentation at Ruxcon about breaking international voicemail security. Whilst the crowd and conference were absolutely amazing - my overall research, I think has a much wider scope in the terms of whom it could affect. This blog post acts as a technical writeup and companion to my slides presented at Ruxcon. TL;DR Briefly put, through researching the visual voicemail protocol, we were able to document a number of different vulnerabilities, including some which affected...
---------------------------------------------
https://shubh.am/breaking-international-voicemail-security-via-vvm-exploita…
*** Availability of SHA-2 Hashing Algorithm for Windows 7 and Windows Server 2008 R2 ***
---------------------------------------------
V1.0 (October 14, 2014): Advisory published.
V2.0 (October 17, 2014): Removed Download Center links for Microsoft security update 2949927. Microsoft recommends that customers experiencing issues uninstall this update. Microsoft is investigating behavior associated with this update, and will update the advisory when more information becomes available.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/2949927
*** An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113) ***
---------------------------------------------
Three zero-day vulnerabilities - CVE-2014-4114, CVE-2014-4148, and CVE-2014-4113 - were reported last week and patched by Microsoft in their October 2014 Patch Tuesday. CVE-2014-4114, also known as the Sandworm vulnerability, can enable attackers to easily craft malware payloads when exploited. This particular vulnerability has been linked to targeted attacks against European sectors and industries. In addition, our researchers found that...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/vwOtSBJrH3I/
*** Smart Lock Devices: Security Risks and Opportunities ***
---------------------------------------------
Security is one of the top concerns when consumers consider buying smart devices. With cybercrime making the headlines every day, one has to think: is this smart device vulnerable to cyber attacks? Are these technologies secure enough for us to rely on them in our everyday lives? A good example of a technology that we need...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/gtATHkHYNv4/
*** Black Hat Europe - day 2 ***
---------------------------------------------
IPv6 versus IDPS, XSS in WYSIWYG editors, and reflected file downloads.After a busy first day, I was somewhat glad that the talks on the second day of Black Hat Europe appealed slightly less to my personal tastes and interests, as this gave me a chance to meet some old and new friends, and to have those conversations that perhaps form the heart of a security conference.I did attend three talks though, each of which was very interesting.Early in the morning, Antonios Atlasis, Enno Rey and Rafael...
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_20.xml?rss
*** Dropbox-Server als Phishing-Helfer ***
---------------------------------------------
Phishing-Mails verweisen meist auf dubiose Domains - nicht so in diesem Fall: Datensammler nutzen eine offizielle Dropbox-Domain, um Zugangsdaten aller Art abzugreifen.
---------------------------------------------
http://www.heise.de/security/meldung/Dropbox-Server-als-Phishing-Helfer-242…
*** Soundsquatting Unraveled: Homophone-based Domain Squatting ***
---------------------------------------------
The Domain Name System (DNS) plays a vital role in the operation of the Internet. Over the years, it has been a primary target for malicious users looking for vulnerabilities in its protocol and infrastructure. Some examples include cache poisoning attacks, vulnerable DNS server implementations, and bogus user interactions. Taking advantage of users' spelling mistakes...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/Jv_ckUgwnAs/
*** Targeted Attack Protection via Network Topology Alteration ***
---------------------------------------------
When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from various sources of intelligence, like Google, Whois, Twitter, and Facebook. They may gather data such as email addresses, IP ranges, and contact lists. These will then be used as...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/75OKb_Lt8XA/
*** Microsoft MSRT October Update, (Sun, Oct 19th) ***
---------------------------------------------
This past week Microsoft MSRT push contains detections/removals for several widely used APT tools. The coalition (led by Novetta) that brought about the inclusions of these tools in this month MSRT, are encouraging enterprises to push/execute this month MSRT update. Some of malware included in this month MSRT update have a preliminary report posted here. If you are using either Snort or Sourcefire, the ruleIDs to detect some of the threat/family in this month MSRT release are listed below and...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18853&rss
*** Staying in control of your browser: New detection changes ***
---------------------------------------------
This week we made some important changes to how we detect browser modifiers and adware. These changes are designed to better protect your browsing experience. We have already blogged about the changes to the behaviors we detect as adware. I will explain the changes to our browser modifier detections below. Our objective criteria has all the details about how and why we detect unwanted software. Unacceptable behaviors There are two new browser modifier behaviors that we detect: Bypassing
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/10/17/staying-in-control-of-yo…
*** Drupal SQL Injection Attempts in the Wild ***
---------------------------------------------
Less than 48 hours ago, the Drupal team released an update (version 7.32) for a serious security vulnerability (SQL injection) that affected all versions of Drupal 7.x. In our last post, we talked about the vulnerability and that we expected to see attacks starting very soon due to how severe and easy it was to...
---------------------------------------------
http://blog.sucuri.net/2014/10/drupal-sql-injection-attempts-in-the-wild.ht…
*** Metasploit Weekly Wrapup: POODLE Mitigations ***
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/10/17/metasploi…
*** OpenX multiple open redirect ***
---------------------------------------------
OpenX could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in the adclick.php and the ck.php scripts. By sending a specially-crafted URL, an attacker could exploit this vulnerability using the dest and _maxdest parameters to redirect a victim to arbitrary Web sites.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/97621
*** VMSA-2014-0010.13 ***
---------------------------------------------
VMware product updates address critical Bash security vulnerabilities
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
*** Rich Counter 1.1.5 - Cross Site Scripting (XSS) ***
---------------------------------------------
2014-10-18T19:45:31
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7648
*** Information Disclosure vulnerability in Dynamic Content Elements (dce) ***
---------------------------------------------
It has been discovered that the extension "Dynamic Content Elements" (dce) is susceptible to Information Disclosure.
---------------------------------------------
http://www.typo3.org/news/article/information-disclosure-vulnerability-in-d…
*** DSA-3050 iceweasel ***
---------------------------------------------
security update
---------------------------------------------
http://www.debian.org/security/2014/dsa-3050
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Service Tester (CVE-2014-4244, CVE-2014-4263) ***
---------------------------------------------
There are multiple vulnerabilities in IBM SDK Java Technology Edition, Version 7 that is used by Rational Service Tester and were disclosed as part of the IBM Java SDK updates in July 2014. CVE(s): CVE-2014-4263 and CVE-2014-4244 Affected product(s) and affected version(s): Rational Service Tester versions 8.1 - 8.6 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www.ibm.com/support/docview.wss?uid=swg21685122 X-Force
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Performance Tester (CVE-2014-4244, CVE-2014-4263) ***
---------------------------------------------
There are multiple vulnerabilities in IBM SDK Java Technology Edition, Version 7 that is used by Rational Performance Tester and were disclosed as part of the IBM Java SDK updates in July 2014. CVE(s): CVE-2014-4263 and CVE-2014-4244 Affected product(s) and affected version(s): Rational Performance Tester versions 8.1 - 8.6 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www.ibm.com/support/docview.wss?uid=swg21685121
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Sametime Classic Meeting Record and Playback File Vulnerability (CVE-2014-4766) ***
---------------------------------------------
A vulnerability in the Record and Playback (RAP) file that is exported by Classic Meeting (CVE-2014-4766). CVE(s): CVE-2014-4766 Affected product(s) and affected version(s): IBM Sametime Classic Meeting Server versions 8.0.x and 8.5.x Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21687361 X-Force Database: http://xforce.iss.net/xforce/xfdb/94793
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 16-10-2014 18:00 − Freitag 17-10-2014 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Logging SSL, (Thu, Oct 16th) ***
---------------------------------------------
With POODLE behind us, it is time to get ready for the next SSL firedrill. One of the questions that keeps coming up is which ciphers and SSL/TLS versions are actually in use. If you decide to turn off SSLv3 or not depends a lot on who needs it, and it is an important answer to have ready should tomorrow some other cipher turn out to be too weak. But keep in mind that it is not just numbers that matter. You also need to figure out who the outliers are and how important (or dangerous?) they are.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18847&rss
*** Bad news, fandroids: He who controls the IPC tool, controls the DROID ***
---------------------------------------------
A security flaw in a core message-passing mechanism leaves every Android device potentially vulnerable to attack, security researchers warned on Thursday.
The flaw relates to Binder, Android's inter-process communication (IPC) tool. The message passing mechanism for Android devices acts as a communications hub on smartphones and tablets running the Google-developed mobile OS, making it a prime target for Android malware developers.
---------------------------------------------
http://www.theregister.co.uk/2014/10/16/android_messaging_mechanism_securit…
*** SAP Netweaver Enqueue Server denial of service ***
---------------------------------------------
SAP Netweaver is vulnerable to a denial of service. By sending a specially-crafted SAP Enqueue Server packet to remote TCP port 32NN, a remote attacker could exploit this vulnerability to cause the system to become unresponsive.
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/97610
*** Close means close: New adware detection criteria ***
---------------------------------------------
In April we introduced the rules that software developers should follow when creating advertisements to avoid being detected by Microsoft security products as adware. These rules are designed to keep our customers in control of their Internet browsing experience. Since then, we have had great success working with some companies through our developer contact process. At the same time we have started to see other advertising programs trying to bend and even circumvent our rules.
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/10/16/close-means-close-new-ad…
*** Siemens RuggedCom ROX-based Devices Certificate Verification Vulnerability (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-14-135-03 Siemens RuggedCom ROX-Based Devices Certificate Verification Vulnerability that was published May 15, 2014, on the NCCIC/ICS-CERT web site. This advisory provides mitigation details for an incorrect certificate verification in Siemens RuggedCom ROX based devices.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-135-03A
*** Siemens OpenSSL Vulnerabilities (Update F) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-14-198-03E Siemens OpenSSL Vulnerabilities that was published October 15, 2014, on the NCCIC/ICS-CERT web site.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-198-03F
*** IOServer Resource Exhaustion Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an out of bound read vulnerability in the IOServer application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-289-01
*** Fox DataDiode Proxy Server CSRF Vulnerability ***
---------------------------------------------
This advisory was originally posted to the US-CERT secure Portal library on September 26, 2014, and is being released to the ICS-CERT web site. This advisory provides mitigation details for a Cross-Site Request Forgery (CSRF) in the proxy server web administration interface for the Fox DataDiode Appliance Proxy Server.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-269-02
*** Black Hat Europe - day 1 ***
---------------------------------------------
Programme packed with interesting talks.Though the prestige of Black Hat Europe doesnt compare to that of its American parent conference, and the event certainly doesnt dominate the debate on Twitter in quite the same way, more than 800 security experts descended on Amsterdam this week where, in the RAI Convention Centre, the 14th edition of Black Hat Europe is taking place.The conference opened with a keynote from Adi Shamir (perhaps still best known as the S in the RSA protocol) on side
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_17.xml?rss
*** Abusing TZ for fun (and little profit) ***
---------------------------------------------
Topic: Abusing TZ for fun (and little profit) Risk: Low Text: By default, sudo preserves the TZ variable[1] from users environment. This is a bad idea on glibc systems, where TZ can be abused to trick the program to read an arbitrary file.
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014100107
*** Denial of Service vulnerability in extension Calendar Base (cal) ***
---------------------------------------------
It has been discovered that the extension "Calendar Base" (cal) is susceptible to Denial of Service.
---------------------------------------------
http://www.typo3.org/news/article/several-vulnerabilities-in-extension-cale…
*** Hacking Smart Electricity Meters To Cut Power Bills ***
---------------------------------------------
Smart devices are growing at an exponential pace with the increase in connecting devices embedded in cars, retail systems, refrigerators, televisions and countless other things people use in their everyday life, but security and privacy are the key issues for such applications, which still face some enormous number of challenges.
---------------------------------------------
http://thehackernews.com/2014/10/hacking-smart-electricity-meters-to-cut.ht…
*** Apple Updates (not just Yosemite), (Fri, Oct 17th) ***
---------------------------------------------
Apple yesterday released the latest version of its operating system, OS X 10.10 Yosemite. As usual, the new version of the operating system does include a number of security related bug fixes, and Apple released these fixes for older versions of OS X today. This update, Security Update 2014-005 is available for versions of OS X back to 10.8.5 (Mountain Lion). Among the long list of fixes, here a couple of highlights: Apple doesnt turn off SSLv3 in this release, but restricts it to non-CBC
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18851&rss
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 15-10-2014 18:00 − Donnerstag 16-10-2014 18:00
Handler: Robert Waldner
Co-Handler: Otmar Lendl
*** Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software ***
---------------------------------------------
cisco-sa-20141015-vcs
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability ***
---------------------------------------------
cisco-sa-20141015-poodle
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** JSA10656 - 2014-10 Out of Cycle Security Bulletin: Multiple products affected by SSL "POODLE" vulnerability (CVE-2014-3566) ***
---------------------------------------------
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10656&actp=RSS
*** SA-CONTRIB-2014-098 - CKEditor - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-098Project: CKEditor - WYSIWYG HTML editor (third-party module)Version: 6.x, 7.xDate: 2014-October-15Security risk: 16/25 ( Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescriptionThe CKEditor module (and its predecessor, FCKeditor module) allows Drupal to replace textarea fields with CKEditor 3.x/4.x (FCKeditor 2.x in case of FCKeditor module) - a visual HTML editor, sometimes called WYSIWYG editor.Both
---------------------------------------------
https://www.drupal.org/node/2357029
*** [DSA 3052-1] wpa security update ***
---------------------------------------------
CVE ID : CVE-2014-3686 Jouni Malinen discovered an input sanitization issue in the wpa_cli and hostapd_cli tools included in the wpa package. A remote wifi system within range could provide a crafted string triggering arbitrary code execution running with privileges of the affected wpa_cli or hostapd_cli process.
---------------------------------------------
https://lists.debian.org/debian-security-announce/2014/msg00238.html
*** The October 2014 issue of our SWITCH Security Report is available! ***
---------------------------------------------
A new issue of our monthly SWITCH Security Report has just been released. The topics covered in this report are: Same again? Fingerprint sensor on new iPhone 6 hacked using same method as for previous model Up in the air:
---------------------------------------------
http://securityblog.switch.ch/2014/10/15/the-october-2014-issue-of-our-swit…
*** MindshaRE: Statically Extracting Malware C2s Using Capstone Engine ***
---------------------------------------------
I decided to share a technique I've been playing around with to pull C2 and other configuration information out of malware that does not store all of its configuration information in a set structure or in the resource section ... Being able to statically extract this information becomes important in the event that the malware does not run properly in your sandbox, the C2s are down or you don?t have thetime / sandbox bandwidth to manually run and extract the information from network indicators.
---------------------------------------------
https://www.arbornetworks.com/asert/2014/10/mindshare-statically-extracting…
*** C&C Botnet Detection over SSL ***
---------------------------------------------
...we have designed, implemented and validated a method to detect botnet C&C communication channels over SSL, the security protocol standard de-facto. ... Our analysis also indicates that 0.6% of the SSL connections were broken.
---------------------------------------------
http://essay.utwente.nl/65667/1/Riccardo_Bortolameotti_MasterThesis.pdf
*** VB2014 paper: DNSSEC - how far have we come? ***
---------------------------------------------
Nick Sullivan describes how DNSSEC uses cryptography to add authentication and integrity to DNS responses.Over the next months, we will be sharing conference papers as well as video recordings of the presentations. Today, we have added DNSSEC - how far have we come? by CloudFlares Nick Sullivan.It is rather scary to think about how much of the Internet depends on DNS, and how little guarantee that protocol provides about its responses being correct. The Kaminsky attack is well mitigated these
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_16.xml?rss
*** Factsheet Vulnerability in libxml2 ***
---------------------------------------------
On 16 October 2014, a vulnerability was reported in libxml2, a library for the processing of eXtensible Markup Language (XML). XML is a language for the exchange of structured information between applications. Attackers can use this vulnerability to disrupt the availability of (web) applications through a so called Denial-of-Service (DoS) attack.
---------------------------------------------
http://www.ncsc.nl/english/services/expertise-advice/knowledge-sharing/fact…
*** POODLE attack takes bytes out of your encrypted data - heres what to do ***
---------------------------------------------
Heartbleed, Shellshock, Sandworm...and now POODLE. Its a security hole that could let crooks read your encrypted web traffic. Paul Ducklin takes you through how it works, and what you can do to avoid it, in plain (well, plain-ish) English...
---------------------------------------------
http://feedproxy.google.com/~r/nakedsecurity/~3/nyUmrkuhxuM/
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 14-10-2014 18:00 − Mittwoch 15-10-2014 18:00
Handler: Robert Waldner
Co-Handler: Otmar Lendl
*** Accessing Risk for the October 2014 Security Updates ***
---------------------------------------------
Today we released eight security bulletins addressing 24 unique CVE's. Three bulletins have a maximum severity rating of Critical, and five have a maximum severity rating of Important. This table is designed to help you prioritize the deployment of updates appropriately for your environment. Bulletin Most likely attack vector Max Bulletin Severity Max exploitability Platform mitigations and key notes MS14-058 (Kernel mode drivers [win32k.sys]) Attacker loads a malicious
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-oc…
*** MS14-OCT - Microsoft Security Bulletin Summary for October 2014 - Version: 1.0 ***
---------------------------------------------
This bulletin summary lists security bulletins released for October 2014.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-OCT
*** More Details About CVE-2014-4073 Elevation of Privilege Vulnerability ***
---------------------------------------------
Today Microsoft shipped MS14-057 to the .NET Framework in order to resolve an Elevation of Privilege vulnerability in the ClickOnce deployment service. While this update fixes this service, developers using Managed Distributed Component Object Model (a .NET wrapped around DCOM) need to take immediate action to ensure their applications are secure. Managed DCOM is an inherently unsafe way to perform communication between processes of different trust levels. Microsoft recommends moving
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2014/10/14/more-details-about-cve-20…
*** BlackBerry 10 Devices Open to Bug That Allows Malicious App Installation ***
---------------------------------------------
BlackBerry has patched a vulnerability in its BlackBerry 10 devices that could allow an attacker to intercept users' traffic to and from the BlackBerry World app store and potentially install malware on a targeted device. The vulnerability is a weakness in the integrity checking system that BlackBerry uses to verify the apps that users download.
---------------------------------------------
http://threatpost.com/blackberry-10-devices-open-to-bug-that-allows-malicio…
*** An Analysis of Windows Zero-day Vulnerability "CVE-2014-4114" aka "Sandworm" ***
---------------------------------------------
Prior to the release of Microsoft's monthly patch Tuesday, a new zero-day exploiting Windows vulnerability covered in CVE-2014-4114 was reported by iSight. The said vulnerability affects desktop and server versions of Vista and Sever 2008 to current versions. It was believed to be associated in cyber attacks related to NATO by Russian cyber espionage group.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/jSCRsk2zaNU/
*** Analysis of Linux Backdoor Used In Freenode Hack ***
---------------------------------------------
An anonymous reader writes "A detailed analysis has been done of the Linux backdoor used in the freenode hack. It employed port knocking and encryption to provide security against others using it. This seems a little more sophisticated than your average black-hat hacker. Read more of this story at Slashdot.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/K3FWymutqls/story01.htm
*** Siemens OpenSSL Vulnerabilities (Update D) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-14-198-03C Siemens OpenSSL Vulnerabilities that was published August 21, 2014, on the NCCIC/ICS-CERT web site. This updated advisory provides mitigation details for vulnerabilities in the Siemens OpenSSL cryptographic software library affecting several Siemens industrial products.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-198-03D
*** Oracle stopft kritische Lücken in Java ***
---------------------------------------------
Oracle hat mit seinem Oktober-Update 154 Sicherheitsupdates veröffentlicht, die fast alle Produkte des Unternehmens abdecken. Aber besonders die Sicherheitsupdates für Java sollten laut der Firma so schnell wie möglich installiert werden.
---------------------------------------------
http://www.heise.de/security/meldung/Oracle-stopft-kritische-Luecken-in-Jav…
*** Security Advisory 3009008 released ***
---------------------------------------------
Today, we released Security Advisory 3009008 to address a vulnerability in Secure Sockets Layer (SSL) 3.0 which could allow information disclosure. This is an industry-wide vulnerability that affects the protocol itself, and is not specific to Microsoft's implementation of SSL or the Windows operating system. This advisory provides guidance for customers so that they can disable SSL 3.0 in the browser. Customers should be aware that once they disable SSL 3.0, if they visit a website that
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-300900…
*** October 2014 Updates ***
---------------------------------------------
Today, as part of Update Tuesday, we released eight security updates three rated Critical and five rated Important - to address 24 Common Vulnerabilities & Exposures (CVEs) in Windows, Office, .NET Framework, .ASP.NET, and Internet Explorer (IE). We encourage you to apply all of these updates, but for those who need to prioritize deployment planning, we recommend focusing on the Critical updates first. Here's an overview slide and video of the security updates released today:
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/10/14/october-2014-updates.aspx
*** [2014-10-15] Potential Cross-Site Scripting in ADF Faces ***
---------------------------------------------
The Oracle ADF Faces framework fails to encode certain characters in the goButton component. This may lead to Cross-Site Scripting vulnerabilities in applications that use this component.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Bugtraq: two browser mem disclosure bugs (CVE-2014-1580 and CVE-something-or-other) ***
---------------------------------------------
two browser mem disclosure bugs (CVE-2014-1580 and CVE-something-or-other)
---------------------------------------------
http://www.securityfocus.com/archive/1/533692
*** Java Reflection API Woes Resurface in Latest Oracle Patches ***
---------------------------------------------
Oracles Critical Patch update addresses 154 vulnerabilities, many of which are remotely exploitable. Security Explorations of Poland, meanwhile, published details on a number of Java flaws in the Java Reflection API.
---------------------------------------------
http://threatpost.com/java-reflection-api-woes-resurface-in-latest-oracle-p…
*** Bugtraq: Multiple Cross-Site Scripting (XSS) in WP Google Maps WordPress Plugin ***
---------------------------------------------
Multiple Cross-Site Scripting (XSS) in WP Google Maps WordPress Plugin
---------------------------------------------
http://www.securityfocus.com/archive/1/533699
*** Bugtraq: Paypal Inc MultiOrderShipping API - Filter Bypass & Persistent XML Vulnerability ***
---------------------------------------------
Paypal Inc MultiOrderShipping API - Filter Bypass & Persistent XML Vulnerability
---------------------------------------------
http://www.securityfocus.com/archive/1/533698
*** OpenSSL Releases OpenSSL 1.0.1j, 1.0.0o and 0.9.8zc, (Wed, Oct 15th) ***
---------------------------------------------
This update to the OpenSSL Library addresses 3 vulnerabilities. One of these is the POODLE vulnerability announced yesterday. CVE-2014-3513: A memory leak in parsing DTLS SRTPmessages can lead to a denial of service. You are vulnerable, unless you specificly compiled your OpenSSL library with the OPENSSL_NO_SRTP option. All 1.0.1 versions of OpenSSL are affected. CVE-2014-3567: Another memory leak that can lead to a DoS attack. In this case, memory is not free up if an SSL session ticket fails
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=18835&rss
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 13-10-2014 18:00 − Dienstag 14-10-2014 18:00
Handler: Stefan Lenzhofer
Co-Handler: Otmar Lendl
*** Developer of hacked Snapchat web app says "Snappening" claims are hoax ***
---------------------------------------------
500 MB of images pulled from third-party site, but no user data was attached.
---------------------------------------------
http://arstechnica.com/security/2014/10/developer-of-hacked-snapchat-web-ap…
*** VB2014 paper: The evolution of webinjects ***
---------------------------------------------
Jean-Ian Boutin looks at the increased commoditization of webinjects.Virus Bulletin has always been about sharing information, and the Virus Bulletin conference is an important part of that. We would love to be able to share some of the discussions attendees had during the lunch and coffee breaks, the late-night or early-morning meetings in the hotel lobby, and the inspiration one gets from being around such bright minds.Of course, we are unable to do that. But what we can do is share some of
---------------------------------------------
http://www.virusbtn.com/blog/2014/10_13.xml?rss
*** Cisco AsycnOS Software ZIP Filtering By-Pass Vulnerability ***
---------------------------------------------
CVE-2014-3381
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Exploring and Exploiting iOS Web Browsers ***
---------------------------------------------
Today we begin a three-post series about mobile security. We start with a discussion of vulnerabilities in iOS web browsers. Later this week well cover jailbreaking and the detection of it. While the release and adoption of iOS 8 may plug some of the holes discussed in this post, many users will continue to use iOS 7 for some time and may remain vulnerable. In Q1 2014, the market share of web traffic from mobile browsers exceeded 30% [1], and it is constantly growing. According to data provided
---------------------------------------------
http://blog.spiderlabs.com/2014/10/exploring-and-exploiting-ios-web-browser…
*** VMSA-2014-0010.12 ***
---------------------------------------------
VMware product updates address critical Bash security vulnerabilities
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
*** A Code Signature Plugin for IDA ***
---------------------------------------------
When reversing embedded code, it is often the case that completely different devices are built around a common code base, either due to code re-use by the vendor, or through the use of third-party software; this is especially true of devices running the same Real Time Operating System. For example, ...
---------------------------------------------
http://www.devttys0.com/2014/10/a-code-signature-plugin-for-ida/
*** vBulletin Input Validation Flaw in XMLRPC API Lets Remote Users Inject SQL Commands ***
---------------------------------------------
vBulletin Input Validation Flaw in XMLRPC API Lets Remote Users Inject SQL Commands
---------------------------------------------
http://www.securitytracker.com/id/1031001
*** vBulletin Input Validation Flaw in XMLRPC API Permits Cross-Site Scripting Attacks ***
---------------------------------------------
vBulletin Input Validation Flaw in XMLRPC API Permits Cross-Site Scripting Attacks
---------------------------------------------
http://www.securitytracker.com/id/1031000
*** iSIGHT discovers zero-day vulnerability CVE-2014-4114 ***
---------------------------------------------
Zero-day impacting all versions of Microsoft Windows used in Russian cyber-espionage campaign targeting NATO, European Union, Telecommunications and Energy sectors.
---------------------------------------------
http://www.isightpartners.com/2014/10/cve-2014-4114/
*** HTTPS-Zertifikate: Key Pinning schützt vor bösartigen Zertifizierungsstellen ***
---------------------------------------------
Eine bislang wenig beachtete HTTPS-Erweiterung mit dem Namen HTTP Public Key Pinning (HPKP) steht kurz vor ihrer Standardisierung. Durch Public Key Pinning könnten viele Probleme mit den Zertifizierungsstellen gelöst werden. (Google, Browser)
---------------------------------------------
http://www.golem.de/news/https-zertifikate-key-pinning-schuetzt-vor-boesart…
*** Windows-Exploit: Russische Hacker greifen angeblich Nato und Regierungen an ***
---------------------------------------------
Russische Hacker sollen in den vergangenen Jahren zahlreiche Ziele im Westen und in der Ukraine angegriffen haben. Sie nutzten dabei offenbar eine Sicherheitslücke aus, die in allen aktuellen Windows-Versionen bestehen und am Dienstag gepatcht werden soll. (Microsoft, Datenschutz)
---------------------------------------------
http://www.golem.de/news/windows-exploit-russische-hacker-greifen-angeblich…
*** Truly scary SSL 3.0 vuln to be revealed soon: sources ***
---------------------------------------------
So worrying, no ones breathing a word until patch is out Gird your loins, sysadmins: The Register has learned that news of yet another major security vulnerability - this time in SSL 3.0 - is probably imminent.
---------------------------------------------
http://www.theregister.co.uk/2014/10/14/nasty_ssl_30_vulnerability_to_drop_…
*** Angeblich 7 Millionen Dropbox-Passwörter im Umlauf ***
---------------------------------------------
Hacker wollen Millionen von Passwörtern für Dropbox-Accounts abgegriffen haben. Diese sollen gegen Bitcoins nun veröffentlicht werden. Dropbox streitet ab, dass die Daten echt sind.
---------------------------------------------
http://www.heise.de/security/meldung/Angeblich-7-Millionen-Dropbox-Passwoer…
*** VeraCrypt a Worthy TrueCrypt Alternative ***
---------------------------------------------
If youre reluctant to continue using TrueCrypt now that the open source encryption project has been abandoned, and you dont want to wait for the CipherShed fork to mature, one alternative thats well worth investigating is VeraCrypt.
---------------------------------------------
http://www.esecurityplanet.com/open-source-security/veracrypt-a-worthy-true…
*** Apache mod_cache Null Pointer Dereference Lets Remote Users Deny Service ***
---------------------------------------------
Apache mod_cache Null Pointer Dereference Lets Remote Users Deny Service
---------------------------------------------
http://www.securitytracker.com/id/1031005
*** Analysis of the Linux backdoor used in freenode IRC network compromise ***
---------------------------------------------
Background freenode is a large IRC network providing services to Free and Open Source Software communities, and in September the freenode staff team blogged about a potential compromise of an IRC server. NCC Group's Cyber Defence Operations team provided pro bono digital forensic and reverse engineering services to assist the freenode infrastructure team with their incident response activities. In this post we discuss a subset of the information we documented about one of the components
---------------------------------------------
https://www.nccgroup.com/en/blog/2014/10/analysis-of-the-linux-backdoor-use…
*** [webapps] - Bosch Security Systems DVR 630/650/670 Series - Multiple Vulnerabilities ***
---------------------------------------------
Bosch Security Systems DVR 630/650/670 Series - Multiple Vulnerabilities
---------------------------------------------
http://www.exploit-db.com/exploits/34956
*** YouTube Ads Lead To Exploit Kits, Hit US Victims ***
---------------------------------------------
Malicious ads are a common method of sending users to sites that contain malicious code. Recently, however, these ads have showed up on a new attack platform: YouTube. Over the past few months, we have been monitoring a malicious campaign that used malicious ads to direct users to various malicious sites. Users in the United States have ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/youtube-ads-lead…
*** IBM Security Bulletin: Vulnerabilities in Bash affect IBM SAN b-type Switches (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278) ***
---------------------------------------------
Six Bash vulnerabilities were disclosed in September 2014. This bulletin addresses the vulnerabilities that have been referred to as "Bash Bug" or "Shellshock" and two memory corruption vulnerabilities. Bash is used by IBM SAN b-type Switches. CVE(s): CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278 Affected product(s) and affected version(s): IBM MTM: 2499-816 IBM System
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Endpoint Manager for Remote Control. CVE-2014-3511, CVE-2014-5139 ***
---------------------------------------------
There are multiple vulnerabilities in OpenSSL that is used by IBM Endpoint Manager for Remote Control. These issues were disclosed on August 6, 2014 by the OpenSSL Project. CVE(s): CVE-2014-3511 and CVE-2014-5139 Affected product(s) and affected version(s): IBM Endpoint Manager for Remote Control version 9.1.0. Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21682034 X-Force
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime, affect IBM Endpoint Manager for Remote Control ***
---------------------------------------------
There are multiple vulnerabilities in IBM SDK Java Technology Edition, Version 7 Service Refresh 7 and earlier, and IBM Runtime Environment Java Technology Edition, Version 7 Service Refresh 7 and earlier, that is used by IBM Endpoint Manager for Remote Control. These issues were disclosed as part of the IBM Java SDK updates in July 2014. CVE(s): CVE-2014-3086, CVE-2014-4227, CVE-2014-4262, CVE-2014-4219, CVE-2014-4209, CVE-2014-4220,
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** IBM Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 7.0.0.35 ***
---------------------------------------------
Cross reference list for security vulnerabilites fixed in IBM WebSphere Application Server 7.0.0.35, IBM WebSphere Application Server Hypervisor 7.0.0.35 and IBM HTTP Server 7.0.0.35. CVE(s): CVE-2014-3021, CVE-2014-3083, CVE-2014-0226, CVE-2014-0231, CVE-2014-0118, CVE-2013-5704, CVE-2014-4770 and CVE-2014-4816 Affected product(s) and affected version(s): Version 8.5 Full Profile and Liberty Profile Version 8 Version 7 Refer to the following reference URLs for remediation and
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Jailbreak Detection Methods ***
---------------------------------------------
This post concludes our three-part series about mobile security. Todays post will outline some options for detecting jailbroken devices, should you choose to do so. Yesterday, we asked whether blocking an apps execution on jailbroken devices was worth it. Earlier this week, we described some vulnerabilities in iOS web browsers. Many iOS applications contain some sort of jailbreak detection mechanism. Some of the detection mechanisms can be bypassed by attackers (sometimes easily), whereas
---------------------------------------------
http://blog.spiderlabs.com/2014/10/jailbreak-detection-methods.html
*** Executing Apps on Jailbroken Devices ***
---------------------------------------------
This post is part two of a three-part series about mobile security. Todays post will discuss the execution of apps on jailbroken devices. Yesterday, we described some vulnerabilities in iOS web browsers. Tomorrow, well explore detecting jailbroken devices.
---------------------------------------------
http://blog.spiderlabs.com/2014/10/executing-apps-on-jailbroken-devices.html
*** 5 steps to lock down your webmail account ***
---------------------------------------------
For most people Gmail, Outlook.com or Yahoo! Mail is their main personal account. Here are some of the most important steps to keep unwanted people out of your web-based email account.
---------------------------------------------
http://nakedsecurity.sophos.com/2014/10/14/5-steps-to-lock-down-your-webmai…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 10-10-2014 18:00 − Montag 13-10-2014 18:00
Handler: Stefan Lenzhofer
Co-Handler: Otmar Lendl
*** Poor punctuation leads to Windows shell vulnerability ***
---------------------------------------------
An attack on Windows scripts shows that quotation marks aren't just for writers.
---------------------------------------------
http://arstechnica.com/security/2014/10/poor-punctuation-leads-to-windows-s…
*** Researchers observe new type of SYN flood DDoS attack ***
---------------------------------------------
Researchers with Radware are referring to the new type of distributed denial-of-service attack as a Tsunami SYN Flood Attack.
---------------------------------------------
http://www.scmagazine.com/researchers-observe-new-type-of-syn-flood-ddos-at…
*** IBM Security Bulletin: Vulnerabilities in Bash affect IBM SDN VE (CVE-2014-6271,CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278) ***
---------------------------------------------
Six Bash vulnerabilities were disclosed in September 2014. This bulletin addresses the vulnerabilities that have been referred to as "Bash Bug"? or "Shellshock"? and two memory corruption vulnerabilities. Bash is used by IBM SDN VE. CVE(s): CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278 Affected product(s) and affected version(s): IBM SDN VE, Unified Controller, VMware Edition: 1.2.0
---------------------------------------------
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin…
*** Malware overview: Threats to Mac OS X and other IT security hazards of September 2014 ***
---------------------------------------------
October 2, 2014 In September, a number of new threats to Mac OS X were discovered by Doctor Webs security researchers. They included the complex backdoor Mac.BackDoor.iWorm as well as the Trojan Mac.BackDoor.Ventir.1 and the spyware program Mac.BackDoor.XSLCmd. Unexpectedly, gamers came under attack by Trojan.SteamBurglar which steals virtual game items from Steam users to later resell them to other players. As usual, plenty of virus definitions for malware programs geared towards Windows were
---------------------------------------------
http://news.drweb.com/show/?i=5982&lng=en&c=9
*** Androids Cyanogenmod open to MitM attacks ***
---------------------------------------------
Code re-use spells zero day for millions of modders More than 10 million users of the popular Cyanogen build of Android are exposed to man-in-the-middle (MitM) attacks thanks to reuse of vulnerable sample code.
---------------------------------------------
http://www.theregister.co.uk/2014/10/13/androids_cyanogenmod_open_to_mitm_a…
*** Adobe, Microsoft, Oracle: Oktober-Patchtag wird aufwendiger als sonst ***
---------------------------------------------
Adobe, Microsoft und Oracle werden am kommenden Dienstagabend zahlreiche Patches veröffentlichen: Der Oktober-Patchtag bei allen drei Unternehmen überschneidet sich. Einerseits entlastet dies die Admins, andererseits müssen sie sich auf eine größere Patch-Menge einstellen. (Microsoft, Java)
---------------------------------------------
http://www.golem.de/news/adobe-microsoft-oracle-oktober-patchtag-wird-aufwe…
*** WordPress is the Most Attacked CMS: Report ***
---------------------------------------------
Data security firm Imperva released its fifth annual Web Application Attack report (WAAR) this week, a study designed track the latest trends and cyber threats facing web applications.
---------------------------------------------
http://www.securityweek.com/wordpress-most-attacked-cms-report
*** SSA-860967 (Last Update 2014-10-13): GNU Bash Vulnerabilities in Siemens Industrial Products ***
---------------------------------------------
SSA-860967 (Last Update 2014-10-13): GNU Bash Vulnerabilities in Siemens Industrial Products
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** SSA-234763 (Last Update 2014-10-13): OpenSSL Vulnerabilities in Siemens Industrial Products ***
---------------------------------------------
SSA-234763 (Last Update 2014-10-13): OpenSSL Vulnerabilities in Siemens Industrial Products
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** SSA-839231 (Last Update 2014-10-13): Incorrect Certificate Verification in Ruggedcom ROX-based Devices ***
---------------------------------------------
SSA-839231 (Last Update 2014-10-13): Incorrect Certificate Verification in Ruggedcom ROX-based Devices
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** PHP 5.6.1 schlie�t potentiell gef�hrlichen Puffer�berlauf ***
---------------------------------------------
Die aktuelle PHP-Version behebt eine Reihe von Bugs, darunter auch eine von Stefan Esser entdeckte Sicherheitslücke. Diese ist einfach auszunutzen und kann missbraucht werden, um aus der Ferne Schadcode auszuführen.
---------------------------------------------
http://www.heise.de/security/meldung/PHP-5-6-1-schliesst-potentiell-gefaehr…
*** Mobile threats in September 2014 ***
---------------------------------------------
October 2, 2014 As in previous months, in September Doctor Webs security researchers registered multiple attacks on handhelds. In particular, the Dr.Web virus database was expanded to include numerous definitions of threats to Android involving banking Trojans, ransomware, spies, and even a dangerous vandal Trojan, among others. Also added to the database was an entry for another malicious application that operates on jailbroken devices. The number of new malicious programs for Android and
---------------------------------------------
http://news.drweb.com/show/?i=5983&lng=en&c=9
*** FinFisher Malware Analysis - Part 3 (Last) ***
---------------------------------------------
I've already covered most parts of FinFisher malware in last two articles. This time, in this article, which is last article related to FinFisher, I'll cover last important tricks, methods and techniques used by FinFisher. So I'll make categorize them by subject:...
---------------------------------------------
https://www.codeandsec.com/FinFisher-Malware-Analysis-Part-3
*** Who�s Watching Your WebEx? ***
---------------------------------------------
KrebsOnSecurity spent a good part of the past week working with Cisco to alert more than four dozen companies -- many of them household names -- about regular corporate WebEx conference meetings that lack passwords and are thus open to anyone who wants to listen in.
---------------------------------------------
http://krebsonsecurity.com/2014/10/whos-watching-your-webex
*** Kmart becomes the latest retail data breach victim ***
---------------------------------------------
Kmart has been confirmed as the latest retail chain to be breached after its parent company admitted that some customers� debit and credit card numbers had been compromised.
---------------------------------------------
http://nakedsecurity.sophos.com/2014/10/13/kmart-becomes-the-latest-retail-…