=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 27-09-2018 18:00 − Freitag 28-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ New Iot Botnet Torii Uses Six Methods for Persistence, Has No Clear Purpose ∗∗∗
---------------------------------------------
Security researchers discovered a new IoT botnet that is in a league superior to the Mirai variants ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-iot-botnet-torii-uses-si…
∗∗∗ Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV ∗∗∗
---------------------------------------------
Removing the need for files is the next progression of attacker techniques. While fileless techniques used to be employed almost exclusively in sophisticated cyberattacks, they are now becoming widespread in common malware, ..
---------------------------------------------
https://cloudblogs.microsoft.com/microsoftsecure/2018/09/27/out-of-sight-bu…
∗∗∗ Credential Leak Flaws in Windows PureVPN Client ∗∗∗
---------------------------------------------
Using a VPN (Virtual Private Network) can bring many advantages, particularly when you want to ..
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/Credential-Leak-Flaws-in-Wi…
∗∗∗ DNSSEC Key Signing Key Rollover ∗∗∗
---------------------------------------------
Original release date: September 27, 2018 On October 11, 2018, the Internet Corporation for Assigned Names and Numbers (ICANN) will be changing the Root Zone Key Signing Key (KSK) used in the Domain Name System (DNS) Security ..
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/09/27/DNSSEC-Key-Signing…
∗∗∗ [SANS ISC] More Excel DDE Code Injection ∗∗∗
---------------------------------------------
I published the following diary on isc.sans.edu: “More Excel DDE Code Injection“: The “DDE code injection” technique is not brand new. DDE stands for “Dynamic Data Exchange”. It has already been discussed by many security researchers. Just a quick ..
---------------------------------------------
https://blog.rootshell.be/2018/09/28/sans-isc-more-excel-dde-code-injection/
∗∗∗ Stellungnahme des BSI zur Schadsoftware "LoJax" ∗∗∗
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/LoJax-Schad…
=====================
= Vulnerabilities =
=====================
∗∗∗ Emerson AMS Device Manager ∗∗∗
---------------------------------------------
This advisory includes mitigations for improper access control and improper privilege management vulnerabilities in the Emerson AMS Device Manager software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-270-01
∗∗∗ Fuji Electric Alpha5 Smart Loader ∗∗∗
---------------------------------------------
This advisory includes information on classic buffer overflow and heap-based buffer overflow vulnerabilities in Fuji Electrics Alpha5 Smart Loader servo drive.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-270-02
∗∗∗ Fuji Electric FRENIC Devices ∗∗∗
---------------------------------------------
This advisory includes information on buffer over-read, out-of-bounds read, and stack-based buffer overflow vulnerabilities in Fuji Electrics FRENIC HVAC drive devices.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-270-03
∗∗∗ OpenSSH vulnerability CVE-2018-15473 ∗∗∗
---------------------------------------------
OpenSSH vulnerability CVE-2018-15473. Security Advisory. Security Advisory Description. OpenSSH through 7.7 is prone ...
---------------------------------------------
https://support.f5.com/csp/article/K28942395
∗∗∗ ZDI-18-1093: Delta Industrial Automation PMSoft rtl60 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1093/
∗∗∗ Foxit Reader, Foxit PhantomPDF: Mehrere Schwachstellen ermöglichen u. a. die Ausführung beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1972/
∗∗∗ IBM Security Bulletin: PowerKVM has released fixes in response to the vulnerabilities known as Foreshadow ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10733108
∗∗∗ IBM Security Bulletin: Security Misconfiguration during Combined Cumulative Fix Installation Affects IBM WebSphere Portal (CVE-2018-1420) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22014276
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 25-09-2018 18:00 − Mittwoch 26-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Der nächste Meilenstein: [CERT.at #1000000] ∗∗∗
---------------------------------------------
Für unsere Kommunikation per E-Mail verwenden wir (wie viele Firmen) ein Ticketsystem, damit a) die Kommunikation für alle Teammitglieder nachvollziehbar ist, dass b) möglichst keine Anfragen unbeantwortet bleiben und c) der Workflow mit Meldung/Vorfall/Nachforschung abgebildet werden kann.
---------------------------------------------
http://www.cert.at/services/blog/20180926100651-2293.html
∗∗∗ Nach Safari und Chrome: Firefox ins Jenseits befördern ∗∗∗
---------------------------------------------
Mit einem präparierten Link kann Mozillas Firefox zum Absturz gebracht werden. Ähnliches hat ein Sicherheitsforscher zuvor mit Apples Safari und Googles Chrome gezeigt. Auf einer Webseite sammelt er die Lücken - mitsamt Absturz-Button.
---------------------------------------------
https://www.golem.de/news/nach-safari-und-chrome-firefox-ins-jenseits-befoe…
∗∗∗ New CVE-2018-8373 Exploit Spotted ∗∗∗
---------------------------------------------
On September 18, 2018, more than a month after we published a blog revealing the details of a use-after-free (UAF) vulnerability CVE-2018-8373 that affects the VBScript engine in newer Windows versions, we spotted another exploit that uses the same vulnerability. Its important to note that this exploit doesnt work on systems with updated Internet Explorer versions.
---------------------------------------------
https://blog.trendmicro.com/trendlabs-security-intelligence/new-cve-2018-83…
∗∗∗ Full compliance with the PCI DSS drops for the first time in six years ∗∗∗
---------------------------------------------
After documenting improvements in Payment Card Industry Data Security Standard (PCI DSS) compliance over the past six years (2010 – 2016), Verizon’s 2018 Payment Security Report (PSR) now reveals a concerning downward trend with companies failing compliance assessments and perhaps, more importantly, not maintaining – full compliance.
---------------------------------------------
https://www.helpnetsecurity.com/2018/09/26/pci-dss-compliance-drop/
∗∗∗ Gefälschte kabelplus-Phishingmail im Umlauf ∗∗∗
---------------------------------------------
Kriminelle versenden eine gefälschte kabelplus-Nachricht. Darin behaupten sie, dass „ihr Kabelplus Webmail (kabsi.at) Nachrichtenspeicher das Limit-Kontingent in unserer Datenbank erreicht“ hat. Aus diesem Grund sollen Kund/innen eine externe Website aufrufen und persönliche Daten bekannt geben. Diese übermitteln sie nicht an kabelplus, sondern an Kriminelle.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-kabelplus-phishingmail-i…
=====================
= Vulnerabilities =
=====================
∗∗∗ Magecart Attacks Grow Rampant in September ∗∗∗
---------------------------------------------
Attacks that compromise websites with scripts that steal payment card data from checkout pages have increased to hundreds of thousands of attempts in little over a month.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/magecart-attacks-grow-rampan…
∗∗∗ VU#581311: TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks ∗∗∗
---------------------------------------------
TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks
The TP-LINK EAP Controller is TP-LINKs software for remotely controlling wireless access point devices. EAP Controller for Linux lacks user authentication for RMI service commands, as well as utilizes an outdated vulnerable version of Apache commons-collections, which may allow an attacker to implement deserialization attacks and control the EAP Controller server.
---------------------------------------------
http://www.kb.cert.org/vuls/id/581311
∗∗∗ One Emotet infection leads to three follow-up malware infections, (Wed, Sep 26th) ∗∗∗
---------------------------------------------
In recent weeks, I've generally seen Emotet retrieve Trickbot, the IcedID banking Trojan, or spambot malware for its follow-up infection. I rarely see Emotet retrieve more than one type of follow-up malware. But on Tuesday 2018-09-25, my infected lab host retrieved Trickbot and IcedID immediately after an Emotet infection. Then IcedID caused another infection with AZORult on the same host.
---------------------------------------------
https://isc.sans.edu/diary/rss/24140
∗∗∗ eDirectory 9.1.1 Hot Patch 1 ∗∗∗
---------------------------------------------
This patch is an update to eDirectory 9.1 Support Pack 1 (9.1.1).
This update is being provided to resolve potential critical issues found since the latest patch
Architecture: x86-64
Security patch: Yes
Priority: Mandatory
---------------------------------------------
https://download.novell.com/Download?buildid=vP3nS-Hctkk~
∗∗∗ Stored Cross-Site Scripting in Kendo UI Editor ∗∗∗
---------------------------------------------
A cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application which allows attackers in the worst case to take over user sessions.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (python2.7 and python3.4), openSUSE (php5-smarty3), Oracle (389-ds-base, flatpak, kernel, and nss), Red Hat (389-ds-base, chromium-browser, flatpak, kernel, kernel-alt, kernel-rt, nss, and qemu-kvm-ma), and SUSE (ant, dom4j, kernel, and wireshark).
---------------------------------------------
https://lwn.net/Articles/766746/
∗∗∗ IBM Security Bulletin: Cross-Site Scripting Vulnerability Affects IBM WebSphere Portal (CVE-2018-1820) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732287
∗∗∗ IBM Security Bulletin: Security Vulnerability in Apache Batik Affects IBM WebSphere Portal (CVE-2018-8013) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731435
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK Affect IBM Algo Credit Manager ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10728567
∗∗∗ IBM Security Bulletin: Multiple Vulnerabilities in IBM Runtime Environments Java Technology Edition, Versions 7 & 8 Affect Transformation Extender ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720173
∗∗∗ IBM Security Bulletin: Open Redirect Vulnerability in IBM WebSphere Portal (CVE-2018-1736) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729683
∗∗∗ IBM Security Bulletin: Cross-Site Scripting Vulnerability in IBM WebSphere Portal (CVE-2018-1716) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729323
∗∗∗ IBM Security Bulletin: Multiple security vulnerabilities affect Liberty for Java for IBM Cloud ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10732916
∗∗∗ IBM Security Bulletin: Open Source Libvorbis, Patch and Python-paramiko vulnerabilities affect IBM Netezza Host Management ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10729297
∗∗∗ IBM Security Bulletin: Cross-Site Scripting Vulnerability in IBM WebSphere Portal (CVE-2018-1660) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10715923
∗∗∗ IBM Security Bulletin: Publicly disclosed vulnerability from BIND affect IBM Netezza Host Management ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10729637
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 24-09-2018 18:00 − Dienstag 25-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Android Trojan reads Whatsapp-Messages ∗∗∗
---------------------------------------------
A spyware still in development can read users Whatsapp-Messages and other sensitive data. G DATA researchers analysed the Malware to protect our customers.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/09/31122-android-trojan-reads-whats…
∗∗∗ OpenPGP/GnuPG: Signaturen fälschen mit HTML und Bildern ∗∗∗
---------------------------------------------
PGP-Signaturen sollen gewährleisten, dass eine E-Mail tatsächlich vom korrekten Absender kommt. Mit einem simplen Trick kann man bei vielen Mailclients scheinbar signierte Nachrichten erstellen - indem man die entsprechende Anzeige mittels HTML fälscht. (OpenPGP, E-Mail)
---------------------------------------------
https://www.golem.de/news/openpgp-gnupg-signaturen-faelschen-mit-html-und-b…
∗∗∗ Analyzing Encoded Shellcode with scdbg, (Mon, Sep 24th) ∗∗∗
---------------------------------------------
Reader Jason analyzed a malicious RTF file: using OfficeMalScanner and xorsearch he was able to extract and find the entry point of the shellcode, but scdbg was not able to emulate the shellcode.
---------------------------------------------
https://isc.sans.edu/diary/rss/24134
=====================
= Vulnerabilities =
=====================
∗∗∗ Multiple Vulnerabilities in Cisco Identity Services Engine ∗∗∗
---------------------------------------------
Cisco Identity Services Engine (ISE) contains the following vulnerabilities: Cisco ISE Authenticated Arbitrary Command Execution Vulnerability Cisco ISE Support Information Download Authentication Bypass Vulnerability These ..
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
∗∗∗ DSA-4305 strongswan - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4305
∗∗∗ ZDI-18-1083: Apple Safari Array Concat Uninitialized Buffer Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1083/
∗∗∗ ZDI-18-1082: Apple Safari Subframe Same-Origin Policy Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1082/
∗∗∗ ZDI-18-1081: Apple Safari performProxyCall Internal Object Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1081/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 21-09-2018 18:00 − Montag 24-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malware Disguised as Job Offers Distributed on Freelance Sites ∗∗∗
---------------------------------------------
Attackers are using freelance job sites such as fiverr and Freelancer to distribute malware disguised as job offers. These job offers contain attachments that pretends to be the job brief, but are actually ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malware-disguised-as-job-off…
∗∗∗ Security: Curl bekommt eigenes Bug-Bounty-Programm ∗∗∗
---------------------------------------------
Das kleine Kommandozeilenwerkzeug Curl und dessen Bibliothek finden sich in nahezu allen vernetzten Geräten. Sicherheitsforscher erhalten künftig eine Bug-Bounty, also Geld für das Auffinden von Sicherheitslücken in der ..
---------------------------------------------
https://www.golem.de/news/security-curl-bekommt-eigenes-bug-bounty-programm…
∗∗∗ Adwind Dodges AV via DDE ∗∗∗
---------------------------------------------
Cisco Talos, along with fellow cybersecurity firm ReversingLabs, recently discovered a ..
---------------------------------------------
https://blog.talosintelligence.com/2018/09/adwind-dodgesav-dde.html
∗∗∗ Security - Android: Immer mehr Hersteller liefern Sicherheits-Updates ∗∗∗
---------------------------------------------
Mittlerweile 250 Modelle mit Patch Level aus den letzten 90 Tagen – Google zahlt 3 Millionen Dollar für Bug Bounties
---------------------------------------------
https://derstandard.at/2000087981052/Android-Immer-mehr-Hersteller-liefern-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Video Surveillance Manager Appliance Default Password Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote ..
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ DSA-4301 mediawiki - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4301
∗∗∗ DSA-4302 openafs - security update ∗∗∗
---------------------------------------------
https://www.debian.org/security/2018/dsa-4302
∗∗∗ ZDI-18-1079: Cisco WebEx Network Recording Player NMVC RtpConfig Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1079/
∗∗∗ ZDI-18-1078: Cisco WebEx Network Recording Player NMVC RtpConfig Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1078/
∗∗∗ Multiple vulnerabilities in Citrix StorageZones Controller ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-cit…
∗∗∗ Security vulnerabilities fixed in Firefox ESR 60.2.1 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-23/
∗∗∗ Security vulnerabilities fixed in Firefox 62.0.2 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2018-22/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 20-09-2018 18:00 − Freitag 21-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ Unwiped Drives and Servers from NCIX Retailer for Sale on Craigslist ∗∗∗
---------------------------------------------
Servers and storage disks filled with millions of unencrypted confidential records of employees, customers ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/unwiped-drives-and-servers-f…
∗∗∗ Pre-Pwned AMI Images in Amazons AWS public instance store, (Fri, Sep 21st) ∗∗∗
---------------------------------------------
I keep getting reports about AMI images in Amazon&#;x26;#;39;s AWS, which come "pre-pwned." These images ..
---------------------------------------------
https://isc.sans.edu/diary/rss/24126
∗∗∗ AES Resulted in a $250-Billion Economic Benefit ∗∗∗
---------------------------------------------
NIST has released a new study concluding that the AES encryption standard has resulted in a $250-billion worldwide economic benefit over the past 20 years. I have no idea how to even begin to assess the quality of the ..
---------------------------------------------
https://www.schneier.com/blog/archives/2018/09/aes_resulted_in.html
∗∗∗ DanaBot shifts its targeting to Europe, adds new features ∗∗∗
---------------------------------------------
Recently, we have spotted a surge in activity of DanaBot, a stealthy banking Trojan discovered earlier this year. The malware, first observed in campaigns targeting Australia and later Poland, has apparently ..
---------------------------------------------
https://www.welivesecurity.com/2018/09/21/danabot-targeting-europe-adds-new…
∗∗∗ Cyber - USA und Großbritannien rüsten im Cyberspace auf ∗∗∗
---------------------------------------------
Größerer Fokus auf eigene Offensiven gegen Angreifer von außen
---------------------------------------------
https://derstandard.at/2000087842532/USA-und-Grossbritannien-ruesten-im-Cyb…
=====================
= Vulnerabilities =
=====================
∗∗∗ Tec4Data SmartCooler ∗∗∗
---------------------------------------------
This advisory includes mitigations for a missing authentication for critical function vulnerability in Tec4Datas SmartCooler, a cooling appliance.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-01
∗∗∗ Rockwell Automation RSLinx Classic ∗∗∗
---------------------------------------------
This advisory includes mitigations for stack-based buffer overflow, heap-based buffer overflow, and resource exhaustion vulnerabilities in Rockwell Automation’s RSLinx Classic.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02
∗∗∗ Security Advisory 2018-05: Security Update for OTRS Framework ∗∗∗
---------------------------------------------
https://community.otrs.com/security-advisory-2018-05-security-update-for-ot…
∗∗∗ Security Advisory 2018-04: Security Update for OTRS Framework ∗∗∗
---------------------------------------------
https://community.otrs.com/security-advisory-2018-04-security-update-for-ot…
∗∗∗ Vuln: Microsoft Windows JET Database Engine Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105376
∗∗∗ Wireshark Bugs in Multiple Dissectors Let Remote Users Cause the Application to Crash or Consume Excessive CPU Resources ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041608
∗∗∗ MediaWiki Multiple Flaws Let Remote Authenticated Users Bypass Security Restrictions and Obtain Potentially Sensitive Information ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041695
∗∗∗ Asterisk Stack Overflow in HTTP Websocket Upgrade Lets Remote Users Cause the Target Service to Crash ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041694
∗∗∗ RSA Authentication Manager Input Validation Flaws Let Remote Users Conduct Cross-Site Scripting Attacks ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041697
∗∗∗ HPESBST03881 rev.1 - HPE Command View Advanced Edition (CVAE), Local and Remote Access Restriction Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03879 rev.1 - HPE StorageWorks XP7 Automation Director (AutoDir), Local and Remote Authentication Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBST03882 rev.1 - HPE Command View Advance Edition (CVAE) using JDK, Local and Remote Authentication Bypass ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 19-09-2018 18:00 − Donnerstag 20-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Hunderttausende Überwachungskameras wegen Linux-Schwachstelle angreifbar ∗∗∗
---------------------------------------------
Die Angreifer können die Aufzeichnungen live ansehen, Material löschen oder Videos in Dauerschleife abspielen, um Einbrüche zu verschleiern.
---------------------------------------------
https://futurezone.at/digital-life/hunderttausende-ueberwachungskameras-weg…
∗∗∗ BSI veröffentlicht Übersicht qualifizierter DDoS-Mitigation-Dienstleister ∗∗∗
---------------------------------------------
Basierend auf den ebenfalls veröffentlichten Auswahlkriterien für qualifizierte Dienstleister wurde ein wettbewerbsneutrales Verfahren entwickelt, durch das erste geeignete DDoS-Mitigation-Dienstleister identifiziert werden konnten.
---------------------------------------------
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/DDos-Mitiga…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (glusterfs, php5, reportbug, and suricata), openSUSE (chromium and exempi), Red Hat (openstack-rabbitmq-container), SUSE (couchdb, crowbar, crowbar-core, crowbar-ha, crowbar-init, crowbar-openstack, crowbar-ui, gdm, OpenStack, pango, and webkit2gtk3), and Ubuntu (bind9, lcms, lcms2, and lcms2).
---------------------------------------------
https://lwn.net/Articles/765814/
∗∗∗ Vuln: Symantec Messaging Gateway CVE-2018-12243 XML External Entity Injection Vulnerability ∗∗∗
---------------------------------------------
Symantec Messaging Gateway is prone to an XML External Entity injection vulnerability.
Attackers can exploit this issue to gain access to sensitive information or cause denial-of-service conditions.
Versions prior to Messaging Gateway 10.6.6 are vulnerable
---------------------------------------------
http://www.securityfocus.com/bid/105330
∗∗∗ Vuln: Symantec Messaging Gateway CVE-2018-12242 Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
Symantec Messaging Gateway is prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks.
Versions prior to Messaging Gateway 10.6.6 are vulnerable
---------------------------------------------
http://www.securityfocus.com/bid/105329
∗∗∗ Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect AIX Security Bulletin ∗∗∗
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=ibm10730909
∗∗∗ IBM Security Bulletin: A Security Vulnerability affects IBM Cloud Private Cloud Foundry (CVE-2018-11047) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731715
∗∗∗ IBM Security Bulletin: Privilege escalation vulnerability affects IBM Db2 Administrative Task Scheduler (CVE-2018-1711). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729983
∗∗∗ IBM Security Bulletin: Buffer overflow in IBM Db2 tool db2licm (CVE-2018-1710). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729981
∗∗∗ IBM Security Bulletin: Privilege escalation in IBM Db2 tool db2cacpy (CVE-2018-1685). ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729979
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSL affects AIX (CVE-2018-0732) Security Bulletin ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731039
∗∗∗ IBM Security Bulletin: IBM Cloud Private Cloud Foundry is vulnerable to a security vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731705
∗∗∗ IBM Security Bulletin: Vulnerabilities in GSKit affect IBM Spectrum Scale used by DB2 pureScale (CVE-2018-1431, CVE-2018-1447, CVE-2017-3732, CVE-2016-0705) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731657
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 18-09-2018 18:00 − Mittwoch 19-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Western Digitals My Cloud NAS Devices Turn Out to Be Easily Hacked ∗∗∗
---------------------------------------------
Security researchers have discovered an authentication bypass vulnerability in Western Digitals My Cloud NAS devices that potentially allows an unauthenticated attacker to gain admin-level control to the affected devices.
---------------------------------------------
https://thehackernews.com/2018/09/wd-my-cloud-nas-hacking.html
∗∗∗ XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins ∗∗∗
---------------------------------------------
It appears that on Windows, Xbash will focus on malicious cryptomining functions and self-propagation techniques, while on Linux systems, the malware will flaunt its data destructive tendencies; as the malware triggers a downloader to execute a coinminer on Windows, while on Linux it flaunts ransomware functions.
---------------------------------------------
https://threatpost.com/xbash-malware-packs-double-punch-destroys-data-and-m…
∗∗∗ TIPs to Securely Deploy Industrial Control Systems ∗∗∗
---------------------------------------------
Schneider Electric has authored a whitepaper “Effective Implementation of Cybersecurity Countermeasures in Industrial Control Systems” that takes asset owners through the system deployment process. In this blog article, I will provide a brief overview of the concepts presented in the whitepaper.
---------------------------------------------
https://blog.schneider-electric.com/cyber-security/2018/09/18/tips-to-secur…
∗∗∗ Fake finance apps on Google Play target users from around the world ∗∗∗
---------------------------------------------
Another set of fake finance apps has found its way into the official Google Play store. This time, the apps have impersonated six banks from New Zealand, Australia, the United Kingdom, Switzerland and Poland, and the Austrian cryptocurrency exchange Bitpanda. Using bogus forms, the malicious fakes phish for credit card details and/or login credentials to the impersonated legitimate services.
---------------------------------------------
https://www.welivesecurity.com/2018/09/19/fake-finance-apps-google-play-tar…
∗∗∗ Multi-Vector WordPress Infection from Examhome ∗∗∗
---------------------------------------------
This September, we’ve been seeing a massive infection wave that injects malicious JavaScript code into .js, .php files and the WordPress database.
---------------------------------------------
http://labs.sucuri.net/?note=2018-09-18
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Updates available for Adobe Acrobat and Reader (APSB18-34) ∗∗∗
---------------------------------------------
Adobe has published security bulletin for Adobe Acrobat and Reader (APSB18-34) for Windows and MacOS. These updates address critical and important vulnerabilities, and Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1617
∗∗∗ BSRT-2018-003 Directory traversal vulnerability impacts the Connect Service of the BlackBerry Enterprise Mobility Server ∗∗∗
---------------------------------------------
This advisory addresses a directory traversal vulnerability that has been discovered in the Connect Service of the BlackBerry Enterprise Mobility Server (BEMS). BlackBerry is not aware of any exploitation of this vulnerability. Customer risk is limited ...
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Google Chrome, Chromium: Eine Schwachstelle ermöglicht nicht spezifizierte Angriffe ∗∗∗
---------------------------------------------
Ein Angreifer kann aufgrund einer Schwachstelle welche mit dem Schweregrad 'high' bewertet wird nicht weiter spezifizierte Angriffe ausführen. In der Vergangenheit konnten derartige Schwachstellen zumeist von einem entfernten und nicht authentisierten Angreifer ausgenutzt werden.
Google stellt die Chrome und Chromium Version 69.0.3497.100 als Sicherheitsupdate bereit.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1886/
∗∗∗ Xcode: Eine Schwachstelle ermöglicht die Übernahme des Systems ∗∗∗
---------------------------------------------
Ein lokaler, einfach authentifizierter Angreifer kann die Schwachstelle mit Hilfe einer speziell präparierten Anwendung ausnutzen, um beliebigen Programmcode mit Kernelprivilegien auszuführen und dadurch das komplette System zu übernehmen.
Apple stellt Xcode 10 für macOS High Sierra 10.13.6 und später zur Behebung der Schwachstelle bereit.
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1885/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium-browser and libapache2-mod-perl2), Oracle (kernel), and Ubuntu (ghostscript, glib2.0, and php5).
---------------------------------------------
https://lwn.net/Articles/765573/
∗∗∗ WECON PLC Editor ∗∗∗
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-261-01
∗∗∗ Vuln: Apache Camel CVE-2018-8041 Directory Traversal Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105352
∗∗∗ Security Advisory - Sensitive Information Leak Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180919-…
∗∗∗ IBM Security Bulletin: Information Disclosure Security Vulnerability Affects IBM Sterling B2B Integrator (CVE-2018-1800) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731379
∗∗∗ IBM Security Bulletin: Blind SQL injection vulnerability in IBM Business Automation Workflow and IBM Business Process Manager (CVE-2018-1674) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720035
∗∗∗ IBM Security Bulletin: IBM Data Science Experience Local is affected by a cryptography vulnerability ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10720161
∗∗∗ The BIG-IP ASM system may stop enforcing attack signatures after activating a security policy that includes a new signature ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K83093212
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 17-09-2018 18:00 − Dienstag 18-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Public Shaming of Companies for Bad Security ∗∗∗
---------------------------------------------
Troy Hunt makes some good points, with good examples.
---------------------------------------------
https://www.schneier.com/blog/archives/2018/09/public_shaming_.html
∗∗∗ New XBash malware combines features from ransomware, cryptocurrency miners, botnets, and worms ∗∗∗
---------------------------------------------
Palo Alto Network researchers discovered a new malware, tracked as XBash, that combines features from ransomware, cryptocurrency miners, botnets, and worms Security researchers at Palo Alto Networks have ..
---------------------------------------------
https://securityaffairs.co/wordpress/76305/malware/xbash-malware.html
∗∗∗ Extended Validation Certificates are Dead ∗∗∗
---------------------------------------------
Thats it - Im calling it - extended validation certificates are dead. Sure, you can still buy them (and there are companies out there that would just love to sell them to you!), but their usefulness has now descended from ..
---------------------------------------------
https://www.troyhunt.com/extended-validation-certificates-are-dead/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Advisory: CVE-2018-13982: Smarty 3.1.32 or below Trusted-Directory Bypass via Path Traversal ∗∗∗
---------------------------------------------
Smarty 3.1.32 or below is prone to a path traversal vulnerability due to insufficient sanitization of code in Smarty templates. This allows attackers controlling the Smarty template to bypass the trusted directory security restriction and read arbitrary files. Full security advisory
---------------------------------------------
https://www.sba-research.org/2018/09/18/security-advisory-cve-2018-13982-sm…
∗∗∗ VMSA-2018-0015.1 ∗∗∗
---------------------------------------------
VMware AirWatch Agent updates resolve remote code execution vulnerability.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0015.html
∗∗∗ iOS 12 is out today - Updates for Safari, watchOS, tvOS, iOS. Full details here https://support.apple.com/en-ca/HT201222, (Tue, Sep 18th) ∗∗∗
---------------------------------------------
https://isc.sans.edu/diary/rss/24112
∗∗∗ IBM Security Bulletin: IBM Connections Security Refresh for Apache Struts Remote Code Execution (RCE) Vulnerability (CVE-2018-11776) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10731343
∗∗∗ IBM Security Bulletin: IBM Cloud Manager with OpenStack is affected by a OpenSSL vulnerabilities (CVE-2018-0739) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10725849
∗∗∗ Remote Code Execution in Moodle ∗∗∗
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-un…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 14-09-2018 18:00 − Montag 17-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Upcoming Security Updates for Adobe Acrobat and Reader (APSB18-34) ∗∗∗
---------------------------------------------
A prenotification security advisory (APSB18-34) has been posted regarding upcoming Adobe Acrobat and Reader updates scheduled for Wednesday, September 19, 2018. We will continue to provide updates on the upcoming release via the Security Bulletins and Advisories page as well [...]
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1609
∗∗∗ CSS-basierte Web-Attacke bringt iPhones zum Absturz ∗∗∗
---------------------------------------------
Ein Sicherheitsforscher hat eine Schwachstelle in iOS entdeckt, mit der iPhones zum Absturz gebracht und neu gestartet werden können.
---------------------------------------------
https://futurezone.at/digital-life/css-basierte-web-attacke-bringt-iphones-…
∗∗∗ Fbot, A Satori Related Botnet Using Block-chain DNS System ∗∗∗
---------------------------------------------
Since 2018-09-13 11:30 UTC, a new botnet (we call it Fbot) popped up in our radar which really caught our attention.There are 3 interesting aspects about this new botnet:First, so far the only purpose of this botnet looks to be just going after and removing another botnet
---------------------------------------------
http://blog.netlab.360.com/threat-alert-a-new-worm-fbot-cleaning-adbminer-i…
∗∗∗ Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows ∗∗∗
---------------------------------------------
Unit 42 researchers discover Xbash, a new malware family tied to the Iron Group targeting Linux and Microsoft Servers
---------------------------------------------
https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-b…
∗∗∗ User Agent String "$ua.tools.random()" ? :-) ! ∗∗∗
---------------------------------------------
For many years I've observed requests for page license.php on my webservers, from various IPs and with various User Agent Strings: [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/24102
∗∗∗ Outdated Duplicator Plugin RCE Abused ∗∗∗
---------------------------------------------
We’re seeing an increase in the number of cases where attackers are disabling WordPress sites by removing or rewriting its wp-config.php file. These cases are all linked to the same vulnerable software: WordPress Duplicator Plugin. Versions lower than 1.2.42 of Snap Creek Duplicator plugin are vulnerable to a Remote Code Execution attack, where the malicious visitor is able to run any arbitrary code on the target site.
---------------------------------------------
https://blog.sucuri.net/2018/09/outdated-duplicator-plugin-rce-abused.html
∗∗∗ Erlang Authenticated Remote Code Execution ∗∗∗
---------------------------------------------
Erlang is a programming language that I have tried to learn a few times in the past but never really dug in, that is, until recently.Erlange is an interesting language because it has “built-in concurrency, distribution, and fault tolerence”. To me, this means that it does job queing and distributed tasks right out of the gate.
---------------------------------------------
https://malicious.link/post/2018/erlang-arce/
∗∗∗ Bewerbungsschreiben verbreiten Schadsoftware ∗∗∗
---------------------------------------------
Unternehmen erhalten von Arbeitssuchenden elektronische Bewerbungsschreiben. Für die ausführlichen und angehängten Bewerbungsunterlagen der Kandidat/innen sollen sie einen Dateianhang im ZIP-Format öffnen. Er beinhaltet ausführbare Microsoft Windows-Anwendungen, die Schadsoftware sind. Diese Anwendungen dürfen Mitarbeiter/innen nicht öffnen, denn damit installieren sie die Schadsoftware.
---------------------------------------------
https://www.watchlist-internet.at/news/bewerbungsschreiben-verbreiten-schad…
∗∗∗ gymondi.com ist ein Fakeshop ∗∗∗
---------------------------------------------
Gymondi.com ist ein sehr aufwendig aufgesetzter Onlineshop, der das Herz von Sportler/innen höherschlagen lässt. Konsument/innen finden bei gymondi.com Fitnessgeräte zu günstigeren Preisen als bei der Konkurrenz. Zusätzlich zum Preisvorteil kann ein 20% Rabattgutschein eingelöst werden, was den Gesamtpreis erheblich mindert. Wir raten von einem Einkauf ab! Sie werden lediglich um einen hohen Geldbetrag betrogen und gehen leer aus.
---------------------------------------------
https://www.watchlist-internet.at/news/gymondicom-ist-ein-fakeshop/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (discount, ghostscript, intel-microcode, mbedtls, thunderbird, and zutils), Fedora (ghostscript, java-1.8.0-openjdk-aarch32, kernel-headers, kernel-tools, libzypp, matrix-synapse, nspr, nss, nss-softokn, nss-util, zsh, and zypper), Mageia (kernel, kernel-linus, and kernel-tmb), openSUSE (chromium, curl, ffmpeg-4, GraphicsMagick, kernel, libzypp, zypper, okular, python3, spice-gtk, tomcat, and zsh), Oracle (kernel), Slackware (php), SUSE (curl, [...]
---------------------------------------------
https://lwn.net/Articles/765048/
∗∗∗ BlackBerry Powered by Android Security Bulletin - September 2018 ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Moodle: Mehrere Schwachstellen ermöglichen u. a. die Ausführung beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1871/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 13-09-2018 18:00 − Freitag 14-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Interesting approach: Skill Squatting with Amazon Echo ∗∗∗
---------------------------------------------
Mishearing something every once in a while is a normal thing for humans. In that respect, Amazon Echo has some human characteristics as well. A research team from the University of Illinois has taken a closer look at Echo, Alexa and the abuse potential for malicious Alexa skills. They have presented their findings at the Usenix conference.
---------------------------------------------
https://www.gdatasoftware.com/blog/2018/09/31112-skill-squatting-amazon-echo
∗∗∗ Windows, Linux Kodi Users Infected With Cryptomining Malware ∗∗∗
---------------------------------------------
An anonymous reader quotes a report from ZDNet: Users of Kodi, a popular media player and platform designed for TVs and online streaming, have been the targets of a malware campaign, ZDNet has learned from cyber-security firm ..
---------------------------------------------
https://it.slashdot.org/story/18/09/13/2118233/windows-linux-kodi-users-inf…
∗∗∗ Apple Has Started Paying Hackers for iPhone Exploits ∗∗∗
---------------------------------------------
Lorenzo Franceschi-Bicchierai, reporting for Motherboard: In 2016, Apples head of security surprised the attendees of one of the biggest security conference in the world by announcing a bug bounty program for Apples mobile operating ..
---------------------------------------------
https://it.slashdot.org/story/18/09/14/1441201/apple-has-started-paying-hac…
∗∗∗ Unsuccessfully Defaced Websites ∗∗∗
---------------------------------------------
Defaced websites are a type of hack that is easy to notice and a pain for website owners. Recently, we came across some defacement pages with a peculiar JavaScript injection included in the source code. What is a ..
---------------------------------------------
https://blog.sucuri.net/2018/09/unsuccessfully-defaced-websites.html
∗∗∗ DarkCloud Bootkit ∗∗∗
---------------------------------------------
In an earlier blog about crypto-malware, we described different techniques used by cybercriminals, such as cryptomining and wallet stealing. In this blog, we will provide a technical analysis of yet another type of ..
---------------------------------------------
https://www.zscaler.com/blogs/research/darkcloud-bootkit
∗∗∗ Bug in Intels ME-Firmware: Wieder BIOS-Updates nötig ∗∗∗
---------------------------------------------
Die russischen Experten von PTE haben erneut einen schwerwiegenden Bug bei kryptografischen Schlüsseln in Intels Management Engine (ME) entdeckt.
---------------------------------------------
https://heise.de/-4165732
∗∗∗ GlobeImposter use new ways to spread to the globe: How to prevent falling victims? ∗∗∗
---------------------------------------------
Recently, there have been many incidents of ransomware attacks. Once users are ..
---------------------------------------------
https://blog.360totalsecurity.com/en/globeimposter-use-new-ways-to-spread-t…
∗∗∗ Hacking an assault tank… A Nerf one ∗∗∗
---------------------------------------------
TL;DR A complex, challenging reverse and hijack of a toy tank Nerf gun camera, but the result was we got to shoot the 44Con conference organiser with it! Why A remote-controlled Nerf gun with ..
---------------------------------------------
https://www.pentestpartners.com/security-blog/hacking-an-assault-tank-a-ner…
=====================
= Vulnerabilities =
=====================
∗∗∗ Honeywell Mobile Computers with Android Operating Systems ∗∗∗
---------------------------------------------
This advisory includes mitigations for an improper privilege management vulnerability in the Honeywell mobile computers running the Android Operating System.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01
∗∗∗ CVE-2018-16962: Webroot SecureAnywhere macOS Kernel Level Memory Corruption ∗∗∗
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-16962--Webroot-Sec…
∗∗∗ HPESBHF03866 rev.1 - HPE Integrated Lights-Out 3,4,5 using SSH, Remote Execution of Arbitrary Code and Disclosure of Sensitive Information ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 12-09-2018 18:00 − Donnerstag 13-09-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Office VBA + AMSI: Parting the veil on malicious macros ∗∗∗
---------------------------------------------
As part of our continued efforts to tackle entire classes of threats, Office 365 client applications now integrate with Antimalware Scan Interface (AMSI), enabling antivirus and other security solutions to scan macros and other scripts at runtime to check for malicious behavior.
---------------------------------------------
https://cloudblogs.microsoft.com/microsoftsecure/2018/09/12/office-vba-amsi…
∗∗∗ A New Mining Botnet Blends Its C2s into ngrok Service ∗∗∗
---------------------------------------------
These days, it feels like new mining malwares are popping up almost daily and we have pretty much stopped blogging the regular ones so we don’t flood our readers’ feed. With that being said, one did have our attention recently. This botnet hides its C2s(Downloader and Reporter [...]
---------------------------------------------
http://blog.netlab.360.com/a-new-mining-botnet-blends-its-c2s-into-ngrok-se…
∗∗∗ Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars ∗∗∗
---------------------------------------------
High-end vehicles are often equipped with a Passive Keyless Entry and Start (PKES) system. These PKES systems allow to unlock and start the vehicle based on the physical proximity of a paired key fob; no user interaction is required.
---------------------------------------------
https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyles…
∗∗∗ The 42M Record kayo.moe Credential Stuffing Data ∗∗∗
---------------------------------------------
This is going to be a brief blog post but its a necessary one because I cant load the data Im about to publish into Have I Been Pwned (HIBP) without providing more context than what I can in a single short breach description. Heres the story: [...]
---------------------------------------------
https://www.troyhunt.com/the-42m-record-kayo-moe-credential-stuffing-data/
∗∗∗ Keine 359,88 Euro an Streaming-Plattformen zahlen ∗∗∗
---------------------------------------------
Die Streaming-Plattformen borastream.de und matostream.de verlangen von Besucher/innen eine kostenlose Registrierung. Sie führt ohne Hinweis zu einer Premium-Mitgliedschaft um 359,88 Euro pro Jahr. Konsument/innen müssen die Rechnung der Website-Betreiberinnen Roxo Films Ltd bzw. Filmser Ltd27 nicht bezahlen, denn ihre Angebote sind unseriöse Abo-Fallen.
---------------------------------------------
https://www.watchlist-internet.at/news/keine-35988-euro-an-streaming-plattf…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (ghostscript and openssh), Oracle (firefox), Scientific Linux (firefox and OpenAFS), SUSE (tomcat), and Ubuntu (openjdk-lts).
---------------------------------------------
https://lwn.net/Articles/764713/
∗∗∗ ZDI-18-1046: (0Day) PoDoFo Library ParseToUnicode Memory Corruption Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-1046/
∗∗∗ Intel Baseboard Management Controller (BMC) Firmware: Eine Schwachstelle ermöglicht die Eskalation von Privilegien ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1861/
∗∗∗ IBM Security Bulletin: IBM Connections Security Refresh (CVE-2018-1791) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731207
∗∗∗ IBM Security Bulletin: Vulnerabilities identified in IBM® Java SDK affect WebSphere Service Registry and Repository and WebSphere Service Registry and Repository Studio (CVE-2018-1656 and CVE-2018-12539) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728399
∗∗∗ IBM Security Bulletin: Weaker than expected security in WebSphere Application Server (CVE-2018-1719) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10718837
∗∗∗ IBM Security Bulletin: A Vulnerability in the Java runtime environment that IBM provides affects WebSphere DataPower XC10 Appliance ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718653
∗∗∗ IBM Security Bulletin: A Vulnerability in Java runtime environment that IBM provides affects WebSphere eXtreme Scale ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718453
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSH affects QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731317
∗∗∗ IBM Security Bulletin: WebSphere MQ V5.3 for HP NonStop Server (MIPS and Itanium) is affected by OpenSSL vulnerability CVE-2018-0739 ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10731019
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 11-09-2018 18:00 − Mittwoch 12-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ British Airways Breach Caused By the Same Group That Hit Ticketmaster ∗∗∗
---------------------------------------------
A cyber-criminal operation known as Magecart is believed to have been behind the recent card breach announced last week by British Airways. The operation has been active since 2015 when RisqIQ and ClearSky researchers spotted the malware for the first time. The groups regular mode of operation involves hacking into online stores and hiding JavaScript code that steals payment card information entered into store checkout pages, [...]
---------------------------------------------
https://it.slashdot.org/story/18/09/11/1116221/british-airways-breach-cause…
∗∗∗ When is a patch not a patch? When its for this McAfee password bug ∗∗∗
---------------------------------------------
Vulnerability still open to all despite multiple fixes A privilege escalation flaw in McAfees True Key software remains open to exploitation despite multiple attempts to patch it.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/09/11/mcafee_flaw…
∗∗∗ Back up a minute: Veeam database config snafu exposed millions of customer records ∗∗∗
---------------------------------------------
Firm helps self with own disaster recovery A misconfigured server at data recovery and backup firm Veeam exposed millions of email addresses.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2018/09/12/veeam_datab…
∗∗∗ Erpresserische E-Mail droht mit Masturbationsvideo ∗∗∗
---------------------------------------------
Unternehmen erhalten eine erpresserische E-Mail, die angeblich von ihrer eigenen Adresse stammt. Darin behaupten Kriminelle, dass sie Zugriff auf den fremden Computer haben und über Masturbationsvideos der Empfänger/innen verfügen. Opfer sollen Bitcoins zahlen, damit es zu keiner Veröffentlichung kommt. Der Inhalt der Nachricht ist erfunden. Eine Zahlung ist nicht erforderlich.
---------------------------------------------
https://www.watchlist-internet.at/news/erpresserische-e-mail-droht-mit-mast…
∗∗∗ Warnung vor telmo24.de ∗∗∗
---------------------------------------------
Der Fake-Shop telmo24.de vertreibt günstige Handys und Tablets. Trotz Bezahlung liefert er keine Ware. Konsument/innen können den Fake-Shop daran erkennen, dass er über sehr niedrige Preise verfügt und ausschließlich eine Bezahlung im Voraus akzeptiert. Vor einem Einkauf ist dringend abzuraten!
---------------------------------------------
https://www.watchlist-internet.at/news/warnung-vor-telmo24de/
∗∗∗ Sicherheit - Microsoft schließt drei gefährliche Zero-Day-Lücken bei Windows ∗∗∗
---------------------------------------------
Eine davon auch bereits aktiv ausgenutzt - Insgesamt 17 kritische Lücken behoben
---------------------------------------------
https://derstandard.at/2000087198816/Microsoft-schliesst-drei-gefaehrliche-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kamailio, libextractor, and mgetty), Fedora (community-mysql, ghostscript, glusterfs, iniparser, okular, and zsh), openSUSE (compat-openssl098, php5, and qemu), Red Hat (firefox), SUSE (libzypp, zypper, python3, spark, and zsh), and Ubuntu (zsh).
---------------------------------------------
https://lwn.net/Articles/764645/
∗∗∗ OpenAFS: Mehrere Schwachstellen ermöglichen u. a. die Manipulation von Daten ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1854/
∗∗∗ INTEL-SA-00125: A potential security vulnerability in Intel CSME, Intel Server Platform Services and Intel Trusted Execution Engine Firmware may allow information disclosure ∗∗∗
---------------------------------------------
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-0…
∗∗∗ Security Advisory - FRP Bypass Vulnerability on Smartphones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180912-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2018 CPU that is bundled with IBM WebSphere Application Server Patterns ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729745
∗∗∗ IBM Security Bulletin: IBM Maximo Asset Management could allow an authenticated attacker to obtain sensitive information. (CVE-2018-1698) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728857
∗∗∗ IBM Security Bulletin: Potential spoofing attack in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1695) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730979
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities affect IBM® SDK for Node.js™ in IBM Cloud ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg22012749
∗∗∗ IBM Security Bulletin: Code execution vulnerability in WebSphere Application Server affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1567) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730983
∗∗∗ IBM Security Bulletin: Vulnerabilities in OpenSSL affect GCM16 & GCM32 KVM Switch Firmware ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10731205
∗∗∗ libidn vulnerability CVE-2016-6263 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K25353544
∗∗∗ HPESBHF03893 rev.1 - HPE Intelligent Management Center (iMC) Wireless Services Manager Software, Remote Code Execution ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03876 rev.1 - HPE ProLiant ML10 Gen9 Servers with Intel-based Processors using Active Management Technology (AMT), Multiple Local Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
∗∗∗ HPESBHF03873 rev.1 - Certain HPE Gen10 Servers with Intel-based Processors using Converged Security and Management Engine (CSME), and Power Management Controller (PMC) Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 10-09-2018 18:00 − Dienstag 11-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Mongo Lock Attack Ransoming Deleted MongoDB Databases ∗∗∗
---------------------------------------------
An attack called Mongo Lock is targeting remotely accessible and unprotected MongoDB databases, wiping them, and then demanding a ransom in order to get the contents back.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/mongo-lock-attack-ransoming-…
∗∗∗ OpenSSL 1.1.1 Is Released ∗∗∗
---------------------------------------------
Since 1.1.1 is our new LTS release we are strongly advising all users to upgrade as soon as possible. For most applications this should be straight forward if they are written to work with OpenSSL 1.1.0.
---------------------------------------------
https://www.openssl.org/blog/blog/2018/09/11/release111/
∗∗∗ "Google Fonts" popup leads to malware ∗∗∗
---------------------------------------------
A recent malware injection in a client's WordPress file was found to be targeting website visitors that were using the Google Chrome browser to access the infected website. It uses Javascript to detect the visitor's use of Google Chrome and then upon the visitor clicking it generates a popup notification which falsely claims that the visitor's Google Chrome is missing the "HoeflerText" font ...
---------------------------------------------
http://labs.sucuri.net/?note=2018-09-10
∗∗∗ Nicht auf gamingkoenig.org reinfallen ∗∗∗
---------------------------------------------
Bei gamingkoenig.org wird Computerzubehör zu Schnäppchenpreisen angeboten. Konsument/innen dürfen bei dem Anbieter auf keinen Fall bestellen, denn es handelt sich um einen Fakeshop. Die bestellte Ware wird sie nie erreichen und Konsument/innen verlieren einen hohen Geldbetrag.
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-auf-gamingkoenigorg-reinfallen/
∗∗∗ Anwaltsschreiben mit Schadsoftware im Umlauf ∗∗∗
---------------------------------------------
Kriminelle versenden unter dem Namen von erfundenden Anwaltskanzleien betrügerische E-Mails. Darin behauten sie, dass Empfänger/innen einen pornografischen Film angesehen und damit eine Urheberrechtsverletzung begangen haben. Weiterführende Informationen dazu finden sich angeblich in einem Dateianhang. Er verbirgt Schadsoftware und darf nicht geöffnet werden.
---------------------------------------------
https://www.watchlist-internet.at/news/anwaltsschreiben-mit-schadsoftware-i…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security Bulletins Posted ∗∗∗
---------------------------------------------
Adobe has published security bulletins for Adobe ColdFusion(APSB18-33) and Adobe Flash Player (APSB18-31). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1607
∗∗∗ eDirectory 9.1.1 Hot Patch 1 ∗∗∗
---------------------------------------------
This update is being provided to resolve potential critical issues found since the latest patch:
- Open unvalidated redirect vulnerability in iMonitor (Bug 1082040) (CVE-2018-7692)
---------------------------------------------
https://download.novell.com/Download?buildid=vP3nS-Hctkk~
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libextractor), Fedora (godot and iniparser), Oracle (kernel), Red Hat (chromium-browser and Fuse 7.1), SUSE (compat-openssl098, openssh, php5, php53, qemu, and tiff), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2, and linux-hwe, linux-azure, linux-gcp).
---------------------------------------------
https://lwn.net/Articles/764575/
∗∗∗ Vuln: SAP Business One For Android CVE-2018-2460 Certificate Validation Security Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105309
∗∗∗ Vuln: SAP NetWeaver WebDynpro Java CVE-2018-2464 Cross Site Scripting Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105308
∗∗∗ Vuln: SAP Business One CVE-2018-2458 Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
http://www.securityfocus.com/bid/105307
∗∗∗ Cisco Email Security Appliance and Content Security Management Appliance HTTP Response Splitting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Advisory - Two Insufficient Input Validation Vulnerabilities in Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180911-…
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-1656, CVE-2018-12539) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730799
∗∗∗ IBM Security Bulletin: IBM API Connect is impacted by a Drupal 8 vulnerability (CVE-2018-14773) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10719697
∗∗∗ IBM Security Bulletin: Datacap Taskmaster Capture, Datacap Fastdoc Capture and Datacap Navigator is affected by vulnerability due to unexpected authentication behavior ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729013
∗∗∗ IBM Security Bulletin: Rational Asset Analyzer (RAA) is affected by a WAS Liberty vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10720295
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM Java Runtime affect IBM QRadar SIEM ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10729699
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2018-0732, CVE-2018-0737) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10730811
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by a Denial of Service vulnerability (CVE-2018-0739) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10726053
∗∗∗ IBM Security Bulletin: IBM BladeCenter Advanced Management Module (AMM) is affected by a vulnerability in bind (CVE-2017-3145) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10719051
∗∗∗ IBM Security Bulletin: Multiple Security Vulnerabilities in Apache Geronimo Affect IBM Sterling B2B Integrator ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728841
∗∗∗ SSA-268644 (Last Update: 2018-09-11): Spectre-NG (Variants 3a and 4) Vulnerabilities in Industrial Products ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
∗∗∗ SSA-346256 (Last Update: 2018-09-11): Vulnerability in SIMATIC WinCC OA V3.14 and prior ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-346256.pdf
∗∗∗ SSA-198330 (Last Update: 2018-09-11): Local Privilege Escalation in TD Keypad Designer ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-198330.pdf
∗∗∗ SSA-447396 (Last Update: 2018-09-11): Denial-of-Service in SCALANCE X300, SCALANCE X408 and SCALANCE X414 ∗∗∗
---------------------------------------------
https://cert-portal.siemens.com/productcert/pdf/ssa-447396.pdf
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 07-09-2018 18:00 − Montag 10-09-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ VLAN Hopping and Mitigation ∗∗∗
---------------------------------------------
We'll start with a few concepts: VLAN A VLAN is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices. Security is one of the many reasons network administrators configure VLANs. However, with an exploit known as VLAN Hopping, an attacker is able to bypass these security implementations.
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/vlan-hopping-and-mitig…
∗∗∗ Keybase Browser Extension Could Allow Sites to See Messages ∗∗∗
---------------------------------------------
The browser extension for the Keybase app fails to keep the end-to-end encryption promised by its desktop variant as sites could see the text being types into the chat area.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/keybase-browser-extension-co…
∗∗∗ Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall ∗∗∗
---------------------------------------------
Unit 42 has uncovered new variants of the well-known IoT botnets Mirai and Gafgyt. These are the IoT botnets associated with unprecedented Distributed Denial of Service attacks in November 2016 and since.
---------------------------------------------
https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-io…
∗∗∗ Knuddels.de: Millionen Nutzerdaten mit Passwörtern geleakt ∗∗∗
---------------------------------------------
Bei der deutschen Chat-Community Knuddels.de gab es ein immenses Datenleck: Die Accountdaten fast aller Nutzer standen im Netz.
---------------------------------------------
https://heise.de/-4158265
∗∗∗ Apps that steal users' browser histories kicked out of the Mac App store ∗∗∗
---------------------------------------------
Apple has removed "Adware Doctor" from the macOS App Store amid claims that the program was uploading browser histories to China. And it turns out that wasnt the only popular app stealing users private information.
---------------------------------------------
https://www.tripwire.com/state-of-security/featured/apps-that-steal-users-b…
∗∗∗ Irreführende Rechnung von ITR Register ∗∗∗
---------------------------------------------
Unternehmen, die ihre Marke oder ihr Geschmacksmuster beim Amt der Europäischen Union für Geistiges Eigentum (EuIPO) registrieren, erhalten eine Rechnung von ITR Register. Sie sollen 1.380 Euro für einen Eintrag auf itr-service.com bezahlen. Die Zahlungsaufforderung von ITR Register ist ein irreführendes Vertragsangebot. Unternehmen müssen den Geldbetrag nicht bezahlen.
---------------------------------------------
https://www.watchlist-internet.at/news/irrefuehrende-rechnung-von-itr-regis…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium-browser, curl, discount, firefox-esr, ghostscript, and openssh), Fedora (curl, firefox, ghostscript, glibc, mod_perl, thunderbird, and unixODBC), openSUSE (chromium, firefox, GraphicsMagick, nodejs4, and thunderbird), Oracle (kernel), and SUSE (java-1_7_1-ibm and kvm).
---------------------------------------------
https://lwn.net/Articles/764511/
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by multiple issues ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10726039
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by a Denial of Service vulnerability (CVE-2018-0732) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730341
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect DataPower Gateways ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10726009
∗∗∗ IBM Security Bulletin: WebSphere DataPower Appliances is affected by a vulnerability in OpenSSL (CVE-2018-0737) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730515
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM HTTP Server affects Netezza Performance Portal ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728351
∗∗∗ IBM Security Bulletin: Multiple vulnerabilities in IBM HTTP Server affects Netezza Performance Portal ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10718249
∗∗∗ RSA BSAFE Crypto-J Crypto Timing Error Lets Remote Users Obtain Keys ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041615
∗∗∗ RSA BSAFE SSL-J Crypto Timing and Memory Access Errors Let Remote or Physically Local Users Obtain Keys ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041614
∗∗∗ QNAP Storage Devices PHP Buffer Error Lets Remote Users Deny Service ∗∗∗
---------------------------------------------
http://www.securitytracker.com/id/1041607
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 06-09-2018 18:00 − Freitag 07-09-2018 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ New Chainshot Malware Found By Cracking 512-Bit RSA Key ∗∗∗
---------------------------------------------
Security researchers exploited a threat actors poor choice for encryption and discovered a new piece of malware along with network infrastructure that links to various targeted attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-chainshot-malware-found-…
∗∗∗ Hotspot Honeypot ∗∗∗
---------------------------------------------
Introduction The Hotspot Honeypot is an illegitimate Wi-Fi access point which can appear as an authorized and secure hotspot. Despite appearances, it is actually set up by black-hat attackers or malicious hackers to steal your bank and credit card details, passwords and other personal information.
---------------------------------------------
https://resources.infosecinstitute.com/hotspot-honeypot/
∗∗∗ British Airways Website, Mobile App Breach Compromises 380k ∗∗∗
---------------------------------------------
The airline said information like name, address and bank card details like CVC code were compromised.
---------------------------------------------
https://threatpost.com/british-airways-website-mobile-app-breach-compromise…
∗∗∗ 2018 CEF Telecom Call - €13 million to reinforce the EUs Cybersecurity capacity ∗∗∗
---------------------------------------------
The European Commission calls for proposals under the Connecting Europe Facility (CEF) to reinforce the EUs cybersecurity capacity, with up to €13 million available in grant funding, open until the 22 November 2018.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/2018-cef-telecom-call2013-20ac1…
∗∗∗ Jetzt patchen! Die Ransomware Gandcrab schlüpft durch Flash- und Windows-Lücken ∗∗∗
---------------------------------------------
Auf einigen kompromittierten Webseiten lauert ein Exploit Kit, das nach Sicherheitslücken in Flash und Windows Ausschau hält.
---------------------------------------------
https://heise.de/-4157172
∗∗∗ Vulnerability Spotlight: CVE-2018-3952 / CVE-2018-4010 - Multi-provider VPN Client Privilege Escalation Vulnerabilities ∗∗∗
---------------------------------------------
Cisco Talos has discovered two similar vulnerabilities in the ProtonVPN and NordVPN VPN clients. The vulnerabilities allow attackers to execute code as an administrator on Microsoft Windows operating systems from a standard user.
---------------------------------------------
https://blog.talosintelligence.com/2018/09/vulnerability-spotlight-Multi-pr…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMSA-2018-0017.3 - VMware Tools update addresses an out-of-bounds read vulnerability ∗∗∗
---------------------------------------------
[...] VMware Tools 10.3.0 is is discontinued because of a functional issue with 10.3.0 in ESXi 6.5, please refer to KB55796 for more information.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0017.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (qemu and xen), Mageia (libxkbcommon, sleuthkit, and wireshark), openSUSE (apache-pdfbox, dovecot22, and php7), SUSE (enigmail, kernel, nodejs4, and php7), and Ubuntu (firefox and transfig).
---------------------------------------------
https://lwn.net/Articles/764386/
∗∗∗ (0Day) Remote Code Execution Vulnerabilities in Hewlett Packard Enterprise Intelligent Management Center ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-999/http://www.zerodayinitiative.com/advisories/ZDI-18-1000/http://www.zerodayinitiative.com/advisories/ZDI-18-1001/http://www.zerodayinitiative.com/advisories/ZDI-18-1002/http://www.zerodayinitiative.com/advisories/ZDI-18-1003/http://www.zerodayinitiative.com/advisories/ZDI-18-1004/http://www.zerodayinitiative.com/advisories/ZDI-18-1005/http://www.zerodayinitiative.com/advisories/ZDI-18-1006/http://www.zerodayinitiative.com/advisories/ZDI-18-1007/
---------------------------------------------
∗∗∗ IBM Security Bulletin: Vulnerability in OpenSSL affects QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730727
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Bouncy Castle vulnerability ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016006
∗∗∗ IBM Security Bulletin: Vulnerabilities in NTP affect QLogic 8Gb Intelligent Pass-thru Module and SAN Switch Module for IBM BladeCenter and IBM Flex System FC3171 8Gb SAN Switch & SAN Pass-thru ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10730717
∗∗∗ IBM Security Bulletin: IBM Security Guardium is affected by a Public disclosed vulnerability from Bouncy Castle ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016292
∗∗∗ IBM Security Bulletin: IBM OpenPages GRC Platform is affected by an Information disclosure vulnerability (CVE-2017-1679) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10728737
∗∗∗ Apache Tomcat vulnerability CVE-2018-1336 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K73008537
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 05-09-2018 18:00 − Donnerstag 06-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Nicht bestellen bei apothekerezeptfrei.com ∗∗∗
---------------------------------------------
KonsumentInnen, die auf der Suche nach Medikamenten und insbesondere Potenzmitteln sind, finden auf apothekerezeptfrei.com ein großes Angebot an teils verschreibungspflichtigen Medikamenten. InteressentInnen sollten hier auf keinen Fall bestellen, denn es handelt sich um einen Fake-Shop, der trotz Bezahlung keine Ware liefert. Zusätzlich sollten verschreibungspflichtige Medikamente nicht ohne entsprechende Verschreibung gekauft werden.
---------------------------------------------
https://www.watchlist-internet.at/news/nicht-bestellen-bei-apothekerezeptfr…
∗∗∗ Browser Extensions: Are They Worth the Risk? ∗∗∗
---------------------------------------------
Popular file-sharing site Mega.nz is warning users that cybercriminals hacked its browser extension for Google Chrome so that any usernames and passwords submitted through the browser were copied and forwarded to a rogue server in Ukraine. This attack serves as a fresh reminder that legitimate browser extensions can and periodically do fall into the wrong hands, and that it makes good security sense to limit your exposure to such attacks by getting rid of extensions that are no longer useful or
---------------------------------------------
https://krebsonsecurity.com/2018/09/browser-extensions-are-they-worth-the-r…
∗∗∗ Malicious PowerShell Compiling C# Code on the Fly, (Wed, Sep 5th) ∗∗∗
---------------------------------------------
What I like when hunting is to discover how attackers are creative to find new ways to infect their victims computers. I came across a Powershell sample that looked new and interesting to me.
---------------------------------------------
https://isc.sans.edu/diary/rss/24072
∗∗∗ Using just a laptop, boffins sniff, spoof and pry – without busting browser padlock ∗∗∗
---------------------------------------------
In a paper seen by The Register, to be presented at the ACM's Conference on Computer and Communications Security (Toronto in October), Dr Shulman's team wrote:
"The attack exploits DNS Cache Poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own – namely certificates binding the attacker's public key to a victim domain."
---------------------------------------------
https://www.theregister.co.uk/2018/09/06/boffins_break_cas_domain_validatio…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Releases Security Updates ∗∗∗
---------------------------------------------
Original release date: September 05, 2018 Cisco has released updates to address multiple vulnerabilities affecting Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. NCCIC encourages users and administrators to review the Cisco Security Advisories and Alerts website and apply the necessary updates.
---------------------------------------------
https://www.us-cert.gov/ncas/current-activity/2018/09/05/Cisco-Releases-Sec…
∗∗∗ DokuWiki CSV Formula Injection Vulnerability ∗∗∗
---------------------------------------------
The administration panel of the application has a “CSV export of users” feature which allows the export of user data (username, real name, email address and user groups) as a CSV file. On the registration page, it is possible for an attacker to set certain values in the Real Name field that – when exported and opened with a spreadsheet application (Microsoft Excel, Open Office, etc.) – will be interpreted as a formula.
---------------------------------------------
https://www.sec-consult.com/en/blog/advisories/dokuwiki-csv-formula-injecti…
∗∗∗ VMSA-2018-0023: AirWatch Agent and VMware Content Locker updates resolve data protection vulnerabilities ∗∗∗
---------------------------------------------
* The AirWatch Agent for iOS devices contains a data protection vulnerability whereby the files and keychain entries in the Agent are not encrypted. CVE-2018-6975
* The VMware Content Locker for iOS devices contains a data protection vulnerability in the SQLite database. This vulnerability relates to unencrypted filenames and associated metadata in SQLite database for the Content Locker. CVE-2018-6976
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2018-0023.html
∗∗∗ Vulnerability Spotlight: TALOS-2018-0560 - ERPNext SQL Injection Vulnerabilities ∗∗∗
---------------------------------------------
Talos is disclosing multiple SQL injection vulnerabilities in the Frappe ERPNext Version 10.1.6 application. Frappe ERPNext is an open-source enterprise resource planning (ERP) cloud application. These vulnerabilities enable an attacker to bypass authentication and get unauthenticated access to sensitive data. An attacker can use a normal web browser to trigger these vulnerabilities — no special tools are required.
---------------------------------------------
https://blog.talosintelligence.com/2018/09/vulnerability-spotlight-talos-20…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (curl, gdm3, git-annex, lcms2, and sympa), Fedora (discount, dolphin-emu, gd, obs-build, osc, tcpflow, and yara), openSUSE (wireshark), Slackware (curl, firefox, ghostscript, and thunderbird), SUSE (apache-pdfbox, curl, dovecot22, and libvirt), and Ubuntu (libtirpc).
---------------------------------------------
https://lwn.net/Articles/764300/
∗∗∗ IBM Security Bulletin: Vulnerabilities in Kerberos affect Power Hardware Management Console (CVE-2017-11368, CVE-2017-7562) ∗∗∗
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=ibm10717893
∗∗∗ IBM Security Bulletin: IBM Lotus Protector for Mail Security has released fixes in response to the public disclosed vulnerability from PHP ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10719483
∗∗∗ IBM Security Bulletin: Vulnerabilities in Oracle Outside In Technology Affect IBM WebSphere Portal (CVE-2018-2768, CVE-2018-2801, CVE-2018-2806) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=ibm10715935
∗∗∗ IBM Security Bulletin: Code execution vulnerability in WebSphere Application Server (CVE-2018-1567) ∗∗∗
---------------------------------------------
https://www-01.ibm.com/support/docview.wss?uid=swg22016254
∗∗∗ Apache Tomcat vulnerability CVE-2018-8034 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K34468163
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 04-09-2018 18:00 − Mittwoch 05-09-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Verschlüsselung: NSA-Chiffre Speck fliegt aus dem Linux-Kernel ∗∗∗
---------------------------------------------
Mit der NSA-Chiffre Speck wollte Google ursprünglich den Speicher von Low-End-Android-Smartphones verschlüsseln, doch nun hat das Unternehmen seine Unterstützung dafür zurückgezogen. Die umstrittene Verschlüsselung wird deshalb wieder aus dem Linux-Kernel entfernt. (Linux-Kernel, Verschlüsselung)
---------------------------------------------
https://www.golem.de/news/verschluesselung-nsa-chiffre-speck-fliegt-aus-dem…
∗∗∗ Multiple Remote Code-Execution Flaws Patched in Opsview Monitor ∗∗∗
---------------------------------------------
Five flaws were disclosed Tuesday in monitoring software Opsview Monitor.
---------------------------------------------
https://threatpost.com/multiple-remote-code-execution-flaws-patched-in-opsv…
∗∗∗ WordPress Database Upgrade Phishing Campaign ∗∗∗
---------------------------------------------
We have recently been notified of phishing emails that target WordPress users. The content informs site owners that their database requires an update and looks like this: The email’s appearance resembles that of a legitimate WordPress update message, however the content includes typos and uses an older messaging style. Another suspicious item in the content is the deadline.
---------------------------------------------
https://blog.sucuri.net/2018/09/wordpress-database-upgrade-phishing-campaig…
∗∗∗ PowerPool malware exploits ALPC LPE zero-day vulnerability ∗∗∗
---------------------------------------------
Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure
---------------------------------------------
https://www.welivesecurity.com/2018/09/05/powerpool-malware-exploits-zero-d…
∗∗∗ Lets Trade: You Read My Email, Ill Read Your Password! ∗∗∗
---------------------------------------------
Its been a while, but my last few posts have been on password spraying, which is great approach if your customer has an userid / password interface that faces the internet. I also ran a walk-through on using responder and LLMNR. But what if you are on the outside, and your customer is wise enough to front all of those interfaces with two-factor authentication, or mutual certificate authentication?
---------------------------------------------
https://isc.sans.edu/forums/diary/Lets+Trade+You+Read+My+Email+Ill+Read+You…
=====================
= Vulnerabilities =
=====================
∗∗∗ VU#598349: Problems with automatic DNS registration and autodiscovery ∗∗∗
---------------------------------------------
Problems with automatic DNS registration and autodiscovery. If an attacker with access to the network adds a malicious device to the network with the name WPAD, such an attacker may be able to utilize DNS autoregistration and autodiscovery to act as a proxy for victims on the network, resulting in a loss of confidentiality and [...]
---------------------------------------------
http://www.kb.cert.org/vuls/id/598349
∗∗∗ Opto22 PAC Control Basic and PAC Control Professional ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for a stack-based buffer overflow vulnerability in Opto22s PAC Control software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-247-01
∗∗∗ Android Security Bulletin - September 2018 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. [...] The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.
---------------------------------------------
https://source.android.com/security/bulletin/2018-09-01
∗∗∗ (0Day) Cisco WebEx Network Recording Player Improper Access Control Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Cisco WebEx Network Recording Player. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-18-998/
∗∗∗ Remote Code Execution Vulnerabilities in WECON LeviStudioU ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-18-989/http://www.zerodayinitiative.com/advisories/ZDI-18-990/http://www.zerodayinitiative.com/advisories/ZDI-18-991/http://www.zerodayinitiative.com/advisories/ZDI-18-992/http://www.zerodayinitiative.com/advisories/ZDI-18-993/http://www.zerodayinitiative.com/advisories/ZDI-18-994/http://www.zerodayinitiative.com/advisories/ZDI-18-995/http://www.zerodayinitiative.com/advisories/ZDI-18-996/http://www.zerodayinitiative.com/advisories/ZDI-18-997/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (lcms2), openSUSE (yubico-piv-tool), Oracle (kernel), and SUSE (cobbler and kvm).
---------------------------------------------
https://lwn.net/Articles/764182/
∗∗∗ Synology-SA-18:52 Android Moments ∗∗∗
---------------------------------------------
A vulnerability allows man-in-the-middle attackers to execute arbitrary code via a susceptible version of Android Moments.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_52
∗∗∗ Red Hat Gluster Storage Wed Administration, tendrl-api: Eine Schwachstelle ermöglicht das Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1790/
∗∗∗ Red Hat Virtualization: Mehrere Schwachstellen ermöglichen u. a. das Ausführen beliebigen Programmcodes ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1798/
∗∗∗ cURL: Eine Schwachstelle ermöglicht u. a. einen Denial-of-Service-Angriff ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1796/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Security Advisory - FRP Bypass Vulnerability in Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180905-…
∗∗∗ Security Advisory - DoS Vulnerability in Some Huawei Smart Phones ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180905-…
∗∗∗ Python vulnerability CVE-2014-9365 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K11068141
∗∗∗ HPESBST03884 rev.1 - HPE ConvergedSystem 700 Solutions Using HPE 3PAR Service Processor, Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_n…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 03-09-2018 18:00 − Dienstag 04-09-2018 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Thousands of Compromised MikroTik Routers Send Traffic to Attackers ∗∗∗
---------------------------------------------
Attackers compromising MikroTik routers have configured the devices to forward network traffic to a handful of IP addresses under their control.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/thousands-of-compromised-mik…
∗∗∗ New Banking Trojan Poses As A Security Module ∗∗∗
---------------------------------------------
A newly discovered banking Trojan departs from the regular tactics observed by malware researchers by choosing visible installation and by adding social engineering components.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-banking-trojan-poses-as-…
∗∗∗ Credit card gobbling code found piggybacking on ecommerce sites ∗∗∗
---------------------------------------------
Be careful! If crooks can upload malicious JavaScript to your ecommerce server, then youre helping the them rip off your own customers.
---------------------------------------------
https://nakedsecurity.sophos.com/2018/09/04/credit-card-gobbling-code-found…
∗∗∗ You cant contain me! :: Analyzing and Exploiting an Elevation of Privilege Vulnerability in Docker for Windows ∗∗∗
---------------------------------------------
I have been continuing my journey of searching for windows breakout vulnerabilities in popular applications and one that I discovered in March I found interesting enough to share. Whilst kernel vulnerabilities are fun to discover, there are many core windows and third party applications that are fundamentally broken in regards to logic [...]
---------------------------------------------
https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-expl…
∗∗∗ Googles Doors Hacked Wide Open By Own Employee ∗∗∗
---------------------------------------------
Last July, in Google’s Sunnyvale offices, a hacker found a way to trick doors into opening without the requisite RFID keycard. Luckily for Google, it was David Tomaschik, an employee at the tech giant, who only had good intentions.
---------------------------------------------
https://www.forbes.com/sites/thomasbrewster/2018/09/03/googles-doors-hacked…
∗∗∗ Erpressungstrojaner Gandcrab verbreitet sich über gefälschte Bewerbungsmails ∗∗∗
---------------------------------------------
Momentan sind vermehrt Fake-Bewerbungen als Mail in Umlauf, die einen gefährlichen Trojaner als Dateianhang haben.
---------------------------------------------
http://heise.de/-4154167
∗∗∗ Sicherheitsforscher warnt vor Browser-Angriffen auf dem Mac ∗∗∗
---------------------------------------------
Mittels URL-Schemata ist es unter macOS möglich, Programme zu aktivieren, die ein Nutzer nicht ausgelöst haben möchte.
---------------------------------------------
http://heise.de/-4154059
∗∗∗ Of ML and malware: What’s in store? ∗∗∗
---------------------------------------------
All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme The post Of ML and malware: What’s in store? appeared first on WeLiveSecurity
---------------------------------------------
https://www.welivesecurity.com/2018/09/04/ml-malware-whats-in-store/
∗∗∗ Gefälschte Microsoft-Nachricht im Umlauf ∗∗∗
---------------------------------------------
Datendiebe versenden eine gefälschte Microsoft-Nachricht. Darin behaupten sie, dass das E-Mailkonto von Empfänger/innen gesperrt sei. Damit Nutzer/innen wieder auf ihr Postfach zugreifen können, sollen sie ihre Identität auf einer unbekannten Website bestätigen. Das führt zur Datenübermittlung an Kriminelle. Diese können dadurch Verbrechen unter dem Namen ihrer Opfer begehen.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-microsoft-nachricht-im-u…
=====================
= Vulnerabilities =
=====================
∗∗∗ Lenovo Computer: Schwachstelle ermöglicht Offenlegung von Informationen ∗∗∗
---------------------------------------------
Es existiert eine Schwachstelle in Lenovo Computern mit Intel Prozessoren und Intel Optane Speichermodulen bezüglich der Festplattenverschlüsselung. Wenn die Optane Speichermodule konfiguriert werden, bevor die Festplattenverschlüsselung aktiviert wird, bleiben Teile des Speichers unverschlüsselt.
---------------------------------------------
https://www.bsi-fuer-buerger.de/SharedDocs/Warnmeldungen/DE/TW/2018/09/warn…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by openSUSE (ImageMagick, libressl, postgresql10, spice, and spice-gtk), Red Hat (collectd, kernel, Red Hat Gluster Storage, Red Hat Virtualization, RHGS WA, rhvm-appliance, and samba), and SUSE (crowbar, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui, kernel, spice, and spice-gtk).
---------------------------------------------
https://lwn.net/Articles/764130/
∗∗∗ Red Hat Gluster Storage, collectd: Zwei Schwachstellen ermöglichen Denial-of-Service-Angriffe ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1787/
∗∗∗ Red Hat Gluster Storage, Samba: Mehrere Schwachstellen ermöglichen u. a. die Manipulation von Dateien ∗∗∗
---------------------------------------------
https://adv-archiv.dfn-cert.de/adv/2018-1786/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 31-08-2018 18:00 − Montag 03-09-2018 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ CryptoNar Ransomware Discovered and Quickly Decrypted ∗∗∗
---------------------------------------------
This week a new CryptoJoker ransomware variant was discovered called CryptoNar that has infected victims. The good news, is that a free decryptor was quickly released so that these victims can get their files back for free.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cryptonar-ransomware-discove…
∗∗∗ Kostenpflichtige Gratisproben von BeautyShop International ∗∗∗
---------------------------------------------
Konsument/innen bestellen von BeautyShop International Kosmetika als kostenlose Produktproben. Diese erhalten sie mit einer Rechnung von AB Commerce Collect. Bezahlen sie den geforderten Geldbetrag nicht, folgen hohe Mahnungen. Nachdem zwischen Konsument/innen und BeautyShop International kein kostenpflichtiger Vertrag zustande kommt, müssen sie den geforderten Betrag nicht bezahlen.
---------------------------------------------
https://www.watchlist-internet.at/news/kostenpflichtige-gratisproben-von-be…
=====================
= Vulnerabilities =
=====================
∗∗∗ [20180802] - Core - Stored XSS vulnerability in the frontend profile ∗∗∗
---------------------------------------------
Project: Joomla! SubProject: CMS
Impact: Low
Severity: Low
Versions: 1.5.0 through 3.8.11
Exploit type: XSS
CVE Number: CVE-2018-15880
Inadequate output filtering on the user profile page could lead to a stored XSS attack. Affected Installs Joomla! CMS versions 1.5.0 through 3.8.11 Solution Upgrade to version 3.8.12 Contact The JSST at the Joomla! Security Centre. Reported By: Fouad Maakor
---------------------------------------------
https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-v…
∗∗∗ CA Release Automation Object Deserialization Error Lets Remote Users Execute Arbitrary Code on the Target System ∗∗∗
---------------------------------------------
Version(s): 6.3, 6.4, 6.5; possibly older versions
Description: A vulnerability was reported in CA Release Automation. A remote user can execute arbitrary code on the target system.
A remote user can send specially crafted data to trigger an object deserialization error and execute arbitrary code on the target system.
---------------------------------------------
http://www.securitytracker.com/id/1041591
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (dojo, libtirpc, mariadb-10.0, php5, ruby-json-jwt, spice, spice-gtk, tomcat8, and trafficserver), Fedora (ghc-hakyll, ghc-hs-bibutils, ghostscript, mariadb, pandoc-citeproc, phpMyAdmin, and xen), Mageia (java-1.8.0-openjdk, libarchive, libgd, libraw, libxcursor, mariadb, mercurial, openssh, openssl, poppler, quazip, squirrelmail, and virtualbox), openSUSE (cobbler, libressl, wireshark, and zutils), and SUSE (couchdb, java-1_7_0-ibm, java-1_7_1-ibm, spice).
---------------------------------------------
https://lwn.net/Articles/764046/
∗∗∗ Cisco: CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Notice - Statement About the Vulnerability in Huawei B315s-22 Products Disclosed by Security Researcher ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2018/huawei-sn-20180903-01-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 30-08-2018 18:00 − Freitag 31-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Firework: Leveraging Microsoft Workspaces in a Penetration Test ∗∗∗
---------------------------------------------
WCX files can be used to configure a Microsoft Workplace on a system with a couple of clicks. The enrollment process could disclose credentials in the form of a NetNTLM hash. Authentication will either take place automatically on older [...]
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/Firework--Leveraging-Micros…
∗∗∗ BEC fraud burgeoning despite training ∗∗∗
---------------------------------------------
Business email compromises (BEC) - commonly referred to as CEO Fraud because the CEOs identity is being impersonated - continues to grow and, more significantly, succeed due to the simplicity and urgency of the attacks, according to recent study from Barracuda of some 3,000 attacks.
---------------------------------------------
https://www.scmagazine.com/bec-fraud-burgeoning-despite-training/article/79…
∗∗∗ John McAfees "unhackbares" Bitcoin-Wallet Bitfi gehackt – mehrmals ∗∗∗
---------------------------------------------
Zum wiederholten Male haben Sicherheitsforscher eigentlich geheime Passphrasen aus dem Bitcoin-Wallet Bitfi ausgelesen.
---------------------------------------------
http://heise.de/-4152116
∗∗∗ How We Micropatched a Publicly Dropped 0day in Task Scheduler (CVE-UNKNOWN) ∗∗∗
---------------------------------------------
[...] Earlier this week security researcher SandboxEscaper published details and proof-of-concept (POC) for a "0day" local privilege escalation vulnerability in Windows Task Scheduler service, which allows a local unprivileged user to change permissions of any file on the system - and thus subsequently replace or modify that file. As the researchers POC demonstrates, one can use this vulnerability [...]
---------------------------------------------
https://blog.0patch.com/2018/08/how-we-micropatched-publicly-dropped.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Philips e-Alert Unit ∗∗∗
---------------------------------------------
This advisory includes mitigation recommendations for numerous vulnerabilities in Phillips e-Alert Unit, a non-medical device.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (389-ds-base, bind9, and squirrelmail), Fedora (dolphin-emu), openSUSE (libX11), SUSE (cobbler, GraphicsMagick, ImageMagick, liblouis, postgresql10, qemu, and spice), and Ubuntu (libx11).
---------------------------------------------
https://lwn.net/Articles/763906/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 29-08-2018 18:00 − Donnerstag 30-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ What are botnets downloading? ∗∗∗
---------------------------------------------
Every day we intercept numerous file-download commands sent to bots of various types and families. Here we present the results of our botnet activity analysis for H2 2017 and H1 2018.
---------------------------------------------
https://securelist.com/what-are-botnets-downloading/87658/
∗∗∗ Crypto Mining Is More Popular Than Ever!, (Thu, Aug 30th) ∗∗∗
---------------------------------------------
We already wrote some diaries about crypto miners and they remain more popular than ever. Based on my daily hunting statistics, we can see that malicious scripts performing crypto mining operations ..
---------------------------------------------
https://isc.sans.edu/diary/rss/24050
∗∗∗ Kritische Lücke in der Klinik: Netzwerk-Gateways am Krankenbett angreifbar ∗∗∗
---------------------------------------------
Capsule-Netzwerkgeräte der Firma Qualcomm Life verbinden Geräte am Krankenbett mit dem Krankenhaus-Netzwerk. Hier klafft eine kritische Sicherheitslücke.
---------------------------------------------
http://heise.de/-4151345
∗∗∗ Intel entwickelt Spezial-Linux für sicherheitskritische Einsätze ∗∗∗
---------------------------------------------
Das Intel Safety Critical Project for Linux OS soll autonome Roboter, Drohnen und selbstfahrende Autos sicher machen.
---------------------------------------------
http://heise.de/-4151374
∗∗∗ Rocke: The Champion of Monero Miners ∗∗∗
---------------------------------------------
Cryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised devices to mine ..
---------------------------------------------
https://blog.talosintelligence.com/2018/08/rocke-champion-of-monero-miners.…
∗∗∗ Cyberkriminalität - Schwedischer Wahlkampf vermehrt Cyberangriffen ausgesetzt ∗∗∗
---------------------------------------------
Gefälschte Social-Media-Accounts verbreiten vermehrt falsche Informationen
---------------------------------------------
https://derstandard.at/2000086347410/Schwedischer-Wahlkampf-vermehrt-Cybera…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libx11), Fedora (bouncycastle, libxkbcommon, libzypp, nodejs, ntp, openssh, tomcat, xen, and zypper), Red Hat (ansible, kernel, and opendaylight), and SUSE (apache2, cobbler, ImageMagick, libtirpc, libzypp, zypper, and qemu).
---------------------------------------------
https://lwn.net/Articles/763824/
∗∗∗ BlackBerry Powered by Android Security Bulletin - August 2018 ∗∗∗
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
∗∗∗ Bing Autosuggest API - Moderately critical - Cross Site Scripting - SA-CONTRIB-2018-058 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-058
∗∗∗ Drupal Commerce - Moderately critical - Access bypass - SA-CONTRIB-2018-057 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-057
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 28-08-2018 18:00 − Mittwoch 29-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Active Attacks Detected Using Apache Struts Vulnerability CVE-2018-11776 ∗∗∗
---------------------------------------------
After last week a security researcher revealed a vulnerability in Apache Struts, a piece of very popular enterprise software, active exploitation attempts have started this week.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/active-attacks-detected-usin…
∗∗∗ OpenSSH Versions Since 2011 Vulnerable to Oracle Attack ∗∗∗
---------------------------------------------
OpenSSH continues to be vulnerable to oracle attacks, and the issue affects all versions of the suite since September 2011. Developers fixed a similar bug less than a week ago.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/openssh-versions-since-2011-…
∗∗∗ Loki Bot: On a hunt for corporate passwords ∗∗∗
---------------------------------------------
Starting in early July, we have seen malicious spam activity that has targeted corporate mailboxes. Messages ..
---------------------------------------------
https://securelist.com/loki-bot-stealing-corporate-passwords/87595/
∗∗∗ 3D Printers in The Wild, What Can Go Wrong?, (Wed, Aug 29th) ∗∗∗
---------------------------------------------
Richard wrote a quick diary yesterday about an interesting information that we received from one of our readers. It&#;x26;#;39;s about a huge amount of OctoPrint interfaces that are publicly facing the Internet. Octoprint[1] is a web interface for ..
---------------------------------------------
https://isc.sans.edu/diary/rss/24044
∗∗∗ PHP-Paket-Repository Packagist.org war für Schadcode anfällig ∗∗∗
---------------------------------------------
In der Webseite Packagist.org klaffte eine gefährliche Sicherheitslücke. Angreifer hätten mit vergleichsweise wenig Aufwand Schadcode ausführen können.
---------------------------------------------
http://heise.de/-4149216
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-4281 tomcat8 - security update ∗∗∗
---------------------------------------------
Several issues were discovered in the Tomcat servlet and JSPengine. They could lead to unauthorized access to protected resources, denial-of-service, or information leak.
---------------------------------------------
https://www.debian.org/security/2018/dsa-4281
∗∗∗ Cisco Data Center Network Manager Path Traversal Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system.The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending ..
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 24-08-2018 18:00 − Montag 27-08-2018 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ PoC Code Surfaces to Exploit Apache Struts 2 Vulnerability ∗∗∗
---------------------------------------------
Researchers find proof-of-concept code that can take advantage of the recently identified Apache Struts framework (CVE-2018-11776) vulnerability.
---------------------------------------------
https://threatpost.com/poc-code-surfaces-to-exploit-apache-struts-2-vulnera…
∗∗∗ Password Protected Word Document Delivers HERMES Ransomware ∗∗∗
---------------------------------------------
Evading AV detection is part of a malware authors routine in crafting spam campaigns and an old and effective way of achieving this is spamming a password protected document. Recently, we observed such a ..
---------------------------------------------
https://trustwave.com/Resources/SpiderLabs-Blog/Password-Protected-Word-Doc…
∗∗∗ Well, cant get hacked if your PC doesnt work... McAfee yanks BSoDing Endpoint Security patch ∗∗∗
---------------------------------------------
Dont install August update, world+dog warned McAfee has pulled a version of its Endpoint Security software after folks reported the antivirus software was crashing their ..
---------------------------------------------
www.theregister.co.uk/2018/08/24/mcafee_blue_screen_of_death/
∗∗∗ A new issue of our SWITCH Security Report is available! ∗∗∗
---------------------------------------------
Dear Reader! A new issue of our bi-monthly SWITCH Security Report is available! The topics covered in this report are: An own goal and serious foul: Spanish football league’s app turns 10 million users into involuntarily ..
---------------------------------------------
https://securityblog.switch.ch/2018/08/27/a-new-issue-of-our-switch-securit…
∗∗∗ Schwachstelle Royale: Fortnite-Installer für Android offen für freies Nachladen ∗∗∗
---------------------------------------------
Bei der Android-Version von Fortnite Battle Royale umging Epic Games den Play Store und lieferte einen eigenen Installer – mit gravierender Sicherheitslücke.
---------------------------------------------
http://heise.de/-4145876
∗∗∗ Who’s Behind the Screencam Extortion Scam? ∗∗∗
---------------------------------------------
The sextortion email scam last month that invoked a real password used by each recipient and threatened to release embarrassing Webcam videos almost certainly was not the work of one criminal or even one group of criminals. Rather, its likely that additional spammers and scammers piled on with their own versions of the phishing email after ..
---------------------------------------------
https://krebsonsecurity.com/2018/08/whos-behind-the-screencam-extortion-sca…
∗∗∗ Verschlüsselung - Wenn Paypal und Co plötzlich nicht mehr funktionieren ∗∗∗
---------------------------------------------
Mozilla und Google vertrauen Symantec-Zertifikaten in Entwicklungsversionen ihrer Browser nicht mehr
---------------------------------------------
https://derstandard.at/2000086139348/Wenn-Paypal-und-Co-ploetzlich-nicht-me…
=====================
= Vulnerabilities =
=====================
∗∗∗ Synology-SA-18:50 Drive ∗∗∗
---------------------------------------------
A vulnerability allows remote attackers to obtain sensitive information via a susceptible version of Drive.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_18_50
∗∗∗ File (Field) Paths - Critical - Remote Code Execution - SA-CONTRIB-2018-056 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2018-056
∗∗∗ Multiple Cross Site Scripting on FortiCloud Web Interface Login ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/FG-IR-18-026
∗∗∗ Forgot password link doesnt expire after use ∗∗∗
---------------------------------------------
https://fortiguard.com/psirt/FG-IR-18-074
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily