=======================
= End-of-Shift report =
=======================
Timeframe: Montag 23-02-2015 18:00 − Dienstag 24-02-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Open Source Threat Intelligence - Developing a Threat intelligence program using open source tools and public sources ***
---------------------------------------------
Overview of building a threat intelligence program outlining the processes, tasks and activities associated with the development of a functional intelligence program. Developing an Open Source Threat Intelligence Program from Open Source Tools and Public Sources is aimed at bringing business value and technical mitigation efforts, while dispelling common myths like "We're too small", "Who would attack us, we make widgets?" and "We have nothing anyone would...
---------------------------------------------
http://blog.malwareresearch.institute/video/2015/02/23/open-source-threat-i…
*** RIG Exploit Kit - Diving Deeper into the Infrastructure ***
---------------------------------------------
Following our previous blog post about the leaking of the RIG exploit kits source code, we dug deeper into the architecture that facilitates the massive infections using RIG. The screen shot below diagrams RIGs infrastructure. RIG Exploit Kit Infrastructure Most...
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/RIG-Exploit-Kit-%e2%80%…
*** Insider threats continue to dominate ***
---------------------------------------------
Ordinary employees, privileged users and the supply chain - such as contractors and third party service providers - are all conduits for a traditional insider threat, according to Vormetric. But the s...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17993
*** Overview of handheld malware for 2014 ***
---------------------------------------------
February 24, 2015 Russian anti-virus company Doctor Web presents its 2014 overview of malware for handheld devices. The last year proved to be rather turbulent and rich in terms of information security events. We witnessed the emergence of a variety of new malicious applications for Android. In particular, the number of banking Trojans whose numerous modifications attacked devices in many countries increased significantly. Furthermore, 2014 saw the discovery of the first ransomware programs as...
---------------------------------------------
http://news.drweb.com/show/?i=9222&lng=en&c=9
*** Bypassing Windows Lock Screen via Flash Screensaver ***
---------------------------------------------
bypass windows lock screen We have recently discovered an easy method to bypass the Windows Lock screen when a flash screensaver is running. The method allows an attacker to gain unauthorized access to a user’s Windows session if he has physical access to a locked machine.
---------------------------------------------
http://securitycafe.ro/2015/02/23/bypassing-windows-lock-screen-via-flash-s…
*** Windows Exploit Mitigation Technology - Part 2 ***
---------------------------------------------
In Part 1, we explained GS cookies and Safe SEH. If you haven't read that part, it is highly recommended to read it first. The Enhanced Mitigation Experience Toolkit, or EMET, is rudimentally a shield or a shell that runs over Windows applications and protects them, regardless of how those applications have authentically been coded...
---------------------------------------------
http://resources.infosecinstitute.com/windows-exploit-mitigation-technology…
*** Announcing TYPO3 CMS 7.1 ***
---------------------------------------------
The TYPO3 Community has just released TYPO3 CMS 7.1, the second version within the CMS 7 development cycle.
---------------------------------------------
http://typo3.org/news/article/typo3-cms-71-released-home-improvement/
*** DSA-3171 samba - security update ***
---------------------------------------------
Richard van Eeden of Microsoft Vulnerability Research discovered thatSamba, a SMB/CIFS file, print, and login server for Unix, contains aflaw in the netlogon server code which allows remote code execution withroot privileges from an unauthenticated connection.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3171
*** DSA-3170 linux - security update ***
---------------------------------------------
Several vulnerabilities have been discovered in the Linux kernel thatmay lead to a denial of service, information leaks or privilegeescalation.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3170
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 20-02-2015 18:00 − Montag 23-02-2015 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Wichtige Sicherheitsupdates für PHP ***
---------------------------------------------
Neue PHP-Versionen schließen unter anderem eine kritische Sicherheitslücke, zu der bereits ein Exploit kursiert. Admins sollten daher keine Zeit verlieren.
---------------------------------------------
http://heise.de/-2557586
*** Data Traffic & Network Security ***
---------------------------------------------
Introduction Last year - dubbed "the Year of the Hack" - saw numerous major cyber attacks against prominent corporations, including JP Morgan bank and Sony Pictures Entertainment. And after Target in 2013, another retailer, Home Depot, suffered a data breach with more than 56 million credit cards stolen. The consequences of these incidents can be...
---------------------------------------------
http://resources.infosecinstitute.com/data-traffic-network-security/
*** Flaw makes Cisco routing hardware vulnerable to DoS attacks ***
---------------------------------------------
A serious vulnerability affecting the software of some of Ciscos routing hardware systems for telecommunications and Internet service providers could be exploited to mount DoS attacks, the company ha...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17990
*** Samba vulnerability (CVE-2015-0240) ***
---------------------------------------------
CVE-2015-0240 is a security flaw in the smbd file server daemon. It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server. No authenticated is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root.
---------------------------------------------
https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-024…
*** Superfish not the only app using Komodias SSL-busting code ***
---------------------------------------------
As Lenovo backtracked on its initial position that the Superfish adware pre-installed on some of its notebooks is not a security danger, and released a security advisory about the "vulnerability" that...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17991
*** Privdog: Comodo-Adware hebelt HTTPS-Sicherheit aus ***
---------------------------------------------
Die Adware Privdog hebelt ähnlich wie Superfish den Schutz von HTTPS komplett aus. Pikant daran: Privdog wurde von Comodo verbreitet, einer der größten Zertifizierungsstellen für TLS-Zertifikate.
---------------------------------------------
http://www.golem.de/news/privdog-comodo-adware-hebelt-https-sicherheit-aus-…
*** FireEye shares details on Masque Attack II affecting iOS devices ***
---------------------------------------------
Masque Attack II entails bypassing an iOS prompt for trust and app URL scheme hijacking, FireEye said.
---------------------------------------------
http://www.scmagazine.com/fireeye-shares-details-on-masque-attack-ii-affect…
*** Cisco Intrusion Prevention System Key Regeneration HTTPS Denial of Service Vulnerability ***
---------------------------------------------
CVE-2015-0631
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Cisco AsyncOS Software HTTP Redirect Vulnerability ***
---------------------------------------------
CVE-2015-0624
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** IBM Security Bulletins ***
---------------------------------------------
Tivoli Storage Manager Stack-based Buffer Overflow Elevation of Privilege: CVE-2014-6184
http://www.ibm.com/support/docview.wss?uid=swg21695878
Vulnerability in SSLv3 affects Tivoli Storage Manager for Virtual Environments 7.1 and FlashCopy Manager for VMware 4.1 (CVE-2014-3566)
http://www.ibm.com/support/docview.wss?uid=swg21690828
OpenSSL vulnerabilities announced August 6th 2014 affect Juniper EX Series Network Switches sold by IBM for use in IBM Products (9 CVEs)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5097073
Vulnerabilities in OpenSSL. Juniper EX Series Network Switches sold by IBM for use in IBM Products. (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470)
http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5097126
---------------------------------------------
*** Siemens SIMATIC STEP 7 TIA Portal Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for two vulnerabilities in the Siemens SIMATIC STEP 7 TIA Portal application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-050-01
*** Vibe 3.4 - Hot Patch 1 ***
---------------------------------------------
Abstract: This patch addresses the Padding Oracle On Downgraded Legacy Encryption (POODLE) vulnerability and also provides a number of general bug fixes for Novell Vibe 3.4.Document ID: 5198730Security Alert: YesDistribution Type: PublicEntitlement Required: NoFiles:NV-Vibe60DayEval-001.xml (719 bytes)NV-Vibe10Usr-001.xml (730 bytes)novell-vibe-3.4.0-windows.zip (185.69 MB)readme-Vibe-3.4-HP1.txt (4.13 kB)novell-vibe-3.4.0-linux.tar (187.8 MB)Products:Vibe 3.4Superceded Patches: None
---------------------------------------------
https://download.novell.com/Download?buildid=EaNhJs2Offs~
*** Bugtraq: iTunes 12.1.1 for Windows: still outdated and VULNERABLE 3rd party libraries, still UNQUOTED and VULNERABLE pathnames C:\Program Files\... ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534728
*** MyBB 1.8.3 Multiple stored XSS-vulnerabilities ***
---------------------------------------------
Topic: MyBB 1.8.3 Multiple stored XSS-vulnerabilities Risk: Low Text: The researchers adamziaja, Devilshakerz, DingjieYang and me found multiple stored XSS-vulnerabilities in the administrative ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015020109
*** DSA-3169 eglibc - security update ***
---------------------------------------------
Several vulnerabilities have been fixed in eglibc, Debians version ofthe GNU C library:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3169
*** DSA-3164 typo3-src - security update ***
---------------------------------------------
Pierrick Caillon discovered that the authentication could be bypassed inthe Typo 3 content management system. Please refer to the upstreamadvisory for additional information:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3164
*** Security Advisory: Elasticsearch vulnerability CVE-2015-1427 ***
---------------------------------------------
Elasticsearch versions 1.3.0-1.3.7 and 1.4.0-1.4.2 have vulnerabilities in the Groovy scripting engine. The vulnerabilities allow an attacker to construct Groovy scripts that escape the sandbox and execute shell commands as the user running the Elasticsearch Java VM. We have been assigned CVE-2015-1427 for this. Fixed versions: Versions 1.3.8 and 1.4.3 disable sandboxing for Groovy by default. As a consequence, dynamic script execution is disabled for Groovy. CVSS: Overall CVSS score: 5.8
---------------------------------------------
http://securityvulns.com/docs31742.html
*** HPSBUX03240 SSRT101872 rev.1 - HP-UX Running NTP, Remote Execution of Code, Denial of Service (DoS), or Other Vulnerabilties ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to execute code, create a Denial of Service (DoS), or other vulnerabilities.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 19-02-2015 18:00 − Freitag 20-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Gemalto hack - lessons learned ***
---------------------------------------------
In der Nacht auf FR, 20.2.2015 ist die nächste Bombe aus den Snowden leaks eingeschlagen: der niederländische Chipkartenhersteller Gemalto ist zumindest im Zeitraum Jänner 2010 bis März 2010 von GCHQ und NSA gehackt worden. Hierbei sind angeblich ..
---------------------------------------------
https://www.cert.at/services/blog/20150220150747-1386.html
*** Superfish - Eine Zusammenfassung ***
---------------------------------------------
Die meisten im Handel erhältlichen Notebooks werden mit einer vorinstallierten Version von Windows in Kombination mit weiterer "nützlicher" Software - gemeinhin als "Bloatware" bezeichnet - ausgeliefert. Für die meisten Leute ist diese auf Notebooks vorinstallierte Bloatware ..
---------------------------------------------
http://www.cert.at/services/blog/20150220162905-1395.html
*** The Great SIM Heist - How Spies Stole the Keys to the Encryption Castle ***
---------------------------------------------
American and british spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
---------------------------------------------
https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
*** Hackers now popping Cisco VPN portals ***
---------------------------------------------
Crackers are popping customised Cisco virtual private networks, stealing credentials and spraying malware using a flaw reported by Aussie hacker Alec Stuart-Muirk, the company warns. Organisations running the Cisco Clientless SSL ..
---------------------------------------------
http://www.theregister.co.uk/2015/02/20/hackers_popping_cisco_vpn_portals/
*** Suit Up and Protect WordPress ***
---------------------------------------------
In the final part of the series, I am going to show a few practical tips and tricks for protecting your WordPress blog.
---------------------------------------------
https://blog.gaborszathmari.me/2015/02/19/suit-up-and-protect-wordpress/
*** Evil CSS injection bug warning: Dont let hackers cross paths with your website (The Register) ***
---------------------------------------------
http://www.theregister.co.uk/2015/02/20/prssi_web_vuln/
*** Filme, Musik, Logindaten: 190.000 Festplatten sind ungesichert im Netz ***
---------------------------------------------
Junger Informatiker grast das Netz mit eigenem Tool ab und wundert sich über "Fahrlässigkeit"
---------------------------------------------
http://derstandard.at/2000011951714
*** 'TNT' gang has released a new hardware TDoS tool in the criminal underground ***
---------------------------------------------
Telephone DDoS attacks are on the rise, the criminal group known as 'TNT' gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed ..
---------------------------------------------
http://securityaffairs.co/wordpress/33867/cyber-crime/tnt-gang-released-tdo…
*** IETF verbietet RC4-Verschlüsselung in TLS ***
---------------------------------------------
Das Gremium für Internet-Standards will den Einsatz des als geknackt betrachteten Verschlüsselungsverfahrens RC4 offenbar den Garaus machen.
---------------------------------------------
http://heise.de/-2556520
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 18-02-2015 18:00 − Donnerstag 19-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** SA-CONTRIB-2015-052 - RESTful Web Services - Access Bypass ***
---------------------------------------------
This module enables you to expose Drupal entities as RESTful web services. It provides a machine-readable interface to exchange resources in JSON, XML and RDF. The RESTWS Basic Auth submodule doesn't sufficiently disable page caching for ...
---------------------------------------------
https://www.drupal.org/node/2428863
*** SA-CONTRIB-2015-048 - Avatar Uploader - Arbitrary PHP code execution ***
---------------------------------------------
Avatar Uploader module provides an alternative way to upload user pictures. The module doesn't sufficiently enforce file extensions when an avatar is uploaded, allowing users to bypass Drupal's normal file upload protections to ..
---------------------------------------------
https://www.drupal.org/node/2428793
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** BIND: A Problem with Trust Anchor Management Can Cause named to Crash ***
---------------------------------------------
BIND servers which are configured to perform DNSSEC validation and which are using managed-keys (which occurs implicitly when using "dnssec-validation auto;" or "dnssec-lookaside auto;") may terminate with an assertion failure when .
---------------------------------------------
https://kb.isc.org/article/AA-01235/0
*** OWASP AppSensor - implement real-time intrusion detection within in your software ***
---------------------------------------------
Free, open source, DevOps friendly and cloud compatible AppSensor provides real-time application-layer attack detection and response.
---------------------------------------------
https://www.owasp.org/images/8/8e/Appsensor_intro_for_developers.pdf
*** Lenovo-Laptops durch Superfish-Adware angreifbar ***
---------------------------------------------
Eine Adware namens Superfish wird offenbar schon seit mehreren Monaten auf Laptops von Lenovo ausgeliefert. Diese fügt Werbung in fremde Webseiten ein und installiert dafür ein Root-Zertifikat - eine riesige Sicherheitslücke.
---------------------------------------------
http://www.golem.de/news/adware-lenovo-laptops-durch-superfish-adware-angre…
*** Macros? Really?! ***
---------------------------------------------
.. macro-based malware is now making a "successful" comeback. Last week, we saw a significant Dridex malware run that was using macros in Excel files (.XLSM), and earlier this week, the crooks behind the banking spyware "Vawtraq" started to spam the usual "Fedex Package" and "Tax Refund" emails, ..
---------------------------------------------
https://isc.sans.edu/diary/Macros%3F+Really%3F!/19349
*** Automating Removal of Java Obfuscation ***
---------------------------------------------
In this post we detail a method to improve analysis of Java code for a particular obfuscator, we document the process that was followed and demonstrate the results of automating our method. Obscurity will not stop an attacker and once the method is known, methodology can be developed to automate the process.
---------------------------------------------
http://www.contextis.com/resources/blog/automating-removal-java-obfuscation/
*** IETF: RC4 in TLS offiziell nicht mehr erlaubt ***
---------------------------------------------
Die RC4-Verschlüsselung darf laut dem neuen RFC 7465 nicht mehr für TLS-Verbindungen genutzt werden. Der Algorithmus gilt schon lange als problematisch, Details über neue Angriffe sollen in Kürze veröffentlicht werden.
---------------------------------------------
http://www.golem.de/news/ietf-rc4-in-tls-offiziell-nicht-mehr-erlaubt-1502-…
*** Cross-Site Tracing (XST): The misunderstood vulnerability ***
---------------------------------------------
Alas, the 'XS' in XST evokes similarity to XSS (Cross-Site Scripting) which has the consequence of leading people to mistake XST as a method for injecting JavaScript. (Thankfully, character encoding attacks have avoided the term Cross-Site Unicode, XSU.) Although XST attacks rely on browser scripting ..
---------------------------------------------
http://deadliestwebattacks.com/2010/05/18/cross-site-tracing-xst-the-misund…
*** Duplicator 0.5.8 - Privilege Escalation ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7799
*** Technology doping: Competitive advantage by abusing security flaws in smart sports equipment ***
---------------------------------------------
The term 'Technology doping' has recently been used [1] to mean the practice of gaining a competitive advantage through using sports equipment e.g. The LZR Racer bodysuit [2] that was used by many of the swimmers during the Beijing Olympics, resulting in world records being broken. Shortly afterwards, FINA (Federation Internationale de Natation), the international ..
---------------------------------------------
https://www.nccgroup.com/en/blog/2015/02/technology-doping-competitive-adva…
*** l+f: Geklonte SSH-Schlüssel sind böse ***
---------------------------------------------
Tausende von Geräten im Netz verwenden ein und den selben SSH-Schlüssel. Das birgt Gefahren.
---------------------------------------------
http://heise.de/-2555229
*** Erpressungs-Software im Aufstieg: Wenn Daten zur Geisel werden ***
---------------------------------------------
Immer mehr Kriminelle setzen auf "Ransomware", um Lösegeld zu erpressen. Ihr nächstes Ziel: Mobiltelefone.
---------------------------------------------
http://derstandard.at/2000011389615
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 17-02-2015 18:00 − Mittwoch 18-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Sicher surfen trotz Android 4.3 ***
---------------------------------------------
Der WebView-Bug von Android 4.3 könnte sich stärker auswirken als bisher bekannt. Auch wenn die Angriffsszenarien bisher nur theoretische Proof-of-Concepts sind, sollten Sie ein paar Vorsichtsmaßnahmen ergreifen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Sicher-surfen-trotz-Android-4-3-2552…
*** Bug des Tages: Der FreeBSD-Zufallszahlengenerator war ... ***
---------------------------------------------
Bug des Tages: Der FreeBSD-Zufallszahlengenerator war seit vier Monaten kaputt. Das betrifft glaube ich nur FreeBSD-current. Wer in der Zeit PGP- oder SSH- oder sonstige Krypto-Keys generiert hat, sollte die dann wohl auch mal zurückrufen und neue machen.
---------------------------------------------
http://blog.fefe.de/?ts=aa1d7111
*** Fuzzing for MS15-010 ***
---------------------------------------------
Intro This past Patch Tuesday Microsoft released MS15-010: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution. This patch addressed multiple privately reported vulnerabilities in ..
---------------------------------------------
http://blog.beyondtrust.com/fuzzing-for-ms15-010
*** Siemens SIMATIC STEP 7 TIA Portal Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for authentication vulnerabilities in the Siemens SIMATIC STEP 7 TIA Portal application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-048-01
*** Siemens SIMATIC WinCC TIA Portal Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for authentication vulnerabilities in the Siemens SIMATIC WinCC TIA Portal application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-048-02
*** Yokogawa HART Device DTM Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an improper input vulnerability in the CodeWrights GmbH HART Device Type Manager (DTM) library utilized in Yokogawa's HART Device DTM.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-048-03
*** D-Link DSL-2640B DNS hijacking ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/100955
*** Duplicate SSH Keys Everywhere ***
---------------------------------------------
Back in December when I revamped the SSH banner and started collecting the fingerprint I noticed an odd behavior. It turns out that a few SSH keys are used a lot more than once.
---------------------------------------------
https://blog.shodan.io/duplicate-ssh-keys-everywhere/
*** Beware of fake Facebook "Copyright Violations" warnings ***
---------------------------------------------
The latest Facebook-themed phishing messages doing rounds are trying to trick users into believing they are "making copyright violations" on their Facebook page. "Please review your ..
---------------------------------------------
http://www.net-security.org/secworld.php
*** Microsoft wirbt mit Sicherheit nach ISO 27018 ***
---------------------------------------------
Microsofts Cloud-Dienste Office 365 und Dynamics CRM Online sind von dem British Standards Institute (BSI) nach den Sicherheitsstandards zertifiziert worden, wie sie in ISO/IEC 27018 definiert sind. Diese Standards sollen für Microsoft weltweit gelten. Azure hat bereits eine solche ..
---------------------------------------------
http://www.golem.de/news/cloud-dienste-microsoft-wirbt-mit-sicherheit-nach-…
*** Kippo Modifications - New Features ***
---------------------------------------------
Since summer last year I've been working on extensions and contributions to the well known Kippo honeypot developed by desaster. ... New Features: SFTP support, Exec support, SSH tunnelling (direct-tcpip) support, SSH Fingerprint ..
---------------------------------------------
http://www.micheloosterhof.com/kippo-modifications/
*** ENISA's recommendations for Certifying ICS/SCADA professionals ***
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/enisa2019s-recommendations-…
*** Die Geister, die ich rief: Netgear-Router über Genie-App angreifbar ***
---------------------------------------------
Eine Reihe von Netgear-Routerm plaudern durch die Schnittstelle für die Fernwartungs-App Genie wichtige Informationen über das eigene Netzwerk aus. Unter anderem können Angreifer aus dem Netz so Passwörter auslesen.
---------------------------------------------
http://heise.de/-2553224
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 16-02-2015 18:00 − Dienstag 17-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** HITBSecConf2015 Amsterdam ***
---------------------------------------------
Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26th till the 29th of May 2015 and runs alongside HITB Haxpo - our 3-day technology expo for hackers, makers, builders and breakers.
---------------------------------------------
http://conference.hitb.org/hitbsecconf2015ams/
*** Anunak (aka Carbanak) Update ***
---------------------------------------------
... basically Anunak is the name the malware author gave to the main malware used in these attacks. Carbanak is the name the AV industry gave to this malware, which is a combination of the ..
---------------------------------------------
http://www.fox-it.com/en/press-releases/anunak-aka-carbanak-update/
*** HTTP Strict Transport Security comes to Internet Explorer ***
---------------------------------------------
As part of our ongoing commitment to help build an interoperable, secure web that just works, were excited to announce support for HTTP Strict Transport Security (HSTS) in Internet Explorer. This change can be previewed using Internet Explorer in the Windows 10 Technical Preview, and will come to Project Spartan in a later update.
---------------------------------------------
http://blogs.msdn.com/b/ie/archive/2015/02/16/http-strict-transport-securit…
*** TYPO3-EXT-SA-2015-005: Cross-Site Scripting in extension Gridelements (gridelements) ***
---------------------------------------------
The extension fails to properly escape user input in HTML context. Backend Editor permissions with access to any text field within any data table are required to exploit this vulnerability.
---------------------------------------------
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e…
*** MongoDB: Tipps für sichere Benutzung veröffentlicht ***
---------------------------------------------
Nach Schlagzeilen über ungesicherte Online-Installationen der Datenbank MongoDB gibt der Hersteller der kommerziellen Variante Sicherheits-Empfehlungen. Sie zeigen, wie man die populäre Software ohne Datenleck übers Netz nutzen kann.
---------------------------------------------
http://www.heise.de/newsticker/meldung/MongoDB-Tipps-fuer-sichere-Benutzung…
*** TYPO3: Important Security-Bulletin Pre-Announcement ***
---------------------------------------------
A TYPO3 4.5.40 release containing a security fix will be published the day after tomorrow, Thursday 19th of February at about 10:00 am CET.
---------------------------------------------
http://typo3.org/news/article/important-security-bulletin-pre-announcement/
*** Bericht: Lightning-Anschluss gehackt ***
---------------------------------------------
Einem Entwickler hat es geschafft, den von Apple verwendeten Sicherheitschip für die Anschlusskabel von iPhone und Co. teilweise zu entschlüsseln und eine serielle Konsole aufzurufen. Das könnte zu ganz neuen Angriffsformen führen.
---------------------------------------------
http://heise.de/-2550921
*** Defeating TrueCrypt: Practical Attacks against TrueCrypt Security ***
---------------------------------------------
The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a daily basis. This is facilitated by easy-to-use GUI tools like TrueCrypt that offer advanced encryption without hassles. TrueCrypt ..
---------------------------------------------
http://resources.infosecinstitute.com/defeating-truecrypt-practical-attacks…
*** SSA-315836 (Last Update 2015-02-17): Vulnerabilities in SIMATIC STEP 7 (TIA Portal) V12 and V13 ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** Vawtrack malware peddlers turn to malicious macros ***
---------------------------------------------
Cybercriminals spreading new versions of the Vawtrak banking Trojan are the latest ones to use the once again popular macro-based attack. Popular in the early 2000s, this type of attack was abandon...
---------------------------------------------
http://www.net-security.org/malware_news.php?id=2967
*** APT Groups Emerging in Middle East ***
---------------------------------------------
Since security researchers and vendors began exposing the inner workings of APT groups a few years ago, virtually all of the operations that have been made public have been the work of attackers in Europe, Asia or North America. But ..
---------------------------------------------
http://threatpost.com/apt-groups-emerging-in-middle-east/111124
*** Inside nls_933w.dll, the Equation APT Persistence Module ***
---------------------------------------------
The persistence module used by the Equation APT Group uncovered by researchers at Kaspersky Lab has been called the ultimate cyberattack tool.
---------------------------------------------
http://threatpost.com/inside-nls_933w-dll-the-equation-apt-persistence-modu…
*** Keeping Up with SSL ***
---------------------------------------------
SSL is becoming an evermore important aspect of serving and consuming content on the Internet, so its only fit that Shodan extends the information that it gathers for every SSL-capable service. The banners for SSL services, such as HTTPS, have included the certificate in PEM format for a long time and youve been able to access that data through the REST API or real-time stream.
---------------------------------------------
https://blog.shodan.io/ssl-update/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 13-02-2015 18:00 − Montag 16-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Microsoft February Patch Failures Continue: KB3023607 vs. Cisco AnyConnect Client ***
---------------------------------------------
Another patch released by Microsoft this month is causing problems. This time it is KB3023607,which was supposed to mitigate the POODLE vulnerability. Once applied, ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19331
*** PostgreSQL Bugs Let Remote Authenticated Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Deny Service ***
---------------------------------------------
Several vulnerabilities were reported in PostgreSQL. A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can cause denial of service conditions. A remote authenticated user can obtain ..
---------------------------------------------
http://www.securitytracker.com/id/1031742
*** SSA-234789 (Last Update 2015-02-13): Vulnerabilities in SIMATIC STEP 7 (TIA Portal) V13 ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** PowerShell: Better phishing for all! ***
---------------------------------------------
PowerShell is able to import functions from any DLL, this allows you to use functions like VirtualAlloc, memset and CreateThread. This will allow you to allocate executable memory, fill it with your program and execute it.
---------------------------------------------
http://d.uijn.nl/?p=116
*** Analysis of the Fancybox-For-WordPress Vulnerability ***
---------------------------------------------
We were alerted last week of a malware outbreak affecting WordPress sites using version 3.0.2 and lower of the fancybox-for-wordpress plugin. As announced, here are some of the details explaining how attackers could use this ..
---------------------------------------------
http://blog.sucuri.net/2015/02/analysis-of-the-fancybox-for-wordpress-vulne…
*** Probleme mit Windows RT: Microsoft zieht PowerPoint-Patch zurück ***
---------------------------------------------
Per Patch wollte Microsoft die Stabilität von PowerPoint verbessern. Nutzer von Windows RT-Geräten hatten jedoch nach der Installation des Patches berichtet, dass sich Powerpoint nicht mehr starten lasse. Jetzt hat Microsoft den Patch zurückgezogen.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Probleme-mit-Windows-RT-Microsoft-zi…
*** Sicherheitslücke in Gruppenrichtlinien: Mit dem Patchen allein ist es nicht getan ***
---------------------------------------------
Admins aufgepasst: Eines der am Februar-Patchday ausgelieferten Updates schützt nur, wenn man eine Reihe von Anweisungen befolgt. Tut man das nicht, bleibt die Infrastruktur für Man-in-the-Middle-Angriffe anfällig.
---------------------------------------------
http://heise.de/-2550209
*** The Great Bank Heist, or Death by 1,000 Cuts? ***
---------------------------------------------
I received a number of media requests and emails from readers over the weekend to comment on a front-page New York Times story about an organized gang of cybercriminals pulling off 'one of the largest bank heists ever.' Turns out, I reported on this gang's activities in December 2014, although my story ran minus many of the superlatives in the Times piece.
---------------------------------------------
http://krebsonsecurity.com/2015/02/the-great-bank-heist-or-death-by-1000-cu…
*** The research: Mobile Internet traffic hijacking via GTP and GRX ***
---------------------------------------------
Most users assume that mobile network access is much safer because a big mobile-telecoms provider will protect subscribers. Unfortunately, as practice shows, mobile Internet is a great opportunity for the attacker.
---------------------------------------------
http://blog.ptsecurity.com/2015/02/the-research-mobile-internet-traffic.html
*** Angriffsziel Bitcoinbörse: Bter und Exco.in gehackt ***
---------------------------------------------
Die Jagdsaison auf Bitcoinbörsen scheint wieder loszugehen: Unbekannte haben die Handelsplattform Bter um Coins im Wert von fast 1,5 Millionen Euro erleichtern können. Die Börse Exco.in wurde gleich aller Bitcoins beraubt.
---------------------------------------------
http://heise.de/-2550175
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 12-02-2015 18:00 − Freitag 13-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Open-Xchange Access Control Flaw Lets Remote Authenticated Users Access Restricted Files ***
---------------------------------------------
A vulnerability was reported in Open-Xchange. A remote authenticated user can access certain files on the target system.
A remote authenticated user with access to publications can access shared files without permission to access them.
---------------------------------------------
http://www.securitytracker.com/id/1031744
*** Security Advisory-Information Leakage Vulnerability in Huawei P7 Smartphone ***
---------------------------------------------
MeWidget is a plug-in of Huawei Emotion UI. The MeWidget module on Huawei smartphone P7 has a vulnerability that could lead to the disclosure of contact information. Attackers can obtain the name and URI information of mobile phone users through the malware installed on the smartphones.
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Apple: Zwei-Faktor-Schutz für iMessage und FaceTime ***
---------------------------------------------
Apple bietet ab sofort die Zwei-Faktor-Authentifizierung auch für seine Dienste FaceTime und iMessage an. Dieses schützt das Konto mit einem zweiten Passwort.
---------------------------------------------
http://futurezone.at/digital-life/apple-zwei-faktor-schutz-fuer-imessage-un…
*** NetGear WNDR Authentication Bypass / Information Disclosure ***
---------------------------------------------
.. viewing and setting of certain router parameters, such as: WLAN credentials and SSIDs. Connected clients. Guest WLAN credentials and SSIDs. Parental control settings. ... As this SOAP service is called via the built-in HTTP / CGI daemon, unauthenticated queries will be answered from the WAN if remote management has been enabled on the device. As a result, affected devices can be interrogated and hijacked with as little as a well placed HTTP query.
---------------------------------------------
https://github.com/darkarnium/secpub/blob/master/NetGear/SOAPWNDR/README.md
*** vBulletin XSS (Cross-Site Scripting) Security Vulnerabilities ***
---------------------------------------------
Vulnerable Versions: 5.1.3, 5.0.5, 4.2.2, 3.8.7, 3.6.7, 3.6.0, 3.5.4
Vulnerability Details: vBulletin has a security problem. It can be exploited by XSS attacks. The vulnerability occurs at "forum/help" page. Add "hash symbol" first. Then add script at the end of it.
CVE Reference: CVE-2014-9469
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N)
---------------------------------------------
http://securityrelated.blogspot.co.at/2015/02/cve-2014-9469-vbulletin-xss-c…
*** Netatmo Weather Station Sends WPA Passwords In the Clear ***
---------------------------------------------
UnderAttack writes The SANS Internet Storm Center is writing that Netatmo weather stations will send the users WPA password in the clear back to Netatmo. Netatmo states that this is some forgotten debug code that was left in the device. Overall, the device doesnt bother with encryption, but sends all data, not just the password, in the clear.
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/-VdGyumpxjY/story01.htm
*** Windows Exploit Mitigation Technology - Part 1 ***
---------------------------------------------
The spree of exploits on Windows has led to the creation of a certain type of exploit protection mechanism on Windows. Protection from things like buffer overflow, heap overwrite and return originated exploits have been deployed on Windows compilers and OS.
---------------------------------------------
http://resources.infosecinstitute.com/windows-exploit-mitigation-technology…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 11-02-2015 18:00 − Donnerstag 12-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Advantech EKI-1200 Buffer Overflow ***
---------------------------------------------
This advisory provides mitigation details for a buffer overflow vulnerability in Advantech EKI-1200 product line.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-041-01
*** MSRT February: Escad and NukeSped ***
---------------------------------------------
This month we added three new families to the Microsoft Malicious Software Removal Tool (MSRT) to help protect our customers: Win32/Escad, Win32/Jinupd and Win32/NukeSped. While this blog focuses on Escad and NukeSped, we want to note that Jinupd is point-of-sale malware that steals sensitive data, such as credit card information and sends it to a malicious hacker. The Escad and NukeSped malware families have backdoor capabilities that have been used as part of targeted attacks.
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/02/10/msrt-february-escad-and-…
*** February 2015 Updates ***
---------------------------------------------
Today, as part of Update Tuesday, we released nine security bulletins - three rated Critical and six rated Important in severity, to address 56 unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows, Microsoft Office, Internet Explorer, and Microsoft Server software. We encourage you to apply all of these updates.
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2015/02/10/february-2015-updates.as…
*** A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer ***
---------------------------------------------
Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It's also what allows those same hackers' dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder.
---------------------------------------------
http://feeds.wired.com/c/35185/f/661467/s/434d3df8/sc/4/l/0L0Swired0N0C20A1…
*** Decrypting TLS Browser Traffic With Wireshark - The Easy Way ***
---------------------------------------------
It turns out that Firefox and the development version of Chrome both support logging the symmetric session key used to encrypt TLS traffic to a file. You can then point Wireshark at said file and presto! decrypted TLS traffic. Read on to learn how to set this up.
---------------------------------------------
https://jimshaver.net/2015/02/11/decrypting-tls-browser-traffic-with-wiresh…
*** Elasticsearch vulnerability CVE-2015-1427 ***
---------------------------------------------
Elasticsearch versions 1.3.0-1.3.7 and 1.4.0-1.4.2 have vulnerabilities in the Groovy scripting engine. The vulnerabilities allow an attacker to construct Groovy scripts that escape the sandbox and execute shell commands as the user running the Elasticsearch Java VM. We have been assigned CVE-2015-1427 for this. ...
CVSS: Overall CVSS score: 5.8
---------------------------------------------
http://www.securityfocus.com/archive/1/534689
*** NIST requests final comments on ICS security guide ***
---------------------------------------------
Included in the final draft are updates on ICS vulnerabilities and risk management practices, along with information on security capabilities and tools for industrial control systems. Also added to the guide were methods for aligning guidance with other ICS security standards and guidelines.
---------------------------------------------
http://www.scmagazine.com/nist-requests-final-comments-on-ics-security-guid…
*** Pannen-Patch: Microsoft probierts noch mal ***
---------------------------------------------
Unangekündigt hat Microsoft erneut damit begonnen, den Patch KB3001652 über Windows Update zu verteilen. Im ersten Anlauf hatte das Unternehmen damit zahlreiche Rechner lahm gelegt. Unterdessen beschweren sich Nutzer über einen weiteren Patch.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Pannen-Patch-Microsoft-probierts-noc…
*** Cisco Security Advisories ***
---------------------------------------------
Cisco IOS Software Access Control List Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco Adaptive Security Appliance WebVPN Embedded Web Server Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 10-02-2015 18:00 − Mittwoch 11-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** MS15-FEB - Microsoft Security Bulletin Summary for February 2015 - Version: 1.0 ***
---------------------------------------------
MS15-009 Security Update for Internet Explorer
MS15-010 Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution
MS15-011 Vulnerability in Group Policy Could Allow Remote Code Execution
MS15-012 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
MS15-013 Vulnerability in Microsoft Office Could Allow Security Feature Bypass
MS15-014 Vulnerability in Group Policy Could Allow Security Feature Bypass
MS15-015 Vulnerability in Microsoft Windows Could Allow Elevation of Privilege
MS15-016 Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure
MS15-017 Vulnerability in Virtual Machine Manager Could Allow Elevation of Privilege
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS15-FEB
*** Vorsicht! Microsoft-Patch legt Rechner lahm ***
---------------------------------------------
An seinem Februar-Patchday schließt Microsoft 56 Lücken - und beschert Windows-Nutzern auch neue Probleme. Durch ein älteres Update, das nun automatisch verteilt wird, hängt der Rechner beim Installieren fest.
---------------------------------------------
http://heise.de/-2545913
*** SSL Is Officially Declared Dead ***
---------------------------------------------
On January 30, 2015, QSAs received the latest edition of the Council's Assessor Newsletter. Buried in that edition was the following statement. "The impacting change is related to several vulnerabilities in the SSL protocol. Because of this, no version of SSL meets PCI SSCs definition of strong cryptography, and updates to the standards are needed to address this issue." ... Therefore, those of you still using SSL to secure transmissions containing cardholder data (CHD) need to ...
---------------------------------------------
https://pciguru.wordpress.com/2015/02/07/ssl-is-officially-declared-dead/
*** MS15-011 & MS15-014: Hardening Group Policy ***
---------------------------------------------
Today we are releasing MS15-011 & MS15-014 which harden group policy and address network access vulnerabilities that can be used to achieve remote code execution (RCE) in domain networks. The MS15-014 update addresses an issue in Group Policy update which can be used to disable client-side global SMB Signing requirements, bypassing an existing security feature built into the product. MS15-011 adds new functionality, hardening network file access to block access to untrusted, attacker
---------------------------------------------
http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-har…
*** Internet of Thieves: All that shiny home security gear is crap, warns HP ***
---------------------------------------------
If you can monitor your house across the web, so can everyone else
In a recent study, every connected home security system tested by HP contained significant vulnerabilities, including but not limited to password security, encryption, and authentication issues.
---------------------------------------------
http://www.theregister.co.uk/2015/02/10/iot_home_insecurity/
*** ZDI-15-041: Samsung Security Manager ActiveMQ Broker Service DELETE Method Denial of Service Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to delete files of their choosing from systems running vulnerable installations of Samsung Security Manager. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-041/
*** Security Advisory- Local Denial of Service Vulnerability in Huawei Ascend P7 ***
---------------------------------------------
Huawei Ascend P7 (Sophia-L09) uses Android 4.4, which is the upgrade version of EMUI 3.0.
The phone module crashes when a third-party app sends specific broadcast messages or enables specific UIs.
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Security Advisory - Privilege Escalation Vulnerability in Huawei Mate7 ***
---------------------------------------------
Android versions earlier than 5.0 are affected by the vulnerability, which allows an attacker to escalate privilege. Huawei Mate7 is affected by the vulnerability
CVE-2014-7911
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Offene Key-Value Stores ***
---------------------------------------------
Offene Key-Value Stores11. Februar 2015Wie Heise berichtet wurden in den letzten Tagen von einer Gruppe Studenten zehntausende vollständig ungesicherte Instanzen der NoSQL-Datenbank MongoDB im Internet entdeckt. In den meisten Fällen war nicht nur lesender Zugriff sondern auch die Manipulation von Datensätzen möglich.
---------------------------------------------
http://www.cert.at/services/blog/20150211085411-1367.html
*** Research, Low-Level, Vulnerabilities, Exploitation ***
---------------------------------------------
Today, Microsoft released their latest Patch Tuesday. This Patch includes a fix for vulnerability CVE-2015-0057, an IMPORTANT-rated exploitable vulnerability which we responsibly disclosed to Microsoft a few months ago. As part of our research, we revealed this privilege escalation vulnerability which, if exploited, enables a threat actor to complete control of a Windows machine.
---------------------------------------------
http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-1…
*** Google Play Store X-Frame-Options (XFO) Gaps Enable Android Remote Code Execution (RCE) ***
---------------------------------------------
Due to a lack of complete coverage for X-Frame-Options (XFO) support on Googles Play Store web application domain, a malicious user can leverage either a Cross-Site Scripting (XSS) vulnerability in a particular area of the Google Play Store web application, or a Universal XSS (UXSS) targeting affected browsers, to remotely install and launch the main intent of an arbitrary Play Store provided Android package (APK). Affected Platforms: Many versions of Android 4.3 (Jelly Bean) and earlier ship ...
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2015/02/10/r7-2015-0…
*** NetFlow Collection and Analysis Using NFCAPD, Python, and Splunk ***
---------------------------------------------
NetFlow data is often collected for network monitoring and management, but it has many applications for the security analyst. NetFlow data can be used to identify variations from established traffic baselines, traffic originating from critical systems, and communications with known bad external hosts. Many edge devices support the generation of NetFlow data, but the collection and analysis often requires commercial tools. Options based on open source and free tools will allow an analyst to ...
---------------------------------------------
https://www.sans.org/reading-room/whitepapers/incident/netflow-collection-a…
*** Firmware: Hacker veröffentlicht Anleitung für UEFI-Rootkits ***
---------------------------------------------
Ein russischer Hacker hat eine Anleitung veröffentlicht, wie Rootkits über manipulierte UEFIs eingepflanzt werden können. Wie leicht es ist, aktuelle UEFI-Implementierungen anzugreifen, hatten Hacker bereits auf dem 31C3 demonstriert.
---------------------------------------------
http://www.golem.de/news/firmware-hacker-veroeffentlicht-anleitung-fuer-uef…
*** Cisco Security Advisories ***
---------------------------------------------
Cisco Secure Access Control System SQL Injection Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
Cisco IOS Measurement, Aggregation, and Correlation Engine Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco IOS Measurement, Aggregation, and Correlation Engine Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco IOS Measurement Aggregation and Correlation Engine Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco IOS Measurement Aggregation and Correlation Engine Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco IOS ACL Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco TelePresence IX5000 Series Web Management Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 09-02-2015 18:00 − Dienstag 10-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Safer Internet Day: BSI-Poster für mehr Sicherheit im Netz ***
---------------------------------------------
Mit 40 "leicht umsetzbaren" Tipps sollen Internetnutzer die allermeisten Standardangriffe im Internet abwehren können, meint das Bundesamt für Sicherheit in der Informationstechnik. Deswegen hat es die auf Postern zusammengefasst und online gestellt.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Safer-Internet-Day-BSI-Poster-fuer-m…
*** European Cyber Security Month reporting to the benefit of EU citizen ***
---------------------------------------------
ENISA publishes a report on the deployment of the European Cyber Security Month. The objective of this report is to:
* Present its preparatory work
* Carry out an objective evaluation
* Draw conclusions that can be used in future editions of the ECSM
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/european-cyber-security-month-r…
*** TR-32 - key-value store and NoSQL security recommendations ***
---------------------------------------------
Key-value stores, caches or NoSQL databases became an important piece of software in today's internet and web services. In contrast to conventional DB sytems, the security model of NoSQL data stores is often very limited due to their inherent nature to be used within internal trusted networks. Strong attention should be given to the configuration of key-value stores especially regarding their access from the Internet.
---------------------------------------------
http://www.circl.lu/pub/tr-32/
*** PlugX, Go-To Malware for Targeted Attacks, More Prominent Than Ever ***
---------------------------------------------
The popular remote access tool PlugX enjoyed an ascent in popularity in 2014 and is now a go-to malware for attack groups.
---------------------------------------------
http://threatpost.com/plugx-go-to-malware-for-targeted-attacks-more-promine…
*** Cisco Security Advisories ***
---------------------------------------------
Cisco Prime Infrastructure Cross-Site Scripting Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
---------------------------------------------
Cisco Prime Infrastructure Cross-Site Request Forgery Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
---------------------------------------------
Cisco IOS Software Zone-Based Firewall Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco IOS Software Kernel Timer Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco Prime Security Manager Cross-Site Scripting Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
---------------------------------------------
Cisco Prime Infrastructure Cross-Frame Scripting Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
---------------------------------------------
Cisco IOS Shell Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 06-02-2015 18:00 − Montag 09-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Analyzing Angler: The World's Most Sophisticated Exploit Kit ***
---------------------------------------------
Anglers unique obfuscation, ability to detect antivirus and virtual machines, encrypted payload and fileless infection have some calling it the most sophisticated exploit kit.
---------------------------------------------
http://threatpost.com/analyzing-angler-the-worlds-most-sophisticated-exploi…
*** Bindead - a static analysis tool for binaries. ***
---------------------------------------------
Bindead is an analyzer for executable machine code. It features a disassembler that translates machine code bits into an assembler like language (RREIL) that in turn is then analyzed by the static analysis component using abstract interpretation. As Bindead operates on the machine code level, it can be used without having the source code of the program to be analyzed. In fact, the purpose of Bindead is to help with the reverse engineering of executable code or binaries.
---------------------------------------------
https://bitbucket.org/mihaila/bindead/wiki/Home
*** ENISA: Threat Landscape for Smart Home and Media Convergence ***
---------------------------------------------
The study identifies threats to all asset classes, across the several alternative design pathways to smart homes. As it develops, the smart home will exhibit a high cyber security risk profile for the individual context, with additional systematic effects on broader information security.
---------------------------------------------
https://www.enisa.europa.eu/activities/risk-management/evolving-threat-envi…
*** Online Windows Binary Analyzer ***
---------------------------------------------
http://labs.nccgroup.com/NCCGroupWindowsBinaryAnalyzer/
*** Firmware Forensics: Diffs, Timelines, ELFs and Backdoors ***
---------------------------------------------
This post covers some common techniques that I use to analyze and reverse firmware images. These techniques are particularly useful to dissect malicious firmwares, spot backdoors and detect unwanted modifications.
---------------------------------------------
http://w00tsec.blogspot.co.at/2015/02/firmware-forensics-diffs-timelines-el…
*** Moodle Directory Traversal Flaw Lets Remote Users View Arbitrary Files ***
---------------------------------------------
A vulnerability was reported in Moodle. A remote user can view files on the target system.
The software does not properly validate user-supplied input to some scripts that serve JavaScript. A remote user can supply a specially crafted request containing the '../' string to view files on target system that are located outside of the document directory.
---------------------------------------------
http://www.securitytracker.com/id/1031712
*** Cisco Security Advisories ***
---------------------------------------------
Cisco AsyncOS Software Uuencode Email Filtering Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco Adaptive Security Appliance WebVPN Content Rewriter Denial of Service Vunerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
---------------------------------------------
Cisco AsyncOS Software Uuencoded Email Filtering Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
---------------------------------------------
Cisco Adaptive Security Appliance WebVPN Content Rewriter Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 05-02-2015 18:00 − Freitag 06-02-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Filmkan: Mysterious Turkish Botnet Grows Through Facebook ***
---------------------------------------------
On January 31, a security researcher named Mohammad Faghani posted an analysis of malware that was being distributed through Facebook posts. Based on the number of ..
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/02/filmkan-mysterious-turki…
*** Microsoft: Firmen entdecken Cyberattacken erst nach 243 Tagen ***
---------------------------------------------
Firmen brauchen nach Angaben von Microsoft durchschnittlich 243 Tage, um eine Cyberattacke auf ihr Netzwerk zu entdecken. "Sie haben 243 Tage lang ..
---------------------------------------------
http://derstandard.at/2000011347067
*** Revetons design refreshed - Winter 2015 ***
---------------------------------------------
Those days Reveton is mainly pushed on adult traffic via "standalone" CVE-2015-0311 flash (posing as advert) calling an Xtea encoded stream. After not far from 2 years with the same design it's now showing some ..
---------------------------------------------
http://malware.dontneedcoffee.com/2015/02/RevetonWinter2015.html
*** The Anthem Breach: What We Know Now ***
---------------------------------------------
I learned about the breach directly from the CEO before all the hype and speculation hit. This is the level of caring and responsibility I personally expect as an Anthem customer. So now that the news is out there, let's talk about the technical aspects of the breach.
---------------------------------------------
http://blog.beyondtrust.com/the-anthem-breach-what-we-know-now
*** GE and MACTek HART Device DTM Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an improper input vulnerability in the HART Device Type Manager (DTM) library utilized in GE and MACTek's HART Device DTM.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-036-01
*** Pepperl+Fuchs Hart Device DTM Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an improper input vulnerability in the CodeWrights GmbH HART Device DTM library utilized in Pepperl+Fuchs' HART Device DTM.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-036-02
*** CodeWrights GmbH HART Device DTM Vulnerability (Update C) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-15-012-01B CodeWrights GmbH HART DTM Vulnerability that was published January 27, 2015, ..
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-012-01C
*** Datenschutz: Wie sicher ist die IP-Telefonie? ***
---------------------------------------------
Können Dritte ohne großen Aufwand IP-Telefonate mithören? Die Antwort ist wie so oft: Jein. Denn trotz mangelnder Verschlüsselung ist die IP-Telefonie nicht ganz so unsicher wie behauptet - zumindest ist es für Angreifer schwierig, Telefonate abzuhören.
---------------------------------------------
http://www.golem.de/news/datenschutz-wie-sicher-ist-die-ip-telefonie-1502-1…
*** Preparing for the unknown - A peek into Cyber Europe ***
---------------------------------------------
ENISA is supporting Member States to cope with major cybersecurity crises with its flagship Cyber Europe programme. Five years after the first ever European wide cyber exercise, Cyber Europe evolved into a unique multinational crisis simulation which immerses participants into the unknown.
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/preparing-for-the-unknown-a-pee…
*** 7 Best WordPress Security Plugins ***
---------------------------------------------
WordPress is the most popular blogging platform in the world. Millions of websites including various popular blogs are using WordPress as a content publishing platform. So, hackers are also more interested in hacking ..
---------------------------------------------
http://resources.infosecinstitute.com/7-best-wordpress-security-plugins/
*** Neue Spuren im Sony-Hack führen nach Russland ***
---------------------------------------------
Neue Indizien im Fall des Sony-Hacks sollen belegen, dass russische Hacker in den Vorfall involviert sind. Einem Bericht zufolge haben diese aktuell immer noch Zugriff auf das Netzwerk von Sony Pictures Entertainment.
---------------------------------------------
http://heise.de/-2543005
*** Fessleak malvertising campaign used to serve ransomware ***
---------------------------------------------
Invincea has been monitoring the Fessleak campaign in which hackers leveraged Adobe Flash Player exploits and file-less infections to serve ransomware.
---------------------------------------------
http://securityaffairs.co/wordpress/33153/cyber-crime/fessleak-malvertising…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 04-02-2015 18:00 − Donnerstag 05-02-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Zero-day in the Fancybox-for-WordPress Plugin ***
---------------------------------------------
Our research team was alerted to a possible malware outbreak affecting many WordPress websites. All the infections had a similar malicious iframe from '203koko' injected into the website. We were also directed to a forum thread ..
---------------------------------------------
http://blog.sucuri.net/2015/02/zero-day-in-the-fancybox-for-wordpress-plugi…
*** SA-CONTRIB-2015-037 - Path Breadcrumbs - Access Bypass ***
---------------------------------------------
https://www.drupal.org/node/2420139
*** Analyzing CVE-2015-0313: The New Flash Player Zero Day ***
---------------------------------------------
Adobe has started rolling out an update to Flash Player which fixes the zero-day vulnerability we discussed earlier this week. This particular vulnerability can be exploited ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/analyzing-cve-20…
*** Russische Malware zielt auf iOS-Geräte, saugt alle Daten ab ***
---------------------------------------------
Die IT-Sicherheitsfirma "TrendLabs" berichtet, dass eine SpyWare namens XAgent sich mittlerweile auf iPhone und iPads ausgebreitet hat. Bereits vergangenes Jahr war von dem Schadprogramm die Rede, damals griff die Anwendung Windows-Rechner in Regierungsorganisationen, ..
---------------------------------------------
http://derstandard.at/2000011311181
*** Sicherheitsstandards ignoriert: BMW-Hack war vermeidbar ***
---------------------------------------------
Der kürzlich bekannt gewordene Hack von Autos der Marke BMW wäre auf einfache Weise vermeidbar gewesen. Das Computermagazin c’t zeigt im Detail, wie der Autokonzern zentrale ..
---------------------------------------------
http://derstandard.at/2000011322698
*** Flash Zero Days Dominate Exploit Landscape ***
---------------------------------------------
The recent Flash zero-day vulnerabilities and exploits have uncovered the relatively quiet Hanjuan exploit kit, and further exposed the dangers of malvertising.
---------------------------------------------
http://threatpost.com/flash-zero-days-dominate-exploit-landscape/110871
*** Internet Explorer Cross-Site Scripting Vulnerability Now Public ***
---------------------------------------------
Security researcher David Leo has disclosed a new vulnerability in Microsoft Internet Explorer. The vulnerability allows the same origin policy of the browser to be violated. The same-origin policy restricts how a document or ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/internet-explore…
*** Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited ***
---------------------------------------------
This is the tale of an ongoing SSH brute forcing campaign, targeting servers and network devices, that distributes a new family of Linux rootkit malware named 'XOR.DDoS'. While typical DDoS bots are straightforward in operation and often programmed in a high-level script such as PHP or Perl, the XOR.DDoS family is programming in C/C++ and incorporates multiple ..
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2015/02/anatomy_of_a_brutef.ht…
*** Security updates available for Adobe Flash Player (APSB15-04) ***
---------------------------------------------
A Security Bulletin (APSB15-04) has been published regarding security updates for Adobe Flash Player. These updates address CVE-2015-0313, which is being actively exploited in the wild via drive-by-download attacks against systems ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1175
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 03-02-2015 18:00 − Mittwoch 04-02-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** New Wave of CTB-Locker/Critroni Ransomware Hitting Victims ***
---------------------------------------------
There is a new wave of attacks delivering the CTB-Locker or Critroni crypto ransomware, arriving through spam messages with a variety of lures in several different countries. CTB-Locker is one of the newer variants in the crypto ..
---------------------------------------------
http://threatpost.com/new-wave-of-ctb-lockercritroni-ransomware-hitting-vic…
*** Advisory - Dangerous "nonce" leak in UpdraftPlus ***
---------------------------------------------
Advisory for: UpdraftPlus Security Risk: High Exploitation level: Remote DREAD Score: 7/10 Vulnerability: Privilege Escalation Patched Version: 1.9.51 If you're a user of the UpdraftPlus plugin for WordPress, now is the time to update. During ..
---------------------------------------------
http://blog.sucuri.net/2015/02/advisory-dangerous-nonce-leak-in-updraftplus…
*** UpdraftPlus <= 1.9.50 - Privilege Escalation ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7781
*** 1,800 Domains Overtaken by Flash Zero Day ***
---------------------------------------------
Researchers at Cisco say that a Flash zero day exploit has compromised 1,800 domains, the majority of those during a 48-hour period last week.
---------------------------------------------
http://threatpost.com/1800-domains-overtaken-by-flash-zero-day/110835
*** Multiple vulnerabilities in Cisco Unified IP Phone 9900 ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** MIT Kerberos Multiple Flaws in kadmind Let Remote Users Obtain Potentially Sensitive Information and Remote Authenticted Users Execute Arbitrary Code ***
---------------------------------------------
MIT Kerberos Multiple Flaws in kadmind Let Remote Users Obtain Potentially Sensitive Information and Remote Authenticted Users Execute Arbitrary Code
---------------------------------------------
http://www.securitytracker.com/id/1031691
*** Siemens SCALANCE X-200IRT Switch Family User Impersonation Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a user impersonation vulnerability in the Siemens SCALANCE X-200IRT Switch Family.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-034-01
*** Siemens Ruggedcom WIN Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for multiple vulnerabilities in the Siemens Ruggedcom WIN firmware.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-034-02
*** An In-depth analysis of the Fiesta Exploit Kit: An infection in 2015 ***
---------------------------------------------
A while ago I blogged about the Fiesta exploit kit, this was back in September 2013 [Fiesta Exploit Kit analysis serving MSIE exploit CVE-2013-2551] in this blog I focused on the integration of the MSIE exploit and parts of the landing page.
---------------------------------------------
http://blog.0x3a.com/post/110052845124/an-in-depth-analysis-of-the-fiesta-e…
*** Play Store: Weit verbreitete Apps zeigen Adware verzögert an ***
---------------------------------------------
Apps aus Googles Play Store mit Downloadzahlen von stellenweise über 5 Millionen beinhalten Adware, die den Nutzer zu dubiosen Appstores oder Anwendungen mit Premium-SMS-Versand weiterleiten. Interessant ist dabei die Art und Weise, wie die Werbung an den Nutzer gebracht wird.
---------------------------------------------
http://www.golem.de/news/play-store-weit-verbreitete-apps-zeigen-adware-ver…
*** Threat Analysis Template For BYOD Applications ***
---------------------------------------------
Your IT department is certainly not at a loss when it comes to worrying about BYOD applications. Indeed, the list of threats to enterprise applications and the data they contain is a long one, and security professionals are ..
---------------------------------------------
http://resources.infosecinstitute.com/threat-analysis-template-byod-applica…
*** So schützen Sie sich vor der Flash-Lücke ***
---------------------------------------------
Während Adobe weiterhin keine konkreten Schutzmaßnahmen kennt oder nennt, rät das BSI ganz klar zur Deinstallation des Flash Player. Wer nicht handelt und Flash weiterhin aktiv lässt, geht ein großes Risiko ein.
---------------------------------------------
http://heise.de/-2539858
*** Cisco WebEx Meetings Server Command Injection Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Pawn Storm Update: iOS Espionage App Found ***
---------------------------------------------
In our continued research on Operation Pawn Storm, we found one interesting poisoned pawn - spyware specifically designed for espionage on iOS devices. While spyware targeting Apple users is highly notable by itself, this particular spyware is also involved in a targeted attack. Background ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-updat…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 02-02-2015 18:00 − Dienstag 03-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Cisco Anyconnect and Cisco HostScan Web Launch XSS Vulnerability ***
---------------------------------------------
A vulnerability in Cisco AnyConnect Secure Mobility Client and Cisco Host Scan could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the client when AnyConnect is launched through the web interface.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco UCS C-Series Rack Servers Integrated Management Controller Cross-Frame Scripting Vulnerability ***
---------------------------------------------
A vulnerability in the web interface of the Cisco Integrated Management Controller of the Cisco Unified Computing System C-Series Rack Servers could allow an unauthenticated, remote attacker to execute a cross-frame scripting (XFS) attack.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Remember Me Safely - Secure Long-Term Authentication Strategies ***
---------------------------------------------
Lets say you have a web application with a user authentication system, wherein users must provide a username (or email address) and password to access certain resources. Lets also say that its properly designed (it uses ..
---------------------------------------------
https://resonantcore.net/blog/2015/02/remember-me-safely-secure-long-term-a…
*** How a penetration test helps you meet PCI compliance guidelines ***
---------------------------------------------
In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a suite of security test...
---------------------------------------------
http://www.net-security.org/article.php?id=2213
*** Trotz Update: Adobe warnt vor neuer Flash Player-Lücke ***
---------------------------------------------
Nachdem vor einer Woche kritische Sicherheitslücken geschlossen wurden, muss Adobe erneut warnen
---------------------------------------------
http://derstandard.at/2000011209756
*** DSA-3151 python-django - security update ***
---------------------------------------------
Several vulnerabilities were discovered in Django, a high-level Pythonweb development framework. The Common Vulnerabilities and Exposuresproject identifies the following problems:
---------------------------------------------
https://www.debian.org/security/2015/dsa-3151
*** Creative Evasion Technique Against Website Firewalls ***
---------------------------------------------
During one of our recent in-house Capture The Flag (CTF) events, I was playing with the idea of what could be done with Non-Breaking Spaces. I really wanted to win and surely there had to be a way through the existing evasion controls. This post is going to be a bit code-heavy for most end-users,Read More
---------------------------------------------
http://blog.sucuri.net/2015/02/creative-evasion-technique-against-website-f…
*** XSS, XFS, Open Redirect Vulnerabilities Found on About.com (SecurityWeek) ***
---------------------------------------------
http://www.securityweek.com/xss-xfs-open-redirect-vulnerabilities-found-abo…
*** Beware of emails pushing Google Chrome updates! ***
---------------------------------------------
Google Chrome users are being actively targeted with a spam email campaign impersonating the Internet giant, urging them to download a newer version of the popular browser because theirs ..
---------------------------------------------
http://www.net-security.org/malware_news.php
*** Online-Erpresser verschlüsseln Datenbank und fordern 50.000 US-Dollar Lösegeld ***
---------------------------------------------
Sicherheitsexperten habe eine perfide Erpressungsmasche entdeckt: Die Täter manipulieren Web-Dienste so, dass sie die von den Nutzern eingegebenen Daten verschlüsselt speichern.
---------------------------------------------
http://heise.de/-2535621
*** Low VirusTotal detection rates for new malware, do they matter? ***
---------------------------------------------
It is not as important as is often suggested - and doesn't mean the malware is allowed to execute.It is fairly common these days for security researchers to write about new malware attacks and point to low anti-virus detection rates when the affected sample is uploaded to VirusTotals multi-AV ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/02_03.xml?
*** Google belohnt auch Sicherheitsforscher, die keine Lücken finden ***
---------------------------------------------
Wer nach neuen Schwachstellen sucht, weiss nie, ob sich die investierte Zeit rechnet. Bei traditionellen Bug Bounties winkt schliesslich nur im Erfolgsfall Bares. Google experimentiert nun mit einem neuen Ansatz.
---------------------------------------------
http://heise.de/-2535890
*** Dumping Git Data from Misconfigured Web Servers ***
---------------------------------------------
Every so often when performing a penetration test against a web application or a range of external/internal servers I come across publicly accessible .git directories. Git is a revision control tool that helps keep track of ..
---------------------------------------------
https://blog.netspi.com/dumping-git-data-from-misconfigured-web-servers/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 30-01-2015 18:00 − Montag 02-02-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Security Advisory for Adobe Flash Player (APSA15-02) ***
---------------------------------------------
A Security Advisory (APSA15-02) has been published regarding a critical vulnerability (CVE-2015-0313) in Adobe Flash Player 16.0.0.296 and earlier versions for Windows, Macintosh and Linux. We are aware of reports that this ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1171
*** Cisco NX-OS Software TACACS+ Command Authorization Vulnerability ***
---------------------------------------------
The vulnerability is due to incorrect processing of very long command-line interface (CLI) commands by the TACACS+ command authorization feature. An attacker could exploit this vulnerability by being locally authenticated and executing a long CLI command that is subject to command authorization. An exploit could allow the attacker to cause the device to reload.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cobham Sailor 900 VSAT Buffer Overflow Vulnerability ***
---------------------------------------------
This alert provides early notice of uncoordinated buffer overflow vulnerability disclosure of the Cobham Sailor 900 VSAT.
---------------------------------------------
https://ics-cert.us-cert.gov//alerts/ICS-ALERT-15-030-01
*** Analysis Of An Interesting Windows Kernel Change Mitigating Vulnerabilities In Some Security Products ***
---------------------------------------------
Last year I started researching into the Windows kernel to get a better understanding of privilege escalation vulnerabilities. Vulnerabilities in the kernel are a serious issue as they could be used to bypass browsers sandboxes and end up compromising the entire system. In general most people ..
---------------------------------------------
https://www.greyhathacker.net/?p=818
*** Akamai's state of the internet security ***
---------------------------------------------
A significant increase in the number of DDoS attacks was measured in Q4 2014: a 57 percent increase compared to last quarter and a 90 percent increase compared to Q4 2013. No attack size records were broken. A new attack vector using a Christmas tree packet generated one of the quarters nine largest attacks.
---------------------------------------------
http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-rep…
*** Check autorun entries with VirusTotal - Autoruns v13 ***
---------------------------------------------
Version 13 of Autoruns which was release January 29, 2015 includes a very handy feature to check unknown autorun entries with Virustotal 'automatically'. It's integrated ..
---------------------------------------------
http://infected.io/41/check-autorun-entries-with-virustotal-autoruns-v13
*** HipChat Security Notice and Password Reset ***
---------------------------------------------
Atlassian's security team has discovered and blocked suspicious activity on the HipChat service that resulted in unauthorized access to names, usernames, email addresses, and encrypted passwords for a very small percentage (<2%) of our users. We have no evidence that any payment information was accessed.
---------------------------------------------
https://blog.hipchat.com/2015/02/01/hipchat-security-notice-and-password-re…
*** Dshell ***
---------------------------------------------
An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures. Key features: Robust stream reassembly IPv4 and IPv6 support Custom output handlers Chainable decoders
---------------------------------------------
https://github.com/USArmyResearchLab/Dshell
*** Multiple vulnerabilities in Wordpress-plugins ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7777https://wpvulndb.com/vulnerabilities/7779https://wpvulndb.com/vulnerabilities/7778
*** RansomWeb ransomware targets companies databases ***
---------------------------------------------
Encryption first added as a patch, key only removed when all backups are encrypted.Make backups, they said. Then you wont have to worry about ransomware, they said.Ransomware has quickly become one of the most frustrating kinds of cyber attack. We all know that our devices could suddenly die, and if ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/02_02.xml
*** Internet Explorer 11 lässt Webseiten Anwender ausspionieren ***
---------------------------------------------
Sicherheitsexperten haben eine Schwachstelle im Internet Explorer 11 gefunden, über die Angreifer Webseiten so manipulieren können, dass sie den Anwender ausspionieren. Ein Patch lässt noch auf sich warten – andere Web-Browser sind aber nicht anfällig.
---------------------------------------------
http://heise.de/-2534975
*** Flash-Player deaktivieren! Schon wieder Angriffe auf ungepatchte Lücke ***
---------------------------------------------
Und täglich grüßt die Flash-Lücke: Nur eine Woche war Ruhe, jetzt ist die nächste kritische Schwachstelle aufgetaucht. Da diese bereits ausgenutzt wird, sollte Flash wieder ein mal abgeschaltet werden.
---------------------------------------------
http://heise.de/-2535100
*** OpenSSH: Key-Rotation für die Secure Shell ***
---------------------------------------------
Bei der nächsten Version von OpenSSH wird es möglich sein, Server-Keys mit einem automatisierten Verfahren zu rotieren. Bislang ließen sich Schlüssel bei SSH nur mit viel ..
---------------------------------------------
http://www.golem.de/news/openssh-key-rotation-fuer-die-secure-shell-1502-11…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 29-01-2015 18:00 − Freitag 30-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** The Vast World of Fraudulent Routing ***
---------------------------------------------
As network security engineers have attempted to categorize blocks of IP addresses associated with spam or malware for subsequent filtering at their firewalls, the bad guys have had to evolve to continue to target their victims. Since routing ...
---------------------------------------------
http://research.dyn.com/2015/01/vast-world-of-fraudulent-routing/
*** Neue Outlook-App: Microsoft liest auch bei Firmenmails mit ***
---------------------------------------------
Neue App für Android und iOS mit zweifelhafter Funktionalität - Exchange- und iCloud-Passwörter online gespeichert
---------------------------------------------
http://derstandard.at/2000011053283
*** The Internet of Dangerous Things ***
---------------------------------------------
Distributed denial-of-service (DDoS) attacks designed to silence end users and sideline Web sites grew with alarming frequency and size last year, according to new data released this week. Those findings dovetail quite closely with ..
---------------------------------------------
http://krebsonsecurity.com/2015/01/the-internet-of-dangerous-things/
*** Microsoft Publishes Information Sharing Guidelines ***
---------------------------------------------
Microsoft publishes a framework and guidelines on how to effectively set up and operate threat information sharing exchanges in hopes that organizations will actually share data.
---------------------------------------------
http://threatpost.com/microsoft-publishes-information-sharing-guidelines/11…
*** Blubrry PowerPress <= 6.0 - Cross-Site Scripting (XSS) ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7773
*** Honeywell HART DTM Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an improper input vulnerability in the CodeWrights GmbH HART ..
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-029-01
*** Multiple vulnerabilities in Cisco WebEx Meetings ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** D-Link routers vulnerable to DNS hijacking ***
---------------------------------------------
Todor Donev, a member of the Ethical Hacker research team, says that the vulnerability is found in the ZynOS firmware of the device, D-Links DSL-2740R ADSL modem/wireless router. The firmware in question is implemented in many networking equipment manufactured by D-Link, TP-Link Technologies and ZTE, he noted ... Donev hasnt notified D-Link of this flaw, but has released exploit code for the flaw in a security advisory.
---------------------------------------------
http://www.net-security.org/secworld.php?id=17888
*** Drei neue Versionen von Safari: Sicherheitslücken geschlossen ***
---------------------------------------------
Für OS X 10.10, OS X 10.9 und OS X 10.8 stehen Updates für den Apple-Browser zur Verfügung. Sie beheben vor allem Sicherheitslücken.
---------------------------------------------
http://heise.de/-2530322
*** Nearly half of all DDoS attacks uses multiple attack vectors ***
---------------------------------------------
Akamai released a new security report that provides analysis and insight into the global attack threat landscape including DDoS attacks. Akamai observed a 52 percent increase in average peak band...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17896
*** GHOST glibc Vulnerability Affects WordPress and PHP applications ***
---------------------------------------------
... security researchers have discovered that PHP applications, including the WordPress Content Management System (CMS), could also be affected by the bug. ... According to the Sucuri researcher Marc-Alexandre Montpas, GHOST vulnerability could be a big issue for WordPress CMS, as it uses wp_http_validate_url() function to validate every pingback post URL.
---------------------------------------------
http://thehackernews.com/2015/01/ghost-linux-security-vulnerability_29.html
*** BMW-Patzer schürt Angst vor Hackerangriffen auf Autos ***
---------------------------------------------
Schwachstelle beim deutschen Autohersteller inzwischen behoben -
---------------------------------------------
http://derstandard.at/2000011080438
*** We got hacked! Now what? ***
---------------------------------------------
Almost a year ago, I experienced my first real security incident. The companys bulletin board was compromised and it was my job to oversee and coordinate the incident response. The teams and I where pretty much thrown into the cold water, as weve never experienced an incident of that size before.
---------------------------------------------
https://www.hashtagsecurity.com/we-got-hacked-now-what/
*** Vertipper-Domains als Geschäftsmodell ***
---------------------------------------------
Einer Studie zufolge können Markeninhaber kaum verhindern, dass sogenannte Typosquatter Internet-Domains registrieren, die dem eigenen Namen nur fast entsprechen.
---------------------------------------------
http://heise.de/-2533708
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 28-01-2015 18:00 − Donnerstag 29-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** IT-Security-Links #69 ***
---------------------------------------------
Trojan.Tubrosa is a new click-fraud malware. The attackers compromise victims' computers via Spam campaigns to use them to automatically inflate their YouTube video views. The malware ..
---------------------------------------------
http://securityblog.switch.ch/2015/01/27/it-security-links-69/
*** Asterisk Project Security Advisory - AST-2015-002 ***
---------------------------------------------
CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its func_curl.so module (the CURL() dialplan function), as well as its res_config_curl.so (cURL realtime backend) modules. Since Asterisk ..
---------------------------------------------
http://downloads.asterisk.org/pub/security/AST-2015-002.html
*** ENISA Cloud Certification Schemes Metaframework ***
---------------------------------------------
ENISA publishes a meta-framework and an online tool to help customers with cloud security when buying cloud services.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/enisa-cloud-certification-s…
*** Debian Security Advisory DSA-3143-1 virtualbox -- security update ***
---------------------------------------------
CVE-2015-0377, CVE-2015-0418. Two vulnerabilities have been discovered in VirtualBox, a x86 virtualisation solution, which might result in denial of service.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3143
*** CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits ***
---------------------------------------------
Patched with Flash 16.0.0.296 the CVE-2015-0311 has been first seen exploited by Angler EK ( 2015-01-20 ) , soon after used in "standalone" mode in huge malvert campaign (pushing either Reveton, either Bedep (doing adfraud and ..
---------------------------------------------
http://malware.dontneedcoffee.com/2015/01/cve-2015-0311-flash-up-to-1600287…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 27-01-2015 18:00 − Mittwoch 28-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer - Version: 36.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/2755801
*** USN-2486-1: OpenJDK 6 vulnerabilities ***
---------------------------------------------
Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could exploit these to cause a denial ..
---------------------------------------------
http://www.ubuntu.com/usn/usn-2486-1/
*** VMware Security Advisories - 1 New, 1 Updated, (Wed, Jan 28th) ***
---------------------------------------------
VMware has released an new and updated security advisory today. The two security advisories, listed below, address numerous vulnerabilities in the VMware ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19241
*** Magnetrol HART DTM Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an improper input validation vulnerability in the CodeWrights GmbH HART DTM library utilized by some Magnetrol products.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-027-01
*** Schneider Electric Multiple Products Buffer Overflow Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a buffer overflow vulnerability in Schneider Electric's SoMove Lite software package.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-027-02
*** CodeWrights GmbH HART DTM Vulnerability (Update B) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-15-012-01A CodeWrights GmbH HART DTM Vulnerability that was published January 13, 2015, on the ICS-CERT web site. This updated advisory provides mitigation details for an improper input validation vulnerability in CodeWrights ..
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-012-01B
*** Bug in ultra secure BlackPhone let attackers decrypt texts, stalk users ***
---------------------------------------------
A recently fixed vulnerability in the BlackPhone instant messaging application gave attackers the ability to decrypt messages, steal contacts, and control vital functions of the device, which is marketed as a more secure way to protect communications from government and criminal snoops.
---------------------------------------------
http://arstechnica.com/security/2015/01/bug-in-ultra-secure-blackphone-let-…
*** CVE-2015-0016: Escaping the Internet Explorer Sandbox ***
---------------------------------------------
I analyzed this vulnerability (designated as CVE-2015-0016) because it may be the first vulnerability in the wild that showed the capability to escape the Internet Explorer sandbox. As sandboxing represents a key part of exploit mitigation techniques, any exploit that can break established sandboxes is worth a second look.
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2015-0016-es…
*** Multiple vulnerabilities in the FreeBSD kernel code ***
---------------------------------------------
Francisco Falcon from the Core Exploit Writers Team found multiple vulnerabilities in the FreeBSD kernel code that implements the vt console driver (previously known as Newcons) and the ..
---------------------------------------------
http://www.net-security.org/secworld.php?id=17882
*** Neue Apple-TV-Software behebt zahlreiche Sicherheitslücken ***
---------------------------------------------
Neben iOS 8.1.3 und OS X 10.10.2 hat Apple am Dienstagabend auch noch ein Update der Software seiner Multimediabox veröffentlicht. Neue Funktionen hat die offenbar nicht, dafür jede Menge Fixes.
---------------------------------------------
http://heise.de/-2530119
*** Apple security updates 27 Jan 2015 ***
---------------------------------------------
http://support.apple.com/en-us/HT1222
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 26-01-2015 18:00 − Dienstag 27-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Java is the biggest vulnerability for US computers ***
---------------------------------------------
Oracles Java poses the single biggest security risk to US desktops, according to a new report from Copenhagen-based security vendor Secunia ApS, because of its penetration rate, number of vulnerabilities, and patch status.According to the report, 48 percent of users arent running the ..
---------------------------------------------
http://www.csoonline.com/article/2875535/application-security/java-is-the-b…
*** Beyond "fake invoice" scams - crooks can get money out of real invoices, too! ***
---------------------------------------------
If I told you to change your record of a suppliers bank account so I got all the payments, would you do so? 1000s of companies did, and didnt spot the misdirected payments until an average of $100,000 had gone west...
---------------------------------------------
https://nakedsecurity.sophos.com/2015/01/26/beyond-fake-invoice-scams-crook…
*** ENISA draws the Cyber Threat Landscape 2014: 15 top cyber threats, cyber threat agents, cyber-attack methods and threat trends for emerging technology areas ***
---------------------------------------------
ENISA's Threat Landscape 2014 (ETL 2014) published today is the third yearly report in sequence, consolidating and analysing the top cyber threats and the evolution, encountered in 2014. ENISA Threat Landscape 2014, an activity contributing towards achieving the objectives formulated in the Cyber Security Strategy for the EU, stresses the importance of threat analysis and the identification of emerging trends in cyber security.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/enisa-draws-the-cyber-threa…
*** Critical glibc update (CVE-2015-0235) in gethostbyname() calls ***
---------------------------------------------
A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.
---------------------------------------------
http://ma.ttias.be/critical-glibc-update-cve-2015-0235-gethostbyname-calls/
*** Security updates available for Adobe Flash Player ***
---------------------------------------------
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of reports that CVE-2015-0311 is actively being exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below. Adobe recommends ..
---------------------------------------------
https://helpx.adobe.com/security/products/flash-player/apsb15-03.html
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 23-01-2015 18:00 − Montag 26-01-2015 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** System Center Endpoint Protection support for Windows Server 2003 ***
---------------------------------------------
>From July 14, 2015, Windows Server 2003 will cease to be a supported operating system.
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/01/23/system-center-endpoint-p…
*** Sicherheitslücke in Millionen Android-Geräten: Google empfiehlt Chrome oder Firefox als Abhilfe ***
---------------------------------------------
Scharfe Kritik gibt es seit bekannt wurde, dass Google Sicherheitslücken im alten Standard-Browser von Android nicht mehr schließen will. Die Abhilfe, die Google nun empfiehlt, ist nicht so recht befriedigend.
---------------------------------------------
http://heise.de/-2528130
*** OS X 10.10.2: Apple patcht "Thunderstrike"-Angriff und Googles Zeroday-Lücken ***
---------------------------------------------
In der jüngsten Yosemite-Beta sollen gleich mehrere problematische Fehler behoben sein. Wann die Finalversion erscheint, bleibt unklar. Der Entdeckter von "Thunderstrike" kritisierte Apple.
---------------------------------------------
http://www.heise.de/newsticker/meldung/OS-X-10-10-2-Apple-patcht-Thunderstr…
*** Firewall-Update: IPFire 2.15 auf Core Update 86 aktualisiert ***
---------------------------------------------
Die Aktualisierung stopft etliche Sicherheitslücken in diversen Paketen. Die Entwickler empfehlen daher dringend, das Update umgehend einzuspielen und die Firewall anschließend neu zu starten.
---------------------------------------------
http://heise.de/-2528391
*** Adobe stiftet Verwirrung mit falschen Versionsangaben für Flash ***
---------------------------------------------
Die Flash-Macher haben die kritische Lücke in ihrer Software endlich geschlossen. Leider vermitteln sie auf der offiziellen Flash-Webseite noch den Eindruck, die verwundbare Version wäre die neueste und damit sicher.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Adobe-stiftet-Verwirrung-mit-falsche…
*** Factsheet: Help! My website is vulnerable to SQL injection ***
---------------------------------------------
SQL injection is a popular and frequently used attack on websites, which attackers use to steal large volumes of (client) information. Although there are other types of attacks for capturing this information, SQL injection appears to be a frequently used method.A website becomes vulnerable to SQL injection when attackers are able to influence the queries sent by a website to a database.
---------------------------------------------
https://www.ncsc.nl/english/services/expertise-advice/knowledge-sharing/fac…
*** Demystifying Cross-Site Request Forgery ***
---------------------------------------------
Continuously ranked in the OWASP Top Ten, a large majority of the development community still doesnt understand Cross-Site Request Forgery (CSRF). After years of penetration tests and code reviews, my experiences show that a high percentage of applications, especially new applications, do not have proper CSRF protections in place. This post provides a refresher on CSRF and provides a common defense for this issue.
---------------------------------------------
http://software-security.sans.org/blog/2015/01/23/demystifying-cross-site-r…
*** Analyzing CVE-2015-0311: Flash Zero Day Vulnerability ***
---------------------------------------------
Last week a major zero-day vulnerability (was found in Adobe Flash Player. Over the weekend, Adobe started releasing an update to fix the vulnerability: users who have enabled auto-update have already received the newest version (16.0.0.296). Our analysis has confirmed that the vulnerable code has been modified.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/2RZECpZzdak/
*** Cisco 2900 Series Integrated Services Router Network-Based Application Recognition Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Network-Based Application Recognition (NBAR) protocol process of the Cisco 2900 Series Integrated Services Router could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability occurs when the NBAR process locks. An attacker could exploit this vulnerability by sending simple IP version 4 (IPv4) packets through the router. An exploit could allow the attacker to cause a DoS condition that would require a router restart.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 22-01-2015 18:00 − Freitag 23-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Malvertising leading to Flash Zero Day via Angler Exploit Kit ***
---------------------------------------------
Background As part of our daily research activity, we came across this blog mentioning an Angler Exploit Kit (EK) instance serving a possible zero day Adobe Flash exploit ..
---------------------------------------------
http://research.zscaler.com/2015/01/malvertising-leading-to-flash-zero-day.…
*** UPDATED: Security updates available for Adobe Flash Player (APSB15-02) ***
---------------------------------------------
A Security Bulletin (APSB15-02) has been published regarding security updates for Adobe Flash Player. These updates address a vulnerability (CVE-2015-0310) that ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1157
*** New RATs Emerge from Leaked Njw0rm Source Code ***
---------------------------------------------
In the middle of my research on the remote access Trojan (RAT) known as 'njrat' or 'Njw0rm', I stumbled upon dev-point.com, a site that disguises itself as a site for 'IT enthusiasts' but actually hosts various downloaders, different types of spyware, and RATs. I explored the site and found that they host ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/new-rats-emerge-…
*** Multiple vulerabilities in McAffee products ***
---------------------------------------------
http://www.securitytracker.com/id/1031618http://www.securitytracker.com/id/1031617http://www.securitytracker.com/id/1031616
*** Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication ***
---------------------------------------------
A critical cross-site scripting (XSS) vulnerability in the Google Apps administrator console allowed cyber criminals to force a Google Apps admins to execute just about ..
---------------------------------------------
http://thehackernews.com/2015/01/google-account-hacking.html
*** Google veröffentlicht weitere OS-X-Lücken ***
---------------------------------------------
Im vergangenen Jahr gegründet, dreht Googles Project Zero derzeit so etwas wie eine Vorstellungstour bei den großen Softwareherstellern. Wenn auch wohl nicht ganz in deren Sinne. Nach einer Reihe von Fehlern in Microsofts Windows, ist nun offenbar Apples OS X an der Reihe.
---------------------------------------------
http://derstandard.at/2000010780464
*** Microsoft lässt Server-2003-Lücke ungepatcht ***
---------------------------------------------
Eine Sicherheitslücke im Netzwerkerkennungsdienst NLA von Windows Server 2003 wird nicht geschlossen, obwohl das Betriebssystem eigentlich noch Sicherheitsupdates erhalten sollte.
---------------------------------------------
http://heise.de/-2526994
*** Scareware App Downloaded Over a Million Times from Google Play ***
---------------------------------------------
We have recently been investigating an antivirus app in the Google Play store that was displaying fake virus detection results to scare users into purchasing ..
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/01/scareware-app-downloaded…
*** Adobe will Flash-Lücke erst nächste Woche schliessen ***
---------------------------------------------
Im Flash Player klafft eine kritische Lücke, über die Angreifer das System komplett übernehmen können. Diese wird bereits aktiv ausgenutzt. Adobe will sich trotzdem bis nächste Woche mit dem Patch Zeit lassen.
---------------------------------------------
http://heise.de/-2527107
*** The Likelihood of Cyber-Terrorism Today ***
---------------------------------------------
Introduction The virtual space has over time become something of real importance for business, politics, work, communities and communications. In becoming gradually more and more dependent and addicted to the Internet, ..
---------------------------------------------
http://resources.infosecinstitute.com/likelihood-cyber-terrorism-today/
*** How Vulnerabilities Happen: Input Validation Problems, (Fri, Jan 23rd) ***
---------------------------------------------
We would like to thank Richard Ackroyd of RandomStormfor reporting a critical input validation error in our site to us. As we have done before, here is how it happened so hopefully you can learn from it as well. Lets start with a bit of ,,
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19221
*** The Internet of Gas Station Tank Gauges ***
---------------------------------------------
Automated tank gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory ..
---------------------------------------------
https://community.rapid7.com/community/infosec/blog/2015/01/22/the-internet…
*** Siemens SIMATIC S7-1200 CPU Web Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an open redirect vulnerability in the SIMATIC S7-1200 CPU family.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-022-01
*** 1&1: Kundenportal akzeptierte jedes Passwort ***
---------------------------------------------
Durch eine schwerwiegende Panne stand ein Reseller-Kundenportal von 1&1 sperrangelweit offen. Mit einem beliebigen Passwort bekam man administrativen Zugriff auf Hosting-Pakete und Domains - offenbar sogar auf 1und1.de, gmx.de und web.de.
---------------------------------------------
http://heise.de/-2527421
*** Deja vu: PHP-Entwickler schliessen Sicherheitslücke zum zweiten Mal ***
---------------------------------------------
Sicherheitsforscher Stefan Esser hat wieder zugeschlagen: Dieses Mal musste er eine von ihm entdeckte Lücke zweimal stopfen lassen. Diese erlaubt es, PHP-Applikationen unter bestimmten Bedingungen aus der Ferne anzugreifen.
---------------------------------------------
http://heise.de/-2527525
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 21-01-2015 18:00 − Donnerstag 22-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** "Zero-Day"-Sicherheitslücke in Adobe Flash Player (aktiv ausgenützt) ***
---------------------------------------------
Wie der bekannte Sicherheitsforscher "Kafeine" in seinem Blog berichtet (http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-f…), scheint es eine neue, noch ungepatchte Sicherheitslücke im Adobe Flash Player zu geben, die aktiv von zumindest einem Exploit Kit ausgenützt wird.
---------------------------------------------
https://cert.at/warnings/all/20150122.html
*** Security updates available for Adobe Flash Player (APSB15-02) ***
---------------------------------------------
A Security Bulletin (APSB15-02) has been published regarding security updates for Adobe Flash Player. These updates address a vulnerability (CVE-2015-0310) that could be used to circumvent memory randomization mitigations on the Windows platform. Adobe is aware of reports that an ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1157
*** Security Advisory - Vulnerabilities in Pagelines/Platform theme for WordPress ***
---------------------------------------------
Users of both the Pagelines and Platform themes should update as soon as possible. During a routine audit for our WAF, we found two dangerous issues: A Privilege Escalation vulnerability ..
---------------------------------------------
http://blog.sucuri.net/2015/01/security-advisory-vulnerabilities-in-pagelin…
*** Tubrosa threat drives millions of views to scammers' YouTube gaming videos ***
---------------------------------------------
Cybercriminals are fraudulently earning advertising revenue by spreading click-fraud threat Trojan.Tubrosa, which sends compromised computers to their ..
---------------------------------------------
http://www.symantec.com/connect/blogs/tubrosa-threat-drives-millions-views-…
*** CTB-Locker Ransomware Includes Freemium Feature, Extends Deadline ***
---------------------------------------------
Last July we came across a crypto-ransomware variant known as Critroni or Curve-Tor-Bitcoin (CTB) Locker. We observed recent improvements to the CTB malware, which now offer a 'free decryption' service, extended deadline to ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/ctb-locker-ranso…
*** Multiple vulnerabilities in third-party Drupal-modules ***
---------------------------------------------
https://www.drupal.org/node/2411737https://www.drupal.org/node/2411539https://www.drupal.org/node/2411527
*** Energy Harvesting: Tastatur erkennt Benutzer durch Eigenheiten beim Tippen ***
---------------------------------------------
Tippe, und ich sage dir, wer du bist: Forscher in den USA und China haben eine Tastatur entwickelt, die ihren Besitzer am Tippen erkennt. Das könnte eine Ergänzung zu herkömmlichen Passwörtern sein. Die Tastatur gewinnt per Energy Harvesting elektrische Energie aus den Tippbewegungen.
---------------------------------------------
http://www.golem.de/news/energy-harvesting-tastatur-erkennt-benutzer-durch-…
*** Is 123456 Really The Most Common Password? ***
---------------------------------------------
I recently worked with SplashData to compile their 2014 Worst Passwords List and yes, 123456 tops the list. In the data set of 3.3 million passwords I used for SplashData, almost 20,000 of those were in fact 123456. But how often do you really see people using that, or the second most common ..
---------------------------------------------
https://xato.net/passwords/123456-common-password/
*** An analysis of Regins Hopscotch and Legspin ***
---------------------------------------------
Perhaps one of the most interesting things we observed in the Regin malware operation are the forgotten codenames for some of its modules. We decided to analyse two of these modules in more detail.
---------------------------------------------
http://securelist.com/blog/research/68438/an-analysis-of-regins-hopscotch-a…
*** Confluence Security Advisory - 2015-01-21 ***
---------------------------------------------
We have discovered and fixed a vulnerability in our fork of WebWork. Attackers can use this vulnerability to execute Java code of their choice on systems that use this framework. The attacker needs to have an account and be able to access the Confluence web interface.
---------------------------------------------
https://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+-…
*** Yes, Every Freeware Download Site is Serving Crapware ***
---------------------------------------------
When we wrote about what happens when you install the top ten apps from CNET Downloads, about half of the comments were from people saying, 'Well you should download from a trusted source.' The only problem is that there isn't a freeware download site that is free of crapware or adware. And here's the result of our investigation to prove it.
---------------------------------------------
http://www.howtogeek.com/207692/yes-every-freeware-download-site-is-serving…
*** Contact Form 3.82 - Unauthorized Language Manipulation ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7761
*** Dataurization of URLs for A More Effective Phishing Campaign ***
---------------------------------------------
Phishing with data: URIs is not a new idea. The concept is relatively simple, taking advantage of many user's inexperience with how data: URIs function in order to trick them into entering credentials into a phishing page. We've seen this ..
---------------------------------------------
https://thehackerblog.com/dataurization-of-urls-for-a-more-effective-phishi…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 20-01-2015 18:00 − Mittwoch 21-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Windows Firewall Hook Enumeration ***
---------------------------------------------
tl;dr: We're going look in detail at Microsoft Windows Firewall Hook drivers from Windows 2000, XP and 20003. This functionality was leverage ...
---------------------------------------------
https://www.nccgroup.com/en/blog/2015/01/windows-firewall-hook-enumeration/
*** DSA-3133 privoxy - security update ***
---------------------------------------------
https://www.debian.org/security/2015/dsa-3133
*** Siemens SCALANCE X-300/X408 Switch Family DOS Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for denial-of-service vulnerabilities in the Siemens SCALANCE X-300/X408 switch family.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-020-01
*** Schneider Electric ETG3000 FactoryCast HMI Gateway Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for multiple vulnerabilities in Schneider Electric's ETG3000 series FactoryCast HMI Gateways.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-15-020-02
*** Oracle Critical Patch Update Advisory - January 2015 ***
---------------------------------------------
Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the ..
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
*** Google publiziert ungepatchte Lücke in OS X 10.9.5 ***
---------------------------------------------
Nachdem der Internetriese im Rahmen seiner Responsible-Disclosure-Politik in den vergangenen Monaten gleich drei offene Windows-Lücken öffentlich machte, ist nun erstmals auch Apple dran. Der Konzern hatte offenbar nicht in der geforderten Zeit reagiert.
---------------------------------------------
http://heise.de/-2523449
*** Cisco 2015 Annual Security Report: Java ist sicherer geworden ***
---------------------------------------------
2013 war kein gutes Jahr für Java, denn etliche Sicherheitslücken sorgten für verunsicherte Anwender. Gut, dass Oracle offenbar die richtigen Weichen gestellt hat, denn im vergangenen Jahr wurden deutlich weniger Lücken festgestellt.
---------------------------------------------
http://heise.de/-2523408
*** Windows Server 2003 Reaches End of Life In July ***
---------------------------------------------
Several readers sent word that were now less than six months away from the end of support for Windows Server 2003. Though the operating systems usage peaked in 2009, it still runs on millions of machines, and many IT departments are just now starting to look at replacements. Although ..
---------------------------------------------
http://tech.slashdot.org/story/15/01/21/0423229/windows-server-2003-reaches…
*** Bash data exfiltration through DNS (using bash builtin functions) ***
---------------------------------------------
After gaining 'blind' command execution access to a compromised Linux host, data exfiltration can be difficult when the system ibinbash2s protected by a firewall.
---------------------------------------------
https://forsec.nl/2015/01/bash-data-exfiltration-through-dns-using-bash-bui…
*** Discovering and remediating an active but disused botnet ***
---------------------------------------------
On a network I help manage, we kept getting malicious DNS alerts for 'luna1.pw' on an appliance we had installed. Due to the way the network was configured, we were able to see the name request coming in but no traffic activity. This ..
---------------------------------------------
http://colin.keigher.ca/2015/01/discovering-and-remediating-active-but.html
*** rt-sa-2014-010 ***
---------------------------------------------
The signature check of FRITZ!Box firmware images is flawed. Malicious
code can be injected into firmware images without breaking the RSA
signature. The code will be executed either if a manipulated firmware
image is uploaded by the victim or if the victim confirms an update on
the webinterface during a MITM attack.
---------------------------------------------
https://www.redteam-pentesting.de/advisories/rt-sa-2014-010.txt
*** Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK ***
---------------------------------------------
This is a fast post. I will update it heavily in the coming hours/days. I spotted an instance of Angler EK which is sending three different bullets targeting Flash Player :
---------------------------------------------
http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-f…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 19-01-2015 18:00 − Dienstag 20-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** How Was Your Credit Card Stolen? ***
---------------------------------------------
Almost once a week, I receive an email from a reader who has suffered credit card fraud and is seeking help figuring out which hacked merchant was responsible. I generally reply that this is a fruitless pursuit, and instead encourage readers to keep a close eye on their card statements and ..
---------------------------------------------
http://krebsonsecurity.com/2015/01/how-was-your-credit-card-stolen/
*** Symantec Data Center Security: Server Advanced, Multiple Security Issues on Management Server and Protection Policies Rule Bypass ***
---------------------------------------------
The management server for Symantec Critical System Protection (SCSP) 5.2.9 and Data Center Security: Server Advanced (SDCS:SA) 6.0.x is susceptible to security issues which could enable privileged access to the management server. Rules in the prevention policies could be bypassed if deployed to SCSP/SDCS:SA agents to restrict access to specific host functionality.
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** Verschlüsselung: Neue Angriffe auf RC4 ***
---------------------------------------------
Zwei Forscherteams kündigen unabhängig voneinander an, bald neue Angriffe gegen den RC4-Verschlüsselungsalgorithmus vorzustellen. Knapp ein Prozent der Webserver setzt immer noch ausschließlich auf RC4.
---------------------------------------------
http://www.golem.de/news/verschluesselung-neue-angriffe-auf-rc4-1501-111805…
*** PlugX Malware Found in Official Releases of League of Legends, Path of Exile ***
---------------------------------------------
Hacks in Taiwan (HITCON), a security conference hosted in that country, has discovered an attack involving several online games. Official releases of two popular online games were found to be compromised, downloading malware onto computers. HITCON worked with Trend Micro to provide a clean-up ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/plugx-malware-fo…
*** Symantec Critical System Protection Multiple Flaws Let Remote Authenticated Users Execute Arbitrary Code, Inject SQL Commands, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information ***
---------------------------------------------
Multiple vulnerabilities were reported in Symantec Critical System Protection. A remote authenticated user can execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote authenticated ..
---------------------------------------------
http://www.securitytracker.com/id/1031566
*** Moodle Bugs Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks ***
---------------------------------------------
Multiple vulnerabilities were reported in Moodle. A remote user can cause denial of service conditions. A remote user can conduct cross-site scripting and cross-site request forgery attacks. A remote user can obtain potentially sensitive information.
---------------------------------------------
http://www.securitytracker.com/id/1031557
*** F-Secure: Bios-Trojaner aufzuspüren, ist "fast aussichtslos" ***
---------------------------------------------
Weil die Antivirenhersteller keine Muster von Regierungs-Malware haben, die PC-Komponenten auf Firmware-Ebene infiziert, können sie diese kaum entdecken. Mikko Hypponen von F-Secure sieht vor allem die Hardwarehersteller in der Pflicht.
---------------------------------------------
http://www.golem.de/news/f-secure-bios-trojaner-aufzuspueren-ist-fast-aussi…
*** Glorious Leaders Not-That-Glorious Malwares - Part 2 ***
---------------------------------------------
This is second (and last) part of the analysis of Korean Central News Agency Malware. If you havent read the first part yet, I would suggest reading that first here. First of all I should mention that its not launch.exe and ..
---------------------------------------------
https://www.codeandsec.com/Glorious-Leaders-Not-That-Glorious-Malwares-Part…
*** Owning Modems And Routers Silently ***
---------------------------------------------
Do you have cable internet? Own a surfboard modem? Since most of my buddies in AZ do, I sent them to this page and to my amusement, they got knocked off the net for a few minutes. How? Javascript. Specifically a CSRF in the Motorolla Surfboard.
---------------------------------------------
http://www.gironsec.com/blog/2015/01/owning_modems_and_routers_silently/
*** Libavcodec: Fehler erlauben Codeausführung in VLC-Codecbibliothek ***
---------------------------------------------
Speziell präparierte Videodateien können zur Codeausführung unter anderem in VLC genutzt werden. Dessen Entwickler verhalten sich aber zurückhaltend, zudem werfen die Berichte einige Fragen auf.
---------------------------------------------
http://www.golem.de/news/libavcodec-fehler-erlauben-codeausfuehrung-in-vlc-…
*** Go Static or Go Home - Inviting the Trojan Horse Inside ***
---------------------------------------------
And then, after all that spending on all that complexity for defense, some of us go on to install a DCMS (Dynamic Content Management System) as our public-facing web server. This approach is like building a mighty walled city and then inviting the Trojan horse inside, or making Achilles invulnerable to harm except for his heel.
---------------------------------------------
http://queue.acm.org/detail.cfm?id=2721993
*** ENISA Warns of Internet Vulnerabilities (InfoRiskToday) ***
---------------------------------------------
The Internet infrastructure remains susceptible to a variety of threats, including routing attacks, DNS spoofing and poisoning attacks and distributed denial-of-service disruptions. But a number of best practices can help prevent related exploits, a new EU government study says.
---------------------------------------------
http://www.inforisktoday.com/enisa-warns-internet-vulnerabilities-a-7814
*** Session Hijacking Cheat Sheet ***
---------------------------------------------
'Session Hijacking' is an old and routine topic in the field of application security. To make it more interesting, in this article, we are going to focus on different ways it can be performed. Introduction for beginners Web ..
---------------------------------------------
http://resources.infosecinstitute.com/session-hijacking-cheat-sheet/
*** Paper: Nesting doll: unwrapping Vawtrak ***
---------------------------------------------
Raul Alvarez unwraps the many layers of an increasingly prevalent banking trojan.Banking trojans remain one of the most prevalent kinds of malware. Among them, trojans based on Zeus have long been the most prevalent, but in recent months a relatively new trojan has been challenging the reign of Zeus: Vawtrak.Also known as Neverquest or Snifula, Vawtrak initially targeted users of Japanese banking systems, but it has since broadened its scope. In a recent paper (pdf), Sophos researcher James
---------------------------------------------
http://www.virusbtn.com/blog/2015/01_20.xml
*** GoDaddy CSRF Vulnerability Allows Domain Takeover ***
---------------------------------------------
tl;dr: An attacker can leverage a CSRF vulnerability to take over domains registered with GoDaddy. The vulnerability has been patched.
---------------------------------------------
http://breakingbits.net/2015/01/18/taking-over-godaddy-accounts-using-csrf/
*** Finding Privilege Escalation Flaws in Linux ***
---------------------------------------------
We often tend to ignore privilege escalation flaws. In order to take advantage of these vulnerabilities, an attacker first needs to have access to the system itself. But in particular for systems that many users have access to, it can be difficult to monitor them all for compromised ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19207
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 16-01-2015 18:00 − Montag 19-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Survey says security products waste our time ***
---------------------------------------------
A survey of information-technology professionals published on Friday found that the average large organization has to sift through nearly 17,000 malware alerts each week to find the 19 percent that are considered reliable. The efforts at ..
---------------------------------------------
http://arstechnica.com/security/2015/01/survey-says-security-products-waste…
*** A Lot of Security Purchases Remain Shelfware ***
---------------------------------------------
Companies may be investing more in security, but many are either underutilizing their new purchases or not using them at all, an Osterman Research survey shows.
---------------------------------------------
http://www.darkreading.com/a-lot-of-security-purchases-remain-shelfware/d/d…
*** Report: Mercenaries Behind APT Attacks ***
---------------------------------------------
An increasing number of sophisticated cyber-attacks are not being launched by governments - or their intelligence services - but rather by opportunistic mercenaries who sell whatever they can steal to the highest bidder, according to a new ..
---------------------------------------------
http://www.inforisktoday.com/report-mercenaries-behind-apt-attacks-a-7806
*** Dridex Banking Trojan Begins 2015 with a Bang ***
---------------------------------------------
In October, we called out a series of attacks installing the Dridex Trojan using macros in Microsoft Word documents. Those attacks continued over the last few ...
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/01/dridex-banking-trojan-be…
*** Use-after-Free: New Protections, and how to Defeat them ***
---------------------------------------------
The Problem Memory corruption has plagued computers for decades, and these bugs can often be transformed into working cyber-attacks. Memory corruption is a situation where an attacker (malicious user of an application or network protocol) is ..
---------------------------------------------
http://labs.bromium.com/2015/01/17/use-after-free-new-protections-and-how-t…
*** Bypassing the Android PIN using fast tapping - Lock screens are still hard ***
---------------------------------------------
It turns out that during that brief period we have access to the phone and if we time our actions right, we can start programs or change settings by quickly tapping on the screen. Surely it's a bit tedious to do so, but ..
---------------------------------------------
http://itinsight.hu/en/posts/articles/2015-01-28-android-bypass/
*** New Guide by ENISA: Actionable Information for Security Incident Response ***
---------------------------------------------
ENISA publishes a good practice guide on Actionable Information for Security Incident Response, aiming to provide a picture of the challenges national CERTs and other security organizations encounter ...
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/new-guide-by-enisa-actionab…
*** VB2014 paper: OPSEC for security researchers ***
---------------------------------------------
Vicente Diaz teaches researchers the basics of OPSEC.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added OPSEC for security researchers by Kaspersky researchers Vicente ..
---------------------------------------------
http://www.virusbtn.com/blog/2015/01_19.xml
*** DSA-3131 xdg-utils - security update ***
---------------------------------------------
John Houwer discovered a way to cause xdg-open, a tool that automaticallyopens URLs in a users preferred application, to execute arbitrarycommands remotely.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3131
*** Hacked. A Short Story. ***
---------------------------------------------
It all started when I was asked (as a freelancer) to configure exim4, so that newsletters would not fall into spam folders. They even sent me a link to a tutorial. I thought the work would take a couple of hours, including the DNS update, but I was wrong. After logging in as root, I started my favorite ..
---------------------------------------------
http://kukuruku.co/hub/infosec/hacked-a-short-story-of-a-hack
*** 2013-11-08: Remote code execution vulnerability in CAP 501 / CAP 505 / SMS 510 ***
---------------------------------------------
http://search.abb.com/library/Download.aspx?DocumentID=1MRS757865&LanguageC…
*** Tyupkin ATM Malware Analysis ***
---------------------------------------------
Introduction Some time ago, Kaspersky discovered and reported a new type of malicious program called Tyupkin, which targets ATM machines by moving beyond targeting consumers with card skimmers that steal debit card numbers to directly getting cash ..
---------------------------------------------
http://resources.infosecinstitute.com/tyupkin-atm-malware-analysis/
*** China: Attacke gegen Microsofts Outlook ***
---------------------------------------------
Offenbar Versuch einer Man-in-the-Middle-Attacke - Angreifer wollten Verschlüsselung austricksen
---------------------------------------------
http://derstandard.at/2000010596970
*** Certified Secure Advisory 14-01-2015-0.1 - PolarSSL ***
---------------------------------------------
During a routine research session, Certified Secure found a "Use of uninitialized memory" vulnerability in the PolarSSL (https://polarssl.org) library. The vulnerability is present in the asn1_get_sequence_of routine that is ..
---------------------------------------------
https://www.certifiedsecure.com/polarssl-advisory/
*** Traffic Patterns For CryptoWall 3.0 ***
---------------------------------------------
This is a guest diary submitted by Brad Duncan. Various sources have reported version 3 of CryptoWall has appeared [1] [2] [3]. This malware is currently seen from exploit kits and phishing emails. CryptoWall is one of many ransomware trojans that encrypt the personal files on your computer ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19203
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 15-01-2015 18:00 − Freitag 16-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Definitions matter. For crying out loud, securobods, BE SPECIFIC - ENISA ***
---------------------------------------------
Use your words or the DDoSers will GET you.... Definitions matter when your infrastructure is under threat says European Union Agency for Network and Information Security (ENISA).
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/01/15/if_you_want…
*** Critical Patch Update - January 2015 - Pre-Release Announcement ***
---------------------------------------------
This Critical Patch Update Pre-Release Announcement provides advance information about the Oracle Critical Patch Update for January 2015, which will be released on Tuesday, January 20, 2015. While this Pre-Release Announcement is as accurate as possible at the time of publication, the information it contains may change before publication of the Critical Patch Update Advisory.
---------------------------------------------
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
*** Google AdWords Campaigns Hijacked by Malvertisers ***
---------------------------------------------
Two Google AdWords campaigns have been hijacked by malvertisers and users are being redirected to fraud sites without even clicking the poisoned ads.
---------------------------------------------
http://threatpost.com/google-adwords-campaigns-hijacked-by-malvertisers/110…
*** Telekom-Tools für sichere Server-Konfiguration ***
---------------------------------------------
Die Telekom nimmt Admins an die Hand und liefert kostenlose Tools, die bei der Härtung von nginx, MySQL und Co. helfen.
---------------------------------------------
http://heise.de/-2517840
*** Sicherheitsfirmen warnen vor "Je Suis Charlie"-Trojaner ***
---------------------------------------------
Vermeintliches Solidaritätsvideo lädt tatsächlich Schadsoftware auf den Rechner
---------------------------------------------
http://derstandard.at/2000010489196
*** Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse ***
---------------------------------------------
In particular we reveal that, even though 95 percent of the popular domains we investigated are actively targeted by typosquatters, only few trademark owners protect themselves against this practice by proactively registering their own typosquatting domains. A small fraction of those typosquatted domains -- such as gooogle.com for google.com -- were registered by the legitimate website in a bid to foil typosquatters.
---------------------------------------------
https://lirias.kuleuven.be/bitstream/123456789/471369/3/typos-final.pdf
*** Employee Threat Assessment Template for Large Organizations ***
---------------------------------------------
Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it's often harder to trace and determine the extent of the problem. The larger your [...]The post Employee Threat Assessment Template for Large Organizations appeared first on InfoSec Institute.
---------------------------------------------
http://resources.infosecinstitute.com/employee-threat-assessment-template-l…
*** Details zur kritischen Lücke im Telnet-Server von Windows ***
---------------------------------------------
Auf einer chinesischen Website ist eine detaillierte Analyse der gerade erst gepatchten Telnet-Lücke aufgetaucht - und ein Proof-of-Concept.
---------------------------------------------
http://heise.de/-2518951
*** Cisco Adaptive Security Appliance DHCPv6 Relay Denial of Service Vulnerability ***
---------------------------------------------
CVE-2015-0578
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Cisco Hosted WebEx Meeting Center Information Disclosure ***
---------------------------------------------
CVE-2015-0590
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** T-Mobile Internet Manager UpdateCfg.ini SEH buffer overflow ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99945
*** Alienvault OSSIM Web UI command execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99951
*** Arbiter Systems 1094B GPS Clock Spoofing Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a GPS clock spoofing vulnerability in the Arbiter Systems 1094B clock.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-14-345-01
*** GE Proficy HMI/SCADA CIMPLICITY CimView Memory Access Violation ***
---------------------------------------------
This advisory provides mitigation details for a memory access violation vulnerability in GE's CIMPLICITY CimView application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-14-289-02
*** Windows: Impersonation Check Bypass With CryptProtectMemory and CRYPTPROTECTMEMORY_SAME_LOGON flag ***
---------------------------------------------
Platform: Windows 7, 8.1 Update 32/64 bit Class: Security Bypass/Information Disclosure The function CryptProtectMemory allows an application to encrypt memory for one of three scenarios, process, logon session and computer. When using the logon session option (CRYPTPROTECTMEMORY_SAME_LOGON flag) the encryption key is generated based on the logon session identifier, this is for sharing memory between processes running within the same logon.
---------------------------------------------
https://code.google.com/p/google-security-research/issues/detail?id=128
*** DSA-3129 rpm - security update ***
---------------------------------------------
Two vulnerabilities have been discovered in the RPM package manager.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3129
*** Information Disclosure in Direct Mail Subscription (direct_mail_subscription) ***
---------------------------------------------
It has been discovered that the extension "Direct Mail Subscription" (direct_mail_subscription) is susceptible to Information Disclosure.
---------------------------------------------
http://www.typo3.org/news/article/information-disclosure-in-direct-mail-sub…
*** WiFi File Browser Pro v2.0.8 Code Execution Vulnerability ***
---------------------------------------------
Topic: WiFi File Browser Pro v2.0.8 Code Execution Vulnerability Risk: High Text:Document Title: WiFi File Browser Pro v2.0.8 - Code Execution Vulnerability References (Source): == http:/...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010087
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 14-01-2015 18:00 − Donnerstag 15-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** CryptoWall 3.0 Uses I2P Anonymity Network For CC Communications (SecurityWeek) ***
---------------------------------------------
Almost two months have passed since the developers of CryptoWall released an updated version of the threat, but now they’re back to work. The malware, distributed via spam and malvertising campaigns, helped cybercriminals make a lot of money last year so it’s not surprising that its authors continue improving it.
---------------------------------------------
http://www.securityweek.com/cryptowall-30-uses-i2p-anonymity-network-cc-com…
*** AdSense Abused with Malvertising Campaign ***
---------------------------------------------
Last weekend we noticed a large number of requests to scan websites for malware because they randomly redirected to some "magazine" websites. Most of them mentioned the lemode-mgz .com site. In all cases, the symptoms were the same. Some users randomly got redirected when they clicked on links or loaded new pages. They all reported...
---------------------------------------------
http://blog.sucuri.net/2015/01/adsense-abused-with-malvertising-campaign.ht…
*** Anatomy Of A Cyber-Physical Attack (Dark Reading) ***
---------------------------------------------
"If you only consider hackers, you don’t have to be concerned that much. They won't be able to take down a power grid or blow up chemical facilities," says Ralph Langer, founder of Langner Communications and a top Stuxnet expert. The danger is when attackers have an understanding of the physical and engineering aspects of the plant or site they are targeting, he says.
---------------------------------------------
http://www.darkreading.com/vulnerabilities---threats/anatomy-of-a-cyber-phy…
*** Kritik an Apples Zwei-Faktor-Schutz ***
---------------------------------------------
Apples zweistufige Bestätigung deckt mehrere Cloud-Dienste des Konzerns gar nicht ab, bemängelt eine Nutzerin - ein Angreifer könne auf diese Weise tiefe Einblicke erhalten.
---------------------------------------------
http://heise.de/-2517903
*** Private Schlüssel: Gitrob sucht sensible Daten bei Github ***
---------------------------------------------
Immer wieder tauchen Daten wie private Schlüssel oder Passwörter in Github-Repositories auf. Mit Hilfe von Gitrob sollen diese gefunden werden können, um sich besser zu schützen. Das öffnet aber auch die Möglichkeiten für einen interessanten Angriff.
---------------------------------------------
http://www.golem.de/news/private-schluessel-gitrob-sucht-sensible-daten-bei…
*** Security and Military Experts Fall For "Open" Wi-Fi ***
---------------------------------------------
According to The Local, an English-language newspaper in Sweden, Gustav Nipe watched earlier this week as around 100 politicians, military officers and journalists logged into a network called “Open Guest” and proceeded to search for various non-work-related things including “forest hikes” and monitor eBay auctions.
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002783.html
*** ATM: Attacking Multichannel Fraud (InfoRiskToday) ***
---------------------------------------------
The increasing globalization of fraud perpetrated by sophisticated organized crime rings has spurred unprecedented growth in cross-channel attacks, security experts from three of the world's leading ATM manufacturers say.
That's why ATM deployers can no longer build defenses that focus solely on the ATM channel, executives from Diebold Inc., Wincor Nixdorf AG and NCR Corp. say in this final part of an exclusive three-part interview with Information Security Media Group.
---------------------------------------------
http://www.inforisktoday.com/interviews/atm-attacking-multichannel-fraud-i-…
*** Patchday: Adobe schließt neun Lücken in Flash ***
---------------------------------------------
Die Lücken, die Adobe nun in Flash geschlossen hat, betreffen alle Plattformen. Nutzer sollten die Updates schnellstmöglich installieren, da sie Angriffe aus dem Netz ermöglichen.
---------------------------------------------
http://heise.de/-2517426
*** Cybercrime: Hacking als aufstrebender Wirtschaftszweig in Österreich ***
---------------------------------------------
Internet-Sicherheitsbericht 2014 präsentiert - Ungeschützte Smartphones und Tablets als Ziele
---------------------------------------------
http://derstandard.at/2000010445114
*** JSA10669 - 2015-01 Security Bulletin: Junos: Multiple vulnerabilities in libxml2 library ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10669&actp=RSS
*** JSA10667 - 2015-01 Security Bulletin: Junos: Privilege escalation vulnerability (CVE-2014-6384) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10667&actp=RSS
*** Cisco Identity Services Engine Cross-Site Scripting Vulnerability ***
---------------------------------------------
CVE-2014-8022
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Unified Communications Domain Manager Admin GUI DoS Vulnerability ***
---------------------------------------------
CVE-2015-0591
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Simple Security plugin for WordPress wp-admin/users.php script cross-site scripting ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99931
*** SA-CONTRIB-2015-022 - nodeauthor - Cross Site Scripting (XSS) - Unsupported ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-022Project: nodeauthor (third-party module)Version: 7.xDate: 2015-January-14Security risk: 12/25 ( Moderately Critical) AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site ScriptingDescriptionThis module displays node author information in a jQuery slider.The module doesnt sufficiently sanitize Profile2 fields in a provided block.This vulnerability is mitigated by the fact that an attacker must have a user account allowed to
---------------------------------------------
https://www.drupal.org/node/2407401
*** SA-CONTRIB-2015-021 - Content Analysis - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-021Project: Content Analysis (third-party module)Version: 6.xDate: 2014-January-14Security risk: 16/25 ( Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescriptionThe Content Analysis module is an API designed to help modules that need to analyze content.The module fails to sanitize user input in log messages, leading to a Cross Site Scripting (XSS) vulnerability.This vulnerability is mitigated by the fact
---------------------------------------------
https://www.drupal.org/node/2407395
*** SA-CONTRIB-2015-020 - Contact Form Fields - Cross Site Request Forgery (CSRF) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-020Project: Contact form fields (third-party module)Version: 6.xDate: 2014-January-14Security risk: 13/25 ( Moderately Critical) AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site Request ForgeryDescriptionThe Contact Form Fields module enables you to create additional fields to site-wide contact form.Some links were not properly protected from CSRF. A malicious user could cause an administrator to delete fields by getting the
---------------------------------------------
https://www.drupal.org/node/2407357
*** SA-CONTRIB-2015-018 - Video - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-018Project: Video (third-party module)Version: 7.xDate: 2015-January-14Security risk: 13/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site ScriptingDescriptionThis module enables you to upload, convert and playback videos.The module doesnt sufficiently sanitize node titles when using the video WYSIWYG plugin, thereby opening a Cross Site Scripting (XSS) vulnerability.This vulnerability is mitigated by
---------------------------------------------
https://www.drupal.org/node/2407341
*** SA-CONTRIB-2015-015 - Term Merge - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-015Project: Term merge (third-party module)Version: 7.xDate: 2015-January-14Security risk: 12/25 ( Moderately Critical) AC:Complex/A:Admin/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescriptionThis module enables you to merge (synonymous) taxonomy terms among themselves.The module doesnt sufficiently filter user input under certain conditions, thereby opening a Cross Site Scripting (XSS) vulnerability.This vulnerability is
---------------------------------------------
https://www.drupal.org/node/2407315
*** PHPKIT result cross-site scripting ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99904
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 13-01-2015 18:00 − Mittwoch 14-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** AMD plugs firmware holes that allowed command injection ***
---------------------------------------------
Bug your notherboard vendor for a fix, says boffin VID Chip maker AMD has patched holes across its firmware lines that could allow hackers to inject malware.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/01/14/amd_plugs_c…
*** Hintergrund: Universeller SSL-Tester SSLyze ***
---------------------------------------------
SSL mit Kommandozeilen-Tools von Hand zu testen, ist mühselig; SSLyze nimmt Admins viel dieser Arbeit ab.
---------------------------------------------
http://www.heise.de/security/artikel/Universeller-SSL-Tester-SSLyze-2470008…
*** Patchday: Microsoft stopft acht Lücken in Windows ***
---------------------------------------------
Am Januar-Patchday überrascht die Firma damit, ausschließlich Lücken in Windows zu schließen. Für den Internet Explorer wird lediglich ein Patch vom Dezember noch einmal aufgewärmt.
---------------------------------------------
http://www.heise.de/newsticker/meldung/Patchday-Microsoft-stopft-acht-Lueck…
*** MMD-0030-2015 New ELF malware on Shellshock: the ChinaZ ***
---------------------------------------------
BackgroundThe bash Shellshock vulnerability is still proven to be one of the fastest way to spread ELF malware infection to NIX boxes in internet, along with Linux system that is still serving the vulnerable version. This fact that is not knowing only by internet security folks, but by the threat actors themself. Previously we announced linux/Mayhem malwarere was utilizing the shellshock previously, and now ELF malware actors in China is starting to utilized set of tools to spread more...
---------------------------------------------
http://blog.malwaremustdie.org/2015/01/mmd-0030-2015-new-elf-malware-on.html
*** Security updates available for Adobe Flash Player ***
---------------------------------------------
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. ... CVE number: CVE-2015-0301, CVE-2015-0302, CVE-2015-0303, CVE-2015-0304, CVE-2015-0305, CVE-2015-0306, CVE-2015-0307, CVE-2015-0308, CVE-2015-0309
---------------------------------------------
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html
*** Asus schließt kritische Router-Lücke ***
---------------------------------------------
Liefert wenige Tage nach Bekanntwerden Updates für zahlreiche Geräte
---------------------------------------------
http://derstandard.at/2000010378742
*** Amsterdam 2015 FIRST Technical Colloquium ***
---------------------------------------------
The FIRST Amsterdam Technical Colloquium (TC) 2015 will be hosted by Cisco Systems in Amsterdam, Netherlands. The event will be a plenary style conference held on the 5th and 6th of May 2015, with optional, free training sessions on May 4th. FIRST is looking for speakers that would like to present at this Technical Colloquium. This is a GREAT opportunity to give something back to FIRST and the industry, while practicing your speaking skills and sharing your hard work.
---------------------------------------------
http://www.first.org/events/colloquia/amsterdam2015
*** At this rate it will hit the launch codes in... 5.3 minutes. ***
---------------------------------------------
Hello everyone, in this post I would like to analyze an Android application which purpose is to manage and generate passwords securely. On their Play Store page they claim to use DES to encrypt passwords on local device and that DES key is derivated from you PIN code...
---------------------------------------------
https://bughardy.me/at-this-rate-it-will-hit-the-launch-codes-in-5-3-minute…
*** MSRT January 2015 - Dyzap ***
---------------------------------------------
This month we added the Win32/Emotet and Win32/Dyzap malware families to the Malicious Software Removal Tool. Both Emotet and Dyzap are trojans that steal personal information, including banking credentials. In a previous blog we detailed how Emotet targets German-language banking websites. In this blog, we will focus on Dyzap - another prevalent banking trojan that predominantly targets English-speaking countries. Dyzap variants target credentials for online banking, crypto...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/01/13/msrt-january-2015-dyzap.…
*** 4 Mega-Vulnerabilities Hiding in Plain Sight (Dark Reading) ***
---------------------------------------------
How four recently discovered, high-impact vulnerabilities provided "god mode" access to 90% of the Internet for 15 years, and what that means for the future.
---------------------------------------------
http://www.darkreading.com/vulnerabilities---threats/4-mega-vulnerabilities…
*** Phony Oracle Patches Making the Rounds ***
---------------------------------------------
Attackers are circulating fake fixes for Oracle error messages and the company is warning users not to download any patches that don't come directly from Oracle.
---------------------------------------------
http://threatpost.com/phony-oracle-patches-making-the-rounds/110415
*** Akamai: Probleme mit alten SSL-Implementierungen ***
---------------------------------------------
Akamai verarbeitet eine Billiarde an Verbindungen pro Jahr. Brian Sniffen gibt Einblicke, was das bedeutet - und welche Schwierigkeiten darin bestehen, alte SSL-Implementierungen auszusperren. (Akamai, Android)
---------------------------------------------
http://www.golem.de/news/akamai-probleme-mit-alten-ssl-implementierungen-15…
*** JSA10670 - 2015-01 Security Bulletin: Junos: Malformed BGP FlowSpec prefix triggers rpd crash (CVE-2014-6386) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10670&actp=RSS
*** JSA10668 - 2015-01 Security Bulletin: Junos: Fragmented OSPFv3 packets with IPsec AH may trigger kernel crash (CVE-2014-6385) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10668&actp=RSS
*** JSA10666 - 2015-01 Security Bulletin: Junos: Firewall filter fails to match on port (CVE-2014-6383) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10666&actp=RSS
*** JSA10665 - 2015-01 Security Bulletin: Junos: jpppd core when MX Series router receives crafted PAP Authenticate-Request (CVE-2014-6382) ***
---------------------------------------------
http://kb.juniper.net/index?page=content&id=JSA10665&actp=RSS
*** Cisco ASA DHCPv6 Relay DoS Vulnerability ***
---------------------------------------------
CVE-2015-0578
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Cisco TelePresence VCS and Expressway High CPU Utilization Vulnerability ***
---------------------------------------------
CVE-2015-0579
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Cisco AsyncOS ISQ XSS Vulnerability ***
---------------------------------------------
CVE-2015-0577
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** Cisco AnyConnect User Interface Dialog Rendered When Connecting to Arbitrary Hosts Vulnerability ***
---------------------------------------------
CVE-2014-3314
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** VU#117604: Panasonic Arbitrator Back-End Server (BES) uses unencrypted communication ***
---------------------------------------------
Vulnerability Note VU#117604 Panasonic Arbitrator Back-End Server (BES) uses unencrypted communication Original Release date: 13 Jan 2015 | Last revised: 13 Jan 2015 Overview Panasonic Arbitrator Back-End Server (BES) uses an unencrypted channel to transmit data. Description CWE-319: Cleartext Transmission of Sensitive InformationPanasonic Arbitrator Back-End Server (BES) uses an unencrypted channel to transmit data between the client and server. It has been reported that Active Directory
---------------------------------------------
http://www.kb.cert.org/vuls/id/117604
*** Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Request Forgery Attacks, and Obtain Potentially Sensitive Information ***
---------------------------------------------
http://www.securitytracker.com/id/1031533
*** Foxit MobilePDF 4.4.0 Local File Inclusion / Arbitrary File Upload ***
---------------------------------------------
Topic: Foxit MobilePDF 4.4.0 Local File Inclusion / Arbitrary File Upload Risk: High Text:Document Title: Foxit MobilePDF v4.4.0 iOS - Multiple Web Vulnerabilities References (Source): == http://w...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010071
*** Lexmark MarkVision Enterprise Arbitrary File Upload ***
---------------------------------------------
This module exploits a code execution flaw in Lexmark MarkVision Enterprise before 2.1. A directory traversal in the fdFileUploadServlet servlet allows an unauthenticated attacker to upload arbitrary files, including arbitrary JSP code. This module has been tested successfully on Lexmark MarkVision Enterprise 2.0 with Windows 2003 SP2.
---------------------------------------------
http://www.exploit-db.com/exploits/35776/
*** Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness ***
---------------------------------------------
This tool checks whether a BMC machine is vulnerable to CVE-2014-8272 (http://www.kb.cert.org/vuls/id/843044) by logging the TemporarySessionID/SessionID in each IPMI v1.5 session, and checking that these values are incremental...
---------------------------------------------
http://www.exploit-db.com/exploits/35770/
*** Simple Security <= 1.1.5 - Two Cross-Site Scripting (XSS) Vulnerabilities ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7753
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 12-01-2015 18:00 − Dienstag 13-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Remember Corel? Its just entered .DLL hell ***
---------------------------------------------
Hijack hole found in Corel Draw and other doodleware Local zero day vulnerabilities have been disclosed in Corel applications, potentially affecting more than 100 million users.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/01/13/hijack_hole…
*** Windows logging cheat sheet - Win 7/Win 2008 or later ***
---------------------------------------------
This "Windows Logging Cheat Sheet" is intended to help you get started setting up basic and necessary Windows Audit Policy and Logging. By no means is this list extensive; but it does include some very common items that should be enabled, configured, gathered and harvested for any Log Management Program. Start with these settings and add to it as you understand better what is in your logs and what you need.
---------------------------------------------
http://sniperforensicstoolkit.squarespace.com/storage/logging/Windows%20Log…
*** Docker Secure Deployment Guidelines ***
---------------------------------------------
The GitHub repository referenced below aims at providing some deployment guidelines for Docker developers and system administrators alike, that can be used to improve the security posture of Linux containers within a Dockerized environment.
---------------------------------------------
http://blog.gdssecurity.com/labs/2015/1/12/docker-secure-deployment-guideli…
*** Alert on unauthorized use of domain administrative account for Active Directory ***
---------------------------------------------
At JPCERT/CC, we have observed multiple targeted attacks against domestic organizations where attackers intruded and stay within a corporate network for long periods of time and steal information. One characteristic of these attacks is that the attackers in the network steal credentials for the domain administrator account (herein, administrator account) in Active Directory, and leverage this administrator account to launch various attacks across the network.
---------------------------------------------
https://www.jpcert.or.jp/english/at/2014/at140054.html
*** Skeleton Key Malware Analysis ***
---------------------------------------------
Dell SecureWorks Counter Threat Unit(TM) (CTU) researchers discovered malware that bypasses authentication on Active Directory (AD) systems that implement single-factor (password only) authentication. Threat actors can use a password of their choosing to authenticate as any user. ... Skeleton Key is deployed as an in-memory patch on a victims AD domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal.
---------------------------------------------
http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-m…
*** KeySweeper - Arduino-based Keylogger for Wireless Keyboards ***
---------------------------------------------
Security researcher has developed a cheap USB wall charger that is capable to eavesdrop on almost any Microsoft wireless keyboard. MySpace mischief-maker Samy Kamkar has released a super-creepy keystroke logger for Microsoft wireless keyboards cunningly hidden in what appears to be a rather cheap, but functioning USB wall charger. The stealthy Arduino-based device,...
---------------------------------------------
http://thehackernews.com/2015/01/KeySweeper-Arduino-Keyboard-Keylogger.html
*** Gitrob: Putting the Open Source in OSINT ***
---------------------------------------------
Sometimes employees might publish things that should not be publicly available. Things that contain sensitive information or things that could even lead to direct compromise of a system. This can happen by accident or because the employee does not know the sensitivity of the information. Gitrob is a command line tool that can help organizations and security professionals find such sensitive information.
---------------------------------------------
http://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/
*** Aggressive Riskware Installation on Amazon Kindle (and Android) ***
---------------------------------------------
As malware continues to grow on Android (900K malicious samples and 1,300 new per day), we sometimes forget attacks can also affect other devices... like Amazons Kindle. The Kindle indeed runs Fire OS, a fork of Android. Thus, in several cases, Android malware also work on Fire OS, and reciprocally. Proof below. ...
---------------------------------------------
http://blog.fortinet.com/post/aggressive-riskware-installation-on-amazon-ki…
*** OSXCollector: Forensic Collection and Automated Analysis for OS X ***
---------------------------------------------
OSXCollector is an open source forensic evidence collection and analysis toolkit for OS X. It was developed in-house at Yelp to automate the digital forensics and incident response (DFIR) our crack team of responders had been doing manually.
---------------------------------------------
http://engineeringblog.yelp.com/2015/01/osxcollector-forensic-collection-an…
*** ICS London 2015 ***
---------------------------------------------
SANS ICS London 2015 hosts four dedicated training courses for those tasked with securing Industrial Control Systems. This specialist training event takes place at the Grand Connaught Rooms in Londons West End, from April 27th to May 2nd 2015.
---------------------------------------------
https://www.sans.org/event/ics-london-2015
*** Millionen Android-Geräte mit Sicherheitslücken auf Lebenszeit ***
---------------------------------------------
Eine Kernkomponente von Android wird auf Geräten mit älteren Versionen nicht mehr mit Patches versorgt. Dabei ist vor allem deren Standardbrowser Einfallstor für Angreifer.
---------------------------------------------
http://www.heise.de/security/meldung/Millionen-Android-Geraete-mit-Sicherhe…
*** [2015-01-13] Multiple critical vulnerabilities in all snom desktop IP phones ***
---------------------------------------------
All snom desktop IP phones are affected by multiple critical security issues in all available firmware versions. Attackers are able to completely compromise the phone with root access rights and install backdoors to the device which will even survive a factory reset. Furthermore, tapping into phone calls or surveilling the room is possible.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2015…
*** [2015-01-13] Privilege Escalation & XSS & Missing Authentication in Ansible Tower ***
---------------------------------------------
Attackers are able to elevate privileges and gain access to sensitive data of other organizations in Ansible Tower.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2015…
*** [2015-01-13] Cross site request forgery vulnerability in XBMC / Kodi ***
---------------------------------------------
An attacker could potentially gain access to sensitive information stored on the system where XBMC / Kodi is installed by exploiting CSRF issues.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2015…
*** VU#533140: Tianocore UEFI implementation reclaim function vulnerable to buffer overflow ***
---------------------------------------------
Vulnerability Note VU#533140 UEFI EDK1 vulnerable to buffer overflow Original Release date: 05 Jan 2015 | Last revised: 05 Jan 2015 Overview The EDK1 UEFI reference implementation contains a buffer overflow vulnerability. Description The open source EDK1 project provides a reference implementation of the Unified Extensible Firmware Interface (UEFI). Commercial UEFI implementations may incorporate portions of the EDK1 source code.According to Rafal Wojtczuk and Corey Kallenberg, a buffer...
---------------------------------------------
http://www.kb.cert.org/vuls/id/533140
*** Cisco WebEx Meetings Server Information Disclosure Vulnerability ***
---------------------------------------------
CVE-2015-0583
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…
*** SSA-311299 (Last Update 2015-01-13): Vulnerabilities in iOS App SIMATIC WinCC Sm@rtClient ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** DFN-CERT-2015-0037 - Red Hat JBoss Data Virtualization: Mehrere Schwachstellen ermöglichen u. a. das Ausführen beliebigen Programmcodes ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0037/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 09-01-2015 18:00 − Montag 12-01-2015 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** SnoopSnitch Android app notifies users of IMSI catchers, SS7 attacks ***
---------------------------------------------
SnoopSnitch requires a rooted device with a Qualcomm chipset that runs stock Android 4.1 or higher.
---------------------------------------------
http://www.scmagazine.com/free-app-flags-attempts-to-spy-on-mobile-phones/a…
*** Cisco WebEx Vulnerabilities ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** SAP NetWeaver Business Client for HTML Input Validation Flaws Permit Cross-Site Scripting Attacks ***
---------------------------------------------
A vulnerability was reported in SAP NetWeaver Business Client for HTML. A remote user can conduct cross-site scripting attacks.
The Business Client for HTML component does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser.
---------------------------------------------
http://www.securitytracker.com/id/1031509
*** PLAID: Die seltsame Welt der ISO-Standards ***
---------------------------------------------
Auf der Real World Crypto berichten Sicherheitsforscher über ihre Erfahrungen mit der ISO. Bei der Standardisierung des Authentifizierungsprotokolls PLAID offenbart sich teilweise eine erschreckende Unkenntnis in Sachen Kryptographie.
---------------------------------------------
http://www.golem.de/news/plaid-die-seltsame-welt-der-iso-standards-1501-111…
*** Dan J. Bernstein: Krypto-Algorithmen sicher designen ***
---------------------------------------------
Der Kryptograph Dan Bernstein fordert auf der Real World Crypto seine Kollegen auf, kryptographische Algorithmen so zu designen, dass ein fehlerhafter Einsatz vermieden wird. Es sei keine gute Idee, immer den Programmierern die Schuld zu geben.
---------------------------------------------
http://www.golem.de/news/dan-j-bernstein-krypto-algorithmen-sicher-designen…
*** Google No Longer Provides Patches for WebView Jelly Bean and Prior ***
---------------------------------------------
Google will no longer be providing security patches for vulnerabilities reported to affect only versions of Android's native WebView prior to 4.4. In other words, Google is now only supporting the current named version of Android (Lollipop, or 5.0) and the prior named version (KitKat, or 4.4). Jelly Bean (versions 4.0 through 4.3) and earlier will no longer see security patches for WebView from Google ...
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2015/01/11/google-no…
*** Securitys revamped index of pain readies for release ***
---------------------------------------------
Comments sought on draft Common Vulnerability Scoring System 3.0 bug rating scheme
The great unwashed has been afforded an opportunity to comment on a new scheme for classifying the severity of infosec vulnerabilities issued by the National Institute of Standards and Technology.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/01/12/securitys_r…
*** Ntpdc Local Buffer Overflow ***
---------------------------------------------
Alejandro Hdez (@nitr0usmx) recently tweeted about a trivial buffer overflow in ntpdc, a deprecated NTP query tool still available and packaged with any NTP install. He posted a screenshot of the crash as the result of a large buffer passed into a vulnerable gets call. After digging into it a bit, I decided it'd be a fun exploit to write, and it was. There are a few quarks to it that make it of particular interest, of which I've detailed below.
---------------------------------------------
http://hatriot.github.io/blog/2015/01/06/ntpdc-exploit/
*** Deciphering the landscape for Privacy by Design. ENISA publishes its recommendations for policy makers, data protection authorities and experts ***
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/deciphering-the-landscape-for-p…
*** Windows Elevation of Privilege in User Profile Service ***
---------------------------------------------
Platform: Windows 8.1 Update 32/64 bit (No other OS tested)
When a user logs into a computer the User Profile Service is used to create certain directories and mount the user hives (as a normal user account cannot do so). ... However there seems to be a bug in the way it handles impersonation, the first few resources in the profile get created under the user's token, but this changes to impersonating Local System part of the way through.
---------------------------------------------
https://code.google.com/p/google-security-research/issues/detail?id=123
*** Do we need regular IT security fire drills? ***
---------------------------------------------
IT security 'fire drills', supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the appropriate course of action in advance of a security breach. ... Organizations need to move beyond focusing purely on the prevention of security incidents, and start to concentrate on what they will do when an incident occurs.
---------------------------------------------
http://www.net-security.org/secworld.php?id=17810
*** Diving into a Silverlight Exploit and Shellcode - Analysis and Techniques ***
---------------------------------------------
http://www.checkpoint.com/downloads/partners/TCC-Silverlight-Jan2015.pdf
*** Open-Source USB Exploitation Library - Teensyduino ***
---------------------------------------------
What is Paensy? Paensy [pan-zee] is a combination of the word payload and Teensy - Paensy is an attacker-oriented, C-based library written for the development of Teensy devices. Paensy simplifies and optimizes mundane tasks and allows an easier platform for scripting.
---------------------------------------------
http://malware.cat/?p=89
*** Protecting yourself from Powershell based VBA Macro Attacks ***
---------------------------------------------
As some of you may know, I released a standalone Powershell script that will automatically generate a malicious VBA macro using different payloads and persistence methods. This can be found here: https://github.com/enigma0x3/Generate-Macro/blob/master/Generate-Macro.ps1 As a response, I have gotten a few questions from sysadmins about protecting their organizations from an attack like this. Since this type of attack relies on social engineering, there are only a handful of things you can do to
---------------------------------------------
https://enigma0x3.wordpress.com/2015/01/11/protecting-yourself-from-powersh…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 08-01-2015 18:00 − Freitag 09-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** AIX for penetration testers (SANS Reading Room) ***
---------------------------------------------
AIX is a widely used operating system by banks, insurance companies, power stations and universities. The operating system handles various sensitive or critical information for these services. There is limited public information for penetration testers about AIX hacking, compared the other common operating systems like Windows or Linux.
---------------------------------------------
https://www.sans.org/reading-room/whitepapers/unix/aix-penetration-testers-…
*** Datenschutzpanne in Mac OS X Yosemite ***
---------------------------------------------
Die Spotlight genannte Suchfunktion der aktuellen Mac-OS-X-Version hat erneut ein Datenschutzproblem: Stößt sie auf HTML-Mails, lädt sie ungefragt Inhalte aus externen Quellen nach - zur Freude der Spammer.
---------------------------------------------
http://www.heise.de/security/meldung/Datenschutzpanne-in-Mac-OS-X-Yosemite-…
*** Netflix Credentials Targeted By Phishing Campaign ***
---------------------------------------------
A new malicious email campaign has been observed by security researchers to target customers of Netflix by feeding them a message purporting to be an important notification from the media streaming service. ... Users are advised to check the legitimacy of the emails straight on the official page of the service and to avoid clicking on the provided link. All phishing messages can be forwarded to phishing(a)netflix.com for investigation.
---------------------------------------------
http://news.softpedia.com/news/Netflix-Credentials-Targeted-By-Phishing-Cam…
*** Microsoft advanced notification service changes. , (Fri, Jan 9th) ***
---------------------------------------------
Quite a few of you have written in to let us know that Microsoft is changing the way in which they provide information (thanks to you all). ">You can read the full blog here --">/archive/2015/01/08/evolving-advance-notification-service-ans-in-2015.aspx In a nutshell if you want to be advised in advance younow need to register, select the products used and you will then be provided with information relating to the patches that will be released. If you are a premier customer your...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19167&rss
*** Banking Trojans Disguised As ICS/SCADA Software Infecting Plants ***
---------------------------------------------
Researcher spots spike in traditional financial malware hitting ICS/SCADA networks -- posing as popular GE, Siemens, and Advantech HMI products. A renowned ICS/SCADA security researcher has discovered a surprising twist in cyberattacks hitting plant floor networks: traditional banking Trojan malware posing as legitimate ICS software updates and files rather than the dreaded nation-state custom malware in the wake of Stuxnet.
---------------------------------------------
http://www.darkreading.com/attacks-breaches/banking-trojans-disguised-as-ic…
*** OpenBSD Releases a Portable Version of OpenNTPD ***
---------------------------------------------
Noryungi (70322) writes Theo De Raadt roundly criticized NTP due to its recent security advisories, and pointed out that OpenBSD OpenNTPD was not vulnerable. However, it also had not been made portable to other OS in a long time. Brent Cook, also known for his work on the portable version of LibreSSL (OpenBSD cleanup and refactoring of OpenSSL) decided to take the matter in his own hands and released a new portable version of OpenNTPD. Everyone rejoice, compile and report issues!
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/NJ1R-3x9MVI/story01.htm
*** No, the Linux leap second bug WONT crash the web ***
---------------------------------------------
Fear the fear, not the second There's a reason space missions don't launch on the day a leap second is added to international clocks.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/01/09/leap_second…
*** Asus-Router schutzlos bei Angriffen aus dem eigenen Netz ***
---------------------------------------------
Mindestens die Router RT-AC66 und RT-N66U können von Angreifern aus dem LAN komplett gekapert werden. Wahrscheinlich sind weitere Modelle betroffen. Firmware-Updates, die das Loch stopfen, gibt es noch nicht.
---------------------------------------------
http://www.heise.de/security/meldung/Asus-Router-schutzlos-bei-Angriffen-au…
*** USN-2456-1: GNU cpio vulnerabilities ***
---------------------------------------------
Ubuntu Security Notice USN-2456-18th January, 2015cpio vulnerabilitiesA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.10 Ubuntu 14.04 LTS Ubuntu 12.04 LTS Ubuntu 10.04 LTSSummaryThe GNU cpio program could be made to crash or run programs if itopened a specially crafted file or received specially crafted input.Software description cpio - a program to manage archives of files DetailsMichal Zalewski discovered an out of bounds write issue in theprocess_copy_in...
---------------------------------------------
http://www.ubuntu.com/usn/usn-2456-1/
*** Cisco Unified Communications Domain Manager Platform High CPU DoS Vulnerability ***
---------------------------------------------
CVE-2014-8020
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco WebEx Meetings Server Authentication Bypass Vulnerability ***
---------------------------------------------
CVE-2014-8033
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** DSA-3122 curl - security update ***
---------------------------------------------
Andrey Labunets of Facebook discovered that cURL, an URL transferlibrary, fails to properly handle URLs with embedded end-of-linecharacters. An attacker able to make an application using libcurl toaccess a specially crafted URL via an HTTP proxy could use this flaw todo additional requests in a way that was not intended, or insertadditional request headers into the request.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3122
*** DSA-3121 file - security update ***
---------------------------------------------
Multiple security issues have been found in file, a tool/library todetermine a file type. Processing a malformed file could result indenial of service. Most of the changes are related to parsing ELFfiles.
---------------------------------------------
https://www.debian.org/security/2015/dsa-3121
*** Emerson HART DTM Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an improper input vulnerability in the CodeWrights HART DTM library utilized in Emerson's HART DTM.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-008-01-0
*** Schneider Electric Wonderware InTouch Access Anywhere Server Buffer Overflow Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a stack-based buffer overflow vulnerability in the Wonderware InTouch Access Anywhere Server product.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-15-008-02
*** TP-Link TL-WR840N Cross Site Request Forgery ***
---------------------------------------------
Topic: TP-Link TL-WR840N Cross Site Request Forgery Risk: Low Text:Classification: //Dell SecureWorks/Confidential - Limited External Distribution: # # * Title: TP-...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010041
*** Wireshark Security Advisories ***
---------------------------------------------
wnpa-sec-2015-05. TLS/SSL decryption crash. Fixed in 1.12.3, 1.10.12. | wnpa-sec-2015-04. SMTP dissector crash. Fixed in 1.12.3, 1.10.12. | wnpa-sec-2015-03. DEC DNA Routing Protocol dissector crash. Fixed in 1.12.3, 1.10.12. | wnpa-sec-2015-02. LPP dissector crash. Fixed in 1.12.3, 1.10.12. | wnpa-sec-2015-01. WCCP dissector crash. Fixed in 1.12.3, 1.10.12.
---------------------------------------------
https://www.wireshark.org/security/
*** Several vulnerabilities have been found in the third party TYPO3 extensions ***
---------------------------------------------
extension "Content Rating": http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e… | extension "Content Rating Extbase": http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-e…
---------------------------------------------
http://typo3.org/teams/security/security-bulletins
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 07-01-2015 18:00 − Donnerstag 08-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Why patch management is ALSO REQUIRED in ICS infrastructure, (Wed, Jan 7th) ***
---------------------------------------------
Security patch management is a delicate issue in critical infrastructure. This is caused for the specific configuration, operating system version and related software required by the ICS platform. Most support contracts states that any modification outside the parameters stated by the manufacturer will void the relation and release manufacturer and seller from any responsibility about malfunction and any consequence on the industrial process. Unfortunately, when we talk about ICS software...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19157&rss
*** Assessing the risk of POODLE, (Thu, Jan 8th) ***
---------------------------------------------
One of the biggest security announcements in the last year was definitely the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability, which marked the real end of SSLv3. In a contrast with many other previously identified vulnerabilities in encryption algorithms used by SSLv3, this vulnerability is viable, and can be exploited by an attacker without jumping over too many obstacles or requiring large resources the POODLE vulnerability is real. While this raised quite a bit of...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19159&rss
*** wmap - A Chrome Extension for Taking Screenshots of Web Services In Bulk ***
---------------------------------------------
wmap is a Chrome extension written mostly in JavaScript which uses the Chrome browser to generate HTML screenshot reports of web services.
---------------------------------------------
http://thehackerblog.com/wmap-a-chrome-extension-for-taking-screenshots-of-…
*** B-Sides Ljubljana ***
---------------------------------------------
First Security B-Sides Ljubljana is about to *happen*. BSides is community driven information security conference that will be held March 12th in Ljubljana, Slovenia, day after Cloud Security Alliance CEE Summit 2015. Call for papers is now online.
---------------------------------------------
http://bsidesljubljana.si/
*** Bypassing OpenSSL Certificate Pinning in iOS Apps ***
---------------------------------------------
When mobile applications communicate with an API or web service, this should generally happen via TLS/SSL (e.g., HTTPS). ... Since any of the CAs may issue a certificate for any hostname/server, security-conscious applications should "pin" the expected server certificate in the application, i.e., not accept any certificate but the one issued by the known-good CA which the application developer uses.
---------------------------------------------
http://chargen.matasano.com/chargen/2015/1/6/bypassing-openssl-certificate-…
*** PowerShell Toolkit: PowerSploit ***
---------------------------------------------
PowerSploit is a collection of PowerShell scripts which can prove to be very useful during some exploitation and mostly post-exploitation phases of a penetration test. To get the latest version of PowerSploit, visit this URL: https://github.com/mattifestation/PowerSploit If you have GIT, then you can simply run the following command to get...
---------------------------------------------
http://resources.infosecinstitute.com/powershell-toolkit-powersploit/
*** Using Free Tools To Detect Attacks On ICS/SCADA Networks ***
---------------------------------------------
ICS/SCADA experts say open-source network security monitoring software is a simple and cheap way to catch hackers targeting plant operations.
---------------------------------------------
http://www.darkreading.com/perimeter/using-free-tools-to-detect-attacks-on-…
*** State of the Internet: Attack traffic, DDoS, IPv4 and IPv6 ***
---------------------------------------------
Akamai today released its latest State of the Internet report, which provides insight into key global statistics such as connection speeds and broadband adoption across fixed and mobile networks, over...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17798
*** Windows exploitation in 2014 ***
---------------------------------------------
Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.
---------------------------------------------
http://www.welivesecurity.com/2015/01/08/windows-exploitation-2014/
*** Netskope Cloud Report - January 2015 ***
---------------------------------------------
In this quarterly Netskope Cloud Report, a key find in that as many as 15 percent of business users have had their credentials compromised. Since up to half of users re-use passwords for multiple accounts, the likelihood of users logging into business-critical apps with these credentials is high, putting business-sensitive data at risk.
---------------------------------------------
https://www.netskope.com/reports/netskope-cloud-report-january-2015/
*** Deobfuscating Malicious Macros Using Python ***
---------------------------------------------
Over the past few weeks, weve observed cybercriminals spamming users, particularly in the UK, using document files embedded with malicious macros masquerading as invoices. The attachment is either a Word or an Excel document file. Here are some examples incorporating brands based in the UK: Users must enable macros in order for these malicious documents to work. In some cases, the documents include instructions for enabling macros. You may think of document macro viruses as a thing...
---------------------------------------------
http://blog.spiderlabs.com/2015/01/tips-for-deobfuscating-the-malicious-mac…
*** vBulletin Releases Serious Vulnerability in VBSEO ***
---------------------------------------------
The vBulletin team sent an email yesterday to all their clients about a potential security vulnerability on VBSEO. VBSEO is widely used SEO module for vBulletin that was discontinued last year. This makes the problem worse, no patches will be released for it. If you are using VBSEO, you have 3 options: Completely remove VBSEO...
---------------------------------------------
http://blog.sucuri.net/2015/01/serious-vulnerability-on-vbseo.html
*** Aviator Going Open Source ***
---------------------------------------------
One of the most frequent criticisms we've heard at WhiteHat Security about Aviator is that it's not open source. There were a great many reasons why we didn't start off that way, not the least of which was getting the legal framework in place to allow it, but we also didn't want our efforts to...
---------------------------------------------
https://blog.whitehatsec.com/aviator-going-open-source/
*** Evolving Microsofts Advance Notification Service in 2015 ***
---------------------------------------------
Our Advance Notification Service (ANS) was created more than a decade ago as part of Update Tuesday to broadly communicate in advance, about the security updates being released for Microsoft products and services each month. Over the years, technology environments and customer needs have evolved, prompting us to evaluate our existing information and distribution channels. This desire to improve is why customers may have seen us introduce myBulletins to provide bulletin reports tailored to...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2015/01/07/evolving-advance-notific…
*** OpenSSL Fixes Eight Security Vulnerabilities ***
---------------------------------------------
The OpenSSL Project has released several new versions of the software that fix eight security vulnerabilities, including several certificate issues and a couple of denial-of-service flaws. The patches included in OpenSSL 1.0.0p, 1.0.1k and 0.98zd are not for critical or high-risk vulnerabilities, but they do fix some interesting vulnerabilities. Two of the bugs are rated moderate and the other...
---------------------------------------------
http://threatpost.com/openssl-fixes-eight-security-vulnerabilities/110279https://www.openssl.org/news/secadv_20150108.txt
*** Cisco Secure Access Control Server Privilege Escalation Vulnerability ***
---------------------------------------------
CVE-2014-8027
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Secure Access Control Server Multiple Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
CVE-2014-8028
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Secure Access Control Server Open Redirect Vulnerability ***
---------------------------------------------
CVE-2014-8029
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Brother MFC-J4410DW Cross Site Scripting ***
---------------------------------------------
Topic: Brother MFC-J4410DW Cross Site Scripting Risk: Low Text:Class Cross-Site Scripting Remote Yes Disclosed 9th October 2014 Published 7th January 2015 Credit Dave Daly of Dionach (vu...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010034
*** Pirelli Router WPA weak security ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99682
*** SA-CONTRIB-2015-010 - Log Watcher - Cross Site Request Forgery (CSRF) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-010Project: Log Watcher (third-party module)Version: 6.xDate: 2015-January-07Security risk: 13/25 ( Moderately Critical) AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site Request ForgeryDescriptionLog Watcher allows you to monitor your site logs in a systematic way by setting up scheduled aggregations for specific log types.The report administration links are not properly protected from CSRF. A malicious user could cause a log
---------------------------------------------
https://www.drupal.org/node/2403463
*** SA-CONTRIB-2015-007 - Htaccess - Cross Site Request Forgery (CSRF) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-007Project: htaccess (third-party module)Version: 7.xDate: 2015-January-07Security risk: 16/25 ( Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site Request ForgeryDescriptionThe Htaccess module allows the creation and deployment of .htaccess files based on custom settings.Some administration links were not properly protected from Cross Site Request Forgery (CSRF). A malicious user could cause an administrator to deploy or
---------------------------------------------
https://www.drupal.org/node/2403445
*** SA-CONTRIB-2015-005 - WikiWiki - SQL injection ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2015-005Project: WikiWiki (third-party module)Version: 6.xDate: 2015-January-07Security risk: 22/25 ( Highly Critical) AC:None/A:None/CI:All/II:All/E:Theoretical/TD:AllVulnerability: SQL InjectionDescriptionWikiWiki module gives you one place to create, share and find wiki pages in your site.The module did not sanitize user input inside a database query thereby leading to a SQL Injection vulnerability.CVE identifier(s) issuedA CVE identifier will be requested, and
---------------------------------------------
https://www.drupal.org/node/2403375
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 05-01-2015 18:00 − Mittwoch 07-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Debunking Myths Around Industrial Control Systems Cybersecurity ***
---------------------------------------------
General awareness for the need to improve cybersecurity in industrial control systems (ICS) has increased significantly in recent years, but there are still plenty of misconceptions. A recent incident that can be used to highlight...
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/01/debunking-myths-around-i…
*** Who's Attacking Whom? Realtime Attack Trackers ***
---------------------------------------------
It seems nearly every day were reading about Internet attacks aimed at knocking sites offline and breaking into networks, but its often difficult to visualize this type of activity. In this post, well take a look at multiple services for tracking online attacks and attackers around the globe and in real-time.
---------------------------------------------
http://feedproxy.google.com/~r/KrebsOnSecurity/~3/qZhz3RO9frg/
*** l+f: SSH mit Alu-Hut ***
---------------------------------------------
Wer der NSA das Leben schwer machen will, kann das Fernwartungsprotokoll mit einigen Handgriffen auf der Kommandozeile abhärten.
---------------------------------------------
http://www.heise.de/security/meldung/l-f-SSH-mit-Alu-Hut-2512471.html
*** Inside Cryptowall 2.0 Ransomware ***
---------------------------------------------
An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.
---------------------------------------------
http://threatpost.com/inside-cryptowall-2-0-ransomware/110228
*** New Variant of Emotet Banking Malware targets German Users ***
---------------------------------------------
A new Spam email campaign making the rounds in Germany are delivering a new variant of a powerful banking malware, a financial threat designed to steal users' online banking credentials, according to security researchers from Microsoft. The malware, identified as Emotet, was first spotted last June by security vendors at Trend Micro. The most standout features of Emotet is its network...
---------------------------------------------
http://thehackernews.com/2015/01/emotet-banking-malware.html
*** Linux DDoS Trojan hiding itself with an embedded rootkit ***
---------------------------------------------
At the end of September 2014, a new threat for the Linux operating system dubbed XOR.DDoS forming a botnet for distributed denial-of-service attacks was reported ... In this blog post, we will describe the installation steps, the rootkit itself, and the communication protocol for getting attack commands.
---------------------------------------------
https://blog.avast.com/2015/01/06/linux-ddos-trojan-hiding-itself-with-an-e…
*** AOL Advertising Network Abused to Distribute Malware ***
---------------------------------------------
Security researchers have uncovered a malvertising campaign used to distribute malware to visitors of The Huffington Post website, as well as several other sites, through malicious advertisements served over the AOL advertising network. At the end of last year, Cyphort Labs, security firm specialized in detecting malware threats, came across some malicious advertisements that were being
---------------------------------------------
http://thehackernews.com/2015/01/aol-advertising-network-abused-to_6.html
*** SPARTA - Network Infrastructure Penetration Testing Tool ***
---------------------------------------------
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way. If little time is spent setting up commands and tools, more time can be spent focusing on analysing results.
---------------------------------------------
http://hack-tools.blackploit.com/2015/01/sparta-network-infrastructure.html
*** Malformed AndroidManifest.xml in Apps Can Crash Mobile Devices ***
---------------------------------------------
Every Android app comprises of several components, including something called the AndroidManifest.xml file or the manifest file. This manifest file contains essential information for apps, "information the system must have before it can run any of the app's code." We came across a vulnerability related to the manifest file that may cause an affected device...
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/malformed-androi…
*** Interview with NYU-Poly's Professor Justin Cappos: Security Lessons From Retail Breaches ***
---------------------------------------------
In our discussion, Professor Cappos has a lot to say about weaknesses with our current approach to password-based security as well as new technologies that can be applied to credit card transactions. ... Cappos offers some very practical advice on securing systems.
---------------------------------------------
http://blog.varonis.com/conversation-nyu-polys-professor-justin-cappos-data…
*** Is now the time to deploy embedded hypervisors for BYOD security? ***
---------------------------------------------
The operating systems deployed on smartphones and tables, such as Apple IOS or Google Android, are designed as single-user platforms that dont offer much of the security or virtualization technology ... There are a number of approaches that seem viable to address the challenge including the following: ... Making enterprise or personal applications execute in a virtual machine that could either have sharply curtailed access to the device and the data it contains
---------------------------------------------
http://www.zdnet.com/article/is-now-the-time-to-deploy-embedded-hypervisors…
*** Spam Nation, book review: Inside todays cybercrime ecosystem ***
---------------------------------------------
In Spam Nation, Krebs tells the tale of the Pharma Wars, in which duelling Russian spam kings squabble over territory, hacking each others systems, paying police to investigate each other. The even larger story is the economic conditions that fuel all this. Who clicks on these ads?
---------------------------------------------
http://www.zdnet.com/article/spam-nation-book-review-inside-todays-cybercri…
*** Twitter AnomalyDetection tool goes open source ***
---------------------------------------------
Twitter has opened up suspicious activity tracker AnomalyDetection to developers. The social media giant said on Tuesday the tool, dubbed AnomalyDetection, is used by the firms team to detect unusual traffic events including traffic spikes and surges, as well as the presence of spam bots.
---------------------------------------------
http://www.zdnet.com/article/twitter-anomalydetection-tool-goes-open-source/
*** CVE-2014-7911 - A Deep Dive Analysis of Android System Service Vulnerability and Exploitation ***
---------------------------------------------
In this post we discuss CVE-2014-7911 and the various techniques that can be used to achieve privilege escalation. We also examine how some of these techniques can be blocked using several security mechanisms.
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2015/01/cve-2014-7911-deep-dive-…
*** The Connections Between MiniDuke, CosmicDuke and OnionDuke ***
---------------------------------------------
In September, we blogged about CosmicDuke leveraging timely, political topics to deceive the recipient into opening the malicious document. After a more detailed analysis of the files we made two major discoveries.
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002780.html
*** DNS-Blacklist AHBL stellt Betrieb ein ***
---------------------------------------------
Die DNS-Blacklist Abusive Hosts Blocking List (AHBL) stellt ihre Dienste endgültig ein. Wer sie befragt, erhält grundsätzlich einen Treffer als Antwort. Administratoren von Mailservern müssen jetzt handeln.
---------------------------------------------
http://www.heise.de/newsticker/meldung/DNS-Blacklist-AHBL-stellt-Betrieb-ei…
*** US-Cert warnt vor weiteren UEFI-BIOS-Lücken ***
---------------------------------------------
Durch neue Lücken kann man die Schutzmechanismen abermals austricksen. Angreifer könnten so tief im System ein Bootkit verankern, dem kein Virenscanner etwas anhaben kann. Wieder sollen BIOS-Updates helfen.
---------------------------------------------
http://www.heise.de/security/meldung/US-Cert-warnt-vor-weiteren-UEFI-BIOS-L…
*** JSA10663 - Out of Cycle Security Bulletin: Multiple vulnerabilities in NTP ***
---------------------------------------------
Product Affected: Junos OS, NSM Series devices, NSMXpress and NSM server software. | Problem: NTP.org has published a security advisory for six vulnerabilities resolved in ntpd (NTP daemon) that have been assigned four CVE IDs. In the worst case, some of these issues may allow remote unauthenticated attackers to execute code with the privileges of ntpd or cause a denial of service condition.
---------------------------------------------
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10663
*** Open-Xchange XHTML File Input Validation Flaw Permits Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1031488
*** Mantis BugTracker 1.2.17 XSS / DoS / Redirect ***
---------------------------------------------
Topic: Mantis BugTracker 1.2.17 XSS / DoS / Redirect Risk: Medium Text:Mantis BugTracker 1.2.17 multiple security vulnerabilities. ****************************************************************...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010024
*** Open-Xchange Server 6 / OX AppSuite 7.6.1 Cross Site Scripting ***
---------------------------------------------
Topic: Open-Xchange Server 6 / OX AppSuite 7.6.1 Cross Site Scripting Risk: Low Text:Product: Open-Xchange Server 6 / OX AppSuite Vendor: Open-Xchange GmbH Internal reference: 35512 (Bug ID) Vulnerability ty...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010020
*** DFN-CERT-2015-0005/ - ISC BIND: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ***
---------------------------------------------
Eine Schwachstelle in BIND ermöglicht einem entfernten, nicht authentifizierten Angreifer einen Denial-of-Service-Zustand zu bewirken. Die Schwachstelle wird mit einem Update auf Version 9.9.6P1 für die SUSE Linux Enterprise 11 SP3 Produkte Software Development Kit, Server, Server für VMware und Desktop behoben.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0005/
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM QRadar SIEM (CVE-2014-3567, CVE-2014-3568, CVE-2014-3508, CVE-2014-3511) ***
---------------------------------------------
OpenSSL vulnerabilities were disclosed on October 15, 2014 by the OpenSSL Project. OpenSSL is used by IBM QRadar SIEM. IBM QRadar SIEM has addressed the applicable CVEs. CVE(s): CVE-2014-3567 , CVE-2014-3568 , CVE-2014-3511 and CVE-2014-3508 ...
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21691210
*** IBM Security Bulletin: Connect:Enterprise For UNIX and Connect:Enterprise clients are affected by the POODLE and OpenSSL vulnerabilities (CVE-2014-3566, CVE-2014-3567) ***
---------------------------------------------
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in Connect:Enterprise For UNIX, Connect:Enterprise Command Line Client, Connect:Enterprise HTTP Option, and...
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21690537
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM InfoSphere Master Data Management (CVE-2014-3511, CVE-2014-3507, CVE-2014-3506, CVE-2014-3505 ) ***
---------------------------------------------
OpenSSL vulnerabilities were disclosed on August 6th, 2014 by the OpenSSL Project. OpenSSL is used by IBM InfoSphere Master Data Management. IBM InfoSphere Master Data Management has addressed the applicable CVEs provided by OpenSSL. CVE(s):...
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21691162
*** EMC Documentum Web Development Kit cross-site scripting ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99632
*** EMC Documentum Web Development Kit weak security ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99636
*** Apache Traffic Server HttpTransact Boundary Flaw Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1031499
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Operational Decision Manager, WebSphere ILOG JRules and WebSphere Business Events (CVE-2014-6506, CVE-2014-6511, CVE-2014-6457, CVE-2014-6558, CVE-2014-3065) ***
---------------------------------------------
There are multiple vulnerabilities in IBM® SDK Java™ Technology Edition, Version 6 and 7 that is used by IBM Operational Decision Manager (ODM), IBM ILOG JRules and IBM WebSphere Business Events (WBE). These issues were disclosed as part of the IBM...
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21693686
*** DFN-CERT-2015-0012 - Xen: Eine Schwachstelle ermöglicht einen Denial-of-Service-Angriff ***
---------------------------------------------
Eine Use-after-Free-Schwachstelle in Xen ermöglicht einem lokalen, nicht authentifizierten Angreifer Denial-of-Service-Angriffe durchzuführen.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0012/
*** DFN-CERT-2015-0013 - Exiv2: Eine Schwachstelle ermöglicht Denial-of-Service-Angriffe ***
---------------------------------------------
Ein entfernter, nicht authentisierter Angreifer kann durch einen langen 'IKEY INFO Tag' Wert in einer AVI-Datei einen Absturz der Anwendung verursachen.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2015-0013/
*** ZDI-15-006: ManageEngine Desktop Central MSP StatusUpdateServlet fileName File Upload Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ManageEngine Desktop Central MSP. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-15-006/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 02-01-2015 18:00 − Montag 05-01-2015 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Before you enable those macros... ***
---------------------------------------------
The Microsoft Malware Protection Center (MMPC) has recently seen an increasing number of threats using macros to spread their malicious code. This technique uses spam emails and social engineering to infect a system. Using macros in Microsoft Office can help increase productivity by automating some processes. However, malware authors have also exploited these capabilities. Since Microsoft set the default setting to "Disable all macros with notification", the number of macro-related...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2015/01/02/before-you-enable-those-…
*** OpenSSL Cookbook ***
---------------------------------------------
A short book that covers the most frequently used OpenSSL features and commands, by Ivan Ristić. OpenSSL Cookbook is a free ebook built around one chapter from Bulletproof SSL and TLS, a larger work that teaches how to deploy secure servers and web applications.
---------------------------------------------
https://www.feistyduck.com/books/openssl-cookbook/
*** Defensible network architecture, (Mon, Jan 5th) ***
---------------------------------------------
For the nearly 20 years since Zwicky, Cooper and Chapman first wrote about Firewalls the firewall has been the primary defense mechanism of nearly every entity attached to the Internet. While perimeter protection is still important in the modern enterprise, the fact is that the nature of Internet business has vastly changed and the crunchy perimeter and squishy inside approach has long since become outdated. You can two aspects of your business model that you cannot do without and which can give...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19141&rss
*** Snooker WPA secrets with this WiFi tool ***
---------------------------------------------
Jammed and canned Crypto geek George Chatzisofroniou has published a WiFi social engineering tool used to steal credentials and credit cards from users of secure wireless networks.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2015/01/05/snooker_wpa…
*** Hard disk hacking ***
---------------------------------------------
... Research like this has been done before for various bits of hardware: from PCI extension cards to embedded controllers in laptops to even Apple keyboards. Usually the research has been done in order to prove the hackability of these devices can lead to compromised software, so I decided to take the same approach: for this hack, I wanted to make a hard disk that could bypass software security.
---------------------------------------------
http://spritesmods.com/?art=hddhack&page=1
*** Sicherheitslücke: Bitcoinbörse Bitstamp stellt vorerst Betrieb ein ***
---------------------------------------------
Schon wieder eine Bitcoinbörse gehackt? Der Anbieter Bitstamp ist wegen einer kompromittierten Wallet fürs erste offline gegangen. Nutzer sollten keinesfalls Coins auf alte Einzahladressen überweisen.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-Bitcoinboerse-Bitsta…
*** Several Electronic Arts Origin accounts hacked ***
---------------------------------------------
Many gamers are finding purchases that they never made their accounts for Electronic Arts Origin service. Once again the gaming industry under attack.
---------------------------------------------
http://securityaffairs.co/wordpress/31799/cyber-crime/electronic-arts-origi…
*** Active Directory Recycle Bin: What is it, and how can I use it? ***
---------------------------------------------
Remember the Windows 95 Recycle Bin? It was a big leap forward to recovering "deleted" files. Well, it turns out that Active Directory has it's own Recycle Bin for users, groups and computers, and it's called... wait for it.. the Active Directory Recycle Bin. Here's the good news about the Active Directory Recycle bin:...
---------------------------------------------
http://blog.beyondtrust.com/active-directory-recycle-bin-what-is-it-and-how…
*** Openwall 3.1 Released With Fixes for Shellshock, POODLE Attack ***
---------------------------------------------
The maintainers of the Openwall security enhanced Linux distribution have released a new stable version, which includes fixes for a number of serious vulnerabilities, such as the Shellshock Bash bug and the flaw in SSLv3 that leads to the POODLE attack. Openwall is designed to be a small, compact Linux distribution for servers, appliances and...
---------------------------------------------
http://threatpost.com/openwall-3-1-released-with-fixes-for-shellshock-poodl…
*** ASUSWRT 3.0.0.4.376_1071 LAN Backdoor Command Execution ***
---------------------------------------------
Topic: ASUSWRT 3.0.0.4.376_1071 LAN Backdoor Command Execution Risk: High Text:#!/usr/bin/env python3 # Exploit Title: ASUSWRT 3.0.0.4.376_1071 LAN Backdoor Command Execution # Date: 2014-10-11 # Vend...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2015010009
*** USN-2450-1: strongSwan vulnerability ***
---------------------------------------------
Ubuntu Security Notice USN-2450-15th January, 2015 | strongswan vulnerability | A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.10 Ubuntu 14.04 LTS | Summary | strongSwan could be made to crash or run programs if it received specially crafted network traffic. | Software description | strongswan - IPsec VPN solution | Details | Mike Daskalakis discovered that strongSwan incorrectly handled IKEv2payloads that contained the Diffie-Hellman group 1025. A remote attackercould use this...
---------------------------------------------
http://www.ubuntu.com/usn/usn-2450-1/
*** VU#976132: Some UEFI systems do not properly secure the EFI S3 Resume Boot Path boot script ***
---------------------------------------------
Vulnerability Note VU#976132 Some UEFI systems do not properly secure the EFI S3 Resume Boot Path boot script Original Release date: 05 Jan 2015 | Last revised: 05 Jan 2015 Overview Some UEFI systems fail to properly restrict access to the boot script used by the EFI S3 Resume Boot Path, allowing an authenticated, local attacker to bypass various firmware write protections. Description According to Rafal Wojtczuk and Corey Kallenberg of The MITRE Corporation:"During the UEFI S3 Resume...
---------------------------------------------
http://www.kb.cert.org/vuls/id/976132
*** VU#766164: Intel BIOS locking mechanism contains race condition that enables write protection bypass ***
---------------------------------------------
Vulnerability Note VU#766164 Intel BIOS locking mechanism contains race condition that enables write protection bypass Original Release date: 05 Jan 2015 | Last revised: 05 Jan 2015 Overview A race condition exists in Intel chipsets that rely solely on the BIOS_CNTL.BIOSWE and BIOS_CNTL.BLE bits as a BIOS write locking mechanism. Successful exploitation of this vulnerability may result in a bypass of this locking mechanism. Description CWE-362: Concurrent Execution using Shared Resource with...
---------------------------------------------
http://www.kb.cert.org/vuls/id/766164
*** VU#533140: UEFI EDK1 vulnerable to buffer overflow ***
---------------------------------------------
Vulnerability Note VU#533140 UEFI EDK1 vulnerable to buffer overflow Original Release date: 05 Jan 2015 | Last revised: 05 Jan 2015 Overview The EDK1 UEFI reference implementation contains a buffer overflow vulnerability. Description The open source EDK1 project provides a reference implementation of the Unified Extensible Firmware Interface (UEFI). Commercial UEFI implementations may incorporate portions of the EDK1 source code.According to Rafal Wojtczuk and Corey Kallenberg, a buffer...
---------------------------------------------
http://www.kb.cert.org/vuls/id/533140
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 30-12-2014 18:00 − Freitag 02-01-2015 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** Miss a talk from the 31st CCC this year? No worries - theyre all already available online. (Reddit) ***
---------------------------------------------
http://www.reddit.com/r/netsec/comments/2qvuog/miss_a_talk_from_the_31st_cc…
*** Wordpress 4.1 XSS & CSRF Web Vulnerability ***
---------------------------------------------
The Hackyard Security Group Researcher-Team leaded by 0x0A discovered a cross site request forgery issue and a cross site vulnerability in the Wordpress 4.1
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120203
*** Log Analysis for Web Attacks: A Beginner's Guide ***
---------------------------------------------
It is often the case that web applications face suspicious activities due to various reasons, such as a kid scanning a website using an automated vulnerability scanner or a person trying to fuzz a parameter for SQL Injection, etc. In many such cases, logs on the webserver have to the webserver have to be analyzed to figure out what is going on. If it is a serious case, it may require a forensic investigation.
Apart from this, there are other scenarios as well.
---------------------------------------------
http://resources.infosecinstitute.com/log-analysis-web-attacks-beginners-gu…
*** Google Researcher Publishes Unpatched Windows 8.1 Security Vulnerability ***
---------------------------------------------
An anonymous reader writes "Googles security research database has after a 90 day timeout automatically undisclosed a Windows 8.1 vulnerability which Microsoft hasnt yet patched. By design the system call NtApphelpCacheControl() in ahcache.sys allows application compatibility data to be cached for quick reuse when new processes are created. A normal user can query the cache but cannot add new cached entries as the operation is restricted to administrators. This is checked in the function
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/Q5qBW3crGPY/story01.htm
*** 2014 Website Defacements ***
---------------------------------------------
Defacements are the most visual and obvious hack that a website can suffer from. They also come parcelled with their own exquisite sense of dread. Nothing gives that gut-wrenching feeling of "I've been hacked" more than seeing this: Most malware that we see on a daily basis is driven by some desire to profit offRead More
---------------------------------------------
http://blog.sucuri.net/2015/01/website-hacks-defacements-2014.html
*** Spamhaus Botnet Summary 2014 ***
---------------------------------------------
As 2014 ends, Spamhaus reviews the botnet threats that it detected in the past year, and provides facts and useful suggestions for ISPs and web hosts on the front lines of the battle against cybercrime. To nobodys surprise, botnet activity appears to be increasing. The majority of detected botnets are targeted at obtaining and exploiting banking and financial information. Botnet controllers (C&Cs) are hosted disproportionately on ISPs with understaffed abuse departments, inadequate abuse
---------------------------------------------
http://www.spamhaus.org/news/article/720/spamhaus-botnet-summary-2014
*** Phil Zimmerman (PGP), Ladar Levison (Lavabit), & Team release Secure Email Protocol DIME ***
---------------------------------------------
Full specs here: https://darkmail.info/downloads/dark-internet-mail-environment-december-201… (PDF)
Full source code (libraries) here: https://github.com/lavabit/
Website: http://darkmail.info/
---------------------------------------------
http://www.reddit.com/r/netsec/comments/2qu2er/phil_zimmerman_pgp_ladar_lev…
*** Trojan-horse hardware - a student prank demonstrates how easy it is to substitute a PIC for a dumb logic chip (Reddit) ***
---------------------------------------------
http://www.reddit.com/r/netsec/comments/2r3cfs/trojanhorse_hardware_a_stude…
*** Introduction to RFID Security ***
---------------------------------------------
The main problem with RFID is related to its frequency. Someone with specific tools and enough knowledge on RFID (including complete documentation) could analyze the working frequency of an RFID tag and then decode the data or perform an attack such as cloning the RFID or doing a Denial-of-Service attack.
---------------------------------------------
http://resources.infosecinstitute.com/introduction-rfid-security/
*** Hackers claim theyve found a frighteningly easy way to hack your iCloud account (Yahoo Security) ***
---------------------------------------------
... a hacker known as Pr0x13 has released a tool called iDict on GitHub that is capable of bypassing restrictions and authentication on any iCloud account, potentially giving hackers unfettered access to iOS devices.
---------------------------------------------
http://news.yahoo.com/hackers-claim-ve-found-frighteningly-easy-way-hack-15…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 29-12-2014 18:00 − Dienstag 30-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Can malware and hackers really cause giant physical disasters? ***
---------------------------------------------
Could you really have a hacker or malware initiated meltdown? Yes, says the 2014 report of the German Office for Information Security...
---------------------------------------------
https://nakedsecurity.sophos.com/2014/12/29/can-malware-and-hackers-really-…
*** Will 2015 be the year we finally do something about DDoS? ***
---------------------------------------------
Among the events of the past few days during the holidays was a DDoS attack on Sonys Playstation network and on Xbox Lives network. The attack was reportedly carried out by a group called Lizard Squad and by all measures is not ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19127
*** WhyDoWork AdSense 1.2 - XSS and CSRF ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7733
*** Open Season on VNC Servers Around the World ***
---------------------------------------------
VNC, or Virtual Network Computing, is a way to control computers remotely across a network. Often times computers running VNC servers are on internal networks with firewalls protecting them from outside users. No one wants a malicious user to remotely connect to their computer and have their way with their computer, right?
---------------------------------------------
https://medium.com/@kylestev/open-season-on-vnc-servers-around-the-world-4b…
*** Stallman: Freie Software ist die Basis für IT-Sicherheit ***
---------------------------------------------
Der Vater der Freien-Software-Gemeinde, Richard Stallman, hat auf dem 31C3 freie Software zum 'notwendigen Fundament der Cybersicherheit' erklärt. Proprietäre Programme entwickelten sich immer mehr zu Malware.
---------------------------------------------
http://www.heise.de/security/meldung/Stallman-Freie-Software-ist-die-Basis-…
*** Expect more ransomware and extortionware in 2015 ***
---------------------------------------------
While we can expect to see the return of some of the issues we faced in 2014, there are still a number of new threats that we need to be aware of in the year to come.
---------------------------------------------
http://www.scmagazine.com/expect-more-ransomware-and-extortionware-in-2015/…
*** 31C3: Wie man ein Chemiewerk hackt ***
---------------------------------------------
Die Sicherheit von Industrieanlagen wird oft beschworen, die Praxis lässt aber viel zu wünschen übrig. Beim CCC-Congress in Hamburg zeigten Hacker, wie man Industrieanlagen lahmlegen und Millionenschäden verursachen kann.
---------------------------------------------
http://www.heise.de/security/meldung/31C3-Wie-man-ein-Chemiewerk-hackt-2507…
*** Researchers Find 64-bit Version of Havex RAT ***
---------------------------------------------
Trend Micro researchers have come across a 64-bit version of Havex, a remote access tool that has been used in cyber espionage campaigns aimed at industrial control systems.
---------------------------------------------
http://www.securityweek.com/researchers-find-64-bit-version-havex-rat
*** Save Our Souls (SOS) ***
---------------------------------------------
Natural disasters are unexpected events that can cause severe financial and environmental loss as well as the loss of human life. As an enterprise, it is our responsibility to ensure that proper recovery strategies are in place, just ..
---------------------------------------------
http://resources.infosecinstitute.com/save-souls-sos/
*** Sicherheit: BKA schaltet Botnetz mit tausenden Rechnern ab ***
---------------------------------------------
Mehr als die Hälfte der Rechner eines vom BKA zerschlagenen Botnetzes sollen in Deutschland gestanden haben. In Zusammenarbeit mit dem BSI, dem Fraunhofer Institut und Antivirenherstellern wurden die betroffenen Nutzer informiert.
---------------------------------------------
http://www.golem.de/news/sicherheit-bka-schaltet-botnetz-mit-tausenden-rech…
*** 4G Security: Hacking USB Modem and SIM Card via SMS ***
---------------------------------------------
Telecommunications operators are pushing fast and cheap 4G communications technology. Yet only the chosen few know just how insecure it is. While researching the security level of 4G communications, Positive Technologies experts managed to uncover USB modem vulnerabilities that allow a potential attacker to gain full control of the connected computer as ..
---------------------------------------------
http://blog.ptsecurity.com/2014/12/4g-security-hacking-usb-modem-and-sim.ht…
Next End-of-Shift report on 2015-01-02
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 23-12-2014 18:00 − Montag 29-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** DSA-3110 mediawiki - security update ***
---------------------------------------------
A flaw was discovered in mediawiki, a wiki engine: thumb.php outputswikitext messages as raw HTML, potentially leading to cross-sitescripting (XSS).
---------------------------------------------
https://www.debian.org/security/2014/dsa-3110
*** Multiple vulnerabilities in Info-ZIP UnZip ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99371http://xforce.iss.net/xforce/xfdb/99373http://xforce.iss.net/xforce/xfdb/99372
*** Evolution of Banking Malwares ***
---------------------------------------------
Why are malware authors so interested in banking malware? Simply because this is where the money is! Nowadays, banking malware, specifically banking Trojans, are reaching alarming new levels of sophistication. Each day, new names ..
---------------------------------------------
http://resources.infosecinstitute.com/evolution-banking-malwares-part-1/http://resources.infosecinstitute.com/evolution-banking-malwares-part-2/
*** New Malware Campaign - WPcache-Blogger - Affects Thousands more WordPress Websites via RevSlider ***
---------------------------------------------
If SoakSoak wasn't enough, we are starting to see a new malware campaign leveraging the RevSlider vulnerability and compromising thousands of WordPress sites in the last few days.
---------------------------------------------
http://blog.sucuri.net/2014/12/new-malware-campaign-wpcache-blogger-affects…
*** IBM Security AppScan Enterprise Bugs Let Remote Users Conduct Cross-Site Scrpting Attacks and Gain Full Control of the Target System ***
---------------------------------------------
Several vulnerabilities were reported in IBM Security AppScan Enterprise. A remote user can execute arbitrary code on the target system. A remote authenticated user can execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks.
---------------------------------------------
http://www.securitytracker.com/id/1031427
*** Multiple vulnerabilities in IPCop ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99397http://xforce.iss.net/xforce/xfdb/99396http://xforce.iss.net/xforce/xfdb/99398
*** ICANN: Phishing-Angriff keine Gefahr für die Rootzone ***
---------------------------------------------
Von dem in der vergangenen Woche bekannt gewordenen Phishing-Angriff auf die ICANN ging keine Gefahr für die Sicherheit der Rootzone aus, versichert die Internetverwaltung. Dennoch könnte der Vorfall der ICANN politisch schaden.
---------------------------------------------
http://www.heise.de/security/meldung/ICANN-Phishing-Angriff-keine-Gefahr-fu…
*** ISC.org website hacked: Scan your PC for malware if you stopped by ***
---------------------------------------------
Cryptographically signed BIND, DHCP code safe, were told The website for the Internet Systems Consortium, which develops the BIND DNS and ISC DHCP tools and runs some DNS root servers, has been hacked.
---------------------------------------------
http://www.theregister.co.uk/2014/12/26/isc_org_hacked/
*** Vawtrak challenges almighty ZeuS as king of the botnets (The Register) ***
---------------------------------------------
Crooks behind Vawtrak, a dangerous banking Trojan, are ramping up its reach and sophistication, security firms have warned. Vawtrak currently ..
---------------------------------------------
http://www.theregister.co.uk/2014/12/27/vawtrak_challenges_almighty_zeus_as…
*** Online-Banking und SS7-Hack: SMS-TANs sind unsicher ***
---------------------------------------------
Gleich drei Vorträge am ersten Tag des jährlichen Chaos-Kongresses widmen sich Hacks rund um Mobilfunkstandards. Bereits jetzt ist klar: Sicherheitsanwendungen, die auf SMS setzen, werden unbrauchbar. Der gute alte TAN-Zettel aus Papier dürfte mehr Sicherheit bieten.
---------------------------------------------
http://www.golem.de/news/online-banking-und-ss7-hack-sms-tans-sind-unsicher…
*** Wieso ein Foto ausreicht, um Fingerabdruckscanner auszutricksen ***
---------------------------------------------
Wissenschaftler verwendeten Foto von Händen der deutschen Verteidigungsministerin um Fingerabdruck-Attrappe zu erstellen
---------------------------------------------
http://derstandard.at/2000009814288
*** Honey Pot Entertainment - SSH, (Sat, Dec 27th) ***
---------------------------------------------
The Christmas period is a nice time to play with some honeypots and share some of the info they have been collecting. Currently I only have two functioning, both of them are located in the US. Each receives 20K or more login attempts per day. Im using a standard kippo installation, running as a non root user and using authbindto run the honeypoton port 22. Results are sent to a logging server for collection. One of the honeypots has no valid password so it will always fail Im mainly interested
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19121&rss
*** 31C3: Thunderstrike greift MacBooks über Thunderbolt an ***
---------------------------------------------
Über eine EFI-Schwachstelle lässt sich die Firmware von MacBooks manipulieren. Einmal infiziert,lässt sich der Schädling nicht einmal durch den Austausch der Festplatte entfernen.
---------------------------------------------
http://www.heise.de/security/meldung/31C3-Thunderstrike-greift-MacBooks-ueb…
*** C-Programmierung: Schutz für Code Pointer ***
---------------------------------------------
Bugs in der Speicherverwaltung von C-Programmen gehören zu den häufigsten Sicherheitslücken. Da es aussichtslos sein dürfte, alle Lücken zu beheben, hat Mathias Prayer eine Strategie vorgestellt, mit der sich die meisten verhindern lassen.
---------------------------------------------
http://www.golem.de/news/c-programmierung-schutz-fuer-code-pointer-1412-111…
*** Rocket Kitten: Die Geschichte einer Malware-Analyse ***
---------------------------------------------
Mit der Analyse von Malware für eine großflächige Spearphising-Attacke konnten Datenexperten die Angreifer enttarnen. In detektivischer Kleinarbeit haben sie dabei ausgefeilte Komponenten aufgedeckt und ein Land hinter dem Angriff ausgemacht.
---------------------------------------------
http://www.golem.de/news/rocket-kitten-die-geschichte-einer-malware-analyse…
*** Bots übernehmen Herrschaft über das Internet ***
---------------------------------------------
56 Prozent aller Webseitenbesuche nicht mehr von Menschen – Zunahme an gefährlichen Algorithmen
---------------------------------------------
http://derstandard.at/2000009572838
*** Directory traversal vulnerabilities in multiple Wordpress themes ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99444http://xforce.iss.net/xforce/xfdb/99452http://xforce.iss.net/xforce/xfdb/99449http://xforce.iss.net/xforce/xfdb/99447http://xforce.iss.net/xforce/xfdb/99445
*** Massive Sicherheitslücken bei Kredit- und Bankomatkarten enthüllt ***
---------------------------------------------
IT-Sicherheitsforscher zeigen am 31C3, dass Systeme trotz PIN einfach zu knacken sind ..
---------------------------------------------
http://derstandard.at/2000009849645
*** Null Byte Injection in PHP ***
---------------------------------------------
The null character is a control character with the value zero. It is presented in many character sets such as ASCII (American Standard Code of for Information Interchange), Unicode (Universal Character Set) and EBCDIC ..
---------------------------------------------
http://resources.infosecinstitute.com/null-byte-injection-php/
*** Lücken in Industrieanlagen: Nicht nur Banken und Webseiten sollen verteidigt werden ***
---------------------------------------------
Hacker sollen sich nicht mehr um die Sicherheit des Geldes und Daten von anderen kümmern. Stattdessen gilt es, den Fokus auf Industrieanlagen zu richten, auch, um Menschenleben zu schützen. (31C3, Netzwerk)
---------------------------------------------
http://www.golem.de/news/luecken-in-industrieanlagen-nicht-nur-banken-und-w…
*** Prying Eyes: Inside the NSAs War on Internet Security ***
---------------------------------------------
US and British intelligence agencies undertake every effort imaginable to crack all types of encrypted Internet communication. The cloud, it seems, is full of holes. The good news: New Snowden documents show that some forms of encryption still cause problems for the NSA.
---------------------------------------------
http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-interne…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 22-12-2014 18:00 − Dienstag 23-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Multiple vulnerabilities in Cisco Jabber Guest Server ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** SoakSoak Campaign Evolves - New Wave of Attacks ***
---------------------------------------------
Since Sunday, we have seen a new wave of SoakSoak reinfections. The Javascript continues to evolve and load other scripts in order to infect additional websites. We have updates for concerned webmasters looking to stay on top of the threat and ..
---------------------------------------------
http://blog.sucuri.net/2014/12/soaksoak-new-wave-evolution-attacks.html
*** Apache CXF Certificate Validation Flaw Lets Remote Users Spoof SSL Servers ***
---------------------------------------------
Apache CXF Certificate Validation Flaw Lets Remote Users Spoof SSL Servers. A remote user with the ability to conduct a man-in-the-middle attack can supply a specially crafted host name in an X.509 certificate subject's ..
---------------------------------------------
http://www.securitytracker.com/id/1031419
*** Multiple vulnerabilities in VDG products ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99331http://xforce.iss.net/xforce/xfdb/99334http://xforce.iss.net/xforce/xfdb/99333http://xforce.iss.net/xforce/xfdb/99332
*** Anunak: So geht Bankraub im 21. Jahrhundert ***
---------------------------------------------
Die Security-Spezialisten von Fox-IT und Group-IB dokumentieren die Aktivitäten einer russischen Bande, die in die Netze von Banken eingebrochen ist und von dort aus Geldautomaten ausgeräumt hat. Rund 25 Millionen Dollar haben die so geklaut.
---------------------------------------------
http://www.heise.de/security/meldung/Anunak-So-geht-Bankraub-im-21-Jahrhund…
*** Top Facebook scams and malware attacks ***
---------------------------------------------
Millions of people fell for Facebook scams in 2014. Though security experts, companies and tech-savvy users guard against Facebook cyber attacks, many unwary users continue to fall victim to scams on ...
---------------------------------------------
http://www.net-security.org/malware_news.php?id=2935
*** BSI-Kryptohandys: Kaum Anschluss unter dieser Nummer ***
---------------------------------------------
Die Geräte sind angeblich sehr sicher und gewiss sehr teuer. Doch weil die vom BSI zertifizierten Kryptohandys viele Nachteile haben, liegen sie häufig in den Schubladen. Muss das so sein?
---------------------------------------------
http://www.golem.de/news/bsi-kryptohandys-kaum-anschluss-unter-dieser-numme…
*** NTP Daemon unter OS X: Kurzfristiges Update schließt Zeitserver-Sicherheitslücke ***
---------------------------------------------
Apple hat ein Sicherheitsupdate für OS X veröffentlicht, das jeder installieren sollte. Geschlossen wird damit eine unangenehme Sicherheitslücke im Dienst für das Network Time Protocol.
---------------------------------------------
http://www.golem.de/news/ntp-daemon-unter-os-x-kurzfristiges-update-schlies…
*** Linux-Kernel: Live Patching soll im Frühjahr 2015 bereitstehen ***
---------------------------------------------
Die Kernel-Entwickler wollen die Live-Patching-Technik mit Linux 3.20 im kommenden Frühjahr veröffentlichen. Zuvor soll der Code in Linux-Next aufgenommen werden. Ob dies tatsächlich geschieht, steht noch aus.
---------------------------------------------
http://www.golem.de/news/linux-kernel-live-patching-soll-im-fruehjahr-2015-…
*** Patches Not Cure-all for Shellshock ***
---------------------------------------------
Earlier this year, Linux system administrators all over the world had to deal with the Shellshock vulnerability, which could lead to malicious code being run on Linux systems. Servers running various web services were at particular risk. By now, most major distributions have been able to ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/patches-not-cure…
Next End-of-Shift report on 2014-12-29
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 19-12-2014 18:00 − Montag 22-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** TA14-353A: Targeted Destructive Malware ***
---------------------------------------------
Original release date: December 19, 2014 Systems Affected Microsoft Windows Overview US-CERT was recently notified by a trusted third party of cyber threat actors using a Server Message Block (SMB) Worm Tool to conduct cyber exploitation activities targeting a major entertainment ..
---------------------------------------------
https://www.us-cert.gov/ncas/alerts/TA14-353A
*** Multiple vulnerabilities in Cisco products ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** iTwitter <= 0.04 - XSS & CSRF ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7729
*** Network Time Protocol Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for multiple vulnerabilities within the Network Time Protocol (NTP).
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-353-01
*** Post to Twitter <= 0.7 CSRF & XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7730
*** Which NTP Servers do You Need to Patch? ***
---------------------------------------------
While people generally know where their real NTP servers are, all to often they dont know that theyve got a raft of accidental NTP servers - boxes that have NTP enabled without the system maintainers knowing about it. Common servers ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19095
*** Tor-Projekt wappnet sich gegen möglichen Angriff ***
---------------------------------------------
Das Tor-Projekt befürchtet eine Beschlagnahmung wichtiger Infrastruktur-Server, die das Anonymisierungsnetz unbenutzbar machen könnte. Einem anonymen Tipp zufolge stehe diese schon in wenigen Tagen bevor.
---------------------------------------------
http://www.heise.de/security/meldung/Tor-Projekt-wappnet-sich-gegen-moeglic…
*** Compromised Wordpress sites serving multiple malware payloads ***
---------------------------------------------
During our daily log monitoring process, we observe many interesting threat events. One such event led to a compromised WordPress site campaign, which was found to serve multiple malware families including Upatre/Hencitor/Extrat Xtreme ..
---------------------------------------------
http://research.zscaler.com/2014/12/compromised-wordpress-sites-serving.html
*** Neue NTP-Versionen fixen Fehler im Zeit-Server ***
---------------------------------------------
Mit nur einem Paket könnte ein Angreifer Zeit-Server mit dem NTP-Dienst übernehmen. Admins sollten ihre Konfiguration checken und bei Bedarf das Abhilfe versprechende Update so schnell wie möglich einspielen.
---------------------------------------------
http://www.heise.de/security/meldung/Neue-NTP-Versionen-fixen-Fehler-im-Zei…
*** Südkorea führt Übungen zur Hacker-Abwehr an Atomkraftwerken durch ***
---------------------------------------------
Nach der Enthüllung geschützter Informationen über zwei südkoreanische Atomreaktoren im Internet hat der Betreiber eine zweitägige Übungen zur Abwehr von Cyber-Attacken begonnen. Die Übungen würden an vier von 23 Reaktorstandorten im Land durchgeführt, teilte eine Sprecherin der staatlichen Koreanischen Wasser- und Atomenergie-Gesellschaft (KHNP) am Montag mit.
---------------------------------------------
http://derstandard.at/2000009692066
*** Pattern-Based Approach for In-Memory ShellCodes Detection ***
---------------------------------------------
Introduction During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their goals. As we can imagine, these sets of common instructions could be used ..
---------------------------------------------
http://resources.infosecinstitute.com/pattern-based-approach-memory-shellco…
*** Is this URL safe? Hiding Malware in Plain Sight From Online Scanners ***
---------------------------------------------
There are serveral sites which offer scanning a URL for malware. One should expect that these sites emulate a real browser good enough so that their rating can be trusted. Unfortunatly this is not the case.
---------------------------------------------
http://noxxi.de/research/content-encoding-online-scanner.html
*** Mikl-Leitner will Cybercrime-Gesetz bis 2018 ***
---------------------------------------------
Ein Cybercrime-Gesetz soll bis zum Ende dieser Legislaturperiode, also 2018, beschlossen werden. Dieses Ziel nannte Innenministerin Johanna Mikl-Leitner (ÖVP) bei einer Pressekonferenz am Montag in Wien. Anlass war die Präsentation der Erkenntnisse aus einem Planspiel, bei dem es um einen Hackerangriff auf den Flughafen Wien und einen Erpressungsversuch mit terroristischem Hintergrund ging.
---------------------------------------------
http://derstandard.at/2000009710328
*** PHP 5.6.3 unserialize() execute arbitrary code ***
---------------------------------------------
A while ago the function "process_nested_data" was changed to better
handle object properties. Before it was possible to create numeric
object properties which would cause ..
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120160
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 18-12-2014 18:00 − Freitag 19-12-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Misfortune Cookie crumbles router security: 12 MILLION+ in hijack risk ***
---------------------------------------------
Homes, businesses menaced by vulnerable software exposed to the internet Infosec biz Check Point says it has discovered a critical software vulnerability that allows hackers to hijack home and small business broadband routers across the web.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/12/18/misfortune_…
*** Metasploit Weekly Wrapup: Get the 411 ***
---------------------------------------------
This week, we released Metasploit version 4.11 to the world -- feel free to download it here if you're the sort that prefers the binary install over the somewhat Byzantine procedure for setting up a development environment. Which you should be, because the binary installers (for Windows and Linux) have all the dependencies baked in and you don't have to monkey around with much to get going. The two major features with this release center around reorganizing the bruteforce workflow to make things more sensible and usable for larger-scale password audits, and much better visualization on figuring out where the weak link is/was in the organization under test when stolen credentials were used to extend control.
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/12/18/metasploi…
*** Vulnerability announced: update your Git clients ***
---------------------------------------------
A critical Git security vulnerability has been announced today, affecting all versions of the official Git client and all related software that interacts with Git repositories, including GitHub for Windows and GitHub for Mac. Because this is a client-side only vulnerability, github.com and GitHub Enterprise are not directly affected. The vulnerability concerns Git and Git-compatible clients that access Git repositories in a case-insensitive or case-normalizing filesystem.
---------------------------------------------
https://github.com/blog/1938-vulnerability-announced-update-your-git-clients
*** How Cybercriminals Dodge Email Authentication ***
---------------------------------------------
Email authentication and validation is one method that is used to help bring down the levels of spam and phishing by identifying senders so that malicious emails can be identified and discarded. Two frameworks are in common usage today; these are SPF and DKIM. SPF (Sender Policy Framework): Defined in RFC 7208, SPF provides a...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/27Kj0gN8uNo/
*** Smart grid security certification in Europe: Challenges and Recommendations ***
---------------------------------------------
ENISA issues today a report on Smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with information on several certification approaches across the EU and other MS and EFTA countries. It describes the specific European situation, and discusses the advantages and challenges towards a more harmonised certification practice.
---------------------------------------------
http://www.enisa.europa.eu/media/press-releases/smart-grid-security-certifi…
*** USBDriveby Device Can Install Backdoor, Override DNS Settings in Seconds ***
---------------------------------------------
Samy Kamkar has a special talent for turning seemingly innocuous things into rather terrifying attack tools. First it was an inexpensive drone that Kamkar turned into a flying hacking platform with his Skyjack research, and now it's a $20 USB microcontroller that Kamkar has loaded with code that can install a backdoor on a target machine in...
---------------------------------------------
http://threatpost.com/usbdriveby-device-can-install-backdoor-override-dns-s…
*** TA14-352A: Server Message Block (SMB) Worm Tool ***
---------------------------------------------
Unknown cyber-threat actors have been identified employing sophisticated malware, and Indicators of Compromise (IOC) have been provided to mitigate this threat.
---------------------------------------------
http://www.exploitthis.com/2014/12/ta14-352a-server-message-block-smb-worm-…
*** Save the date: ENISA Workshop on EU Threat Landscape ***
---------------------------------------------
24th February 2015, Hotel Metropole, Brussels
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/save-the-date-enisa-workshop-on…
*** SS7 Vulnerabilities ***
---------------------------------------------
There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into SS7 for other purposes -- such as keeping calls connected as users speed down highways, switching from cell tower to cell tower -- that hackers can repurpose for surveillance because of the lax security on the network....
---------------------------------------------
https://www.schneier.com/blog/archives/2014/12/ss7_vulnerabili.html
*** Information-stealing Vawtrak malware evolves, becomes more evasive ***
---------------------------------------------
SophosLabs has recently observed some cunning changes made by the authors of the dangerous banking malware Vawtrak. James Wyke explains.
---------------------------------------------
https://nakedsecurity.sophos.com/2014/12/19/information-stealing-vawtrak-ma…
*** Emerson Patches Series of Flaws in Controllers Used in Oil and Gas Pipelines ***
---------------------------------------------
Researchers have identified a wide range of vulnerabilities in remote terminal units manufactured by Emerson Process Management that are widely used in oil and gas pipelines and other applications. The vulnerabilities include a number of hidden functions in the RTUs, an authentication bypass and hardcoded credentials. All of the vulnerabilities are remotely exploitable and an...
---------------------------------------------
http://threatpost.com/emerson-patches-series-of-flaws-in-controllers-used-i…
*** Novell - Patches for GroupWise and eDirectory ***
---------------------------------------------
https://download.novell.com/Download?buildid=tveSooKDw3Q~https://download.novell.com/Download?buildid=mdWLZGP0Glk~https://download.novell.com/Download?buildid=gHTDteZoK34~https://download.novell.com/Download?buildid=3dJODsdcDKE~
*** Subversion mod_dav_svn URI Processing Flaw Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1031403
*** Subversion mod_dav_svn REPORT Request Processing Flaw Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1031402
*** Honeywell Experion PKS Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for vulnerabilities in Honeywell's Experion Process Knowledge System (EPKS) application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-352-01
*** Innominate mGuard Privilege Escalation Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for a privilege escalation vulnerability affecting all mGuard devices.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-352-02
*** Siemens SIMATIC WinCC, PCS7, and TIA Portal Vulnerabilities (Update C) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-14-329-02B Siemens SIMATIC WinCC, PCS7, and TIA Portal Vulnerabilities that was published December 11, 2014, on the NCCIC/ICS-CERT web site.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-329-02C
*** Emerson ROC800 Multiple Vulnerabilities (Update B) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-13-259-01A Emerson ROC800 Multiple Vulnerabilities that was published December 2, 2014, on the NCCIC/ICS CERT web site.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-13-259-01B
*** [2014-12-19] XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor ***
---------------------------------------------
Two vulnerabilities in the NetIQ eDirectory iMonitor allow an attacker to take over a user session and potentially leak sensitive data. An attacker could compromise an administrative account and e.g. tamper a centralized user database.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Live Forms <= 1.2.0 - Unauthenticated Stored Cross-Site Scripting (XSS) ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7728
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 17-12-2014 18:00 − Donnerstag 18-12-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Is the polkit Grinch Going to Steal your Christmas?, (Wed, Dec 17th) ***
---------------------------------------------
Alert Logic published a widely publizised blog outlining a common configuration problem with Polkit. To help with dissemination, Alert Logic named the vulnerability Grinch [1] . In some ways, this isnt so much a vulnerability, as more a common overlypermissive configuration of many Linux systems. It could easily be leveraged to escalate privileges beyond the intent of the polkitconfiguration. Lets first step back: In the beginning, there was sudo. Sudo served the Unix community well for many...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19077&rss
*** Application Threat and Usage Report 2014 ***
---------------------------------------------
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed wor...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17609
*** Erfolgreicher Angriff auf Internet-Verwaltung ICANN ***
---------------------------------------------
U.a. wurde ein zentrales System, das zur Organisation bei der Einführung der neuen Top Level Domains dient, bei einem Angriff auf die ICANN kompromittiert. Die ICANN dient als Oberaufsicht über die Verwaltung von Netz-Ressourcen wie DNS und IP-Adressen.
---------------------------------------------
http://www.heise.de/security/meldung/Erfolgreicher-Angriff-auf-Internet-Ver…
*** Your Browser is (not) Locked ***
---------------------------------------------
Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick - browser lockers. Unlike traditional ransomware threats that lock the entire desktop, browser lockers only lock the web browser of an infected PC. Most other malware needs a user (or other malware) to manually run it. Browser lockers...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/12/17/your-browser-is-not-lock…
*** Chthonic: a New Modification of ZeuS ***
---------------------------------------------
In the fall of 2014, we discovered a new banking Trojan, which caught our attention for two reasons...
---------------------------------------------
http://securelist.com/blog/virus-watch/68176/chthonic-a-new-modification-of…
*** Ars Technica readers urged to change passwords in wake of hack ***
---------------------------------------------
In case you havent heard already, Ars Technica got hacked over the weekend, so if you are a subscribed reader now would be a good time to change your password. "At 20:00 CT on December 14, an Inte...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17768
*** PhpBB-Webserver geknackt, Zugangsdaten kopiert ***
---------------------------------------------
Die PhpBB-Server wurden kompromittiert und sind momentan offline. Die Angreifer haben es geschafft, den Foren-Zugang eines Administrators zu kapern.
---------------------------------------------
http://www.heise.de/security/meldung/PhpBB-Webserver-geknackt-Zugangsdaten-…
*** Android Hacking and Security, Part 17: Cracking Android App Binaries ***
---------------------------------------------
In this article, we will see how a developer can perform basic checks to programmatically detect if the app is running on an emulator and stop executing the app if an emulator is detected. We will then see how an attacker can easily bypass these checks by using some freely...
---------------------------------------------
http://resources.infosecinstitute.com/android-hacking-security-part-17-crac…
*** Alina POS malware "sparks" off a new variant ***
---------------------------------------------
Alina is a well-documented family of malware used to scrape Credit Card (CC) data from Point of Sale (POS) software. We published a series of in-depth write-ups on the capabilities Alina possesses as well as the progression of the versions. Xylitol has a nice write-up on the Command and Control (C&C) aspects of Alina. In this blog post I'd like to discuss a variant that first cropped up in late 2013 and has been seen in the wild as recent as a month ago. Some anti-virus companies have
---------------------------------------------
http://blog.spiderlabs.com/2014/12/alina-pos-malware-sparks-off-a-new-varia…
*** Patch-Debakel: Microsoft bessert bei IE-Update nach ***
---------------------------------------------
Die Serie an verbockten Patches scheint nicht abzureissen. Jetzt muss Microsoft bei einem Update für den Internet Explorer nachbessern, nachdem IE-11-Nutzer über Probleme mit Dialogboxen auf Webseiten geklagt hatten.
---------------------------------------------
http://www.heise.de/security/meldung/Patch-Debakel-Microsoft-bessert-bei-IE…
*** Exploit Kit Evolution During 2014 - Nuclear Pack, (Thu, Dec 18th) ***
---------------------------------------------
This is a guest diary submitted by Brad Duncan. Nuclear exploit kit (also known as Nuclear Pack) has been around for years. Version 2.0 of Nuclear Pack was reported in 2012 [1] [2]. Blogs like malware.dontneedcoffee.com have mentioned version 3.0 of Nuclear Pack in posts during 2013 [3] [4]. This month, Nuclear Pack changed its traffic patterns. The changes are significant enough that I wonder if Nuclear Pack is at version 4. Or is this merely an evolution of version 3, as weve seen throughout
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19081&rss
*** VU#843044: Multiple Dell iDRAC IPMI v1.5 implementations use insufficiently random session ID values ***
---------------------------------------------
Vulnerability Note VU#843044 Multiple Dell iDRAC IPMI v1.5 implementations use insufficiently random session ID values Original Release date: 18 Dec 2014 | Last revised: 18 Dec 2014 Overview The Intelligent Platform Management Interface (IPMI) v1.5 implementations in multiple Dell iDRAC releases are vulnerable to arbitrary command injection due to use of insufficiently random session ID values. Description CWE-330: Use of Insufficiently Random Values - CVE-2014-8272The IPMI v1.5...
---------------------------------------------
http://www.kb.cert.org/vuls/id/843044
*** Cisco IronPort ESA Subject Header Length Denial of Service Vulnerability ***
---------------------------------------------
CVE-2014-8016
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Adaptive Security Appliance DOM Cross-Site Scripting Vulnerability in WebVPN Portal ***
---------------------------------------------
CVE-2014-8012
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco IOS XR Software Malformed RSVP Packet Denial of Service Vulnerability ***
---------------------------------------------
CVE-2014-8014
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cross-Site Scripting vulnerability in wfGallery (wf_gallery) ***
---------------------------------------------
It has been discovered that the extension "wfGallery" (wf_gallery) is susceptible to Cross-Site Scripting.
---------------------------------------------
http://www.typo3.org/news/article/cross-site-scripting-vulnerability-in-wfg…
*** SA-CONTRIB-2014-128 - Organic Groups Menu - Access bypass ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-128Project: OG Menu (third-party module)Version: 6.x, 7.xDate: 2014-December-17Security risk: 14/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Access bypass, Information DisclosureDescriptionThis module enables you to associate menus with Organic Groups (OG). It allows you to create one or more menus per group, configure and apply menu permissions in a group context, add/edit menu links directly from the entity...
---------------------------------------------
https://www.drupal.org/node/2395049
*** SA-CONTRIB-2014-127 - School Administration - Cross Site Scripting (XSS) ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-127Project: School Administration (third-party module)Version: 7.xDate: 2014-December-17Security risk: 14/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross Site ScriptingDescriptionSchool Administration module enables you to keep records of all students and staff. With inner modules, it aims to be a complete school administration system.The module failed to sanitize some node titles in messages, leading to a...
---------------------------------------------
https://www.drupal.org/node/2395015
*** SA-CONTRIB-2014-126 - Open Atrium - Multiple vulnerabilities ***
---------------------------------------------
Advisory ID: DRUPAL-SA-CONTRIB-2014-126Project: Open Atrium (third-party module)Version: 7.xDate: 2014-12-17Security risk: 13/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Access bypass, Cross Site Request Forgery, Multiple vulnerabilitiesDescriptionThis distribution enables you to create an intranet.Several of the sub modules included do not prevent CSRF on several menu callbacks.Open Atrium Discussion also does not exit correctly after...
---------------------------------------------
https://www.drupal.org/node/2394979
*** Novell NetIQ Access Manager 4.0 Support Pack 1 Hot Fix 3 4.0.1-132 ***
---------------------------------------------
Abstract: NetIQ Access Manager 4.0 Support Pack 1 Hot Fix 3 build (version4.0.1-132). This file contains updates for services contained in the NetIQ Access Manager 4.0 product and requires 4.0 SP1 to be installed as a minimum. NetIQ recommends that all customers running Access Manager 4.0 release code apply this patch. The purpose of the patch is to provide a bundle of fixes for issues that have surfaced since NetIQ Access Manager 4.0 SP1 was released. These fixes include updates to the Access...
---------------------------------------------
https://download.novell.com/Download?buildid=i7RBltaqcVw~
*** [2014-12-18] Multiple critical vulnerabilities in VDG Security SENSE (formerly DIVA) ***
---------------------------------------------
Attackers are able to fully compromise the VDG Sense video management system by gaining highest system level access rights as multiple critical vulnerabilities exist.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** [2014-12-18] OS command execution vulnerability in GParted ***
---------------------------------------------
GParted does not properly sanitize strings before passing them as parameters to an OS command. Under certain conditions an attacker is able to execute system commands as user "root" by tricking a victim into using GParted to e.g. format a USB drive.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** [2014-12-18] Multiple high risk vulnerabilities in NetIQ Access Manager ***
---------------------------------------------
A vulnerability in the NetIQ Access Manager allows an authenticated attacker to read local files. Moreover, several web based issues (CSRF, persistent and non-persistent XSS) allow an attacker to hijack the session of an administrator or user. An information disclosure vulnerability allows an attacker to gather internal information including service passwords.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 16-12-2014 18:00 − Mittwoch 17-12-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Schadcode nutzt Monate alte WordPress-Lücke aus ***
---------------------------------------------
Der Schädling namens SoakSoak hat hunderttausende Webseiten über das Plug-in Slider Revolution befallen und spioniert die Server aus. In einigen Fällen werden auch Besucher per Drive-By-Download infiziert.
---------------------------------------------
http://www.heise.de/security/meldung/Schadcode-nutzt-Monate-alte-WordPress-…
*** Firefox, IE11 zero-day bugs possibly targeted in SoakSoak WordPress malware attacks ***
---------------------------------------------
Attackers exploiting a bug in the Slider Revolution plugin to compromise WordPress websites with malware may also be targeting zero-day vulnerabilities in Firefox and Internet Explorer 11.
---------------------------------------------
http://www.scmagazine.com/firefox-ie11-zero-day-bugs-possibly-targeted-in-s…
*** Some Memory Forensic with Forensic Suite (Volatility plugins), (Tue, Dec 16th) ***
---------------------------------------------
In previous diaries we have talked about memory forensics and how important it is. In this diary I will talk about a new volatility plugins called Forensic Suite written by Dave Lasalle. The suite has 14 plugins and they cover different area of memory forensics The Forensics Suite can be obtain from: http://downloads.volatilityfoundation.org/contest/2014/DaveLasalle_Forensic… . In this diary I will talk about some of the plugins Firefox history: To test this plugin first I browsed the...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19071&rss
*** URL flaw discovered for airline mobile boarding passes ***
---------------------------------------------
A URL flaw that impacts mobile boarding passes for airlines, such as Southwest and Delta, was discovered on Tuesday.
---------------------------------------------
http://www.scmagazine.com/url-flaw-discovered-for-airline-mobile-boarding-p…
*** Impact of Linux bug grinch spans servers, workstations, Android devices and more ***
---------------------------------------------
Alert Logic discovered the bug, which is susceptible to exploitation due to the default installation process used by Linux.
---------------------------------------------
http://www.scmagazine.com/impact-of-linux-bug-grinch-spans-servers-workstat…
*** Comparing OpenBSD with FreeBSD - securitywise ***
---------------------------------------------
OpenBSD and FreeBSD are both great OS that I admire and use. OpenBSD is considered more secure since it is its main goal, but FreeBSD can be tweaked to be pretty well hardened as well. Depending on the forums or to who we ask, we will have different opinions. But what are the facts? Which OS is more secure and why?
---------------------------------------------
http://networkfilter.blogspot.co.at/2014/12/security-openbsd-vs-freebsd.html
*** SSL Labs end of year 2014 updates ***
---------------------------------------------
>From the SSL/TLS perspective, 2014 was quite an eventful year. The best way to describe what we at SSL Labs did is we kept running to stay in the same place. What I mean by this is that we spent a lot of time reacting to high profile vulnerabilities: Hearbleed, the ChangeCipherSpec protocol issue in OpenSSL, POODLE (against SSL 3 in October and against TLS in December), and others. Ultimately, this has been a very successful year for us, with millions of assessments carried out.
---------------------------------------------
http://blog.ivanristic.com/2014/12/ssl-labs-end-of-year-updates.html
*** Top 5 malware attacks: 35 reused components ***
---------------------------------------------
CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar - achieved by recycling code and using the same methods from previous malware attack...
---------------------------------------------
http://www.net-security.org/malware_news.php?id=2932
*** Protecting the underground electronic communications infrastructure ***
---------------------------------------------
ENISA has released a new report on the Protection of Underground Electronic Communications Infrastructure. This report - targeted at Member States (MS), public institutions, owners of underground comm...
---------------------------------------------
http://www.net-security.org/secworld.php?id=17763
*** The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire ***
---------------------------------------------
In this paper, we discuss an attacker model that accounts for the hijacking of network ownership information stored in Regional Internet Registry (RIR) databases. We show that such threats emerge from abandoned Internet resources (e.g., IP address blocks, AS numbers). When DNS names expire, attackers gain the opportunity to take resource ownership by re-registering domain names that are referenced by corresponding RIR database objects.
---------------------------------------------
http://arxiv.org/abs/1412.5052
*** How the FBI Unmasked Tor Users ***
---------------------------------------------
Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identify Tor users....
---------------------------------------------
https://www.schneier.com/blog/archives/2014/12/how_the_fbi_unm.html
*** Fast Flux Networks Working and Detection, Part 1 ***
---------------------------------------------
Introduction In this series of articles, we will learn about a not-so-new type of attack, but one of the most difficult attacks to control. Yes, we will lean about the demon Fast Flux!! In this article, we will learn about what exactly Fast Flux is, types of Fast Flux, and [...]The post Fast Flux Networks Working and Detection, Part 1 appeared first on InfoSec Institute.
---------------------------------------------
http://resources.infosecinstitute.com/fast-flux-networks-working-detection-…
*** What's New in Exploit Kits in 2014 ***
---------------------------------------------
Around this time in 2013, the most commonly used exploit kit - the Blackhole Exploit Kit - was shut down after its creator, Paunch, was arrested by law enforcement. Since then, a variety of exploit kits has emerged and have been used by cybercriminals. The emergence of so many replacements has also meant that there...
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/N44vwrIcGrM/
*** Researchers warn of new OphionLocker ransomware ***
---------------------------------------------
OphionLocker doesnt diverge much from previous ransomware schemes, although it does generate a unique hardware ID based on the first hard drives serial number, the motherboards serial number and other information.
---------------------------------------------
www.scmagazine.com/ophionlocker-discovered-in-the-wild-update-provided-on-t…
*** Certified pre-pw0ned Android Smartphones: Coolpad Firmware Backdoor, (Wed, Dec 17th) ***
---------------------------------------------
Researchers at Palo Alto found that many ROM images used for Android smart phones manufactured by Coolpad contain a backdoor, giving an attacker full control of the device. Palo Alto named the backdoor Coolreaper. With Android, it is very common for manufacturers to install additional applications. But these applications are installed on top of the Android operating system. In this case, Coolpad integrated additional functionality into the firmware of the device. This backdoor was then used by
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19075&rss
*** BSI-Sicherheitsbericht: Erfolgreiche Cyber-Attacke auf deutsches Stahlwerk ***
---------------------------------------------
Bei einem bislang unbekannten Angriff beschädigten die Angreifer einen Hochofen schwer. Doch neben den gezielten Angriffen auf Industrieanlagen bilanziert das BSI auch eine steigende Gefahr für Endanwender.
---------------------------------------------
http://www.heise.de/security/meldung/BSI-Sicherheitsbericht-Erfolgreiche-Cy…
*** Meet FlashFlood, the lightweight script that causes websites to falter ***
---------------------------------------------
Bringing big database-driven sites to their knees just got a little easier.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/ir5Zy4m-thY/
*** iCloud-Daten: Forensik-Software verspricht umfangreichen Zugriff ***
---------------------------------------------
Die vermutlich auch für den iCloud-Promi-Hack genutzte Forensik-Software "Phone Breaker" erweitert die Möglichkeiten, bei Apples Cloud-Dienst gespeicherte Nutzerdaten auszulesen. Unterstützung zum Fremdzugriff auf iCloud Drive soll folgen.
---------------------------------------------
http://www.heise.de/security/meldung/iCloud-Daten-Forensik-Software-verspri…
*** Cisco ISB8320-E High-Definition IP-Only DVR Remote Unauthenticated Access Vulnerability ***
---------------------------------------------
CVE-2014-8006
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Symantec Web Gateway OS Authenticated Command Injection ***
---------------------------------------------
Revisions None Severity CVSS2Base ScoreImpactExploitabilityCVSS2 VectorSymantec Web Gateway Operating System Command Injection - Low...
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** IBM Business Process Manager cross-site scripting ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/98418
*** IBM WebSphere Process Server, IBM WebSphere Enterprise Service Bus, IBM Business Process Manager information disclosure ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/98488
*** IBM Business Process Manager security bypass ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/95724
*** HP Security Bulletins ***
---------------------------------------------
[security bulletin] HPSBMU03221 rev.1 - HP Connect-IT running SSLv3, Remote Disclosure of Information
---------------------------------------------
http://www.securityfocus.com/archive/1/534259
[security bulletin] HPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote Code Execution
---------------------------------------------
http://www.securityfocus.com/archive/1/534262
[security bulletin] HPSBOV03226 rev.1 - HP TCP/IP Services for OpenVMS, BIND 9 Resolver, Multiple Remote Vulnerabilities
---------------------------------------------
http://www.securityfocus.com/archive/1/534261
[security bulletin] HPSBOV03225 rev.1 - HP OpenVMS running POP, Remote Denial of Service (DoS)
---------------------------------------------
http://www.securityfocus.com/archive/1/534260
*** Patches for Novell Products ***
---------------------------------------------
https://download.novell.com/Download?buildid=3dJODsdcDKE~https://download.novell.com/Download?buildid=STisn28FRWs~https://download.novell.com/Download?buildid=q4S96klvwhE~https://download.novell.com/Download?buildid=Mh8CRo1Ljh8~https://download.novell.com/Download?buildid=nlOmW2y333Q~https://download.novell.com/Download?buildid=anuuh6CDWX8~
*** DSA-3105 heirloom-mailx - security update ***
---------------------------------------------
Two security vulnerabilities were discovered in Heirloom mailx, animplementation of the mail command:
---------------------------------------------
https://www.debian.org/security/2014/dsa-3105
*** DSA-3104 bsd-mailx - security update ***
---------------------------------------------
It was discovered that bsd-mailx, an implementation of the mailcommand, had an undocumented feature which treats syntactically validemail addresses as shell commands to execute.
---------------------------------------------
https://www.debian.org/security/2014/dsa-3104
*** SSA-134508 (Last Update 2014-12-16): Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC in TIA Portal ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** iWifi For Chat 1.1 Denial Of Service ***
---------------------------------------------
Topic: iWifi For Chat 1.1 Denial Of Service Risk: Medium Text:Document Title: iWifi for Chat v1.1 iOS - Denial of Service Vulnerability References (Source): == http://w...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120110
*** iUSB 1.2 Arbitrary Code Execution ***
---------------------------------------------
Topic: iUSB 1.2 Arbitrary Code Execution Risk: High Text:Document Title: iUSB v1.2 iOS - Arbitrary Code Execution Vulnerability References (Source): == http://www....
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120109
*** Bugtraq: [REVIVE-SA-2014-002] Revive Adserver 3.0.6 and 3.1.0 fix multiple vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534264
*** Security Advisory-Multiple Vulnerabilities in Huawei eSpace Desktop Product ***
---------------------------------------------
Dec 17, 2014 16:09
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** Schneider Electric ProClima Command Injection Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for command injection vulnerabilities in Schneider Electrics ProClima software package.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-350-01
*** Bird Feeder <= 1.2.3 CSRF & XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7727
*** DB Backup <= 4.5 - Path Traversal File Access ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7726
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 15-12-2014 18:00 − Dienstag 16-12-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Is POODLE Back for Another Byte? ***
---------------------------------------------
[...] The problem is a number of other TLS implementations are optimized for performance by verifying only that the first byte of padding matches the number of padding bytes. Such implementations would accept any value for the second and subsequent padding bytes. What's worse is that the adversary doesn't need to artificially downgrade the connection to SSLv3 to exploit this issue, so the barriers to execution are lower.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2014/12/is_poodle_back_fora.ht…
*** RevSlider Vulnerability Leads To Massive WordPress SoakSoak Compromise ***
---------------------------------------------
Yesterday we disclosed a large malware campaign targeting and compromising over 100,000 WordPress sites, and growing by the hour. It was named SoakSoak due to the first domain used in the malware redirection path (soaksoak.ru). After a bit more time investigating this issue, we were able to confirm that the attack vector is the RevSlider...
---------------------------------------------
http://blog.sucuri.net/2014/12/revslider-vulnerability-leads-to-massive-wor…
*** SoakSoak: Payload Analysis - Evolution of Compromised Sites - IE 11 ***
---------------------------------------------
Thousands of WordPress sites has been hit by the SoakSoak attack lately. At this moment we know quite a lot about it. It uses the RevSlider vulnerability as a point of penetration. Then uploads a backdoor and infects all websites that share the same server account (so sites that don't use the RevSlider plugin can...
---------------------------------------------
http://blog.sucuri.net/2014/12/soaksoak-payload-analysis-evolution-of-compr…
*** Google Blacklists WordPress Sites Peddling SoakSoak Malware ***
---------------------------------------------
Up to 100,000 sites hosted on WordPress may be vulnerable to new campaign thats pushing malware and multiple exploit kits to the browser.
---------------------------------------------
http://threatpost.com/google-blacklists-wordpress-sites-peddling-soaksoak-m…
*** Safari 8.0.2 Still Supporting SSLv3 with Block Ciphers, (Mon, Dec 15th) ***
---------------------------------------------
In October, Apple released Security Update 2014-005, specifically with the intend to address the POODLE issue [1]. The description with the update stated: There are known attacks on the confidentiality of SSL 3.0 when a cipher suite uses a block cipher in CBC mode. An attacker could force the use of SSL 3.0, even when the server would support a better TLS version, by blocking TLS 1.0 and higher connection attempts. This issue was addressed by disabling CBC cipher suites when TLS connection...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19067&rss
*** ENISA CERT training programme now available online ***
---------------------------------------------
ENISA has launched a new section on its website introducing the ENISA CERT training programme.
In the new section, you can find all the publicly available training resources and the training courses currently provided by ENISA.
---------------------------------------------
http://www.enisa.europa.eu/media/news-items/enisa-cert-training-programme-n…
*** SSL-TLS Implementations Cipher Block Chaining Padding Information Disclosure Vulnerability ***
---------------------------------------------
CVE-2014-8730
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Internet-Sicherheit: Auch Cisco mit Poodle-Problemen ***
---------------------------------------------
Ausgerechnet Firewalls und Load-Balancing-Erweiterungen des Netzwerkgeräte-Herstellers pfuschen bei der Umsetzung von TLS - und werden damit ebenfalls anfällig für Poodle-Angriffe auf die Verschlüsselung.
---------------------------------------------
http://www.heise.de/security/meldung/Internet-Sicherheit-Auch-Cisco-mit-Poo…
*** Android Hacking and Security, Part 16: Broken Cryptography ***
---------------------------------------------
Introduction In this article, we will discuss broken cryptography in Android applications. Broken cryptography attacks come into the picture when an app developer wants to take advantage of encryption in his application. This article covers the possible ways where vulnerabilities associated with broken cryptography may be introduced in Android apps. [...]The post Android Hacking and Security, Part 16: Broken Cryptography appeared first on InfoSec Institute.
---------------------------------------------
http://resources.infosecinstitute.com/android-hacking-security-part-16-brok…
*** F5 Security Advisory: Linux kernel SCTP vulnerabilities CVE-2014-3673 and CVE-2014-3687 ***
---------------------------------------------
(SOL15910) - Remote attackers may be able to cause a denial-of-service (DoS) using malformed or duplicate ASCONF chunk.
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/15000/900/sol15910.html
*** Security Advisory 2014-06: Incomplete Access Control ***
---------------------------------------------
An attacker with valid OTRS credentials could access and manipulate ticket data of other users via the GenericInterface, if a ticket webservice is configured and not additionally secured.
---------------------------------------------
https://www.otrs.com/security-advisory-2014-06-incomplete-access-control/
*** Apache Buffer Overflow in mod_proxy_fcgi Lets Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1031371
*** SSA-831997 (Last Update 2014-12-15): Denial-of-Service Vulnerability in Ruggedcom ROS-based Devices ***
---------------------------------------------
https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_securit…
*** CA Release Automation Multiple Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and SQL Injection Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1031375
*** DokuWiki conf/mime.conf cross-site scripting ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99291
*** Python TLS security bypass ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99294
*** CA LISA Multiple Vulns ***
---------------------------------------------
Topic: CA LISA Multiple Vulns Risk: Medium Text:CA20141215-01: Security Notice for CA LISA Release Automation Issued: December 15, 2014 CA Technologies Support is alerti...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120097
*** Bugtraq: [Onapsis Security Advisory 2014-034] SAP Business Objects Search Token Privilege Escalation via CORBA ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534249
*** Better Search <= 1.3.4 - Reflective XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7725
*** WP Construction Mode <= 1.91 - Cross-Site Scripting (XSS) ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7724
*** Sliding Social Icons <= 1.61 - CSRF & Stored XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7723
*** Bugtraq: "Ettercap 8.0 - 8.1" multiple vulnerabilities ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534248
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 12-12-2014 18:00 − Montag 15-12-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** ICS-CERT: BlackEnergy may be infecting WinCC systems lacking recent patch ***
---------------------------------------------
BlackEnergy malware may be exploiting a vulnerability in Siemens SIMATIC WinCC software that was patched in early November.
---------------------------------------------
http://www.scmagazine.com/ics-cert-urges-wincc-users-others-to-update-softw…
*** BGP Hijacking Continues, Despite the Ability To Prevent It ***
---------------------------------------------
An anonymous reader writes: BGPMon reports on a recent route hijacking event by Syria. These events continue, despite the ability to detect and prevent improper route origination: Resource Public Key Infrastructure. RPKI is technology that allows an operator to validate the proper relationship between an IP prefix and an Autonomous System. That is, assuming you can collect the certificates. ARIN requires operators accept something called the Relying Party Agreement. But the provider community...
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/hl_eP152_h0/story01.htm
*** Batten down the patches: New vuln found in Docker container tech ***
---------------------------------------------
Last months patch brought new privilege escalation flaw More security woes plagued users of the Docker application containerization tech for Linux this week, after an earlier security patch was found to have introduced a brand-new critical vulnerability in the software.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/12/12/docker_vuln…
*** Cisco to release flying pig - Snort 3.0 ***
---------------------------------------------
Sourcefires been making bacon, now wants you to fry it Ciscos going to release a flying pig.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2014/12/12/cisco_to_re…
*** Worm Backdoors and Secures QNAP Network Storage Devices, (Sun, Dec 14th) ***
---------------------------------------------
Shellshock is far from over, with many devices still not patched andout there ready for exploitation. One set of thedevices receiving a lot of attention recently are QNAP disk storage systems. QNAP released a patch in early October, but applying the patch is not automatic and far from trivial for many users[1]. Our reader Erichsubmitted a link to an interesting Pastebin post with code commonly used in these scans [2] The attack targets a QNAP CGI script, /cgi-bin/authLogin.cgi, a well known...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19061&rss
*** SoakSoak Malware Compromises 100,000+ WordPress Websites ***
---------------------------------------------
This Sunday has started with a bang. Google has blacklisted over 11,000 domains with this latest malware campaign from SoakSoak.ru: Our analysis is showing impacts in the order of 100s of thousands of WordPress specific websites. We cannot confirm the exact vector, but preliminary analysis is showing correlation with the Revslider vulnerability we reported a...
---------------------------------------------
http://blog.sucuri.net/2014/12/soaksoak-malware-compromises-100000-wordpres…
*** Man in the Middle attack vs. Cloudflares Universal SSL ***
---------------------------------------------
MitM attacks are a class of security attacks that involve the compromise of the authentication of a secure connection. In essence, an attacker builds a transparent tunnel between the client and the server, but makes sure that the client negotiates the secure connection with the attacker, instead of the intended server. Thus the client instead of having a secure connection to the server, has a secure connection to the attacker, which in turn has set up its own secure connection to the server, so...
---------------------------------------------
http://blog.ricardomacas.com/index.php?controller=post&action=view&id_post=4
*** 10th Annual ICS Security Summit - Orlando ***
---------------------------------------------
For SCADA, Industrial Automation, and Control System Security Join us for the 10th anniversary of the Annual SANS ICS Security Summit. The Summit is the premier event to attend in 2015 for ICS cybersecurity practitioners and managers. This years summit will feature hands-on training courses focused on Attacking and Defending ICS environments, Industry specific pre-summit events, and an action packed summit agenda with the release of ICS security tools and the popular security kit for Summit
---------------------------------------------
https://www.sans.org/event/ics-security-summit-2015
*** Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3009712) ***
---------------------------------------------
V3.0 (December 12, 2014): Rereleased bulletin to announce the reoffering of Microsoft security update 2986475 for Microsoft Exchange Server 2010 Service Pack 3. The rereleased update addresses a known issue in the original offering. Customers who uninstalled the original update should install the updated version of 2986475 at the earliest opportunity.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-075
*** Two newcomers in the exploit kit market ***
---------------------------------------------
Exploit kits are a great means to an end for malware distributors, who either buy them or rent them in order to widely disseminate their malicious wares. Its no wonder then that unscrupulous developers are always trying to enter the market currently cornered by Angler, Nuclear, FlashEK, Fiesta, SweetOrange, and others popular exploit kits.
---------------------------------------------
http://www.net-security.org/malware_news.php?id=2929
*** RSA Authentication Manager 8.0 / 8.1 Unvalidated Redirect ***
---------------------------------------------
Topic: RSA Authentication Manager 8.0 / 8.1 Unvalidated Redirect Risk: Low Text:ESA-2014-173: RSA Authentication Manager Unvalidated Redirect Vulnerability EMC Identifier: ESA-2014-173 CVE Identifier:...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120080
*** RSA Archer GRC Platform 5.x Cross Site Scripting ***
---------------------------------------------
Topic: RSA Archer GRC Platform 5.x Cross Site Scripting Risk: Low Text:ESA-2014-163: RSA Archer GRC Platform Multiple Vulnerabilities EMC Identifier: ESA-2014-163 CVE Identifier: See b...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120079
*** EMC Isilon InsightIQ Cross Site Scripting ***
---------------------------------------------
Topic: EMC Isilon InsightIQ Cross Site Scripting Risk: Low Text:ESA-2014-164: EMC Isilon InsightIQ Cross-Site Scripting Vulnerability EMC Identifier: ESA-2014-164 CVE Identifier: CVE-...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120078
*** Cisco Prime Security Manager Cross-Site Scripting Vulnerability ***
---------------------------------------------
CVE-2014-3364
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Soitec SmartEnergy 1.4 SCADA Login SQL Injection Authentication Bypass ***
---------------------------------------------
Topic: Soitec SmartEnergy 1.4 SCADA Login SQL Injection Authentication Bypass Risk: Medium Text:Soitec SmartEnergy 1.4 SCADA Login SQL Injection Authentication Bypass Exploit Vendor: Soitec Product web page: http://ww...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014120086
*** Multiple vulnerabilities in InfiniteWP Admin Panel ***
---------------------------------------------
InfiniteWP (http://www.infinitewp.com/) allows an administrator to manage multiple Wordpress sites from one control panel. According to the InfiniteWP homepage, it is used on over 317,000 Wordpress sites. The InfiniteWP Admin Panel contains a number of vulnerabilities that can be exploited by an unauthenticated remote attacker. These vulnerabilities allow taking over managed Wordpress sites by leaking secret InfiniteWP client keys, allow SQL injection, allow cracking of InfiniteWP admin
---------------------------------------------
http://seclists.org/fulldisclosure/2014/Dec/43
*** Bugtraq: Vulnerabilities in Ekahau Real-Time Location Tracking System [MZ-14-01] ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534241
*** [dos] - phpMyAdmin 4.0.x, 4.1.x, 4.2.x - DoS ***
---------------------------------------------
http://www.exploit-db.com/exploits/35539
*** Multiple vulnerabilities in BibTex Publications (si_bibtex) ***
---------------------------------------------
It has been discovered that the extension "BibTex Publications" (si_bibtex) is susceptible to Cross-Site Scripting and SQL Injection.
---------------------------------------------
http://www.typo3.org/news/article/multiple-vulnerabilities-in-bibtex-public…
*** Multiple vulnerabilities in Drag Drop Mass Upload (ameos_dragndropupload) ***
---------------------------------------------
It has been discovered that the extension "Drag Drop Mass Upload" (ameos_dragndropupload) is susceptible to Cross-Site Scripting, Cross-Site Request Forgery and Improper Access Control.
---------------------------------------------
http://www.typo3.org/news/article/improper-access-control-in-drag-drop-mass…
*** Security Advisory-SSLv3 POODLE Vulnerability in Huawei Products ***
---------------------------------------------
Dec 15, 2014 18:30
---------------------------------------------
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisor…
*** SEO Redirection <= 2.2 - Unauthenticated Stored XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7722
*** Lightbox Photo Gallery 1.0 - CSRF/XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7719
*** WP-FB-AutoConnect <= 4.0.5 - XSS/CSRF ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7721
*** Timed Popup <= 1.3 - CSRF & Stored XSS ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7720
*** Bugtraq: CVE-2014-2026 Reflected Cross-Site Scripting (XSS) in "Intrexx Professional" ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534230
*** Bugtraq: CVE-2014-2025 Remote Code Execution (RCE) in "Intrexx Professional" ***
---------------------------------------------
http://www.securityfocus.com/archive/1/534229
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 11-12-2014 18:00 − Freitag 12-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: Otmar Lendl
*** Archie and Astrum: New Players in the Exploit Kit Market ***
---------------------------------------------
Thu, 11 Dec 2014 17:10:55 +0200
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002776.html
*** Researcher: Lax Crossdomain Policy Puts Yahoo Mail At Risk ***
---------------------------------------------
A security researcher disclosed a problem with a loose cross-domain policy for Flash requests on Yahoo Mail that puts email content and contacts at risk.
---------------------------------------------
http://threatpost.com/researcher-lax-crossdomain-policy-puts-yahoo-mail-at-…
*** DSA-3098 graphviz - security update ***
---------------------------------------------
Joshua Rogers discovered a format string vulnerability in the yyerrorfunction in lib/cgraph/scan.l in Graphviz, a rich set of graph drawingtools. An attacker could use this flaw to cause graphviz to crash orpossibly execute arbitrary code.
---------------------------------------------
https://www.debian.org/security/2014/dsa-3098
*** ZDI-14-424: Honeywell OPOS Suite HWOPOSScale.ocx Open Method Stack Buffer Overflow Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell OPOS Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/8tlo_ZfI4BE/
*** ZDI-14-423: Honeywell OPOS Suite HWOPOSSCANNER.ocx Open Method Stack Buffer Overflow Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell OPOS Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/ZDVuupIJS6Q/
*** ZDI-14-422: ManageEngine NetFlow Analyzer CollectorConfInfoServlet COLLECTOR_ID Directory Traversal Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ManageEngine NetFlow Analyzer. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/sBfZBCsAKl4/
*** ZDI-14-421: ManageEngine Password Manager Pro UploadAccountActivities filename Directory Traversal Denial of Service Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of ManageEngine Password Manager Pro. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/agLsqjzz9u4/
*** ZDI-14-420: ManageEngine Desktop Central MSP NativeAppServlet UDID JSON Object Code Injection Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ManageEngine Desktop Central MSP. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/YGf1aa88_QM/
*** Targeted Phishing Against GoDaddy Customers ***
---------------------------------------------
I do get a lot of phishing emails, we all do, but as security professionals we tend to recognize them immediately. Either the syntax is wrong, or it's missing a name. When you get them from a bank you don't even deal with that's a pretty good clue. However, when the phishing is well doneRead More
---------------------------------------------
http://feedproxy.google.com/~r/sucuri/blog/~3/uan3MNQ2J9g/targeted-phishing…
*** Siemens SIMATIC WinCC, PCS7, and TIA Portal Vulnerabilities (Update B) ***
---------------------------------------------
This updated advisory is a follow-up to the updated advisory titled ICSA-14-329-02A Siemens SIMATIC WinCC, PCS7, and TIA Portal Vulnerabilities that was published December 2, 2014, on the NCCIC/ICS-CERT web site.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-329-02B
*** Wire transfer spam spreads Upatre ***
---------------------------------------------
The Microsoft Malware Protection Center (MMPC) is currently monitoring a spam email campaign that is using a wire transfer claim to spread Trojan:Win32/Upatre. It is important to note that customers running up-to-date Microsoft security software are protected from this threat. Additionally, customers with Microsoft Active Protection Service Community (MAPS) enabled also benefit from our cloud protection service. Upatre typically uses spam email campaigns to spread and then downloads other
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/12/11/wire-transfer-spam-sprea…
*** Digitaler Anschlag: Cyber-Attacke soll Ölpipeline zerstört haben ***
---------------------------------------------
Ein Cyber-Angriff soll 2008 die Explosion einer Ölpipeline in der Türkei verursacht haben, wie anonyme Quellen berichten. Es gibt dafür aber nur Indizien. (Cyberwar, Virus)
---------------------------------------------
http://www.golem.de/news/digitaler-anschlag-cyber-attacke-soll-oelpipeline-…
*** Cross-Signed Certificates Crashes Android ***
---------------------------------------------
We have discovered a vulnerability in Android that affects how cross-signed certificates are handled. No current Android release correctly handles these certificates, which are created when two certificates are signed with a looped certificate chain (certificate A signs certificate B; certificate B signs certificate A). We've already notified Google about this vulnerability, and there is no fix
Post from: Trendlabs Security Intelligence Blog - by Trend MicroCross-Signed
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/K85aQffE_W0/
*** Microsoft: Neues Zertifikats-Update, noch ein zurückgezogener Patch ***
---------------------------------------------
Microsoft hat ein neues Zertifikats-Update für Windows 7 und Server 2008 ausgeliefert, das die Update-Probleme beheben soll. In der Zwischenzeit musste allerdings der dritte Patch in wenigen Tagen zurückgezogen werden, da er Silverlight zerschossen hatte.
---------------------------------------------
http://www.heise.de/security/meldung/Microsoft-Neues-Zertifikats-Update-noc…
*** Office für Mac 2011: Microsoft beseitigt kritische Schwachstelle ***
---------------------------------------------
Das Update für die OS-X-Version der Büro-Suite soll eine Sicherheitslücke in Word beseitigen, die das Einschleusen und Ausführen von Schadcode erlaubt. Auch ein kleineres Problem wird behoben.
---------------------------------------------
http://www.heise.de/security/meldung/Office-fuer-Mac-2011-Microsoft-beseiti…
*** Microsoft pulls Patch Tuesday fix - "Outlook can't connect to Exchange" ***
---------------------------------------------
Part of Patch Tuesday is now only partly available as Microsoft recalls its already-delayed Exchange 2010 update. Paul Ducklin takes a look...
---------------------------------------------
http://feedproxy.google.com/~r/nakedsecurity/~3/pyrMdTGYdYo/
*** DFN-CERT-2014-1647/">MantisBT: Mehrere Schwachstellen ermöglichen das Ausführen beliebigen Programmcodes ***
---------------------------------------------
12.12.2014
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2014-1647/
*** OphionLocker: Joining in the Ransomware Race ***
---------------------------------------------
Fri, 12 Dec 2014 16:32:35 +0200
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002777.html
*** SSL-Lücke: Der POODLE beißt Windows Phone 7 ***
---------------------------------------------
Windows Phone 7 kann Mails nur mit dem uralten SSL-Protokoll Version 3 abholen. Das wird aber von vielen Mailservern wegen der POODLE-Lücke nicht mehr angeboten. Auf Abhilfe können Nutzer wohl nicht hoffen. (Windows Phone, E-Mail)
---------------------------------------------
http://www.golem.de/news/ssl-luecke-der-poodle-beisst-windows-phone-7-1412-…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 10-12-2014 18:00 − Donnerstag 11-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Critical vulnerability affecting HD FLV Player ***
---------------------------------------------
We've been notified of a critical vulnerability affecting the HD FLV Player plugin for Joomla!, WordPress and custom websites. It was silently patched on Joomla! and WordPress, leaving the custom website version vulnerable. Furthermore, websites ..
---------------------------------------------
http://blog.sucuri.net/2014/12/critical-vulnerability-in-joomla-hd-flv-play…
*** Underground black market: Thriving trade in stolen data, malware, and attack services ***
---------------------------------------------
The underground market is still booming after recent major data breaches. The price of stolen email accounts has dropped substantially, but the value of ..
---------------------------------------------
http://www.symantec.com/connect/blogs/underground-black-market-thriving-tra…
*** Odd new ssh scanning, possibly for D-Link devices, (Wed, Dec 10th) ***
---------------------------------------------
I noticed it in my own logs overnight and also had a couple of readers (both named Paul) report some odd new ssh scanning overnight. The scanning involves many sites, likely a botnet, attempting to ssh in as 3 users, D-Link, admin, ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=19055
*** Microsoft Enables Removal of SSL 3.0 Fallback In IE ***
---------------------------------------------
Microsoft has given Windows admins the option to remove the SSL 3.0 fallback from Internet Explorer. By disabling SSL 3.0, IE is no longer vulnerable to POODLE attacks.
---------------------------------------------
http://threatpost.com/microsoft-enables-removal-of-ssl-3-0-fallback-in-ie/1…
*** FreeBSD Buffer Overflow in libc stdio Lets Local Users Deny Service or Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1031343
*** FreeBSD file(1) and libmagic(3) File Processing Flaws Let Remote Users Deny Service ***
---------------------------------------------
http://www.securitytracker.com/id/1031344
*** WordPress Uninstall <= 1.1 - WordPress Deletion via CSRF ***
---------------------------------------------
https://wpvulndb.com/vulnerabilities/7715
*** Mysterious Turla Linux backdoor also for Solaris? ***
---------------------------------------------
There has been numerous reports about the mysterious Linux backdoor connected to Turla, an APT family. The malware has some pretty interesting features, the most interesting being its ability to sniff the network interface. More specifically, it ..
---------------------------------------------
https://www.f-secure.com/weblog/archives/00002775.html
*** Regin ***
---------------------------------------------
Wir haben in der Woche ab dem 24. November 2014 zum Thema Regin regelmässige Status-Updates an die GovCERT Constituency (in unserer Rolle als GovCERT Austria), die potentiell betroffenen Sektoren (im Rahmen des ATC) und den CERT-Verbund verschickt.Dieser Blogpost stellt unsere Timeline ..
---------------------------------------------
http://www.cert.at/services/blog/20141211105745-1339.html
*** Patch-Debakel: Microsoft zieht erneut Update zurück ***
---------------------------------------------
Nach einem fehlerhaften Rollup-Update für Exchange musste Microsoft nun auch einen Patch für die Root-Zertifikate in Windows zurückziehen. Probleme mit Updates und Patches hatte Microsoft in letzter Zeit des öfteren.
---------------------------------------------
http://www.heise.de/security/meldung/Patch-Debakel-Microsoft-zieht-erneut-U…
*** Cyber-Spionage: Auf Roter Oktober folgt Cloud Atlas ***
---------------------------------------------
Eine neue Angriffswelle mit gezielten Attacken droht: Cloud Atlas soll die nächste digitale Spionagekampagne sein. Die Malware sei eine aktualisierte Variante von Roter Oktober, sagen IT-Sicherheitsexperten.
---------------------------------------------
http://www.golem.de/news/cyber-spionage-auf-roter-oktober-folgt-cloud-atlas…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 09-12-2014 18:00 − Mittwoch 10-12-2014 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Adobe Security Bulletins Posted ***
---------------------------------------------
http://blogs.adobe.com/psirt/?p=1149
*** VMSA-2014-0013 ***
---------------------------------------------
VMware vCloud Automation Center product updates address a critical remote privilege escalation vulnerability. VMware vCloud Automation Center has a remote privilege escalation vulnerability. This issue may allow an authenticated vCAC user to obtain administrative access to vCenter Server.
---------------------------------------------
http://www.vmware.com/security/advisories/VMSA-2014-0013.html
*** MS14-DEC - Microsoft Security Bulletin Summary for December 2014 - Version: 1.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS14-DEC
*** Multiple vulnerabilities in SAP SQL Anywhere ***
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-415/http://www.zerodayinitiative.com/advisories/ZDI-14-414/http://www.zerodayinitiative.com/advisories/ZDI-14-413/http://www.zerodayinitiative.com/advisories/ZDI-14-412/
*** ZDI-14-411: Lexmark MarkVision Enterprise ReportDownloadServlet Information Disclosure Vulnerability ***
---------------------------------------------
The specific flaw exists within the ReportDownloadServlet class. The class contains a method that does not properly sanitize input allowing for directory traversal. An attacker can leverage this vulnerability to read files under the context of SYSTEM.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-411/
*** ZDI-14-410: Lexmark MarkVision Enterprise GfdFileUploadServlet Remote Code Execution Vulnerability ***
---------------------------------------------
The specific flaw exists within the GfdFileUploadServlet class. The class contains a method that does not properly sanitize input allowing for directory traversal. An attacker can leverage this vulnerability to write files under the context of SYSTEM and achieve remote code execution.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-14-410/
*** X Multiple Memory Corruption Flaws Let Remote Users Deny Service and Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1031326
*** Yokogawa FAST/TOOLS XML External Entity ***
---------------------------------------------
This advisory provides mitigation details for an XML external entity processing vulnerability in the Yokogawa FAST/TOOLS application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-343-01
*** Trihedral VTScada Integer Overflow Vulnerability ***
---------------------------------------------
This advisory provides mitigation details for an integer overflow vulnerability in Trihedral Engineering Ltd's VTScada application.
---------------------------------------------
https://ics-cert.us-cert.gov//advisories/ICSA-14-343-02
*** .Bank hires Symantec to check credentials ***
---------------------------------------------
Soon you might be able to trust that financial email The launch of new .bank domain names is one step closer with the announcement that Symantec has been chosen to act as the credentials verifier for the top-level domain ..
---------------------------------------------
http://www.theregister.co.uk/2014/12/10/bank_hires_symantec_to_check_creden…
*** Nach Hack: Sony-Sicherheitszertifikat zur Malware-Tarnung genutzt ***
---------------------------------------------
Es ist wohl der verheerendste Angriff auf die IT-Sicherheit eines Unternehmens, den es je gegeben hat. Seit Tagen tauchen immer neue interne Informationen aus dem Netzwerk von Sony Pictures auf. Neben bislang ..
---------------------------------------------
http://derstandard.at/2000009194439
*** Cloud Atlas: RedOctober APT is back in style ***
---------------------------------------------
Two years ago, we published our research into RedOctober, a complex cyber-espionage operation targeting diplomatic embassies worldwide. We named it RedOctober because we started this investigation in October 2012, an unusually hot month.
---------------------------------------------
http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-bac…
*** DFN-CERT-2014-1622: Red Hat Package Manager (RPM): Zwei Schwachstellen ermöglichen die Ausführung beliebiger Befehle ***
---------------------------------------------
Zwei Schwachstellen im Red Hat Package Manager (RPM) ermöglichen einem entfernten, nicht authentisierten Angreifer die Ausführung beliebiger Befehle während der Paketinstallation und damit die Übernahme des Systems. Die Schwachstelle ..
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2014-1622/
*** F5 BIG-IP SSLv3 Decoding Function Lets Remote Users Decrypt TLS Traffic ***
---------------------------------------------
A vulnerability was reported in F5 BIG-IP. A remote user can decrypt TLS sessions in certain cases. The system may accept incorrect TLS padding when terminating TLSv1 CBC connections. A remote user can with the ability to conduct a man-in-the-middle attack can force a client to use a vulnerable SSLv3 decoding function with TLS and then conduct a BEAST-style of attack to decrypt portions of the session.
---------------------------------------------
http://www.securitytracker.com/id/1031338
*** Link spoofing and cache poisoning vulnerabilities in TYPO3 CMS ***
---------------------------------------------
An attacker could forge a request, which modifies anchor only links on the homepage of a TYPO3 installation in a way that they point to arbitrary domains, if the ..
---------------------------------------------
http://www.typo3.org/news/article/link-spoofing-and-cache-poisoning-vulnera…
*** Störungen bei 1&1-Webhosting wegen DDos-Attacke ***
---------------------------------------------
Weil das DNS-System von 1&1 angegriffen wird, sind sowohl Webhosting als auch Mail von 1&1 zeitweise nicht über Domains erreichbar.
---------------------------------------------
http://www.heise.de/security/meldung/Stoerungen-bei-1-1-Webhosting-wegen-DD…
*** Sony Pictures wurde vor Angriff auf IT-Infrastruktur angeblich erpresst ***
---------------------------------------------
Die Umstände des Hacker-Angriffs auf Sony Pictures werden immer verwirrender. Eine Geldforderung legt einen kriminellen Hintergrund nahe. Zugleich fordern die Hacker aber angeblich auch, die Nordkorea-Komödie "The Interview" zu stoppen.
---------------------------------------------
http://www.heise.de/security/meldung/Sony-Pictures-wurde-vor-Angriff-auf-IT…
*** X.ORG: Wieder Jahrzente alte Lücken im X-Server ***
---------------------------------------------
Der X-Server ist von 13 Sicherheitslücken betroffen, die sich auf verschiedene Implementierungen auswirken können. Die älteste reicht fast 30 Jahre in die erste Version von X11 zurück. Andeutungen auf die Fehler gab es bereits auf dem 30C3 vor einem Jahr.
---------------------------------------------
http://www.golem.de/news/x-org-wieder-jahrzente-alte-luecken-im-x-server-14…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 05-12-2014 18:00 − Dienstag 09-12-2014 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Advance Notification Service for the December 2014 Security Bulletin Release ***
---------------------------------------------
Today, we provide advance notification for the release of seven Security Bulletins. Three of these updates are rated Critical and four are rated as Important in severity. These updates are for Microsoft Windows, Internet Explorer (IE), Office and Exchange. As per our monthly process, we've scheduled the Security Bulletin release for the second Tuesday of the month, December 9, 2014, at approximately 10 a.m. PDT. Until then, please review the ANS summary page for more information to help...
---------------------------------------------
http://blogs.technet.com/b/msrc/archive/2014/12/04/advance-notification-ser…
*** Leveraging the WordPress Platform for SPAM ***
---------------------------------------------
We've all seen WordPress comment and pingback spam, but thanks to strict moderation regimes and brilliant WordPress plugins that focus strictly on SPAM comments, comment spam isn't a major problem for most websites these days. I have seen however, a new trend starting to emerge when it comes to spam involving WordPress. In recent years...
---------------------------------------------
http://blog.sucuri.net/2014/12/leveraging-the-wordpress-platform-for-spam.h…
*** SSLv3: Kaspersky-Software hebelt Schutz vor Poodle-Lücke aus ***
---------------------------------------------
Das Paket Kaspersky Internet Security kann auch bei Browsern, die unsichere Verbindungen per SSLv3 nicht unterstützen, das veraltete Protokoll dennoch aktivieren. Patchen will das der Hersteller erst 2015, es gibt aber schon jetzt eine einfache Lösung.
---------------------------------------------
http://www.golem.de/news/sslv3-kaspersky-software-hebelt-schutz-vor-poodle-…
*** Sicherheitslücken: Java-Sandbox-Ausbrüche in Googles App Engine ***
---------------------------------------------
Ein Forscherteam hat diverse Möglichkeiten und Lücken gefunden, aus der Java-Sandbox von Googles App Engine auszubrechen. Dadurch seien sogar beliebige Systemaufrufe im darunter liegenden Betriebssystem möglich.
---------------------------------------------
http://www.golem.de/news/sicherheitsluecken-java-sandbox-ausbrueche-in-goog…
*** DNS-Server BIND, PowerDNS und Unbound droht Endlosschleife ***
---------------------------------------------
Eine Sicherheitslücke in den drei DNS-Servern kann dazu ausgenutzt werden, die Software lahmzulegen. Dazu muss ein Angreifer allerdings die Zonen manipulieren oder einen bösartigen DNS-Resolver einschleusen.
---------------------------------------------
http://www.heise.de/security/meldung/DNS-Server-BIND-PowerDNS-und-Unbound-d…
*** The Penquin Turla - A Turla/Snake/Uroburos Malware for Linux ***
---------------------------------------------
So far, every single Turla sample weve encountered was designed for the Microsoft Windows family, 32 and 64 bit operating systems. The newly discovered Turla sample is unusual in the fact that its the first Turla sample targeting the Linux operating system that we have discovered.
---------------------------------------------
https://securelist.com/blog/research/67962/the-penquin-turla-2/
*** Setting Up Your Gadgets Securely ***
---------------------------------------------
I'm sure that many of us will take home brand new iPhones and Android devices and set it up just the way we want our personal devices to be. We should take a minute to remember, however, that because these devices are so personal to us, the damage a hacked smartphone can do to is significant. Imagine what would happen if a hacker stole your personal data. We don't have to imagine, however, as this has happened to many users in 2014. At the very least, this is embarrassing to the user...
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/setting-up-your-…
*** Social Engineering improvements keep Rogues/FakeAV a viable scam ***
---------------------------------------------
The threat landscape has been accustomed to rogues for a while now. They've been rampant for the past few years and there likely isn't any end in sight to this scam. These aren't complex pieces of malware by any means and typically don't fool the average experienced user, but that's because they're aimed at the inexperienced user. We're going to take a look at some of the improvements seen recently in the latest round of FakeAVs that lead to their success.
---------------------------------------------
http://www.webroot.com/blog/2014/12/05/social-engineering-improvements-keep…
*** MediaWiki unspecified cross-site request forgery ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99151
*** MediaWiki unspecified code execution ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/99152
*** [Xen-announce] Xen Security Advisory 114 (CVE-2014-9065, CVE-2014-9066) - p2m lock starvation ***
---------------------------------------------
http://lists.xen.org/archives/html/xen-announce/2014-12/msg00001.html
*** [TYPO3-announce] Announcing TYPO3 CMS 6.2.8 LTS ***
---------------------------------------------
The TYPO3 Community has just released TYPO3 CMS version 6.2.8 LTS,
which is now ready for you to download. This version is maintenance releases and contains bug fixes. The packages can be downloaded here: http://typo3.org/download/
---------------------------------------------
http://typo3.org/news/article/typo3-cms-628-released/
*** Multiple vulnerabilities in extension phpMyAdmin (phpmyadmin) ***
---------------------------------------------
It has been discovered that the extension "phpMyAdmin" (phpmyadmin) is susceptible to Cross-Site Scripting, Denial of Service and Local File Inclusion.
---------------------------------------------
http://www.typo3.org/news/article/multiple-vulnerabilities-in-extension-php…