=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 06-04-2021 18:00 − Mittwoch 07-04-2021 18:00
Handler: Dimitri Robl
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Windows XP makes ransomware gangs work harder for their money ∗∗∗
---------------------------------------------
A recently created ransomware decryptor illustrates how threat actors have to support Windows XP, even when Microsoft dropped supporting it seven years ago.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/windows-xp-makes-ransomware-…
∗∗∗ Top Cybercriminal Gangs Are Using EtterSilent Maldoc Builder ∗∗∗
---------------------------------------------
A malicious document builder named EtterSilent is becoming popular amongst cybercriminals as the developers keep improving it in order to avoid being detected by security solutions.
---------------------------------------------
https://heimdalsecurity.com/blog/top-cybercriminal-gangs-are-using-ettersil…
∗∗∗ Malspam with Lokibot vs. Outlook and RFCs, (Tue, Apr 6th) ∗∗∗
---------------------------------------------
Couple of weeks ago, my phishing/spam trap caught an interesting e-mail carrying what turned out to be a sample of the Lokibot Infostealer.
---------------------------------------------
https://isc.sans.edu/diary/rss/27282
∗∗∗ WiFi IDS and Private MAC Addresses, (Wed, Apr 7th) ∗∗∗
---------------------------------------------
Nzyme does focus on WiFi-specific attacks, so it does not care about payload but inspects the 802.11 headers that escape traditional, wired IDSs.
---------------------------------------------
https://isc.sans.edu/diary/rss/27288
∗∗∗ New article: Dissecting the design and vulnerabilities in AZORult C&C panels ∗∗∗
---------------------------------------------
In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his teams findings related to the C&C design and some security issues they identified.
---------------------------------------------
https://www.virusbulletin.com/blog/2021/04/new-article-dissecting-design-an…
∗∗∗ Aurora campaign: Attacking Azerbaijan using multiple RATs ∗∗∗
---------------------------------------------
We identified a new Python-based RAT targeting Azerbaijan from the same threat actor we profiled a month ago.
---------------------------------------------
https://blog.malwarebytes.com/threat-analysis/2021/04/aurora-campaign-attac…
∗∗∗ Fake Trezor app steals more that $1 million worth of crypto coins ∗∗∗
---------------------------------------------
Several users of Trezor, a small hardware device that acts as a cryptocurrency wallet, have lost fortunes after being duped by a phishing app.
---------------------------------------------
https://blog.malwarebytes.com/social-engineering/2021/04/fake-trezor-app-st…
∗∗∗ White Hats Earn $440,000 for Hacking Microsoft Products on First Day of Pwn2Own 2021 ∗∗∗
---------------------------------------------
On the first day of the Pwn2Own 2021 hacking competition, participants earned more than half a million dollars, including $440,000 for demonstrating exploits against Microsoft products.
---------------------------------------------
https://www.securityweek.com/white-hats-earn-440000-hacking-microsoft-produ…
∗∗∗ New wormable Android malware poses as Netflix to hijack WhatsApp sessions ∗∗∗
---------------------------------------------
Users are lured in with the promise of a free premium subscription.
---------------------------------------------
https://www.zdnet.com/article/new-android-malware-poses-as-netflix-to-hijac…
∗∗∗ Flexible taxonomies and new software for the tag2domain project ∗∗∗
---------------------------------------------
Domain Names are the center piece of locating services on the internet and they can be used for a variety of purposes and services. Understanding the type of services a Domain Name offers is one of the key aspects of Internet Security.
---------------------------------------------
https://cert.at/en/blog/2021/4/flexible-taxonomies-and-new-software-for-the…
=====================
= Vulnerabilities =
=====================
∗∗∗ Notenmanipulation möglich: Große Schwachstelle in Lern-Software Moodle ∗∗∗
---------------------------------------------
Die freie Lernplattform Moodle wies über Jahre eine Sicherheitslücke auf, mit der Schüler unter anderem ihre Noten manipulieren konnten.
---------------------------------------------
https://www.golem.de/news/notenmanipulation-moeglich-grosse-schwachstelle-i…
∗∗∗ Upload beliebiger Dateien und Umgehung von .htaccess Regeln in Monospace Directus Headless CMS ∗∗∗
---------------------------------------------
Monospace Directus CMS Docker Images, welche Apache als Webserver mit lokalem Storage nutzen, sind von einer Schwachstelle betroffen, über die jeder authentifizierte Nutzer beliebige Dateien und Ordner hochladen kann. In unveränderter Standard-Konfiguration ist Directus somit anfällig für Remote Code Execution und Veränderung von Webserver .htaccess Regeln.
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/arbitrary-file-upload…
∗∗∗ SAP-Produkte: CISA warnt vor Gefahren durch verschleppte Sicherheitsupdates ∗∗∗
---------------------------------------------
Die CISA und Forscher von Onapsis warnen vor Angriffsmöglichkeiten auf SAP-Produkte über sechs ältere Schwachstellen. Updates sind teils schon lange verfügbar.
---------------------------------------------
https://heise.de/-6007209
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by openSUSE (chromium), Oracle (flatpak and kernel), Red Hat (virt:8.3 and virt-devel:8.3), and SUSE (gssproxy and xen).
---------------------------------------------
https://lwn.net/Articles/851868/
∗∗∗ Hitachi ABB Power Grids Multiple Products ∗∗∗
---------------------------------------------
This advisory contains mitigations for an Improper Input Validation vulnerability in some Hitachi ABB Power Grids products using IED 61850 interfaces.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-096-01
∗∗∗ Security Advisory - Pointer Double Free Vulnerability in Some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210407-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 02-04-2021 18:00 − Dienstag 06-04-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Malicious cheats for Call of Duty: Warzone are circulating online ∗∗∗
---------------------------------------------
The cheat is fake, but the malware it installs is the real thing.
---------------------------------------------
https://arstechnica.com/?p=1754269
∗∗∗ Telefonnummer, E-Mail: Bin ich im Facebook-Leak? ∗∗∗
---------------------------------------------
Auf verschiedenen Webseiten können Nutzer prüfen, ob sie zu den 533 Millionen Betroffenen des Facebook-Datenlecks gehören.
---------------------------------------------
https://www.golem.de/news/telefonnummer-e-mail-bin-ich-im-facebook-leak-210…
∗∗∗ Kryptomining: Coinhive-Skripte warnen vor sich selbst ∗∗∗
---------------------------------------------
Der Sicherheitsforscher Troy Hunt hat die Domains des Kryptominers Coinhive bekommen. Mit ihnen macht er auf Sicherheitsprobleme aufmerksam.
---------------------------------------------
https://www.golem.de/news/kryptomining-coinhive-skripte-warnen-vor-sich-sel…
∗∗∗ The leap of a Cycldek-related threat actor ∗∗∗
---------------------------------------------
The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.
---------------------------------------------
https://securelist.com/the-leap-of-a-cycldek-related-threat-actor/101243/
∗∗∗ From PowerShell to Payload: An Analysis of Weaponized Malware ∗∗∗
---------------------------------------------
John Hammond, security researcher with Huntress, takes a deep-dive into a stagers technical and coding aspects.
---------------------------------------------
https://threatpost.com/powershell-payload-analysis-malware/165188/
∗∗∗ YARA and CyberChef: ZIP, (Sun, Apr 4th) ∗∗∗
---------------------------------------------
When processing the result of "unzip" in CyberChef, for example with YARA rules, all files contained inside the ZIP file, are concatenated together.
---------------------------------------------
https://isc.sans.edu/diary/rss/27276
∗∗∗ Gigaset: Malware-Befall von Android-Geräten des Herstellers gibt Rätsel auf ∗∗∗
---------------------------------------------
Besitzer von Android-Smartphones von Gigaset kämpfen seit einigen Tagen mit Malware. Einiges deutet auf einen kompromittierten Update-Server als Quelle hin.
---------------------------------------------
https://heise.de/-6006464
∗∗∗ Man in the Terminal ∗∗∗
---------------------------------------------
By using path hijacking and modification on Unix-like machines, we can achieve pseudo-keylogging functionality by prioritizing malicious middleware binaries to record and transfer standard input/output streams.
---------------------------------------------
https://posts.specterops.io/man-in-the-terminal-65476e6165b9
∗∗∗ 2020 Phishing Trends With PDF Files ∗∗∗
---------------------------------------------
We analyzed recent phishing trends with PDF files and noted a dramatic increase in the practice, as well as five approaches popular with attackers.
---------------------------------------------
https://unit42.paloaltonetworks.com/phishing-trends-with-pdf-files/
∗∗∗ SAP issues advisory on the exploit of old vulnerabilities to target enterprise applications ∗∗∗
---------------------------------------------
New research also reveals that SAP vulnerabilities, on average, are weaponized in less than 72 hours.
---------------------------------------------
https://www.zdnet.com/article/sap-issues-advisory-on-vulnerable-application…
=====================
= Vulnerabilities =
=====================
∗∗∗ Vulnerability Spotlight: Out-of-bounds write vulnerabilities in Accusoft ImageGear ∗∗∗
---------------------------------------------
Cisco Talos recently discovered multiple out-of-bounds write vulnerabilities in Accusoft ImageGear that an adversary could exploit to corrupt memory on the targeted machine. The ImageGear library is a [...]
---------------------------------------------
https://blog.talosintelligence.com/2021/03/vuln-spotlight-accusoft-image-ge…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libxstream-java, php-nette, and smarty3), Fedora (curl, openssl, spamassassin, and webkit2gtk3), Mageia (ant, batik, kernel, kernel-linus, nodejs-chownr, nodejs-yargs-parser, python-bottle, and ruby-em-http-request), openSUSE (curl and OpenIPMI), and Red Hat (openssl).
---------------------------------------------
https://lwn.net/Articles/851640/
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium, netty, python-bleach, and python3.5), Fedora (libmediainfo, libzen, and mediainfo), Mageia (openssl), openSUSE (chromium), Red Hat (389-ds:1.4, flatpak, kernel, kernel-rt, kpatch-patch, libldb, and virt:rhel and virt-devel:rhel), and Ubuntu (python-django and ruby-rack).
---------------------------------------------
https://lwn.net/Articles/851772/
∗∗∗ Android Patchday April ∗∗∗
---------------------------------------------
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen oder Informationen offenzulegen.
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0344
∗∗∗ QTS 4.3.6.1620 Build 20210322 ∗∗∗
---------------------------------------------
Security Updates
Fixed a command injection vulnerability (CVE-2020-2509).
Fixed a vulnerability in Apache HTTP server (CVE-2020-9490).
---------------------------------------------
https://www.qnap.com/en/release-notes/qts/4.3.6.1620/20210322
∗∗∗ Shodan Verified Vulns 2021-04-01 ∗∗∗
---------------------------------------------
Der März verging Dank (?) den Exchange-Schachstellen wie im Flug und wir werfen entsprechend wieder einen Blick auf jene Schwachstellen, die Shodan in Österreich sieht. Mit Stand 2021-04-01 ergab sich Folgendes: Es ist also passiert! Mit einem Schlag sind die TLS-Schwachstellen (fast) vom Thron gestoßen – die Microsoft Exchange Lücken greifen nach der Spitze.
---------------------------------------------
https://cert.at/de/aktuelles/2021/4/shodan-verified-vulns-2021-04-01
∗∗∗ April 5, 2021 TNS-2021-07 [R1] Nessus 8.14.0 Fixes One Vulnerability ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2021-07
∗∗∗ Grafana vulnerability CVE-2019-15043 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K00843201
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 01-04-2021 18:00 − Freitag 02-04-2021 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ 5 steps to respond to a data breach ∗∗∗
---------------------------------------------
This blog was written by an independent guest blogger. You’ve just been breached. What do you do next? Depending on personality, preparation, and ability under crisis, there are a variety of responses to choose from, some effective and some not. Hopefully, you’re the rare breed who plans in advance how to respond. Even better if this planning includes how to prevent them. But to execute a logical, effective response, keep reading.
---------------------------------------------
https://cybersecurity.att.com/blogs/security-essentials/5-steps-to-respond-…
∗∗∗ VMware fixes authentication bypass in data center security software ∗∗∗
---------------------------------------------
VMware has addressed a critical vulnerability in the VMware Carbon Black Cloud Workload appliance that could allow attackers to bypass authentication after exploiting vulnerable servers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/vmware-fixes-authentication-…
∗∗∗ New ‘BazarCall’ Malware Uses Call Centers to Trick its Victims into Infecting Themselves ∗∗∗
---------------------------------------------
Today’s hackers have never been more old-fashioned – they are currently using a telephone call as a “brand new “technique to infect their victim’s devices.
---------------------------------------------
https://heimdalsecurity.com/blog/bazarcall-malware-uses-call-centers-to-tri…
∗∗∗ Browser lockers: extortion disguised as a fine ∗∗∗
---------------------------------------------
In this article we discuss browser lockers that mimic law enforcement websites.
---------------------------------------------
https://securelist.com/browser-lockers-extortion-disguised-as-a-fine/101735/
∗∗∗ Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting ∗∗∗
---------------------------------------------
A probabilistic graphical modeling framework used by Microsoft 365 Defender research and intelligence teams for threat actor tracking enables us to quickly predict the likely threat group responsible for an attack, as well as the likely next attack stages.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-…
∗∗∗ [SANS ISC] C2 Activity: Sandboxes or Real Victims? ∗∗∗
---------------------------------------------
I published the following diary on isc.sans.edu: “C2 Activity: Sandboxes or Real Victims?“: In my last diary, I mentioned that I was able to access screenshots exfiltrated by the malware sample. During the first analysis, there were approximately 460 JPEG files available. I continued to keep an eye on the [...]
---------------------------------------------
https://blog.rootshell.be/2021/04/02/sans-isc-c2-activity-sandboxes-or-real…
∗∗∗ A “txt file” can steal all your secrets ∗∗∗
---------------------------------------------
Recently, 360 Security Center’s threat monitoring platform has detected an email phishing attack. This attack uses a secret-stealing Trojan called Poulight.
---------------------------------------------
https://blog.360totalsecurity.com/en/a-txt-file-can-steal-all-your-secrets/
∗∗∗ Unpatched RCE Flaws Affect Tens of Thousands of QNAP SOHO NAS Devices ∗∗∗
---------------------------------------------
A pair of unpatched vulnerabilities in QNAP small office/home office (SOHO) network attached storage (NAS) devices could allow attackers to execute code remotely, according to a warning from security researchers at SAM Seamless Network.
---------------------------------------------
https://www.securityweek.com/unpatched-rce-flaws-affect-tens-thousands-qnap…
∗∗∗ Nine Critical Flaws in FactoryTalk Product Pose Serious Risk to Industrial Firms ∗∗∗
---------------------------------------------
Industrial automation giant Rockwell Automation on Thursday informed customers that it has patched nine critical vulnerabilities in its FactoryTalk AssetCentre product.
---------------------------------------------
https://www.securityweek.com/nine-critical-flaws-factorytalk-product-pose-s…
∗∗∗ Financial Sector Remains Most Targeted by Threat Actors: IBM ∗∗∗
---------------------------------------------
Organizations in the financial and insurance sectors were the most targeted by threat actors in 2020, continuing a trend that was first observed roughly five years ago, IBM Security reports.
---------------------------------------------
https://www.securityweek.com/financial-sector-remains-most-targeted-threat-…
∗∗∗ Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool ∗∗∗
---------------------------------------------
We review samples of recent Hancitor infections, share relatively new indicators and provide examples of an associated network ping tool.
---------------------------------------------
https://unit42.paloaltonetworks.com/hancitor-infections-cobalt-strike/
∗∗∗ The best laid plans or lack thereof: Security decision-making of different stakeholder groups. (arXiv:2104.00284v1 [cs.CR]) ∗∗∗
---------------------------------------------
Cyber security requirements are influenced by the priorities and decisions of a range of stakeholders. Board members and CISOs determine strategic priorities. Managers have responsibility for resource allocation and project management. Legal professionals concern themselves with regulatory compliance. Little is understood about how the security decision-making approaches of these different stakeholders contrast, and if particular groups of stakeholders have a better appreciation of security [...]
---------------------------------------------
http://arxiv.org/abs/2104.00284
∗∗∗ FBI-CISA Joint Advisory on Exploitation of Fortinet FortiOS Vulnerabilities ∗∗∗
---------------------------------------------
The Federal Bureau of Investigation (FBI) and CISA have released a Joint Cybersecurity Advisory (CSA) to warn users and administrators of the likelihood that advanced persistent threat (APT) actors are actively exploiting known Fortinet FortiOS vulnerabilities CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/04/02/fbi-cisa-joint-ad…
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Jabber for Windows DLL Preloading Vulnerability ∗∗∗
---------------------------------------------
Version: 1.2
Description: Added information about additional software fixes because of a regression that reintroduced this vulnerability in subsequent software versions.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated) ∗∗∗
---------------------------------------------
# Exploit Title: F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated)
# Exploit Author: Al1ex
# Vendor Homepage: https://www.f5.com/products/big-ip-services
# Version: 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2
# CVE : CVE-2021-22986
https://github.com/Al1ex/CVE-2021-22986
---------------------------------------------
https://www.exploit-db.com/exploits/49738
∗∗∗ K03009991: iControl REST unauthenticated remote command execution vulnerability CVE-2021-22986 ∗∗∗
---------------------------------------------
Indicators of compromise
Important: F5 last updated this section on March 26, 2021 at 5:45 PM Pacific time.
The information in this section is based on evidence that F5 has collected and believes to be reliable indicators of compromise. It is important to note that exploited systems may show different indicators, and a skilled attacker may be able to remove traces of their work. It is impossible to prove a device is not compromised; if you have any uncertainty, consider the device to be compromised.
---------------------------------------------
https://support.f5.com/csp/article/K03009991
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (busybox, ldb, openjpeg2, spamassassin, and underscore), Fedora (kernel, kernel-headers, and kernel-tools), Mageia (privoxy, python and python3, and rpm), openSUSE (ovmf, tar, and tomcat), SUSE (curl, firefox, OpenIPMI, and tomcat), and Ubuntu (openexr).
---------------------------------------------
https://lwn.net/Articles/851511/
∗∗∗ March 31, 2021 TNS-2021-05 [R1] Nessus 8.13.2 Fixes Multiple Third-party Vulnerabilities ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2021-05
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 31-03-2021 18:00 − Donnerstag 01-04-2021 18:00
Handler: Stephan Richter
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Sicherheitslücke: Datenleck bei Ubiquiti war deutlich umfassender ∗∗∗
---------------------------------------------
Laut einem Bericht konnten die Angreifer auf Quellcode und Credentials von Ubiquiti zugreifen. Der Netzwerkgerätehersteller widerspricht nicht.
---------------------------------------------
https://www.golem.de/news/sicherheitsluecke-datenleck-bei-ubiquiti-war-deut…
∗∗∗ Who Contains the Containers? ∗∗∗
---------------------------------------------
This is a short blog post about a research project I conducted on Windows Server Containers that resulted in four privilege escalations which Microsoft fixed in March 2021. In the post, I describe what led to this research, my research process, and insights into what to look for if you’re researching this area.
---------------------------------------------
https://googleprojectzero.blogspot.com/2021/04/who-contains-containers.html
∗∗∗ Changes in Sinkhole and Honeypot Report Types and Formats ∗∗∗
---------------------------------------------
Over the years, Shadowserver’s report list has grown considerably from when we originally started. When some of these reports were originally set up, the requirements were different to those needed today. We have therefore decided to implement changes with some of the existing report types, especially those related to our sinkholes and honeypots, as well as remove some legacy reports. Changes will come into effect on 2021-06-01.
---------------------------------------------
https://www.shadowserver.org/news/changes-in-sinkhole-and-honeypot-report-t…
∗∗∗ The Importance of Website Backups ∗∗∗
---------------------------------------------
Today is World Backup Day. This date was created to remind people of the importance of having backups set up for everything that matters. I am pretty sure your website falls into the category of precious digital assets
---------------------------------------------
https://blog.sucuri.net/2021/03/the-importance-of-website-backups.html
∗∗∗ Back in a Bit: Attacker Use of the Windows Background IntelligentTransfer Service ∗∗∗
---------------------------------------------
Microsoft introduced the Background Intelligent Transfer Service (BITS) with Windows XP to simplify and coordinate downloading and uploading large files. Applications and system components, most notably Windows Update, use BITS to deliver operating system and application updates so they can be downloaded with minimal user disruption. [...] As is the case with many technologies, BITS can be used both by legitimate applications and by attackers. When malicious applications create BITS jobs, files are downloaded or uploaded in the context of the service host process. This can be useful for evading firewalls that may block malicious or unknown processes, and it helps to obscure which application requested the transfer.
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2021/03/attacker-use-of-window…
∗∗∗ DoS-Lücke in Virtualisierungsplattform Citrix Hypervisor geschlossen ∗∗∗
---------------------------------------------
Abgesicherte Versionen von Citrix Hypervisor verhindern Zugriffe auf Host-Systeme.
---------------------------------------------
https://heise.de/-6003757
∗∗∗ Report: USB threats to ICS systems have nearly doubled ∗∗∗
---------------------------------------------
The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of disrupting those systems rose from 26% to 59% over the same period.
---------------------------------------------
https://www.tripwire.com/state-of-security/ics-security/report-usb-threats-…
∗∗∗ Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations. (arXiv:2103.17028v1 [cs.CR]) ∗∗∗
---------------------------------------------
The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. ---------------------------------------------
http://arxiv.org/abs/2103.17028
∗∗∗ Is your dishwasher trying to kill you? ∗∗∗
---------------------------------------------
Does every device in your home really need to be connected to the internet? And could it be turned against you?
---------------------------------------------
https://www.welivesecurity.com/2021/04/01/is-your-dishwasher-trying-kill-yo…
∗∗∗ CISA Releases Supplemental Direction on Emergency Directive for Microsoft Exchange Server Vulnerabilities ∗∗∗
---------------------------------------------
CISA has issued supplemental direction to Emergency Directive (ED) 21-02: Mitigate Microsoft Exchange On-Premises Product Vulnerabilities providing additional forensic triage and server hardening, requirements for federal agencies. Specifically, this update directs federal departments and agencies to run newly developed tools - Microsoft’s Test-ProxyLogon.ps1 script and Safety Scanner MSERT - to investigate whether their Microsoft Exchange [...]
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/03/31/cisa-releases-sup…
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-21-399: (0Day) D-Link DIR-882 HNAP Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-882 routers. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-399/
∗∗∗ Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 ∗∗∗
---------------------------------------------
On March 25, 2021, the OpenSSL Project released a security advisory, OpenSSL Security Advisory [25 March 2021], that disclosed two vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to use a valid non-certificate authority (CA) certificate to act as a CA and sign a certificate for an arbitrary organization, user or device, or to cause a denial of service (DoS) condition.This advisory will be updated as additional information becomes available.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco IOS XE Software Fast Reload Vulnerabilities ∗∗∗
---------------------------------------------
Version: 1.1
Description: Added Catalyst 3650 switches as affected products.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ SECURITY BULLETIN: March 2021 Security Bulletin for Trend Micro Apex One and Apex One as a Service ∗∗∗
---------------------------------------------
Trend Micro has released new patches for Trend Micro Apex One (On Premise) and Apex One as a Service (SaaS). These patches resolve multiple vulnerabilities related to improper access control and incorrect permission assignment privilege escalation as well as insecure file permissions.
---------------------------------------------
https://success.trendmicro.com/solution/000286019
∗∗∗ VMSA-2021-0005 ∗∗∗
---------------------------------------------
VMware Carbon Black Cloud Workload appliance update addresses incorrect URL handling vulnerability (CVE-2021-21982)
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0005.html
∗∗∗ VMSA-2021-0004.1 - VMware vRealize Operations updates address Server Side Request Forgery and Arbitrary File Write vulnerabilities (CVE-2021-21975, CVE-2021-21983) ∗∗∗
---------------------------------------------
2021-03-31: VMSA-2021-0004.1 - Updated advisory with information on vROps 7.0.0 workarounds.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2021-0004.html
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (underscore), Fedora (busybox, linux-firmware, and xmlgraphics-commons), Oracle (kernel and kernel-container), Slackware (curl and seamonkey), SUSE (firefox and opensc), and Ubuntu (spamassassin).
---------------------------------------------
https://lwn.net/Articles/851381/
∗∗∗ Rockwell Automation FactoryTalk AssetCentre ∗∗∗
---------------------------------------------
This advisory contains mitigations for OS Command Injection, Deserialization of Untrusted Data, SQL Injection, and Improperly Restricted Functions vulnerabilities in Rockwell Automation FactoryTalk AssetCentre automation software products.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-091-01
∗∗∗ Security Advisory - Out of Bounds Write Vulnerability in Huawei Smartphone ∗∗∗
---------------------------------------------
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210331…
∗∗∗ Security Advisory - Arbitrary Memory Write Vulnerability in Huawei Smart Phone ∗∗∗
---------------------------------------------
https://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210331…
∗∗∗ March 31, 2021 TNS-2021-06 [R1] Tenable.sc 5.18.0 Fixes One Third-party Vulnerability ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2021-06
∗∗∗ Atlassian Jira Software: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0334
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-03-2021 18:00 − Mittwoch 31-03-2021 18:00
Handler: Stephan Richter
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Financial Cyberthreats in 2020 ∗∗∗
---------------------------------------------
This research is a continuation of our annual financial threat reports providing an overview of the latest trends and key events across the financial threat landscape. The study covers the common phishing threats, along with Windows and Android-based financial malware.
---------------------------------------------
https://securelist.com/financial-cyberthreats-in-2020/101638/
∗∗∗ Ziggy Ransomware Gang Offers Refunds to Victims ∗∗∗
---------------------------------------------
Ziggy joins Fonix ransomware group and shuts down, with apologies to targets.
---------------------------------------------
https://threatpost.com/ziggy-ransomware-gang-offers-refund-to-victims/16512…
∗∗∗ 3MinMax Series Topic Review - Apple Acquisition ∗∗∗
---------------------------------------------
Apple devices are an entirely different platform than Windows, and there are many different considerations when preparing to acquire an Apple machine.
---------------------------------------------
https://www.sans.org/blog/3minmax-series-topic-review---apple-acquisition
∗∗∗ [SANS ISC] Quick Analysis of a Modular InfoStealer ∗∗∗
---------------------------------------------
This morning, an interesting phishing email landed in my spam trap. The mail was redacted in Spanish and, as usual, asked the recipient to urgently process the attached document.
---------------------------------------------
https://blog.rootshell.be/2021/03/31/sans-isc-quick-analysis-of-a-modular-i…
∗∗∗ Whistleblower: Ubiquiti Breach “Catastrophic” ∗∗∗
---------------------------------------------
On Jan. 11, Ubiquiti Inc. [NYSE:UI] — a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders and security cameras — disclosed that a breach involving a third-party cloud provider had exposed customer account credentials.
---------------------------------------------
https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrop…
∗∗∗ The Often-Overlooked Element of a Hack: Endpoints ∗∗∗
---------------------------------------------
It is Vital to Maintain Granular Visibility and Control Over Access Points to Establish Resilience
---------------------------------------------
https://www.securityweek.com/often-overlooked-element-hack-endpoints
∗∗∗ Vorsicht beim Fahrrad-Kauf: marti-bosom.de ist ein Fake-Shop! ∗∗∗
---------------------------------------------
Mit den wärmer werdenden Temperaturen beginnt die Fahrrad-Saison. Für viele ist es die Zeit, um sich ein neues Fahrrad zu kaufen. Aufgrund der anhaltenden Corona-Krise passiert das immer öfter online. Hier gilt es jedoch vorsichtig zu sein, da es auch in diesem Bereich betrügerische Fake-Shops gibt.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-beim-fahrrad-kauf-marti-bos…
∗∗∗ Ransomware: Why were now facing a perfect storm ∗∗∗
---------------------------------------------
Normalising the act of paying a ransom to cyber criminals does nothing to protect anyone against ransomware, warns report.
---------------------------------------------
https://www.zdnet.com/article/ransomware-why-were-now-facing-a-perfect-stor…
∗∗∗ Gaming mods, cheat engines are spreading Trojan malware and planting backdoors ∗∗∗
---------------------------------------------
Mods and cheat systems for games are being exploited to deploy information-stealing malware.
---------------------------------------------
https://www.zdnet.com/article/gaming-tools-backdoored-cheat-engines-are-now…
∗∗∗ BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection ∗∗∗
---------------------------------------------
Bluetooth Low Energy (BLE) has become one of the most popular wireless communication protocols and is used in billions of smart devices. Despite several security features, the hardware and software limitations of thesedevices makes them vulnerable to man-in-the-middle (MITM) attacks.
---------------------------------------------
http://arxiv.org/abs/2103.16235
=====================
= Vulnerabilities =
=====================
∗∗∗ Fake jQuery files infect WordPress sites with malware ∗∗∗
---------------------------------------------
Researchers have spotted counterfeit versions of the jQuery Migrate plugin injected on dozens of websites which contains obfuscated code to load malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fake-jquery-files-infect-wor…
∗∗∗ Angreifer könnten Admin-Zugangsdaten von VMware vRealize kopieren ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für die Management-Software für Cloud-Umgebungen vRealize Operations.
---------------------------------------------
https://heise.de/-6002805
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (curl, ldb, leptonlib, and linux-4.19), Fedora (busybox), Gentoo (openssl, redis, salt, and sqlite), Mageia (firefox, fwupd, glib2.0, python-aiohttp, radare2, thunderbird, and zeromq), openSUSE (firefox), SUSE (ovmf, tomcat, and zabbix), and Ubuntu (curl, lxml, and pygments).
---------------------------------------------
https://lwn.net/Articles/851269/
∗∗∗ Google Releases Security Updates for Chrome ∗∗∗
---------------------------------------------
Google has released Chrome version 89.0.4389.114 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/03/31/google-releases-s…
∗∗∗ SECURITY BULLETIN: March 2021 Security Bulletin for Trend Micro OfficeScan XG SP1 ∗∗∗
---------------------------------------------
https://success.trendmicro.com/solution/000286157
∗∗∗ Multiple dnsmasq vulnerabilities CVE-2020-25684, CVE-2020-25685, and CVE-2020-25686 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K98221124
∗∗∗ cURL: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0333
∗∗∗ Denial of Service in Rexroth ActiveMover using EtherNet/IP protocol ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-282922.html
∗∗∗ Denial of Service in Rexroth ActiveMover using Profinet protocol ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-637429.html
∗∗∗ SYSS-2021-006: SQL Injection-Schwachstelle in FireEye EX ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/syss-2021-006-sql-injection-schwachstelle-…
∗∗∗ SYSS-2021-005: SQL Injection-Schwachstelle in FireEye EX ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/syss-2021-005-sql-injection-schwachstelle-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-03-2021 18:00 − Dienstag 30-03-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Card Complete: Warnung vor täuschend echten Phishing-Mails ∗∗∗
---------------------------------------------
Es sind aktuell vermeintliche Mails von Card Complete im Umlauf, die täuschend echt aussehen.
---------------------------------------------
https://futurezone.at/digital-life/card-complete-warnung-vor-taeuschend-ech…
∗∗∗ IT-Sicherheitsexperte: "Bei den Exchange-Fällen waren wir am Limit" ∗∗∗
---------------------------------------------
Tim Philipp Schäfers hilft aktuell Firmen, Sicherheitslücken in Exchange zu schließen. Einige hätten Schäden recht einfach verhindern können, sagt er. Ein Interview von Moritz Tremmel
---------------------------------------------
https://www.golem.de/news/it-sicherheitsexperte-bei-den-exchange-faellen-wa…
∗∗∗ New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats ∗∗∗
---------------------------------------------
The March 2021 Security Signals report showed that more than 80% of enterprises have experienced at least one firmware attack in the past two years, but only 29% of security budgets are allocated to protect firmware.
---------------------------------------------
https://www.microsoft.com/security/blog/2021/03/30/new-security-signals-stu…
∗∗∗ Old TLS versions - gone, but not forgotten... well, not really "gone" either, (Tue, Mar 30th) ∗∗∗
---------------------------------------------
With the recent official deprecation of TLS 1.0 and TLS 1.1 by RFC 8996[1], a step, which has long been in preparation and which was preceded by many recommendations to discontinue the use of both protocols (as well as by the removal of support for them from all mainstream web browsers[2]), one might assume that the use of old TLS versions on the internet would have significantly decreased over the last few months. This has however not been the case.
---------------------------------------------
https://isc.sans.edu/diary/rss/27260
∗∗∗ You Just Received 25k USD in Your BTC Account! A Practical Phishing Defense Tutorial ∗∗∗
---------------------------------------------
>From time to time, we all receive some unexpected messages. Either through social media or email. Usually, these are harmless, meant to advertise a product or a service. However, sometimes they can be malicious, with an intent to steal our data and eventually our money, this is a so-called “phishing” attack.
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/you-just-re…
∗∗∗ Unfair exchange: ransomware attacks surge globally amid Microsoft Exchange Server vulnerabilities ∗∗∗
---------------------------------------------
Following the recent disclosure of vulnerabilities affecting Microsoft Exchange Servers, Check Point Research (CPR) has observed a global surge in the number of ransomware attacks. In fact, since the beginning of 2021, there has been a 9% increase monthly in organizations affected ransomware. This uptick includes a 57% increase in organizations affected by ransomware in the past 6 months.
---------------------------------------------
https://blog.checkpoint.com/2021/03/30/unfair-exchange-ransomware-attacks-s…
∗∗∗ Malicious commits found in PHP code repository: What you need to know ∗∗∗
---------------------------------------------
The PHP Git repository compromise is in the news. We break it down for you, and tell you what you need to know.
---------------------------------------------
https://blog.malwarebytes.com/hacking-2/2021/03/malicious-commits-found-in-…
∗∗∗ Akamai Sees Largest DDoS Extortion Attack Known to Date ∗∗∗
---------------------------------------------
Distributed denial of service (DDoS) attacks are growing bigger in volume, and they have also become more targeted and increasingly persistent, according to web security services provider Akamai.
---------------------------------------------
https://www.securityweek.com/akamai-sees-largest-ddos-extortion-attack-know…
∗∗∗ Kaufen Sie Corona-Tests nicht auf Kleinanzeigenplattformen ∗∗∗
---------------------------------------------
Durch die Initiative "Alles gurgelt" erhalten Wienerinnen und Wiener kostenlose PCR-Gurgeltests in allen Wiener BIPA-Filialen. Pro Person können bis zu 4 Selbsttests pro Woche abgeholt werden. Einige versuchen sich mit diesem Angebot jedoch ein kleines Taschengeld dazu zu verdienen und bieten die Gratis-Tests in Kleinanzeigenportalen an. Die Stadt Wien rät davon ab, die kostenlosen Tests auf Kleinanzeigenportalen zu kaufen.
---------------------------------------------
https://www.watchlist-internet.at/news/kaufen-sie-corona-tests-nicht-auf-kl…
∗∗∗ Attack landscape update: Ransomware 2.0, automated recon, and supply chain attacks ∗∗∗
---------------------------------------------
Data-stealing ransomware attacks, information harvesting malware, and supply chain attacks are some of the critical threats facing organizations highlighted in F-Secure's latest attack landscape update.
---------------------------------------------
https://blog.f-secure.com/attack-landscape-update-h1-2021/
=====================
= Vulnerabilities =
=====================
∗∗∗ Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability ∗∗∗
---------------------------------------------
Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an [...]
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ ArcGIS general raster security update ∗∗∗
---------------------------------------------
Multiple vulnerabilities have been identified when processing specially crafted files that may allow arbitrary code execution in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier). Esri has released updates for the affected products that resolve the high-risk vulnerabilities here.
---------------------------------------------
https://www.esri.com/arcgis-blog/products/arcgis/administration/security-ad…
∗∗∗ Xen Security Advisory CVE-2021-28688 / XSA-371 - Linux: blkback driver may leak persistent grants ∗∗∗
---------------------------------------------
A malicious or buggy frontend driver may be able to cause resource leaks from the corresponding backend driver. This can result in a host-wide Denial of Sevice (DoS).
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-371.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (lxml), Fedora (openssl, pdfbox, rpm, and rubygem-kramdown), openSUSE (eclipse), Oracle (flatpak and openssl), Red Hat (curl, kernel, kpatch-patch, mariadb, nss-softokn, openssl, perl, and tomcat), and SUSE (firefox, ovmf, and tar).
---------------------------------------------
https://lwn.net/Articles/851164/
∗∗∗ Citrix Hypervisor Security Update ∗∗∗
---------------------------------------------
Two security issues have been identified in Citrix Hypervisor (formerly Citrix XenServer) that may allow privileged code in a guest VM to cause the host to crash or become unresponsive.
These issues affect all currently supported versions of Citrix Hypervisor up to and including Citrix Hypervisor 8.2 LTSR.
---------------------------------------------
https://support.citrix.com/article/CTX306565
∗∗∗ Red Hat Enterprise Linux: Schwachstelle ermöglicht Manipulation von Dateien ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0327
∗∗∗ Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0325
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 26-03-2021 18:00 − Montag 29-03-2021 18:00
Handler: Dimitri Robl
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Git-Hosting: Angriff auf PHPs Code-Repository ∗∗∗
---------------------------------------------
Im Git-Repository von PHP wurden zwei Hintertüren eingefügt. Als Konsequenz will man den Code künftig nicht mehr selbst hosten.
---------------------------------------------
https://www.golem.de/news/git-hosting-angriff-auf-phps-code-repository-2103…
∗∗∗ Spyware: Android-Malware gibt sich als Systemupdate aus ∗∗∗
---------------------------------------------
Über den Trojaner, der sich als Android-Update ausgibt, lassen sich die betroffenen Geräte komplett übernehmen.
---------------------------------------------
https://www.golem.de/news/spyware-android-malware-gibt-sich-als-systemupdat…
∗∗∗ Here Are the Free Ransomware Decryption Tools You Need to Use [2021 Updated] ∗∗∗
---------------------------------------------
If your network gets infected with ransomware, follow the steps below to recover essential data: Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will give you access to your data. Step 2: Find any available backups you have, and consider keeping your data backups in secure, off-site locations. Step [...]
---------------------------------------------
https://heimdalsecurity.com/blog/ransomware-decryption-tools/
∗∗∗ Malware Analysis with elastic-agent and Microsoft Sandbox, (Fri, Mar 26th) ∗∗∗
---------------------------------------------
Microsoft describes the "Windows Sandbox supports simple configuration files, which provide a minimal set of customization parameters for Sandbox. [...] Windows Sandbox configuration files are formatted as XML and are associated with Sandbox via the .wsb file extension."[6]
---------------------------------------------
https://isc.sans.edu/diary/rss/27248
∗∗∗ [SANS ISC] Jumping into Shellcode ∗∗∗
---------------------------------------------
I published the following diary on isc.sans.edu: “Jumping into Shellcode“: Malware analysis is exciting because you never know what you will find. In previous diaries, I already explained why it’s important to have a look at groups of interesting Windows API call to detect some behaviors. The classic example is code [...]
---------------------------------------------
https://blog.rootshell.be/2021/03/29/sans-isc-jumping-into-shellcode/
∗∗∗ Analyzing And Micropatching With Tetrane REVEN (Part 1, CVE-2021-26897) ∗∗∗
---------------------------------------------
March 2021 Windows Updates included fixes for seven vulnerabilities in Windows DNS Server, two of which were marked by Microsoft as "Exploitation More Likely": CVE-2021-26877 and CVE-2021-26897. They were not known to be exploited and no details were publicly available until security researchers Eoin Carroll and Kevin McGrath published their analysis on McAfee Labs blog. Their article included enough information for us to reproduce both vulnerabilities, [...]
---------------------------------------------
https://blog.0patch.com/2021/03/analyzing-and-micropatching-with.html
∗∗∗ Hades Ransomware Hits Big Firms, but Operators Slow to Respond to Victims ∗∗∗
---------------------------------------------
Researchers from CrowdStrike, Accenture, and Awake Security have dissected some of the attacks involving the Hades ransomware and published information on both the malware itself and the tactics, techniques and procedures (TTPs) employed by its operators.
---------------------------------------------
https://www.securityweek.com/hades-ransomware-hits-big-firms-operators-slow…
∗∗∗ Threat Assessment: Matrix Ransomware ∗∗∗
---------------------------------------------
We provide an overview of the Matrix ransomware family and offer indicators of compromise in this companion to the Unit 42 Ransomware Threat Report.
---------------------------------------------
https://unit42.paloaltonetworks.com/matrix-ransomware/
∗∗∗ Sodinokibi (aka REvil) Ransomware ∗∗∗
---------------------------------------------
Intro Sodinokibi (aka REvil) has been one of the most prolific ransomware as a service (RaaS) groups over the last couple years. The ransomware family was purported to be behind [...]
---------------------------------------------
https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
=====================
= Vulnerabilities =
=====================
∗∗∗ Exchange Server Post-Compromise Attack Activity Shared by Microsoft ∗∗∗
---------------------------------------------
In the context of ongoing Exchange Server attacks, Microsoft has shared information detailing post-compromise activity which has infected vulnerable targets with ransomware and a botnet.
---------------------------------------------
https://heimdalsecurity.com/blog/exchange-server-post-compromise-attack-act…
∗∗∗ Sicherheitslücke: npm-Paket Netmask ignoriert das Oktalsystem in IP-Adressen ∗∗∗
---------------------------------------------
Die verbreitete Library wertet Oktalzahlen nicht korrekt aus und interpretiert dadurch unter anderem private Adressen potenziell als öffentlich und umgekehrt.
---------------------------------------------
https://heise.de/-6000759
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (awstats, busybox, dotnet-runtime, dotnet-runtime-3.1, dotnet-sdk, dotnet-sdk-3.1, gitlab, godot, groovy, libebml, mkinitcpio-busybox, openssl, python2, vivaldi, webkit2gtk, and wpewebkit), CentOS (firefox and thunderbird), Debian (pygments, spamassassin, thunderbird, and webkit2gtk), Fedora (CGAL, dotnet3.1, dotnet5.0, firefox, kernel, qt, and xen), Mageia (imagemagick, jackson-databind, openscad, redis, and unbound), openSUSE [...]
---------------------------------------------
https://lwn.net/Articles/851061/
∗∗∗ Newly-Discovered Vulnerabilities Could Allow for Bypass of Spectre Mitigations in Linux ∗∗∗
---------------------------------------------
Bugs could allow a malicious user to access data belonging to other users.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/sp…
∗∗∗ Philips Gemini PET/CT Family ∗∗∗
---------------------------------------------
This advisory contains mitigations for a Storage of Sensitive Data in a Mechanism Without Access Control vulnerability in Philips Gemini PET/CT Family scanners.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-21-084-01
∗∗∗ Weintek EasyWeb cMT ∗∗∗
---------------------------------------------
This advisory contains mitigations for Code Injection, Improper Access Control, and Cross-site Scripting vulnerabilities in Weintek EasyWeb cMT human-machine interface (HMI) products.
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-21-082-01
∗∗∗ Apple Security Updates March 26 2021 - Possible in the Wild Exploitation ∗∗∗
---------------------------------------------
Apple has published security updates for iOS, iOS and iPadOS, and watchOS. The updates all address the same, single vulnerability, in WebKit. The vulnerability may have been exploited in the wild.
---------------------------------------------
https://exchange.xforce.ibmcloud.com/collection/f7a453892e4d0d7f1e0a77077ea…
∗∗∗ CVE-2021-25646: Getting Code Execution on Apache Druid ∗∗∗
---------------------------------------------
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Pengsu Cheng and Prosenjit Sinha of the Trend Micro Research Team detail a recent code execution vulnerability in the Apache Druid database. The bug was originally discovered and reported by Litch1 from the Security Team of Alibaba Cloud. The following is a portion of their write-up covering CVE-2021-25646, with a few minimal modifications.
---------------------------------------------
https://www.thezdi.com/blog/2021/3/25/cve-2021-25646-getting-code-execution…
∗∗∗ [webapps] WordPress Plugin WP Super Cache 1.7.1 - Remote Code Execution (Authenticated) ∗∗∗
---------------------------------------------
https://www.exploit-db.com/exploits/49718
∗∗∗ OpenSSL vulnerability CVE-2021-3449 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K83623027
∗∗∗ OpenSSL vulnerability CVE-2021-3450 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K52171694
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-03-2021 18:00 − Freitag 26-03-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ FBI exposes weakness in Mamba ransomware, DiskCryptor ∗∗∗
---------------------------------------------
An alert from the U.S. Federal Bureau of Investigation about Mamba ransomware reveals a weak spot in the encryption process that could help targeted organizations recover from the attack without paying the ransom.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fbi-exposes-weakness-in-mamb…
∗∗∗ Office macro execution evidence, (Fri, Mar 26th) ∗∗∗
---------------------------------------------
Microsoft Office Macros continue to be the security nightmare that they have been for the past 3 decades. System and security admins everywhere continue to try to protect their users from prevalent macro malware, but they find Microsoft's tooling often less than helpful.
---------------------------------------------
https://isc.sans.edu/diary/rss/27244
∗∗∗ New 5G Flaw Exposes Priority Networks to Location Tracking and Other Attacks ∗∗∗
---------------------------------------------
New research into 5G architecture has uncovered a security flaw in its network slicing and virtualized network functions that could be exploited to allow data access and denial of service attacks between different network slices on a mobile operators 5G network. AdaptiveMobile shared its findings with the GSM Association (GSMA) on February 4, 2021, following which the weaknesses were [...]
---------------------------------------------
https://thehackernews.com/2021/03/new-5g-flaw-exposes-priority-networks.html
∗∗∗ Perkiler malware turns to SMB brute force to spread ∗∗∗
---------------------------------------------
Perkiler is now using SMB brute force attacks to spread. Which is not a new concept, but why attack SMB instead of RDP?
---------------------------------------------
https://blog.malwarebytes.com/trojans/2021/03/perkiler-malware-turns-to-smb…
∗∗∗ Dumping LSASS in memory undetected using MirrorDump ∗∗∗
---------------------------------------------
As I am sure some of you are aware from the occasional ramblings and screenshots on twitter, I am a big fan of .NET based offensive tooling. Not because [...]
---------------------------------------------
https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undet…
∗∗∗ 20 Million Miners: Finding Malicious Cryptojacking Images in Docker Hub ∗∗∗
---------------------------------------------
Container images are a simple way to distribute software - including malicious cryptojacking images attackers use to distribute cryptominers.
---------------------------------------------
https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/
∗∗∗ Exchange Server attacks: Microsoft shares intelligence on post-compromise activities ∗∗∗
---------------------------------------------
If youre cleaning up a infected Exchange server, you need to look for traces of multiple threats, warns Microsoft.
---------------------------------------------
https://www.zdnet.com/article/exchange-server-attacks-microsoft-shares-inte…
∗∗∗ Aktuelle Information zu den ProxyLogon Exchange Schwachstellen in Österreich ∗∗∗
---------------------------------------------
TL;DR 254 Exchange Server nach wie vor ungepatcht (Stand: 2021-03-26). Am 18. März waren es noch 839.
Von 23. März bis 26.März wurden insgesamt 437 Webshells in Österreich gefunden.
Die Patch-Rate hat etwas abgenommen. Wir sehen die übliche exponentielle Abnahme der verwundbaren Systeme.
Allerdings dürfte die ab 18. März durch Microsoft Defender automatisch durchgeführte Mitigation ihren Zweck erfüllt haben.
---------------------------------------------
https://cert.at/de/aktuelles/2021/3/aktuelle-zahlen-zu-den-proxylogon-excha…
∗∗∗ PsExec Privilege Escalation in Windows Fixed ∗∗∗
---------------------------------------------
A component of Microsofts Sysinternals utility was found in January 2021 to be vulnerable to privilege escalation. According to the release notes from Microsoft: "This update to PsExec mitigates named pipe squatting attacks that can be leveraged by an attacker to intercept credentials or elevate to System privilege.
---------------------------------------------
https://exchange.xforce.ibmcloud.com/collection/e97cd1b85394822631fcc1589f7…
=====================
= Vulnerabilities =
=====================
∗∗∗ Microsoft releases Windows 10 SSU to fix security update issue ∗∗∗
---------------------------------------------
Microsoft has released the Windows 10 1909 KB5000850 cumulative update preview and a new KB5001205 Servicing Stack Update that resolves a Secure Boot vulnerability.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-…
∗∗∗ Another Critical RCE Flaw Discovered in SolarWinds Orion Platform ∗∗∗
---------------------------------------------
IT infrastructure management provider SolarWinds on Thursday released a new update to its Orion networking monitoring tool with fixes for four security vulnerabilities, counting two weaknesses that could be exploited by an authenticated attacker to achieve remote code execution (RCE). Chief among them is a JSON deserialization flaw that allows an authenticated user to execute arbitrary code via [...]
---------------------------------------------
https://thehackernews.com/2021/03/solarwinds-orion-vulnerability.html
∗∗∗ Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 ∗∗∗
---------------------------------------------
On March 25, 2021, the OpenSSL Project released a security advisory, OpenSSL Security Advisory [25 March 2021], that disclosed two vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to use a valid non-certificate authority (CA) certificate to act as a CA and sign a certificate for an arbitrary organization, user or device, or to cause a denial of service (DoS) condition. This advisory will be updated as additional information becomes available.
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Sicherheitsupdates: Angreifer könnten Samba-LDAP-Server crashen ∗∗∗
---------------------------------------------
Mehrere Schwachstellen in Samba gefährden Systeme. Abgesicherte Versionen stehen zum Download bereit.
---------------------------------------------
https://heise.de/-5999401
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr, jquery, openssl, and thunderbird), openSUSE (openssl-1_1 and tor), Oracle (firefox and thunderbird), Scientific Linux (firefox and thunderbird), SUSE (libzypp, zypper and openssl-1_1), and Ubuntu (firefox, ldb, openssl, and ruby2.0).
---------------------------------------------
https://lwn.net/Articles/850703/
∗∗∗ Synology-SA-21:13 Samba AD DC ∗∗∗
---------------------------------------------
Multiple vulnerabilities allow remote attackers and remote authenticated users to conduct denial-of-service attacks via a susceptible version of Synology Directory Server.
---------------------------------------------
https://www.synology.com/en-global/support/security/Synology_SA_21_13
∗∗∗ Security Advisory - Denial of Service Vulnerability in Huawei Product ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2021/huawei-sa-20210324-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM License Metric Tool v9. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Security vulnerabilities in Java SE affects Rational Build Forge ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in node.js may affect configuration editor used in IBM Business Automation Workflow and IBM Business Process Manager (BPM) – CVE-2020-1971, CVE-2020-8265, CVE-2020-8287 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: A vulnerability in IBM Java SDK affects IBM License Metric Tool v9 (CVE-2020-14782). ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
∗∗∗ Intel Ethernet Controller vulnerabilities CVE-2020-24497, CVE-2020-24498, CVE-2020-24500, CVE-2020-24501, and CVE-2020-24505 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K85738358
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-03-2021 18:00 − Donnerstag 25-03-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Cisco fixt Remote-Lücken in Jabber-Clients für Windows, macOS & mobile Systeme ∗∗∗
---------------------------------------------
Ein Update schließt teils als kritisch eingestufte Einfallstore in Ciscos Jabber-Client für Win, macOS, Android & iOS. Auch weitere Produkte erhielten Updates.
---------------------------------------------
https://heise.de/-5997987
∗∗∗ IETF erklärt TLS-Urväter 1.0 und 1.1 als veraltet ∗∗∗
---------------------------------------------
Schwache Kryptografie und reichlich Sicherheitslücken haben zum Ende von TLS 1.0 und 1.1 geführt.
---------------------------------------------
https://heise.de/-5997963
∗∗∗ Fleeceware lockt in Abofallen ∗∗∗
---------------------------------------------
Forscher von Avast haben Hunderte von Fleeceware-Mobilfunk-Apps auf Google Play und im Apple App Store entdeckt, mit denen ihre Entwickler Millionen von Dollar verdienen.
---------------------------------------------
https://www.zdnet.de/88394043/fleeceware-lockt-in-abofallen/
∗∗∗ QNAP warns of ongoing brute-force attacks against NAS devices ∗∗∗
---------------------------------------------
QNAP warns customers of ongoing attacks targeting QNAP NAS (network-attached storage) devices and urges them to immediately take action to mitigate them.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/qnap-warns-of-ongoing-brute-…
∗∗∗ Threat landscape for industrial automation systems. Statistics for H2 2020 ∗∗∗
---------------------------------------------
We continued our observations and identified a number of trends that could, in our opinion, be due to circumstances connected with the pandemic in one way or another, as well as the reaction of governments, organizations and people to these circumstances.
---------------------------------------------
https://securelist.com/threat-landscape-for-industrial-automation-systems-s…
∗∗∗ Microsoft Exchange Vulnerability (CVE-2021-26855) Scan Analysis ∗∗∗
---------------------------------------------
On March 2, 2021, Microsoft disclosed a remote code execution vulnerability in Microsoft Exchange server[1]. We customized our Anglerfish honeypot to simulate and deploy Microsoft Exchange honeypot plug-in on March 3, and soon we started to see a large amount of related data, so far, we have already [...]
---------------------------------------------
https://blog.netlab.360.com/microsoft-exchange-vulnerability-cve-2021-26855…
∗∗∗ From Creative Password Hashes to Administrator: Gone in 60 Seconds (Or Thereabouts) ∗∗∗
---------------------------------------------
Picture the scene, you’re on an application penetration test (as a normal user) and you’ve managed to bag yourself some password hashes from the application. This can happen in various ways but in my experience, this is often the result of either a SQL injection vulnerability (resulting in the dumping of the users table) or finding that the application (or associated API) spits these hashes out in responses (because they are only hashes and what could go wrong!?).
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-creati…
∗∗∗ Recently Patched Vulnerability in Thrive Themes Actively Exploited in the Wild ∗∗∗
---------------------------------------------
On March 23, 2021, the Wordfence Threat Intelligence Team discovered two recently patched vulnerabilities being actively exploited in Thrive Theme’s "Legacy" Themes and Thrive Theme plugins that were chained together to allow unauthenticated attackers to upload arbitrary files on vulnerable WordPress sites. We estimate that more than 100,000 WordPress sites are using Thrive Theme products [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/03/recently-patched-vulnerability-in-th…
∗∗∗ Mamba Ransomware Leverages DiskCryptor for Encryption, FBI Warns ∗∗∗
---------------------------------------------
The Federal Bureau of Investigation (FBI) this week published an alert to warn of the fact that the Mamba ransomware is abusing the DiskCryptor open source tool to encrypt entire drives, including the operating system.
---------------------------------------------
https://www.securityweek.com/mamba-ransomware-leverages-diskcryptor-encrypt…
∗∗∗ Webshells Observed in Post-Compromised Exchange Servers ∗∗∗
---------------------------------------------
CISA has added two new Malware Analysis Reports (MARs) to Alert AA21-062A: Mitigate Microsoft Exchange Server Vulnerabilities. Each new MAR (AR21-084A and AR21-084B) identifies a webshell observed in post-compromised Microsoft Exchange Servers. After successful exploiting a Microsoft Exchange Server vulnerability for initial accesses, a malicious cyber actor can upload a webshell to enable remote administration of the affected system.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2021/03/25/webshells-observe…
=====================
= Vulnerabilities =
=====================
∗∗∗ Kryptobibliothek: OpenSSL-Lücke in Zertifikatschecks ∗∗∗
---------------------------------------------
Ein Fehler von OpenSSL bei der Zertifikatsvalidierung betrifft nur wenige Anwendungen, ein weiterer Bug lässt Server abstürzen.
---------------------------------------------
https://www.golem.de/news/kryptobibliothek-openssl-luecke-in-zertifikatsche…
∗∗∗ SAP® Privilege Escalation durch ABAP Code Injection in SAP® Business Warehouse ∗∗∗
---------------------------------------------
Dieser Blogpost soll einen Überblick über eine kritische ABAP Code Injection-Schwachstelle innerhalb des Funktionsbausteins RSDMD_BATCH_CALL im SAP® Business Warehouse geben und dessen Auswirkungen verdeutlichen.
---------------------------------------------
https://sec-consult.com/de/blog/detail/privilege-escalation-abap-code-injec…
∗∗∗ Two Vulnerabilities Patched in Facebook for WordPress Plugin ∗∗∗
---------------------------------------------
On December 22, 2020, our Threat Intelligence team responsibly disclosed a vulnerability in Facebook for WordPress, formerly known as Official Facebook Pixel, a WordPress plugin installed on over 500,000 sites. This flaw made it possible for unauthenticated attackers with access to a site’s secret salts and keys to achieve remote code execution through a deserialization [...]
---------------------------------------------
https://www.wordfence.com/blog/2021/03/two-vulnerabilities-patched-in-faceb…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr and lxml), Fedora (jasper), openSUSE (gnutls, hawk2, ldb, libass, nghttp2, and ruby2.5), Oracle (pki-core:10.6), Red Hat (firefox and thunderbird), SUSE (evolution-data-server, ldb, python3, and zstd), and Ubuntu (ldb, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-signed, linux-snapdragon, and linux, linux-lts-xenial).
---------------------------------------------
https://lwn.net/Articles/850498/
∗∗∗ Intel Ethernet controller vulnerabilities CVE-2020-24492, CVE-2020-24493, CVE-2020-24494, CVE-2020-24495, CVE-2020-24496 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K91610944?utm_source=f5support&utm_mediu…
∗∗∗ Red Hat OpenShift: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K21-0308
∗∗∗ Security Bulletin: IBM Cloud Pak for Integration is vulnerable to Go vulnerabilities (CVE-2020-28851 and CVE-2020-28852) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-integra…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Operations Dashboard is vulnerable to Go vulnerabilities (CVE-2021-3114 and CVE-2021-3115) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-operations-dashboard-is-v…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM® SDK, Java™ Technology Edition affect IBM Operational Decision Manager (Oct 2020 and Jan 2021 CPUs) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability affects Watson Explorer Foundational Components (CVE-2020-1971) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-affects-wat…
∗∗∗ Security Bulletin: App Connect for Manufacturing 2.0 is affected by vulnerabilities of log4j 1.2.17 – Log4j Deserialization Remote Code Execution (CVE-2019-17571) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-app-connect-for-manufactu…
∗∗∗ Security Bulletin: IBM Cloud Pak for Integration is vulnerable to Node.js vulnerabilities (CVE-2020-1971, CVE-2020-8265, and CVE-2020-8287) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-pak-for-integra…
∗∗∗ Security Bulletin: A security vulnerability has been identified in Xstream, which is a required product for IBM Tivoli Network Configuration Manager (CVE-2020-26217) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: Security vulnerabilities in Java SE affects Rational Build Forge ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-…
∗∗∗ Security Bulletin: A security vulnerability has been identified in Xstream, which is a required product for IBM Tivoli Network Configuration Manager (CVE-2020-26258, CVE-2020-26259) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-03-2021 18:00 − Mittwoch 24-03-2021 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Microsoft warns of phishing attacks bypassing email gateways ∗∗∗
---------------------------------------------
An ongoing phishing operation that stole an estimated 400,000 OWA and Office 365 credentials since December has now expanded to abuse new legitimate services to bypass secure email gateways (SEGs).
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-warns-of-phishing-…
∗∗∗ Purple Fox Rootkit Can Now Spread Itself to Other Windows Computers ∗∗∗
---------------------------------------------
Purple Fox, a Windows malware previously known for infecting machines by using exploit kits and phishing emails, has now added a new technique to its arsenal that gives it worm-like propagation capabilities.
---------------------------------------------
https://thehackernews.com/2021/03/purple-fox-rootkit-can-now-spread.html
∗∗∗ Zahlreiche negative Bewertungen zu fashionmanufaktur.at ∗∗∗
---------------------------------------------
Seit Monaten häufen sich negative Erfahrungen und Bewertungen zahlreicher KonsumentInnen zum Online-Shop fashionmanufaktur.at.
---------------------------------------------
https://www.watchlist-internet.at/news/zahlreiche-negative-bewertungen-zu-f…
∗∗∗ Fake Websites Used in COVID-19 Themed Phishing Attacks, Impersonating Brands Like Pfizer and BioNTech ∗∗∗
---------------------------------------------
We describe trends in COVID-19 themed phishing attacks since the start of the pandemic to gain insight into the topics that attackers try to exploit.
---------------------------------------------
https://unit42.paloaltonetworks.com/covid-19-themed-phishing-attacks/
=====================
= Vulnerabilities =
=====================
∗∗∗ ZDI-21-354: (0Day) Lepide Active Directory Self Service Backup Missing Authentication Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Lepide Active Directory Self Service. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-21-354/
∗∗∗ Cisco Security Advisories 2021-03-24 ∗∗∗
---------------------------------------------
1 Critical, 18 High, 19 Medium severity
---------------------------------------------
https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&secur…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (imagemagick and squid), Fedora (jasper and kernel), Red Hat (pki-core), SUSE (gnutls, go1.15, go1.16, hawk2, jetty-minimal, libass, nghttp2, openssl, ruby2.5, sudo, and wavpack), and Ubuntu (linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke-5.3, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux-kvm, linux-oem-5.10, linux-oem-5.6, linux-oracle, linux-oracle-5.4,[...]
---------------------------------------------
https://lwn.net/Articles/850352/
∗∗∗ SaltStack revises partial patch for command injection, privilege escalation vulnerability ∗∗∗
---------------------------------------------
The second fix was reportedly necessary after SaltStack did not participate in coordinated disclosure.
---------------------------------------------
https://www.zdnet.com/article/saltstack-revises-partial-patch-for-command-i…
∗∗∗ Uncontrolled Search Path Element in Multiple Bosch Products ∗∗∗
---------------------------------------------
BOSCH-SA-835563-BT: Multiple Bosch software applications are affected by a security vulnerability, which potentially allows an attacker to load additional code in the form of DLLs (commonly known as "DLL Hijacking" or "DLL Preloading").
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html
∗∗∗ Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime Affect IBM Sterling Connect:Direct for UNIX ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: A vulnerability has been identified in IBM Elastic Storage System where an attacker could cause a denial of service (CVE-2020-5015) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-has-been-…
∗∗∗ Security Bulletin: IBM® Db2® db2fm is vulnerable to a buffer overflow (CVE-2020-5025) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-db2fm-is-vulnerab…
∗∗∗ Security Bulletin: IBM Kenexa LMS On Premise -[All] jQuery (Publicly disclosed vulnerability) – 180875 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-kenexa-lms-on-premise…
∗∗∗ Security Bulletin: A vulnerability in IBM Java SE affects IBM Elastic Storage Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-ibm-ja…
∗∗∗ Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime Affect IBM Sterling Connect:Direct for UNIX ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Netcool Impact (CVE-2020-14803, CVE-2020-27221) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: A security vulnerability has been identified in IBM® SDK, Java™ Technology Edition shipped with IBM Tivoli Netcool Impact (CVE-2020-14781) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: Rational Asset Analyzer is affected by a vulnerability in WebSphere Application Server Liberty (CVE-2020-4590) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-rational-asset-analyzer-i…
∗∗∗ Intel I210 network adapter vulnerability CVE-2020-0522 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K37283878
∗∗∗ Intel I210 network adapter vulnerability CVE-2020-0523 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K31445234
∗∗∗ Intel I210 network adapter vulnerability CVE-2020-0524 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K83504933
∗∗∗ Intel I210 network adapter vulnerability CVE-2020-0525 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K44482551
∗∗∗ Linux Kernel: Schwachstelle ermöglicht Codeausführung ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0306
∗∗∗ Pro-FTPd: Schwachstelle ermöglicht Denial of Service ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K21-0304
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily