=====================
= End-of-Day report =
=====================
Timeframe: Montag 19-08-2024 18:00 − Dienstag 20-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Windows driver zero-day exploited by Lazarus hackers to install rootkit ∗∗∗
---------------------------------------------
The notorious North Korean Lazarus hacking group exploited a zero-day flaw in the Windows AFD.sys driver to elevate privileges and install the FUDModule rootkit on targeted systems.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/windows-driver-zero-day-exp…
∗∗∗ Solaranlagen und die Cloud: Entwickler befürchtet Kollaps europäischer Stromnetze ∗∗∗
---------------------------------------------
Moderne Solaranlagen sind häufig mit Clouddiensten der Hersteller verbunden. Ein Entwickler sieht darin eine große Gefahr für unsere Energieversorgung.
---------------------------------------------
https://www.golem.de/news/solaranlagen-und-die-cloud-entwickler-befuerchtet…
∗∗∗ Approach to mainframe penetration testing on z/OS ∗∗∗
---------------------------------------------
We explain how mainframes work, potential attack vectors, and what to focus on when pentesting such systems.
---------------------------------------------
https://securelist.com/zos-mainframe-pentesting/113427/
∗∗∗ Hacking Wireless Bicycle Shifters ∗∗∗
---------------------------------------------
This is yet another insecure Internet-of-things story, this one about wireless gear shifters for bicycles. These gear shifters are used in big-money professional bicycle races like the Tour de France, which provides an incentive to actually ..
---------------------------------------------
https://www.schneier.com/blog/archives/2024/08/hacking-wireless-bicycle-shi…
∗∗∗ Ransomware Victims Paid $460 Million in First Half of 2024 ∗∗∗
---------------------------------------------
Ransomware payments in H1 2024 totaled nearly $460 million and $1.58 billion have been stolen in cryptocurrency heists.
---------------------------------------------
https://www.securityweek.com/ransomware-victims-paid-460-million-in-first-h…
∗∗∗ Critical Flaw in Donation Plugin Exposed 100,000 WordPress Sites to Takeover ∗∗∗
---------------------------------------------
A critical vulnerability in the GiveWP WordPress plugin could be exploited for remote code execution and arbitrary file deletion.
---------------------------------------------
https://www.securityweek.com/critical-flaw-in-donation-plugin-exposed-10000…
∗∗∗ Navigating the Uncharted: A Framework for Attack Path Discovery ∗∗∗
---------------------------------------------
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, “How does one discover and abuse new attack paths?” To start answering ..
---------------------------------------------
https://posts.specterops.io/navigating-the-uncharted-a-framework-for-attack…
∗∗∗ Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum ∗∗∗
---------------------------------------------
The sale and purchase of unauthorized access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks.
---------------------------------------------
https://www.rapid7.com/blog/post/2024/08/20/selling-ransomware-breaches-4-t…
∗∗∗ Challenges in Automating and Scaling Remote Vulnerability Detection ∗∗∗
---------------------------------------------
We cover investments that Bitsight is making to greatly scale out our vulnerability coverage in record time through automation.
---------------------------------------------
https://www.bitsight.com/blog/challenges-automating-and-scaling-remote-vuln…
∗∗∗ Österreichs Innenminister will Messenger ausspionieren ∗∗∗
---------------------------------------------
Österreichs Geheimdienste sollen mehr Befugnisse erhalten, Malware einschleusen und WLAN-Catcher nutzen dürfen. Das beantragt die Regierungspartei ÖVP.
---------------------------------------------
https://heise.de/-9840256
∗∗∗ Softwareentwicklung: Schadcode-Attacken auf Jenkins-Server beobachtet ∗∗∗
---------------------------------------------
Derzeit nutzen Angreifer eine kritische Lücke im Software-System Jenkins aus. Davon sind auch Instanzen in Deutschland bedroht.
---------------------------------------------
https://heise.de/-9840463
=====================
= Vulnerabilities =
=====================
∗∗∗ SolarWinds Product Security Update Advisory (CVE-2024-28986) ∗∗∗
---------------------------------------------
https://asec.ahnlab.com/en/82529/
∗∗∗ Intel Family Security Update Advisory ∗∗∗
---------------------------------------------
https://asec.ahnlab.com/en/82531/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 16-08-2024 18:00 − Montag 19-08-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Nachbetrachtung: Windows und die TCP-IP-Schwachstelle CVE-2024-38063 ∗∗∗
---------------------------------------------
Zum 13. August 2024 wurde die 0-day-Schwachstelle CVE-2024-38063 in Windows bekannt. Es handelt sich um eine Remote-Code-Execution-Schwachstelle in der TCP/IP-Implementierung von Windows steckt. Angreifer können über IPv6-Pakete einen Host kompromittieren und dort Code ausführen. Weben der Bewertung mit dem CVEv3 Score 9.8 (critical, "Exploitation More Likely") empfiehlt Redmond Administratoren momentan IPv6 zu deaktivieren, hat aber auch Sicherheitsupdates für Windows bereitgestellt. Hier sollten Administratoren also reagieren.
---------------------------------------------
https://www.borncity.com/blog/2024/08/16/nachbetrachtung-windows-und-die-tc…
∗∗∗ Technical Analysis: CVE-2024-38021 ∗∗∗
---------------------------------------------
Recently, Morphisec researchers discovered a vulnerability in Microsoft Outlook that can lead to remote code execution (RCE). This vulnerability, identified as CVE-2024-38021, highlights a significant security flaw within the Microsoft Outlook application, potentially allowing attackers to execute arbitrary code without requiring prior authentication.
---------------------------------------------
https://blog.morphisec.com/technical-analysis-cve-2024-38021
∗∗∗ New Mad Liberator gang uses fake Windows update screen to hide data theft ∗∗∗
---------------------------------------------
A new data extortion group tracked as Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to distract while exfiltrating data from the target device. [..] It is unclear how the threat actor selects its targets but one theory, although yet to be proven, is that Mad Liberator tries potential addresses (AnyDesk connection IDs) until someone accepts the connection request.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-mad-liberator-gang-uses-…
∗∗∗ Chrome will redact credit cards, passwords when you share Android screen ∗∗∗
---------------------------------------------
While the flag doesn't work at the moment, it is supposed to hide sensitive form fields present on the page by redacting the entire screen. It's unclear when the feature will be rolled out to everyone in Chrome for Android, but you'll be able to try the feature in Chrome Canary in the next few weeks.
---------------------------------------------
https://www.bleepingcomputer.com/news/google/chrome-will-redact-credit-card…
∗∗∗ AMD knickt ein: Ryzen 3000 erhält nun doch Patch gegen Sinkclose-Lücke ∗∗∗
---------------------------------------------
Ursprünglich wollte AMD Ryzen-3000-CPUs nicht gegen die Sinkclose-Lücke patchen. Nach reichlich Unmut in der Community folgt nun die Kehrtwende.
---------------------------------------------
https://www.golem.de/news/amd-knickt-ein-ryzen-3000-erhaelt-nun-doch-patch-…
∗∗∗ Verbesserung der Netzwerksicherheit: Überwachung der Client-Kommunikation mit Velociraptor ∗∗∗
---------------------------------------------
SEC Defence, die Managed Incident Response-Einheit von SEC Consult, hat eine Reihe von Velociraptor-Artefakten entwickelt, die es ermöglichen, die aktuelle Netzwerkkommunikation auf registrierten Clients zu überwachen und bei bestimmten Verbindungen zu alarmieren, z. B. zu bekannten bösartigen IP-Adressen oder Verbindungen, die von bekannten bösartigen Prozessen erstellt wurden.
---------------------------------------------
https://sec-consult.com/de/blog/detail/verbesserung-der-netzwerksicherheit-…
∗∗∗ Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks ∗∗∗
---------------------------------------------
Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services."Attackers can use Xeon to send messages through multiple software-as-a-service (SaaS) providers using valid credentials for the service providers," SentinelOne security researcher Alex Delamotte said in a report shared with The Hacker News.
---------------------------------------------
https://thehackernews.com/2024/08/xeon-sender-tool-exploits-cloud-apis.html
∗∗∗ Microsoft Azure: Ab 15. Oktober 2024 MFA für Administratoren verpflichtend, aber "Aufschub" möglich ∗∗∗
---------------------------------------------
Microsoft hat gerade im M365 Admin-Nachrichten-Center bekannt gegeben, dass man bei Azure ab dem 15.10.2024 die Authentifizierung der Administratoren über MFA verlangt. Redmond gewährt aber Administratoren die Möglichkeit, diese Verpflichtung um insgesamt 5 Monate zu verschieben.
---------------------------------------------
https://www.borncity.com/blog/2024/08/17/microsoft-azure-ab-15-oktober-2024…
∗∗∗ Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove ∗∗∗
---------------------------------------------
The case of Styx Stealer is a compelling example of how even sophisticated cybercriminal operations can slip up due to basic security oversights. The creator of Styx Stealer revealed his personal details, including Telegram accounts, emails, and contacts, by debugging the stealer on his own computer with a Telegram bot token provided by a customer involved in the Agent Tesla campaign. This critical OpSec failure not only compromised his anonymity but also provided valuable intelligence about other cybercriminals, including the originator of the Agent Tesla campaign.
---------------------------------------------
https://research.checkpoint.com/2024/unmasking-styx-stealer-how-a-hackers-s…
∗∗∗ "WireServing" Up Credentials: Escalating Privileges in Azure Kubernetes Services ∗∗∗
---------------------------------------------
Mandiant disclosed this vulnerability to Microsoft via the MSRC vulnerability disclosure program, and Microsoft has fixed the underlying issue. [..] Adopting a process to create restrictive NetworkPolicies that allow access only to required services prevents this entire attack class. Privilege escalation via an undocumented service is prevented when the service cannot be accessed at all.
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/escalating-privile…
∗∗∗ Bericht: Pixel-Handys mit heimlicher, aber inaktiver Fernwartung ausgeliefert ∗∗∗
---------------------------------------------
Pixel-Smartphones wurden auf Wunsch Verizons mit Fernwartungssoftware ausgeliefert. Wenn aktiviert, kann sie unsicheren Code nachladen.
---------------------------------------------
https://heise.de/-9836726
∗∗∗ Jetzt patchen! Schadcode-Attacken auf Solarwinds Web Help Desk beobachtet ∗∗∗
---------------------------------------------
Angreifer nutzen derzeit eine kritische Schwachstelle Solarwinds Web Help Desk aus. Ein Sicherheitspatch ist verfügbar, kann aber mitunter für Probleme sorgen.
---------------------------------------------
https://heise.de/-9838566
∗∗∗ SIM-Swapping bleibt in Deutschland Randphänomen ∗∗∗
---------------------------------------------
Zahlreiche Medien warnen vor Schäden durch SIM-Swapping. Die Betrugsmasche bleibt in Deutschland jedoch selten.
---------------------------------------------
https://heise.de/-9839531
=====================
= Vulnerabilities =
=====================
∗∗∗ Mehrere Sicherheitsschwachstellen in IDOL2 (uciIDOL) ∗∗∗
---------------------------------------------
Fünf schwerwiegende Sicherheitsschwachstellen wurden in der Zeiterfassungssoftware IDOL2 (uciIDOL) identifiziert. Sie ermöglichen es, die verschlüsselte Kommunikation zwischen Client und Server vollständig zu kompromittieren. Außerdem erlauben sie Remote Code Execution sowohl auf Client- als auch auf Serverseite.
---------------------------------------------
https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-idol-…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (python-asyncssh), Fedora (bind, bind-dyndb-ldap, httpd, and tor), SUSE (cosign, cpio, curl, expat, java-11-openjdk, ncurses, netty, netty-tcnative, opera, python-Django, python-Pillow, shadow, sudo, and wpa_supplicant), and Ubuntu (firefox).
---------------------------------------------
https://lwn.net/Articles/986225/
∗∗∗ WebKitGTK and WPE WebKit Security Advisory WSA-2024-0004 ∗∗∗
---------------------------------------------
https://webkitgtk.org/security/WSA-2024-0004.html
∗∗∗ F5: K000140732: BIND vulnerability CVE-2024-1737 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000140732
∗∗∗ Kubernetes: CVE-2024-7646 ∗∗∗
---------------------------------------------
https://github.com/kubernetes/kubernetes/issues/126744
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 14-08-2024 18:00 − Freitag 16-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Opinion: More layers in malware campaigns are not a sign of sophistication ∗∗∗
---------------------------------------------
Ten infection and protection layers to deploy malware sounds impressive and very hard to deal with. However, adding more layers counterintuitively does the opposite for antivirus evasion and is not a sign of sophistication. Why is that so?
---------------------------------------------
https://www.gdatasoftware.com/blog/2024/08/37995-malware-sophistication
∗∗∗ Ailurophile: New Infostealer sighted in the wild ∗∗∗
---------------------------------------------
We discovered a new stealer in the wild called "Ailurophile Stealer”. The stealer is coded in PHP and the source code indicates potential Vietnamese origins. It is available for purchase through a subscription model via its own webpage. Through the ..
---------------------------------------------
https://www.gdatasoftware.com/blog/2024/08/38005-ailurophile-infostealer
∗∗∗ Tusk: unraveling a complex infostealer campaign ∗∗∗
---------------------------------------------
Kaspersky researchers discovered Tusk campaign with ongoing activity that uses Danabot and StealC infostealers and clippers to obtain cryptowallet credentials and system data.
---------------------------------------------
https://securelist.com/tusk-infostealers-campaign/113367/
∗∗∗ PrestaShop GTAG Websocket Skimmer ∗∗∗
---------------------------------------------
During a recent investigation we uncovered another credit card skimmer leveraging a web socket connection to steal credit card details from an infected PrestaShop website.While PrestaShop is not the most popular eCommerce solution for online stores it is still in the top 10 most common ecommerce platforms in use on the web, and clocks in at just ..
---------------------------------------------
https://blog.sucuri.net/2024/08/prestashop-gtag-websocket-skimmer.html
∗∗∗ Ransomware Attacks on Industrial Firms Surged in Q2 2024 ∗∗∗
---------------------------------------------
Dragos has seen a significant increase in ransomware attacks on industrial organizations in Q2 2024 compared to the previous quarter.
---------------------------------------------
https://www.securityweek.com/ransomware-attacks-on-industrial-firms-surged-…
∗∗∗ Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments ∗∗∗
---------------------------------------------
We recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations AWS environments.
---------------------------------------------
https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/
∗∗∗ New infostealer targets macOS devices, appears to have Russian links ∗∗∗
---------------------------------------------
Researchers have discovered new information-stealing malware labeled Banshee Stealer that is designed to breach Apple computers.
---------------------------------------------
https://therecord.media/apple-macos-infostealer-banshee-stealer
∗∗∗ Iranian backed group steps up phishing campaigns against Israel, U.S. ∗∗∗
---------------------------------------------
Google’s Threat Analysis Group shares insights on APT42, an Iranian government-backed threat actor.
---------------------------------------------
https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phi…
∗∗∗ Ransomware Prevention Guide for Managed Service Providers ∗∗∗
---------------------------------------------
This comprehensive ransomware prevention guide outlines a strategic approach to preventing ransomware attacks, drawing upon industry best practices, compelling statistics, and expert insights.
---------------------------------------------
https://www.emsisoft.com/en/blog/45911/ransomware-prevention-guide-for-mana…
∗∗∗ Hacking Beyond.com — Enumerating Private TLDs ∗∗∗
---------------------------------------------
My story started a few months ago, when I performed a red team assessment for a major retail company. During the Open Source Reconnaissance (OSINT) phase, I reviewed the SSL certificates that included the client name. In these certificates I identified that the client owned its own top-level domain (TLD). A TLD is the last part of a domain name, the letters that come after ..
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/enumerating-privat…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (389-ds-base, dotnet8.0, python3.13, roundcubemail, thunderbird, and tor), Mageia (roundcubemail), Oracle (.NET 8.0, bind and bind-dyndb-ldap, bind9.16, container-tools:ol8, edk2, firefox, gnome-shell, grafana, httpd:2.4, jose, kernel, krb5, mod_auth_openidc:2.3, orc, poppler, python-urllib3, ..
---------------------------------------------
https://lwn.net/Articles/985980/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 13-08-2024 18:00 − Mittwoch 14-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Neue Betrugsmasche auf WhatsApp: Vorsicht vor gefälschten Sicherheitswarnungen ∗∗∗
---------------------------------------------
Derzeit kursieren gefälschte SMS, angeblich vom WhatsApp-Sicherheitscenter. Die Nachricht besagt, dass Ihr Konto gefährdet sei und Sie eine Überprüfung im offiziellen Sicherheitscenter vornehmen müssen.
---------------------------------------------
https://www.watchlist-internet.at/news/neue-betrugsmasche-auf-whatsapp-vors…
∗∗∗ Versuchte Leistungserschleichung bei Sicherheitsunternehmen ∗∗∗
---------------------------------------------
Mehrere Sicherheitsunternehmen (insbesondere im Bereich von Threat Intelligence) berichten von Versuchen von Bedrohungsakteuren sich unter Vortäuschung falscher Tatsachen Zugriff auf die Produkte betroffener Firmen zu verschaffen.
---------------------------------------------
https://www.cert.at/de/aktuelles/2024/8/versuchte-leistungserschleichung-be…
∗∗∗ Biden administration pledges $11 million to open source security initiative ∗∗∗
---------------------------------------------
The White House and Department of Homeland Security (DHS) are partnering on an $11 million initiative to gain an understanding of how open source software is used across critical infrastructure and to better secure it.
---------------------------------------------
https://therecord.media/open-source-software-security-white-house-dhs-11mil…
∗∗∗ FIN7: The Truth Doesnt Need to be so STARK ∗∗∗
---------------------------------------------
The purpose of this blog post is not to exhaustively identify FIN7 infrastructure; rather, it represents a snapshot in time of activity hosted on the infrastructure of one hosting provider (Stark).
---------------------------------------------
https://www.team-cymru.com/post/fin7-the-truth-doesn-t-need-to-be-so-stark
∗∗∗ Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments ∗∗∗
---------------------------------------------
In this blog we explain about the campaign, the techniques used and how to detect and protect your environments.
---------------------------------------------
https://blog.aquasec.com/gafgyt-malware-variant-exploits-gpu-power-and-clou…
∗∗∗ Rivers of Phish: Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe ∗∗∗
---------------------------------------------
This campaign, which we have investigated in collaboration with Access Now and with the participation of numerous civil society organizations including First Department, Arjuna Team, and RESIDENT.ngo, engages targets with personalized and highly-plausible social engineering in an attempt to gain access to their online accounts. [..] The Citizen Lab is sharing all indicators with major email providers to assist them in tracking and blocking these campaigns.
---------------------------------------------
https://citizenlab.ca/2024/08/sophisticated-phishing-targets-russias-percei…
∗∗∗ Bundestrojaner: So funktioniert die Chat-Überwachung ∗∗∗
---------------------------------------------
Ein Bundestrojaner ist eine Schadsoftware, die von Behörden und der Polizei verwendet wird. Auch verschlüsselte Nachrichten lassen sich dadurch lesen.
---------------------------------------------
https://futurezone.at/netzpolitik/bundestrojaner-chat-ueberwachung-oesterre…
=====================
= Vulnerabilities =
=====================
∗∗∗ SolarWinds fixes critical RCE bug affecting all Web Help Desk versions ∗∗∗
---------------------------------------------
A critical vulnerability in SolarWinds Web Help Desk solution for customer support could be exploited to achieve remote code execution, the American business software developer warns in a security advisory today.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/solarwinds-fixes-critical-rc…
∗∗∗ Fortinet, Zoom Patch Multiple Vulnerabilities ∗∗∗
---------------------------------------------
Fortinet and Zoom have released patches for multiple vulnerabilities in their products, including high-severity bugs.
---------------------------------------------
https://www.securityweek.com/fortinet-zoom-patch-multiple-vulnerabilities/
∗∗∗ Patchday Microsoft: Angreifer attackieren Office und Windows mit Schadcode ∗∗∗
---------------------------------------------
Es sind wichtige Sicherheitsupdates für verschiedene Microsoft-Produkte erschienen. Aufgrund von laufenden Attacken sollten Admins zügig handeln. [..] Mit einem CVSS-Punktwert von 9,8 gehört eine Sicherheitslücke in Windows' TCP/IP-Stack zu den gefährlichsten Fehlern im aktuellen Patchday. Nicht angemeldete Angreifer, die präparierte IPv6-Pakete an Windows-Rechner schicken, können diese aus der Ferne kompromittieren und eigene Befehle ausführen.
---------------------------------------------
https://heise.de/-9834085
∗∗∗ Xen Security Advisory CVE-2024-31146 / XSA-461 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-461.html
∗∗∗ Xen Security Advisory CVE-2024-31145 / XSA-460 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-460.html
∗∗∗ Adobe Releases Security Updates for Multiple Products ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/08/14/adobe-releases-security-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 12-08-2024 18:00 − Dienstag 13-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ APT trends report Q2 2024 ∗∗∗
---------------------------------------------
The report features the most significant developments relating to APT groups in Q2 2024, including the new backdoor in Linux utility XZ, a new RAT called SalmonQT, and hacktivist activity.
---------------------------------------------
https://securelist.com/apt-trends-report-q2-2024/113275/
∗∗∗ AMD won’t patch Sinkclose security bug on older Zen CPUs ∗∗∗
---------------------------------------------
Some AMD processors dating back to 2006 have a security vulnerability that's a boon for particularly underhand malware and rogue insiders, though the chip designer is only patching models made since 2020.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/08/13/amd_sinkclos…
∗∗∗ Who uses LLM prompt injection attacks IRL? Mostly unscrupulous job seekers, jokesters and trolls ∗∗∗
---------------------------------------------
Because apps talking like pirates and creating ASCII art never gets old Despite worries about criminals using prompt injection to trick large language models (LLMs) into leaking sensitive data or performing other destructive actions, most of these types of AI shenanigans come from job seekers trying to get their resumes past automated HR screeners – and people protesting generative AI for various reasons, according to Russian security biz Kaspersky.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/08/13/who_uses_llm…
∗∗∗ CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz ∗∗∗
---------------------------------------------
On August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apache OFBiz tracked as CVE-2024-38856. The vulnerability, which has been assigned a CVSS score of 9.8, allows threat actors to perform pre-authentication remote code execution (RCE). While testing a patch for CVE-2024-36104, SonicWall researchers discovered that unauthenticated access was permitted to the ProgramExport endpoint, potentially enabling the execution of arbitrary code.
---------------------------------------------
https://www.zscaler.com/blogs/security-research/cve-2024-38856-pre-auth-rce…
∗∗∗ Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation ∗∗∗
---------------------------------------------
NIST has formally published three post-quantum cryptography standards from the competition it held to develop cryptography able to withstand the anticipated quantum computing decryption of current asymmetric encryption.
---------------------------------------------
https://www.securityweek.com/post-quantum-cryptography-standards-officially…
∗∗∗ Falsche Mitteilung im Namen des Bundeskanzleramtes über Entschädigungszahlungen ∗∗∗
---------------------------------------------
Kriminelle versenden im Namen des Bundeskanzleramtes gefälschte E-Mails über eine Entschädigungszahlung für die Wasser- und Energierechnung. Im E-Mail steht, dass Sie € 102,49 erhalten. Für den Erhalt der Summe, müssen Sie aber auf einen Link klicken.
---------------------------------------------
https://www.watchlist-internet.at/news/falsche-mitteilung-im-namen-des-bund…
∗∗∗ Harnessing LLMs for Automating BOLA Detection ∗∗∗
---------------------------------------------
Learn about BOLABuster, an LLM-driven tool automating BOLA vulnerability detection in web applications. Issues have already been identified in multiple projects.
---------------------------------------------
https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/
∗∗∗ Strafverfolgern gelingt Schlag gegen Radar/Dispossessor Ransomwaregruppe ∗∗∗
---------------------------------------------
Es ist der nächste Schlag gegen Cyberkriminelle. Strafverfolger aus den USA (FBI), Großbritannien und Deutschland ist es gelungen, die Infrastruktur der Ransomwaregruppe Radar/Dispossessor zu zerschlagen.
---------------------------------------------
https://www.borncity.com/blog/2024/08/13/strafverfolgern-gelingt-schlag-geg…
∗∗∗ Hackers Leak 1.4 Billion Tencent User Accounts Online ∗∗∗
---------------------------------------------
Massive data leak exposes 1.4 billion Tencent user accounts. Leaked data includes emails, phone numbers, and QQ IDs potentially linked to the “Mother of All Breaches” (MOAB).
---------------------------------------------
https://hackread.com/hackers-leak-1-4-billion-tencent-user-accounts-online/
∗∗∗ CryptoCore: Unmasking the Sophisticated Cryptocurrency Scam Operations ∗∗∗
---------------------------------------------
This report delves into the intricacies of the CryptoCore group’s scam and analyses their modus operandi. We will describe key exploited events, including hijacked YouTube accounts and deepfake videos, alongside a technical analysis of the fraudulent sites. One purpose of this study is to present a fundamental analysis – and key statistics – of fraudulent wallets that have received profits in the millions of dollars, as well as provide statistical data on detections, showing how victims are lured into suspicious websites and ultimately end up crypto scam victims.
---------------------------------------------
https://decoded.avast.io/martinchlumecky1/cryptocore-unmasking-the-sophisti…
∗∗∗ Ivanti warns of critical vTM auth bypass with public exploit ∗∗∗
---------------------------------------------
Tracked as CVE-2024-7593, this auth bypass vulnerability is due to an incorrect implementation of an authentication algorithm that allows remote unauthenticated attackers to bypass authentication on Internet-exposed vTM admin panels.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ivanti-warns-of-critical-vtm…
=====================
= Vulnerabilities =
=====================
∗∗∗ Ivanti: August Security Update ∗∗∗
---------------------------------------------
Today, fixes have been released for the following solutions: Ivanti Neurons for ITSM, Ivanti Avalanche and Ivanti Virtual Traffic Manager (vTM).
---------------------------------------------
https://www.ivanti.com/blog/august-security-update
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel and roundcube), Fedora (microcode_ctl, pypy, python2.7, and python3.6), Oracle (389-ds-base, httpd, kernel, kernel-container, and linux-firmware), Red Hat (kernel-rt), SUSE (firefox, kubernetes1.23, libqt5-qtbase, openssl-1_1, python-gunicorn, python-Twisted, python-urllib3, and qt6-base), and Ubuntu (linux-aws-5.15, linux-gkeop-5.15, linux-ibm, linux-ibm-5.15, linux-raspi, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-oem-6.8, linux-oracle-5.15, and qemu).
---------------------------------------------
https://lwn.net/Articles/985481/
∗∗∗ SAP Patches Critical Vulnerabilities in BusinessObjects, Build Apps ∗∗∗
---------------------------------------------
SAP has released 25 security notes on August 2024 Security Patch Day, including for critical vulnerabilities in BusinessObjects and Build Apps.
---------------------------------------------
https://www.securityweek.com/sap-patches-critical-vulnerabilities-in-busine…
∗∗∗ CISA Releases Ten Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
AVEVA SuiteLink Server, Rockwell Automation, Ocean Data Systems
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/08/13/cisa-releases-ten-indust…
∗∗∗ Splunk: SVD-2024-0801: Third-Party Package Updates in Python for Scientific Computing - August 2024 ∗∗∗
---------------------------------------------
https://advisory.splunk.com//advisories/SVD-2024-0801
∗∗∗ Lenovo: NVIDIA GPU Display Driver - July 2024 ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500637-NVIDIA-GPU-DISPLAY-DRIV…
∗∗∗ Lenovo: LDCC and LADM Privilege Escalation Vulnerabilities ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500636-LDCC-AND-LADM-PRIVILEGE…
∗∗∗ 0patch: The "EventLogCrasher" 0day For Remotely Disabling Windows Event Log, And a Free Micropatch For It ∗∗∗
---------------------------------------------
https://blog.0patch.com/2024/01/the-eventlogcrasher-0day-for-remotely.html
∗∗∗ tenable: [R1] Stand-alone Security Patch Available for Tenable Security Center versions 6.2.1, 6.3.0 and 6.4.0: SC-202408.1 ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2024-13
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 09-08-2024 18:00 − Montag 12-08-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Passwortmanager und VPN-Apps: Klartextpasswörter aus Prozessspeicher gelesen ∗∗∗
---------------------------------------------
Passwörter landen bei der Verarbeitung zwangsläufig im Speicher. Bei einigen Anwendungen verbleiben sie dort aber zu lange, was die Angriffsfläche vergrößert.
---------------------------------------------
https://www.golem.de/news/passwortmanager-und-vpn-apps-klartextpasswoerter-…
∗∗∗ Verschlüsselung ausgehebelt: Forscher übernimmt Kontrolle über Geldautomaten ∗∗∗
---------------------------------------------
So manch ein Hacker träumt davon, die Software von Geldautomaten zu knacken, um sich beliebig viel Bargeld auszahlen zu lassen. Einem Forscher ist wohl genau das gelungen. [..] Für einen erfolgreichen Angriff ist nach Angaben des Sicherheitsforschers allerdings ein physischer Zugang zum jeweiligen Geldautomaten erforderlich, "bei dem man den oberen Teil des Geldautomaten öffnet, die Festplatte herausnimmt und dann den Inhalt der Festplatte manipuliert".
---------------------------------------------
https://www.golem.de/news/verschluesselung-ausgehebelt-forscher-uebernimmt-…
∗∗∗ Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. [..] Following responsible disclosure in February 2024, Amazon addressed the shortcomings over several months from March to June. The findings were presented at Black Hat USA 2024.
---------------------------------------------
https://thehackernews.com/2024/08/experts-uncover-severe-aws-flaws.html
∗∗∗ Living off the land with Bluetooth PAN ∗∗∗
---------------------------------------------
Just like in the living off the land native SSH blog post, this is not a new and clever method of attack, rather it is using tools that are built-in to Windows to present an unexpected vector for access to networks that could mask many of the common tools used to assess a network. [..] Look at disabling these using Intune / Group Policy configuration policies. If there is a justification for their use, consider monitoring the usage of these tools in your environment.
---------------------------------------------
https://www.pentestpartners.com/security-blog/living-off-the-land-with-blue…
∗∗∗ BlackHat 2024: Remote Code Execution-Angriff auf M365 Copilot per E-Mail ∗∗∗
---------------------------------------------
Auf der BlackHat 2024 hat Michael Bargury RCE-Angriffe auf M365 Copilot gezeigt – eine E-Mail reicht, um Sensitives zu suchen. Insgesamt stellt Bargury fünf verschiedene Angriffsmethoden auf Microsofts AI-Lösungen vor. Hier mal ein kurzer Abriss zu diesem Thema.
---------------------------------------------
https://www.borncity.com/blog/2024/08/11/blackhat-2024-remote-code-executio…
∗∗∗ Ongoing Social Engineering Campaign Refreshes Payloads ∗∗∗
---------------------------------------------
On June 20, 2024, Rapid7 identified multiple intrusion attempts by threat actors utilizing Techniques, Tactics, and Procedures (TTPs) that are consistent with an ongoing social engineering campaign being tracked by Rapid7. [..] The initial lure being utilized by the threat actors remains the same: an email bomb followed by an attempt to call impacted users and offer a fake solution.
---------------------------------------------
https://www.rapid7.com/blog/post/2024/08/12/ongoing-social-engineering-camp…
∗∗∗ Google Patches Critical Vulnerabilities in Quick Share After Researchers’ Warning ∗∗∗
---------------------------------------------
A groundbreaking presentation at Defcon 32 has revealed critical flaws in Google’s Quick Share, a peer-to-peer data-transfer utility for Android, Windows, and Chrome operating systems. Quick Share boasts impressive versatility, utilizing Bluetooth, Wi-Fi, Wi-Fi Direct, WebRTC, and NFC to facilitate peer-to-peer file transfers however, these protocols are not designed for file transfers but rather to establish stable device connections for communication purposes.
---------------------------------------------
https://hackread.com/google-patches-quick-share-vulnerabilities-warning/
∗∗∗ Mit Domain-Based Authentication in unternehmensinterne Gruppen eindringen ∗∗∗
---------------------------------------------
Was ergeben ein uraltes Protokoll, eine millionenfach benutzte Bibliothek und eine Authentifizierung per Maildomain? Zugang zum internen Github-Netzwerk.
---------------------------------------------
https://heise.de/-9830944
=====================
= Vulnerabilities =
=====================
∗∗∗ Neue Schwachstellen in OpenVPN ∗∗∗
---------------------------------------------
Microsoft hat in den OpenVPN-Clients von Android, iOS, macOS, BSD und Windows eine Reihe Schwachstellen gefunden. Angreifer könnten einige der entdeckten Schwachstellen kombinierte, um eine remote ausnutzbare Angriffskette zu erhalten, die eine Remotecodeausführung (RCE) und lokaler Privilegienerweiterung (LPE) umfasst. Die Schwachstellen sollten durch Updates beseitigt werden, wobei man teilweise auf Firmware diverser Gerätehersteller angewiesen ist.
---------------------------------------------
https://www.borncity.com/blog/2024/08/10/neue-schwachstellen-in-openvpn/
∗∗∗ Sicherheitslücken: Netzwerkmonitoringtool Zabbix kann Passwörter leaken ∗∗∗
---------------------------------------------
In aktuellen Ausgaben des Netzwerkmonitoringtools Zabbix haben die Entwickler insgesamt acht Sicherheitslücken geschlossen. Nach erfolgreichen Attacken können Angreifer etwa Passwörter im Klartext einsehen oder sogar Schadcode ausführen.
---------------------------------------------
https://heise.de/-9832311
∗∗∗ Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks ∗∗∗
---------------------------------------------
Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks.
---------------------------------------------
https://thehackernews.com/2024/08/industrial-remote-access-tool-ewon-cosy.h…
∗∗∗ FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability ∗∗∗
---------------------------------------------
The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges. The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity.
---------------------------------------------
https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.ht…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (httpd:2.4), Fedora (chromium, firefox, frr, neatvnc, nss, python-setuptools, and python3.13), Gentoo (AFLplusplus, Bundler, dpkg, GnuPG, GPAC, libde265, matio, MuPDF, PHP, protobuf, protobuf-python, protobuf-c, rsyslog, Ruby on Rails, and runc), Red Hat (389-ds-base, container-tools:rhel8, and httpd:2.4), SUSE (bind and ca-certificates-mozilla), and Ubuntu (linux-azure).
---------------------------------------------
https://lwn.net/Articles/985336/
∗∗∗ Warnung vor Microsoft Office Spoofing-Schwachstelle CVE-2024-38200 ∗∗∗
---------------------------------------------
Microsoft hat zum 8. August 2024 (mit Update vom 10. August 2024) eine Warnung von einer ungepatchten Spoofing-Schwachstelle CVE-2024-38200 veröffentlicht. Die Schwachstelle ist in allen Office-Versionen (Office 2016 – 2021, Office 365) enthalten. [..] Angreifer haben die Möglichkeit, über eine spezielle oder kompromittierte Webseite eine Datei bereitzustellen, um die Schwachstelle auszunutzen. Über die Sicherheitslücke könnten NTLM-Hashes gegenüber Remote-Angreifern offengelegt werden.
---------------------------------------------
https://www.borncity.com/blog/2024/08/12/warnung-vor-microsoft-office-spoof…
∗∗∗ Schwachstelle "Ghostwrite" erlaubt DRAM-Zugriff in RISC-V CPUs ∗∗∗
---------------------------------------------
Deutsche Forscher fanden Schwachstellen in einzelnen RISC-V CPUs von T-Head Semiconductors. Die flexible, junge Architektur entpuppt sich dabei als Risiko. [..] Die entdeckten Schwachstellen können allerdings auch nach ihrer Offenlegung nicht mit Mikrocode oder einem Softwareupdate behoben werden, denn sie befinden sich in der Schaltung der Hardware.
---------------------------------------------
https://heise.de/-9830926
∗∗∗ B&R: 2024-08-09: Cyber Security Advisory - B&R Automation Runtime Several vulnerabilities in B&R Automation Runtime ∗∗∗
---------------------------------------------
https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf
∗∗∗ Asterisk Security Advisories ∗∗∗
---------------------------------------------
https://www.asterisk.org/downloads/security-advisories/
∗∗∗ GitLab Patch Release: 17.2.2, 17.1.4, 17.0.6 ∗∗∗
---------------------------------------------
https://about.gitlab.com/releases/2024/08/07/patch-release-gitlab-17-2-2-re…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 08-08-2024 18:00 − Freitag 09-08-2024 18:00
Handler: Robert Waldner
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malware force-installs Chrome extensions on 300,000 browsers, patches DLLs ∗∗∗
---------------------------------------------
An ongoing and widespread malware campaign force-installed malicious Google Chrome and Microsoft Edge browser extensions in over 300,000 browsers, modifying the browsers executables to hijack homepages and steal browsing history.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malware-force-installs-chrom…
∗∗∗ ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections ∗∗∗
---------------------------------------------
Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.
---------------------------------------------
https://www.wired.com/story/amd-chip-sinkclose-flaw/
∗∗∗ Windows Server durch PoC-Exploit für CVE-2024-38077 gefährdet ∗∗∗
---------------------------------------------
Nochmals ein Nachgang zum Juli 2024-Patchday, bei dem Microsoft die Schwachstelle CVE-2024-38077 im Windows-Remotedesktop-Lizenzierungsdienst (RDL) von Windows Server geschlossen hat. [..] es wurde ein Proof of Concept (PoC) für diese Schwachstelle veröffentlicht.
---------------------------------------------
https://www.borncity.com/blog/2024/08/09/windows-server-durch-poc-exploit-f…
∗∗∗ How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards ∗∗∗
---------------------------------------------
[HID]s actually known about the vulnerabilities [..] since sometime in 2023, when it was first informed about the technique by another security researcher [..] HID warned customers about the existence of a vulnerability that would allow hackers to clone keycards in an advisory in January, which includes recommendations about how customers can protect themselves—but it offered no software update at that time.
---------------------------------------------
https://www.wired.com/story/hid-keycard-authentication-key-vulnerability/
∗∗∗ ICANN reserves .internal for private use at the DNS level ∗∗∗
---------------------------------------------
The Internet Corporation for Assigned Names and Numbers (ICANN) has agreed to reserve the .internal top-level domain so it can become the equivalent to using the 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 IPv4 address blocks for internal networks. Those blocks are reserved for private use by the Internet Assigned Numbers Authority, which requires they never appear on the public internet.
---------------------------------------------
https://www.theregister.com/2024/08/08/dot_internal_ratified/
∗∗∗ New attack against the [Linux kernel] SLUB allocator ∗∗∗
---------------------------------------------
Researchers from Graz University of Technology have published details of a new attack on the Linux kernel called SLUBstack. The attack uses timing information to turn an ability to trigger use-after-free or double-free bugs into the ability to overwrite page tables, and thence into the ability to read and write arbitrary areas of memory. The good news is that this attack does require an existing bug to be usable; the bad news is that the kernel regularly sees bugs of this kind.
---------------------------------------------
https://lwn.net/Articles/984984/
∗∗∗ Fake-Videos: Van der Bellen & Assinger werben nicht für Investmentplattformen ∗∗∗
---------------------------------------------
Derzeit erleben wir erneut eine Welle von Deepfake-Videos, in denen österreichische Prominente auf Facebook und Instagram für Investmentplattformen werben. Lassen Sie sich nicht täuschen: Weder Bundespräsident Alexander van der Bellen noch TV-Moderator Armin Assinger sind plötzlich Finanzexperten, die eine Investmentplattform entwickelt haben. Die Plattformen sind betrügerisch und die Videos wurden von Kriminellen erstellt.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-videos-van-der-bellen-assinger-…
∗∗∗ Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! ∗∗∗
---------------------------------------------
This article explores architectural issues within the Apache HTTP Server, highlighting several technical debts within Httpd, including 3 types of Confusion Attacks, 9 new vulnerabilities, 20 exploitation techniques, and over 30 case studies. [..] These vulnerabilities were reported through the official security mailing list and were addressed by the Apache HTTP Server in the 2.4.60 update published on 2024-07-01.
---------------------------------------------
https://devco.re/blog/2024/08/09/confusion-attacks-exploiting-hidden-semant…
∗∗∗ Best Practices for Cisco Device Configuration ∗∗∗
---------------------------------------------
In recent incidents, CISA has seen malicious cyber actors acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart Install feature. CISA recommends organizations disable Smart Install and review NSA’s Smart Install Protocol Misuse advisory and Network Infrastructure Security Guide for configuration guidance.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/08/08/best-practices-cisco-dev…
∗∗∗ Sicherheitsforscher verwandeln Sonos-One-Lautsprecher in Wanze ∗∗∗
---------------------------------------------
Angreifer können über das eingebaute Mikrofon von Sonos-One-Lautsprechern Gespräche mitschneiden. Mittlerweile ist das Sicherheitsproblem gelöst.
---------------------------------------------
https://heise.de/-9830061
=====================
= Vulnerabilities =
=====================
∗∗∗ Schwachstellen in 1Password gefährden MacOS-Nutzer [CVE-2024-42218, CVE-2024-42219] ∗∗∗
---------------------------------------------
In 1Password 8 für Mac klaffen zwei Sicherheitslücken, die es Angreifern ermöglichen, Tresorelemente von MacOS-Nutzern abzugreifen. [..] Damit ein Angriff gelingt, muss ein Angreifer allerdings bei beiden Lücken bereits in der Lage sein, auf dem Zielsystem eine eigene Software auszuführen.
---------------------------------------------
https://www.golem.de/news/datenabfluss-moeglich-schwachstellen-in-1password…
∗∗∗ Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability [CVE-2024-38219] ∗∗∗
---------------------------------------------
Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. Fxied in Microsoft Edge Version 127.0.2651.98 released 8/8/2024.
---------------------------------------------
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38219
∗∗∗ Microsoft Edge (HTML-based) Memory Corruption Vulnerability [CVE-2024-38218] ∗∗∗
---------------------------------------------
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Fixed in Microsoft Edge Version 127.0.2651.98 released 8/8/2024.
---------------------------------------------
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38218
∗∗∗ Multiple vulnerabilities in LogSign ∗∗∗
---------------------------------------------
https://www.zerodayinitiative.com/advisories/ZDI-24-1102/http://www.zerodayinitiative.com/advisories/ZDI-24-1103/http://www.zerodayinitiative.com/advisories/ZDI-24-1104/https://www.zerodayinitiative.com/advisories/ZDI-24-1105/https://www.zerodayinitiative.com/advisories/ZDI-24-1106/
---------------------------------------------
https://support.logsign.net/hc/en-us/articles/20617133769362-07-08-2024-Ver…
∗∗∗ PostgreSQL relation replacement during pg_dump executes arbitrary SQL [CVE-2024-7348] ∗∗∗
---------------------------------------------
Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.
---------------------------------------------
https://www.postgresql.org/support/security/CVE-2024-7348/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (httpd, kernel, kernel-rt, and libtiff), Debian (postgresql-13, postgresql-15, and thunderbird), Fedora (frr, thunderbird, vim, and xrdp), Gentoo (Librsvg, Nautilus, ncurses, Percona XtraBackup, QEMU, and re2c), Red Hat (httpd, kernel, kernel-rt, openssl, and python-setuptools), SUSE (bind, ffmpeg-4, kubernetes1.23, kubernetes1.24, python-Django, and python3-Twisted), and Ubuntu (linux, linux-aws, linux-aws-5.4, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-raspi, linux-xilinx-zynqmp, linux, linux-aws, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-intel-iotg, linux-intel-iotg-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-nvidia, linux-nvidia-6.8, linux-oem-6.8, linux-nvidia-lowlatency, linux-oracle, linux-oracle, linux-oracle-5.4, salt.
---------------------------------------------
https://lwn.net/Articles/984966/
∗∗∗ New FileSender 2.49 release with major changes ∗∗∗
---------------------------------------------
We are happy to announce the release of FileSender 2.49. This new release includes security updates that you should install. Also, it offers a few features and improvements, as well as many bug fixes.
---------------------------------------------
https://connect.geant.org/2024/08/08/new-filesender-2-49-release-with-major…
∗∗∗ 0.0.0.0 Day-Schwachstelle ermöglicht seit 18 Jahren Angriffe auf Browser ∗∗∗
---------------------------------------------
Sicherheitsforscher haben offen gelegt, dass Hacker einen seit 18 Jahren bekannten, alten Fehler in Safari, Chrome und Firefox ausgenutzt haben, um in private Netzwerke einzudringen. Die als "0.0.0.0 Day" bezeichnete Sicherheitslücke ermöglicht es böswilligen Websites, die Browsersicherheit zu umgehen und mit Diensten zu interagieren, die im lokalen Netzwerk einer Organisation laufen. Dies kann zu unautorisiertem Zugriff und Remotecodeausführung auf lokalen Diensten durch Angreifer außerhalb des Netzwerks führen. Die Browserhersteller beginnen nun, diese Adresse zu blockieren.
---------------------------------------------
https://www.borncity.com/blog/2024/08/09/0-0-0-0-day-schwachstelle-ermglich…
∗∗∗ RaonSecure Product Security Advisory ∗∗∗
---------------------------------------------
Overview RaonSecure has released an update to address a vulnerability in their products. Users of affected versions are advised to update to the latest version. Affected Products TouchEn nxKey version: ~ 1.0.0.87 (included)
---------------------------------------------
https://asec.ahnlab.com/en/82372/
∗∗∗ LibreOffice: Ability to trust not validated macro signatures removed in high security mode [CVE-2024-6472] ∗∗∗
---------------------------------------------
https://www.libreoffice.org/about-us/security/advisories/CVE-2024-6472
∗∗∗ IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to multiple Vim-minimal Package Issues ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164174
∗∗∗ Multiple security vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for July 2024. ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7161907
∗∗∗ Multiple vulnerabilities in IBM Business Automation Workflow Machine Learning Server are addressed with 24.0.0-IF001 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164164
∗∗∗ IBM Cloud Pak for Data is vulnerable to unknown impact and attack vector due to Python certifi ( CVE-2022-23491 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164180
∗∗∗ IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to multiple Base OS issues ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164175
∗∗∗ IBM Cloud Pak for Data is vulnerable to session hijacking due to Node.js passport module ( CVE-2022-25896 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164201
∗∗∗ IBM Cloud Pak for Data is vulnerable to denial of service due to Node.js http-cache-semantics module ( CVE-2022-25881 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164225
∗∗∗ IBM Cloud Pak for Data is vulnerable to denial of service due to Node.js cookiejar module ( CVE-2022-25901 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164200
∗∗∗ IBM Cloud Pak for Data is vulnerable to cross-site scripting due to Jinja2 ( CVE-2024-34064 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164204
∗∗∗ IBM Cloud Pak for Data is vulnerable to denial of service due to Pallets Werkzeug ( CVE-2023-46136 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164208
∗∗∗ IBM Cloud Pak for Data is vulnerable to denial of service due to Express.js ( CVE-2022-24999 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164217
∗∗∗ IBM Cloud Pak for Data is vulnerable to several issues due to the go compiler ( CVE-2022-41724 CVE-2021-34558 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164255
∗∗∗ IBM Cloud Pak for Data is vulnerable to denial of service due to Rack ( CVE-2024-26146 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164274
∗∗∗ IBM Cloud Pak for Data is vulnerable to exposing sensitive information due to Masterminds GoUtils ( CVE-2021-4238 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164234
∗∗∗ IBM Cloud Pak for Data is vulnerable to denial of service due to Node.js semver ( CVE-2022-25883 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164266
∗∗∗ IBM Cloud Pak for Data is vulnerable to regular expression denial of service due to Rack ( CVE-2023-27539 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164269
∗∗∗ This Power System update is being released to address CVE-2024-41660 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7163146
∗∗∗ IBM Aspera Shares improved security for user session handling (CVE-2023-38018) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164325
∗∗∗ The IBM Engineering Lifecycle Engineering product using the -Xgc:concurrentScavenge option on IBM Z is vulnerable to Buffer overflow in GC ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164658
∗∗∗ The IBM Engineering Lifecycle Engineering product using IBM WebSphere Application Server is vulnerable to cross-site scripting (CVE-2024-35153) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164651
∗∗∗ The IBM Engineering Lifecycle Engineering product using IBM WebSphere Application Server is vulnerable to remote code execution (CVE-2024-35154) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164649
∗∗∗ The IBM Engineering Lifecycle Engineering product using IBM WebSphere Application Server is vulnerable to identity spoofing (CVE-2024-37532) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164653
∗∗∗ IBM Sterling Connect:Direct Web Service is affected by Java JWT vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164709
∗∗∗ There is a vulnerability in commons-compress-1.21.jar used by IBM Maximo Manage application in IBM Maximo Application Suite (CVE-2024-25710, CVE-2024-26308) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164810
∗∗∗ There is a vulnerability in commons-compress-1.21.jar used by IBM Maximo Asset Management application (CVE-2024-25710, CVE-2024-26308) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164809
∗∗∗ Maximo Application Suite - IBM WebSphere Application Server Liberty is vulnerable to CVE-2024-27268 used in IBM Maximo Application Suite - Monitor Component ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164814
∗∗∗ Maximo Application Suite - IBM WebSphere Application Server Liberty is vulnerable to CVE-2024-22354 used in IBM Maximo Application Suite - Monitor Component ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164813
∗∗∗ Maximo Application Suite - IBM WebSphere Application Server Liberty is vulnerable to CVE-2023-51775 a denial of service due to jose4j ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164812
∗∗∗ Maximo Application Suite - IBM WebSphere Application Server Liberty is vulnerable to multiple CVEs used in IBM Maximo Application Suite - Monitor Component ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7164811
∗∗∗ Multiple Vulnerabilities in XCC affect IBM Cloud Pak System ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/7147906
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 07-08-2024 18:00 − Donnerstag 08-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Kein Patch in Sicht: Phishing-Warnung in Outlook lässt sich per Mail ausblenden ∗∗∗
---------------------------------------------
Obendrein kann eine Phishing-Mail in Outlook auch vortäuschen, dass sie verschlüsselt oder signiert ist. Für Microsoft hat das Thema derzeit keine Priorität.
---------------------------------------------
https://www.golem.de/news/kein-patch-in-sicht-phishing-warnung-in-outlook-l…
∗∗∗ Samsung boosts bug bounty to a cool million for cracks of the Knox Vault subsystem ∗∗∗
---------------------------------------------
Good luck, crackers: Its an isolated processor and storage enclave, and top dollar only comes from a remote attack Samsung has dangled its first $1 million bug bounty for anyone who successfully compromises Knox Vault – the isolated subsystem the Korean giant bakes into its smartphones to store info like credentials and run authentication routines.
---------------------------------------------
https://www.theregister.com/2024/08/08/samsung_microsoft_big_bug_bounty/
∗∗∗ Using 1Password on Mac? Patch up if you don’t want your Vaults raided ∗∗∗
---------------------------------------------
Hundreds of thousands of users potentially vulnerable Password manager 1Password is warning that all Mac users running versions before 8.10.36 are vulnerable to a bug that allows attackers to steal vault items.
---------------------------------------------
https://www.theregister.com/2024/08/08/using_1password_on_mac_patch/
∗∗∗ A Flaw in Windows Update Opens the Door to Zombie Exploits ∗∗∗
---------------------------------------------
A researcher found a vulnerability that would let hackers strategically downgrade a target’s Windows version to reexpose patched vulnerabilities. Microsoft is working on fixes for the issue.
---------------------------------------------
https://www.wired.com/story/windows-update-downdate-exploit/
∗∗∗ Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption ∗∗∗
---------------------------------------------
Vulnerabilities found in solar power systems could have been exploited by hackers to cause disruption and possibly blackouts.
---------------------------------------------
https://www.securityweek.com/vulnerabilities-exposed-widely-used-solar-powe…
∗∗∗ Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory ∗∗∗
---------------------------------------------
Today, CISA—in partnership with the Federal Bureau of Investigation (FBI)—released an update to joint Cybersecurity Advisory #StopRansomware: Royal Ransomware, #StopRansomware: BlackSuit (Royal) Ransomware. The updated advisory provides network ..
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/08/07/royal-ransomware-actors-…
∗∗∗ US offers $10 million for info on Iranian leaders behind CyberAv3ngers water utility attacks ∗∗∗
---------------------------------------------
The U.S. State Department identified at least six Iranian government hackers allegedly responsible for a string of attacks on U.S. water utilities last fall and offered a large reward for information on their whereabouts.
---------------------------------------------
https://therecord.media/us-offers-reward-for-info-on-iranian-hackers-water-…
∗∗∗ BOTNET 7777: ARE YOU BETTING ON A COMPROMISED ROUTER? ∗∗∗
---------------------------------------------
A “7777 botnet” was first referenced in public reporting in October 2023 by Gi7w0rm. At the time, it was described as a botnet with approximately 10,000 nodes, observed primarily in brute-force attacks against Microsoft Azure instances. These attacks ..
---------------------------------------------
https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromise…
∗∗∗ Go deeper: Linux runtime visibility meets Wireshark ∗∗∗
---------------------------------------------
Aqua Tracee is an open source runtime security and forensics tool for Linux, built to address common Linux security issues. Tracee’s main use case is to be installed in a production environment and continuously monitor system activity and detect suspicious behavior. Some alternative use cases which Tracee can be used for are dynamic malware analysis, system tracing, ..
---------------------------------------------
https://blog.aquasec.com/go-deeper-linux-runtime-visibility-meets-wireshark
∗∗∗ PureHVNC Deployed via Python Multi-stage Loader ∗∗∗
---------------------------------------------
FortiGuard Lab reveals a malware "PureHVNC", sold on the cybercrime forum, is spreading through a phishing campaign targeting employees via a python multi-stage loader
---------------------------------------------
https://www.fortinet.com/blog/threat-research/purehvnc-deployed-via-python-…
∗∗∗ Cisco: Angreifer können Befehle auf IP-Telefonen ausführen, Update kommt nicht ∗∗∗
---------------------------------------------
Für kritische Lücken in Cisco-IP-Telefonen wird es keine Updates geben. Für eine jüngst gemeldete Lücke ist ein Proof-of-Concept-Exploit aufgetaucht.
---------------------------------------------
https://heise.de/-9827988
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-5743-1 roundcube - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00154.html
∗∗∗ Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities ∗∗∗
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ Cisco Small Business SPA300 Series and SPA500 Series IP Phones Web UI Vulnerabilities ∗∗∗
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 06-08-2024 18:00 − Mittwoch 07-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Schweiz: Kuh stirbt nach Cyberangriff auf Melkroboter ∗∗∗
---------------------------------------------
Die Angreifer forderten ein Lösegeld. Da der Landwirt nicht zahlen wollte, ist ihm der Zugang zu wichtigen Informationen über seine Kühe verwehrt geblieben.
---------------------------------------------
https://www.golem.de/news/schweiz-kuh-stirbt-nach-cyberangriff-auf-melkrobo…
∗∗∗ New Linux Kernel Exploit Technique SLUBStick Discovered by Researchers ∗∗∗
---------------------------------------------
Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick that could be exploited to elevate a limited heap vulnerability to an arbitrary memory read-and-write primitive."Initially, it exploits ..
---------------------------------------------
https://thehackernews.com/2024/08/new-linux-kernel-exploit-technique.html
∗∗∗ Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software that could be exploited to execute malicious JavaScript in a victims web browser and steal sensitive information from their account under specific ..
---------------------------------------------
https://thehackernews.com/2024/08/roundcube-webmail-flaws-allow-hackers.html
∗∗∗ CrowdStrike hires outside security outfits to review troubled Falcon code ∗∗∗
---------------------------------------------
And reveals the small mistake that bricked 8.5M Windows boxes CrowdStrike has hired two outside security firms to review its threat-detection suite Falcon that sparked a global IT outage last month - though it may not have an awful lot ..
---------------------------------------------
https://www.theregister.com/2024/08/07/crowdstrike_full_incident_root_cause…
∗∗∗ Police take just 2 days to recover $40M stolen in business email scam ∗∗∗
---------------------------------------------
Timor-Leste is a known cybercrime hotspot Two days is all it took for Interpol to recover more than $40 million worth of stolen funds in a recent business email compromise (BEC) heist, the international cop shop said this week.
---------------------------------------------
https://www.theregister.com/2024/08/07/police_take_just_two_days/
∗∗∗ Small CSS tweaks can help nasty emails slip through Outlooks anti-phishing net ∗∗∗
---------------------------------------------
A simple HTML change and the warning is gone! Researchers say cybercriminals can have fun bypassing one of Microsofts anti-phishing measures in Outlook with some simple CSS tweaks.
---------------------------------------------
https://www.theregister.com/2024/08/07/small_css_tweaks_can_help/
∗∗∗ BloodHound Operator — Dog Whispering Reloaded ∗∗∗
---------------------------------------------
Back in the BloodHound “Legacy” days, I wrote some PowerShell tooling to make my life easy and automate various tasks around BloodHound. When the new BloodHound came out, most of these tools ..
---------------------------------------------
https://posts.specterops.io/bloodhound-operator-dog-whispering-reloaded-156…
∗∗∗ CISA Releases Secure by Demand Guidance ∗∗∗
---------------------------------------------
Today, CISA and the Federal Bureau of Investigation (FBI) have released Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem to help organizations drive a secure technology ecosystem by ensuring their software manufacturers prioritize secure technology from the start.An organization’s acquisition staff often has a general ..
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/08/06/cisa-releases-secure-dem…
∗∗∗ Achtung: Microsofts UEFI Zertifikat läuft am 19. Okt. 2026 aus – Secure Boot betroffen ∗∗∗
---------------------------------------------
[English]Ich stelle mal ein Thema hier im Blog ein, was noch "ein paar Tage Zeit hat", aber arg unangenehme Folgen haben könnte. Im Herbst 2026 läuft ein Zertifikat in Windows aus, welches im UEFI dafür sorgt, dass der ..
---------------------------------------------
https://www.borncity.com/blog/2024/08/07/achtung-microsofts-uefi-zertifikat…
∗∗∗ Looking back at the ballot – securing the general election ∗∗∗
---------------------------------------------
NCSC CEO Felicity Oswald shares reflections on keeping the 2024 General Election safe.
---------------------------------------------
https://www.ncsc.gov.uk/blog-post/looking-back-at-the-ballot-securing-the-g…
∗∗∗ The Risks of Parked Domains ∗∗∗
---------------------------------------------
Many organizations view parked domains as dormant, low-risk, and not worth the investment in robust security measures. This is a misconception. Heres why.
---------------------------------------------
https://www.bitsight.com/blog/risks-parked-domains
=====================
= Vulnerabilities =
=====================
∗∗∗ DSA-5739-1 wpa - security update ∗∗∗
---------------------------------------------
Rory McNamara reported a local privilege escalation in wpasupplicant: A user able to escalate to the netdev group can load arbitrary shared object files in the context of the wpa_supplicant process running as root.
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00151.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 05-08-2024 18:00 − Dienstag 06-08-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Mac and Windows users infected by software updates delivered over hacked ISP ∗∗∗
---------------------------------------------
DNS poisoning attack worked even when targets used DNS from Google and Cloudflare.
---------------------------------------------
https://arstechnica.com/?p=2041175
∗∗∗ Microsoft Bounty Program Year in Review: $16.6M in Rewards ∗∗∗
---------------------------------------------
We are excited to announce that this year the Microsoft Bounty Program has awarded $16.6M in bounty awards to 343 security researchers from 55 countries, securing Microsoft customers in partnership with the Microsoft Security Response Center (MSRC). Each year we identify over a thousand potential security issues together, safeguarding our customers from possible threats through the Microsoft Bounty Program.
---------------------------------------------
https://msrc.microsoft.com/blog/2024/08/microsoft-bounty-program-year-in-re…
∗∗∗ A Survey of Scans for GeoServer Vulnerabilities ∗∗∗
---------------------------------------------
A little bit over a year ago, I wrote about scans for GeoServer. GeoServer is a platform to process geographic data. It makes it easy to share geospatial data in various common standard formats. Recently, new vulnerabilities were discovered in GeoServer, prompting me to look again at what our honeypots pick up.
---------------------------------------------
https://isc.sans.edu/diary/A+Survey+of+Scans+for+GeoServer+Vulnerabilities/…
∗∗∗ MDM vendor Mobile Guardian attacked, leading to remote wiping of 13,000 devices ∗∗∗
---------------------------------------------
Singapore Ministry of Education orders software removed after string of snafus UK-based mobile device management vendor Mobile Guardian has admitted that on August 4 it suffered a security incident that involved unauthorized access to iOS and ChromeOS devices managed by its tools, which are currently unavailable. In Singapore, the incident resulted in ..
---------------------------------------------
https://www.theregister.com/2024/08/06/mobile_guardian_mdm_attack/
∗∗∗ Bad apps bypass Windows security alerts for six years using newly unveiled trick ∗∗∗
---------------------------------------------
Windows SmartScreen and Smart App Control both have weaknesses of which to be wary Elastic Security Labs has lifted the lid on a slew of methods available to attackers who want to run malicious apps without triggering Windows security ..
---------------------------------------------
https://www.theregister.com/2024/08/06/bad_apps_bypass_windows_security/
∗∗∗ Olympia: Cyberkriminelle fordern nach Attacke auf Museen in Frankreich Lösegeld ∗∗∗
---------------------------------------------
Mehr als 40 Institutionen sind betroffen, darunter der Olympia-Austragungsort Grand Palais. Kriminelle haben das System für die Zentralisierung von Finanzdaten angegriffen
---------------------------------------------
https://www.derstandard.at/story/3000000231309/olympia-cyber-attacke-auf-mu…
∗∗∗ IoT firmware emulation and device fingerprinting challenges ∗∗∗
---------------------------------------------
Gathering information on a device could be tricky if you don’t have direct access to exposed services like SNMP, HTTP, FTP, or any other ports or protocols which could provide relevant information on the asset like the ..
---------------------------------------------
https://medium.com/tenable-techblog/iot-firmware-emulation-and-device-finge…
∗∗∗ Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast. ∗∗∗
---------------------------------------------
The Ransomware Radar Report offers some startling insights into who ransomware threat actors are and how they’ve been operating in the first half of 2024.
---------------------------------------------
https://www.rapid7.com/blog/post/2024/08/06/rapid7s-ransomware-radar-report…
∗∗∗ LKA Niedersachsen warnt vor Phishing mit QR-Codes per Briefpost ∗∗∗
---------------------------------------------
Per Briefpost suchen Betrüger Opfer, die einen QR-Code scannen und auf den dadurch geöffneten Phishing-Link hereinfallen, warnt das LKA Niedersachsen.
---------------------------------------------
https://heise.de/-9825879
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libreoffice), Gentoo (containerd and firefox), Red Hat (httpd), SUSE (ca-certificates-mozilla, ksh, openssl-3-livepatches, podman, python-Twisted, and skopeo), and Ubuntu (imagemagick).
---------------------------------------------
https://lwn.net/Articles/984598/
∗∗∗ DSA-5737-1 libreoffice - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00149.html
∗∗∗ DSA-5736-1 openjdk-11 - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2024/msg00148.html
∗∗∗ ZDI-24-1099: Apache OFBiz resolveURI Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-1099/
∗∗∗ Security Vulnerabilities fixed in Firefox 129 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily