=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 07-05-2024 18:00 − Mittwoch 08-05-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Der Briefkasten daheim als Einfallstor für Internet-Betrugsmaschen? ∗∗∗
---------------------------------------------
Online-Betrug lauert nicht nur im Internet. Zu Anrufen und SMS, die oft in Online-Betrugsmaschen führen, gesellt sich nun auch der Postkasten des Eigenheims als Einfallstor für Kriminelle hinzu. Sie nutzen die Briefkästen ihrer Opfer beispielsweise, um Sendungen aus Bestellbetrug zu erhalten, Daten und in weiterer Folge Geld zu stehlen oder um betrügerische Handwerksdienste und dazugehörige Websites zu bewerben.
---------------------------------------------
https://www.watchlist-internet.at/news/der-briefkasten-daheim-als-einfallst…
∗∗∗ Massive webshop fraud ring steals credit cards from 850,000 people ∗∗∗
---------------------------------------------
A massive network of 75,000 fake online shops called BogusBazaar tricked over 850,000 people in the US and Europe into making purchases, allowing the criminals to steal credit card information and attempt to process an estimated $50 million in fake orders.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/massive-webshop-fraud-ring-s…
∗∗∗ Detecting XFinity/Comcast DNS Spoofing, (Mon, May 6th) ∗∗∗
---------------------------------------------
DNS interception, even if well-meaning, does undermine some of the basic "internet trust issues". Even if it is used to block users from malicious sites, it needs to be properly declared to the user, and switches to turn it off will have to function. This could be a particular problem if queries to other DNS filtering services are intercepted. I have yet to test this for Comcast and, for example, OpenDNS.
---------------------------------------------
https://isc.sans.edu/diary/rss/30898
∗∗∗ Analyzing Synology Disks on Linux, (Wed, May 8th) ∗∗∗
---------------------------------------------
Synology NAS solutions are popular devices. They are also used in many organizations. [..] They offer multiple disk management options but rely on many open-source software (like most appliances). [..] Synology NAS run a Linux distribution called DSM. This operating system has plenty of third-party tools but lacks pure forensics tools. In a recent investigation, I had to investigate a NAS that was involved in a ransomware attack. Many files (backups) were deleted. The attacker just deleted some shared folders.
---------------------------------------------
https://isc.sans.edu/diary/rss/30904
∗∗∗ Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version ∗∗∗
---------------------------------------------
A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar.
---------------------------------------------
https://thehackernews.com/2024/05/hijack-loader-malware-employs-process.html
∗∗∗ New Spectre-Style Pathfinder Attack Targets Intel CPU, Leak Encryption Keys and Data ∗∗∗
---------------------------------------------
Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard (AES) algorithm. The techniques have been collectively dubbed Pathfinder by a group of academics from the University of California San Diego, Purdue University, UNC Chapel Hill, Georgia Institute of Technology, and Google. [..] Following responsible disclosure in November 2023, Intel, in an advisory released last month, said Pathfinder builds on Spectre v1 attacks and that previously deployed mitigations for Spectre v1 and traditional side-channels mitigate the reported exploits. There is no evidence that it impacts AMD CPUs.
---------------------------------------------
https://thehackernews.com/2024/05/new-spectre-style-pathfinder-attack.html
∗∗∗ Ghidra nanoMIPS ISA module ∗∗∗
---------------------------------------------
Here we will demonstrate how to load a MediaTek baseband firmware into Ghidra for analysis with our nanoMIPS ISA module.
---------------------------------------------
https://research.nccgroup.com/2024/05/07/ghidra-nanomips-isa-module/
∗∗∗ Vorsicht vor gefälschten Online-Banking-Seiten auf Bing, Google & Co ∗∗∗
---------------------------------------------
Kriminelle schalten Anzeigen in Suchmaschinen (vor allem BING) und locken so Opfer auf gefälschte Online-Banking-Seiten. Vorsicht: Wenn Sie hier Ihre Daten eingeben, können hohe Beträge von Ihrem Konto abgebucht werden! Vergewissern Sie sich immer, dass Sie auf der echten Login-Seite Ihrer Bank sind!
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschtes-online-banking-suchmasc…
∗∗∗ RemcosRAT Distributed Using Steganography ∗∗∗
---------------------------------------------
AhnLab SEcurity intelligence Center (ASEC) has recently identified RemcosRAT being distributed using the steganography technique. Attacks begin with a Word document using the template injection technique, after which an RTF that exploits a vulnerability in the equation editor (EQNEDT32.EXE) is downloaded and executed.
---------------------------------------------
https://asec.ahnlab.com/en/65111/
=====================
= Vulnerabilities =
=====================
∗∗∗ F5: K000139404: Quarterly Security Notification (May 2024) ∗∗∗
---------------------------------------------
F5 has released 13 security advisories (7x high, 6x medium) and 3 security exposures.
---------------------------------------------
https://my.f5.com/manage/s/article/K000139404
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (glib2.0 and php7.3), Gentoo (Commons-BeanUtils, Epiphany, glibc, MariaDB, Node.js, NVIDIA Drivers, qtsvg, rsync, U-Boot tools, and ytnef), Oracle (kernel), Red Hat (git-lfs and kernel), SUSE (flatpak, less, python311, rpm, and sssd), and Ubuntu (libde265, libvirt, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux-xilinx-zynqmp, linux, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux-oem-6.5, and nghttp2).
---------------------------------------------
https://lwn.net/Articles/972861/
∗∗∗ WordPress: Cross-Site-Scripting-Schwachstelle in älteren Cores; und WordPress 6.5.3 verfügbar ∗∗∗
---------------------------------------------
Ich hoffe, ihr seid auf der aktuellen WordPress-Version, denn in älteren WordPress-Versionen gibt es eine Cross-Site-Scripting-Schwachstelle [..] und wer LightSpeed Cache als Plugin nutzt, sollte dringend updaten.
---------------------------------------------
https://www.borncity.com/blog/2024/05/07/wordpress-cross-site-scripting-sch…
∗∗∗ VMware Avi Load Balancer: Rechteausweitung zu root möglich ∗∗∗
---------------------------------------------
Im Load Balancer VMware Avi können Angreifer ihre Rechte erhöhen oder unbefugt auf Informationen zugreifen. Updates korrigieren das.
---------------------------------------------
https://heise.de/-9711733
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 06-05-2024 18:00 − Dienstag 07-05-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New Case Study: The Malicious Comment ∗∗∗
---------------------------------------------
How safe is your comments section? Discover how a seemingly innocent thank you comment on a product page concealed a malicious vulnerability, underscoring the necessity of robust security measures.
---------------------------------------------
https://thehackernews.com/2024/05/new-case-study-malicious-comment.html
∗∗∗ Ransomware evolves from mere extortion to psychological attacks ∗∗∗
---------------------------------------------
RSAC Ransomware infections and extortion attacks have become "a psychological attack against the victim organization," as criminals use increasingly personal and aggressive tactics to force victims to pay up.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/05/07/ransomware_e…
∗∗∗ Betrug am Telefon: Kriminelle täuschen hohe Abbuchungen vor ∗∗∗
---------------------------------------------
Vorsicht, wenn Ihnen jemand am Telefon erklärt, dass es „versteckte Abbuchungen“ von Ihrem Bankkonto gibt. Hierbei handelt es sich um eine Betrugsmasche. Um glaubwürdig zu wirken, nennen die Kriminellen persönliche Daten von Ihnen. Diese wurden aber im Zuge einer Phishing-Falle gesammelt. Legen Sie auf!
---------------------------------------------
https://www.watchlist-internet.at/news/betrug-am-telefon-kriminelle-taeusch…
∗∗∗ Ein Kopf (Administrator) der LockBit-Gruppe enttarnt? ∗∗∗
---------------------------------------------
Der "Kopf" und gleichzeitig Administrator der Ransomware-Gruppe LockBit ist laut Mitteilung der Strafverfolger identifiziert.
---------------------------------------------
https://www.borncity.com/blog/2024/05/07/ein-kopf-administrator-der-lockbit…
=====================
= Vulnerabilities =
=====================
∗∗∗ TunnelVision (CVE-2024-3661): How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak ∗∗∗
---------------------------------------------
Recently, we identified a novel network technique that bypasses VPN encapsulation. An attacker can use this technique to force a target user’s traffic off their VPN tunnel using built-in features of DHCP (Dynamic Host Configuration Protocol).
---------------------------------------------
https://www.leviathansecurity.com/blog/tunnelvision
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (kernel), Gentoo (libjpeg-turbo, xar, and Xpdf), Red Hat (bind, dhcp and glibc), and SUSE (bouncycastle, curl, flatpak, less, and xen).
---------------------------------------------
https://lwn.net/Articles/972679/
∗∗∗ Android-Patchday: Angreifer können Rechte im System ausweiten ∗∗∗
---------------------------------------------
Google schließt am Android-Patchday mehrere Lücken, durch die Angreifer ihre Rechte ausweiten können.
---------------------------------------------
https://heise.de/-9710075
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ PTC Codebeamer ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-128-01
∗∗∗ SUBNET Substation Server ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-128-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 03-05-2024 18:00 − Montag 06-05-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Vorsicht vor gefälschten RTR-Briefen ∗∗∗
---------------------------------------------
Kriminelle geben sich in einem Brief als Rundfunk und Telekom Regulierungs-GmbH (RTR) aus. Im Schreiben steht, dass für den Anschluss an Mobilfunknetze und die Wartung von Basisstationen ein Entgelt von € 8,90 zu bezahlen sei.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-gefaelschten-rtr-briefe…
∗∗∗ Microsoft: Sicherheit oberste Priorität in Produkten, Diensten und intern ∗∗∗
---------------------------------------------
In einem internen Memo und einem Blogpost stellt Microsoft Security bei allen Entwicklungen an erste Stelle. Das gilt für Produkte wie Services. [..] Charlie Bell zufolge will sich sein Unternehmen strikt an die Vorgaben des CSRB halten.
---------------------------------------------
https://heise.de/-9708577
∗∗∗ Breaking down Microsoft’s pivot to placing cybersecurity as a top priority ∗∗∗
---------------------------------------------
Recently, Microsoft had quite frankly a kicking from the US Department of Homeland Security over their security practices in a Cyber Safety Review Board report. I’ve tried to keep as quiet as possible about this one for various reasons (and I was not involved in the CSRB report, even anonymously) — although long time followers will know I’ve been often critical of Microsoft’s security posture. The CSRB report is well worth a read — they did a great job. [..] As always, the proof is in the pudding, not the vendor blog. I think these changes will take a few years to start to work through, and fully expect a few more clanger breaches in the mean time. And that’s annoying but okay, because hard work is hard.
---------------------------------------------
https://doublepulsar.com/breaking-down-microsofts-pivot-to-placing-cybersec…
∗∗∗ Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution ∗∗∗
---------------------------------------------
More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service on the internet thats vulnerable to a critical unpatched security flaw in the HTTP/HTTPS proxy tool. The issue, tracked as CVE-2023-49606, carries a CVSS score of 9.8 out of a maximum of 10, per Cisco Talos, which described it as a use-after-free bug impacting versions 1.10.0 and 1.11.1, which is the latest version.
---------------------------------------------
https://thehackernews.com/2024/05/critical-tinyproxy-flaw-opens-over.html
∗∗∗ Lockbits seized site comes alive to tease new police announcements ∗∗∗
---------------------------------------------
The NCA, FBI, and Europol have revived a seized LockBit ransomware data leak site to hint at new information being revealed by law enforcement this Tuesday.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/lockbits-seized-site-comes-a…
∗∗∗ Why Your VPN May Not Be As Secure As It Claims ∗∗∗
---------------------------------------------
Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a targets traffic off of the protection provided by their VPN without triggering any alerts to the user.
---------------------------------------------
https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it…
∗∗∗ Financial cyberthreats in 2023 ∗∗∗
---------------------------------------------
In this report, we share our insights into the 2023 trends and statistics on financial threats, such as phishing, PC and mobile banking malware.
---------------------------------------------
https://securelist.com/financial-threat-report-2023/112526/
∗∗∗ HijackLoader Updates ∗∗∗
---------------------------------------------
HijackLoader (a.k.a. IDAT Loader) is a malware loader initially spotted in 2023 that is capable of using a variety of modules for code injection and execution. It uses a modular architecture, a feature that most loaders do not have – which we discussed in a previous HijackLoader blog. ThreatLabz researchers recently analyzed a new HijackLoader sample that has updated evasion techniques.
---------------------------------------------
https://www.zscaler.com/blogs/security-research/hijackloader-updates
∗∗∗ New Goldoon Botnet Targeting D-Link Devices by Exploiting 9-Year-Old Flaw ∗∗∗
---------------------------------------------
By WaqasA new botnet called Goldoon targets D-Link routers and NAS devices putting them at risk of DDoS attacks and more. Learn how weak credentials leave you vulnerable and how to secure your network. pen_sparkThis is a post from HackRead.com Read the original post: New Goldoon Botnet Targeting D-Link Devices by Exploiting 9-Year-Old Flaw
---------------------------------------------
https://www.hackread.com/goldoon-botnet-targeting-d-link-devices/
∗∗∗ End-to-end encryption may be the bane of cops, but they cant close that Pandoras Box ∗∗∗
---------------------------------------------
Police can complain all they like about strong end-to-end encryption making their jobs harder, but it doesn't matter because the technology is here and won't go away.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/05/05/e2ee_police/
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (glibc, intel-microcode, less, libkf5ksieve, and ruby3.1), Fedora (chromium, gdcm, httpd, and stalld), Gentoo (Apache Commons BCEL, borgmatic, Dalli, firefox, HTMLDOC, ImageMagick, MediaInfo, MediaInfoLib, MIT krb5, MPlayer, mujs, Pillow, Python, PyPy3, QtWebEngine, Setuptools, strongSwan, and systemd), Oracle (grub2 and shim), Red Hat (git-lfs, kpatch-patch, unbound, and varnish), and SUSE (avahi, grafana and mybatis, java-11-openjdk, java-17-openjdk, skopeo, SUSE Manager Client Tools, SUSE Manager Salt Bundle, and SUSE Manager Server 4.3).
---------------------------------------------
https://lwn.net/Articles/972571/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 02-05-2024 18:00 − Freitag 03-05-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Microsoft rolls out passkey auth for personal Microsoft accounts ∗∗∗
---------------------------------------------
Microsoft announced that Windows users can now log into their Microsoft consumer accounts using a passkey, allowing users to authenticate using password-less methods such as Windows Hello, FIDO2 security keys, biometric data (facial scans or fingerprints), or device PINs. [..] Microsoft had already added passkey support to Windows for logging into websites and applications, but with the additional support for Microsoft accounts, consumers can now easily log in without entering a password.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-passkey…
∗∗∗ Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796, (Thu, May 2nd) ∗∗∗
---------------------------------------------
Before diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the devices affected by this vulnerability, produces various wireless equipment that is sometimes sold under different brands and labels. This will make it difficult to identify affected devices. These devices are often low-cost "no name" solutions or, in some cases, may even be embedded, which makes it even more difficult to find firmware updates. [..] And yes, the vulnerability evolves around the "user=admin" cookie and a command injection in the password parameter. This is too stupid to waste any more time on, but it is common enough to just give up and call it a day.
---------------------------------------------
https://isc.sans.edu/diary/rss/30890
∗∗∗ Mal.Metrica Redirects Users to Scam Sites ∗∗∗
---------------------------------------------
One of our analysts recently identified a new Mal.Metrica redirect scam on compromised websites, but one that requires a little bit of effort on the part of the victim. It’s another lesson for web users to be careful what they click on, and to be wary of anything suspicious that pops up in their browser — even if it’s coming from a website that they would otherwise trust.
---------------------------------------------
https://blog.sucuri.net/2024/05/mal-metrica-redirects-users-to-scam-sites.h…
∗∗∗ Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications ∗∗∗
---------------------------------------------
Since January 2022, multiple nation-state-aligned hacking groups have been observed using Microsoft Graph API for C&C. This includes threat actors tracked as APT28, REF2924, Red Stinger, Flea, APT29, and OilRig.
---------------------------------------------
https://thehackernews.com/2024/05/hackers-increasingly-abusing-microsoft.ht…
∗∗∗ Europol op shutters 12 scam call centers and cuffs 21 suspected fraudsters ∗∗∗
---------------------------------------------
A Europol-led operation dubbed “Pandora” has shut down a dozen phone scam centers, and arrested 21 suspects. [..] Beginning in December 2023, German investigators deployed more than 100 officers to trace the scam calls back to the source - call centers run by crooks - and then monitored them. That effort resulted in the interception of more than 1.3 million "nefarious conversations." Baden-Württemberg State Criminal Police officers had to set up a call center of their own so that they could contact potential victims, warning more than 80 percent of them.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/05/03/operation_pa…
∗∗∗ These Dangerous Scammers Don’t Even Bother to Hide Their Crimes ∗∗∗
---------------------------------------------
“Yahoo Boy” cybercriminals are openly running dozens of scams across Facebook, WhatsApp, Telegram, TikTok, YouTube, and more. [..] While the Yahoo Boys have been active for years, all the experts spoken to for this piece say they should be treated more seriously by social media companies and law enforcement.
---------------------------------------------
https://www.wired.com/story/yahoo-boys-scammers-facebook-telegram-tiktok-yo…
∗∗∗ Adding insult to injury: crypto recovery scams ∗∗∗
---------------------------------------------
Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over.
---------------------------------------------
https://www.welivesecurity.com/en/scams/crypto-recovery-scams-insult-injury/
∗∗∗ CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome ∗∗∗
---------------------------------------------
In this guest blog from Master of Pwn winner Manfred Paul, he details CVE-2024-2887 – a type confusion bug that occurs in both Google Chrome and Microsoft Edge (Chromium). He used this bug as a part of his winning exploit that led to code execution in the renderer of both browsers. This bug was quickly patched by both Google and Microsoft. Manfred has graciously provided this detailed write-up of the vulnerability and how he exploited it at the contest.
---------------------------------------------
https://www.thezdi.com/blog/2024/5/2/cve-2024-2887-a-pwn2own-winning-bug-in…
∗∗∗ CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities ∗∗∗
---------------------------------------------
This Alert was crafted in response to recent well-publicized threat actor campaigns that exploited directory traversal vulnerabilities in software (e.g., CVE-2024-1708, CVE-2024-20345) to compromise users of the software—impacting critical infrastructure sectors, including the Healthcare and Public Health Sector.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/05/02/cisa-and-fbi-release-sec…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (chromium, grub2, httpd, kernel, libcoap, matrix-synapse, python-pip, and rust-pythonize), Red Hat (kernel and libxml2), SUSE (kernel), and Ubuntu (eglibc, glibc and php7.4, php8.1, php8.2).
---------------------------------------------
https://lwn.net/Articles/972351/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-04-2024 18:00 − Donnerstag 02-05-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ CVD - Notizen zur Pressekonferenz ∗∗∗
---------------------------------------------
Ich wurde eingeladen, heute bei einer Pressekonferenz von Epicenter.works am Podium zu sitzen. Es ging um einen Fall, bei dem es im Zuge einer klassischen verantwortungsvollen Offenlegung einer Schwachstelle (Responsible Disclosure, bzw Coordinated Vulnerability Disclosure [CVD]) zu einer Anzeige gekommen ist. Nachzulesen ist der Fall auf der Epicenter Webseite. Ich will hier kurz meine Notizen / Speaking Notes zusammenfassen.
---------------------------------------------
https://cert.at/de/blog/2024/4/cvd-policy
∗∗∗ CISA warnt: MS Smartscreen- und Gitlab-Sicherheitslücke werden angegriffen ∗∗∗
---------------------------------------------
Die US-Cybersicherheitsbehörde CISA hat Angriffe auf eine Lücke im Microsoft Smartscreen und auf eine Gitlab-Schwachstelle gesichtet.
---------------------------------------------
https://heise.de/-9705715
∗∗∗ Digitale Signatur: Datenleak bei Dropbox Sign ∗∗∗
---------------------------------------------
Unbekannte Angreifer konnten auf Kundendaten des digitalen Signaturservices Dropbox Sign zugreifen. Andere Dropbox-Produkte sollen nicht betroffen sein.
---------------------------------------------
https://heise.de/-9705355
∗∗∗ Windows 10/11/Server 2022: Kein Fix für den Installationsfehler 0x80070643 beim WinRE-Update mehr ∗∗∗
---------------------------------------------
Seit Januar 2024 kämpfen Nutzer von Windows 10 und Windows 11 (sowie Windows Server 2022) mit dem Versuch Microsofts, ein Update der WinRE-Umgebung zu installieren. Im Januar 2024 ließen zahlreiche Nutzer im Umfeld des Patchday beim Versuch, das Update KB5034441 zu installieren, in den Installationsfehler 0x80070643. Trotz mehrerer Versuche zur Nachbesserung in den Folgemonaten ist es Microsoft nicht gelungen, den Installationsfehler zu beseitigen. Nun kommt das Eingeständnis, dass es keinen automatischen Fix für das Update gibt – es ist Handarbeit angesagt.
---------------------------------------------
https://www.borncity.com/blog/2024/05/02/windows-10-11-kein-fix-fr-den-inst…
∗∗∗ “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps ∗∗∗
---------------------------------------------
Microsoft discovered a vulnerability pattern in multiple popular Android applications that could enable a malicious application to overwrite files in the vulnerable application’s internal data storage directory, which could lead to arbitrary code execution and token theft, among other impacts. We have shared our findings with Google’s Android Application Security Research team, as well as the developers of apps found vulnerable to this issue.
---------------------------------------------
https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attac…
∗∗∗ Another Day, Another NAS: Attacks against Zyxel NAS326 devices CVE-2023-4473, CVE-2023-4474, (Tue, Apr 30th) ∗∗∗
---------------------------------------------
Yesterday, I talked about attacks against a relatively recent D-Link NAS vulnerability. Today, scanning my honeypot logs, I found an odd URL that I didn't recognize. The vulnerability is a bit older but turns out to be targeting yet another NAS. [..] Based on our logs, only one IP address exploits the vulnerability: %%ip: 89.190.156.248%%.
---------------------------------------------
https://isc.sans.edu/diary/rss/30884
∗∗∗ Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion. The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications. [..] The ELF binary is embedded within a repackaged application that purports to be the UPtodown App Store app for Android (package name "com.uptodown"), with the APK file acting as a delivery vehicle for the backdoor in a manner that evades detection.
---------------------------------------------
https://thehackernews.com/2024/05/android-malware-wpeeper-uses.html
∗∗∗ New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials ∗∗∗
---------------------------------------------
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from HTTP GET and POST requests. [..] Cuttlefish has been active since at least July 27, 2023, with the latest campaign running from October 2023 through April 2024 and predominantly infecting 600 unique IP addresses associated with two Turkish telecom providers.
---------------------------------------------
https://thehackernews.com/2024/05/new-cuttlefish-malware-hijacks-router.html
∗∗∗ Autodesk: Important Security Update for Autodesk Drive ∗∗∗
---------------------------------------------
In March, Autodesk was made aware of an incident where an external user published documents to Autodesk Drive containing links to a phishing web site. Our Cyber Threat Management & Response Team immediately responded to this incident, and the malicious files are no longer being hosted on Autodesk Drive. No customers have reported being impacted by this incident.
---------------------------------------------
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-autodesk-dr…
∗∗∗ Analysis of TargetCompany’s Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware) ∗∗∗
---------------------------------------------
While monitoring attacks targeting MS-SQL servers, AhnLab SEcurity intelligence Center (ASEC) recently identified cases of the TargetCompany ransomware group installing the Mallox ransomware. The TargetCompany ransomware group primarily targets improperly managed MS-SQL servers to install the Mallox ransomware. While these attacks have been ongoing for several years, here we will outline the correlation between the newly identified malware and previous attack cases involving the distribution of the Tor2Mine CoinMiner and BlueSky ransomware.
---------------------------------------------
https://asec.ahnlab.com/en/64921/
∗∗∗ CISA and Partners Release Fact Sheet on Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity ∗∗∗
---------------------------------------------
This fact sheet provides information and mitigations associated with cyber operations conducted by pro-Russia hacktivists who seek to compromise industrial control systems (ICS) and small-scale operational technology (OT) systems in North American and European critical infrastructure sectors, including Water and Wastewater Systems, Dams, Energy, and Food and Agriculture Sectors.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/05/01/cisa-and-partners-releas…
=====================
= Vulnerabilities =
=====================
∗∗∗ Kritische Sicherheitslücken in ArubaOS - Updates verfügbar ∗∗∗
---------------------------------------------
In ArubaOS, dem Betriebssystem vieler Geräte von HPE Aruba Networks, existieren mehrere kritische Sicherheitslücken. Diese ermöglichen unter anderem die Ausführung von beliebigem Code und Denial-of-Service (DoS) Angriffe. CVE-Nummern: CVE-2024-26304, CVE-2024-26305, CVE-2024-33511, CVE-2024-33512, CVE-2024-33513, CVE-2024-33514, CVE-2024-33515, CVE-2024-33516, CVE-2024-33517, CVE-2024-33518 CVSSv3 Scores: bis zu 9.8 (kritisch)
---------------------------------------------
https://cert.at/de/warnungen/2024/5/kritische-sicherheitslucken-in-arubaos-…
∗∗∗ CISCO Talos: Vulnerability Roundup ∗∗∗
---------------------------------------------
Peplink Smart Reader, Silicon Labs Gecko Platform, open-source library for DICOM files, Grassroots DICOM library and Foxit PDF Reader.
---------------------------------------------
https://blog.talosintelligence.com/vulnerability-roundup-may-1-2024/
∗∗∗ Sonicwall: GMS ECM multiple vulnerabilities ∗∗∗
---------------------------------------------
CVE-2024-29010 - GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability. CVE-2024-29011 - GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability.
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium and distro-info-data), Fedora (et, php-tcpdf, python-aiohttp, python-openapi-core, thunderbird, tpm2-tools, and tpm2-tss), Red Hat (nodejs:16 and podman), and Ubuntu (firefox).
---------------------------------------------
https://lwn.net/Articles/972186/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (nghttp2 and qtbase-opensource-src), Mageia (cjson, freerdp, guava, krb5, libarchive, and mediawiki), Oracle (container-tools:4.0 and container-tools:ol8), Red Hat (bind, buildah, container-tools:3.0, container-tools:rhel8, expat, gnutls, golang, grafana, kernel, kernel-rt, libreswan, libvirt, linux-firmware, mod_http2, pcp, pcs, podman, python-jwcrypto, rhc-worker-script, shadow-utils, skopeo, sssd, tigervnc, unbound, and yajl), SUSE (kernel and python311), and Ubuntu (gerbv and node-json5).
---------------------------------------------
https://lwn.net/Articles/972029/
∗∗∗ Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover ∗∗∗
---------------------------------------------
Three vulnerabilities in the Judge0 open source service could allow attackers to escape the sandbox and obtain root privileges on the host.
---------------------------------------------
https://www.securityweek.com/critical-vulnerabilities-in-judge0-lead-to-san…
∗∗∗ Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities ∗∗∗
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ F5: K000139430 : Linux kernel vulnerability CVE-2024-1086 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000139430
∗∗∗ Wordfence Intelligence Weekly WordPress Vulnerability Report (April 22, 2024 to April 28, 2024) ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2024/05/wordfence-intelligence-weekly-wordpr…
∗∗∗ ZDI-24-419: (Pwn2Own) Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-419/
∗∗∗ ZDI-24-418: (Pwn2Own) Xiaomi Pro 13 mimarket manual-upgrade Cross-Site Scripting Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-418/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ CyberPower PowerPanel ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01
∗∗∗ Delta Electronics DIAEnergie ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-04-2024 18:00 − Dienstag 30-04-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Gefälschte SMS im Namen von Bundeskanzleramt ∗∗∗
---------------------------------------------
Vorsicht: Kriminelle geben sich als Bundeskanzleramt Österreich aus. In der SMS wird behauptet, dass eine Nachricht auf Sie wartet. Klicken Sie auf keinen Fall auf den Link, Sie werden auf eine gefälschte Webseite weitergeleitet.
---------------------------------------------
https://www.watchlist-internet.at/news/gefaelschte-sms-im-namen-von-bundesk…
∗∗∗ FBI warns of fake verification schemes targeting dating app users ∗∗∗
---------------------------------------------
The FBI is warning of fake verification schemes promoted by fraudsters on online dating platforms that lead to costly recurring subscription charges. [..] It starts with fraudsters approaching victims on a dating app or site and developing a romantic rapport. This lays the ground for requesting to take the conversation outside the platform onto a supposedly safer communications tool. At this stage, the fraudster sends a link to the victim that will take them to a seemingly legitimate verification platform where the victim will have to verify they're not a sexual offender.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-verificati…
∗∗∗ Millions of Malicious Imageless Containers Planted on Docker Hub Over 5 Years ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. [..] Of the 4.79 million imageless Docker Hub repositories uncovered, 3.2 million of them are said to have been used as landing pages to redirect unsuspecting users to fraudulent sites as part of three broad campaigns.
---------------------------------------------
https://thehackernews.com/2024/04/millions-of-malicious-imageless.html
∗∗∗ The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen ∗∗∗
---------------------------------------------
McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware. This chain commences with an HTML-based entry point and progresses to exploit the AutoHotkey utility in its subsequent stages.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-darkgate-menace-le…
∗∗∗ Chrome 124 macht TLS-Handshake kaputt ∗∗∗
---------------------------------------------
Google hat kürzlich seinen Google Chrome-Browser in der Version 124 veröffentlicht. Neben Schwachstellen haben die Entwickler auch etwas an der TLS-Verschlüsselung (X25519Kyber768-Schlüsselkapselung für TLS) geändert. Inzwischen gibt es aber Rückmeldungen von Nutzern, die sich darüber beklagen, dass diese Änderung das TLS-Handshake zu Webservern kaputt machen kann. Das betrifft auch auf Chromium basierende Browser wie den Edge 124.
---------------------------------------------
https://www.borncity.com/blog/2024/04/30/chrome-124-macht-tls-handshake-kap…
∗∗∗ Google Play blockiert mehr als 2 Millionen Trojaner-Apps – Tendenz steigend ∗∗∗
---------------------------------------------
Dank strengerer Sicherheitschecks sperrte Google 2023 knapp 2,3 Millionen böse Apps aus. Trotz gesteigerter Bemühungen schlüpfen aber immer noch welche durch.
---------------------------------------------
https://heise.de/-9703405
∗∗∗ CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure ∗∗∗
---------------------------------------------
New CISA guidelines categorize AI risks into three significant types and pushes a four-part mitigation strategy. [..] The guidelines calls on management to act decisively on identified AI risks to enhance safety and security, ensuring that risk management controls are implemented and maintained to optimize the benefits of AI systems while minimizing adverse effects.
---------------------------------------------
https://www.securityweek.com/cisa-rolls-out-new-guidelines-to-mitigate-ai-r…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (org-mode), Oracle (shim and tigervnc), Red Hat (ansible-core, avahi, buildah, container-tools:4.0, containernetworking-plugins, edk2, exfatprogs, fence-agents, file, freeglut, freerdp, frr, grub2, gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, harfbuzz, httpd, ipa, kernel, libjpeg-turbo, libnbd, LibRaw, libsndfile, libssh, libtiff, libvirt, libX11, libXpm, mingw components, mingw-glib2, mingw-pixman, mod_http2, mod_jk and mod_proxy_cluster, motif, mutt, openssl and openssl-fips-provider, osbuild and osbuild-composer, pam, pcp, pcs, perl, pmix, podman, python-jinja2, python3.11, python3.11-cryptography, python3.11-urllib3, qemu-kvm, qt5-qtbase, runc, skopeo, squashfs-tools, systemd, tcpdump, tigervnc, toolbox, traceroute, webkit2gtk3, wpa_supplicant, xorg-x11-server, xorg-x11-server-Xwayland, and zziplib), SUSE (docker, ffmpeg, ffmpeg-4, frr, and kernel), and Ubuntu (anope, freerdp3, and php7.0, php7.2, php7.4, php8.1).
---------------------------------------------
https://lwn.net/Articles/971740/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ ChromeOS: Long Term Support Channel Update for ChromeOS ∗∗∗
---------------------------------------------
http://chromereleases.googleblog.com/2024/04/long-term-support-channel-upda…
∗∗∗ [R1] Nessus Network Monitor 6.4.0 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2024-07
∗∗∗ Delta Electronics CNCSoft-G2 DOPSoft ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/icsa-24-121-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 26-04-2024 18:00 − Montag 29-04-2024 18:01
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Winrar: Gefälschte Ausgaben unter Linux möglich und MotW-Probleme in Windows ∗∗∗
---------------------------------------------
Die Version 7.00 der Archiv-Software Winrar schließt auch Sicherheitslücken. Unter Linux lassen sich Ausgaben fälschen, in Windows MotW-Markierungen. [..] Winrar 7.00 wurde schon vor einigen Wochen veröffentlicht.
---------------------------------------------
https://heise.de/-9701474
∗∗∗ Okta warns of "unprecedented" credential stuffing attacks on customers ∗∗∗
---------------------------------------------
Okta warns of an "unprecedented" spike in credential stuffing attacks targeting its identity and access management solutions, with some customer accounts breached in the attacks. [..] Okta also provides in its advisory a list of more generic recommendations that can help mitigate the risk of account takover.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/okta-warns-of-unprecedented-…
∗∗∗ D-Link NAS Device Backdoor Abused, (Mon, Apr 29th) ∗∗∗
---------------------------------------------
End of March, NetworkSecurityFish disclosed a vulnerability in various D-Link NAS devices. The vulnerability allows access to the device using the user "messagebus" without credentials. [..] Initial exploit attempts were detected as soon as April 8th. The vulnerability is particularly dangerous as some affected devices are no longer supported by DLink, and no patch is expected to be released.
---------------------------------------------
https://isc.sans.edu/diary/rss/30878
∗∗∗ New R Programming Vulnerability Exposes Projects to Supply Chain Attacks ∗∗∗
---------------------------------------------
A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS (R Data Serialization) file such that it results in code execution when loaded and referenced. [..] The security defect has been addressed in version 4.4.0 released on April 24, 2024, following responsible disclosure.
---------------------------------------------
https://thehackernews.com/2024/04/new-r-programming-vulnerability-exposes.h…
∗∗∗ Discord dismantles Spy.pet site that snooped on millions of users ∗∗∗
---------------------------------------------
The site, which has been slurping up public data on Discord users since November of last year, was outed to the world last week after it was discovered the platform contained messages belonging to nearly 620 million users from more than 14,000 Discord servers. Any and all of the data was available for a price – Spy.pet offered to help law enforcement, people spying on their friends, or even those training AI models.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2024/04/29/infosec_in_b…
∗∗∗ Google-Bewertungen entfernen lassen? Vorsicht vor entferno.at ∗∗∗
---------------------------------------------
entferno.at verspricht, Google-Rezensionen entfernen zu lassen – angeblich mit einer Erfolgsquote von 95 Prozent. Wer auf dieses Angebot eingeht, wird aber enttäuscht, denn trotz Bezahlung wurden in aktuellen Fällen keine Bewertungen gelöscht und auf schriftliche und telefonische Anfragen wurde nicht mehr reagiert. Das Geld ist weg!
---------------------------------------------
https://www.watchlist-internet.at/news/google-bewertungen-entfernen-lassen-…
∗∗∗ From IcedID to Dagon Locker Ransomware in 29 Days ∗∗∗
---------------------------------------------
In August 2023, we observed an intrusion that started with a phishing campaign using PrometheusTDS to distribute IcedID. [..] This case had a TTR (time to ransomware) of 29 days.
---------------------------------------------
https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware…
∗∗∗ Britische Regierung verbietet Geräte mit schwachen Passwörtern ∗∗∗
---------------------------------------------
Unternehmen sind gesetzlich verpflichtet, ihre Geräte vor Cyberkriminellen zu schützen. Smartphones mit unsicheren Passwörtern müssen künftig gemeldet werden.
---------------------------------------------
https://heise.de/-9702215
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (buildah, go-toolset:rhel8, golang, java-11-openjdk, java-21-openjdk, libreswan, thunderbird, and tigervnc), Debian (chromium, emacs, frr, mediawiki, ruby-rack, trafficserver, and zabbix), Fedora (chromium, grub2, python-idna, and python-reportlab), Mageia (chromium-browser-stable, firefox, opencryptoki, and thunderbird), Red Hat (container-tools:4.0, container-tools:rhel8, git-lfs, and shim), SUSE (frr, java-11-openjdk, java-1_8_0-openjdk, kernel, pdns-recursor, and shim), and Ubuntu (apache2, cpio, curl, glibc, gnutls28, less, libvirt, and pillow).
---------------------------------------------
https://lwn.net/Articles/971487/
∗∗∗ Qnap schließt NAS-Sicherheitslücken aus Hacker-Wettbewerb Pwn2Own ∗∗∗
---------------------------------------------
NAS-Modelle von Qnap sind verwundbar. Nun hat der Hersteller Sicherheitsupdates für das Betriebssystem und Apps veröffentlicht.
---------------------------------------------
https://heise.de/-9701977
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 25-04-2024 18:00 − Freitag 26-04-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ NIS2 – Richtlinie: Ein zweiter Blick auf den Text ∗∗∗
---------------------------------------------
Beim Schreiben unserer Stellungnahmen zum Entwurf des NISG 2024 habe ich mir die Paragrafen, die uns betreffen, genauer angesehen. Diesmal nicht mit dem Blickwinkel „macht das Sinn“, sondern mit Fokus auf die Formulierungen. Das erinnert mich ein bisschen an die Zeit, als ich bei der Erstellung von RFCs mitgearbeitet habe und da auch bei Reviews jedes Wort genau auf mögliche Fehldeutungen abgeklopft habe. Ich hatte beim Lesen drei Dokumente offen: den Gesetzesentwurf, die Richtlinie in der deutschen Version und auch die englische Fassung. Und viele der schlechten Formulierungen waren keine Erfindungen aus Wien, sondern wurden schon in Brüssel erfunden. Ich will das hier dokumentieren.
---------------------------------------------
https://cert.at/de/blog/2024/4/nis2-formulierungen
∗∗∗ Researchers sinkhole PlugX malware server with 2.5 million unique IPs ∗∗∗
---------------------------------------------
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months more than 2.5 million connections from unique IP addresses. [..] Sekoia has formulated two strategies to clean computers reaching their sinkhole and called for national cybersecurity teams and law enforcement agencies to join the disinfection effort.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/researchers-sinkhole-plugx-m…
∗∗∗ Per Brute Force: Schwachstelle beim GLS-Tracking legt Empfängeradressen offen ∗∗∗
---------------------------------------------
Durch einen fehlenden Brute-Force-Schutz ist es möglich gewesen, einer API von GLS genaue Adressdaten der Empfänger von GLS-Paketen zu entlocken.
---------------------------------------------
https://www.golem.de/news/per-brute-force-schwachstelle-beim-gls-tracking-l…
∗∗∗ Per GPU geknackt: So sicher sind 8-Zeichen-Passwörter 2024 ∗∗∗
---------------------------------------------
Ein gutes Passwort sollte mindestens 8 Zeichen lang sein, lautet oftmals die Empfehlung. Neue Untersuchungen zeigen jedoch: Die Zeit ist reif für mehr. [..] Ein neuer Bericht des Cybersecurity-Unternehmens Hive Systems zeigt jedoch, dass sich 8-Zeichen-Passwörter je nach verwendetem Hashing-Algorithmus und verfügbarer GPU-Leistung inzwischen in einer überschaubaren Zeit knacken lassen.
---------------------------------------------
https://www.golem.de/news/per-gpu-geknackt-so-sicher-sind-8-zeichen-passwoe…
∗∗∗ Fake-Rechnungen von firmenradar.com im Umlauf! ∗∗∗
---------------------------------------------
Unternehmen wenden sich derzeit an uns, weil sie Rechnungen erhalten und nicht wissen, wofür sie zahlen sollen. Die Rechnungen stammen von firmenradar.com, verlangt werden 899 Euro für einen „Platin-Eintrag“. Zahlen Sie nichts! Es handelt sich um Betrug.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-rechnungen-von-firmenradarcom-i…
∗∗∗ “Junk gun” ransomware: the cheap new threat to small businesses ∗∗∗
---------------------------------------------
A wave of cheap, crude, amateurish ransomware has been spotted on the dark web - and although it may not make as many headlines as LockBit, Rhysida, and BlackSuit, it still presents a serious threat to organizations. [..] "Junk gun" ransomware is appealing to a criminal who wants to operate independently but lacks technical skills. [..] A low entry barrier means potentially more ransomware attackers.
---------------------------------------------
https://www.tripwire.com/state-of-security/junk-gun-ransomware-cheap-new-th…
∗∗∗ C-DATA Web Management System RCE Attack ∗∗∗
---------------------------------------------
FortiGuard Labs observed a critical level of attack attempts in the wild targeting a 2-year-old vulnerability found on C-DATA Web Management System. [..] The vulnerability CVE-2022-4257 allows a remote attacker to execute arbitrary commands on the target system.
---------------------------------------------
https://fortiguard.fortinet.com/outbreak-alert/c-data-rce-attack
∗∗∗ Chinesische Tastatur-Apps haben Schwachstelle und verraten, was Nutzer tippen ∗∗∗
---------------------------------------------
Bereits im August 2023 stellten die Forscher des Citizen Lab fest, dass die beliebte Tastatur-App Sogou bei der Übertragung von Tastenanschlagsdaten an ihren Cloud-Server für bessere Tippvorhersagen keine Transport Layer Security (TLS) nutzte. Ohne TLS können Tastatureingaben jedoch von Dritten mitgeschnitten werden. Obwohl Sogou das Problem nach Bekanntwerden im letzten Jahr behoben hat, sind viele vorinstallierte Sogou-Tastaturen nicht auf dem neuesten Stand und können weiterhin abgehört werden.
---------------------------------------------
https://heise.de/-9699644
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (knot-resolver, pdns-recursor, and putty), Fedora (xen), Mageia (editorconfig-core-c, glibc, mbedtls, webkit2, and wireshark), Oracle (buildah), Red Hat (buildah and yajl), Slackware (libarchive), SUSE (dcmtk, openCryptoki, php7, php74, php8, python-gunicorn, python-idna, qemu, and thunderbird), and Ubuntu (cryptojs, freerdp2, nghttp2, and zabbix).
---------------------------------------------
https://lwn.net/Articles/971289/
∗∗∗ QNAP Security Advisories 2024-04-26 ∗∗∗
---------------------------------------------
QNAP released 6 new security Advisories.
---------------------------------------------
https://www.qnap.com/en-us/security-advisories
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Mattermost security updates 9.7.2 / 9.6.2 / 9.5.4 (ESR) / 8.1.13 (ESR) released ∗∗∗
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-9-7-2-9-6-2-9-5-4-e…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 24-04-2024 18:00 − Donnerstag 25-04-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ New Brokewell malware takes over Android devices, steals data ∗∗∗
---------------------------------------------
Security researchers have discovered a new Android banking trojan they named Brokewell that can capture every event on the device, from touches and information displayed to text input and the applications the user launches.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-brokewell-malware-takes-…
∗∗∗ Does it matter if iptables isnt running on my honeypot?, (Thu, Apr 25th) ∗∗∗
---------------------------------------------
I've been working on comparing data from different DShield honeypots to understand differences when the honeypots reside on different networks.
---------------------------------------------
https://isc.sans.edu/diary/rss/30862
∗∗∗ Sifting through the spines: identifying (potential) Cactus ransomware victims ∗∗∗
---------------------------------------------
This blog is part of a series written by various Dutch cyber security firms that have collaborated on the Cactus ransomware group, which exploits Qlik Sense servers for initial access.
---------------------------------------------
https://research.nccgroup.com/2024/04/25/sifting-through-the-spines-identif…
∗∗∗ ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices ∗∗∗
---------------------------------------------
ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns.
---------------------------------------------
https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaig…
∗∗∗ Talos IR trends: BEC attacks surge, while weaknesses in MFA persist ∗∗∗
---------------------------------------------
Within BEC attacks, adversaries will send phishing emails appearing to be from a known or reputable source making a valid request, such as updating payroll direct deposit information.
---------------------------------------------
https://blog.talosintelligence.com/talos-ir-quarterly-trends-q1-2024/
∗∗∗ Threat Bulletin – New variant of IDAT Loader ∗∗∗
---------------------------------------------
Morphisec has successfully identified and prevented a new variant of IDAT loader.
---------------------------------------------
https://blog.morphisec.com/threat-bulletin-new-variant-idat-variant
∗∗∗ Ransomware Roundup - KageNoHitobito and DoNex ∗∗∗
---------------------------------------------
The KageNoHitobito and DoNex are recent ransomware that are financially motivated, demanding payment from victims to decrypt files.
---------------------------------------------
https://feeds.fortinet.com/~/882489596/0/fortinet/blogs~Ransomware-Roundup-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Maximum severity Flowmon bug has a public exploit, patch now ∗∗∗
---------------------------------------------
Proof-of-concept exploit code has been released for a top-severity security vulnerability in Progress Flowmon, a tool for monitoring network performance and visibility.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/maximum-severity-flowmon-bug…
∗∗∗ WP Automatic WordPress plugin hit by millions of SQL injection attacks ∗∗∗
---------------------------------------------
Hackers have started to target a critical severity vulnerability in the WP Automatic plugin for WordPress to create user accounts with administrative privileges and to plant backdoors for long-term access.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/wp-automatic-wordpress-plugi…
∗∗∗ Über Zero-Day-Schwachstellen: Cisco-Firewalls werden seit Monaten attackiert ∗∗∗
---------------------------------------------
Eine zuvor unbekannte Hackergruppe nutzt mindestens seit November 2023 zwei Zero-Day-Schwachstellen in Cisco-Firewalls aus, um Netzwerke zu infiltrieren.
---------------------------------------------
https://www.golem.de/news/ueber-zero-day-schwachstellen-cisco-firewalls-wer…
∗∗∗ Unter Windows: Schwachstelle in Virtualbox verleiht Angreifern Systemrechte ∗∗∗
---------------------------------------------
Zwei Forscher haben unabhängig voneinander eine Schwachstelle in Oracles Virtualbox entdeckt. Angreifer können damit auf Windows-Hosts ihre Rechte ausweiten.
---------------------------------------------
https://www.golem.de/news/unter-windows-schwachstelle-in-virtualbox-verleih…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (curl, filezilla, flatpak, kubernetes, libfilezilla, thunderbird, and xen), Oracle (go-toolset:ol8, kernel, libreswan, shim, and tigervnc), Red Hat (buildah, gnutls, libreswan, tigervnc, and unbound), SUSE (cockpit-wicked, nrpe, and python-idna), and Ubuntu (dnsmasq, freerdp2, linux-azure-6.5, and thunderbird).
---------------------------------------------
https://lwn.net/Articles/971140/
∗∗∗ Vulnerabilities Expose Brocade SAN Appliances, Switches to Hacking ∗∗∗
---------------------------------------------
The Brocade SANnav management application is affected by multiple vulnerabilities, including a publicly available root password.
---------------------------------------------
https://www.securityweek.com/vulnerabilities-expose-brocade-san-appliances-…
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Cisco Security Advisories 2024-04-25 ∗∗∗
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/publicationListing.x
∗∗∗ Multiple Vulnerabilities in Hitachi Energy RTU500 Series ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-116-01
∗∗∗ Honeywell Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, Safety Manager SC ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-116-04
∗∗∗ Hitachi Energy MACH SCM ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-116-02
∗∗∗ PAN-SA-2024-0005 Informational Bulletin: Proof of Concept (PoC) Bypasses Protection Modules (Severity: NONE) ∗∗∗
---------------------------------------------
https://security.paloaltonetworks.com/PAN-SA-2024-0005
∗∗∗ PAN-SA-2024-0005 Informational Bulletin: Proof of Concept (PoC) Bypasses Protection Modules in Cortex XDR Agent (Severity: NONE) ∗∗∗
---------------------------------------------
https://security.paloaltonetworks.com/PAN-SA-2024-0005
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-04-2024 18:00 − Mittwoch 24-04-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Microsoft pulls fix for Outlook bug behind ICS security alerts ∗∗∗
---------------------------------------------
Microsoft reversed the fix for an Outlook bug causing erroneous security warnings after installing December 2023 security updates.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/microsoft-pulls-fix-for-out…
∗∗∗ Assessing the Y, and How, of the XZ Utils incident ∗∗∗
---------------------------------------------
In this article we analyze social engineering aspects of the XZ backdoor incident. Namely pressuring the XZ maintainer to pass on the project to Jia Cheong Tan, and then urging major downstream maintainers to commit the backdoored code to their projects.
---------------------------------------------
https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/
∗∗∗ Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered an ongoing attack campaign thats leveraging phishing emails to deliver malware called SSLoad.
---------------------------------------------
https://thehackernews.com/2024/04/researchers-detail-multistage-attack.html
∗∗∗ Decrypting FortiOS 7.0.x ∗∗∗
---------------------------------------------
Decrypting Fortinet’s FortiGate FortiOS firmware is a topic that has been thoroughly covered, in part because of the many variants and permutations of FortiOS firmware, all differing based on hardware architecture and versioning.
---------------------------------------------
https://www.labs.greynoise.io/grimoire/2024-04-23-decrypting-fortios/
∗∗∗ New Password Cracking Analysis Targets Bcrypt ∗∗∗
---------------------------------------------
Hive Systems conducts another study on cracking passwords via brute-force attacks, but it’s no longer targeting MD5.
---------------------------------------------
https://www.securityweek.com/new-password-cracking-analysis-targets-bcrypt/
∗∗∗ Musiker:innen aufgepasst: Spam-Mails versprechen wertvolles Piano ∗∗∗
---------------------------------------------
Musiker:innen und insbesondere Pianist:innen müssen sich aktuell vor betrügerischen E-Mails in Acht nehmen, in denen ihnen ein teures Piano versprochen wird. Kriminelle geben sich als Witwe aus und suchen nach Abnehmer:innen für teure Instrumente wie beispielsweise wie das Yamaha Baby Grand Piano ihres verstorbenen Ehemanns.
---------------------------------------------
https://www.watchlist-internet.at/news/musikerinnen-aufgepasst-spam-mails-v…
∗∗∗ Windows-Frage: Wo speichert Bitlocker den Recovery-Key? ∗∗∗
---------------------------------------------
Bitlocker, das "unbekannte Wesen" möchte ich mal den Blog-Beitrag umschreiben. Es geht um die Frage, wo die Windows-Funktion Bitlocker eigentlich den Recovery-Key, der immer mal wieder gebraucht wird, überhaupt speichert.
---------------------------------------------
https://www.borncity.com/blog/2024/04/24/windows-frage-wo-speichert-bitlock…
∗∗∗ Exchange Server April 2024 Hotfix-Updates (24. April 2024) ∗∗∗
---------------------------------------------
Microsoft hat zum 24. April Hotfix-Updates (HU) für Exchange Server 2016 und 2019 veröffentlicht. Diese Hotfix-Updates bieten Unterstützung für neue Funktionen und sollen Probleme, die durch das März 2024 Security Update (SU) hervorgerufen wurden, beheben.
---------------------------------------------
https://www.borncity.com/blog/2024/04/24/exchange-server-april-2024-hotfix-…
∗∗∗ Distribution of Infostealer Made With Electron ∗∗∗
---------------------------------------------
AhnLab SEcurity intelligence Center (ASEC) has discovered an Infostealer strain made with Electron.
---------------------------------------------
https://asec.ahnlab.com/en/64445/
=====================
= Vulnerabilities =
=====================
∗∗∗ Grafana backend sql injection affected all version ∗∗∗
---------------------------------------------
To exploit this sql injection vulnerability, someone must use a valid account login to the grafana web backend, then send malicious POST request to /api/ds/query “rawSql” entry.
---------------------------------------------
https://fdlucifer.github.io/2024/04/22/grafana-sql-injection/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (abseil-cpp, chromium, filezilla, libfilezilla, and xorg-x11-server-Xwayland), Oracle (firefox, gnutls, golang, java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, java-21-openjdk, kernel, libreswan, mod_http2, owO: thunderbird, and thunderbird), Red Hat (container-tools:rhel8, gnutls, grub2, kernel, kernel-rt, less, linux-firmware, opencryptoki, pcs, postgresql-jdbc, and thunderbird), Slackware (ruby), SUSE (kubernetes1.23, kubernetes1.24, [...]
---------------------------------------------
https://lwn.net/Articles/971004/
∗∗∗ Google Patches Critical Chrome Vulnerability ∗∗∗
---------------------------------------------
Google patches CVE-2024-4058, a critical Chrome vulnerability for which researchers earned a $16,000 reward.
---------------------------------------------
https://www.securityweek.com/google-patches-critical-chrome-vulnerability/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Security Advisory - Connection Hijacking Vulnerability in Some Huawei Home Routers ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily