=======================
= End-of-Shift report =
=======================
Timeframe: Montag 08-05-2017 18:00 − Dienstag 09-05-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** SAP Security Patch Day - May 2017 ***
---------------------------------------------
This post by SAP Product Security Response Team shares information on Patch Day Security Notes* that are released on second Tuesday of every month and fix vulnerabilities discovered in SAP products. SAP strongly recommends that [...]
---------------------------------------------
https://blogs.sap.com/2017/05/09/sap-security-patch-day-may-2017/
*** Project Zero: Microsofts Antivirensoftware gefährdet Windows-Nutzer ***
---------------------------------------------
Googles Project Zero hat eine schwerwiegende Sicherheitslücke in der Anti-Viren-Engine von Microsoft entdeckt. Schuld daran ist die simulierte Ausführung von Javascript-Code ohne Sandbox.
---------------------------------------------
https://www.golem.de/news/project-zero-microsofts-antivirensoftware-gefaehr…
*** Defeating Magento security mechanisms: Attacks used in the real world ***
---------------------------------------------
DefenseCode recently discovered and reported multiple stored cross-site scripting and cross-site request forgery vulnerabilities in Magento 1 and 2 which will be addressed in one of the future patches. In light of these findings, this article describes examples of several attacks used in the real world that combine common vulnerabilities with faulty security mechanisms in Magento, leading to an unfavourable outcome. Examples will be aimed at Magento 2, but most of them can be applied [...]
---------------------------------------------
https://www.helpnetsecurity.com/2017/05/09/defeating-magento-security/
*** Zeit für eine AMTshandlung? ***
---------------------------------------------
Letzte Woche veröffentlichte Intel ein Advisory über eine Schwachstelle in "Intel Active Management Technology", kurz AMT. Besagte Schwachstelle erlaubt einem Angreifer, auf einem Rechner mit aktiviertem AMT, die Zugriffskontrollen für eben jenes auszuhebeln, und so administrativen Zugriff zu erlangen - [...]
---------------------------------------------
http://www.cert.at/services/blog/20170508175554-1982.html
*** [2017-05-09] Multiple vulnerabilities in I, Librarian PDF manager ***
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2017…
*** Bugtraq: ESA-2017-035: EMC Mainframe Enablers ResourcePak Base privilege management vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540531
*** Security Update for Microsoft Malware Protection Engine ***
---------------------------------------------
The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system.
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/4022344
*** Security Bulletin posted for Adobe Flash Player and Adobe Experience Manager Forms ***
---------------------------------------------
Adobe has published security bulletins for Adobe Flash Player (APSB17-15) and Adobe Experience Manager Forms (APSB17-16). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1465
*** Vuln: Trend Micro Threat Discovery Appliance CVE-2016-8591 Command Injection Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/98343
*** Vuln: Trend Micro Threat Discovery Appliance CVE-2016-8592 Command Injection Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/98345
*** Cisco IOS and IOS XE Software Simple Network Management Protocol Subsystem Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition.The vulnerability is due to a race condition that could occur when the affected software processes an SNMP read request that contains certain criteria for a specific object ID (OID) and an active crypto session is disconnected on an affected device. An attacker who can authenticate [...]
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
*** F5 Security Advisories ***
---------------------------------------------
*** NTP vulnerability CVE-2017-6451 ***
https://support.f5.com/csp/article/K32262483
---------------------------------------------
*** NTP vulnerability CVE-2017-6462 ***
https://support.f5.com/csp/article/K07082049
---------------------------------------------
*** NTP vulnerability CVE-2017-6458 ***
https://support.f5.com/csp/article/K99254031
---------------------------------------------
*** NTP vulnerability CVE-2017-6460 ***
https://support.f5.com/csp/article/K31310492
---------------------------------------------
*** NTP vulnerability CVE-2017-6464 ***
https://support.f5.com/csp/article/K96670746
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities may affect IBM SDK, Java Technology Edition ***
https://www.ibm.com/support/docview.wss?uid=swg22002169
---------------------------------------------
*** IBM Security Bulletin: Security vulnerability affects the Lifecycle Query Engine (LQE) that is shipped with Jazz Reporting Service (CVE-2017-1095) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22001006
---------------------------------------------
*** IBM Security Bulletin: Security vulnerability affects the Lifecycle Query Engine (LQE) that is shipped with Jazz Reporting Service (CVE-2017-1094) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22001002
---------------------------------------------
*** IBM Security Bulletin: There are multiple vulnerabilities in IBM Java Runtime and Apache Tomcat that affect IBM Cognos Business Viewpoint ***
http://www.ibm.com/support/docview.wss?uid=swg22003122
---------------------------------------------
*** IBM Security Bulletin: Secure properties can be shown in plain text in IBM UrbanCode Deploy (CVE-2016-9007) ***
http://www-01.ibm.com/support/docview.wss?uid=swg2C1000236
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Business Developer ***
http://www.ibm.com/support/docview.wss?uid=swg22002667
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Rational Application Developer for WebSphere Software ***
http://www-01.ibm.com/support/docview.wss?uid=swg22003145
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in the SQLite component of the Response Time agent affects IBM Performance Management products (CVE-2016-6153) ***
http://www.ibm.com/support/docview.wss?uid=swg22000836
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 05-05-2017 18:00 − Montag 08-05-2017 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Intels ME-Sicherheitslücke: Tipps und Links ***
---------------------------------------------
Praxistipps zu der am 1. Mai von Intel gemeldeten Sicherheitslücke in der Firmware der Management Engine vieler Desktop-PCs, Server und Notebooks.
---------------------------------------------
https://heise.de/-3704563
*** Researchers Disclose Intel AMT Flaw Research ***
---------------------------------------------
Security firm Embedi releases further details on the Intel AMT flaw, revealing how it can be exploited and how potentially dangerous it can be.
---------------------------------------------
http://threatpost.com/researchers-disclose-intel-amt-flaw-research/125503/
*** Dell patches AMT-vulnerable systems ***
---------------------------------------------
BIOS fixes for most boxen landed Friday Dell, which last week was scrambling to work out which of its systems are affected by the Intel AMT vulnerability, has caught up with peers HP Inc, Lenovo and Fujitsu.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2017/05/07/dell_patche…
*** Hacker-Wettbewerb: Cyber Security Challenge startet ***
---------------------------------------------
Zahlreiche Teilnehmer der vergangenen Jahre haben über den Hacker-Wettbewerb Jobs in der Security-Branche gefunden. Heuer wird erstmals auch eine Starter Challenge angeboten.
---------------------------------------------
https://futurezone.at/digital-life/hacker-wettbewerb-cyber-security-challen…
*** Emsisoft Releases a Decryptor for the Amnesia Ransomware ***
---------------------------------------------
On Satruday, Emsisofts CTO and malware researcher Fabian Wosar released a decryptor for the Amnesia Ransomware. This ransomware was first spotted in early May and has had one other variant released. It was named Amnesia based on the extension appended to encrypted files by the first variant. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/emsisoft-releases-a-decrypto…
*** Exploring a P2P Transient Botnet - From Discovery to Enumeration, (Mon, May 8th) ***
---------------------------------------------
[This is a guest diary by Renato Marinho of Morphus Labs. If you are interested in writing a guest diary: please send suggestions to us via our contact page] 1. Introduction We recently deployed a high interaction honeypotsexpecting it to be compromised by a specific malware. But in the first few days, instead of getting infected by the expected malware, it received a variety of attacks ranging from SSH port forwarding to Viagra and Cialis SPAM to XORDDoS failed deployment attempts. By the [...]
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22392&rss
*** Phishingversuch bei willhaben-Kunden ***
---------------------------------------------
Nutzer/innen von willhaben erhalten eine WhatsApp-Nachricht, die angeblich von der Kleinanzeigenplattform stammt.
---------------------------------------------
https://www.watchlist-internet.at/phishing/phishingversuch-bei-willhaben-ku…
*** In eigener Sache: CERT.at sucht Verstärkung ***
---------------------------------------------
Für unser "Daily Business" suchen wir derzeit 1 Berufsein- oder -umsteiger/in mit ausgeprägtem Interesse an IT-Security, welche/r uns bei den täglich anfallenden Standard-Aufgaben unterstützt. Details finden sich [...]
---------------------------------------------
http://www.cert.at/services/blog/20170508172334-1993.html
*** DFN-CERT-2017-0796: Nextcloud: Mehrere Schwachstellen ermöglichen u.a. das Ausspähen von Informationen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0796/
*** Vuln: Panda Mobile Security for iOS CVE-2017-8060 TLS Certificate Validation Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/98327
*** HPESBGN03740 rev.1 - HPE Network Automation, Multiple Remote Vulnerabilities ***
---------------------------------------------
Potential security vulnerabilities have been identified in HPE Network Automation. The vulnerabilities could be remotely exploited to allow SQL injection, code execution, information disclosure, authentication bypass, elevated privilege execution, and invalid session management.
---------------------------------------------
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn0374…
*** BlackBerry powered by Android Security Bulletin - May 2017 ***
---------------------------------------------
BlackBerry has released a security update to address multiple vulnerabilities in BlackBerry powered by Android smartphones. We recommend users update to the latest available software build. BlackBerry releases security bulletins to notify users of its Android smartphones about available security fixes; see BlackBerry.com/bbsirt for a complete list of monthly bulletins. This advisory is in response to the Android Security Bulletin (May 2017) and addresses issues in that bulletin that affect [...]
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber…
*** Bugtraq: CA20170504-01: Security Notice for CA Client Automation OS Installation Management ***
---------------------------------------------
http://www.securityfocus.com/archive/1/540524
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Explorer for z/OS V3.0.1 (CVE-2016-5548 and CVE-2016-5549) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg22002413
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Tivoli Netcool Configuration Manager (ITNCM) (CVE-2016-5597, CVE-2016-5542) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21994526
*** Siemens Security Advisories ***
---------------------------------------------
*** SSA-701708 (Last Update 2017-05-08): Local Privilege Escalation in Industrial Products ***
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708…
---------------------------------------------
*** SSA-156872 (Last Update 2017-05-08): Vulnerability in SIMATIC WinCC and SIMATIC WinCC Runtime Professional ***
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-156872…
---------------------------------------------
*** SSA-275839 (Last Update 2017-05-08): Denial-of-Service Vulnerability in Industrial Products ***
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-275839…
---------------------------------------------
*** SSA-293562 (Last Update 2017-05-08): Vulnerabilities in Industrial Products ***
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562…
---------------------------------------------
*** SSA-731239 (Last Update 2017-05-08): Vulnerabilities in SIMATIC S7-300 and S7-400 CPUs ***
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-731239…
---------------------------------------------
*** F5 Security Advisories ***
---------------------------------------------
*** BIG-IP APM redirect vulnerability CVE-2017-0302 ***
https://support.f5.com/csp/article/K87141725
---------------------------------------------
*** Insufficient validation of ICMP error messages CVE-2004-0790 (11.x - 13.x) ***
https://support.f5.com/csp/article/K23440942
---------------------------------------------
*** BIG-IP management vulnerability CVE-2017-9250 ***
https://support.f5.com/csp/article/K55792317
---------------------------------------------
*** iControl REST vulnerability CVE-2016-9251 ***
https://support.f5.com/csp/article/K41107914
---------------------------------------------
*** Linux kernel vulnerability CVE-2017-2647 ***
https://support.f5.com/csp/article/K32115847
---------------------------------------------
*** Websocket profile vulnerability CVE-2016-9253 ***
https://support.f5.com/csp/article/K51351360
---------------------------------------------
*** TMM vulnerability CVE-2017-6137 ***
https://support.f5.com/csp/article/K82851041
---------------------------------------------
*** BIG-IP APM XSS vulnerability CVE-2016-9257 ***
https://support.f5.com/csp/article/K43523962
---------------------------------------------
*** Multiple Oracle MySQL vulnerabilities ***
https://support.f5.com/csp/article/K77508618
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 04-05-2017 18:00 − Freitag 05-05-2017 18:00
Handler: Robert Waldner
Co-Handler: Petr Sikuta
*** Bondnet botnet goes after vulnerable Windows servers ***
---------------------------------------------
A botnet consisting of some 2,000 compromised servers has been mining cryptocurrency for its master for several months now, "earning" him around $1,000 per day. GuardiCore researchers first spotted it in December 2016, and have been mapping it out and following its evolution since then. The've dubbed it Bondnet, after the handle its herder uses online [...]
---------------------------------------------
https://www.helpnetsecurity.com/2017/05/04/compromised-windows-servers/
*** Unpatched WordPress Password Reset Vulnerability Lingers ***
---------------------------------------------
A zero day vulnerability exists in WordPress Core that in some instances, could allow an attacker to reset a users password and in turn, gain access to their account.
---------------------------------------------
http://threatpost.com/unpatched-wordpress-password-reset-vulnerability-ling…
*** 1 Million Gmail Users Impacted by Google Docs Phishing Attack ***
---------------------------------------------
Researchers said good social engineering and users' trust in the convenience afforded by the OAUTH mechanism guaranteed Wednesday's Google Docs phishing attacks would spread quickly.
---------------------------------------------
http://threatpost.com/1-million-gmail-users-impacted-by-google-docs-phishin…
*** New Mac Malware Manages to Spy on Encrypted Browser Traffic ***
---------------------------------------------
This blog was written by Douglas McKee. There's a new cyberattack targeted at Mac OS users'a malware program called OSX/Dok. Discovered late last week primarily in Europe, the program is capable of spying on encrypted browser traffic to steal sensitive information. You heard correctly: it can eavesdrop on all of your web browsing. How does [...]
---------------------------------------------
https://securingtomorrow.mcafee.com/business/new-mac-malware-manages-spy-en…
*** Dridex and Locky Return Via PDF Attachments in Latest Campaigns ***
---------------------------------------------
Dridex and Locky, two prolific malware families that made waves in 2016 after being distributed in several high-volume spam campaigns, have returned after a brief hiatus. FireEye observed a decline in the volume of Dridex and Locky in the latter half of 2016, but we recently observed two new large campaigns. While the PDF downloader described in this post is responsible for spreading both Dridex and Locky, for the purposes of this blog, we will be discussing the PDF downloader and the Dridex [...]
---------------------------------------------
http://www.fireeye.com/blog/threat-research/2017/05/dridex_and_lockyret.html
*** Intel ME-Firmware: Hersteller kündigen Patches für Intel-Exploit an ***
---------------------------------------------
Bald sollen die ersten Updates für die Schwachstelle in der Management Engine von Intel-Systemen erscheinen. Derweil gibt es Unklarheit über Details zu der Sicherheitslücke.
---------------------------------------------
https://www.golem.de/news/intel-me-firmware-hersteller-kuendigen-patches-fu…
*** Carbanak Attackers Devise Clever New Persistence Trick ***
---------------------------------------------
Hackers behind the Carbanak criminal gang have devised a clever way to gain persistence on targeted systems to more effectively pull off financially motivated crimes.
---------------------------------------------
http://threatpost.com/carbanak-attackers-devise-clever-new-persistence-tric…
*** [SANS ISC] HTTP Headers' the Achilles' heel of many applications ***
---------------------------------------------
When browsing a target web application, a pentester is looking for all "entry" or "injection" points present in the pages. Everybody knows that a static website with pure HTML code is less juicy compared to a [...]
---------------------------------------------
https://blog.rootshell.be/2017/05/05/sans-isc-http-headers-achilles-heel-ma…
*** Snake malware ported from Windows to Mac ***
---------------------------------------------
Snake, also known as Turla and Uroburos, is backdoor malware that has been around and infecting Windows systems since at least 2008. It is thought to be Russian governmental malware and on Windows is highly-sophisticated. It was even seen infecting Linux systems in 2014. Now, it appears to have been ported to Mac.Categories: MacThreat analysisTags: Adobe Flash PlayerApplemacMac TrojanmalwareSnaketrojanTurlaUroburos [...]
---------------------------------------------
https://blog.malwarebytes.com/threat-analysis/2017/05/snake-malware-ported-…
*** More Android phones than ever are covertly listening for inaudible sounds in ads ***
---------------------------------------------
Your Android phone may be listening to ultrasonic ad beacons without your knowledge.
---------------------------------------------
https://arstechnica.com/security/2017/05/theres-a-spike-in-android-apps-tha…
*** DFN-CERT-2017-0790: LibreSSL : Eine Schwachstelle ermöglicht das Umgehen von Sicherheitsvorkehrungen ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0790/
*** Linux kernel vulnerability CVE-2017-7308 ***
---------------------------------------------
Linux kernel vulnerability CVE-2017-7308. Security Advisory. Security Advisory Description. The packet_set_ring function ...
---------------------------------------------
https://support.f5.com/csp/article/K82224417
*** Apache Tomcat vulnerability CVE-2017-5647 ***
---------------------------------------------
Apache Tomcat vulnerability CVE-2017-5647. Security Advisory. Security Advisory Description. A bug in the handling of ...
---------------------------------------------
https://support.f5.com/csp/article/K49000195
*** Hikvision Cameras ***
---------------------------------------------
This advisory contains mitigation details for use of improper authentication and password in configuration file vulnerabilities in Hikvision's cameras.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
*** Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras ***
---------------------------------------------
This advisory contains mitigation details for use of password hash instead of password for authentication and password in configuration file vulnerabilities in Dahua Technology Co., Ltd digital video recorders and IP cameras.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-02
*** Advantech WebAccess ***
---------------------------------------------
This advisory contains mitigation details for an absolute path traversal vulnerability in Advantech's WebAccess.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-03
*** Rockwell Automation ControlLogix 5580 and CompactLogix 5380 ***
---------------------------------------------
This advisory was originally posted to the NCCIC Portal on April 4, 2017, and is being released to the NCCIC/ICS-CERT web site. This advisory contains mitigation details for use a resource exhaustion vulnerability in Rockwell Automations ControlLogix 5580 and CompactLogix 5380.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-094-05
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in bind affects SmartCloud Entry (CVE-2016-9147) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1025133
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in memcached affects SmartCloud Entry (CVE-2016-8704, CVE-2016-8705) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1025081
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Tomcat affects IBM Algo One - Algo Risk Application (CVE-2016-8745) ***
http://www.ibm.com/support/docview.wss?uid=swg22000781
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities affect IBM Rational Quality Manager and IBM Rational Team Concert with potential for security attacks ***
http://www.ibm.com/support/docview.wss?uid=swg22002429
---------------------------------------------
*** IBM Security Bulletin: Cross Site Scripting (XSS) vulnerability affects Cognos Analytics ***
https://www-01.ibm.com/support/docview.wss?uid=swg21999791
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in Net-SNMP affects IBM Tivoli Composite Application Manager for Transactions (CVE-2015-5621) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000624
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 03-05-2017 18:00 − Donnerstag 04-05-2017 18:00
Handler: Olaf Schwarz
Co-Handler: Petr Sikuta
Co-Handler: Robert Waldner
*** Researcher: "Baseless Assumptions" Exist About Intel AMT Vulnerability ***
---------------------------------------------
Embedi, which is behind the Intel AMT vulnerability revealed Monday, seeks to clarify "baseless assumptions" being made about the flaw.
---------------------------------------------
http://threatpost.com/researcher-baseless-assumptions-exist-about-intel-amt…
*** Intel-ME-Sicherheitslücke: Erste Produktliste, noch keine Updates ***
---------------------------------------------
Zu der am 1. Mai von Intel gemeldeten Sicherheitslücke in der Management Engine (ME) gibt es einige neue Informationen, aber noch keine Updates.
---------------------------------------------
https://heise.de/-3703356
*** WordPress 4.6 Unauthenticated Remote Code Execution (RCE) PoC Exploit ***
---------------------------------------------
This advisory reveals details of exploitation of the PHPMailer
vulnerability (CVE-2016-10033) in WordPress Core which (contrary to what
was believed and announced by WordPress security team) was affected by the
vulnerability.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2017050014
*** Kazuar: Multiplatform Espionage Backdoor with API Access ***
---------------------------------------------
Unit 42 researchers have uncovered Kazuar, a backdoor Trojan used in an espionage campaign.The post Kazuar: Multiplatform Espionage Backdoor with API Access appeared first on Palo Alto Networks Blog.
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2017/05/unit42-kazuar-multiplatf…
*** A set of tutorials about code injection for Windows. ***
---------------------------------------------
Injectopi is a set of tutorials that Ive decided to write down in order to learn about various injection techniques in the Windows environment.
---------------------------------------------
https://github.com/peperunas/injectopi
*** Master-Fingerabdruck: Forscher können fast alle Smartphones entsperren ***
---------------------------------------------
Mithilfe von Maschinenlernen Trefferquote von 65 Prozent erreicht - Aktuelle Scanner zu niedrig aufgelöst
---------------------------------------------
http://derstandard.at/2000056971421
*** Checker ATM Security: Sicherheitslücke ermöglicht Übernahme von Geldautomaten ***
---------------------------------------------
Eine Sicherheitslücke in einer Sicherheitslösung für Geldautomaten konnte von Angreifern ausgenutzt werden, um illegal Geld auszuzahlen. Der Hersteller beschwichtigt und hat einen Patch bereitgestellt.
---------------------------------------------
https://www.golem.de/news/checker-atm-security-sicherheitsluecke-ermoeglich…
*** DFN-CERT-2017-0775/">LibTIFF: Mehrere Schwachstellen ermöglichen u.a. das Ausführen beliebigen Programmcodes ***
---------------------------------------------
Mehrere Schwachstellen in LibTIFF ermöglichen einem entfernten, nicht authentisierten Angreifer die Ausführung beliebigen Programmcodes, die Durchführung verschiedener Denial-of-Service (DoS)-Angriffe und das Ausspähen von Informationen mit Hilfe speziell präparierter Bilddateien.
Betroffene Plattformen
Debian Linux 8.7 Jessie
Debian Linux 9.0 Stretch
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0775/
*** USB-Sticks: IBM liefert Installationsmedien mit Malware aus ***
---------------------------------------------
Vom USB-Stick auf das Betriebssystem: Eine Schadsoftware verteilt sich von IBM-Produkten selbstständig. Betroffen sind die mitgelieferten Sticks mehrerer Storwize-Geräte. IBM rät, den USB-Stick zu formatieren oder gleich zu zerstören.
---------------------------------------------
https://www.golem.de/news/usb-sticks-ibm-liefert-installationsmedien-mit-ma…
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco CVR100W Wireless-N VPN Router Universal Plug-and-Play Buffer Overflow Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco IOS XR Software Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Aironet 1800, 2800, and 3800 Series Access Points Plug-and-Play Arbitrary Code Execution Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Wide Area Application Services SMART-SSL Accelerator Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Firepower Threat Defense and Cisco ASA with FirePOWER Module Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Finesse for Cisco Unified Contact Center Enterprise Information Disclosure Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco CVR100W Wireless-N VPN Router Remote Management Security Bypass Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco Unity Connection ImageID Parameter Unauthorized Access Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco TelePresence ICMP Denial of Service Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** Cisco CallManager Express Unauthorized Access Vulnerability ***
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: A vulnerability has been discovered in 40-GbE network interface modules for the IBM QRadar Network Security XGS 7100 appliance (CVE-2016-8106) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002624
---------------------------------------------
*** IBM Security Bulletin: A vulnerability has been discovered in 40-GbE network interface modules for the IBM Security Network Protection XGS 7100 appliance (CVE-2016-8106) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002507
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Apache Struts affects IBM Social Media Analytics (CVE-2017-5638) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22001731
---------------------------------------------
*** IBM Security Bulletin: Potential security vulnerability in WebSphere Application Server Administrative Console (CVE-2017-1137) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998469
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM B2B Advanced Communications ***
http://www.ibm.com/support/docview.wss?uid=swg22002517
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Security Network Controller (CVE-2016-7055) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002309
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Security Network Active Bypass (CVE-2016-7055) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002310
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSource ICU4C may affect IBM Streams (CVE-2016-6293, CVE-2016-7415) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002225
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in SQLite affects IBM Tivoli Composite Application Manager for Transactions (CVE-2016-6153 ) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21996590
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect the BigFix Platform (CVE-2016-2177 CVE-2016-6304 CVE-2016-6305 CVE-2016-2182 CVE-2016-6306 CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002870
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 02-05-2017 18:00 − Mittwoch 03-05-2017 18:00
Handler: Olaf Schwarz
Co-Handler: Petr Sikuta
Co-Handler: Stephan Richter
*** Malware Hunter - Shodans new tool to find Malware C&C Servers ***
---------------------------------------------
Rapidly growing, insecure internet-connected devices are becoming albatross around the necks of individuals and organizations with malware authors routinely hacking them to form botnets that can be further used as weapons in DDoS and other cyber attacks. But now finding malicious servers, hosted by attackers, that control botnet of infected machines gets a bit easier. Thanks to Shodan and [...]
---------------------------------------------
https://thehackernews.com/2017/05/shodan-malware-hunter.html
*** Disambiguate "Zero-Day" Before Considering Countermeasures ***
---------------------------------------------
"Zero-day" is the all-powerful boogieman of the information security industry. Too many of us invoke it when discussing scary threats against which we feel powerless. We need to define and disambiguate this term before attempting to determine whether we've accounted for the associated threats when designing security programs. Avoid Zero-Day Confusion I've seen "zero-day" used to describe two related, but independent concepts. First,... Read more
---------------------------------------------
https://zeltser.com/zero-day-terminology/
*** Outlook Forms and Shells ***
---------------------------------------------
I set out to try and find another way to get a shell through Outlook, in the case of us having valid credentials[...] Fortunately for us, Outlook has a massive attack surface and provides several other interesting automation features. One of these is Outlook Forms.
---------------------------------------------
https://sensepost.com/blog/2017/outlook-forms-and-shells/
*** Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem ***
---------------------------------------------
The increased connectivity of computer and robot systems in the industry 4.0. ecosystem, is, and will be exposing robots to cyber attacks in the future. Indeed, industrial robots - originally conceived to be isolated - have evolved, and are now exposed to corporate networks and the internet.While this provides synergy effects and higher efficiency in production, the security posture is not on par. In our latest report Rogue Robots: Testing the Limits of an Industrial Robot's [...]
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/6F0kroJASMA/
*** Steps to Stronger Passwords ***
---------------------------------------------
A journey of password The utilization of passwords is known to be old. Sentries would challenge those wishing to enter a territory or moving toward it to supply a secret word, and would just enable a man or gathering to pass if they knew the secret key. In present day times, username and passwords are [...]
---------------------------------------------
http://resources.infosecinstitute.com/steps-make-stronger-passwords/
*** Deutsche Bankkonten über UMTS-Sicherheitslücken ausgeräumt ***
---------------------------------------------
Kriminelle Hacker haben Konten von deutschen Bankkunden über Sicherheitslücken im Mobilfunknetz ausgeräumt, die seit Jahren bekannt sind. Eigentlich wollten die Provider schon 2014 entsprechende Gegenmaßnahmen ergreifen.
---------------------------------------------
https://heise.de/-3702194
*** Diskurs|Digital - Einblicke in gelebte Partizipation ***
---------------------------------------------
May 23, 2017 - 6:00 pm - 8:00 pm SBA Research Favoritenstraße 16 1040 Wien
---------------------------------------------
https://www.sba-research.org/events/diskursdigital-einblicke-in-gelebte-par…
*** Linuxwochen gastieren wieder in Wien ***
---------------------------------------------
Sowohl technische als auch netzpolitische Vorträge - Von Open Source bis Softwarepatenten
---------------------------------------------
http://derstandard.at/2000056925982
*** DFN-CERT-2017-0755: Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), Intel Standard Manageability (ISM): Eine Schwachstelle ermöglicht die komplette Systemübernahme ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0755/
*** Android Security Bulletin—May 2017 ***
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Alongside the bulletin, we have released a security update to Nexus devices through an over-the-air (OTA) update. The Google device firmware images have also been released to the Google Developer site. Security patch levels of May 05, 2017 or later address all of these issues. Refer to the Pixel and Nexus update schedule to learn how to check a device's security patch level.
---------------------------------------------
https://source.android.com/security/bulletin/2017-05-01
*** Schneider Electric Wonderware Historian Client ***
---------------------------------------------
This advisory contains mitigation details for an improper XML parser configuration vulnerability in Schneider Electric's Wonderware Historian Client.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-122-01
*** CyberVision Kaa IoT Platform ***
---------------------------------------------
This advisory contains mitigation details for a code injection vulnerability in CyberVision's Kaa IoT Platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-122-02
*** Advantech B+B SmartWorx MESR901 ***
---------------------------------------------
This advisory contains mitigation details for a use of client-side authentication vulnerability in the Advantech B+B SmartWorx MESR901 Modbus gateway.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-122-03
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Open Redirect Vulnerability in IBM WebSphere Portal (CVE-2017-1156) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22000153
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Security Identity Governance (CVE-2016-8610 CVE-2017-3731) ***
http://www.ibm.com/support/docview.wss?uid=swg22002387
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM JAVA Runtime affect AppScan Source (CVE-2016-5547 CVE-2016-2183) ***
http://www.ibm.com/support/docview.wss?uid=swg22002633
---------------------------------------------
*** IBM Security Bulletin: A Vulnerability in IBM Java SDK affects IBM Streams (CVE-2016-5597) ***
http://www.ibm.com/support/docview.wss?uid=swg22002189
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect WebSphere Message Broker and IBM Integration Bus ***
http://www.ibm.com/support/docview.wss?uid=swg22002242
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Open Source openSSL affect IBM Security Identity Governance Appliance ***
http://www.ibm.com/support/docview.wss?uid=swg22002397
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affects IBM Tivoli Composite Application Manager for Transactions ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002374
---------------------------------------------
*** IBM Security Bulletin: Privilege escalation vulnerability affects IBM DB2 LUW (CVE-2017-1134) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22002573
---------------------------------------------
*** IBM Security Bulletin: Cross Site Scripting vulnerability in IBM Marketing Platform (CVE-2016-0255) ***
http://www-01.ibm.com/support/docview.wss?uid=swg22001950
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-04-2017 18:00 − Dienstag 02-05-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Exploiting .NET Managed DCOM ***
---------------------------------------------
Posted by James Forshaw, Project ZeroOne of the more interesting classes of security vulnerabilities are those affecting interoperability technology. This is because these vulnerabilities typically affect any application using the technology, regardless of what the application actually does. Also in many cases they’re difficult ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2017/04/exploiting-net-managed-dcom.h…
*** 2017 Verizon DBIR: Sex Sells, But the Basics Get It Done ***
---------------------------------------------
This year’s Verizon Data Breach Investigations Report has been published, and as with its prior nine incarnations, the report is ..
---------------------------------------------
https://www.beyondtrust.com/blog/2017-verizon-dbir-sex-sells-basics-get-don…
*** DSA-3838 ghostscript - security update ***
---------------------------------------------
Several vulnerabilities were discovered in Ghostscript, the GPLPostScript/PDF interpreter, which may lead to the execution of arbitrary code or denial of service if a specially crafted Postscript file is processed.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3838
*** 7 Reasons Why IoT Hacks Will Keep Happening ***
---------------------------------------------
Hacks happen almost on a daily basis, if not every minute of every day. In fact, some say that ..
---------------------------------------------
https://safeandsavvy.f-secure.com/2017/04/28/7-reasons-why-iot-device-hacks…
*** DSA-3839 freetype - security update ***
---------------------------------------------
Several vulnerabilities were discovered in Freetype. Opening malformed fonts may result in denial of service or the execution of arbitrary code.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3839
*** Forschern gelingt Autohack für 20 Euro ***
---------------------------------------------
Billige Gadgets kopieren Entsperrsignal des Schlüssels – immer noch viele Autos betroffen
---------------------------------------------
http://derstandard.at/2000056487404
*** Orange is the new Black: Hacker leaken Staffel 5 ***
---------------------------------------------
Laut den Hackern ist dies nur der Vorgeschmack. Sie drohen damit weitere Filme und Serien zu veröffentlichen, die offiziell erst in Monaten erscheinen.
---------------------------------------------
https://futurezone.at/digital-life/orange-is-the-new-black-hacker-leaken-st…
*** "Dok": Neue Mac-Malware spioniert Browser aus ***
---------------------------------------------
Kann gesamte Browser-Kommunikation belauschen – derzeit vor allem europäische User im Visier
---------------------------------------------
http://derstandard.at/2000056812916
*** Carbanak Continues To Evolve: Quietly Creeping into Remote Hosts ***
---------------------------------------------
Introduction I recently engaged in an investigation involving two new Carbanak campaigns targeting the hospitality ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Carbanak-Continues-To-E…
*** Intels remote AMT vulnerablity ***
---------------------------------------------
Intel just announced a vulnerability in their Active Management Technology stack. Heres what we know so far.Background Intel chipsets for some years have included a Management Engine, a small microprocessor that runs independently of the main CPU and operating ..
---------------------------------------------
http://mjg59.dreamwidth.org/48429.html
*** IBM Warns Customers That Some of Its USB Flash Drives May Contain Malware ***
---------------------------------------------
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ibm-warns-customers-that-som…
*** Sicherheitsupdates: Jenkins vielfältig angreifbar ***
---------------------------------------------
Unter gewissen Voraussetzungen könnten Angreifer sich höhere Rechte erschleichen oder sogar Schadcode ausführen.
---------------------------------------------
https://heise.de/-3700838
*** Spam and phishing in Q1 2017 ***
---------------------------------------------
Although the beginning of Q1 2017 was marked by a decline in the amount of spam in overall global email traffic, in March the situation became more stable, and the average share of ..
---------------------------------------------
http://securelist.com/analysis/quarterly-spam-reports/78221/spam-and-phishi…
*** Cerber Version 6 Shows How Far the Ransomware Has Come (and How Far it’ll Go) ***
---------------------------------------------
Cerber set itself apart from other file-encrypting malware when its developers commoditized the malware, adopting a business model where fellow cybercriminals can buy the ransomware as a service. The developers earn through commissions—as much as 40%—for every ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/cerber-ransomwar…
*** New Shodan Tool Can Find Malware Command and Control (C&C) Servers ***
---------------------------------------------
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-shodan-tool-can-find-mal…
*** Security Scoring and Grading for Containers and Images ***
---------------------------------------------
We have just rolled out an update to the interface of the Red Hat Container Catalog that helps provide the answer to the question of whether or not a particular container image we provide ..
---------------------------------------------
https://access.redhat.com/blogs/product-security/posts/container-security-s…
*** Citrix XenServer Multiple Security Updates ***
---------------------------------------------
A number of security issues have been identified within Citrix XenServer. These issues could, if exploited, allow a malicious ..
---------------------------------------------
https://support.citrix.com/article/CTX223291
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-04-2017 18:00 − Freitag 28-04-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** GE Multilin SR Protective Relays ***
---------------------------------------------
This advisory contains mitigation details for a weak cryptography for passwords vulnerability in GEs Multilin SR protective relays.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-117-01
*** Chrome to Mark More HTTP Pages ‘Not Secure’ ***
---------------------------------------------
Starting with Chrome 62, Google will start marking any HTTP page where users may enter data, ..
---------------------------------------------
http://threatpost.com/chrome-to-mark-more-http-pages-not-secure/125255/
*** Russian-controlled telecom hijacks financial services’ Internet traffic ***
---------------------------------------------
Visa, MasterCard, and Symantec among dozens affected by "suspicious" BGP mishap.
---------------------------------------------
https://arstechnica.com/security/2017/04/russian-controlled-telecom-hijacks…
*** DSA-3836 weechat - security update ***
---------------------------------------------
It was discovered that weechat, a fast and light chat client, is proneto a buffer overflow vulnerability in the IRC plugin, allowing a remote attacker to cause a denial-of-service by sending a specially crafted filename via DCC.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3836
*** DSA-3837 libreoffice - security update ***
---------------------------------------------
It was discovered that a buffer overflow in processing Windows Metafiles may result in denial of service or the execution of arbitrary code if a malformed document is opened.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3837
*** New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic ***
---------------------------------------------
Many people believe that they are much less likely to be bothered by malware if they use a Mac computer, but is it really true? Unfortunately, No. According to the McAfee Labs, malware attacks on Apples Mac computers were up 744% in 2016, and its researchers ..
---------------------------------------------
https://thehackernews.com/2017/04/apple-mac-malware.html
*** Http 81 Botnet: the Comparison against MIRAI and New Findings ***
---------------------------------------------
OverviewIn our previous blog, we introduced a new IoT botnet spreading over http 81. We will name it in this blog the http81 IoT botnet, while some anti-virus software name it Persirai, and some ..
---------------------------------------------
http://blog.netlab.360.com/http-81-botnet-the-comparison-against-mirai-and-…
*** Facebook und Google überwiesen Betrüger 100 Millionen Dollar ***
---------------------------------------------
Litauer gab sich als Vertreter von Hardware-Zulieferer aus, Beträge zu großem Teil zurückgeholt
---------------------------------------------
http://derstandard.at/2000056723656
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 26-04-2017 18:00 − Donnerstag 27-04-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Picture this: Senate staffers’ ID cards have photo of smart chip, no security ***
---------------------------------------------
https://arstechnica.com/information-technology/2017/04/picture-this-senate-…
*** FIRST TC Amsterdam 2017 Wrap-Up ***
---------------------------------------------
Here is my quick wrap-up of the FIRST Technical Colloquium hosted by Cisco in Amsterdam. This is my first participation to a FIRST event. FIRST is ..
---------------------------------------------
https://blog.rootshell.be/2017/04/26/first-tc-amsterdam-2017-wrap/
*** A vigilante is putting a huge amount of work into infecting IoT devices ***
---------------------------------------------
https://arstechnica.com/security/2017/04/a-vigilante-is-putting-huge-amount…
*** Homebrew crypto SNAFU on electrical grid sees GE rush patches ***
---------------------------------------------
Boffins turned up hard-coded password in ancient controllers General Electric is pushing patches for protection ..
---------------------------------------------
www.theregister.co.uk/2017/04/27/ge_rushing_patches_to_grid_systems_ahead_o…
*** DSA-3835 python-django - security update ***
---------------------------------------------
Several vulnerabilities were discovered in Django, a high-level Pythonweb development framework. The Common ..
---------------------------------------------
https://www.debian.org/security/2017/dsa-3835
*** Cyberkriminalität: So machen Sie Ihr Unternehmen sicher ***
---------------------------------------------
Bei der Roadshow "IT-Sicherheit und Datenschutz" der WKÖ und des BMI im Rahmen von "Gemeinsam.Sicher mit ..
---------------------------------------------
https://futurezone.at/b2b/cyberkriminalitaet-so-machen-sie-ihr-unternehmen-…
*** Peace in our time! Symantec says it can end Google cert spat ***
---------------------------------------------
Its basically a promise to do better and not mess things up Symantec is hoping to get its certificates back on Googles trust list.
---------------------------------------------
www.theregister.co.uk/2017/04/27/symantec_ca_proposal_for_google/
*** Ransomware up. Breaches up. What do hackers want? Research, prototypes... all your secrets ***
---------------------------------------------
Verizon super depressing reports in Cyberespionage and ransomware attacks are on the increase, according ..
---------------------------------------------
www.theregister.co.uk/2017/04/27/verizon_breach_report/
*** nomx: The worlds most (in)secure communications protocol ***
---------------------------------------------
I was recently invited to take part in some research by BBC Click, alongside Professor Alan Woodward, to analyse a device that had quite a lot of people all excited. With slick marketing, ..
---------------------------------------------
https://scotthelme.co.uk/nomx-the-worlds-most-secure-communications-protoco…
*** APT Trends report, Q1 2017 ***
---------------------------------------------
Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries. During the first quarter of 2017, there were 33 private ..
---------------------------------------------
http://securelist.com/analysis/quarterly-malware-reports/78169/apt-trends-r…
*** StringBleed ist kein zweites Heartbleed ***
---------------------------------------------
Es wird mal wieder eine benamste Schwachstellen-Kuh durch die IT-Security Community getrieben. Der Name soll offensichtlich an Heartbleed erinnern, aber soweit wir das jetzt einschätzen können, ..
---------------------------------------------
http://www.cert.at/services/blog/20170427115946-1972.html
*** Cracking APT28 traffic in a few seconds ***
---------------------------------------------
Security experts from security firm Redsocks published an interesting report on how to crack APT28 traffic in a few seconds. Introduction APT28 is a hacking group involved in many recent cyber incidents. The most recent attack allegedly ..
---------------------------------------------
http://securityaffairs.co/wordpress/58435/apt/cracking-apt28-traffic.html
*** Windows 10: Microsoft liefert Updates auch außerhalb des Patchdays ***
---------------------------------------------
Microsoft will Windows 10 nach dem Creators Update nun auch außerhalb des Patchdays mit Updates versorgen. Allerdings ..
---------------------------------------------
https://heise.de/-3698302
*** Broadcom-Sicherheitslücken: Samsung schützt Nutzer nicht vor WLAN-Angriffe ***
---------------------------------------------
Googles Project Zero hat kürzlich in Broadcom-Chips und -Treibern zahlreiche kritische Sicherheitslücken gefunden, mit denen sich Smartphones übernehmen lassen. Wir haben ..
---------------------------------------------
https://www.golem.de/news/broadcom-sicherheitsluecken-samsung-schuetzt-nutz…
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 25-04-2017 18:00 − Mittwoch 26-04-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** FortiOS XSS via srcintf during Firewall Policy Creation ***
---------------------------------------------
An XSS vulnerability caused by the scrintf parameter input during Firewall Policy Creation can be exploited to load and run a remote (malicious) Javascript in a logged in browser.
---------------------------------------------
http://fortiguard.com/psirt/FG-IR-17-017
*** Analyzing Cyber Insurance Policies ***
---------------------------------------------
Theres a really interesting new paper analyzing over 100 different cyber insurance policies. From the abstract:In this research paper, we seek to answer ..
---------------------------------------------
https://www.schneier.com/blog/archives/2017/04/analyzing_cyber.html
*** Kritische Lücken: VMware sichert Anwendungen gegenüber Schadcode ab ***
---------------------------------------------
Sicherheitsupdates schließen mehrere Schwachstellen in verschiedenen VMware-Anwendungen zum Umgang mit virtuellen Maschinen und für den Fernzugriff. Davon sind alle Betriebssysteme betroffen.
---------------------------------------------
https://heise.de/-3696740
*** BrickerBot vs Mirai: Malware-Wettstreit um Internetkameras und Co. ***
---------------------------------------------
Neue Generationen von BrickerBot versuchen schlecht geschützte Geräte zu beschädigen, und entziehen so Mirai die Grundlage
---------------------------------------------
http://derstandard.at/2000056608656
*** Terror EK going ‘pro’? Not quite yet ***
---------------------------------------------
https://blog.malwarebytes.com/cybercrime/2017/04/terror-ek-going-pro-not-qu…
*** AIT beim Citizen Science Award 2017 ***
---------------------------------------------
[...] Im Rahmen des Citizen Science Awards 2017 sind Schulklassen der Unter- und Oberstufe sowie Einzelpersonen eingeladen, aktiv an der Erarbeitung möglicher Strategien gegen Cyberattacken mitzuwirken und gemeinsam das digitale Minispiel „Phishing Wars“ weiterzuentwickeln. Anhand dieses Spiels wird trainiert, worauf es beim Erkennen von Phishing-Mails ankommt, um nicht Opfer von Cyberattacken zu werden.
---------------------------------------------
http://science.apa.at/site/kultur_und_gesellschaft/detail.html?key=SCI_2017…
*** If there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again), (Wed, Apr 26th) ***
---------------------------------------------
Setting up a Microsoft SQL server with a stupid simple password like sa for the sa user is hard. First of all, Microsoft implemented a default password policy ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22346
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 24-04-2017 18:00 − Dienstag 25-04-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Frankreich-Wahl: Russische Hacker sollen Macron ins Visier nehmen ***
---------------------------------------------
Experten bringen Gruppe mit russischen Militärgeheimdienst in Verbindung
---------------------------------------------
http://derstandard.at/2000056465269
*** The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence ***
---------------------------------------------
Roman Seleznev, a 32-year-old Russian cybercriminal and prolific credit card thief, was sentenced Friday to 27 years in federal prison. That is a record ..
---------------------------------------------
https://krebsonsecurity.com/2017/04/the-backstory-behind-carder-kingpin-rom…
*** Analysis of the Shadow Z118 PayPal phishing site, (Mon, Apr 24th) ***
---------------------------------------------
[This is a guest post submitted by Remco Verhoef. Got something interesting to share? Please use our contact form to suggest your topic] Today I got lucky walking around within a phishing site and found some left-over ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22338
*** Alert: If youre running SquirrelMail, Sendmail... why? And oh yeah, remote code vuln found ***
---------------------------------------------
This is nuts Security researchers have uncovered a critical security hole in SquirrelMail, the open-source webmail project.
---------------------------------------------
www.theregister.co.uk/2017/04/24/squirrelmail_vuln/
*** AV provider Webroot melts down as update nukes hundreds of legit files ***
---------------------------------------------
https://arstechnica.com/security/2017/04/av-provider-webroot-melts-down-as-…
*** BrickerBot, the permanent denial-of-service botnet, is back with a vengeance ***
---------------------------------------------
https://arstechnica.com/security/2017/04/brickerbot-the-permanent-denial-of…
*** Western Digital My Cloud 2.21.126 Authentication Bypass ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2017040164
*** Bis zu 100.000 Rechner mit geleakter NSA-Malware infiziert ***
---------------------------------------------
Sicherheitsforscher finden "Doublepulsar" auf zigtausenden Maschinen, darunter auch Rechner in Österreich
---------------------------------------------
http://derstandard.at/2000056481284
*** Angreifer könnten Drupal-Webseiten ausspionieren ***
---------------------------------------------
Im Versionsstrang 8.x klafft eine als kritisch eingestufte Sicherheitslücke. Abgesicherte Versionen schließen die Schwachstelle.
---------------------------------------------
https://heise.de/-3693082
*** Doskozil: Bundesheer soll Gegner im Cyberwar auch angreifen ***
---------------------------------------------
Minister: Angriffe sollen nicht nur abgewehrt werden – Wöchentlich fünf bis sechs ernste Attacken
---------------------------------------------
http://derstandard.at/2000056452452
*** Sicherheitspatches in Sicht: Zehn Lücken gefährden Linksys-Router ***
---------------------------------------------
Verschiedene Modelle der Smart-Wi-Fi-Serie von Linksys sind laut Sicherheitsforschern angreifbar. Unter gewissen Voraussetzungen sollen Angreifer Befehle auf Routern ausführen können.
---------------------------------------------
https://heise.de/-3693136
*** New IoT Botnet Rises Feeding on Vulnerable Security Cameras ***
---------------------------------------------
A new botnet is slowly building critical mass on the back of unsecured webcams and IP cameras, ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-iot-botnet-rises-feeding…
*** Hard Target: Fileless Malware ***
---------------------------------------------
Researchers say fileless in-memory malware attacks have become a major nuisance to businesses and have become even harder to detect and defend.
---------------------------------------------
http://threatpost.com/hard-target-fileless-malware/125054/
*** DSA-3833 libav - security update ***
---------------------------------------------
Several security issues have been corrected in multiple demuxers anddecoders of the libav multimedia library. A full list of the changes is available ..
---------------------------------------------
https://www.debian.org/security/2017/dsa-3833
*** Ashley Madison users blackmailed again ***
---------------------------------------------
Criminals are still trying to shake down users of the Ashley Madison dating/cheating online service. As you might remember, the service was hacked in 2015, and the attackers ..
---------------------------------------------
https://www.helpnetsecurity.com/2017/04/25/ashley-madison-blackmail/
*** SAP NetWeaver durch Lücken gefährdet ***
---------------------------------------------
In verschiedenen Komponenten der NetWeaver-Plattform klaffen Sicherheitslücken. Sicherheitsforschern zufolge könnten Angreifer über die Schlupflöcher unter anderem an Log-in-Daten kommen.
---------------------------------------------
https://heise.de/-3693658
*** Security Bulletin Posted for ColdFusion (APSB17-14) ***
---------------------------------------------
Adobe has published a Security Bulletin (APSB17-14) announcing the availability of hotfixes for ColdFusion versions 2016, 11 and 10. These hotfixes resolve an input validation ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1460
*** Hackers uncork experimental Linux-targeting malware ***
---------------------------------------------
SSH... its Shishiga Hackers have unleashed a new malware strain that targets Linux-based systems.
---------------------------------------------
www.theregister.co.uk/2017/04/25/linux_malware/
*** [2017-04-25] Portrait Display SDK Service privilege escalation ***
---------------------------------------------
The Portrait Display SDK Service (PdiService.exe) configuration was found to be writable for every authenticated user in a default installation.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2017…
*** [20170402] - Core - XSS Vulnerability ***
---------------------------------------------
https://developer.joomla.org/security-centre/684-20170402-core-xss-vulnerab…
*** [20170403] - Core - XSS Vulnerability ***
---------------------------------------------
https://developer.joomla.org/security-centre/685-20170403-core-xss-vulnerab…
*** [20170404] - Core - XSS Vulnerability ***
---------------------------------------------
https://developer.joomla.org/security-centre/686-20170404-core-xss-vulnerab…
*** [20170405] - Core - XSS Vulnerability ***
---------------------------------------------
https://developer.joomla.org/security-centre/687-20170405-core-xss-vulnerab…