=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-02-2017 18:00 − Donnerstag 23-02-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Criminals Monetizing Attacks Against Unpatched WordPress Sites ***
---------------------------------------------
Sites still vulnerable to a REST API endpoint flaw in WordPress are now being targeted by attackers trying to turn a profit.
---------------------------------------------
http://threatpost.com/criminals-monetizing-attacks-against-unpatched-wordpr…
*** MSRT February 2017: Chuckenit detection completes MSRT solution for one malware suite ***
---------------------------------------------
In September 2016, we started adding to Microsoft Malicious Software Removal Tool (MSRT) a malware suite of browser modifiers and other Trojans installed by software bundlers. We documented how the malware in this group install other malware or applications silently, without your consent.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/02/22/msrt-february-2017-chuc…
*** Top 8 Reverse Engineering Tools for Cyber Security Professionals ***
---------------------------------------------
Whether it is rebuilding a car engine or diagramming a sentence, people can learn about many things simply by taking them apart and putting them back together again. This process of breaking something down to understand it, build a copy to improve it, is known as reverse engineering.
---------------------------------------------
http://resources.infosecinstitute.com/top-8-reverse-engineering-tools-cyber…
*** Impact of New Linux Kernel DCCP Vulnerability Limited ***
---------------------------------------------
Existing mitigations and limitations around a newly disclosed Linux kernel vulnerability in the DCCP module mute the potential impact of local attacks.
---------------------------------------------
http://threatpost.com/impact-of-new-linux-kernel-dccp-vulnerability-limited…
*** Java, Python FTP Injection Attacks Bypass Firewalls ***
---------------------------------------------
Newly disclosed FTP injection vulnerabilities in Java and Python that are fueled by rather common XML External Entity (XXE) flaws allow for firewall bypasses.
---------------------------------------------
http://threatpost.com/java-python-ftp-injection-attacks-bypass-firewalls/12…
*** Kollissionsangriff: Hashfunktion SHA-1 gebrochen ***
---------------------------------------------
Forscher von Google und der Universität Amsterdam ist es gelungen, zwei unterschiedliche PDF-Dateien mit demselben SHA-1-Hash zu erzeugen. Dass SHA-1 unsicher ist, war bereits seit 2005 bekannt. (SHA-1, Google)
---------------------------------------------
https://www.golem.de/news/kollissionsangriff-hashfunktion-sha-1-gebrochen-1…
*** Putty 0.68 released ***
---------------------------------------------
http://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Buffer Overflow from improperly formatted SELECT command in IBM Tivoli Storage Manager (IBM Spectrum Protect) Server (CVE-2016-8998) ***
http://www.ibm.com/support/docview.wss?uid=swg21998747
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ cluster channel definition causes denial of service to cluster (CVE-2016-9009) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998647
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affects IBM Netezza PureData System for Analytics (CVE-2016-8610) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21997472
---------------------------------------------
*** IBM Security Bulletin: IBM MQ and IBM MQ Appliance are vulnerable to SWEET32 Birthday attack (CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21995099
---------------------------------------------
*** IBM Security Bulletin: Information disclosure CVE-2016-9975 affects IBM Dashboard Application Services Hub (DASH) ***
http://www.ibm.com/support/docview.wss?uid=swg21998714
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM WebSphere MQ (CVE-2016-2106, CVE-2016-2109) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998797
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 21-02-2017 18:00 − Mittwoch 22-02-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Avast Releases a Decryptor for Offline Versions of the CryptoMix Ransomware ***
---------------------------------------------
Today, Avast released a decryptor for CryptoMix victims that were encrypted while in offline mode. Offline mode is when the ransomware runs and encrypts a victims computer while there is no Internet connection or the computer cannot connect to the ransomwares Command & Control server. [...]
---------------------------------------------
https://www.bleepingcomputer.com/news/security/avast-releases-a-decryptor-f…
*** [R1] Nessus 6.10.2 Fixes One Vulnerability ***
---------------------------------------------
Nessus was found to contain a flaw that allowed a remote, authenticated attacker to upload a crafted file that could be written to anywhere on the system. This could be used to subsequently gain elevated privileges on the system (e.g. after a reboot). This issue only affects installations on Windows.
---------------------------------------------
http://www.tenable.com/security/tns-2017-06
*** Financial cyberthreats in 2016 ***
---------------------------------------------
In 2016 we continued our in-depth research into the financial cyberthreat landscape. Weve noticed over the last few years that large financial cybercriminal groups have started to concentrate their efforts on targeting large organizations - such as banks, payment processing systems, retailers, hotels and other businesses where POS terminals are widely used.
---------------------------------------------
http://securelist.com/analysis/publications/77623/financial-cyberthreats-in…
*** Microsoft patcht Flash Player unter Windows außer der Reihe ***
---------------------------------------------
Diesen Monat ist der Patchday trotz bekannter Sicherheitslücken in Windows ausgefallen. Nun liefert Microsoft zumindest Patches für kritische Lücken im Flash Player nach.
---------------------------------------------
https://heise.de/-3632329
*** Security Advisory - Privilege Elevation Vulnerability Caused by Arbitrary File Upload in Huawei Themes ***
---------------------------------------------
The Huawei Themes APP in some Huawei products has a privilege elevation vulnerability due to the lack of theme pack check. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code. (Vulnerability ID: HWPSIRT-2016-11073)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-2699.
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170222-…
*** Website Uses "Add Extension to Leave" Popups to Infect Chrome Users ***
---------------------------------------------
A malvertising campaign has specifically targeted and redirected Chrome users to a website they couldnt leave unless they agreed to install a rogue Chrome extension.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/website-uses-add-extension-t…
*** Apple: Logic Pro X 10.3.1 ***
---------------------------------------------
Impact: Opening a maliciously crafted GarageBand project file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling.
---------------------------------------------
https://support.apple.com/en-us/HT207519
*** Sysinternals Updates ***
---------------------------------------------
Sysmon v6, Autoruns v13.7, AccessChk v6.1, Process Monitor v3.32, Process Explorer v16.2, LiveKd v5.61, and BgInfo v4.21
---------------------------------------------
https://blogs.technet.microsoft.com/sysinternals/2017/02/17/update-sysmon-v…
*** RSA Conference 2017 Playlist ***
---------------------------------------------
https://www.youtube.com/playlist?list=PLeUGLKUYzh_j1Q75yeae8upX-T1FLmZWf
*** Gefälschte A1-Rechnung verbreitet Schadsoftware ***
---------------------------------------------
Kriminelle wollen mit einer scheinbar echten A1-Rechnung Schadsoftware auf fremden Computern hinterlegen. Damit sie das Ziel erreichen, fordern sie Empfänger/innen dazu auf, dass sie die angebliche Rechnung auf einer gefälschten A1-Website herunterladen. Wer die gefälschte Zahlungsaufstellung öffnet, installiert einen Trojaner. Er verschlüsselt Dateien und macht sie unbrauchbar.
---------------------------------------------
https://www.watchlist-internet.at/gefaelschte-rechnungen/gefaelschte-a1-rec…
*** Mobile Devices und Softwareupdates ***
---------------------------------------------
Mobile Devices bestimmen in unserer modernen Gesellschaft zunehmend den Alltag. Das Lesen von Emails oder das Online-Banking: alltägliche Anwendungen werden immer öfter mit einem mobilen Endgerät umgesetzt, privat oder beruflich. Waren es bis vor kurzem nur Smartphones, welche das Handy abgelöst haben, oder Tablet-Computer, die ursprünglich als Bücher-Ersatz gedacht waren, so folgen heute beispielsweise die Uhr, die Brille, das Auto und viele mehr.
---------------------------------------------
https://www.dfn-cert.de/aktuell/mobile_devices_software_updates.html
*** SSA-363881 (Last Update 2017-02-22): Web Vulnerabilities in RUGGEDCOM NMS ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-363881…
*** SSA-623229 (Last Update 2017-02-22): DROWN Vulnerability in Industrial Products ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Mutiple vulnerabilities in zlib affect IBM ILOG CPLEX Optimization Studio ***
http://www.ibm.com/support/docview.wss?uid=swg21997946
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in Brocade Network Advisor affect IBM PureApplication System. ***
http://www.ibm.com/support/docview.wss?uid=swg21998725
---------------------------------------------
*** IBM Security Bulletin: Potential cross-site scripting in the Admin Console for WebSphere Application Server (CVE-2016-8934) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992315
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSource Spring Source/Pivotal Spring Framework affect IBM Tivoli Netcool Configuration Manager (ITNCM) (CVE-2013-7315, CVE-2013-4152, CVE-2014-0054) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992651
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 20-02-2017 18:00 − Dienstag 21-02-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Joomla Security - Pornography Spam Campaign in the Wild ***
---------------------------------------------
One of the worst experiences for a website owner is finding out that the search results for your site have turned into a pharmacy, a fashion outlet, or even a porn dump. Those unwanted keywords are a result of Search Engine Poisoning (SEP) attacks. This blackhat SEO technique is used by attackers to take advantage of your rankings on Search Engine Result Pages (SERPs).
---------------------------------------------
https://blog.sucuri.net/2017/02/joomla-security-pornography-spam-campaign-i…
*** Hardening Postfix Against FTP Relay Attacks, (Mon, Feb 20th) ***
---------------------------------------------
Yesterday, I read an interesting blog post about exploiting XXE (XML eXternal Entity) flaws to send e-mails. In short: It is possible to trick the application to connect to an FTP server, but since mail servers tend to be forgiving enough, they will just accept e-mail if you use the FTP client to connect to port 25 on a mail server. The mail server will of course initially see the USER and PASS commands, but it will ignore them. Initially, I considered thisa lesser issue.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22086&rss
*** New(ish) Mirai Spreader Poses New Risks ***
---------------------------------------------
A cross-platform win32-based Mirai spreader and botnet is in the wild and previously discussed publicly. However, there is much information confused together, as if an entirely new IoT bot is spreading to and from Windows devices. This is not the case. Instead, an accurate assessment is that a previously active Windows botnet is spreading a Mirai bot variant. So let's make a level-headed assessment of what is really out there.
---------------------------------------------
https://securelist.com/blog/research/77621/newish-mirai-spreader-poses-new-…
*** Vulnerability in Citrix NetScaler Application Delivery Controller and NetScaler Gateway GCM nonce generation ***
---------------------------------------------
A flaw in NetScaler ADC and Gateway causes GCM nonces to be randomly generated, making it marginally easier for remote attackers to obtain ...
---------------------------------------------
https://support.citrix.com/article/CTX220329
*** DFN-CERT-2017-0317: Xen, QEMU: Eine Schwachstelle ermöglicht u.a. die Ausführung beliebigen Programmcodes ***
---------------------------------------------
Ein einfach authentifizierter Angreifer im benachbarten Netzwerk mit erweiterten Privilegien (Guest Administator) kann auf Speicher außerhalb von Speichergrenzen zugreifen (Out-of-Bounds Access) und dadurch einen Denial-of-Service (DoS)-Angriff durchführen oder möglicherweise beliebigen Programmcode zur Ausführung bringen. Die Schwachstelle betrifft QEMU in allen Versionen von Xen. Es stehen Sicherheitsupdates zur Verfügung.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0317/
*** Unstoppable JavaScript Attack Helps Ad Fraud, Tech Support Scams, 0-Day Attacks ***
---------------------------------------------
There are multiple issues and attack scenarios that Caballero discovered, but fortunately, they only affect Internet Explorer 11, but not Edge, or browsers from other vendors.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/unstoppable-javascript-attac…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ invalid requests cause denial of service to MQXR listener (CVE-2016-8986) ***
http://www.ibm.com/support/docview.wss?uid=swg21998648
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ Invalid channel protocol flows cause denial of service on HP-UX (CVE-2016-8915) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998649
---------------------------------------------
*** IBM Security Bulletin: Pivotal Spring Framework vulnerabilities affect IBM Tivoli Application Dependency Discovery Manager (TADDM) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21999040
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere Application Server Liberty Profile vulnerabilities affect IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2016-3092, CVE-2016-5986) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998590
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ Java clients might send a password in clear text (CVE-2016-3052) ***
http://www.ibm.com/support/docview.wss?uid=swg21998660
---------------------------------------------
*** IBM Security Bulletin: IBM WebSphere MQ Channel data conversion denial of service (CVE-2016-3013) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21998661
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 17-02-2017 18:00 − Montag 20-02-2017 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Android for Work Security Containers Bypassed with Relative Ease ***
---------------------------------------------
Mobile security experts from Skycure have found two methods for bypassing the security containers put around "Android for Work," allowing attackers to access business data saved in this seemingly secure environment.
---------------------------------------------
https://www.bleepingcomputer.com/news/mobile/android-for-work-security-cont…
*** Users Continue to Install Malware on Their Phone 5 Years After Adobe Discontinued Flash for Android ***
---------------------------------------------
It is unbelievable that almost five years after Adobe announced it would stop developing Flash Player for Android, users are still installing a non-existent piece of software, which in almost all cases is just malware in disguise.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/users-continue-to-install-ma…
*** Google bellows bug news after Microsoft sails past fix deadline ***
---------------------------------------------
Mess in Windows graphics library can give bad hombres access to memory Googles Project Zero has again revealed a Windows bug before Microsoft fixed it.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2017/02/20/google_proj…
*** Mongoaudit Helps You Secure MongoDB Databases ***
---------------------------------------------
A new tool developed by engineers at Stampery can help database administrators audit the security features of their current MongoDB installations, and take precautionary measures to prevent future exploitation.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/mongoaudit-helps-you-secure-…
*** BIOS/UEFI mit Ransomware infiziert ***
---------------------------------------------
Sicherheitsforscher haben gezeigt, dass sich das BIOS/UEFI eines Computers trotz aktuellem Windows 10 und diversen aktivierten Sicherheitsmechanismen mit einem Erpressungstrojaner infizieren lässt.
---------------------------------------------
https://heise.de/-3630662
*** Spam and phishing in 2016 ***
---------------------------------------------
2016 saw a variety of changes in spam flows, with the increase in the number of malicious mass mailings containing ransomware being the most significant. These programs are readily available on the black market, and in 2017 the volume of malicious spam is unlikely to fall.
---------------------------------------------
http://securelist.com/analysis/kaspersky-security-bulletin/77483/kaspersky-…
*** SAP Security for Beginners. Part 6: SAP Risks Fraud ***
---------------------------------------------
Welcome to the latest part of SAP Risks. After we finished with Espionage and Sabotage, let's eat the last piece of this "sweet cake" dubbed Fraud. In my opinion, fraud is the most common issue in ERP System and other business applications.
---------------------------------------------
http://resources.infosecinstitute.com/sap-security-beginners-part-6-sap-ris…
*** DFN-CERT-2017-0302: Suricata: Mehrere Schwachstellen ermöglichen verschiedene Denial-of-Service-Angriffe ***
---------------------------------------------
Mehrere nicht näher spezifizierte Schwachstellen in Suricata ermöglichen einem entfernten, nicht authentisierten Angreifer die Durchführung verschiedener Denial-of-Service (DoS)-Angriffe aufgrund von Speicherlecks und Lesezugriffen außerhalb zugewiesenen Speichers. Der Hersteller informiert über die Schwachstellen und stellt Suricata 3.2.1 zur Behebung dieser Schwachstellen bereit.
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0302/
*** tenable: [R1] SecurityCenter 5.4.3 File Upload unserialize() Function PHP Object Handling Remote File Deletion ***
---------------------------------------------
SecurityCenter was found to use the PHP unserialize() function in several places in such a way that may allow a remote authenticated attacker to upload a crafted PHP object that resulted in the deletion of arbitrary files.
---------------------------------------------
http://www.tenable.com/security/tns-2017-05
*** WordPress Security - Fake TrafficAnalytics Website Infection ***
---------------------------------------------
Several months ago, our research team identified a fake analytics infection, known as RealStatistics. The malicious Javascript injection looks a lot like tracking code for a legitimate analytics service. ... Recently, a new variation of this type of infection has emerged. The new campaign uses trafficanalytics[.]online as the source for the injected script.
---------------------------------------------
https://blog.sucuri.net/2017/02/fake-trafficanalytics-website-infection.html
*** Penetration Testing Tools Cheat Sheet ***
---------------------------------------------
Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Designed as a quick reference cheat sheet providing a high level overview of the typical commands you would run when performing a penetration test.
---------------------------------------------
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: DOM-based cross-site scripting vulnerability affects IBM Advanced Management Module (AMM) for BladeCenter Systems ***
http://support.podc.sl.edst.ibm.com/support/home/docdisplay?lndocid=migr-50…
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect AIX (CVE-2017-3731) ***
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory23.asc
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 16-02-2017 18:00 − Freitag 17-02-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Divide Between Work, Personal Data on Android Breached ***
---------------------------------------------
Researchers demonstrate how malicious apps can break into secure Android work containers on EMM managed phones.
---------------------------------------------
http://threatpost.com/divide-between-work-personal-data-on-android-breached…
*** Don’t panic over cyber-terrorism: Daesh-bags still at script kiddie level ***
---------------------------------------------
Medieval terror bastards not great at hacking says ex-top NSA lawyer RSA USA There’s no need to panic about the threat of a major online terrorist attack, since ISIS and their allies are all talk and no ..
---------------------------------------------
www.theregister.co.uk/2017/02/16/online_terrorism_isnt/
*** Mobile apps and stealing a connected car ***
---------------------------------------------
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. By using proprietary mobile ..
---------------------------------------------
http://securelist.com/analysis/publications/77576/mobile-apps-and-stealing-…
*** DSA-3790 spice - security update ***
---------------------------------------------
https://www.debian.org/security/2017/dsa-3790
*** MQTT-Protokoll: IoT-Kommunikation von etwa Reaktoren und Gefängnissen öffentlich einsehbar ***
---------------------------------------------
Über das Telemetrie-Protokoll MQTT spricht eine unüberschaubare Zahl an IoT-Sensoren in etwa Autos und Flugzeugen mit ihren Servern – unverschlüsselt, ohne Frage nach Passwörtern. Hacker könnten nicht nur mitlesen, sondern Daten auch manipulieren.
---------------------------------------------
https://heise.de/-3629650
*** Darknet-Drogenring in Braunau aufgeflogen ***
---------------------------------------------
Die Hinweise auf den Suchtgifthandel kamen von Zollfahndung Frankfurt. Der Kopf der Bande befindet sich in Haft.
---------------------------------------------
https://futurezone.at/digital-life/darknet-drogenring-in-braunau-aufgefloge…
*** My Friend Cayla: Eltern müssen Puppen ihrer Kinder zerstören ***
---------------------------------------------
Smartes Spielzeug wird vor allem von Datenschützern immer wieder kritisiert. In einem Fall greift die ..
---------------------------------------------
https://www.golem.de/news/my-friend-cayla-eltern-muessen-puppen-ihrer-kinde…
*** MQTT-Protokoll: IoT-Kommunikation von Reaktoren und Gefängnissen öffentlich einsehbar ***
---------------------------------------------
Über das Telemetrie-Protokoll MQTT spricht eine unüberschaubare Zahl an IoT-Sensoren in etwa Autos und Flugzeugen ..
---------------------------------------------
https://heise.de/-3629650
*** Gag Order: Riseup belebt den Kanarienvogel wieder ***
---------------------------------------------
Nachdem Riseup seinen Warrant Canary im vergangenen Jahr nicht aktualisiert hatte, gab es viel Aufregung in der Szene. Jetzt gibt das Kollektiv bekannt: "Wir haben Nutzerdaten herausgegeben." Künftig soll das dank Verschlüsselung nicht mehr möglich sein.
---------------------------------------------
https://www.golem.de/news/gag-order-riseup-belebt-den-kanarienvogel-wieder-…
*** USB Killer now lets you fry most Lightning and USB-C devices for $55 ***
---------------------------------------------
Plus a new, stealthy "anonymous" stick, because thats what the world really needed.
---------------------------------------------
https://arstechnica.com/gadgets/2017/02/usb-killer-fry-lightning-usb-c-devi…
*** Planning for an InfoSec Conference ***
---------------------------------------------
I wasted many an early year going to InfoSec conferences and security events only to find them useless. Well, they werent totally useless, Id often come back with a bag full of goodies that more often than not included stress ..
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/planning-for-an-infose…
*** SMTP Strict Transport Security Coming Soon to Gmail, Other Webmail Providers ***
---------------------------------------------
SMTP Strict Transport Security is coming to major webmail providers this year, a Google engineer said at RSA Conference
---------------------------------------------
http://threatpost.com/smtp-strict-transport-security-coming-soon-to-gmail-o…
*** VB2016 paper: APT reports and OPSEC evolution, or: these are not the APT reports you are looking for ***
---------------------------------------------
APT reports are great for gaining an understanding of how advanced attack groups operate - however, they can also ..
---------------------------------------------
https://www.virusbulletin.com:443/blog/2017/02/vb2016-paper-apt-reports-and…
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 15-02-2017 18:00 − Donnerstag 16-02-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Metatag -Moderately Critical - Information disclosure - SA-CONTRIB-2017-019 ***
---------------------------------------------
https://www.drupal.org/node/2852937
*** Search API Sorts - Moderately Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2017-016 ***
---------------------------------------------
https://www.drupal.org/node/2852922
*** Who Ran Leakedsource.com? ***
---------------------------------------------
Late last month, multiple news outlets reported that unspecified law enforcement officials had seized the servers for Leakedsource.com, perhaps the largest online collection ..
---------------------------------------------
https://krebsonsecurity.com/2017/02/who-ran-leakedsource-com/
*** Yahoo reveals more breachiness to users victimized by forged cookies ***
---------------------------------------------
Some accounts may have been accessed with forged cookies as recently as 2016.
---------------------------------------------
https://arstechnica.com/information-technology/2017/02/yahoo-reveals-more-b…
*** DSA-3789 libevent - security update ***
---------------------------------------------
Several vulnerabilities were discovered in libevent, an asynchronousevent notification library. They would lead to Denial Of Service via application crash, or remote code execution.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3789
*** Ukraine verzeichnet 2016 Rekordzahl von Cyberangriffen ***
---------------------------------------------
Chef des Inlandsgeheimdienstes vermeidet direkte Nennung Russlands
---------------------------------------------
http://derstandard.at/2000052700282
*** Microsoft verschiebt Februar-Patches in den März ***
---------------------------------------------
Diesen Monat gibt es keine Sicherheitspatches von Microsoft. Die eigentlich geplanten Updates will das ..
---------------------------------------------
https://heise.de/-3627965
*** Blackberry liefert monatliche Sicherheitsupdates für alle Geräte ***
---------------------------------------------
Im November war Blackberry aus dem Tritt geraten, versprochene Sicherheitsupdates für das DTEK50 kamen erst im Dezember. Nun hat sich die Versorgung wieder stabilisiert.
---------------------------------------------
https://heise.de/-3627937
*** OpenSSL advisory 20170216 ***
---------------------------------------------
During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL to crash (dependent on ciphersuite). Both clients and servers are affected.
---------------------------------------------
https://openssl.org/news/secadv/20170216.txt
*** Google was aware of Russian APT28 group years before others ***
---------------------------------------------
Lorenzo Bicchierai from MotherBoard shared an interesting private report about Russian cyber espionage operations conducted by APT28, the document was leaked online by Google. The ..
---------------------------------------------
http://securityaffairs.co/wordpress/56336/apt/apt28-leaked-report.html
*** Xen-Entwickler wollen weniger Sicherheitslücken offenlegen ***
---------------------------------------------
Die Entwickler des Virtualisierungssystems Xen wollen weniger Sicherheitslücken öffentlich machen. Damit wollen sie vor allem Arbeit sparen, sorgen aber auch für eine klarere Linie im Umgang mit Schwachstellen.
---------------------------------------------
https://heise.de/-3628690
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 14-02-2017 18:00 − Mittwoch 15-02-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Amnesty International uncovers phishing campaign against human rights activists ***
---------------------------------------------
Attacker targeted groups in Qatar, Nepal using extensive fake social media profile.
---------------------------------------------
https://arstechnica.com/security/2017/02/amnesty-international-uncovers-phi…
*** Siemens SIMATIC Authentication Bypass ***
---------------------------------------------
This advisory contains mitigation details for an authentication bypass in Siemens SIMATIC.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-045-03
*** Attacking the Windows NVIDIA Driver ***
---------------------------------------------
Modern graphic drivers are complicated and provide a large promising attack surface for EoPs and sandbox escapes from processes that have access to the GPU (e.g. the Chrome GPU process). In this blog post we’ll take a look at attacking the ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2017/02/attacking-windows-nvidia-driv…
*** Ransomware: a declining nuisance or an evolving menace? ***
---------------------------------------------
The volume of ransomware encounters is on a downward trend. Are we seeing the beginning of the end of this vicious threat? Unfortunately, a look at the attack vectors, the number of ..
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2017/02/14/ransomware-2016-threat-…
*** New ASLR-busting JavaScript is about to make drive-by exploits much nastier ***
---------------------------------------------
A property found in virtually all modern CPUs neuters decade-old security protection.
---------------------------------------------
https://arstechnica.com/security/2017/02/new-aslr-busting-javascript-is-abo…
*** Adobe-Patchday: Flash Player wie üblich in kritischem Zustand ***
---------------------------------------------
Im Flash Player und Adobe Digital Editions klaffen kritische Lücken. Aktuell sind vor allem Windows-Nutzer von den Flash-Lücken bedroht. Adobe Campaign erhält ebenfalls Sicherheitsupdates.
---------------------------------------------
https://heise.de/-3626386
*** Researchers Discover Self-Healing Malware That Targets Magento Stores ***
---------------------------------------------
Dutch malware experts have found a new malware strain that targets online shops running on the Magento platform, ..
---------------------------------------------
https://www.bleepingcomputer.com/news/security/researchers-discover-self-he…
*** Cisco: Zwei VPN-Lücken und eine Schwachstelle, die offiziell keine ist ***
---------------------------------------------
Cisco hat Sicherheitslücken im AnyConnect-VPN und auf seinen ASA-Firewalls gestopft. Ein Sicherheitsproblem mit dem SMI-Protokoll, welches es aus der Ferne erlaubt, neue Betriebssystem-Images auf Switches zu laden, sieht die Firma allerdings nicht.
---------------------------------------------
https://heise.de/-3627330
*** Are Windows Registry Fixers Safe? ***
---------------------------------------------
Before I got into cybersecurity, I spent years as a technical support agent for Windows end users of Windstream, an American ISP. Although Windstream is an ISP, they also offered a general Windows client OS remote support service for their predominantly ..
---------------------------------------------
https://www.alienvault.com/blogs/security-essentials/should-windows-users-b…
*** Xagent: Russische Hackergruppe setzt auch auf Mac-Spionage-Software ***
---------------------------------------------
Eine auf macOS abzielende Version der Malware Xagent stammt offenbar von der Hackergruppe APT28, die mit dem Angriff auf die Demokratische Partei im US-Wahlkampf in Verbindung gebracht wird. Xagent soll unter anderem iPhone-Backups entwenden.
---------------------------------------------
https://heise.de/-3627630
*** Researchers trick CEO email scammer into giving up identity ***
---------------------------------------------
Businesses targeted in email scams don’t always have to play the victim. They can actually fight back.Researchers at Dell SecureWorks have documented how they identified a ..
---------------------------------------------
http://www.cio.com/article/3170117/security/researchers-trick-ceo-email-sca…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 13-02-2017 18:00 − Dienstag 14-02-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Shirebrook man arrested in connection to Sports Direct breach ***
---------------------------------------------
A 27-year-old man has been arrested in connection with the hack of Sports ..
---------------------------------------------
www.theregister.co.uk/2017/02/13/sports_direct_arrest/
*** A look into the Russian-speaking ransomware ecosystem ***
---------------------------------------------
In other words, crypto ransomware is a fine tuned, user friendly and constantly developing ecosystem. In the last few years we, at Kaspersky Lab, have been monitoring the development of this ecosystem. This is what we’ve learned.
---------------------------------------------
http://securelist.com/analysis/publications/77544/a-look-into-the-russian-s…
*** Top phishing targets in 2016? Google, Yahoo, and Apple ***
---------------------------------------------
For every new phishing URL impersonating a financial institution, there were more than seven impersonating technology companies. Comparison of most impersonated companies ..
---------------------------------------------
https://www.helpnetsecurity.com/2017/02/14/top-phishing-targets/
*** Metadata: The secret data trail ***
---------------------------------------------
Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata including ..
---------------------------------------------
https://www.helpnetsecurity.com/2017/02/14/metadata-secret-data-trail/
*** Worried about hacks, senators want info on Trump’s personal phone ***
---------------------------------------------
Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate ..
---------------------------------------------
http://www.cio.com/article/3169577/security/worried-about-hacks-senators-wa…
*** 25% of web apps still vulnerable to eight of the OWASP Top Ten ***
---------------------------------------------
69 percent of web applications are plagued by vulnerabilities that could lead to sensitive data exposure, and 55 percent by cross-site request forgery flaws, the results ..
---------------------------------------------
https://www.helpnetsecurity.com/2017/02/14/web-application-vulnerabilities/
*** Sicherheitslücke in GarageBand für den Mac ***
---------------------------------------------
Apple hat einen potenziell problematischen Fehler in seiner populären Audioanwendung geschlossen. Angreifer hätten wohl Code ausführen können.
---------------------------------------------
https://heise.de/-3624160
*** University DDoSed by Its Own IoT Devices ***
---------------------------------------------
An unnamed university has suffered a DDoS attack at the hand of its own IoT devices, according to a sneak preview of Verizons upcoming yearly data breach report.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/university-ddosed-by-its-own…
*** DSA-3788 tomcat8 - security update ***
---------------------------------------------
It was discovered that a programming error in the processing of HTTPSrequests in the Apache Tomcat servlet and JSP engine may result indenial of service via an infinite loop.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3788
*** DSA-3787 tomcat7 - security update ***
---------------------------------------------
It was discovered that a programming error in the processing of HTTPSrequests in the Apache Tomcat servlet and JSP engine may result indenial of service via an infinite loop.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3787
*** DSA-3786 vim - security update ***
---------------------------------------------
Editor spell files passed to the vim (Vi IMproved) editormay result in an integer overflow in memory allocationand a resulting buffer overflow which potentiallycould result in the execution of arbitrary code or denial ofservice.
---------------------------------------------
https://www.debian.org/security/2017/dsa-3786
*** Jetzt patchen! Angriffe auf WordPress-Seiten nehmen zu und werden gefährlicher ***
---------------------------------------------
Nach der Verunstaltung von verwundbaren WordPress-Webseiten versuchen Angreifer nun Schadcode auszuführen, warnen Sicherheitsforscher.
---------------------------------------------
https://heise.de/-3624301
*** Staying safe online on Valentine’s Day ***
---------------------------------------------
We give some advice on how to steer clear of scams and other bad things on Valentines Day. Everything from ..
---------------------------------------------
https://blog.malwarebytes.com/cybercrime/2017/02/staying-safe-online-on-val…
*** Chrome: Google zahlt 20 Millionen US-Dollar für Anti-Malware-Patente ***
---------------------------------------------
Auch für Google sind 20 Millionen Dollar nicht wenig Geld. Ein US-Gericht verurteilte das Unternehmen zur Zahlung dieser Summe, weil es Patente zur Sicherung vor Malware im ..
---------------------------------------------
https://www.golem.de/news/chrome-google-zahlt-20-millionen-us-dollar-fuer-a…
*** Tracking the Decline of Top Exploit Kits ***
---------------------------------------------
The latter half of 2016 saw a major shift in the exploit kit landscape, with many established kits suddenly dropping operations or switching business models. Angler, which has ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/tracking-decline…
*** Gefälschte Post.at-Sendungsverfolgung im Umlauf ***
---------------------------------------------
Mit einer gefälschten Post.at-Sendungsverfolgung wollen Kriminelle Schadsoftware auf fremden Computern hinterlegen. Dazu fordern sie Empfänger/innen auf, Informationen ..
---------------------------------------------
https://www.watchlist-internet.at/schadsoftware/gefaelschte-postat-sendungs…
*** Security Bulletins posted for Flash Player, Digital Editions and Adobe Campaign ***
---------------------------------------------
Adobe has published security bulletins for Adobe Flash Player (APSB17-04), Adobe Digital Editions (APSB17-05) and Adobe Campaign (APSB17-06). Adobe recommends users update their ..
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1444
*** Nation States Distancing Themselves from APTs ***
---------------------------------------------
Increasingly, governments are outsourcing state-sponsored attacks to mitigate risk and maximize intelligence.
---------------------------------------------
http://threatpost.com/nation-states-distancing-themselves-from-apts/123711/
*** February 2017 security update release ***
---------------------------------------------
Our top priority is to provide the best possible experience for customers in maintaining and protecting their ..
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2017/02/14/february-2017-security-…
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 10-02-2017 18:00 − Montag 13-02-2017 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** State-sponsored Hackers Targeting Prominent Journalists, Google Warns ***
---------------------------------------------
State-sponsored hackers are attempting to steal email passwords of a number of prominent journalists, Google has warned. The hackers are suspected to be Russians, reports POLITICO. Some of the journalists who have received such warnings from Google as ..
---------------------------------------------
https://politics.slashdot.org/story/17/02/10/1726206/state-sponsored-hacker…
*** Unique Office Loader Deploying Multiple Malware Families ***
---------------------------------------------
http://researchcenter.paloaltonetworks.com/2017/02/unit42-unique-office-loa…
*** Sports Direct hacked but it still hasn't disclosed the breach to its staff ***
---------------------------------------------
Sports Direct, the UK's largest sports retail business, was hacked last year, and still hasn't disclosed the incident to its staff. The Register confirmed that the Sports Direct, the UK's largest sports retail business, was hacked last ..
---------------------------------------------
http://securityaffairs.co/wordpress/56187/data-breach/sports-direct-data-br…
*** Think Twice before Posting Data on Pastebin! ***
---------------------------------------------
Pastebin.com is one of my favourite playground. I'm monitoring the content of all pasties posted on this website. My goal is to find juicy data like configurations, database ..
---------------------------------------------
https://blog.rootshell.be/2017/02/12/think-twice-posting-data-pastebin/
*** Lazarus & Watering-hole attacks ***
---------------------------------------------
On 3rd February 2017, researchers at badcyber.com released an article that detailed a series of ..
---------------------------------------------
http://baesystemsai.blogspot.com/2017/02/lazarus-watering-hole-attacks.html
*** Do You Use VirusTotal? Give PacketTotal a Spin!, (Mon, Feb 13th) ***
---------------------------------------------
Packettotal ( http://www.packettotal.com ) is a new site that does some nifty analysis of Packet Captures for you if youre not so familiar with Wireshark or other analysis tools Out of the gate, this site maps out connections, certificates, ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=22061
*** Firefox für Android kann sich an Schadcode verschlucken ***
---------------------------------------------
In der Version 51.0.3 haben die Firefox-Entwickler eine kritische Sicherheitslücke geschlossen. Von der Schwachstelle ist ausschliesslich die Android-Version betroffen.
---------------------------------------------
https://heise.de/-3623027
*** Mirai Widens Distribution with New Trojan that Scans More Ports ***
---------------------------------------------
Late last year, in several high-profile and potent DDoS attacks, Linux-targeting Mirai (identified by Trend Micro as ELF_MIRAI family) revealed just how broken the Internet ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/mirai-widens-dis…
*** Project Zero: NTFS-Treiber ermöglicht Linux-Rootzugriff ***
---------------------------------------------
Eine fehlerhafte Konfiguration des Userspace-Treibers für NTFS unter Linux ermöglicht einfachen Root-Zugriff. Davon betroffen waren Standardinstallationen von Debian ..
---------------------------------------------
https://www.golem.de/news/project-zero-ntfs-treiber-ermoeglicht-linux-rootz…
*** Mexiko soll Gegner von Softdrinks mit Spyware ausgespäht haben ***
---------------------------------------------
Aktivisten, die für eine höhere Besteuerung von zuckerhaltigen Getränken und fettreichen Speisen kämpften, wurden ausgehorcht
---------------------------------------------
http://derstandard.at/2000052555921
*** Dateilose Infektion: Einbruch ohne Spuren ***
---------------------------------------------
Sicherheitsforscher warnen, dass vermutlich die Carbanak-Gang einen neuen Trick verwendet, der viele Schutz- und Analyse-Programme ins Leere laufen lässt. Sie brechen in Computer und Netze ein, ohne dass dabei verdächtige Dateien auf der Platte landen.
---------------------------------------------
https://heise.de/-3623084
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 09-02-2017 18:00 − Freitag 10-02-2017 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** ENISA study on the security aspects of virtualization ***
---------------------------------------------
The report provides an analysis on the current status of security of virtualization, by presenting current technologies affected, risks, efforts, gaps, and the impact the latter have on environments based on virtualization technologies.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/enisa-study-on-the-security-asp…
*** A Feeding Frenzy to Deface WordPress Sites ***
---------------------------------------------
In this report we share data on the ongoing flood of WordPress REST-API exploits we are seeing in the wild. We include data on 20 different site defacement campaigns we are currently tracking.
---------------------------------------------
https://www.wordfence.com/blog/2017/02/rest-api-exploit-feeding-frenzy-defa…
*** RCE Attempts Against the Latest WordPress REST API Vulnerability ***
---------------------------------------------
We are starting to see remote command execution (RCE) attempts trying to exploit the latest WordPress REST API Vulnerability. These RCE attempts started today after a few days of attackers (mostly defacers) rushing to vandalize as many pages as they could. The RCE attempts we are seeing in the wild do not affect every WordPress sites, only the ones using plugins that allow for PHP execution from within posts and pages.
---------------------------------------------
https://blog.sucuri.net/2017/02/rce-attempts-against-the-latest-wordpress-r…
*** De-Anonymizing Browser History Using Social-Network Data ***
---------------------------------------------
Interesting research: "De-anonymizing Web Browsing Data with Social Networks":Abstract: Can online trackers and network adversaries de-anonymize web browsing data readily available to them? We show -- theoretically, via simulation, and through experiments on real user data -- that de-identified web browsing histories can\ be linked to social media profiles using only publicly available data. Our approach is based on a simple observation: each person has a distinctive social network,...
---------------------------------------------
https://www.schneier.com/blog/archives/2017/02/de-anonymizing_1.html
*** CERT updates insider threat guidebook ***
---------------------------------------------
The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University released the fifth edition of the Common Sense Guide to Mitigating Insider Threats. The guide describes 20 practices that organizations should implement across the enterprise to prevent and detect insider threats, as well as case studies of organizations that failed to do so.
---------------------------------------------
https://www.helpnetsecurity.com/2017/02/10/insider-threat-guidebook/
*** ENISA issues Smartphone Development Guidelines ***
---------------------------------------------
ENISA publishes an update of the Smartphone Development Guidelines.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/enisa-issues-smartphone-develop…
*** Hacking Guatemala's DNS - Spying on Active Directory Users By Exploiting a TLD Misconfiguration ***
---------------------------------------------
In search of new interesting high-impact DNS vulnerabilities I decided to take a look at the various top-level domains (TLDs) and analyze their configurations for errors. Upon some initial searching it turns out there is a nice open source service which helps DNS administrators scan their domains for misconfigurations called DNSCheck written by The Internet Foundation in Sweden. This tool helps highlight all sorts of odd DNS misconfigurations such as having an...
---------------------------------------------
https://thehackerblog.com/hacking-guatemalas-dns-spying-on-active-directory…
*** Unpatched (0day) jQuery Mobile XSS ***
---------------------------------------------
TL;DR - Any website that uses jQuery Mobile and has an open redirect is now vulnerable to XSS - and theres nothing you can do about it, theres not even patch
---------------------------------------------
http://sirdarckcat.blogspot.co.at/2017/02/unpatched-0day-jquery-mobile-xss.…
*** Multiple cross-site scripting vulnerabilities in Webmin ***
---------------------------------------------
Webmin contains multiple cross-site scripting vulnerabilities.
---------------------------------------------
http://jvn.jp/en/jp/JVN34207650/
*** Western Digital My Cloud 2.21.119 Authentication Bypass ***
---------------------------------------------
Topic: Western Digital My Cloud 2.21.119 Authentication Bypass Risk: High Text: Authentication bypass vulnerability in Western Digital My Cloud Remco Verm...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2017020093
*** Hanwha Techwin Smart Security Manager ***
---------------------------------------------
This advisory contains mitigation detail for remote code execution vulnerabilities in Hanwha Techwins Smart Security Manager.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01
*** DFN-CERT-2017-0251: Xen, QEMU: Eine Schwachstelle ermöglicht das Ausspähen von Informationen und die Eskalation von Privilegien ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2017-0251/
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Potential Cross-site scripting vulnerability in WebSphere Application Server (CVE-2017-1121) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21997743
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by multiple php5 vulnerabilities (CVE-2016-6911, CVE-2016-8670) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024834
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by a kernel vulnerability ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024807
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by multiple cURL/libcURL vulnerabilities (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024808
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by a libgcrypt vulnerability (CVE-2016-6313) ***
http://www.ibm.com/support/docview.wss?uid=isg3T1024832
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affect Rational Tau (CVE-2016-2180) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21994132
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in OpenSSL affect Rational Tau (CVE-2016-2177) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993836
---------------------------------------------
*** IBM Security Bulletin: IBM Flex System Manager (FSM) is affected by multiple glibc vulnerabilities (CVE-2016-1234, CVE-2016-3706, CVE-2016-4429) ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024831
---------------------------------------------