=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 10-11-2016 18:00 − Freitag 11-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Benevolent malware? reincarna/Linux.Wifatch, (Fri, Nov 11th) ***
---------------------------------------------
In the new to me department. It looks like this one has been around for more thanthree years. Today I was doing some banner grabbing looking for a Mirainodethat had gotten away from me, and came across the Telnet banner below. It appears this device is infected with a piece of malware called Reincarna/Linux.Wifatch. It purports to being a memory resident malware that defends the device from more malicious malware.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21703&rss
*** BSI-Bericht zur Lage der IT-Sicherheit: Die Lage bleibt angespannt ***
---------------------------------------------
In seinem neuesten Bericht beurteilt das Bundesamt für Sicherheit in der Informationstechnik die aktuelle Gefährdungslage der IT-Sicherheit in Deutschland. Dabei zeigt es Schwachstellen auf und bewertet unter anderem Angriffsmethoden.
---------------------------------------------
https://www.heise.de/newsticker/meldung/BSI-Bericht-zur-Lage-der-IT-Sicherh…
*** CA Unified Infrastructure Management Directory Traversal Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a directory traversal vulnerability in CA Technologies Unified Infrastructure Management application.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-315-01
*** F5 Security Advisory: Linux TCP stack vulnerability CVE-2016-5696 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/46/sol46514822.html?…
*** Vuln: Brocade NetIron OS CVE-2016-8203 Memory Corruption Vulnerability ***
---------------------------------------------
An attacker can exploit this issue to cause denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed.
Brocade NetIron OS 5.8.00 through 5.8.00e, 5.9.00 through 5.9.00bd, 6.0.00, and 6.0.00a are vulnerable.
---------------------------------------------
http://www.securityfocus.com/bid/94232
*** F5 Security Advisory: TMM vulnerability CVE-2016-7476 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/87/sol87416818.html?…
*** MyBB 1.8.6 Cross Site Scripting ***
---------------------------------------------
These issues may lead to the injection of JavaScript keyloggers, injection of content such as ads, or the bypassing of CSRF protection, which would for example allow the creation of a new admin user.
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110096
*** Security Advisory - Path Traversal Vulnerability in Huawei Home Gateway Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2015/hw-462908
*** Vuln: Multiple I-O DATA Network Camera Products CVE-2016-7814 Information Disclosure Vulnerability ***
---------------------------------------------
An attacker can exploit this issue to obtain sensitive information. This may aid in further attacks.
The following products and versions are vulnerable:
TS-WRLP firmware version 1.00.01 and prior
TS-WRLA firmware version 1.00.01 and prior
---------------------------------------------
http://www.securityfocus.com/bid/94250
*** Security Advisory - Input Validation Vulnerability in Some Huawei Products ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161111-…
*** Windows Mobile Application Penetration Testing Part 3: Sideloading ***
---------------------------------------------
Introduction and Background: In the First article of the series, we have covered the introduction and background required to start learning Windows Mobile Application Penetration Testing. We have also seen the requirements for setting up Windows Phone 8.1 emulators as well as Windows 10 mobile emulators.
---------------------------------------------
http://resources.infosecinstitute.com/windows-mobile-application-penetratio…
*** TYPO3: Cross-Site Scripting in extension "HTML5 Video Player" (html5videoplayer) ***
---------------------------------------------
It has been discovered that the extension "HTML5 Video Player" (html5videoplayer) is susceptible to Cross-Site Scripting.
---------------------------------------------
https://typo3.org/news/article/cross-site-scripting-in-extension-html5-vide…
*** TYPO3: Multiple vulnerabilities in extension "TC Directmail " (tcdirectmail) ***
---------------------------------------------
It has been discovered that the extension "TC Directmail " (tcdirectmail) is susceptible to Cross Site-Scripting and SQL Injection.
---------------------------------------------
https://typo3.org/news/article/multiple-vulnerabilities-in-extension-tc-dir…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in PAM affect Power Hardware Management Console (‪CVE-2013-7041 and CVE-2015-3238‬) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021702
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDKs affect IBM Virtualization Engine TS7700 April 2016 ***
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009348
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 09-11-2016 18:00 − Donnerstag 10-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** VMSA-2016-0018 VMware product updates address local privilege escalation vulnerability in linux kernel ***
---------------------------------------------
Relevant Products
* VMware Identity Manager
* vRealize Automation
* vRealize Operations
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2016-0018.html
*** FortiWLC Undocumented Hardcoded core Account ***
---------------------------------------------
FortiWLC comes with a hardcoded account named core which is used by Meru Access Points to send core dumps to the FortiWLC and has read/write privileges over various parts of the system.
Impact: Unauthorized read/write remote access
Affected Products: FortiWLC 7.0-9-1, 7.0-10-0, 8.1-2-0, 8.1-3-2 and 8.2-4-0
---------------------------------------------
https://fortiguard.com/advisory/fortiwlc-undocumented-hardcoded-core-account
*** Deepsec: "Unternehmen interessieren sich nicht für Privacy, außer zum Marketing" ***
---------------------------------------------
Sicherheitsexperte Marcus J. Ranum übt auch scharfe Kritik an eigener Branche: Teure Lösungen für wenig Nutzen
---------------------------------------------
http://derstandard.at/2000047306876
*** OpenSSL Security Advisory [10 Nov 2016] (CVE-2016-7054, CVE-2016-7053, CVE-2016-7055) ***
---------------------------------------------
CVE-2016-7054: TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
CVE-2016-7053: Applications parsing invalid CMS structures can crash with a NULL pointer dereference.
---------------------------------------------
https://www.openssl.org/news/secadv/20161110.txt
*** ICMP Unreachable DoS Attacks (aka "Black Nurse"), (Thu, Nov 10th) ***
---------------------------------------------
It is not recommended to block all Type 3 ICMP messages. In particular Type 3 Code 4 (Fragmentation Needed and Don't Fragment was Set) messages are requied for path MTU discovery, which many modern operating systems use.
...
So what should you do?
* Don't panic. This is not a big deal. Test your firewall if you can, or check if is on the vulnerable list
* You are vulnerable if you use a smaller Cisco ASA firewall. Newer/Larger multi-core versions appear to be fine. SonicWall and "some" Palo Alto firewalls appear to be vulnerable too.
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21699&rss
*** Bugtraq: Secunia Research: Oracle Outside In "GetTxObj()" Use-After-Free Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539732
*** Bugtraq: Secunia Research: Oracle Outside In "VwStreamRead()" Buffer Overflow Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539731
*** Internet Of Things: Sorgenkind Sicherheit ***
---------------------------------------------
Das Geschäft mit smarten Devices und vernetzten Produktionsanlagen brummt, doch die Sicherheit ist oft nur Nebensache. Auf einer Konferenz in Köln zeichneten Branchenvertreter ein düsteres Bild.
---------------------------------------------
https://heise.de/-3463589
*** Windows Mobile Application Penetration Testing Part 2: Understanding Applications ***
---------------------------------------------
In the First article of the series, we have covered the introduction and background required to start learning Windows Mobile Application Penetration Testing. We have also seen the requirements for setting up Windows Phone 8.1 emulators as well as Windows 10 mobile emulators. In this article, we will discuss the basics of Windows Phone 8.1 applications and UWP applications.
---------------------------------------------
http://resources.infosecinstitute.com/windows-mobile-application-penetratio…
*** [R3] Nessus 6.9 Fixes Multiple Vulnerabilities ***
---------------------------------------------
http://www.tenable.com/security/tns-2016-16
*** F5 Security Advisories ***
---------------------------------------------
*** Security Advisory: BIG-IP ASM Proactive Bot Defense vulnerability CVE-2016-7472 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/17/sol17119920.html?…
---------------------------------------------
*** Security Advisory: SSL renegotiation vulnerability CVE-2011-1473 ***
https://support.f5.com:443/kb/en-us/solutions/public/15000/200/sol15278.htm…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in lquerylv in LVM impacts AIX (CVE-2016-6079) ***
http://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc
---------------------------------------------
*** IBM Security Bulletin: IBM Resilient Cross Site Scripting Vulnerability (CVE-2016-6062) ***
https://success.resilientsystems.com/hc/en-us/articles/213457065-Security-B…
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache Struts affect IBM WebSphere Portal (CVE-2015-0899, CVE-2016-1181, CVE-2016-1182) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21988770
---------------------------------------------
*** IBM Security Bulletin: A security vulnerability has been identified in IBM WebSphere Application Server Liberty which may impact IBM Streams (CVE-2016-0378) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993571
---------------------------------------------
*** IBM Security Bulletin: HTTP response splitting attack affects IBM TS7700 Virtualization Engine (CVE-2015-2017) ***
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1008115
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 08-11-2016 18:00 − Mittwoch 09-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Admins aufgepasst: SHA1-Zertifikate vor dem endgültigen Aus ***
---------------------------------------------
Ab Januar 2017 wird es ernst: die großen Browser werden ab dann richtige Fehlermeldungen anzeigen, wenn sie auf Zertifikate treffen, die eine Signatur mit SHA1 aufweisen. Die sind aber immer noch im Einsatz, wie ein Kurztest von heise Security zeigt.
---------------------------------------------
https://heise.de/-3460868
*** Adsense: Google entfernt Bankentrojaner aus Werbenetzwerk ***
---------------------------------------------
Erneut ist über ein Werbenetzwerk Schadsoftware verteilt worden. Eine Google-Adsense-Kampagne hatte versucht, Android-Nutzern einen Bankentrojaner unterzuschieben. Die entsprechenden Anzeigen wurden mittlerweile deaktiviert. (Malware, Virus)
---------------------------------------------
http://www.golem.de/news/adsense-google-entfernt-bankentrojaner-aus-werbene…
*** MS16-NOV - Microsoft Security Bulletin Summary for November 2016 - Version: 1.0 ***
---------------------------------------------
https://technet.microsoft.com/en-us/library/security/MS16-NOV
*** App-Schwachstelle: Angreifer können iPhone-Anrufe auslösen ***
---------------------------------------------
Ein Fehler in populären iOS-Apps ermöglicht es, das iPhone zum automatischen Anwählen einer bestimmten Rufnummer zu bringen und den Nutzer zugleich am sofortigen Abbruch des Telefonats zu hindern.
---------------------------------------------
https://heise.de/-3460552
*** November 2016 security update release ***
---------------------------------------------
Today we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released. More information about this month's security updates and advisories can be found in the Security TechNet Library.
---------------------------------------------
https://blogs.technet.microsoft.com/msrc/2016/11/08/november-2016-security-…
*** Thoughts on the recent 'NtSetWindowLongPtr' vulnerability ***
---------------------------------------------
On October 31, Google security team has announced it has discovered a vulnerability, actively exploited the wild, in (unspecified) versions of Microsoft Windows. The vulnerability is a local privilege escalation, allowing an unprivileged user to gain kernel privileges.
---------------------------------------------
https://labs.bromium.com/2016/11/08/thoughts-on-the-recent-ntsetwindowlongp…
*** New XM1RPC SEO Spam and Backdoor Campaign ***
---------------------------------------------
We have been monitoring a new campaign specifically targeting WordPress sites, using hundreds of them for SEO spam distribution. We call it the XM1RPC campaign due to the common backdoor used across all of the compromised sites. The file is named in such a way as to confuse WordPress administrators who are familiar with XML-RPC. This malware usually infects all sites that share the same FTP account, which means cleaning just one website won't help...
---------------------------------------------
https://blog.sucuri.net/2016/11/xm1rpc-spam-backdoor.html
*** Phoenix Contact ILC PLC Authentication Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation details for authentication vulnerabilities in Phoenix Contact's ILC PLCs.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-313-01
*** Siemens Industrial Products Local Privilege Escalation Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a privilege escalation vulnerability that affects several Siemens industrial products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02
*** OSIsoft PI System Incomplete Model of Endpoint Features Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for an incomplete model of endpoint features vulnerability in OSIsoft's PI System software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICS-VU-313-03
*** TrickBot Banking Trojan Adds New Browser Manipulation Tools ***
---------------------------------------------
The banking Trojan TrickBot is evolving fast, according to researchers, and within weeks will expand its victim list and attack scope.
---------------------------------------------
http://threatpost.com/trickbot-banking-trojan-adds-new-browser-manipulation…
*** DSA-3709 libxslt - security update ***
---------------------------------------------
Nick Wellnhofer discovered that the xsltFormatNumberConversion functionin libxslt, an XSLT processing runtime library, does not properly checkfor a zero byte terminating the pattern string. This flaw can be exploited to leak a couple of bytes after the buffer that holds thepattern string.
---------------------------------------------
https://www.debian.org/security/2016/dsa-3709
*** Security Advisory - Input Validation Vulnerability in Wi-Fi Driver of Huawei Smart Phones ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161109-…
*** Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched ***
---------------------------------------------
The effectiveness of a zero-day quickly deteriorates as an attack tool after it gets discovered and patched by the affected software vendors. Within the time between the discovery of the vulnerability and the release of the fix, a bad actor might try to get the most out of his previously valuable attack assets.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/QdtwFJ1RHyQ/
*** Vuln: SAP NetWeaver Java AS Webdynpro Component Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94174
*** New BEC scams seek to build trust first, request wire transfer later ***
---------------------------------------------
Business email compromise scammers have gradually changed their tactics to improve their scam success rate.
---------------------------------------------
https://www.symantec.com/connect/blogs/new-bec-scams-seek-build-trust-first…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple OpenSSL vulnerabilities affect IBM Aspera Shares 1.9.4 or earlier and IBM Aspera Console 3.0.6 or earlier ***
https://support.asperasoft.com/hc/en-us/articles/229505687-Security-Bulleti… -IBM-Aspera-Console-3-0-6-or-earlier
---------------------------------------------
*** IBM Security Bulletin: The BigFix Platform has a vulnerability involving missing the HTTP Strict-Transport-Security Header (CVE-2016-0297) ***
http://www.ibm.com/support/docview.wss?uid=swg21993214
---------------------------------------------
*** IBM Security Bulletin: BigFix Platform has a vulnerability where information is exposed through Log Files (CVE-2016-0296) ***
http://www.ibm.com/support/docview.wss?uid=swg21993213
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail Security Affected By Multiple Open Source CURL Vulnerabilities (CVE-2016-7167) ***
http://www.ibm.com/support/docview.wss?uid=swg21993246
---------------------------------------------
*** IBM Security Bulletin: IBM Connections Mobile Server Security Refresh for Apache Struts (CVE-2016-0785, CVE-2016-0785, CVE-2016-3093, CVE-2016-4003) ***
http://www.ibm.com/support/docview.wss?uid=swg21984206
---------------------------------------------
*** IBM Security Bulletin: IBM Connections Security Refresh for Apache Struts CVE-IDs: CVE-2016-0785 CVE-2016-2162 ***
http://www.ibm.com/support/docview.wss?uid=swg21985424
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 07-11-2016 18:00 − Dienstag 08-11-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Android: Sicherheitsupdate für November lässt kritische Lücke offen ***
---------------------------------------------
Linux-Kernel-Bug auf Nexus- und Pixel-Geräten noch nicht geschlossen - Update schließt Dutzende Sicherheitslücken
---------------------------------------------
http://derstandard.at/2000047142975
*** Android Security Bulletin November 2016 ***
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Alongside the bulletin, we have released a security update to Google devices through an over-the-air (OTA) update.
---------------------------------------------
https://source.android.com/security/bulletin/2016-11-01.html
*** DDoS attack halts heating in Finland amidst winter ***
---------------------------------------------
The systems that were attacked tried to respond to the attack by rebooting the main control circuit. This was repeated over and over so that heating was never working.
---------------------------------------------
http://metropolitan.fi/entry/ddos-attack-halts-heating-in-finland-amidst-wi…
*** Security Updates for Adobe Connect (APSB16-35) and Adobe Flash Player (APSB16-37) Available ***
---------------------------------------------
Adobe has published security bulletins for Adobe Connect (APSB16-35) and Adobe Flash Player (APSB16-37). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the relevant bulletin.
---------------------------------------------
https://blogs.adobe.com/psirt/?p=1420
*** MSRT November 2016: Unwanted software has nowhere to hide in this month's release ***
---------------------------------------------
We came across a browser modifier that sports rootkit capabilities. Not only does the threat, detected as BrowserModifier:Win32/Soctuseer, cross the line that separates legitimate software from unwanted, it also takes staying under the radar to the next level. Rootkit capabilities, which make it difficult to detect and remove applications, are usually associated with malware.
---------------------------------------------
https://blogs.technet.microsoft.com/mmpc/2016/11/08/msrt-november-2016-unwa…
*** Vuln: phpMyAdmin CVE-2016-6610 Full Path Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94118
*** BlackBerry powered by Android Security Bulletin November 2016 ***
---------------------------------------------
http://support.blackberry.com/kb/articleDetail?articleNumber=000038666
*** Vuln: Multiple D-Link DIR Routers CVE-2016-6563 Remote Stack Overflow Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94130
*** Piwik 2.16.0 PHP Object Injection ***
---------------------------------------------
Affected Versions: Version 2.16.0 and prior versions.
Vulnerability Description: The vulnerability can be triggered through the saveLayout() method defined in /plugins/Dashboard/Controller.php:
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110055
*** f5 Security Advisories ***
---------------------------------------------
*** Security Advisory: Configuration utility CSRF vulnerability ***
https://support.f5.com:443/kb/en-us/solutions/public/k/21/sol21485342.html?…
---------------------------------------------
*** Security Advisory: Linux kernel vulnerability CVE-2016-7117 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/51/sol51201255.html?…
---------------------------------------------
*** Security Advisory: Multiple LibTIFF vulnerabilities ***
https://support.f5.com:443/kb/en-us/solutions/public/k/35/sol35155453.html?…
---------------------------------------------
*** Security Advisory: LibTIFF vulnerabilities CVE-2016-5320 and CVE-2015-8784 ***
https://support.f5.com:443/kb/en-us/solutions/public/k/89/sol89096577.html?…
---------------------------------------------
*** Security Advisory: PHP vulnerabilities CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, and CVE-2015-6838 ***
https://support.f5.com:443/kb/en-us/solutions/public/17000/300/sol17377.htm…
---------------------------------------------
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Sterling Connect:Direct for HP NonStop (CVE-2016-2177, CVE-2016-6306, CVE-2016-2183) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993601
---------------------------------------------
*** IBM Security Bulletin: Password Disclosure via application tracing in IBM Tivoli Storage Manager for Space Management (CVE-2016-0371) ***
http://www.ibm.com/support/docview.wss?uid=swg21990042
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect the BigFix Platform ***
http://www.ibm.com/support/docview.wss?uid=swg21993215
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect the BigFix Platform ***
http://www.ibm.com/support/docview.wss?uid=swg21993210
---------------------------------------------
*** IBM Security Bulletin: The BigFIx platform has a vulnerability where WebReports executes with unnecessary privileges (CVE-2016-0396) ***
http://www.ibm.com/support/docview.wss?uid=swg21993206
---------------------------------------------
*** IBM Security Bulletin: BigFix Platform has a vulnerability allowing unrestricted file upload (CVE-2016-0214) ***
http://www.ibm.com/support/docview.wss?uid=swg21993203
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 04-11-2016 18:00 − Montag 07-11-2016 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Sophos Web Appliance 4.2.1.3 Remote Code Execution ***
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016110036
*** Two Critical MySQL Bugs Discovered ***
---------------------------------------------
An anonymous reader quotes InfoWorld: Two critical privilege escalation vulnerabilities in MySQL, MariaDB, and PerconaDB can help take control of ..
---------------------------------------------
https://developers.slashdot.org/story/16/11/05/056227/two-critical-mysql-bu…
*** Tech support scammers use denial of service bug to hang victims ***
---------------------------------------------
Process pig keeps eyes glued on fraudsters phone number. Tech support fraudsters have taught an old denial of service bug new tricks to add a convincing layer of authenticity to scams.
---------------------------------------------
www.theregister.co.uk/2016/11/07/tech_support_scammers_use_denial_of_servic…
*** Vuln: cURL/libcURL CVE-2016-8625 Remote Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/94107
*** Disassembling a Mobile Trojan Attack ***
---------------------------------------------
In fact, any site using AdSense to display adverts could potentially have displayed messages that downloaded the dangerous Svpeng and automatically saved it to ..
---------------------------------------------
http://securelist.com/blog/research/76286/disassembling-a-mobile-trojan-att…
*** Hintergrund: Threat Intelligence: IT-Sicherheit zum Selbermachen? ***
---------------------------------------------
Viele IT-Sicherheitsfirmen erweitern ihr Portfolio derzeit um sogenannte Threat Intelligence. Die ist jedoch kein Allheilmittel sondern muss gezielt eingesetzt werden, um einen echten Mehrwert zu erzielen. Dr. Timo Steffens vom ..
---------------------------------------------
https://heise.de/-3453595
*** SSA-701708 (Last Update 2016-11-07): Local Privilege Escalation in Industrial Products ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708…
*** SSA-378531 (Last Update 2016-11-07): Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC Runtime Professional ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531…
*** IBM Security Bulletin: Vulnerability in IBM Java SDK affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2016-5597) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21993700
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM MessageSight (CVE-2016-3598) ***
---------------------------------------------
http://www-01.ibm.com/support/docview.wss?uid=swg21992715
*** IBM Security Bulletin: IBM WebSphere Cast Iron Solution is affected by Apache Tomcat vulnerability (CVE-2016-5388) ***
---------------------------------------------
http://www.ibm.com/support/docview.wss?uid=swg21992977
*** Login Form Hijacking Vulnerability in Citrix NetScaler Gateway ***
---------------------------------------------
https://support.citrix.com/article/CTX213313
*** Citrix XenServer Security Update for CVE-2016-0800 ***
---------------------------------------------
A security vulnerability has been identified in Citrix XenServer that could, if exploited, allow a malicious attacker with access to the XenServer ..
---------------------------------------------
https://support.citrix.com/article/CTX208403
*** Multiple Security Vulnerabilities in Citrix NetScaler Platform ... ***
---------------------------------------------
A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler ..
---------------------------------------------
https://support.citrix.com/article/CTX216642
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 03-11-2016 18:00 − Freitag 04-11-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Extracting Malware Transmitted Via Telnet, (Thu, Nov 3rd) ***
---------------------------------------------
One charactersitcs of many of the telnet explois we have seen over the last few years has been the transmission of malware using echo commands. Even the recent versions of Mirai used this trick. Reconstruction the malware from packet captures can be a little bit tricky, in particular if you are trying to automate the process. So here is what I have been doing for my honeypot DVR: First of all, the DVR is connected to a remote controlled power outlet, to make it easy to reboot it as needed. I do...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21673&rss
*** Moving Beyond EMET ***
---------------------------------------------
EMET - Then and Now Microsoft's Trustworthy Computing initiative was 7 years old in 2009 when we first released the Enhanced Mitigation Experience Toolkit (EMET). Despite substantial improvements in Windows OS security during that same period, it was clear that the way we shipped Windows at the time (3-4 years between major releases) was simply...
---------------------------------------------
https://blogs.technet.microsoft.com/srd/2016/11/03/beyond-emet/
*** Mobile subscriber identity numbers can be exposed over Wi-Fi ***
---------------------------------------------
For a long time, law enforcement agencies and hackers have been able to track the identity and location of mobile users by setting up fake cellular network towers and tricking their devices to connect to them. Researchers have now found that the same thing can be done much more cheaply with a simple Wi-Fi hotspot.The devices that pose as cell towers are known in the industry as IMSI catchers, with the IMSI (international mobile subscriber identity) being a unique number tied to a mobile...
---------------------------------------------
http://www.cio.com/article/3138469/security/mobile-subscriber-identity-numb…
*** Outlook Web Access Two-Factor Authentication Bypass Exists ***
---------------------------------------------
Two-factor authentication protecting Outlook Web Access and Office 365 portals can be bypassed-and the situation likely cannot be fixed, a researcher has disclosed.
---------------------------------------------
http://threatpost.com/outlook-web-access-two-factor-authentication-bypass-e…
*** DNS Analysis and Tools ***
---------------------------------------------
In this article, we will take a look at the complete DNS process, DNS lookup, DNS reverse lookup, DNS zone transfer, etc. along with some tools to analyze & enumerate DNS traffic. Domain Name System (DNS) is a naming system used to convert human readable domain names like infosecinstitute.com into a numerical IP address. The...
---------------------------------------------
http://resources.infosecinstitute.com/dns-analysis-and-tools/
*** Security Advisory: Configuration utility CSRF vulnerability ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/61/sol61045143.html?…
*** cURL/libcurl Multiple Bugs Let Remote Users Inject Cookies, Reuse Connections, and Execute Arbitrary Code and Let Local Users Obtain Potentially Sensitive Information and Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1037192
*** Security Notice - Statement on Black Hat Europe 2016 Revealing Security Vulnerability in Huawei Mate Smart Phone ***
---------------------------------------------
http://www.huawei.com/en/psirt/security-notices/2016/huawei-sn-20161104-01-…
*** Moxa OnCell Security Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation vulnerabilities for authorization bypass and disclosed OS commanding vulnerabilities in Moxa's OnCell Security Software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-308-01
*** Schneider Electric Magelis HMI Resource Consumption Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation details for resource consumption vulnerabilities affecting Schneider Electric's Magelis human-machine interface products.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-308-02
*** Schneider Electric IONXXXX Series Power Meter Vulnerabilities ***
---------------------------------------------
This advisory is a follow-up to the alert titled ICS-ALERT-16-256-02 Schneider Electric ION Power Meter CSRF Vulnerability that was published September 12, 2016, on the NCCIC/ICS-CERT web site. This advisory contains mitigation details for a cross-site request forgery and no access control vulnerabilities in Schneider Electric's IONXXXX series power meters.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03
*** IBM Security Bulletin ***
---------------------------------------------
*** IBM Security Bulletin: IBM i is affected by several vulnerabilities (CVE-2016-2183 and CVE-2016-6329) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSH and OpenSSL affect GPFS for Windows V3.5 ***
http://www-01.ibm.com/support/docview.wss?uid=isg3T1024394
---------------------------------------------
*** IBM Security Bulletin: Cross-site scripting vulnerability affects multiple IBM Rational products based on IBM Jazz technology (CVE-2016-2926) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993444
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Apache HttpComponents affect IBM InfoSphere Information Server (CVE-2012-6153 CVE-2014-3577) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21982420
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 02-11-2016 18:00 − Donnerstag 03-11-2016 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Unpatched Vulnerability on Wix.com Puts Millions of Sites at Risk ***
---------------------------------------------
Wix websites are vulnerable to reflective DOM cross-site scripting attack that could give attackers control of user's websites.
---------------------------------------------
http://threatpost.com/unpatched-vulnerability-on-wix-com-puts-millions-of-s…
*** Malware: Adwords-Anzeige verlinkt auf falschen Google Chrome ***
---------------------------------------------
Eine Malware-Kampagne, die sich gegen Apple-Nutzer richtet, bietet gefälschte Versionen von Googles Chrome-Browser. Dabei nutzten die Betrüger ausgerechnet Googles Adword-Anzeigen, um Opfer hereinzulegen.
---------------------------------------------
http://www.golem.de/news/malware-adwords-anzeige-verlinkt-auf-falschen-goog…
*** Recognizing Packed Malware and its Unpacking Approaches-Part 2 ***
---------------------------------------------
In Part 1 of this article series, we had a look at the ways to recognize packed executables and various ways to automate the unpacking process. In this article, we will look at the manual process of unpacking a packed malware specimen. In the last article, we have seen how the malware specimen was packed...
---------------------------------------------
http://resources.infosecinstitute.com/recognizing-packed-malware-and-its-un…
*** Bereits 30.000 Angriffe: Experten warnen vor Joomla-Lücke ***
---------------------------------------------
Cyberkriminelle verschaffen sich erweiterte Rechte - Webseiten-Betreiber sollten sofort auf die neueste Version updaten
---------------------------------------------
http://derstandard.at/2000046902782
*** Barracuda: Outage caused by large number of inbound connections ***
---------------------------------------------
Yet firm refuses to say the word DDoS. What are they hiding? Outage-hit security firm Barracuda appears to have been struck down by a DDoS - though the firm says its still investigating and refuses to confirm or deny it.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/11/03/barracuda_o…
*** These 12+ Internet Crime Stories Will Make You Care about Cybersecurity [Updated] ***
---------------------------------------------
Online security seems such an abstract and distant field, where other people get hurt, but you somehow stay safe, either by luck or internet savvy. But the truth is, it could happen to anyone, and it might even have happened to you in the past. They say that nothing beats learning from experience, but sometimes it's best...
---------------------------------------------
https://heimdalsecurity.com/blog/12-true-stories-that-will-make-you-care-ab…
*** Browsererweiterungen: Plötzlich nackt im Netz ***
---------------------------------------------
Alle Suchwörter, alle Webseiten - der Browser-Verlauf eines ganzen Monats steht zum Verkauf. Unser Autor erlebte, wie das ist, wenn die eigenen Daten zur Ware werden.
---------------------------------------------
http://www.golem.de/news/browsererweiterungen-ploetzlich-nackt-im-netz-1611…
*** Ubuntu Core Snaps door shut on Linuxs new Dirty COWs ***
---------------------------------------------
When did Linux start becoming like Windows? Canonical has released Ubuntu Core 16 for IoT, featuring Linux self-patching for a generation of users against future Bash or Dirty COWs.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/11/03/ubuntu_core…
*** HPSBUX03664 SSRT110248 rev.1 HP-UX BIND Service running named, Remote Denial of Service (DoS) ***
---------------------------------------------
Potential security vulnerabilities have been identified in the HP-UX BIND service running named. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS).
---------------------------------------------
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05321107
*** Security Advisory: BIG-IP virtual server TCP sequence numbers vulnerability ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/68/sol68401558.html?…
*** Security Advisory: OpenSSL vulnerability CVE-2016-6304 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/54/sol54211024.html?…
*** Security Advisory: BIND vulnerability CVE-2016-8864 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/35/sol35322517.html?…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects WebSphere Application Server October 2016 CPU (CVE-2016-5573, CVE-2016-5597) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993440
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities may affect IBM WebSphere Real Time ***
https://www-01.ibm.com/support/docview.wss?uid=swg21993501
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail Security Affected By Multiple Open Source OpenSSL Vulnerabilities ***
http://www.ibm.com/support/docview.wss?uid=swg21992348
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Tivoli Netcool Configuration Manager (ITNCM) (CVE-2016-3426) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992149
---------------------------------------------
*** IBM Security Bulletin: Password Disclosure via application tracing in IBM Tivoli Storage Manager Client (CVE-2016-0371) ***
http://www.ibm.com/support/docview.wss?uid=swg21985114
---------------------------------------------
*** IBM Security Bulletin: A Vulnerability in OpenSource Apache Taglibs Vulnerability affect Content Integrator (CVE-2015-0254) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21993243
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 31-10-2016 18:00 − Mittwoch 02-11-2016 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** New, more-powerful IoT botnet infects 3,500 devices in 5 days ***
---------------------------------------------
Discovery of Linux/IRCTelnet suggests troubling new DDoS menace could get worse.
---------------------------------------------
http://arstechnica.com/security/2016/11/new-iot-botnet-that-borrows-from-no…
*** Docker user? Havent patched Dirty COW yet? Got bad news for you ***
---------------------------------------------
Repeat after me, containerization isnt protection, its a management feature Heres another reason to pay attention to patching your Linux systems against the Dirty COW vulnerability: it can be used to escape Docker containers.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/11/01/docker_user…
*** Sicherheits-Patch für Zero-Day-Lücke in Windows in Sicht ***
---------------------------------------------
Ein Ausnutzen der Schwachstelle soll nur in Verbindung mit einer bereits geschlossenen Flash-Lücke funktionieren. Microsoft kritisiert Google für die frühe Offenlegung der Lücke.
---------------------------------------------
https://heise.de/-3454255
*** Millionen Surf-Profile: Daten stammen angeblich auch von Browser-Addon WOT ***
---------------------------------------------
Die detaillierten Daten zum Surfverhalten von Millionen Deutschen, auf die NDR-Reporter Zugriff haben, stammen offenbar auch von der beliebten Browser-Erweiterung WOT. Die damit gesammelten Daten seien leicht bestimmten Personen zuzuordnen.
---------------------------------------------
https://heise.de/-3453820
*** Performance-Framework: Kritische Sicherheitslücken in Memcached geschlossen ***
---------------------------------------------
Von einer Sicherheitslücke in einem beliebten Performance-Framework sind auch Dienste wie Facebook, Youtube und Reddit betroffen gewesen. Angreifer hätten auf dem Zielsystem Code ausführen können. Ein Patch und ein Workaround sind verfügbar.
---------------------------------------------
http://www.golem.de/news/performance-framework-kritische-sicherheitsluecken…
*** Datenpanne: Wenn das iPhone die Geheimnummer der Nationalratspräsidentin kennt ***
---------------------------------------------
Offenbar durch einen Fehler bei AppleCare sind die Telefonbucheinträge mehrerer iPhone-Nutzer an andere übertragen worden, berichten der "Stern" und das österreichische Magazin "News".
---------------------------------------------
https://heise.de/-3454575
*** Belkin's WeMo Gear Can Hack Android Phones ***
---------------------------------------------
Vulnerabilities in WeMo home automation devices can be used to attack the Android apps used to manage devices remotely.
---------------------------------------------
http://threatpost.com/belkins-wemo-gear-can-hack-android-phones/121730/
*** Security Advisory: OpenSSL vulnerability CVE-2016-2179 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/23/sol23512141.html?…
*** Security Advisory 2016-02: Security Update for OTRS ***
---------------------------------------------
November 01, 2016 - Please read carefully and check if the version of your OTRS system is affected by this vulnerability. Please send information regarding vulnerabilities in OTRS to: security(a)otrs.org PGP Key pub 2048R/9C227C6B 2011-03-21 [expires at: 2017-08-20] uid OTRS Security Team GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22
---------------------------------------------
https://www.otrs.com/security-advisory-2016-02-security-update-otrs/
*** Palo Alto PAN-OS Insecure API Token Generation Lets Remote Users Access the Target Firewall API Interface ***
---------------------------------------------
http://www.securitytracker.com/id/1037153
*** Palo Alto PAN-OS Input Validation Flaw in Captive Portal Lets Remote Users Conduct Cross-Site Scripting Attacks ***
---------------------------------------------
http://www.securitytracker.com/id/1037152
*** DFN-CERT-2016-1794: Django: Zwei Schwachstellen ermöglichen u.a. das Erlangen von Benutzerrechten ***
---------------------------------------------
https://portal.cert.dfn.de/adv/DFN-CERT-2016-1794/
*** USN-3118-1: Mailman vulnerabilities ***
---------------------------------------------
Ubuntu Security Notice USN-3118-11st November, 2016mailman vulnerabilitiesA security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Ubuntu 12.04 LTSSummarySeveral security issues were fixed in Mailman.Software description mailman - Powerful, web-based mailing list manager DetailsIt was discovered that the Mailman administrative web interface did notprotect against cross-site request forgery (CSRF) attacks. If anauthenticated user were
---------------------------------------------
http://www.ubuntu.com/usn/usn-3118-1/
*** CVE-2016-8864: A problem handling responses containing a DNAME answer can lead to an assertion failure ***
---------------------------------------------
A defect in BINDs handling of responses containing a DNAME answer can cause a resolver to exit after encountering an assertion failure in db.c or resolver.c
---------------------------------------------
https://kb.isc.org/article/AA-01434/0/CVE-2016-8864%3A-A-problem-handling-r…
*** Symantec IT Management Suite Multiple Issues ***
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** Norton Mobile Security for Android Multiple Security Issues ***
---------------------------------------------
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in Struts v2 affect IBM Security Identity Manager ( CVE-2016-1181 CVE-2016-1182 ) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992931
---------------------------------------------
*** IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to cross-site scripting (CVE-2016-6072) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21991893
---------------------------------------------
*** IBM Security Bulletin: IBM Security Guardium Data Redaction is vulnerable to IBM SDK, Java Technology Edition Quarterly CPU Jul 2016 Includes Oracle Jul 2016 CPU (CVE-2016-3485) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21992001
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Tivoli Monitoring (CVE-2016-3485, CVE-2016-3511, CVE-2016-3598) ***
http://www.ibm.com/support/docview.wss?uid=swg21993191
---------------------------------------------
*** IBM Security Bulletin: A command injection vulnerability has been identified in IBM Security Access Manager for Mobile appliances (CVE-2016-3028) ***
http://www.ibm.com/support/docview.wss?uid=swg21991110
---------------------------------------------
*** IBM Security Bulletin: A vulnerability associated with the default account lockout settings in IBM Security Access Manager for Mobile has been identified (CVE-2016-3025) ***
http://www.ibm.com/support/docview.wss?uid=swg21991107
---------------------------------------------
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco ASR 5500 Series with DPC2 Cards SESSMGR Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco TelePresence Endpoints Local Command Injection Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco ASR 900 Series Aggregation Services Routers Buffer Overflow Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Email Security Appliance RAR File Attachment Scanner Bypass Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Prime Home Authentication Bypass Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Meeting Server Session Description Protocol Media Lines Buffer Overflow Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
*** Cisco Meeting Server and Meeting App Buffer Underflow Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-10-2016 18:00 − Montag 31-10-2016 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Of course smart homes are targets for hackers ***
---------------------------------------------
The Wirecutter, an in-depth comparative review site for various electrical and electronic devices, just published an opinion piece on whether users should be worried about security issues in IoT devices. The summary: avoid devices that dont require passwords (or dont force you to change a default and devices that want you to disable security, follow general network security best practices but otherwise dont worry - criminals arent likely to target you.This is terrible, irresponsible advice. Its
---------------------------------------------
http://mjg59.dreamwidth.org/45483.html
*** Ensuring that ICS/SCADA isn't our next IoT nightmare ***
---------------------------------------------
The DDoS chaos of the past month tells us that we need to work together to ensure future standards and reduce security risks
---------------------------------------------
https://nakedsecurity.sophos.com/2016/10/28/ensuring-that-icsscada-isnt-our…
*** Volatility Bot: Automated Memory Analysis, (Sun, Oct 30th) ***
---------------------------------------------
Few weeks ago Ive attended the SANS DFIR Summit in Prague, and one of the very interesting talks was from Martin Korman (@MartinKorman), who presented a new tool he developed: Volatility Bot. According to his description, Volatility Bot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation. Not only does it automatically extract the executable...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21655&rss
*** Masque Attack Abuses iOS's Code Signing to Spoof Apps and Bypass Privacy Protection ***
---------------------------------------------
First reported in 2014, Masque Attack allowed hackers to replace a genuine app from the App Store with a malformed, enterprise-signed app that had the same Bundle Identifier (Bundle ID). Apple subsequently patched the vulnerabilities (CVE-2015-3772 and CVE-2015-3725), but while it closed a door, scammers seemed to have opened a window. Haima's repackaged, adware-laden apps and its native helper application prove that App Store scammers are still at it.
---------------------------------------------
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/ffHuC_yu178/
*** DDOS-Attacke gegen Server legt Wiener TU-Informatiker lahm ***
---------------------------------------------
Eine DDOS-Attacke gegen Server der Fachschaft Informatik der TU Wien hat zu Webseiten-Ausfällen geführt.
---------------------------------------------
https://futurezone.at/digital-life/ddos-attacke-gegen-server-legt-wiener-tu…
*** Joomla websites attacked en masse using recently patched exploits ***
---------------------------------------------
Attackers are aggressively attacking Joomla-based websites by exploiting two critical vulnerabilities patched last week.The flaws allow the creation of accounts with elevated privileges on websites built with the popular Joomla content management system, even if account registration is disabled. They were patched in Joomla 3.6.4, released Tuesday.Hackers didnt waste any time reverse engineering the patches to understand how the two vulnerabilities can be exploited to compromise websites,...
---------------------------------------------
http://www.csoonline.com/article/3136933/security/joomla-websites-attacked-…
*** CardComplete-Phishingmail: 3-D Secure Aktualisierung ***
---------------------------------------------
In einer vermeintlichen CardComplete-Benachrichtigung heißt es, dass Kreditkarteninhaber/innen ihr 3-D Secure Verfahren aktualisieren müssen. Dazu sollen sie eine Website aufrufen und ihre persönlichen Kreditkarteninformationen bekannt geben. In Wahrheit stammt die E-Mail von Kriminellen, die damit sensible Daten stehlen.
---------------------------------------------
https://www.watchlist-internet.at/phishing/cardcomplete-phishingmail-3-d-se…
*** "AtomBombing": Forscher warnen vor "unpatchbarer" Windows-Lücke ***
---------------------------------------------
Angeblich alle Windows-Systeme betroffen - Gefahrenpotenzial allerdings unklar
---------------------------------------------
http://derstandard.at/2000046630311
*** Cybercrime-Report 2015: Elf Prozent mehr Anzeigen in Österreich ***
---------------------------------------------
Mehr Fälle bei Internetbetrug, Erpressung und Datenmissbrauch
---------------------------------------------
http://derstandard.at/2000046762022
*** The Week in Ransomware - October 28 2016 - Locky, Angry Duck, and More! ***
---------------------------------------------
Lots and lots of little ransomware and in-dev variants released this week. Of particular note is the quick release of two Locky variants that used .sh*t and then a day later the .thor extension for encrypted files.
---------------------------------------------
http://www.bleepingcomputer.com/news/security/the-week-in-ransomware-octobe…
*** Security Advisory: OpenSSL vulnerability CVE-2016-2181 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/59/sol59298921.html?…
*** Vuln: Moodle CVE-2016-7919 Information Disclosure Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/93971
*** GNU tar 1.29 Extract Pathname Bypass ***
---------------------------------------------
Topic: GNU tar 1.29 Extract Pathname Bypass Risk: Low Text: - t216 special vulnerability release -- Vulnerability: POINTYFEATHER aka Tar extract pathname bypass ...
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016100254
*** About the security content of iOS 10.1.1 ***
---------------------------------------------
This document describes the security content of iOS 10.1.1.
---------------------------------------------
https://support.apple.com/en-us/HT207287
*** Vulnerabilities in InfraPower PPS-02-S Q213V1 ***
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Cross-Site Request Forgery ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5375.php
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Authentication Bypass Vulnerability ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5374.php
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Insecure Direct Object Reference Authorization Bypass ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5373.php
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Unauthenticated Remote Root Command Execution ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5372.php
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Hard-coded Credentials Remote Root Access ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5371.php
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Local File Disclosure Vulnerability ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5370.php
---------------------------------------------
*** InfraPower PPS-02-S Q213V1 Multiple XSS Vulnerabilities ***
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5369.php
---------------------------------------------
Next End-of-Shift report: 2016-11-02
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-10-2016 18:00 − Freitag 28-10-2016 18:00
Handler: Robert Waldner
Co-Handler: Alexander Riepl
*** Vuln: HP Business Service Management CVE-2016-4392 Cross Site Scripting Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/93933
*** MS16-128 - Critical: Security Update for Adobe Flash Player (3201860) - Version: 1.0 ***
https://technet.microsoft.com/en-us/library/security/MS16-128
*** Vuln: Python urllib3 CVE-2016-9015 TLS Certificate Validation Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/93941
*** Vuln: Apache Tomcat Security Manager CVE-2016-6796 Security Bypass Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/bid/93944
*** iTunes 12.5.2 for Windows ***
---------------------------------------------
https://support.apple.com/kb/HT207274
*** iPrint Appliance 2.1 Patch 1 ***
---------------------------------------------
https://download.novell.com/Download?buildid=AmZsfGf_NQ4~
*** Malvertising ***
---------------------------------------------
Unsere Kollegen vom niederländischen NCSC haben eben ihr "Cyber Security Assessment Netherlands 2016" auch auf Englisch veröffentlicht. Da steckt viel Arbeit ..
---------------------------------------------
http://www.cert.at/services/blog/20161028083404-1815.html
*** Researchers tag new brace of bugs in NTP, but theyre fixable ***
---------------------------------------------
However, because these are protocol vulnerabilities, the researchers fixing NTP is more important. They propose replacing the current model with one that uses more ..
---------------------------------------------
http://www.theregister.co.uk/2016/10/28/researchers_tag_new_brace_of_bugs_i…
*** Honeywell Experion PKS Improper Input Validation Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a denial-of-service condition caused by an improper input validation vulnerability in Honeywell’s Experion Process Knowledge System platform.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01
*** Bugtraq: [security bulletin] HPSBMU03653 rev.1 - HPE System Management Homepage (SMH), Remote Arbitrary Code Execution, Cross-Site Scripting (XSS), Denial of Service (DoS), Unauthorized Disclosure of Information ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539646
*** Bugtraq: [security bulletin] HPSBHF3549 ThinkPwn UEFI BIOS SmmRuntime Escalation of Privilege ***
---------------------------------------------
http://www.securityfocus.com/archive/1/539645
*** Der Bot im Babyfon ***
---------------------------------------------
In ein Heimnetzwerk integrierte IoT-Geräte bauen oftmals selbstständig eine Verbindung zum Internet auf, indem sie den Router des Nutzers per UPnP (Universal Plug and Play) so konfigurieren, dass eine Portweiterleitung ..
---------------------------------------------
https://www.bsi-fuer-buerger.de/BSIFB/DE/Service/Aktuell/Informationen/Arti…
*** Researchers expose Mirai vuln that could be used to hack back against botnet ***
---------------------------------------------
Exploit can halt attacks from IoT devices Security researchers have discovered flaws in the Mirai ..
---------------------------------------------
www.theregister.co.uk/2016/10/28/mirai_botnet_hack_back/