=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 05-07-2016 18:00 − Mittwoch 06-07-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** EU-Parlament beschließt Cybersicherheitsgesetz mit Meldepflicht ***
---------------------------------------------
Die europäischen Abgeordneten haben den lange umstrittenen Richtlinienentwurf zur Netz- und Informationssicherheit verabschiedet. Damit kommen auf größere Online-Anbieter und Betreiber kritischer Infrastrukturen Auflagen zu.
---------------------------------------------
http://heise.de/-3258129
*** Encryption Bypass Vulnerability Impacts Half of Android Devices ***
---------------------------------------------
More than half of Android devices are vulnerable to encryption bypass attack, say researchers.
---------------------------------------------
http://threatpost.com/encryption-bypass-vulnerability-impacts-half-of-andro…
*** Nasty BIOS bug slugs Gigabyte, hackers say ***
---------------------------------------------
Vendors queue for punishment as ThinkPwn fallout spreads Gigabyte has been swept into turmoil surrounding low-level security vulnerabilities that allows attackers to kill flash protection, secure boot, and tamper with firmware on PCs by Lenovo and other vendors.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/07/06/nasty_bios_…
*** HP sichert Router gegen Fremdzugriffe ab ***
---------------------------------------------
Hewlett Packard Enterprise versorgt einige Netzwerk-Produkte mit Sicherheitsupdates für zum Teil zwei Jahre alten Lücken.
---------------------------------------------
http://heise.de/-3256913
*** Security Advisory - Multiple Vulnerabilities in OpenSSL in May 2016 ***
---------------------------------------------
CVE-2016-2108, CVE-2016-2107, CVE-2016-2106, CVE-2016-2105, CVE-2016-2109, CVE-2016-2176
Huawei has released software updates to fix this vulnerability.
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20160706-…
*** Android-App verrät auch WLAN-Passwörter von A1-Routern ***
---------------------------------------------
Mit der Android-App RouterKeygen lassen sich auch WLAN-Passwörter von A1-Routern auslesen. Betroffen sind alte Router-Modelle aus dem Jahr 2011.
---------------------------------------------
http://futurezone.at/digital-life/android-app-verraet-auch-wlan-passwoerter…
*** Rexroth Bosch BLADEcontrol-WebVIS Vulnerabilities ***
---------------------------------------------
This advisory provides mitigation details for an SQL injection vulnerability and a cross-site scripting vulnerability in the Rexroth Bosch BLADEcontrol-WebVIS.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-187-01
*** "Elanor": Getarnte Mac-Malware stiehlt Daten und steuert Webcam ***
---------------------------------------------
Backdoor verbirgt sich in Fake-App "EasyDoc", die auf Download-Seiten angeboten wird
---------------------------------------------
http://derstandard.at/2000040542729
*** Cisco Prime Infrastructure Administrative Web Interface HTML Injection Vulnerability ***
---------------------------------------------
A vulnerability in the administrative web interface of Cisco Prime Infrastructure (PI) could allow an authenticated, remote attacker to execute arbitrary commands on the affected system and on the devices managed by the system. ...
Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: IBM SDK for Node.js may be affected by CVE-2016-1669 ***
http://www.ibm.com/support/docview.wss?uid=swg21986383
---------------------------------------------
*** IBM Security Bulletin: IBM SDK for Node.js may be affected by CVE-2014-9748 ***
http://www.ibm.com/support/docview.wss?uid=swg21986384
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in ntp affects IBM Integrated Management Module II (IMM2) for System x, Flex and BladeCenter systems (CVE-2015-5219) ***
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099409
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail Security Affected By Multiple Open Source NTP Vulnerabilities. ***
http://www-01.ibm.com/support/docview.wss?uid=swg21986167
---------------------------------------------
*** IBM Security Bulletin: Lotus Mail Security Affected By Multiple Open Source XMLsoft Libxml2 Vulnerabilities (CVE-2016-4447, CVE-2016-4448, CVE-2016-4449) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21986391
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in the Apache Xerces-C XML parser affects IBM Cognos Metrics Manager (CVE-2016-0729) ***
http://www.ibm.com/support/docview.wss?uid=swg21986259
---------------------------------------------
*** IBM Security Bulletin: Content Manager OnDemand for Multiplatforms is affected by Open Source Apache Xerces-C XML parser Vulnerabilities (CVE-2016-0729) ***
http://www.ibm.com/support/docview.wss?uid=swg21985363
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in OpenSSL affects IBM Cognos Metrics Manager (CVE-2016-2106, CVE-2016-2107, CVE-2016-2108) ***
http://www.ibm.com/support/docview.wss?uid=swg21977114
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Security Virtual Server Protection for VMware (CVE-2016-2176) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21986313
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM Sterling Connect:Express for Unix ***
http://www-01.ibm.com/support/docview.wss?uid=swg21986123
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 04-07-2016 18:00 − Dienstag 05-07-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** EU: 450 Millonen Euro für Cyberkriminalitäts-Forschung ***
---------------------------------------------
Im Kampf gegen Cyberkriminalität will die EU-Kommission bis 2020 insgesamt 450 Millionen Euro an Forschungsausgaben bereitstellen.
---------------------------------------------
http://futurezone.at/digital-life/eu-450-millonen-euro-fuer-cyberkriminalit…
*** Word hole patched in 2012 is unchallenged king of Office exploits ***
---------------------------------------------
Its 2016, people, even the pirates have patched Possibly the most exploited unchallenged Microsoft Office vulnerability of the last decade was found and patched in 2012.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/07/05/magento_vul…
*** Getting ready for the European Cyber Security Month (ECSM) ***
---------------------------------------------
ENISA together with the European Commission and its partners are preparing for this year's cyber security month running across the EU during October, focusing each week on a different topic.
---------------------------------------------
https://www.enisa.europa.eu/news/enisa-news/getting-ready-for-the-european-…
*** Emulating and Exploiting Firmware binaries - Offensive IoT Exploitation series ***
---------------------------------------------
Welcome to the third post in the "Offensive IoT Exploitation" series. In the previous one, we learned about how we can get started with analyzing firmware and extracting file systems. In this post, we will take it a step further by analyzing individual binaries from firmware, and even exploiting commonly found vulnerabilities. There are two...
---------------------------------------------
http://resources.infosecinstitute.com/emulating-and-exploiting-firmware-bin…
*** Exploiting Format Strings: Getting the Shell ***
---------------------------------------------
In this article, we will have a look at how to exploit format String vulnerabilities to get a shell. Overview: In this article, we will briefly have a look at how to overwrite specific memory location, how to inject our shellcode in current memory of program and further overwrite the some desired memory address to...
---------------------------------------------
http://resources.infosecinstitute.com/exploiting-format-strings-getting-the…
*** 85 Millionen Android-Geräte von HummingBad-Malware befallen ***
---------------------------------------------
HummingBad rootet Geräte und klickt auf Werbebanner, warnen Sicherheitsforscher. Das bringe den Kriminellen 300.000 US-Dollar im Monat ein. In Deutschland sollen zehntausende Geräte infiziert sein.
---------------------------------------------
http://heise.de/-3254664
*** SSD Advisory - Wget Arbitrary Commands Execution ***
---------------------------------------------
A vulnerability in the way wget handles redirects allows attackers that are able to hijack a connection initiated by wget or compromise a server from which wget is downloading files from, would allow them to cause the user running wget to execute arbitrary commands.
---------------------------------------------
https://blogs.securiteam.com/index.php/archives/2701
*** Paper: New Keylogger on the Block ***
---------------------------------------------
In a new paper published by Virus Bulletin, Sophos researcher Gabor Szappanos takes a look at the KeyBase keylogger, sold as a commercial product and popular among cybercriminals who use it in Office exploit kits. Read more...
---------------------------------------------
https://www.virusbulletin.com/blog/2016/07/paper-new-keylogger-block/
*** Lenovo ThinkPwn UEFI exploit also affects products from other vendors ***
---------------------------------------------
A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors, including HP and Gigabyte Technology.An exploit for the vulnerability was published last week and can be used to execute rogue code in the CPUs privileged SMM (System Management Mode).This level of access can then be used to install a stealthy rootkit inside the computers Unified Extensible Firmware Interface (UEFI) -- the modern BIOS -- or...
---------------------------------------------
http://www.csoonline.com/article/3091753/security/lenovo-thinkpwn-uefi-expl…
*** Apache Update: TLS Certificate Authentication Bypass with HTTP/2 (CVE-2016-4979), (Tue, Jul 5th) ***
---------------------------------------------
Apache released an important update today to fix a vulnerability that affects servers that have http/2 enabled and use TLS client certificates for authentication. Apache 2.4.18-20 are vulnerable if: - TLS certificates are used for authenticating clients (look for the SSLVerifyClient require directive in your configuration file) - http/2 is enabled. (see if the Protocols line includes h2 and/or h2c).">tshark -Y ssl.handshake.extensions_alpn_str == h2 -n -i en0 \ -T fields -e ip.src -e...
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21223&rss
*** Unechte Amazon-Nachricht: Rechnung uber Ihre Verkaeufergebuehren ***
---------------------------------------------
Kriminelle versenden vermeintliche Amazon-Benachrichtigungen. Darin behaupten sie, dass eine Steuerrechnung verfügbar sei. Interessenten, die diese einsehen wollen, sollen einen Dateianhang öffnen und ihre persönlichen Zugangsdaten bekannt geben. Dabei handelt es sich um einen Datendiebstahlsversuch.
---------------------------------------------
https://www.watchlist-internet.at/phishing/unechte-amazon-nachricht-rechnun…
*** (Windows) Syslog Server "npriority" field remote Denial of Service vulnerability ***
---------------------------------------------
Bug Description: Syslog Server 1.2.3 is a free syslog server for Windows systems. The syslog server cannot handle the content of the npriority field well, whereupon the server may be collapsed by receiving a customized packet.
---------------------------------------------
http://www.securityfocus.com/archive/1/538836
*** VU#690343: Acer Portal app for Android does not properly validate SSL certificates ***
---------------------------------------------
Vulnerability Note VU#690343 Acer Portal app for Android does not properly validate SSL certificates Original Release date: 05 Jul 2016 | Last revised: 05 Jul 2016 Overview The Acer Portal app for Android allows customers to connect to the Acer Cloud. The Acer Portal app, from version 3.9.3.2003 to 3.9.3.2006, does not properly validate SSL certificates when connecting to the Acer Cloud. Description CVE-2016-5648 - CWE-295: Improper Certificate ValidationThe Acer Portal app for Android, from
---------------------------------------------
http://www.kb.cert.org/vuls/id/690343
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM Workload Scheduler (CVE-2016-2108, CVE-2016-2107, CVE-2016-2105, CVE-2016-2106, CVE-2016-2109, CVE-2016-2176) ***
http://www.ibm.com/support/docview.wss?uid=swg21985850
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL affect IBM Tivoli Netcool/Reporter ***
http://www-01.ibm.com/support/docview.wss?uid=swg21986007
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in Firefox affect IBM SmartCloud Provisioning for IBM Software Virtual Appliance ***
http://www.ibm.com/support/docview.wss?uid=swg2C1000114
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in NPM affects IBM API Connect (CVE-2016-3956, CVE-2016-2537, CVE-2016-2515) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21986144
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 01-07-2016 18:00 − Montag 04-07-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
*** Spotlight: WPBeginner's Approach to WordPress Security ***
---------------------------------------------
WPBeginner offers tutorials, tips, and tricks for WordPress beginners to improve their sites. With over 150K Twitter followers and almost 10 million monthly visitors, the website is undeniably popular. The high-quality content provided by WPBeginner helps WordPress users make better decisions and gain awareness of their options. Using research and thought leadership, WPBeginner offers guidance...
---------------------------------------------
https://blog.sucuri.net/2016/07/spotlight-wpbeginner-website-security.html
*** SQLite developers need to push the patch ***
---------------------------------------------
Tempfile permissions a can of worms SQLite has pushed out an update to fix a local tempfile bug, to address concerns that the bug could be exploitable beyond the merely local.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/07/04/sqlite_deve…
*** Verschlüsselung: Sicherheitslücke bei Start Encrypt ***
---------------------------------------------
Sicherheitsforscher haben im Client der Lets Encrypt-Alternative Start Encrypt zahlreiche Probleme gefunden, die die Ausstellung gültiger Zertifikate für beliebige URLs ermöglichte. Der Client hatte zudem zahlreiche weitere Probleme, die jetzt behoben sein sollen.
---------------------------------------------
http://www.golem.de/news/verschluesselung-sicherheitsluecke-bei-start-encry…
*** Zero-Day-Sicherheitslücke gefährdet Lenovo-Notebooks ***
---------------------------------------------
Durch eine schwerwiegende Zero-Day-Lücke in der Firmware von Lenovos Thinkpads kann unter Umständen beliebiger Programmcode auf dem System ausgeführt werden.
---------------------------------------------
http://futurezone.at/produkte/zero-day-sicherheitsluecke-gefaehrdet-lenovo-…
*** Gratis-Tools entschlüsseln Erpressungstrojaner ***
---------------------------------------------
Der Sicherheitssoftware-Hersteller AVG stellt kostenlose Werkzeuge zur Verfügung, mit denen man sich gegen diverse Verschlüsselungstrojaner wehren kann.
---------------------------------------------
http://futurezone.at/digital-life/gratis-tools-entschluesseln-erpressungstr…
*** Großes Sicherheits-Update für Foxit Reader und Phantom ***
---------------------------------------------
In dem PDF-Anzeigeprogramm Foxit Reader klaffen kritische Sicherheitslöcher, die das Update auf Version 8.0 stopft. Ebenfalls betroffen ist der PDF-Editor Phantom.
---------------------------------------------
http://heise.de/-3253936
*** UPC UBEE EVW3226 WPA2 Password Reverse Engineering ***
---------------------------------------------
TL;DR: We reversed default WPA2 password generation routine for UPC UBEE EVW3226 router. This blog contains firmware analysis, reversing writeup, function statistical analysis and proof-of-concept generator.
---------------------------------------------
https://deadcode.me/blog/2016/07/01/UPC-UBEE-EVW3226-WPA2-Reversing.html
*** Security Alert: Adwind RAT Spotted in Targeted Attacks with Zero AV Detection ***
---------------------------------------------
The malware economy is alive and well! And cyber criminals are making big money by using this business model. The re-emergence of Adwind RAT provides additional proof to support this. This Java-based malware has been spotted over the weekend in several targeted attacks against Danish companies. Given that the malicious email employed to deceive victims...
---------------------------------------------
https://heimdalsecurity.com/blog/security-alert-adwind-rat-targeted-attacks…
*** Bugtraq: HTTP session poisoning in EMC Documentum WDK-based applications causes arbitrary code execution and privilege elevation ***
---------------------------------------------
http://www.securityfocus.com/archive/1/538819
*** DSA-3613 libvirt - security update ***
---------------------------------------------
Vivian Zhang and Christoph Anton Mitterer discovered that setting anempty VNC password does not work as documented in Libvirt, avirtualisation abstraction library. When the password on a VNC server isset to the empty string, authentication on the VNC server will bedisabled, allowing any user to connect, despite the documentationdeclaring that setting an empty password for the VNC server prevents allclient connections. With this update the behaviour is enforced bysetting the password expiration
---------------------------------------------
https://www.debian.org/security/2016/dsa-3613
*** DSA-3614 tomcat7 - security update ***
---------------------------------------------
The TERASOLUNA Framework Development Team discovered a denial of servicevulnerability in Apache Commons FileUpload, a package to make iteasy to add robust, high-performance, file upload capability to servletsand web applications. A remote attacker can take advantage of this flawby sending file upload requests that cause the HTTP server using theApache Commons Fileupload library to become unresponsive, preventing theserver from servicing other requests.
---------------------------------------------
https://www.debian.org/security/2016/dsa-3614
*** Sierra Wireless AirLink Raven XE and XT Gateway Vulnerabilities ***
---------------------------------------------
NCCIC/ICS-CERT is aware of a public report of three vulnerabilities affecting the Sierra Wireless AirLink Raven XE and XT gateways. According to this report, the affected products allow unauthenticated access to directories on the system, which may allow remote file upload, download, and system reboot.
---------------------------------------------
https://ics-cert.us-cert.gov/alerts/ICS-ALERT-16-182-01
*** ZDI-16-405: Trihedral VTScada Path Out-Of-Bounds Indexing Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trihedral VTScada. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-16-405/
*** ZDI-16-404: Trihedral VTScada Filter Bypass Information Disclosure Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trihedral VTScada. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-16-404/
*** ZDI-16-403: Trihedral VTScada Directory Traversal Information Disclosure Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trihedral VTScada. Authentication is not required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-16-403/
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: : Multiple Vulnerabilities in OpenSSL affect IBM Security Guardium ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984609
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in IBM Java SDK affect IBM Notes Standard Client ***
http://www-01.ibm.com/support/docview.wss?uid=swg21983686
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Sterling Control Center (CVE-2016-3427 and CVE-2016-3426) ***
http://www.ibm.com/support/docview.wss?uid=swg21986174
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime Version 7 affect IBM Content Collector for SAP Applications (CVE-2016-3426 CVE-2016-0264) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985957
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Security Guardium ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985729
---------------------------------------------
*** IBM Security Bulletin: IBM Sterling Connect:Direct FTP+ for Windows installers are vulnerable to attack (CVE-2016-4560) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21982722
---------------------------------------------
*** IBM Security Bulletin: OpenSource Oracle MySQL Vulnerability affects IBM Security Guardium (CVE-2016-2047) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984605
---------------------------------------------
*** IBM Security Bulletin: : Vulnerabilities in OpenSSL affect IBM Security Guardium (CVE-2015-3197) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984601
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 30-06-2016 18:00 − Freitag 01-07-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** F5: Security Advisory: GraphicsMagick vulnerability CVE-2016-5118 ***
---------------------------------------------
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename. (CVE-2016-5118)
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/82/sol82747025.html?…
*** The Types of Penetration Testing ***
---------------------------------------------
Black Box/White Box/Gray Box Testing
Red/Blue/Purple Teams
---------------------------------------------
http://resources.infosecinstitute.com/the-types-of-penetration-testing/
*** Apache Xerces DTD Parsing Stack Overflow Lets Remote Users Cause the Target Application to Crash ***
---------------------------------------------
Apache Xerces DTD Parsing Stack Overflow Lets Remote Users Cause the Target Application to Crash
---------------------------------------------
http://www.securitytracker.com/id/1036211
*** Eaton ELCSoft Programming Software Memory Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation details for a heap-based memory corruption vulnerability and a stack buffer overflow vulnerability in Eaton's ELCSoft programming software.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-182-01
*** Sofortmaßnahmen für Unternehmen bei Cyberangriffen ***
---------------------------------------------
Die ersten 72 Stunden nach einem Cyber-Angriff können für die Rechtsverfolgung entscheidend sein, erklärten Wolf Theiss-Rechtsexperten vor Journalisten.
---------------------------------------------
http://futurezone.at/b2b/sofortmassnahmen-fuer-unternehmen-bei-cyberangriff…
*** SSA-444217 (Last Update 2016-06-30): Information Disclosure Vulnerabilities in SICAM PAS ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217…
*** SSA-547990 (Last Update 2016-06-30): Information Disclosure Vulnerabilities in SIPROTEC 4 and SIPROTEC Compact ***
---------------------------------------------
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-547990…
*** Security Advisory 2016-01: Security Update for OTRS FAQ package ***
---------------------------------------------
An attacker could access and manipulate the database with an HTTP request.
---------------------------------------------
https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-pac…
*** Cracking Androids full-disk encryption is easy on millions of phones - with a little patience ***
---------------------------------------------
Just need a couple of common bugs, some GPUs and time Androids full-disk encryption on millions of devices can be cracked by brute-force much more easily than expected - and theres working code to prove it.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/07/01/turns_out_b…
*** Joomla com_smartformer 2.4.1 Shell Upload ***
---------------------------------------------
* @package SmartFormer
* @version 2.4.1 (J1.5 security fix)
poc:
1 - choose a site and open it
2 - Upload shell.php
3 - Go to :/components/com_smartformer/files/shell.php
---------------------------------------------
https://cxsecurity.com/issue/WLB-2016070002
*** Process Hallowing ***
---------------------------------------------
In this article, we will learn what process hallowing is, how is it done, and how we can detect it while performing memory analysis.
---------------------------------------------
http://resources.infosecinstitute.com/process-hallowing/
*** Exploiting Format Strings (Part 1) ***
---------------------------------------------
Overview : In this article, we will learn what Format String Vulnerabilities is, how we exploit it to read specific values from the stack, further we will also have a look at how we can use different format specifiers to write arbitrary values to the stack.
---------------------------------------------
http://resources.infosecinstitute.com/exploiting-format-strings-part-1/
*** UEFAs Euro 2016 app is airing football fans' privates in public ***
---------------------------------------------
Offside! Lack of encryption bares usernames, passwords and more The official UEFA Euro 2016 app is leaking football fans' personal data, security researchers warn.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/07/01/euro_2016_a…
*** Cracking Locky's New Anti-Sandbox Technique ***
---------------------------------------------
This new trick may pose challenges for automated Locky tracking systems that utilize sandboxing due to the following considerations: New Locky binaries will not execute properly without the correct parameter. JavaScript downloaders may fail to download if the download locations are already down.
---------------------------------------------
https://blog.fortinet.com/2016/06/30/cracking-locky-s-new-anti-sandbox-tech…
*** Magento Re-Installation & Account Hijacking Vulnerabilities ***
---------------------------------------------
Before discovering my latest Magento RCE, I've found two different vulnerabilities, both resulting in the complete compromise of customer data and/or the server. As they are far less complicated, I'm presenting both of them in this single blog post for your convenience. Vulnerable Versions: Magento EE & CE 2.x.x before 2.0.6.
---------------------------------------------
http://netanelrub.in/2016/07/01/magento-re-installation-account-hijacking-v…
*** F5: Security Advisory: Cross Site Scripting (XSS) vulnerability in F5 WebSafe Dashboard CVE-2016-5235 ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/48/sol48572812.html?…
*** A year of Windows kernel font fuzzing #2: the techniques ***
---------------------------------------------
Posted by Mateusz Jurczyk of Google Project ZeroIn part #1 of the series (see here), we discussed the motivation and outcomes of our year long fuzzing effort against the Windows kernel font engine, followed by an analysis of two bug collisions with Keen Team and Hacking Team that ensued as a result of this work. While the bugs themselves are surely amusing, what we find even more interesting are the techniques and decisions we made to make the project as effective as it turned out to be.
---------------------------------------------
http://googleprojectzero.blogspot.com/2016/07/a-year-of-windows-kernel-font…
*** Cisco Configuration Assistant Request Processing Unauthorized Access Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Lotus Protector for Mail Security Affected By Multiple Open Source PHP Vulnerabilities. ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985802
---------------------------------------------
*** IBM Security Bulletin: Cross-site Request Forgery (CSRF) security vulnerability in IBM WebSphere Commerce (CVE-2016-2863) ***
http://www.ibm.com/support/docview.wss?uid=swg21983626
---------------------------------------------
*** IBM Security Bulletin: HTTP response splitting attack in FastBack for Workstations Central Administration Console (CVE-2016-0359) ***
http://www.ibm.com/support/docview.wss?uid=swg21986310
---------------------------------------------
*** IBM Security Bulletin: InstallAnywhere Vulnerability affects Daeja ViewONE Professional, Standard & Virtual (CVE-2016-4560) ***
http://www.ibm.com/support/docview.wss?uid=swg21984799
---------------------------------------------
*** IBM Security Bulletin: OpenSource Apache Taglibs Vulnerability in FastBack for Workstations Central Administration Console (CVE-2015-0254) ***
http://www.ibm.com/support/docview.wss?uid=swg21986309
---------------------------------------------
*** IBM Security Bulletin: IBM Cognos Business Intelligence Server 2016Q2 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities. ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984323
---------------------------------------------
*** IBM Security Bulletin: Vulnerability in Open Source GNU glibc affects IBM OS Images for Red Hat Linux Systems. (CVE-2015-5277) ***
http://www.ibm.com/support/docview.wss?uid=swg21986400
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 28-06-2016 18:00 − Mittwoch 29-06-2016 18:00
Handler: Alexander Riepl
Co-Handler: Robert Waldner
*** How Red Hat uses CVSSv3 to Assist in Rating Flaws ***
---------------------------------------------
Humans have been measuring risk since the dawn of time. "Im hungry, do I go outside my awesome cave here and forage for food? There might be something bigger, scarier, and hungrier than me out there...maybe I should wait?" Successfully navigating through life is a series of Risk/Reward calculations made each and every day. Sometimes, ideally, the choices are small ("Do I want fries with that?") while others can lead to catastrophic outcomes if the scenario isnt fully
---------------------------------------------
https://access.redhat.com/blogs/766093/posts/CVSSv3
*** How to Compromise the Enterprise Endpoint ***
---------------------------------------------
Posted by Tavis Ormandy.Symantec is a popular vendor in the enterprise security market, their flagship product is Symantec Endpoint Protection. They sell various products using the same core engine in several markets, including a consumer version under the Norton brand. Today we're publishing details of multiple critical vulnerabilities that we discovered, including many wormable remote code execution flaws.These vulnerabilities are as bad as it gets.
---------------------------------------------
http://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-…
*** E-Mail-Verschlüsselung für jedermann: Volksverschlüsselung steht bereit ***
---------------------------------------------
Ab sofort können Windows-Nutzer die kostenlose Volksverschlüsselungs-Software nutzen, um E-Mails verschlüsselt über gängige Clients zu verschicken.
---------------------------------------------
http://heise.de/-3250728
*** Europäisches Konsortium für cloud-basierte Unterschriften und Siegel gegründet ***
---------------------------------------------
Zum Start der eIDAS-Verordnung haben euopäische Signatur-Dienstleister auf Initiative von Adobe das Cloud Signature Consortium (CSC) gegründet. Es soll einen offenen Standard für cloud-basierte Signaturen und Siegel erarbeiten.
---------------------------------------------
http://heise.de/-3250807
*** Malware gibt sich als WhatsApp aus und stiehlt Daten ***
---------------------------------------------
Auch andere Android-Apps wie Uber oder der Google Play Store wird von der Schadsoftware imitiert, um Kreditkartendaten zu erbeuten.
---------------------------------------------
http://futurezone.at/digital-life/malware-gibt-sich-als-whatsapp-aus-und-st…
*** Home security systems hacked with 1234 password - Update ***
---------------------------------------------
Many smart home security systems come with standard passwords. Potential intruders can deactivate them online and use them to spy on homes - the affected systems are in use in many countries globally.
---------------------------------------------
http://www.heise.de/ct/artikel/Home-security-systems-hacked-with-1234-passw…
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: WebSphere Application Server Liberty API Discovery feature has potential vulnerability (CVE-2016-2945) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984502
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in OpenSSL affect Power Hardware Management Console (CVE-2016-2108, CVE-2016-2107, CVE-2016-2105, CVE-2016-2106, CVE-2016-2109) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021361
---------------------------------------------
*** IBM Security Bulletin: Vulnerabilities in java affect Power Hardware Management Console (CVE-2016-3426 ) ***
http://www.ibm.com/support/docview.wss?uid=nas8N1021385
---------------------------------------------
*** IBM Security Bulletin: Cross Site Scripting (XSS) security vulnerabilities in IBM WebSphere Commerce (CVE-2016-2862) ***
http://www.ibm.com/support/docview.wss?uid=swg21983625
---------------------------------------------
*** IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Tivoli Storage Productivity Center (CVE-2016-0363) ***
http://www.ibm.com/support/docview.wss?uid=swg21986168
---------------------------------------------
*** IBM Security Bulletin: A vulnerability in Open Source BeanShell has been addressed by IBM Kenexa LCMS Premier (CVE-2016-2510) ***
http://www.ibm.com/support/docview.wss?uid=swg21985108
---------------------------------------------
*** IBM Security Bulletin: IBM Tealeaf Customer Experience installers vulnerable to attack (CVE-2016-2542) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21981024
---------------------------------------------
*** IBM Security Bulletin: Security Bulletin: Vulnerabilities in Ruby on Rails affect IBM License Metric Tool v9, IBM BigFix Inventory v9 and IBM Endpoint Manager for Software Use Analysis v9 & v2.2 ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985099
---------------------------------------------
*** Security Bulletin: Vulnerabilities in OpenSSL affect Power Hardware Management Console (CVE-2016-2108, CVE-2016-2107, CVE-2016-2105, CVE-2016-2106, CVE-2016-2109) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021361
---------------------------------------------
*** Security Bulletin: Vulnerabilities in java affect Power Hardware Management Console (CVE-2016-3426 ) ***
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021385
---------------------------------------------
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 27-06-2016 18:00 − Dienstag 28-06-2016 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Reverse Engineering Malware ***
---------------------------------------------
The AlienVault Labs team does a lot of malware analysis as a part of their security research. I interviewed a couple members of our Labs team, including Patrick Snyder, Eddie Lee, Peter Ewane and Krishna Kona, to learn more about how they do it. Here are some of the approaches and tools and ..
---------------------------------------------
https://www.alienvault.com/blogs/labs-research/reverse-engineering-malware
*** A year of Windows kernel font fuzzing #1: the results ***
---------------------------------------------
Post by Mateusz Jurczyk of Google Project ZeroThis post series is about how we used at-scale fuzzing to discover and report a total of 16 vulnerabilities in the handling of TrueType and OpenType fonts in the Windows kernel during the ..
---------------------------------------------
http://googleprojectzero.blogspot.com/2016/06/a-year-of-windows-kernel-font…
*** Scientology Seeks Captive Converts Via Google Maps, Drug Rehab Centers ***
---------------------------------------------
Fake online reviews generated by unscrupulous marketers blanket the Internet these days. Although online review pollution isnt exactly a hot-button consumer issue, there are plenty of cases in which phony reviews may endanger ones life or ..
---------------------------------------------
http://krebsonsecurity.com/2016/06/scientology-seeks-captive-converts-via-g…
*** Large CCTV Botnet Leveraged in DDoS Attacks ***
---------------------------------------------
Our security operations team investigate and mitigate multiple denial of service (DDoS) attacks every single day. One recent case caught our attention because of the ..
---------------------------------------------
https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.ht…
*** DDoS Extortion - Almost Universally an Empty Threat ***
---------------------------------------------
Last year there was an emergence of threats of DDoS against financial websites (that eventually broadened to others) under the DD4BC moniker. Eventually that morphed into Armada Collective with both stopping around ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21199
*** Nuclear goes boom ***
---------------------------------------------
Silver medallist exploit kit dies alongside Angler as new top dog doubles rental price Shake ups at the top of the exploit kit world continue, with news the worlds two top pop boxes have disappeared.
---------------------------------------------
www.theregister.co.uk/2016/06/28/nuclear_goes_boom/
*** The Latest Android Overlay Malware Spreading via SMS Phishing in Europe ***
---------------------------------------------
https://www.fireeye.com/blog/threat-research/2016/06/latest-android-overlay…
*** Locky-Sprössling: Erpressungs-Trojaner Bart verschlüsselt anders und verlangt hohes Lösegeld ***
---------------------------------------------
Sicherheitsforscher beobachteten bei der Ransomware Bart eine neue Methode, Daten als Geisel zu nehmen.
---------------------------------------------
http://heise.de/-3250058
*** Cybersicherheit: "Sehr viel Wissen wird nicht umgesetzt" ***
---------------------------------------------
Beim Start-up-Wettbewerb Security Rockstars werden innovative Sicherheitslösungen gesucht. Einreichungen sind noch bis zum 15. Juli möglich.
---------------------------------------------
http://futurezone.at/thema/start-ups/cybersicherheit-sehr-viel-wissen-wird-…
*** Verschlüsselungs-Trojaner verleibt sich Zimbra-Mails ein ***
---------------------------------------------
Die Schädling ZimbraCryptor infiziert die Zimbra Collaboration Suite und verschlüsselt alle Daten im E-Mail-Ordner. Dafür muss sich ein Angreifer aber in einen Zimbra-Server hacken.
---------------------------------------------
http://heise.de/-3250331
*** Press conference with Minister of Interior Wolfgang Sobotka, KSÖ and SBA: Security Rockstars ***
---------------------------------------------
Er hoffe auf “frische und unkonventionelle Herangehensweisen an Cybersicherheitsthemen, sagte Innenminister Wolfgang Sobotka (ÖVP) am Mittwoch bei einem Pressegespräch ..
---------------------------------------------
https://www.sba-research.org/2016/06/28/pressegesprach/
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 24-06-2016 18:00 − Montag 27-06-2016 18:00
Handler: Stephan Richter
Co-Handler: Alexander Riepl
*** Economical With The Truth: Making DNSSEC Answers Cheap ***
---------------------------------------------
We launched DNSSEC late last year and are already signing 56.9 billion DNS record sets per day. At this scale, we care a great deal about compute cost. One of the ways we ..
---------------------------------------------
https://blog.cloudflare.com/black-lies/
*** Security Advisory: Multiple Wireshark (tshark) vulnerabilities ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/87/sol87669052.html
*** Security Advisory: Multiple Wireshark (tshark) vulnerabilities ***
---------------------------------------------
https://support.f5.com:443/kb/en-us/solutions/public/k/01/sol01837042.html
*** Option CloudGate Insecure Direct Object References Authorization Bypass ***
---------------------------------------------
Insecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass ..
---------------------------------------------
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5333.php
*** Bart - a new Ransomware ***
---------------------------------------------
Phishme is reporting the discovery of a new ransomwarewhich its creators have named Bart. Bart shares several commonalities with the Locky ransomware. Bart is delivered by thesame downloader, RockLoader. The payment ..
---------------------------------------------
https://isc.sans.edu/diary.html?storyid=21195
*** Zwei populäre Exploit-Kits schlagartig verschwunden ***
---------------------------------------------
Sicherheitsforscher haben seit mehreren Wochen keine Aktivitäten mehr durch die vormals bei Cyber-Ganoven beliebten Exploit-Kits Angler und Nuclear festgestellt.
---------------------------------------------
http://heise.de/-3248999
*** How executives really feel about infosec reports ***
---------------------------------------------
More than half of IT and security executives will lose their jobs as a result of failing to provide useful, actionable information. While the majority of board members say they understand everything they�re being told by IT and security ..
---------------------------------------------
https://www.helpnetsecurity.com/2016/06/27/executives-infosec-reports/
*** Hackers peer into Uber passenger privates, find and plot trips on maps ***
---------------------------------------------
Brute force efforts reveal 1000 discount codes Three hackers have found eight holes in Uber that could allow fake drivers to be created and user email addresses reveal, ..
---------------------------------------------
www.theregister.co.uk/2016/06/27/hackers_peer_into_uber_passenger_privates_…
*** Annual FiRST Conference Wrap-up ***
---------------------------------------------
The 28th FiRST security event was held in - the land of morning calms' capital, Seoul this past June 12-17, 2016. This is the yearly conference for all CERT ..
---------------------------------------------
https://blog.fortinet.com/2016/06/23/annual-first-conference-wrap-up
*** The Threatening Evolution of Exploit Kits ***
---------------------------------------------
Exploit Kits, even more sophisticated and profitable Exploit kits are rapidly evolving, threat actors improve them on a daily basis by adding the code for the exploitation of the most recent vulnerabilities. In October 2015, ..
---------------------------------------------
http://resources.infosecinstitute.com/the-threatening-evolution-of-exploit-…
*** Unechte PayLife-Mail: Verdacht auf Ihre letzte Transaktion ***
---------------------------------------------
Mit einer unechten Benachrichtigung von PayLife versuchen Kriminelle, an Kontoinformationen von Opfern zu gelangen. Um das Ziel zu erreichen, behaupten sie, dass es bei der letzten PayLife-Transaktion zu Unstimmigkeiten gekommen sei. Aus ..
---------------------------------------------
https://www.watchlist-internet.at/phishing/unechte-paylife-mail-verdacht-au…
*** EU finanziert Code-Review: Open-Source-Projekte gesucht ***
---------------------------------------------
Mit einem Pilotprojekt will die EU die IT-Sicherheit verbessern. Nun sind die Nutzer gefragt: Welches Open Souce-Projekt sollte einen Sicherheits-Check bekommen?
---------------------------------------------
http://heise.de/-3249615
*** How to Backdoor Diffie-Hellman ***
---------------------------------------------
Abstract: Lately, several backdoors in cryptographic constructions, protocols and implementations have been surfacing in the wild: Dual-EC in RSAs B-Safe product, a modified Dual-EC in Junipers operating system ScreenOS and a ..
---------------------------------------------
https://eprint.iacr.org/2016/644
*** The Curious Case of an Unknown Trojan Targeting German-Speaking Users ***
---------------------------------------------
Last week, an unidentified malware was discovered and circulated on Twitter by researcher @JAMES_MHT. Many researchers - including us - were unable to identify the malware so we decided to dig a bit further. In this post, ..
---------------------------------------------
https://blog.fortinet.com/2016/06/21/the-curious-case-of-an-unknown-trojan-…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 23-06-2016 18:00 − Freitag 24-06-2016 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** Crypto Wars: Neue Bundesbehörde soll Verschlüsselung knacken ***
---------------------------------------------
Immer mehr Kommunikationsdienste verschlüsseln Nachrichten und schützen sie vor fremden Zugriffen. Die Bundesregierung will dem offenbar nicht tatenlos zusehen und eine Behörde mit dem Knacken der Kryptographie beauftragen.
---------------------------------------------
http://heise.de/-3247957
*** PCI Compliance for eCommerce – Choosing Between SAQ A and A-EP ***
---------------------------------------------
The Payment Card Industry Data Security Standards (PCI DSS) is a set of security standards established in a joint venture between a number of the top credit card issuers in the world – Visa, MasterCard, American Express, ..
---------------------------------------------
https://blog.sucuri.net/2016/06/navigating-pci-self-assessment-questionnair…
*** How to: Testing Android Application Security, Part 2 ***
---------------------------------------------
The popularity of Android devices and applications makes it a target for malware and other threats. This post is the second in a short series on Android ..
---------------------------------------------
https://blogs.mcafee.com/mcafee-labs/testing-android-application-security-p…
*** Necurs Botnet is Back, Updated With Smarter Locky Variant ***
---------------------------------------------
After a mysterious three weeks off the grid, Necurs has returned to spewing massive volumes of email containing improved versions of the potent Locky ransomware and Dridex banking Trojan.
---------------------------------------------
http://threatpost.com/necurs-botnet-is-back-updated-with-smarter-locky-vari…
*** Rockwell Automation Allen-Bradley Stratix 5400 and 5410 Packet Corruption Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a resource management vulnerability in Rockwell Automation’s Allen-Bradley Stratix 5400 and Allen-Bradley Stratix 5410 industrial networking switches.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-175-01
*** Unitronics VisiLogic OPLC IDE vlp File Parsing Stack Buffer Overflow Vulnerability ***
---------------------------------------------
This advisory contains mitigation details for a buffer overflow vulnerability in the Unitronics VisiLogic.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-175-02
*** Meinberg NTP Time Server Vulnerabilities ***
---------------------------------------------
This advisory contains mitigation details for a stack buffer overflow vulnerability and a privilege escalation vulnerability in Meinberg’s NTP Time Servers Interface.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03
*** About Lenovo Solution Center 3.3.002 Vulnerabilities (CVE-2016-5249) ***
---------------------------------------------
After patching set of issues reported by Trustwave SpiderLabs last month, Lenovo released another version of its Lenovo Solution Center software to address new security ..
---------------------------------------------
http://trustwave.com/Resources/SpiderLabs-Blog/About-Lenovo-Solution-Center…
*** Sicherheitslücke in Alarmanlagen von ABUS und Climax ***
---------------------------------------------
Vernetzte Alarmanlagen sollen für Sicherheit und mehr Bedienkomfort sorgen. Durch eine Sicherheitslücke können Angreifer jedoch auf viele Systeme zugreifen – übers Internet.
---------------------------------------------
http://heise.de/-3247868
*** WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting ***
---------------------------------------------
http://jvn.jp/en/jp/JVN55826471/
*** WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting ***
---------------------------------------------
http://jvn.jp/en/jp/JVN95082904/
*** WordPress plugin "Welcart e-Commerce" vulnerable to PHP object injection ***
---------------------------------------------
http://jvn.jp/en/jp/JVN47363774/
*** [2016-06-24] ASUS DSL-N55U cross site scripting and information disclosure vulnerability ***
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2016…
*** Erpressungs-Trojaner: Neue Locky-Welle infiziert Computer ***
---------------------------------------------
Wer dieser Tage eine E-Mail mit Dateianhang bekommt, sollte diese noch kritischer als sonst beäugen: Aktuell verbreitet sich der Verschlüsselungs-Trojaner Locky erneut vornehmlich über vermeintliche Bewerbungs-Mails in Deutschland.
---------------------------------------------
http://heise.de/-3248277
*** How to Spot Ingenico Self-Checkout Skimmers ***
---------------------------------------------
A KrebsOnSecurity story last month about credit card skimmers found in self-checkout lanes at some Walmart locations got picked up by quite a few publications. Since then Ive heard from several readers who work at retailers that use ..
---------------------------------------------
http://krebsonsecurity.com/2016/06/how-to-spot-ingenico-self-checkout-skimm…
*** Pretty Good Privacy: 40 Jahre Diffie-Hellman ***
---------------------------------------------
Am 23. Juni 1976 präsentierten Whitfield Diffie und Martin Hellman ihren Ansatz eines asymmetrischen Verschlüsselungsverfahren auf dem "Symposium on Information Theory" im schwedischen Ronneby.
---------------------------------------------
http://heise.de/-3248793
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 22-06-2016 18:00 − Donnerstag 23-06-2016 18:00
Handler: Alexander Riepl
Co-Handler: n/a
*** After Angler: Shift in Exploit Kit Landscape and New Crytpo-Ransomware Activity ***
---------------------------------------------
Early this year, we reported that in 2015, Angler came out as the top exploit kit, having contributed 59.5% in the total exploit kit activity for the year. Now, there's barely any pulse left.After the arrest of 50 people accused of using malware to steal US$25 million, it is interesting to ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/angler-shift-ek-…
*** ZDI-16-373: Trend Micro Deep Discovery hotfix_upload.cgi filename Remote Code Execution Vulnerability ***
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Deep Discovery. Authentication is required to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-16-373/
*** Fraudsters are Buying IPv4 Addresses ***
---------------------------------------------
IPv4 addresses are valuable, so criminals are figuring out how to buy or steal them.Hence criminals interest in ways to land themselves IP addresses, some of which were detailed this week by ARINs senior director of global registry knowledge, Leslie Nobile, at the North American Network Operators ..
---------------------------------------------
https://www.schneier.com/blog/archives/2016/06/fraudsters_are_.html
*** WordPress 4.5.3 release mends eight security flaws, 17 bugs ***
---------------------------------------------
WordPress has released version 4.5.3 of its content management system, fixing eight security vulnerabilities that surfaced in previous versions, as well as 17 other bugs.
---------------------------------------------
http://www.scmagazine.com/wordpress-453-release-mends-eight-security-flaws-…
*** Cisco Unified Contact Center Enterprise Web-Based Management Interface Cross-Site Scripting Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** Cisco Email Security Appliance .zip File Scanning Security Bypass Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-…
*** TLS Certificate Validation Vulnerability in Citrix iOS Receiver ***
---------------------------------------------
http://support.citrix.com/article/CTX213998
*** Rise of Darknet Stokes Fear of The Insider ***
---------------------------------------------
With the proliferation of shadowy black markets on the so-called "darknet" -- hidden crime bazaars that can only be accessed through special software that obscures ones true location online -- it has never been easier for disgruntled employees to harm their current or former employer. At least, this is the fear driving a growing stable of companies seeking technical solutions to detect would-be insiders.
---------------------------------------------
http://krebsonsecurity.com/2016/06/rise-of-darknet-stokes-fear-of-the-insid…
*** Linux Kernel ROP - Ropping your way to # (Part 2) ***
---------------------------------------------
Introduction In Part 1 of this tutorial, we have demonstrated how to find useful ROP gadgets and build a privilege escalation ROP chain for our test system (3.13.0-32 kernel - Ubuntu 12.04.5 LTS). We have also developed a vulnerable kernel ..
---------------------------------------------
https://www.trustwave.com/Resources/SpiderLabs-Blog/Linux-Kernel-ROP---Ropp…
*** Kritische Sicherheitslücken in libarchive gefährden FreeBSD & Co. ***
---------------------------------------------
Sicherheitsforscher entdecken drei schwerwiegende Sicherheitslücken in der Open-Source-Biblitohek libarchive. Patches stehen noch nicht nicht für alle Tools bereit, die auf libarchive setzen.
---------------------------------------------
http://heise.de/-3246535
*** Krypto-Trojaner Cerber: Angebliche Mediamarkt-Bestellung kommt Empfänger teuer zu stehen ***
---------------------------------------------
Online-Erpresser verschicken derzeit Mails, die vorgeben, dass ein bei Mediamarkt.de besteller Artikel in Kürze geliefert wird. Wer die Bestellung einsehen oder stornieren will, handelt sich einen Krypto-Trojaner ein.
---------------------------------------------
http://heise.de/-3246780
*** RFC 7905: ChaCha20-Verschlüsselung für TLS standardisiert ***
---------------------------------------------
Mit RFC 7905 gibt es nun eine Spezifikation, um den Verschlüsselungsalgorithmus ChaCha20 im Poly1305-Modus in TLS zu nutzen. Der von Dan Bernstein entwickelte Algorithmus ist insbesondere auf ..
---------------------------------------------
http://www.golem.de/news/rfc-7905-chacha20-verschluesselung-fuer-tls-standa…
*** Apple gibt erstmals Einblick in Kern von iPhone-Betriebssystem iOS10 ***
---------------------------------------------
In der Beta-Variante der nächsten Version iOS 10 ist der Kernel nicht verschlüsselt
---------------------------------------------
http://derstandard.at/2000039668786
*** Unpatched Remote Code Execution Flaw Exists in Swagger ***
---------------------------------------------
Researchers at Rapid7 found a vulnerability in the Swagger Code Generator that could execute arbitrary code embedded in a Swagger document.
---------------------------------------------
http://threatpost.com/unpatched-remote-code-execution-flaw-exists-in-swagge…
*** Redefining how we share our security data. ***
---------------------------------------------
Red Hat Product Security has long provided various bits of machine-consumable information to customers and users via our Security Data page. Today we are pleased to announce that we have made it even easier to access and ..
---------------------------------------------
https://access.redhat.com/blogs/766093/posts/2387601
*** Defending Our Brand ***
---------------------------------------------
Some months ago, it came to our attention that Comodo Group, Inc., is attempting to register at least three trademarks for the term "Let's Encrypt" for a variety of CA-related services. These trademark applications were ..
---------------------------------------------
https://letsencrypt.org//2016/06/23/defending-our-brand.html
*** Fünf Millionen Zertifikate: Lets Encrypt wächst rasant ***
---------------------------------------------
Innerhalb von drei Monaten hat Let's Encrypt die Gesamtanzahl von kostenlos ausgestellten SSL-/TLS-Zertifikaten verfünffacht.
---------------------------------------------
http://heise.de/-3247077