=====================
= End-of-Day report =
=====================
Timeframe: Freitag 08-03-2024 18:00 − Montag 11-03-2024 18:00
Handler: Alexander Riepl
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Fake Leather wallet app on Apple App Store is a crypto drainer ∗∗∗
---------------------------------------------
The developers of the Leather cryptocurrency wallet are warning of a fake app on the Apple App Store, with users reporting it is a wallet drainer that stole their digital assets.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fake-leather-wallet-app-on-a…
∗∗∗ What happens when you accidentally leak your AWS API keys? [Guest Diary], (Sun, Mar 10th) ∗∗∗
---------------------------------------------
As a college freshman taking my first computer science class, I wanted to create a personal project that would test my abilities and maybe have some sort of return. I saw a video online of someone who created a python script that emailed colleges asking for free swag to be shipped to him. I liked the idea and adapted it.
---------------------------------------------
https://isc.sans.edu/diary/rss/30730
∗∗∗ Check your email security, and protect your customers ∗∗∗
---------------------------------------------
Free online tool from the NCSC prevents cyber criminals using your email to conduct cyber attacks.
---------------------------------------------
https://www.ncsc.gov.uk/blog-post/cyes-protect-customers
∗∗∗ Leicht verdientes Geld auf Instagram? Vorsicht vor dieser Betrugsmasche ∗∗∗
---------------------------------------------
Sie erhalten eine Nachricht auf Instagram – angeblich von einer Künstlerin bzw. einem Künstler. Die Person behauptet, dass sie eines Ihrer Bilder auf Instagram als Vorlage für ein Gemälde nutzen möchte. Sie bekommen dafür angeblich 500 Euro. Gehen Sie nicht auf dieses Angebot ein, Sie werden betrogen!
---------------------------------------------
https://www.watchlist-internet.at/news/leicht-verdientes-geld-auf-instagram…
∗∗∗ Misconfiguration Manager: Overlooked and Overprivileged ∗∗∗
---------------------------------------------
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance. We’re also presenting this material at SO-CON 2024 on March 11, 2024. We’ll update this post with a link to the recording when it becomes available.
---------------------------------------------
https://posts.specterops.io/misconfiguration-manager-overlooked-and-overpri…
∗∗∗ Ransomware tracker: The latest figures [March 2024] ∗∗∗
---------------------------------------------
Note: this Ransomware Tracker is updated on the second Sunday of each month to stay current.
---------------------------------------------
https://therecord.media/ransomware-tracker-the-latest-figures
∗∗∗ Kritische Schwachstelle (CVE-2024-1403) in Progress OpenEdge Authentication Gateway/AdminServer – PoC öffentlich ∗∗∗
---------------------------------------------
Es gibt eine kritische Schwachstelle (CVE-2024-1403) in diesem Produkt (CVSS 10.0), die die Umgehung der Authentifizierung ermöglicht. Nun ist ein Exploit zur Ausnutzung dieser Schwachstelle bekannt geworden.
---------------------------------------------
https://www.borncity.com/blog/2024/03/11/kritische-schwachstelle-cve-2024-1…
=====================
= Vulnerabilities =
=====================
∗∗∗ Unauthenticated Stored XSS Vulnerability Patched in Ultimate Member WordPress Plugin ∗∗∗
---------------------------------------------
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the several parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
---------------------------------------------
https://www.wordfence.com/blog/2024/03/unauthenticated-stored-xss-vulnerabi…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libuv1, nss, squid, tar, tiff, and wordpress), Fedora (chromium, exercism, grub2, qpdf, and wpa_supplicant), Oracle (edk2 and opencryptoki), and SUSE (cpio, openssl-1_0_0, openssl-1_1, openssl-3, sudo, tomcat, and xen).
---------------------------------------------
https://lwn.net/Articles/965032/
∗∗∗ ArubaOS: Sicherheitslücken erlauben Befehlsschmuggel ∗∗∗
---------------------------------------------
HPE Aruba warnt vor zum Teil hochriskanten Sicherheitslücken im Betriebssystem ArubaOS für Switches aus dem Hause. Mehrere gelten als hohes Risiko und erlauben das Einschmuggeln von Befehlen.
---------------------------------------------
https://heise.de/-9650985
∗∗∗ Qnap hat teils kritische Lücken in seinen Betriebssystemen geschlossen ∗∗∗
---------------------------------------------
Qnap hat Warnungen vor Sicherheitslücken in QTS, QuTS Hero und QuTScloud veröffentlicht. Aktualisierte Firmware dichtet sie ab.
---------------------------------------------
https://heise.de/-9650933
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 07-03-2024 18:00 − Freitag 08-03-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Update on Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard ∗∗∗
---------------------------------------------
This blog provides an update on the nation-state attack that was detected by the Microsoft Security Team on January 12, 2024. As we shared, on January 19, the security team detected this attack on our corporate email systems and immediately activated our response process.
---------------------------------------------
https://msrc.microsoft.com/blog/2024/03/update-on-microsoft-actions-followi…
∗∗∗ New Malware Campaign Found Exploiting Stored XSS in Popup Builder < 4.2.3 ∗∗∗
---------------------------------------------
In the past three weeks, we’ve started seeing an uptick in attacks from a new malware campaign targeting this same Popup Builder vulnerability. According to PublicWWW, over 3,300 websites have already been infected by this new campaign. Our own SiteCheck remote malware scanner has detected this malware on over 1,170 sites.
---------------------------------------------
https://blog.sucuri.net/2024/03/new-malware-campaign-found-exploiting-store…
∗∗∗ Google-Präsenz verbessern? Vorsicht vor Abzocker-Unternehmen! ∗∗∗
---------------------------------------------
Unternehmen wenden sich derzeit an uns und berichten von unseriösen Anbietern, die sich als Kooperationspartner von Google ausgeben. Das Angebot: Sie helfen dabei, den Unternehmensauftritt bei Google zu verbessern, ein angebotenes Beratungsgespräch soll nach dem Gespräch bezahlt werden und koste einmalig bis zu 80 Euro. Doch weit gefehlt: Erfahrungsberichten zufolge tappt man hier in eine Abo-Falle, die nur schwer zu kündigen ist.
---------------------------------------------
https://www.watchlist-internet.at/news/abzocke-google-praesenz/
∗∗∗ Online scam taxonomy: the many ways to trick us ∗∗∗
---------------------------------------------
Because there are so many different types of online scams, we have compiled a list of scam taxonomy, shortly explaining what these scams mean. It’s important to stay vigilant against these threats, so it’s easier to avoid them.
---------------------------------------------
https://blog.f-secure.com/online-scam-taxonomy/
∗∗∗ Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities ∗∗∗
---------------------------------------------
Magnet Goblin is a financially motivated threat actor that quickly adopts and leverages 1-day vulnerabilities in public-facing services as an initial infection vector. At least in one case of Ivanti Connect Secure VPN (CVE-2024-21887), the exploit entered the group’s arsenal as fast as within 1 day after a POC for it was published. Campaigns that we were able to attribute to this actor targeted Ivanti, Magento, Qlink Sense and possibly Apache ActiveMQ.
---------------------------------------------
https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-…
∗∗∗ Cisco: Angreifer können sich zum Root-Nutzer unter Linux machen ∗∗∗
---------------------------------------------
Cisco AppDynamics, Duo Authentication, Secure Client, Secure Client for Linux und Wireless Access Points der Small-Business-Reihe sind angreifbar. Sicherheitspatches stehen zum Download bereit.
---------------------------------------------
https://heise.de/-9649863
∗∗∗ Angeblicher Tesla-Hack mit Flipper Zero entpuppt sich als Sturm im Wasserglas ∗∗∗
---------------------------------------------
Mittels eines gefälschten Gast-WLANs im Tesla-Design könnten Angreifer an Superchargern oder in Service-Centern Zugänge abgreifen, warnen die Experten.
---------------------------------------------
https://heise.de/-9650018
=====================
= Vulnerabilities =
=====================
∗∗∗ pgAdmin (<=8.3) Path Traversal in Session Handling Leads to Unsafe Deserialization and Remote Code Execution (RCE) ∗∗∗
---------------------------------------------
“pgAdmin is the most popular and feature rich Open Source administration and development platform for PostgreSQL, the most advanced Open Source database in the world. [..] If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them and gain code execution.
---------------------------------------------
https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_…
∗∗∗ QNAP Security Advisories 2024-03-09 ∗∗∗
---------------------------------------------
Security Impact Rating: 1x Critical, 4x Medium
---------------------------------------------
https://www.qnap.com/en-us/security-advisories
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (fontforge), Fedora (chromium, iwd, libell, and thunderbird), Oracle (buildah, kernel, skopeo, and tomcat), Red Hat (opencryptoki), Slackware (ghostscript), SUSE (go1.21, go1.22, google-oauth-java-client, jetty-minimal, openssl-1_0_0, python310, sudo, wpa_supplicant, and xmlgraphics-batik), and Ubuntu (libhtmlcleaner-java, linux, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-lowlatency-hwe-5.15, linux-nvidia, linux-azure, linux-azure-6.5, linux-hwe-6.5, mqtt-client, ncurses, and puma).
---------------------------------------------
https://lwn.net/Articles/964832/
∗∗∗ macOS 14.4 und mehr: Apple patcht schwere Sicherheitslücken ∗∗∗
---------------------------------------------
Apples Update-Reigen geht weiter: Nach iOS und iPadOS hat der Hersteller in der Nacht auf Freitag neue Versionen und Patches veröffentlicht, die für macOS, watchOS, tvOS und visionOS veröffentlicht. Neben kleineren Funktionserweiterungen und Bugfixes sollen die Aktualisierungen auch zwei gravierende Zero-Day-Schwachstellen im Kernel ausräumen, die nach Informationen von Apple wohl bereits aktiv für Angriffe ausgenutzt wurden.
---------------------------------------------
https://heise.de/-9649559
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 06-03-2024 18:00 − Donnerstag 07-03-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Hacked WordPress sites use visitors browsers to hack other sites ∗∗∗
---------------------------------------------
Hackers are conducting widescale attacks on WordPress sites to inject scripts that force visitors browsers to bruteforce passwords for other sites.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hacked-wordpress-sites-use-v…
∗∗∗ New Python-Based Snake Info Stealer Spreading Through Facebook Messages ∗∗∗
---------------------------------------------
Facebook messages are being used by threat actors to a Python-based information stealer dubbed Snake that’s designed to capture credentials and other sensitive data.
---------------------------------------------
https://thehackernews.com/2024/03/new-python-based-snake-info-stealer.html
∗∗∗ Code injection on Android without ptrace ∗∗∗
---------------------------------------------
I came up with the idea to port linux_injector. The project has a simple premise: injecting code into a process without using ptrace.
---------------------------------------------
https://erfur.github.io/blog/dev/code-injection-without-ptrace
∗∗∗ CVE-2023-36049: Microsoft .NET CRLF Injection Arbitrary File Write/Deletion Vulnerability ∗∗∗
---------------------------------------------
Successful exploitation of this vulnerability would allow a remote attacker to write or delete files in the context of the FTP server. The following is a portion of their write-up covering CVE-2023-36049, with a few minimal modifications.
---------------------------------------------
https://www.thezdi.com/blog/2024/3/6/cve-2023-36049-microsoft-net-crlf-inje…
∗∗∗ Delving into Dalvik: A Look Into DEX Files ∗∗∗
---------------------------------------------
Through a case study of the banking trojan sample, this blog post aims to give an insight into the Dalvik Executable file format, how it is constructed, and how it can be altered to make analysis easier.
---------------------------------------------
https://www.mandiant.com/resources/blog/dalvik-look-into-dex-files
∗∗∗ Staatstrojaner: Infrastruktur der Spyware Predator erneut abgeschaltet ∗∗∗
---------------------------------------------
Die Betreiber der Plattform hinter Predator haben offenbar Server vom Netz genommen, die sie zum Ausliefern und Steuern der Überwachungssoftware verwendeten.
---------------------------------------------
https://heise.de/-9648238
=====================
= Vulnerabilities =
=====================
∗∗∗ CVE-2024-1403: Progress OpenEdge Authentication Bypass Deep-Dive ∗∗∗
---------------------------------------------
On February 27, 2024, Progress released a security advisory for OpenEdge, their application development and deployment platform suite. The advisory details that there exists an authentication bypass vulnerability which effects certain components of the OpenEdge platform.
---------------------------------------------
https://www.horizon3.ai/attack-research/cve-2024-1403-progress-openedge-aut…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium and yard), Fedora (cpp-jwt, golang-github-tdewolff-argp, golang-github-tdewolff-minify, golang-github-tdewolff-parse, and suricata), Mageia (wpa_supplicant), Oracle (curl, edk2, golang, haproxy, keylime, mysql, openssh, and rear), Red Hat (kernel and postgresql:12), SUSE (containerd, giflib, go1.21, gstreamer-plugins-bad, java-1_8_0-openjdk, python3, python311, python39, sudo, and vim), and Ubuntu (frr, linux, linux-gcp, linux-gcp-5.4, [...]
---------------------------------------------
https://lwn.net/Articles/964725/
∗∗∗ VMware schließt Schlupflöcher für Ausbruch aus virtueller Maschine ∗∗∗
---------------------------------------------
Angreifer können Systeme mit VMware ESXi, Fusion und Workstation attackieren. Sicherheitsupdates stehen zum Download.
---------------------------------------------
https://heise.de/-9648396
∗∗∗ VU#949046: Sceiner firmware locks and associated devices are vulnerable to encryption downgrade and arbitrary file upload attacks ∗∗∗
---------------------------------------------
https://kb.cert.org/vuls/id/949046
∗∗∗ Registration role - Critical - Access bypass - SA-CONTRIB-2024-015 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2024-015
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Local Privilege Escalation via writable files in CheckMK Agent ∗∗∗
---------------------------------------------
https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalati…
∗∗∗ Mattermost security updates 9.5.2 (ESR) / 9.4.4 / 9.3.3 / 8.1.11 (ESR) released ∗∗∗
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-9-5-2-esr-9-4-4-9-3…
∗∗∗ Apple Releases Security Updates for iOS and iPadOS ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/03/07/apple-releases-security-…
∗∗∗ Chirp Systems Chirp Access ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-067-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 05-03-2024 18:00 − Mittwoch 06-03-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Why Your Firewall Will Kill You, (Tue, Mar 5th) ∗∗∗
---------------------------------------------
The last few years have been great for attackers exploiting basic web application vulnerabilities. Usually, home and small business products from companies like Linksys, D-Link, and Ubiquity are known to be favorite targets. But over the last couple of years, enterprise products from companies like Ivanti, Fortigate, Sonicwall, and Citrix (among others) have become easy to exploit targets. The high value of the networks protected by these "solutions" has made them favorites for ransomware attackers.
---------------------------------------------
https://isc.sans.edu/diary/rss/30714
∗∗∗ Scanning and abusing the QUIC protocol, (Wed, Mar 6th) ∗∗∗
---------------------------------------------
The QUIC protocol has slowly (pun intended) crawled into our browsers and many other protocols. Last week, at BSides Zagreb I presented some research I did about applications using (and abusing) this protocol, so it made sense to put this into one diary.
---------------------------------------------
https://isc.sans.edu/diary/rss/30720
∗∗∗ Living off the land with native SSH and split tunnelling ∗∗∗
---------------------------------------------
Lately I was involved in an assumed compromise project where stealth and simplicity was required, reducing the opportunity to use a sophisticated C2 infrastructure. We did note that the built-in Windows SSH client could make this simpler for us. [..] Windows native SSH can be a convenient attack path IF an organisation doesn’t have the ability to block and monitor the forwarded internal traffic. [..] The obvious route is to restrict access to the SSH command for all users who don’t have a business need, or to uninstall it from your default Windows build and use something like PuTTY instead.
---------------------------------------------
https://www.pentestpartners.com/security-blog/living-off-the-land-with-nati…
∗∗∗ Schneeballsystem-Alarm bei DCPTG.com! ∗∗∗
---------------------------------------------
An die Watchlist Internet wird aktuell vermehrt ein Schneeball- bzw. Pyramidensystem mit dem Namen dcptg.com gemeldet. Versprochen werden Erfahrungsberichten nach völlig unrealistische und risikofreie Gewinnmöglichkeiten von 2 bis 5 Prozent des eingesetzten Kapitals pro Tag. Außerdem müssen laufend weitere Menschen angeworben werden, um langfristig an dem System teilnehmen zu können. Vorsicht: DCPTG.com ist betrügerisch!
---------------------------------------------
https://www.watchlist-internet.at/news/schneeballsystem-alarm-bei-dctpgcom/
∗∗∗ Fake-Gewinnspiel im Namen vom Tiergarten Schönbrunn ∗∗∗
---------------------------------------------
Über ein Fake-Profil des Tiergartens Schönbrunn wird derzeit ein betrügerisches Gewinnspiel auf Facebook verbreitet. Die Facebook-Seite „Tiergarten Wien“ verlost angeblich 4 Eintrittskarten. Sie müssen lediglich die Versandgebühren für die Karten bezahlen. Vorsicht: Sie tappen in eine Abo-Falle und geben Ihre persönlichen Daten an Kriminelle weiter.
---------------------------------------------
https://www.watchlist-internet.at/news/fake-gewinnspiel-im-namen-vom-tierga…
∗∗∗ Whoops! ACEMAGIC ships mini PCs with free bonus pre-installed malware ∗∗∗
---------------------------------------------
Chinese mini PC manufacturer ACEMAGIC has made life a bit more interesting for its customers, by admitting that it has also been throwing in free malware with its products.
---------------------------------------------
https://grahamcluley.com/whoops-acemagic-ships-mini-pcs-with-free-bonus-pre…
∗∗∗ Data Exfiltration: Increasing Number of Tools Leveraged by Ransomware Attackers ∗∗∗
---------------------------------------------
Ransomware actors are deploying a growing array of data-exfiltration tools in their attacks and, over the past three months alone, Symantec has found attackers using at least dozen different tools capable of data exfiltration. While some exfiltration tools are malware, the vast majority are dual-use – legitimate software used by the attackers for malicious purposes.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/threat-intelligence/ransomwa…
∗∗∗ Badgerboard: A PLC backplane network visibility module ∗∗∗
---------------------------------------------
Analysis of the traffic between networked devices has always been of interest since devices could even communicate with one another. As the complexity of networks grew, the more useful dedicated traffic analysis tools became. Major advancements have been made over the years with tools like Snort or Wireshark, but these tools are only useful when accurate information is provided to them. By only sending a subset of the information being passed across a network to monitoring tools, analysts will be provided with an incomplete picture of the state of their network.
---------------------------------------------
https://blog.talosintelligence.com/badgerboard-research/
∗∗∗ Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs? ∗∗∗
---------------------------------------------
In this blog post, we will detail our analysis and understanding of the Coper/Octo Android malware, examining the malware’s continued development, as well as providing insights into attack patterns, infrastructure utilization and management, and hunting tips.
---------------------------------------------
https://www.team-cymru.com/post/coper-octo-a-conductor-for-mobile-mayhem-wi…
∗∗∗ New Linux Malware Alert: ‘Spinning YARN’ Hits Docker, Other Key Apps ∗∗∗
---------------------------------------------
According to Cado Security’s research research shared with Hackread.com ahead of publication on Wednesday, Spinning Yarn is a malicious campaign that exploits weaknesses in popular Linux software used by businesses across various sectors.
---------------------------------------------
https://www.hackread.com/new-linux-malware-alert-spinning-yarn-docker-apps/
∗∗∗ Fritz.box: Domain aus dem Verkehr gezogen ∗∗∗
---------------------------------------------
Unbekannte sicherten sich im Januar die Domain fritz.box. Doch die Verwirrung hielt nicht lange an. Jetzt wurde die Adresse aus dem Verkehr gezogen.
---------------------------------------------
https://heise.de/-9647776
=====================
= Vulnerabilities =
=====================
∗∗∗ Cisco Security Advisories 2024-02-28 ∗∗∗
---------------------------------------------
Security Impact Rating: 2x High, 5x Medium
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDs…
∗∗∗ VMSA-2024-0006 ∗∗∗
---------------------------------------------
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3 for Workstation/Fusion and in the Important severity range with a maximum CVSSv3 base score of 8.4 for ESXi. [..] A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2024-0006.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libapache2-mod-auth-openidc, libuv1, php-phpseclib, and phpseclib), Red Hat (buildah, cups, curl, device-mapper-multipath, emacs, fence-agents, frr, fwupd, gmp, gnutls, golang, haproxy, keylime, libfastjson, libmicrohttpd, linux-firmware, mysql, openssh, rear, skopeo, sqlite, squid, systemd, and tomcat), Slackware (mozilla), SUSE (kernel-firmware-nvidia-gspx-G06, nvidia-open- driver-G06-signed, postgresql-jdbc, python, python-cryptography, rubygem-rack, wpa_supplicant, and xmlgraphics-batik), and Ubuntu (c-ares, firefox, libde265, libgit2, and ruby-image-processing).
---------------------------------------------
https://lwn.net/Articles/964559/
∗∗∗ CISA Adds Two Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CVE-2024-23225 / CVE-2024-23296 Apple iOS and iPadOS Memory Corruption Vulnerability
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/03/06/cisa-adds-two-known-expl…
∗∗∗ Foxit: Sicherheitsupdates in Foxit PDF Reader 2024.1 und Foxit PDF Editor 2024.1 verfügbar ∗∗∗
---------------------------------------------
https://www.foxit.com/de/support/security-bulletins.html
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Bosch: Git for Windows Multiple Security Vulnerabilities in Bosch DIVAR IP all-in-one Devices ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-637386-bt.html
∗∗∗ Bosch: Multiple OpenSSL vulnerabilities in BVMS ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-090577-bt.html
∗∗∗ F5: K000138827 : OpenSSH vulnerability CVE-2023-51385 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000138827
∗∗∗ iOS 17.4 und iOS 16.7.6: Wichtige sicherheitskritische Bugfixes ∗∗∗
---------------------------------------------
https://heise.de/-9647164
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 04-03-2024 18:00 − Dienstag 05-03-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ ScreenConnect flaws exploited to drop new ToddleShark malware ∗∗∗
---------------------------------------------
The North Korean APT hacking group Kimsuky is exploiting ScreenConnect flaws, particularly CVE-2024-1708 and CVE-2024-1709, to infect targets with a new malware variant dubbed ToddleShark.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/screenconnect-flaws-exploite…
∗∗∗ Network tunneling with… QEMU? ∗∗∗
---------------------------------------------
While investigating an incident, we detected uncommon malicious activity inside one of the systems. We ran an analysis on the artifacts, only to find that the adversary had deployed and launched the QEMU hardware emulator.
---------------------------------------------
https://securelist.com/network-tunneling-with-qemu/111803/
∗∗∗ Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes ∗∗∗
---------------------------------------------
The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes.
---------------------------------------------
https://thehackernews.com/2024/03/warning-thread-hijacking-attack-targets.h…
∗∗∗ Pegasus spyware creator ordered to reveal code used to spy on WhatsApp users ∗∗∗
---------------------------------------------
Meta has won a court case against spyware vendor NSO Group to reveal the Pegasus spyware code that allows spying on WhatsApp users.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2024/03/pegasus-spyware-creator-orde…
∗∗∗ AnyDesk: Zugriffsversuche aus Spanien; Unsignierter Client verteilt ∗∗∗
---------------------------------------------
Das Drama bei AnyDesk geht anscheinend weiter, obwohl ich die Hoffnung hatte, das Thema langsam abschließen zu können...
---------------------------------------------
https://www.borncity.com/blog/2024/03/05/anydesk-zugriffsversuche-aus-spani…
∗∗∗ WogRAT Malware Exploits aNotepad (Windows, Linux) ∗∗∗
---------------------------------------------
AhnLab Security intelligence Center (ASEC) has recently discovered the distribution of backdoor malware via aNotepad, a free online notepad platform.
---------------------------------------------
https://asec.ahnlab.com/en/62446/
∗∗∗ GhostSec’s joint ransomware operation and evolution of their arsenal ∗∗∗
---------------------------------------------
Cisco Talos observed a surge in GhostSec, a hacking group’s malicious activities since this past year. GhostSec has evolved with a new GhostLocker 2.0 ransomware, a Golang variant of the GhostLocker ransomware.
---------------------------------------------
https://blog.talosintelligence.com/ghostsec-ghostlocker2-ransomware/
∗∗∗ Ransomware: ALPHV/Blackcat betrügt offensichtlich Partner und zieht sich zurück ∗∗∗
---------------------------------------------
Die Fakten legen nahe, dass ALPHV/Blackcat einen Cybercrime-Partner um 22 Millionen US-Dollar betrogen und sich nun zurückgezogen hat.
---------------------------------------------
https://heise.de/-9646707
=====================
= Vulnerabilities =
=====================
∗∗∗ Exploit available for new critical TeamCity auth bypass bug, patch now ∗∗∗
---------------------------------------------
A critical vulnerability (CVE-2024-27198) in the TeamCity On-Premises CI/CD solution from JetBrains can let a remote unauthenticated attacker take control of the server with administrative permissions.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/exploit-available-for-new-cr…
∗∗∗ Multiple vulnerabilities in RT-Thread RTOS ∗∗∗
---------------------------------------------
I reviewed RT-Thread’s source code hosted on GitHub and identified multiple security vulnerabilities that may cause memory corruption and security feature bypass. Their impacts range from denial of service to potential arbitrary code execution.
---------------------------------------------
https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rto…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (yard), Oracle (buildah and kernel), Red Hat (389-ds:1.4, edk2, frr, gnutls, haproxy, libfastjson, libX11, postgresql:12, sqlite, squid, squid:4, tcpdump, and tomcat), SUSE (apache2-mod_auth_openidc and glibc), and Ubuntu (linux-gke, python-cryptography, and python-django).
---------------------------------------------
https://lwn.net/Articles/964450/
∗∗∗ Zeek Security Tool Vulnerabilities Allow ICS Network Hacking ∗∗∗
---------------------------------------------
Vulnerabilities in a plugin for the Zeek network security monitoring tool can be exploited in attacks aimed at ICS environments.
---------------------------------------------
https://www.securityweek.com/zeek-security-tool-vulnerabilities-allow-ics-n…
∗∗∗ VU#782720: TCG TPM2.0 implementations vulnerable to memory corruption ∗∗∗
---------------------------------------------
https://kb.cert.org/vuls/id/782720
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Security Vulnerabilities fixed in Thunderbird 115.8.1 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2024-11/
∗∗∗ Nice Linear eMerge E3-Series ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01
∗∗∗ Santesoft Sante FFT Imaging ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01
∗∗∗ K000138814 : OpenLDAP vulnerability CVE-2023-2953 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000138814
∗∗∗ Patchday: Kritische Schadcode-Lücken bedrohen Android 12, 13 und 14 ∗∗∗
---------------------------------------------
https://heise.de/-9646073
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 01-03-2024 18:00 − Montag 04-03-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Gemini, ChatGPT und LLaVA: Neuer Wurm verbreitet sich in KI-Ökosystemen selbst ∗∗∗
---------------------------------------------
Forscher haben einen KI-Wurm entwickelt. Dieser kann nicht nur sensible Daten abgreifen, sondern sich auch selbst in einem GenAI-Ökosystem ausbreiten.
---------------------------------------------
https://www.golem.de/news/gemini-chatgpt-und-llava-neuer-wurm-verbreitet-si…
∗∗∗ Hunting For Integer Overflows In Web Servers ∗∗∗
---------------------------------------------
In order to overflow something (e.g. an integer overflow) we clearly need some way to be able to do that (think pouring water from a kettle into a cup), and that’s the source (us using the kettle) to overflow the cup. Cup of tea aside, what things can be accessed remotely and take user input (those sources)? Web servers! This blog post title does not lie!
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hunting-for…
∗∗∗ New Wave of SocGholish Infections Impersonates WordPress Plugins ∗∗∗
---------------------------------------------
SocGholish malware, otherwise known as “fake browser updates”, is one of the most common types of malware infections that we see on hacked websites. This long-standing malware campaign leverages a JavaScript malware framework that has been in use since at least 2017. The malware attempts to trick unsuspecting users into downloading what is actually a Remote Access Trojan (RAT) onto their computers, which is often the first stage in a ransomware infection. Late last week our incident response team identified a fresh wave of SocGholish (fake browser update) infections targeting WordPress websites.
---------------------------------------------
https://blog.sucuri.net/2024/03/new-wave-of-socgholish-infections-impersona…
∗∗∗ Rise in Deceptive PDF: The Gateway to Malicious Payloads ∗∗∗
---------------------------------------------
McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF files. Malware is not solely sourced from dubious websites or downloads; certain instances of malware may reside within apparently harmless emails, particularly within the PDF file attachments accompanying them. The subsequent trend observed in the past three months through McAfee telemetry pertains to the prevalence of malware distributed through non-portable executable (non-PE) vectors.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/rise-in-deceptive-pdf-…
∗∗∗ Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers ∗∗∗
---------------------------------------------
A team of researchers has developed malware designed to target modern programmable logic controllers (PLCs) in an effort to demonstrate that remote Stuxnet-style attacks can be launched against such industrial control systems (ICS).
---------------------------------------------
https://www.securityweek.com/remote-stuxnet-style-attack-possible-with-web-…
∗∗∗ Vorsicht vor falschen Paketbenachrichtigungen ∗∗∗
---------------------------------------------
Sie erwarten ein Paket? Prüfen Sie Benachrichtigungen über den Sendungsstatus sehr genau! Derzeit sind gefälschte Paketbenachrichtigungen im Namen aller gängigen Zustelldiensten im Umlauf. Klicken Sie niemals voreilig auf Links in E-Mails und SMS und geben Sie keine Kreditkartendaten preis!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-falschen-paketbenachric…
∗∗∗ Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE ∗∗∗
---------------------------------------------
Below is a recent Threat Brief that we shared with our customers. Each year, we produce over 50 detailed Threat Briefs, which follow a format similar to the below. Typically, these reports include specific dates and times to provide comprehensive insights; however, please note that such information has been redacted in this public version. IOCs are available to customers within Event 27236 (uuid – fe12e833-6f0c-45c9-97d6-83337ea6c5d3).
---------------------------------------------
https://thedfirreport.com/2024/03/04/threat-brief-wordpress-exploit-leads-t…
∗∗∗ Microsoft schließt ausgenutzte Windows 0-day Schwachstelle CVE-2024-21338 sechs Monate nach Meldung ∗∗∗
---------------------------------------------
Im Februar 2024 hat Microsoft die Schwachstelle CVE-2024-21338 im Kernel von Windows 10/11 und diversen Windows Server-Versionen geschlossen. Super! Der Fehler an der Geschichte: Die Schwachstelle wurde von AVAST im August 2023 gemeldet, und die Schwachstelle wurde zu dieser Zeit als 0-day ausgenutzt.
---------------------------------------------
https://www.borncity.com/blog/2024/03/03/microsoft-schliet-ausgenutzte-wind…
∗∗∗ Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO ∗∗∗
---------------------------------------------
The RA World (previously the RA Group) ransomware has managed to successfully breach organizations around the world since its first appearance in April 2023. Although the threat actor casts a wide net with its attacks, many of its targets were in the US, with a smaller number of attacks occurring in countries such as Germany, India, and Taiwan. When it comes to industries, the group focuses its efforts on businesses in the healthcare and financial sectors.
---------------------------------------------
https://www.trendmicro.com/en_us/research/24/c/multistage-ra-world-ransomwa…
∗∗∗ GitHub als Malware-Schleuder ∗∗∗
---------------------------------------------
Eine Sicherheitsfirma berichtet über eine neue Masche, wie Schadcode im großen Stil verteilt wird: über kompromittierte Klon-Repositories auf GitHub.
---------------------------------------------
https://heise.de/-9644525
=====================
= Vulnerabilities =
=====================
∗∗∗ Critical vulnerabilities in TeamCity JetBrains fixed, release of technical details imminent, patch quickly! (CVE-2024-27198, CVE-2024-27199) ∗∗∗
---------------------------------------------
JetBrains has fixed two critical security vulnerabilities (CVE-2024-27198, CVE-2024-27199) affecting TeamCity On-Premises and is urging customers to patch them immediately.
---------------------------------------------
https://www.helpnetsecurity.com/2024/03/04/cve-2024-27198-cve-2024-27199/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr and thunderbird), Fedora (dotnet6.0, dotnet8.0, and mod_auth_openidc), Gentoo (Blender, Tox, and UltraJSON), Oracle (kernel), Red Hat (edk2), SUSE (sendmail and zabbix), and Ubuntu (nodejs and thunderbird).
---------------------------------------------
https://lwn.net/Articles/964376/
∗∗∗ Hikvision Patches High-Severity Vulnerability in Security Management System ∗∗∗
---------------------------------------------
Chinese video surveillance equipment manufacturer Hikvision has announced patches for two vulnerabilities in its security management system HikCentral Professional. The most important of these flaws is CVE-2024-25063, a high-severity bug that could lead to unauthorized access to certain URLs.
---------------------------------------------
https://www.securityweek.com/hikvision-patches-high-severity-vulnerability-…
∗∗∗ Aruba: Codeschmuggel durch Sicherheitslücken im Clearpass Manager möglich ∗∗∗
---------------------------------------------
Im Aruba Clearpass Manager von HPE klaffen teils kritische Sicherheitslücken. Updates zum Schließen stehen bereit. [..] Eine Lücke betrifft den mitgelieferten Apache Struts-Server und erlaubt das Einschleusen von Befehlen (CVE-2023-50164, CVSS 9.8, Risiko "kritisch").
---------------------------------------------
https://heise.de/-9644607
∗∗∗ Solarwinds: Schadcode-Lücke in Security Event Manager ∗∗∗
---------------------------------------------
Sicherheitslücken in Solarwinds Secure Event Manager können Angreifer zum Einschleusen von Schadcode missbrauchen. Updates stopfen die Lecks.
---------------------------------------------
https://heise.de/-9644643
∗∗∗ Angreifer können Systeme mit Dell-Software kompromittieren ∗∗∗
---------------------------------------------
Es sind wichtige Sicherheitspatches für Dell Data Protection Advisor, iDRAC8 und Secure Connect Gateway erschienen.
---------------------------------------------
https://heise.de/-9644978
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ F5: K000138726 : Linux kernel vulnerability CVE-2023-3611 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000138726
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 29-02-2024 18:00 − Freitag 01-03-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ CISA cautions against using hacked Ivanti VPN gateways even after factory resets ∗∗∗
---------------------------------------------
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed today that attackers who hack Ivanti VPN appliances using one of multiple actively exploited vulnerabilities may be able to maintain root persistence even after performing factory resets.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cisa-cautions-against-using-…
∗∗∗ Angriffe auf Windows-Lücke – Update seit einem halben Jahr verfügbar ∗∗∗
---------------------------------------------
Die CISA warnt vor Angriffen auf eine Lücke in Microsofts Streaming Service. Updates gibt es seit mehr als einem halben Jahr.
---------------------------------------------
https://heise.de/-9643763
∗∗∗ Wireshark Tutorial: Exporting Objects From a Pcap ∗∗∗
---------------------------------------------
This Wireshark tutorial guides the reader in exporting different packet capture objects. It builds on a foundation of malware traffic analysis skills.
---------------------------------------------
https://unit42.paloaltonetworks.com/using-wireshark-exporting-objects-from-…
∗∗∗ Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses ∗∗∗
---------------------------------------------
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor.
---------------------------------------------
https://www.welivesecurity.com/en/business-security/blue-team-toolkit-6-ope…
∗∗∗ Researchers spot new infrastructure likely used for Predator spyware ∗∗∗
---------------------------------------------
Cybersecurity researchers have identified new infrastructure likely used by the operators of the commercial spyware known as Predator in at least 11 countries.
---------------------------------------------
https://therecord.media/new-predator-spyware-infrastructure-identified
∗∗∗ Covert TLS n-day backdoors: SparkCockpit & SparkTar ∗∗∗
---------------------------------------------
This report documents two covert TLS-based backdoors identified by NVISO: SparkCockpit & SparkTar. Both backdoors employ selective interception of TLS communication towards the legitimate Ivanti server applications.
---------------------------------------------
https://blog.nviso.eu/2024/03/01/covert-tls-n-day-backdoors-sparkcockpit-sp…
∗∗∗ How To Hunt For UEFI Malware Using Velociraptor ∗∗∗
---------------------------------------------
UEFI threats have historically been limited in number and mostly implemented bynation state actors as stealthy persistence. However, the recent proliferationof Black Lotus on the dark web, Trickbot enumeration module (late 2022), andGlupteba (November 2023) indicates that this historical trend may be changing. With this context, it is becoming important for security practitioners to understand visibility and collection capabilities for UEFI threats. This post covers some of these areas and presents several recent Velociraptor artifacts that can be used in the field.
---------------------------------------------
https://www.rapid7.com/blog/post/2024/02/29/how-to-hunt-for-uefi-malware-us…
∗∗∗ Bluetooth Unleashed: Syncing Up with the RattaGATTa Series! Part 1 ∗∗∗
---------------------------------------------
This post introduces GreyNoise Labs series on BTLE, highlighting its privacy and security implications, as well as the journey from basic usage to sophisticated system development, offering insights for cybersecurity professionals and tech enthusiasts alike.
---------------------------------------------
https://www.greynoise.io/blog/bluetooth-unleashed-syncing-up-with-the-ratta…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (firefox and thunderbird), Debian (gsoap, python-django, and wireshark), Fedora (dotnet7.0 and gifsicle), Mageia (sympa), Oracle (postgresql:10, postgresql:12, thunderbird, and unbound), Red Hat (kpatch-patch, python-pillow, and squid:4), SUSE (nodejs12, nodejs14, nodejs16, nodejs18, and openvswitch3), and Ubuntu (linux-azure, linux-lowlatency, linux-starfive-6.5, php-guzzlehttp-psr7, and php-nyholm-psr7).
---------------------------------------------
https://lwn.net/Articles/964166/
∗∗∗ Sicherheitsupdate: Nividia-Grafikkarten-Treiber als Einfallstor für Angreifer ∗∗∗
---------------------------------------------
Insgesamt hat Nvidia mit den Updates acht Sicherheitslücken geschlossen. Davon sind vier (CVE-2024-0071, CVE-2024-0073, CVE-2024-0075, CVE-2024-0077) mit dem Bedrohungsgrad "hoch" eingestuft. An diesen Stellen können Angreifer auf einem nicht näher beschriebenen Weg Speicherfehler auslösen und so Schadcode auf Systeme schieben und ausführen. Im Anschluss gelten Computer in der Regel als vollständig kompromittiert.
---------------------------------------------
https://heise.de/-9643306
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Autodesk: Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software ∗∗∗
---------------------------------------------
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 28-02-2024 18:00 − Donnerstag 29-02-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ LockBit ransomware returns to attacks with new encryptors, servers ∗∗∗
---------------------------------------------
The LockBit ransomware gang is once again conducting attacks, using updated encryptors with ransom notes linking to new servers after last weeks law enforcement disruption.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-returns-t…
∗∗∗ Neue Ransomwaregruppe: Angeblicher Cyberangriff auf Epic Games bleibt zweifelhaft ∗∗∗
---------------------------------------------
Die Hackergruppe Mogilevich bietet im Darknet Daten von Epic Games im Umfang von 189 GByte zum Verkauf an. Zweifel an dem Angebot sind jedoch angebracht.
---------------------------------------------
https://www.golem.de/news/daten-stehen-zum-verkauf-neue-ransomwaregruppe-ha…
∗∗∗ GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks ∗∗∗
---------------------------------------------
Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX). The malware is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications.
---------------------------------------------
https://thehackernews.com/2024/02/gtpdoor-linux-malware-targets-telecoms.ht…
∗∗∗ New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can be successful even in cases where mitigations have been applied against Golden SAML attacks.
---------------------------------------------
https://thehackernews.com/2024/02/new-silver-saml-attack-evades-golden.html
∗∗∗ #StopRansomware: Phobos Ransomware ∗∗∗
---------------------------------------------
This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors.
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a
∗∗∗ ALPHV is singling out healthcare sector, say FBI and CISA ∗∗∗
---------------------------------------------
CISA, FBI and HHS are warning about the ALPHV/ Blackcat ransomware group targeting the healthcare industry.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2024/02/alphv-is-singling-out-health…
∗∗∗ GUloader Unmasked: Decrypting the Threat of Malicious SVG Files ∗∗∗
---------------------------------------------
This sophisticated malware loader has garnered attention for its stealthy techniques and ability to evade detection, posing a significant risk to organizations and individuals.
---------------------------------------------
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/guloader-unmasked-decr…
∗∗∗ Amazon-Vishing: Vorsicht vor Fake-Amazon-Anrufen! ∗∗∗
---------------------------------------------
Am Telefon geben sich Kriminelle als Amazon-Mitarbeiter:innen aus. Unter verschiedenen Vorwänden bringen sie Sie dazu, TeamViewer oder AnyDesk zu installieren und räumen Ihr Konto leer! Sollten Sie so einen Anruf erhalten, legen Sie auf und blockieren Sie die Nummer.
---------------------------------------------
https://www.watchlist-internet.at/news/amazon-vishing-vorsicht-vor-fake-ama…
∗∗∗ ADCS ESC14 Abuse Technique ∗∗∗
---------------------------------------------
In this blog post, we will explore the variations of abuse of explicit certificate mapping in AD, what the requirements are, and how you can protect your environment against it.
---------------------------------------------
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9
∗∗∗ The Art of Domain Deception: Bifrosts New Tactic to Deceive Users ∗∗∗
---------------------------------------------
The RAT Bifrost has a new Linux variant that leverages a deceptive domain in order to compromise systems. We analyze this expanded attack surface.
---------------------------------------------
https://unit42.paloaltonetworks.com/new-linux-variant-bifrost-malware/
∗∗∗ Vulnerabilities in business VPNs under the spotlight ∗∗∗
---------------------------------------------
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk.
---------------------------------------------
https://www.welivesecurity.com/en/business-security/vulnerabilities-busines…
∗∗∗ IT-Sicherheitsprodukte von Sophos verschlucken sich am Schaltjahr ∗∗∗
---------------------------------------------
Aufgrund eines Fehlers können Sophos Endpoint, Home und Server vor dem Besucht legitimer Websites warnen. Erste Lösungen sind bereits verfügbar.
---------------------------------------------
https://heise.de/-9642801
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium), Fedora (moodle), Red Hat (kernel, kernel-rt, and postgresql:15), Slackware (wpa_supplicant), SUSE (Java and rear27a), and Ubuntu (libcpanel-json-xs-perl, libuv1, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.4, linux-lowlatency, linux-lowlatency-hwe-6.5, linux-oem-6.5, python-openstackclient, and unbound).
---------------------------------------------
https://lwn.net/Articles/964039/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ 2024-01 Security Bulletin: JSA Series: Multiple vulnerabilities resolved in JSA Applications ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-S…
∗∗∗ On Demand: JSA Series: Multiple vulnerabilities resolved in Juniper Secure Analytics in 7.5.0 UP7 IF05 ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-v…
∗∗∗ Delta Electronics CNCSoft-B ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-060-01
∗∗∗ MicroDicom DICOM Viewer ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-060-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 27-02-2024 18:00 − Mittwoch 28-02-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Ivanti: Enhanced External Integrity Checking Tool to Provide Additional Visibility and Protection for Customers Against Evolving Threat Actor Techniques in Relation to Previously Disclosed Vulnerabilities ∗∗∗
---------------------------------------------
As part of our exhaustive investigation into the recent attack against our customers, Ivanti and Mandiant released findings today regarding evolving threat actor tactics, techniques and procedures (TTPs). These findings were identified in the ongoing analysis of the previously disclosed vulnerabilities affecting Ivanti Connect Secure, Policy Secure and ZTA gateways, and include potential persistence techniques that we are monitoring, even though to date they have not been deployed successfully in the wild.
---------------------------------------------
https://www.ivanti.com/blog/enhanced-external-integrity-checking-tool-to-pr…
∗∗∗ Savvy Seahorse gang uses DNS CNAME records to power investor scams ∗∗∗
---------------------------------------------
A threat actor named Savvy Seahorse is abusing CNAME DNS records Domain Name System to create a traffic distribution system that powers financial scam campaigns.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/savvy-seahorse-gang-uses-dns…
∗∗∗ Take Downs and the Rest of Us: Do they matter?, (Tue, Feb 27th) ∗∗∗
---------------------------------------------
Last week, the US Department of Justice published a press release entitled "Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federations Main Intelligence Directorate of the General Staff (GRU)". The disruption targeted a botnet built using the "Moobot" malware. According to the press release, this particular botnet focused on routers made by Ubiquity, using well-known default credentials. Why do nation-state actors go after "simple" home devices?
---------------------------------------------
https://isc.sans.edu/diary/rss/30694
∗∗∗ European diplomats targeted by SPIKEDWINE with WINELOADER ∗∗∗
---------------------------------------------
Zscalers ThreatLabz discovered a suspicious PDF file uploaded to VirusTotal from Latvia on January 30th, 2024. This PDF file is masqueraded as an invitation letter from the Ambassador of India, inviting diplomats to a wine-tasting event in February 2024. The PDF also included a link to a fake questionnaire that redirects users to a malicious ZIP archive hosted on a compromised site, initiating the infection chain.
---------------------------------------------
https://www.zscaler.com/blogs/security-research/european-diplomats-targeted…
∗∗∗ Hacker-Gruppe fordert Bitcoins: Erpresserische E-Mails enthalten Wohnadresse als Druckmittel ∗∗∗
---------------------------------------------
„Es freut uns sehr dir mitteilen zu können, das du keine Ahnung von Cyber Security Hast und wir dein Handy infizieren konnten“ beginnt ein E-Mail von einer angeblichen Hacker-Gruppe mit dem Namen „Russian Blakmail Army“. Angeblich wurden private Fotos und Inhalte von Ihnen gesammelt. Wenn Sie nicht wollen, dass diese veröffentlicht werden, sollten Sie 1000 Euro an eine Bitcoin-Wallet senden. Ignorieren Sie dieses E-Mail, es handelt sich um Fake.
---------------------------------------------
https://www.watchlist-internet.at/news/hacker-gruppe-fordert-bitcoins-erpre…
∗∗∗ Navigating the Cloud: Exploring Lateral Movement Techniques ∗∗∗
---------------------------------------------
We illuminate lateral movement techniques observed in the wild within cloud environments, including Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure.
---------------------------------------------
https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
∗∗∗ Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day ∗∗∗
---------------------------------------------
Avast discovered an in-the-wild admin-to-kernel exploit for a previously unknown zero-day vulnerability in the appid.sys AppLocker driver. Thanks to Avast’s prompt report, Microsoft addressed this vulnerability as CVE-2024-21338 in the February Patch Tuesday update. The exploitation activity was orchestrated by the notorious Lazarus Group, with the end goal of establishing a kernel read/write primitive. This primitive enabled Lazarus to perform direct kernel object manipulation in an updated version of their data-only FudModule rootkit, a previous version of which was analyzed by ESET and AhnLab.
---------------------------------------------
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyo…
∗∗∗ Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations ∗∗∗
---------------------------------------------
This advisory provides observed tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and recommendations to mitigate the threat posed by APT28 threat actors related to compromised EdgeRouters.
---------------------------------------------
https://www.ic3.gov/Media/News/2024/240227.pdf
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (knot-resolver and wpa), Fedora (chromium, kernel, thunderbird, and yarnpkg), Mageia (c-ares), Oracle (firefox, kernel, opensc, postgresql:13, postgresql:15, and thunderbird), Red Hat (edk2, gimp:2.8, and kernel), SUSE (bind, bluez, container-suseconnect, dnsdist, freerdp, gcc12, gcc7, glib2, gnutls, kernel, kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t, libqt5-qtbase, libqt5-qtsvg, nodejs18, nodejs20, openssl, openssl-1_0_0, poppler, python-crcmod, python-cryptography, python-cryptography- vectors, python-pip, python-requests, python3-requests, python311, python39, rabbitmq-c, samba, sccache, shim, SUSE Manager 4.2, SUSE Manager Server 4.2, the Linux-RT Kernel, and thunderbird), and Ubuntu (less, openssl, php7.0, php7.2, php7.4, and tiff).
---------------------------------------------
https://lwn.net/Articles/963957/
∗∗∗ TeamViewer Passwort-Schwachstelle CVE-2024-0819 ∗∗∗
---------------------------------------------
Der Client für Windows sollte dringend auf die Version 15.51.5 aktualisiert werden. Der Hersteller hat einen Sicherheitshinweis veröffentlicht, aus dem hervorgeht, dass ältere Software-Versionen nur einen unvollständigen Schutz der persönlichen Kennworteinstellungen bieten.
---------------------------------------------
https://www.borncity.com/blog/2024/02/28/teamviewer-passwort-schwachstelle-…
∗∗∗ Cisco Security Advisories 2024-02-28 ∗∗∗
---------------------------------------------
Security Impact Rating: 2x High, 3x Medium
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDs…
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Checkmk: Werk #16361: Privilege escalation in Windows agent ∗∗∗
---------------------------------------------
https://checkmk.com/werk/16361
∗∗∗ ARISTA Security Advisory 0093 ∗∗∗
---------------------------------------------
https://www.arista.com/en/support/advisories-notices/security-advisory/1903…
∗∗∗ Wiesemann & Theis: Multiple products prone to unquoted search path ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2024-018/
∗∗∗ F5: K000138731 : Linux vulnerability CVE-2023-3776 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000138731
∗∗∗ Google Chrome: Sicherheitsupdate bessert vier Schwachstellen aus ∗∗∗
---------------------------------------------
https://heise.de/-9641080
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 26-02-2024 18:00 − Dienstag 27-02-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub ∗∗∗
---------------------------------------------
An "intricately designed" remote access trojan (RAT) called Xeno RAT has been made available on GitHub, making it available to other actors at no extra cost.
---------------------------------------------
https://thehackernews.com/2024/02/open-source-xeno-rat-trojan-emerges-as.ht…
∗∗∗ Achtung Betrug: Kriminelle locken mit gratis Spar-Geschenkkarten und Klimatickets ∗∗∗
---------------------------------------------
Aktuell kursieren gefälschte Gewinnspiele für kostenlose Spar-Geschenkkarten und Klimatickets. Die Angebote werden per E-Mail, in Sozialen Netzwerken oder per Direktnachricht auf Ihr Handy verbreitet. Die verlockenden Angebote dienen dazu, Ihnen persönliche Daten und Geld zu stehlen!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-betrug-kriminelle-locken-mit…
∗∗∗ Booking.com refund request? It might be an Agent Tesla malware attack ∗∗∗
---------------------------------------------
Always be wary of opening unsolicited attachments - they might harbour malware.
---------------------------------------------
https://grahamcluley.com/booking-com-refund-request-it-might-be-an-agent-te…
∗∗∗ Phishing Malware That Sends Stolen Information Using Telegram API ∗∗∗
---------------------------------------------
Recently, several phishing scripts using Telegram are being distributed indiscriminately through keywords such as remittance and receipts.
---------------------------------------------
https://asec.ahnlab.com/en/62177/
∗∗∗ Threat Actor Groups, Including Black Basta, are Exploiting Recent ScreenConnect Vulnerabilities ∗∗∗
---------------------------------------------
This blog entry gives a detailed analysis of these recent ScreenConnect vulnerabilities. We also discuss our discovery of threat actor groups, including Black Basta and Bl00dy Ransomware gangs, that are actively exploiting CVE-2024-1708 and CVE-2024-1709 based on our telemetry.
---------------------------------------------
https://www.trendmicro.com/en_us/research/24/b/threat-actor-groups-includin…
∗∗∗ Hunting PrivateLoader: The malware behind InstallsKey PPI service ∗∗∗
---------------------------------------------
Read the latest Bitsight research on PrivateLoader including important updates recently, including a new string encryption algorithm, a new alternative communication protocol and more.
---------------------------------------------
https://www.bitsight.com/blog/hunting-privateloader-malware-behind-installs…
∗∗∗ Februar-Sicherheitsupdates für Windows 11 können fehlschlagen ∗∗∗
---------------------------------------------
Microsoft arbeitet an der Lösung eines Problems, das die Installation der Februar-Sicherheitsupdates in Windows 11 verhindert.
---------------------------------------------
https://heise.de/-9639866
=====================
= Vulnerabilities =
=====================
∗∗∗ WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk ∗∗∗
---------------------------------------------
A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable unauthenticated users to escalate their privileges.
---------------------------------------------
https://thehackernews.com/2024/02/wordpress-litespeed-plugin.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (engrampa and libgit2), Fedora (libxls, perl-Spreadsheet-ParseXLSX, and wpa_supplicant), Gentoo (PyYAML), Mageia (packages and thunderbird), Red Hat (firefox, kernel, linux-firmware, thunderbird, and unbound), Slackware (openjpeg), SUSE (golang-github-prometheus-prometheus, installation-images, kernel, python-azure-core, python-azure-storage-blob, salt and python-pyzmq, SUSE Manager 4.2.11, SUSE Manager 4.3, SUSE Manager Server 4.2, and wayland), [...]
---------------------------------------------
https://lwn.net/Articles/963805/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ XSA-451 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-451.html
∗∗∗ Zyxel Patches Remote Code Execution Bug in Firewall Products ∗∗∗
---------------------------------------------
https://www.securityweek.com/zyxel-patches-remote-code-execution-bug-in-fir…
∗∗∗ Festo: Multiple vulnerabilities affect MES PC shipped with Windows 10 ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-065/
∗∗∗ Nagios XI: Schwachstellen CVE-2024-24401 und CVE-2024-24402; PoC öffentlich ∗∗∗
---------------------------------------------
https://www.borncity.com/blog/2024/02/27/nagios-xi-schwachstellen-cve-2024-…
∗∗∗ Mitsubishi Electric Multiple Factory Automation Products ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-058-01
∗∗∗ Santesoft Sante DICOM Viewer Pro ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-058-01
∗∗∗ VMSA-2024-0005 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2024-0005.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily