=====================
= End-of-Day report =
=====================
Timeframe: Freitag 09-02-2024 18:00 − Montag 12-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Free Rhysida ransomware decryptor for Windows exploits RNG flaw ∗∗∗
---------------------------------------------
South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows decryptor to recover files for free.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/free-rhysida-ransomware-decr…
∗∗∗ Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor ∗∗∗
---------------------------------------------
Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-exploit-ivanti-ssrf-…
∗∗∗ Exploit against Unnamed "Bytevalue" router vulnerability included in Mirai Bot, (Mon, Feb 12th) ∗∗∗
---------------------------------------------
Today, I noticed the following URL showing up in our "First Seen" list: [...]
---------------------------------------------
https://isc.sans.edu/diary/rss/30642
∗∗∗ Microsoft Defender: Der Erkennung mit Komma entgehen ∗∗∗
---------------------------------------------
Ein IT-Forscher hat entdeckt, dass sich die Erkennung des Microsoft Defenders mit einem Komma austricksen lässt.
---------------------------------------------
https://www.heise.de/-9625770.html
∗∗∗ SiCat: Open-source exploit finder ∗∗∗
---------------------------------------------
SiCat is an open-source tool for exploit research designed to source and compile information about exploits from open channels and internal databases. Its primary aim is to assist in cybersecurity, enabling users to search the internet for potential vulnerabilities and corresponding exploits.
---------------------------------------------
https://www.helpnetsecurity.com/2024/02/12/sicat-open-source-exploit-finder/
∗∗∗ Warzone RAT Shut Down by Law Enforcement, Two Arrested ∗∗∗
---------------------------------------------
Warzone RAT dismantled in international law enforcement operation that also involved arrests of suspects in Malta and Nigeria.
---------------------------------------------
https://www.securityweek.com/warzone-rat-shut-down-by-law-enforcement-two-a…
∗∗∗ Diving Into Gluptebas UEFI Bootkit ∗∗∗
---------------------------------------------
A 2023 Glupteba campaign includes an unreported feature - a UEFI bootkit. We analyze its complex architecture and how this botnet has evolved.
---------------------------------------------
https://unit42.paloaltonetworks.com/glupteba-malware-uefi-bootkit/
∗∗∗ Bitdefender warnt vor neuer Backdoor für macOS ∗∗∗
---------------------------------------------
Sie bleibt vermutlich mindestens drei Monate unentdeckt. RustDoor erlaubt die gezielte Suche nach Daten und deren Übertragung an einen externen Server.
---------------------------------------------
https://www.zdnet.de/88414203/bitdefender-warnt-vor-neuer-backdoor-fuer-mac…
∗∗∗ Angreifer spoofen Temu ∗∗∗
---------------------------------------------
Die Popularität des E-Commerce-Shops lockt Betrüger, die sich auf gefälschte Werbegeschenkcodes spezialisieren.
---------------------------------------------
https://www.zdnet.de/88414209/angreifer-spoofen-temu/
=====================
= Vulnerabilities =
=====================
∗∗∗ ExpressVPN: Fehler führt zu ungeschützter Übertragung von DNS-Anfragen ∗∗∗
---------------------------------------------
Durch den Fehler können Drittanbieter potenziell nachverfolgen, welche Webseiten ExpressVPN-Nutzer besucht haben - trotz aktiver VPN-Verbindung.
---------------------------------------------
https://www.golem.de/news/expressvpn-fehler-fuehrt-zu-ungeschuetzter-uebert…
∗∗∗ CISA Adds One Known Exploited Vulnerability to Catalog ∗∗∗
---------------------------------------------
CVE-2024-21762 Fortinet FortiOS Out-of-Bound Write Vulnerability
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/02/09/cisa-adds-one-known-expl…
∗∗∗ CISA Adds One Known Exploited Vulnerability to Catalog ∗∗∗
---------------------------------------------
CVE-2023-43770 Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/02/12/cisa-adds-one-known-expl…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libgit2), Fedora (chromium, firecracker, libkrun, openssh, python-nikola, runc, rust-event-manager, rust-kvm-bindings, rust-kvm-ioctls, rust-linux-loader, rust-userfaultfd, rust-versionize, rust-vhost, rust-vhost-user-backend, rust-virtio-queue, rust-vm-memory, rust-vm-superio, rust-vmm-sys-util, virtiofsd, webkitgtk, and wireshark), Mageia (filezilla and xpdf), Oracle (gimp), Red Hat (libmaxminddb, linux-firmware, squid:4, and tcpdump), Slackware (xpdf), SUSE (cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont and suse-build-key), and Ubuntu (python-glance-store and webkit2gtk).
---------------------------------------------
https://lwn.net/Articles/961842/
∗∗∗ Mehrere Cross-Site Scripting Schwachstellen in Statamic CMS ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/mehrere-cross-site-sc…
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 08-02-2024 18:00 − Freitag 09-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ SonicOS SSL-VPN: Angreifer können Authentifzierung umgehen ∗∗∗
---------------------------------------------
Sonicwall warnt vor einer Sicherheitslücke im SonicOS SSL-VPN, durch die Angreifer die Authentifizierung umgehen können.
---------------------------------------------
https://www.heise.de/-9623611.html
∗∗∗ Sicherheitsupdates: Authentifizierung von Ivanti Connect Secure & Co. defekt ∗∗∗
---------------------------------------------
Angreifer können ohne Anmeldung auf Ivanti Connect Secure, Policy Secure und ZTA Gateway zugreifen.
---------------------------------------------
https://www.heise.de/-9623653.html
∗∗∗ Elastic Stack: Pufferüberlauf ermöglicht Codeschmuggel in Kibana-Komponente ∗∗∗
---------------------------------------------
Der in Kibana integrierte Chromium-Browser verursachte das Problem nur auf bestimmten Plattformen. Updates und eine Übergangslösung stehen bereit.
---------------------------------------------
https://www.heise.de/-9624274.html
∗∗∗ Android XLoader malware can now auto-execute after installation ∗∗∗
---------------------------------------------
A new version of the XLoader Android malware was discovered that automatically executes on devices it infects, requiring no user interaction to launch.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/android-xloader-malware-can-…
∗∗∗ New RustDoor macOS malware impersonates Visual Studio update ∗∗∗
---------------------------------------------
A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-rustdoor-macos-malware-i…
∗∗∗ Form Tools Remote Code Execution: We Need To Talk About PHP ∗∗∗
---------------------------------------------
To whet your appetite for what we’re going to demonstrate, below is a deep dive into a Local File Inclusion vulnerability which can lead to Remote Code Execution in installations of ‘Form Tools’, an open-source PHP-based application for creating, storing and sharing forms on the Internet, of over 15 year vintage. A short search across open data platforms reveals over 1,000 installations with "we just discovered Shodan"-tier fingerprints.
---------------------------------------------
https://labs.watchtowr.com/form-tools-we-need-to-talk-about-php/
∗∗∗ Juniper Support Portal Exposed Customer Device Info ∗∗∗
---------------------------------------------
Until earlier this week, the support website for networking equipment vendor Juniper Networks was exposing potentially sensitive information tied to customer products, including the exact devices each customer bought, as well as each devices warranty status, service contracts and serial numbers. Juniper said it has since fixed the problem, and that the inadvertent data exposure stemmed from a recent upgrade to its support portal.
---------------------------------------------
https://krebsonsecurity.com/2024/02/juniper-support-portal-exposed-customer…
∗∗∗ Zahlreiche betrügerische E-Mails im Namen der Österreichischen Gesundheitskasse im Umlauf! ∗∗∗
---------------------------------------------
Derzeit werden der Watchlist Internet zahlreiche E-Mails gemeldet, die Kriminelle im Namen der Österreichischen Gesundheitskasse versenden. Angeblich erhalten die Empfänger:innen eine Rückerstattung durch die Krankenasse. Dazu sollen sie einen Link anklicken und Kreditkartendaten eingeben. Machen Sie das auf keinen Fall, da es sich um eine Phishing-Falle handelt.
---------------------------------------------
https://www.watchlist-internet.at/news/zahlreiche-betruegerische-e-mails-im…
∗∗∗ CISA Partners With OpenSSF Securing Software Repositories Working Group to Release Principles for Package Repository Security ∗∗∗
---------------------------------------------
Today, CISA partnered with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to publish the Principles for Package Repository Security framework. Recognizing the critical role package repositories play in securing open source software ecosystems, this framework lays out voluntary security maturity levels for package repositories.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/02/08/cisa-partners-openssf-se…
∗∗∗ Raspberry Robin: Evolving Cyber Threat with Advanced Exploits and Stealth Tactics ∗∗∗
---------------------------------------------
Raspberry Robin leverages new 1-day Local Privilege Escalation (LPE) exploits developed ahead of public knowledge, hinting at either an in-house development capability or access to a sophisticated exploit market.
---------------------------------------------
https://blog.checkpoint.com/security/raspberry-robin-evolving-cyber-threat-…
∗∗∗ January 2024’s Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats ∗∗∗
---------------------------------------------
Researchers uncovered a large cyber threat distributor known as VexTrio, which serves as a major traffic broker for cybercriminals to distribute malicious content. Meanwhile, LockBit3 topped the list of active ransomware groups and Education was the most impacted industry worldwide
---------------------------------------------
https://blog.checkpoint.com/research/january-2024s-most-wanted-malware-majo…
∗∗∗ Niederlande: Militärnetzwerk über FortiGate gehackt; Volt Typhoon-Botnetz seit 5 Jahren in US-Systemen ∗∗∗
---------------------------------------------
Gerade ist eine Spionageaktion der chinesischen Regierung in einem Computernetzwerk des niederländischen Militärs aufgeflogen. Das Militärnetzwerk wurde über eine Schwachstelle in FortiGate gehackt. Das ist auch für andere Fortinet-Kunden relevant. Und mittlerweile wurde bekannt, dass das mutmaßlich von staatsnahen chinesischen [...]
---------------------------------------------
https://www.borncity.com/blog/2024/02/08/niederlande-militrnetzwerk-ber-for…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (webkit2gtk), Fedora (atril, chromium, gnutls, python-aiohttp, and webkitgtk), Gentoo (libxml2), Mageia (gnutls, gpac, kernel, kernel-linus, microcode, pam, and postfix), Red Hat (container-tools:2.0, container-tools:3.0, container-tools:4.0, container-tools:rhel8, gimp, libmaxminddb, python-pillow, runc, and unbound), SUSE (cosign, netpbm, python, python-Pillow, python3, and python36), and Ubuntu (libde265, linux-gcp, linux-gcp-5.4, and linux-intel-iotg).
---------------------------------------------
https://lwn.net/Articles/961584/
∗∗∗ Kritische Sicherheitslücken in Fortinet FortiOS, Updates verfügbar ∗∗∗
---------------------------------------------
Fortinet hat zwei kritische Security Advisories veröffentlicht. Beide Security Advisories behandeln Sicherheitslücken, die es unauthentifizierten Angreifer:innen erlauben, Code auf betroffenen Geräten auszuführen. Fortinet gibt bezüglich einer dieser Sicherheitslücken an, dass diese potentiell bereits aktiv für Angriffe ausgenutzt wird.
---------------------------------------------
https://cert.at/de/warnungen/2024/2/kritische-sicherheitslucken-in-fortinet…
∗∗∗ Wichtige ESET Produkt-Updates verfügbar (8. Feb. 2024) ∗∗∗
---------------------------------------------
Kurzer, weiterer Informationssplitter für Administratoren, die ESET Endpoint Antivirus/Security unter Windows einsetzen. Der Hersteller hat ein wichtiges Produkt-Update für seine Windows-Produktlinie herausgegeben, welches sofort installiert werden sollte. Das Update behebt eine Schwachstelle, [...]
---------------------------------------------
https://www.borncity.com/blog/2024/02/08/wichtige-eset-produkt-updates-verf…
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ FortiClientEMS - Improper privilege management for site super administrator ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-23-357
∗∗∗ FortiManager - Informative error messages ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-23-268
∗∗∗ FortiNAC - XSS in Show Audit Log ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-23-063
∗∗∗ FortiOS - Format String Bug in fgfmd ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-24-029
∗∗∗ FortiOS - Fortilink lack of certificate validation ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-23-301
∗∗∗ FortiOS - Out-of-bound Write in sslvpnd ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-24-015
∗∗∗ FortiOS & FortiProxy - CVE-2023-44487 - Rapid Reset HTTP/2 vulnerability ∗∗∗
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-23-397
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 07-02-2024 18:00 − Donnerstag 08-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Fortinet: APTs Exploiting FortiOS Vulnerabilities in Critical Infrastructure Attacks ∗∗∗
---------------------------------------------
One of the exploited vulnerabilities is CVE-2022-42475, which Fortinet patched in December 2022, when it warned that it had been aware of in-the-wild exploitation. [..] The second vulnerability described in Fortinet’s new warning is CVE-2023-27997, which came to light in June 2023, when the cybersecurity firm informed customers that it had been exploited as a zero-day in limited attacks. Fortinet noted on Wednesday that some customers have yet to patch the two FortiOS vulnerabilities and the company has seen several attacks and attack clusters, including ones aimed at the government, service provider, manufacturing, consultancy, and critical infrastructure sectors.
---------------------------------------------
https://www.securityweek.com/fortinet-apts-exploiting-fortios-vulnerabiliti…
∗∗∗ State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ∗∗∗
---------------------------------------------
CISA, NSA, FBI and the following partners are releasing this advisory to warn critical infrastructure organizations about this assessment, which is based on observations from the U.S. authoring agencies’ incident response activities at critical infrastructure organizations compromised by the PRC state-sponsored cyber group known as Volt Typhoon (also known as Vanguard Panda, BRONZE SILHOUETTE, Dev-0391, UNC3236, Voltzite, and Insidious Taurus).
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
∗∗∗ Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure ∗∗∗
---------------------------------------------
Fortinet is warning of two new unpatched patch bypasses for a critical remote code execution vulnerability in FortiSIEM, Fortinets SIEM solution. [..] Earlier today, BleepingComputer published an article that the CVEs were released by mistake after being told by Fortinet that they were duplicates of the original CVE-2023-34992. [..] After contacting Fortinet once again, we were told their previous statement was “misstated” and that the two new CVEs are variants of the original flaw.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-fortis…
∗∗∗ Coyote: A multi-stage banking Trojan abusing the Squirrel installer ∗∗∗
---------------------------------------------
We will delve into the workings of the infection chain and explore the capabilities of the new Trojan that specifically targets users of more than 60 banking institutions, mainly from Brazil.
---------------------------------------------
https://securelist.com/coyote-multi-stage-banking-trojan/111846/
∗∗∗ Facebook ads push new Ov3r_Stealer password-stealing malware ∗∗∗
---------------------------------------------
A new password-stealing malware named Ov3r_Stealer is spreading through fake job advertisements on Facebook, aiming to steal account credentials and cryptocurrency.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/facebook-ads-push-new-ov3r-s…
∗∗∗ The toothbrush DDoS attack: How misinformation spreads in the cybersecurity world ∗∗∗
---------------------------------------------
No, three million smart toothbrushes didnt launch a DDoS attack against a Swiss company.
---------------------------------------------
https://grahamcluley.com/the-toothbrush-ddos-attack-how-misinformation-spre…
∗∗∗ Fake LastPass password manager spotted on Apple’s App Store ∗∗∗
---------------------------------------------
LastPass is warning that a fake copy of its app is being distributed on the Apple App Store, likely used as a phishing app to steal users' credentials.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fake-lastpass-password-manag…
=====================
= Vulnerabilities =
=====================
∗∗∗ FortiGate / FortiOS 7.4.3 FortiOS Release Notes ∗∗∗
---------------------------------------------
2024-02-07 Initial release
---------------------------------------------
https://docs.fortinet.com/document/fortigate/7.4.3/fortios-release-notes/55…
∗∗∗ SonicOS SSL-VPN Improper Authentication ∗∗∗
---------------------------------------------
An improper authentication vulnerability has been identified in SonicWall SonicOS SSL-VPN feature, which in specific conditions could allow a remote attacker to bypass authentication.This issue affects only firmware version SonicOS 7.1.1-7040. CVE: CVE-2024-22394 Last updated: Feb. 6, 2024, 4:44 p.m.
---------------------------------------------
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0003
∗∗∗ SSD Advisory – TOTOLINK LR1200GB Auth Bypass ∗∗∗
---------------------------------------------
A vulnerability in TOTOLINK LR1200GB allows remote unauthenticated attackers to become authenticated due to a stack overflow vulnerability in the web interface. [..] Multiple emails to the vendor went unanswered, we are releasing this information without being able to get from the vendor a patch or response.
---------------------------------------------
https://ssd-disclosure.com/ssd-advisory-totolink-lr1200gb-auth-bypass/
∗∗∗ Sicherheitslücken: Codeschmuggel und Leistungsverweigerung bei ClamAV ∗∗∗
---------------------------------------------
Der Parser für das OLE2-Dateiformat enthält einen Pufferüberlauf und mit speziell präparierten Dateinamen lassen sich offenbar eigene Befehlszeilen ausführen.
---------------------------------------------
https://www.heise.de/-9622674
∗∗∗ Samsung Magician: Update stopft Sicherheitsleck im SSD-Tool ∗∗∗
---------------------------------------------
Samsung bietet mit Magician eine Software zum Verwalten von SSDs, Speichersticks und -Karten des Herstellers. Ein Update schließt eine Lücke darin.
---------------------------------------------
https://www.heise.de/-9622729
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium), Red Hat (gimp, kernel, kernel-rt, and runc), Slackware (expat), SUSE (libavif), and Ubuntu (linux, linux-aws, linux-aws-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-kvm, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux-oracle-5.15, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-oracle, linux-oracle-5.4, linux-xilinx-zynqmp, and linux, linux-aws, linux-gcp, linux-hwe-6.5, linux-laptop, linux-lowlatency, linux-lowlatency-hwe-6.5, linux-oem-6.5, linux-oracle, linux-raspi, linux-starfive).
---------------------------------------------
https://lwn.net/Articles/961330/
∗∗∗ Drupal: Migrate Tools - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2024-008 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2024-008
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Wordfence Intelligence Weekly WordPress Vulnerability Report (January 29, 2024 to February 4, 2024) ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2024/02/wordfence-intelligence-weekly-wordpr…
∗∗∗ Qolsys IQ Panel 4, IQ4 HUB ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-039-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 06-02-2024 18:00 − Mittwoch 07-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Fortinet snafu: Critical FortiSIEM CVEs are duplicates, issued in error ∗∗∗
---------------------------------------------
It turns out that critical Fortinet FortiSIEM vulnerabilities tracked as CVE-2024-23108 and CVE-2024-23109 are not new and have been published this year in error.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fortinet-snafu-critical-fort…
∗∗∗ Schlüssel ausgelesen: Bastler umgeht Bitlocker-Schutz mit Raspberry Pi Pico ∗∗∗
---------------------------------------------
Möglich war ihm dies durch das Abfangen der Kommunikation des auf dem Mainboard des Notebooks verlöteten TPM-Chips mit der CPU. [..] Auf die Möglichkeit solcher Angriffe auf Systeme mit externen TPM-Chips wiesen Sicherheitsforscher schon im Sommer 2021 hin. Grund dafür sei die unverschlüsselte Übertragung des Verschlüsselungsschlüssels, so dass sich der Schlüssel einfach über die Kontakte des TPMs abfangen lasse, hieß es schon damals.
---------------------------------------------
https://www.golem.de/news/schluessel-ausgelesen-bastler-umgeht-bitlocker-sc…
∗∗∗ Unleashing the Power of Scapy for Network Fuzzing ∗∗∗
---------------------------------------------
Cybersecurity is a critical aspect of any network or software system, and fuzzing is arguably one of the most potent techniques used to identify such security vulnerabilities. Fuzzing involves injecting unexpected or invalid data into the system, which can trigger unforeseen behaviours, potentially leading to security breaches or crashes. Scapy is one of the many tools that can be used for fuzzing, and it stands out as a versatile and efficient option.
---------------------------------------------
https://www.darkrelay.com/post/unleashing-the-power-of-scapy-for-network-fu…
∗∗∗ Anydesk-Einbruch: Französisches BSI-Pendant vermutet Dezember als Einbruchsdatum ∗∗∗
---------------------------------------------
Der IT-Sicherheitsvorfall bei Anydesk datiert womöglich auf den Dezember 2023, wie den Hinweisen der französischen IT-Sicherheitsbehörde zu entnehmen ist.
---------------------------------------------
https://www.heise.de/news/Anydesk-Einbruch-datiert-vermutlich-auf-Dezember-…
∗∗∗ E-Mail von DNS EU ist betrügerisch ∗∗∗
---------------------------------------------
Derzeit erhalten viele Website-Betreiber:innen E-Mails von einer vermeintlichen Firma namens DNS EU. Im E-Mail behauptet das Unternehmen, dass es einen „Registrierungsantrag“ für eine Domain erhalten hat, die Ihrer eigenen Domain sehr ähnlich ist. Ihnen wird angeboten, diese Domain für € 297,50 zu kaufen. Ignorieren Sie dieses E-Mail, das Angebot ist Fake.
---------------------------------------------
https://www.watchlist-internet.at/news/e-mail-von-dns-eu-ist-betruegerisch/
∗∗∗ Vermehrte Ransomware-Angriffe mit Lockbit 3.0 ∗∗∗
---------------------------------------------
In den letzten Tagen sind österreichische Unternehmen und Organisationen vermehrt von Angriffen mit der Ransomware Lockbit 3.0 betroffen. Dabei handelt es sich um Ransomware-as-a-Service, was es einer Vielzahl von Kriminellen ermöglicht, unabhängig voneinander zu agieren und eine grössere Anzahl von Zielen zu attackieren. Bedrohungsakteure, die im Rahmen ihrer Angriffe Lockbit 3.0 einsetzen erlangen vor allem über den Missbrauch von RDP-Verbindungen (beispielsweise unter Einsatz anderweitig gestohlener Zugangsdaten) und die Ausnutzung von Schwachstellen in aus dem Internet erreichbaren Applikationen Zugang zu den Netzwerken ihrer Opfer. Wir empfehlen nachdrücklich, die eigenen Sicherheitsmaßnahmen zu überprüfen [..]
---------------------------------------------
https://cert.at/de/aktuelles/2024/2/vermehrte-ransomware-angriffe-mit-lockb…
∗∗∗ Cyber Security Glossary: The Ultimate List ∗∗∗
---------------------------------------------
If you have anything to do with cyber security, you know it employs its own unique and ever-evolving language. Jargon and acronyms are the enemies of clear writing—and are beloved by cyber security experts. So Morphisec has created a comprehensive cyber security glossary that explains commonly used cybersecurity terms, phrases, and technologies. We designed this list to demystify the terms that security professionals use when describing security tools, threats, processes, and techniques. We will periodically update it, and hope you find it useful.
---------------------------------------------
https://blog.morphisec.com/cyber-security-glossary
=====================
= Vulnerabilities =
=====================
∗∗∗ Kritische Sicherheitslücke in JetBrains TeamCity On-Premises ∗∗∗
---------------------------------------------
Das Softwareunternehmen JetBrains hat Informationen über eine kritische Sicherheitslücke in JetBrains TeamCity On-Premises veröffentlicht. Eine Ausnutzung der Schwachstelle, CVE-2024-23917, erlaubt unauthentifizierten Angreifer:innen mit HTTP(s)-Zugriff auf eine verwundbare Instanz von TeamCity das Umgehen von Authentifizierungskontrollen und somit die vollständige Übernahme der betroffenen Installation.
---------------------------------------------
https://cert.at/de/aktuelles/2024/2/kritische-sicherheitslucke-in-jetbrains…
∗∗∗ Shim: Kritische Schwachstelle gefährdet Secure Boot unter Linux ∗∗∗
---------------------------------------------
In einer von den meisten gängigen Linux-Distributionen verwendeten EFI-Anwendung namens Shim wurde eine kritische Schwachstelle entdeckt, die es Angreifern ermöglicht, Schadcode auszuführen und die vollständige Kontrolle über ein Zielsystem zu übernehmen. Ausgenutzt werden könne der Fehler durch eine speziell gestaltete HTTP-Anfrage, die zu einem kontrollierten Out-of-bounds-Schreibvorgang führe, heißt es in der Beschreibung zu CVE-2023-40547.
---------------------------------------------
https://www.golem.de/news/shim-kritische-schwachstelle-gefaehrdet-secure-bo…
∗∗∗ Zeroshell vulnerable to OS command injection ∗∗∗
---------------------------------------------
Zeroshell Linux distribution contains an OS command injection vulnerability. This vulnerability was reported on August 2020. The Zeroshell project reached EOL on April 2021. The communication with the developer was established on November 2023, and this JVN publication was agreed upon.
---------------------------------------------
https://jvn.jp/en/jp/JVN44033918/
∗∗∗ Cisco: (High) ClamAV OLE2 File Format Parsing Denial of Service Vulnerability ∗∗∗
---------------------------------------------
A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. CVE-2024-20290
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ Cisco: (Critical) Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities ∗∗∗
---------------------------------------------
Multiple vulnerabilities in the Cisco Expressway Series could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks, which could allow the attacker to perform arbitrary actions on an affected device. CVE-2024-20255, CVE-2024-20254, CVE-2024-20252
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdviso…
∗∗∗ SolarWinds Platform 2024.1 Release Notes ∗∗∗
---------------------------------------------
SQL Injection Remote Code Execution Vulnerability was found using an update statement in the SolarWinds Platform. This vulnerability requires user authentication to be exploited and has not been reported outside of the initial report by the researcher. 8.0 High, CVE-2023-50395, CVE-2023-35188
---------------------------------------------
https://documentation.solarwinds.com/en/success_center/orionplatform/conten…
∗∗∗ VMware Aria: Sicherheitslücken erlauben etwa Rechteausweitung ∗∗∗
---------------------------------------------
Insgesamt fünf Sicherheitslücken dichtet VMware in Aria Operations for Networks – ehemals mit dem Namen vRealize im Umlauf – mit aktualisierter Software ab. Der Schweregrad reicht nach Einschätzung der Entwickler des Unternehmens bis zur Risikostufe "hoch". Bösartige Akteure können durch die Schwachstellen unbefugt ihre Rechte an verwundbaren Systemen erhöhen.
---------------------------------------------
https://www.heise.de/-9621415
∗∗∗ Rechtausweitung durch Lücken in Veeam Recovery Orchestrator möglich ∗∗∗
---------------------------------------------
Veeam flickt die Recovery Orchestrator-Software. Sicherheitslücken darin erlauben bösartigen Akteuren die Ausweitung von Rechten.
---------------------------------------------
https://www.heise.de/-9621609
∗∗∗ Sicherheitsupdates: Dell schließt ältere Lücken in Backuplösungen wie Avamar ∗∗∗
---------------------------------------------
Schwachstellen in Komponenten von Drittanbietern gefährden die Sicherheit von Dell-Backup-Software. Sicherheitsupdates sind verfügbar.
---------------------------------------------
https://www.heise.de/9621283
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Red Hat (gimp) and Ubuntu (firefox, linux-oracle, linux-oracle-5.15, and python-django).
---------------------------------------------
https://lwn.net/Articles/961173/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Google Chrome 121.0.6167.160/161 / 120.0.6099.283 mit Sicherheitsfixes ∗∗∗
---------------------------------------------
https://www.borncity.com/blog/2024/02/07/google-chrome-121-0-6167-160-161-1…
∗∗∗ [R1] Nessus Version 10.7.0 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2024-01
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 05-02-2024 18:00 − Dienstag 06-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Rust Won’t Save Us: An Analysis of 2023’s Known Exploited Vulnerabilities ∗∗∗
---------------------------------------------
We have analyzed all critical vulnerabilities from the CISA KEV catalog starting from January 2023 through January 2024, categorized the vulnerability root causes, and attempted to analyze if the current efforts in the information security industry match with the current threat vectors being abused.
---------------------------------------------
https://www.horizon3.ai/analysis-of-2023s-known-exploited-vulnerabilities/
∗∗∗ Unseriöse Dirndl-Shops drohen mit Anzeige? Ignorieren Sie die Nachrichten! ∗∗∗
---------------------------------------------
Zahlreiche Betroffene wenden sich aktuell an die Watchlist Internet, weil unseriöse Bekleidungs- und Dirndl-Shops Monate nach den Bestellungen versuchen, Kund:innen einzuschüchtern und zu einer Zahlung zu drängen. Da völlig falsche Produkte geliefert wurden, besteht aber kein Grund zur Zahlung und somit auch kein Grund zur Sorge!
---------------------------------------------
https://www.watchlist-internet.at/news/unserioese-dirndl-shops-drohen-mit-a…
∗∗∗ How are user credentials stolen and used by threat actors? ∗∗∗
---------------------------------------------
You’ve probably heard the phrase, “Attackers don’t hack anyone these days. They log on.” In this blog, we describe the various tools and techniques bad actors are using to steal credentials so they can log on with valid account details, and outline our recommendations for defense.
---------------------------------------------
https://blog.talosintelligence.com/how-are-user-credentials-stolen-and-used…
∗∗∗ Navigating the Rising Tide of CI/CD Vulnerabilities: The Jenkins and TeamCity Case Studies ∗∗∗
---------------------------------------------
In the evolving landscape of cybersecurity, a new threat has emerged, targeting the core of software development processes. Recently, an alarming incident has brought to light a significant vulnerability in Jenkins CI/CD servers. Approximately 45,000 Jenkins servers have been left exposed to remote code execution (RCE) attacks, leveraging multiple exploit public POCs. This breach is not just a standalone event but a symptom of a growing trend of attacks on Continuous Integration/Continuous Deployment (CI/CD) software supply chains.
---------------------------------------------
https://checkmarx.com/blog/navigating-the-rising-tide-of-ci-cd-vulnerabilit…
∗∗∗ Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services ∗∗∗
---------------------------------------------
Three new security vulnerabilities have been discovered in Azure HDInsights Apache Hadoop, Kafka, and Spark services that could be exploited to achieve privilege escalation and a regular expression denial-of-service (ReDoS) condition. [..] Following responsible disclosure, Microsoft has rolled out fixes as part of updates released on October 26, 2023.
---------------------------------------------
https://thehackernews.com/2024/02/high-severity-flaws-found-in-azure.html
∗∗∗ Exploring the (Not So) Secret Code of Black Hunt Ransomware ∗∗∗
---------------------------------------------
In this analysis we examined the BlackHunt sample shared on X (formerly Twitter). During our analysis we found notable similarities between BlackHunt ransomware and LockBit, which suggested that it uses leaked code of Lockbit. In addition, it uses some techniques similar to REvil ransomware.
---------------------------------------------
https://www.rapid7.com/blog/post/2024/02/05/exploring-the-not-so-secret-cod…
=====================
= Vulnerabilities =
=====================
∗∗∗ Patchday Android: Kritische Schadcode-Lücke auf Systemebene geschlossen ∗∗∗
---------------------------------------------
Mehrere Sicherheitslücken gefährden Android-Geräte. Für bestimmte Smartphones und Tablets sind Updates erschienen.
---------------------------------------------
https://www.heise.de/-9619910
∗∗∗ Sicherheitsupdate: Mehrere Lücken gefährden Server-Monitoring-Tool Nagios XI ∗∗∗
---------------------------------------------
Unter bestimmten Bedingungen können Angreifer Schadcode auf Server mit Nagios XI laden. Ein Sicherheitsupdate schließt diese und weitere Schwachstellen.
---------------------------------------------
https://www.heise.de/-9620155
∗∗∗ Kritische Schwachstellen in Multifunktions- und Laserdruckern von Canon ∗∗∗
---------------------------------------------
Canon warnt vor kritischen Sicherheitslücken in einigen SOHO-Multifunktions- und Laserdruckern. Gegenmaßnahmen sollen helfen.
---------------------------------------------
https://www.heise.de/-9620345
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (firefox, gstreamer1-plugins-bad-free, and tigervnc), Debian (ruby-sanitize), Fedora (kernel, kernel-headers, qt5-qtwebengine, and runc), Oracle (gnutls, kernel, libssh, rpm, runc, and tigervnc), Red Hat (runc), and SUSE (bouncycastle, jsch, python, and runc).
---------------------------------------------
https://lwn.net/Articles/961083/
∗∗∗ WebKitGTK and WPE WebKit Security Advisory WSA-2024-0001 ∗∗∗
---------------------------------------------
CVE identifiers: CVE-2024-23222, CVE-2024-23206, CVE-2024-23213, CVE-2023-40414, CVE-2023-42833, CVE-2014-1745
---------------------------------------------
https://webkitgtk.org/security/WSA-2024-0001.html
∗∗∗ CISA Adds One Known Exploited Vulnerability to Catalog ∗∗∗
---------------------------------------------
Google Chromium V8 Type Confusion Vulnerability CVE-2023-4762
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/02/06/cisa-adds-one-known-expl…
∗∗∗ MISP 2.4.184 released with performance improvements, security and bugs fixes. ∗∗∗
---------------------------------------------
A series of security fixes were done in this release, the vulnerabilities are accessible to authenticated users, especially those with specific privileges like Org admin. We urge users to update to this version especially if you have different organisations having access to your instances.
---------------------------------------------
https://github.com/MISP/MISP/releases/tag/v2.4.184
∗∗∗ ZDI-24-086: TP-Link Omada ER605 Access Control Command Injection Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-086/
∗∗∗ ZDI-24-085: (Pwn2Own) TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer Overflow Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-085/
∗∗∗ ZDI-24-087: (Pwn2Own) Western Digital MyCloud PR4100 RESTSDK Server-Side Request Forgery Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-24-087/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Pilz: Multiple products affected by uC/HTTP vulnerability ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2024-002/
∗∗∗ HID Global Encoders ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01
∗∗∗ HID Global Reader Configuration Cards ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 02-02-2024 18:00 − Montag 05-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Newest Ivanti SSRF zero-day now under mass exploitation ∗∗∗
---------------------------------------------
An Ivanti Connect Secure and Ivanti Policy Secure server-side request forgery (SSRF) vulnerability tracked as CVE-2024-21893 is currently under mass exploitation by multiple attackers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/newest-ivanti-ssrf-zero-day-…
∗∗∗ Cyberangriff: Fernwartungssoftware-Anbieter Anydesk gehackt ∗∗∗
---------------------------------------------
Anydesk ist Opfer eines Cyberangriffs geworden. Die Folgen sind noch nicht klar, aber möglicherweise gravierend.
---------------------------------------------
https://www.golem.de/news/cyberangriff-fernwartungssoftware-anbieter-anydes…
∗∗∗ Darknet: Anydesk-Zugangsdaten in Hackerforen aufgetaucht ∗∗∗
---------------------------------------------
Quelle der Daten ist nach aktuellen Erkenntnissen wohl nicht der jüngste Sicherheitsvorfall bei Anydesk. Ein Passwortwechsel wird dennoch empfohlen.
---------------------------------------------
https://www.golem.de/news/darknet-anydesk-zugangsdaten-in-hackerforen-aufge…
∗∗∗ How to hack the Airbus NAVBLUE Flysmart+ Manager ∗∗∗
---------------------------------------------
Airbus Navblue Flysmart+ Manager allowed attackers to tamper with the engine performance calculations and intercept data. Flysmart+ is a suite of apps for pilot EFBs, helping deliver efficient and safe departure and arrival of flights. Researchers from Pen Test Partners discovered a vulnerability in Navblue Flysmart+ Manager that can be exploited [...]
---------------------------------------------
https://securityaffairs.com/158661/hacking/airbus-flysmart-flaw.html
∗∗∗ Encrypted Attacks: Impact on Public Sector ∗∗∗
---------------------------------------------
Following FBI and CISA warnings to public sector defenders in November regarding increased targeting by infamous ransomware groups, the imperative to understand and defend against evolving - and increasingly covert - cyber threats has intensified. According to Zscaler ThreatLabz analysis of the 2023 threat landscape, 86% of threats hide within encrypted traffic. What does this mean for the public sector?
---------------------------------------------
https://www.zscaler.com/blogs/security-research/encrypted-attacks-impact-pu…
∗∗∗ Hacking a Smart Home Device ∗∗∗
---------------------------------------------
How I reverse engineered an ESP32-based smart home device to gain remote control access and integrate it with Home Assistant.
---------------------------------------------
https://jmswrnr.com/blog/hacking-a-smart-home-device
∗∗∗ Videokonferenz voller KI-Klone: Angestellter schickt Betrügern 24 Millionen Euro ∗∗∗
---------------------------------------------
Bislang werden im Rahmen der "Chef-Masche" Angestellte zumeist von einer Person überzeugt, Geld herauszugeben. Ein Fall in Hongkong hat nun eine neue Qualität.
---------------------------------------------
https://www.heise.de/-9618064.html
∗∗∗ Hartkodiertes Passwort: Wärmepumpen von Alpha Innotec und Novelan angreifbar ∗∗∗
---------------------------------------------
Ein IT-Forscher hat in der Firmware von Alpha Innotec- und Novelan-Wärmepumpen das hartkodierte Root-Passwort gefunden. Updates bieten Abhilfe.
---------------------------------------------
https://www.heise.de/-9618846.html
∗∗∗ Ivanti Zero Day – Threat Actors observed leveraging CVE-2021-42278 and CVE-2021-42287 for quick privilege escalation to Domain Admin ∗∗∗
---------------------------------------------
TL;dr NCC Group has observed what we believe to be the attempted exploitation of CVE-2021-42278 and CVE-2021-42287 as a means of privilege escalation, following the successful compromise of an Ivanti Secure Connect VPN using the following zero-day vulnerabilities reported by Volexity1 on 10/01/2024: [...]
---------------------------------------------
https://research.nccgroup.com/2024/02/05/ivanti-zero-day-threat-actors-obse…
∗∗∗ Achtung: E-Card mit 500 Euro Guthaben für Apothekenkäufe ist Fake ∗∗∗
---------------------------------------------
Auf Facebook wird eine „E-Card-Gutscheinkarte“ beworben. Wenn Sie eine kurze Umfrage ausfüllen und 2 Euro überweisen, erhalten Sie angeblich 500 Euro für Apothekeneinkäufe. Achtung, dabei handelt es sich um Betrug. Ein solches Angebot gibt es nicht!
---------------------------------------------
https://www.watchlist-internet.at/news/achtung-e-card-mit-500-euro-guthaben…
∗∗∗ Sicherheitsvorfall bei der AnyDesk Software GmbH ∗∗∗
---------------------------------------------
Der deutsche Softwarehersteller AnyDesk Software GmbH, Entwickler der Fernwartungssoftware AnyDesk, hat am Abend des 02.02.2024 im Rahmen einer Pressemeldung über einen erfolgreichen Angriff gegen seine Infrastruktur informiert. Laut dem Unternehmen wurde direkt nach Entdeckung des Vorfalles ein externer Sicherheitsdienstleister zur Behandlung des Vorfalls hinzugezogen und die zuständigen Behörden informiert. Weiters gibt das Unternehmen an, dass keinerlei private Schlüssel, [...]
---------------------------------------------
https://cert.at/de/aktuelles/2024/2/sicherheitsvorfall-bei-der-anydesk-soft…
=====================
= Vulnerabilities =
=====================
∗∗∗ Docker, Kubernetes und co.: Hacker können aus Containern auf Hostsysteme zugreifen ∗∗∗
---------------------------------------------
Die Schwachstellen dafür beziehen sich auf Buildkit und das CLI-Tool runc. Eine davon erreicht mit einem CVSS von 10 den maximal möglichen Schweregrad.
---------------------------------------------
https://www.golem.de/news/docker-kubernetes-und-co-hacker-koennen-aus-conta…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (rear, runc, sudo, and zbar), Fedora (chromium, grub2, libebml, mingw-python-pygments, and python-aiohttp), Gentoo (FreeType, GNAT Ada Suite, Microsoft Edge, NBD Tools, OpenSSL, QtGui, SDDM, Wireshark, and Xen), Mageia (dracut, glibc, nss and firefox, openssl, packages, perl, and thunderbird), Slackware (libxml2), SUSE (java-11-openjdk, java-17-openjdk, perl, python-uamqp, slurm, and xerces-c), and Ubuntu (libssh and openssl).
---------------------------------------------
https://lwn.net/Articles/960952/
∗∗∗ 2024-02-05: Cyber Security Advisory - B&R Automation Runtime FTP uses unsecure encryption mechanisms ∗∗∗
---------------------------------------------
https://www.br-automation.com/fileadmin/SA23P004_FTP_uses_unsecure_encrypti…
∗∗∗ Canon: CPE2024-001 – Regarding vulnerabilities for Small Office Multifunction Printers and Laser Printers – 05 February 2024 ∗∗∗
---------------------------------------------
https://www.canon-europe.com/support/product-security-latest-news/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ QNAP: Neue Firmware-Versionen beheben Befehlsschmuggel-Lücke ∗∗∗
---------------------------------------------
https://www.heise.de/-9617332.html
∗∗∗ IT-Sicherheitsüberwachung Juniper JSA für mehrere Attacken anfällig ∗∗∗
---------------------------------------------
https://www.heise.de/-9617677.html
∗∗∗ HCL schließt Sicherheitslücken in Bigfix, Devops Deploy und Launch ∗∗∗
---------------------------------------------
https://www.heise.de/-9618224.html
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 01-02-2024 18:00 − Freitag 02-02-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Abschaltbefehl: US-Behörden müssen Ivanti-Geräte vom Netz nehmen ∗∗∗
---------------------------------------------
In einer Notfallanordnung trägt die US-Cybersicherheitsbehörde betroffenen Stellen auf, in den nächsten Stunden zu handeln. Ivanti-Geräte sollen vom Netz.
---------------------------------------------
https://www.heise.de/news/Abschaltbefehl-US-Behoerden-muessen-Ivanti-Geraet…
∗∗∗ Bericht: Wie Angreifer in das Netzwerk von Cloudflare eingedrungen sind ∗∗∗
---------------------------------------------
Nach Abschluss der Untersuchungen eines IT-Sicherheitsvorfalls schildert der CDN-Betreiber Cloudflare, wie die Attacke abgelaufen ist.
---------------------------------------------
https://www.heise.de/news/Bericht-Wie-Angreifer-in-das-Netzwerk-von-Cloudfl…
∗∗∗ VajraSpy: Ein Patchwork-Sammelsurium voller Spionage-Apps ∗∗∗
---------------------------------------------
ESET-Forscher entdeckten mehrere Android-Apps, die VajraSpy beinhalten, ein RAT, der von der Patchwork APT-Gruppe verwendet wird.
---------------------------------------------
https://www.welivesecurity.com/fr/cybersecurite/vajraspy-ein-patchwork-samm…
∗∗∗ Scheinbar harmloser PDF-Viewer leert Bankkonten ahnungsloser Android-Nutzer:innen ∗∗∗
---------------------------------------------
Derzeit ist eine neue Welle von Schadsoftware im Umlauf, die bereits in der Vergangenheit zahlreiche Bankkonten leergeräumt hat. Es handelt sich dabei um den Banking-Trojaner Anatsa, der über die Installation von Apps wie PDF Viewer oder PDF Reader über den Google Play Store verbreitet wird.
---------------------------------------------
https://www.watchlist-internet.at/news/scheinbar-harmloser-pdf-viewer-leert…
∗∗∗ Exploring the Latest Mispadu Stealer Variant ∗∗∗
---------------------------------------------
Evaluation of a new variant of Mispadu, a banking Trojan, highlights how infostealers evolve over time and can be hard to pin to past campaigns.
---------------------------------------------
https://unit42.paloaltonetworks.com/mispadu-infostealer-variant/
∗∗∗ How Memory Forensics Revealed Exploitation of Ivanti Connect Secure VPN Zero-Day Vulnerabilities ∗∗∗
---------------------------------------------
As outlined in the previous blog series, while Volexity leveraged network packet captures and disk images to reconstruct parts of the attack, it was ultimately a memory sample that allowed Volexity to confirm exploitation.
---------------------------------------------
https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-expl…
∗∗∗ Threat Actors Installing Linux Backdoor Accounts ∗∗∗
---------------------------------------------
Threat actors install malware by launching brute force and dictionary attacks against Linux systems that are poorly managed, such as using default settings or having a simple password.
---------------------------------------------
https://asec.ahnlab.com/en/61185/
∗∗∗ How We Were Able to Infiltrate Attacker Telegram Bots ∗∗∗
---------------------------------------------
It is not uncommon for attackers to publish malicious packages that exfiltrate victims’ data to them using Telegram bots. However, what if we could eavesdrop on what the attacker sees?
---------------------------------------------
https://checkmarx.com/blog/how-we-were-able-to-infiltrate-attacker-telegram…
∗∗∗ Jenkins Vulnerability Estimated to Affect 43% of Cloud Environments ∗∗∗
---------------------------------------------
>From our scans on the Orca Cloud Security Platform, we found that 43% of organizations operate at least one unmanaged Jenkins server in their environment.
---------------------------------------------
https://orca.security/resources/blog/jenkins-arbitrary-file-read-vulnerabil…
=====================
= Vulnerabilities =
=====================
∗∗∗ CISA-Warnung: Alte iPhone-Schwachstelle wird aktiv ausgenutzt ∗∗∗
---------------------------------------------
Eine von Apple gestopfte Kernel-Lücke wird der US-Sicherheitsbehörde zufolge für Angriffe aktiv genutzt. Für ältere iPhones scheint es keinen Patch zu geben.
---------------------------------------------
https://www.heise.de/news/CISA-Warnung-Alte-iPhone-Schwachstelle-wird-aktiv…
∗∗∗ Sicherheitsupdate: IBM-Sicherheitslösung QRadar SIEM unter Linux angreifbar ∗∗∗
---------------------------------------------
Mehrere Komponenten eines Add ons von IBMs Security Information and Event Management-System QRadar sind verwundbar.
---------------------------------------------
https://www.heise.de/news/Sicherheitsupdate-IBM-Sicherheitsloesung-QRadar-S…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium, man-db, and openjdk-17), Fedora (chromium, indent, jupyterlab, kernel, and python-notebook), Gentoo (glibc), Oracle (firefox, thunderbird, and tigervnc), Red Hat (rpm), SUSE (cpio, gdb, gstreamer, openconnect, slurm, slurm_18_08, slurm_20_02, slurm_20_11, slurm_22_05, slurm_23_02, squid, webkit2gtk3, and xerces-c), and Ubuntu (imagemagick and xorg-server, xwayland).
---------------------------------------------
https://lwn.net/Articles/960604/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ QNAP Security Advisories ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisories/
∗∗∗ Moby and Open Container Initiative Release Critical Updates for Multiple Vulnerabilities Affecting Docker-related Components ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/02/01/moby-and-open-container-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 31-01-2024 18:00 − Donnerstag 01-02-2024 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Thomas Pribitzer
=====================
= News =
=====================
∗∗∗ Exploit released for Android local elevation flaw impacting 7 OEMs ∗∗∗
---------------------------------------------
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is now publicly available on GitHub. However, as the exploit requires local access, its release will mostly be helpful to researchers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/exploit-released-for-android…
∗∗∗ Hackers push USB malware payloads via news, media hosting sites ∗∗∗
---------------------------------------------
A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub, Vimeo, and Ars Technica, to host encoded payloads embedded in seemingly benign content.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-push-usb-malware-pay…
∗∗∗ The Fun and Dangers of Top Level Domains (TLDs), (Wed, Jan 31st) ∗∗∗
---------------------------------------------
In the beginning, life was easy. We had a very limited set of top-level domains: .com, .edu, .gov, ..int, org, .mil, .net, .org, .edu. In addition, we had .arpa for infrastructure use and various two letter country level domains. [..] But yesterday, I noticed some news about a new interesting TLD that you may want to consider adopting: .internal.
---------------------------------------------
https://isc.sans.edu/diary/rss/30608
∗∗∗ FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network ∗∗∗
---------------------------------------------
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network.
---------------------------------------------
https://thehackernews.com/2024/02/fritzfrog-returns-with-log4shell-and.html
∗∗∗ Stealthy Persistence & PrivEsc in Entra ID by using the Federated Auth Secondary Token-signing Cert. ∗∗∗
---------------------------------------------
Microsoft Entra ID (formerly known as Azure AD) offers a feature called federation that allows you to delegate authentication to another Identity Provider (IdP), such as AD FS with on-prem Active Directory. When users log in, they will be redirected to the external IdP for authentication, before being redirected back to Entra ID who will then verify the successful authentication on the external IdP and the user’s identity. [..] The external IdP signs the token with a private key, which has an associated public key stored in a certificate. [..] In this post, I’ll show you where this certificate can be found and how attackers can add it (given the necessary privileges) and use it to forge malicious tokens. Finally, I will provide some recommendations for defense in light of this.
---------------------------------------------
https://medium.com/tenable-techblog/stealthy-persistence-privesc-in-entra-i…
∗∗∗ OAS Engine Deep Dive: Abusing low-impact vulnerabilities to escalate privileges ∗∗∗
---------------------------------------------
Open Automation Software recently released patches for multiple vulnerabilities in their OAS Engine. Cisco Talos publicly disclosed these issues after working with Open Automation Software to ensure that patches were available for users. Now that a fix has been released with Version 19, we want to take the time to dive into a few of these vulnerabilities and show how a handful of bugs that could be viewed as low-impact could be exploited as a series to carry out various malicious actions, even going as far to gaining access to the underlying system.
---------------------------------------------
https://blog.talosintelligence.com/oas-engine-deep-dive/
=====================
= Vulnerabilities =
=====================
∗∗∗ Mastodon: Diebstahl beliebiger Identitäten im föderierten Kurznachrichtendienst ∗∗∗
---------------------------------------------
Angreifer können jeden beliebigen Account übernehmen und fälschen. [..] Die Sicherheitslücke hat die CVE-ID CVE-2024-23832 erhalten und hat immerhin 9,4 von 10 CVSS-Punkten. Es handelt sich nach Einschätzung des Mastodon-Teams um eine leicht aus der Ferne ausnutzbare Lücke, die keinerlei Vorbedingungen mitbringt. Weder muss der Angreifer über besondere Privilegien verfügen, noch einen legitimen Nutzer austricksen, etwa mit einem gefälschten Link. Weitere Details verraten die Entwickler erst am 15. Februar.
---------------------------------------------
https://www.heise.de/-9615961
∗∗∗ Security Update for Ivanti Connect Secure and Ivanti Policy Secure Gateways ∗∗∗
---------------------------------------------
Update 1 February: A patch addressing all known vulnerabilities is now available for Ivanti Connect Secure version 22.5R2.2 and Ivanti Policy Secure 22.5R1.1.
---------------------------------------------
https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-i…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (debian-security-support, firefox-esr, openjdk-11, and python-asyncssh), Fedora (glibc, python-templated-dictionary, thunderbird, and xorg-x11-server-Xwayland), Gentoo (Chromium, Google Chrome, Microsoft Edge and WebKitGTK+), Red Hat (firefox, gnutls, libssh, thunderbird, and tigervnc), SUSE (mbedtls, rear116, rear1172a, runc, squid, and tinyssh), and Ubuntu (glibc and runc).
---------------------------------------------
https://lwn.net/Articles/960436/
∗∗∗ Gessler GmbH WEB-MASTER ∗∗∗
---------------------------------------------
Successful exploitation of these vulnerabilities could allow a user to take control of the web management of the device. An attacker with access to the device could also extract and break the password hashes for all users stored on the device. CVSS v3 9.8
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-01
∗∗∗ Entity Delete Log - Moderately critical - Access bypass - SA-CONTRIB-2024-007 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2024-007
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Lexmark Security Advisories ∗∗∗
---------------------------------------------
https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisorie…
∗∗∗ Juniper: (Critical) 2024-01 Security Bulletin: JSA Series: Multiple vulnerabilities resolved in JSA Applications ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-S…
∗∗∗ Juniper: (Medium) 2024-01 Security Bulletin: JSA Series: Multiple vulnerabilities resolved in 7.5.0 UP7 IF04 ∗∗∗
---------------------------------------------
https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-S…
∗∗∗ Wordfence Intelligence Weekly WordPress Vulnerability Report (January 22, 2024 to January 28, 2024) ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2024/02/wordfence-intelligence-weekly-wordpr…
∗∗∗ AVEVA Edge products (formerly known as InduSoft Web Studio) ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-01-2024 18:00 − Mittwoch 31-01-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
=====================
= News =
=====================
∗∗∗ Debian, Ubuntu und mehr: glibc-Schwachstelle ermöglicht Root-Zugriff unter Linux ∗∗∗
---------------------------------------------
Darüber hinaus wurden weitere Schwachstellen in der Gnu-C-Bibliothek aufgedeckt. Eine davon existiert wohl schon seit über 30 Jahren.
---------------------------------------------
https://www.golem.de/news/debian-ubuntu-und-mehr-glibc-schwachstelle-ermoeg…
∗∗∗ Tracking 15 Years of Qakbot Development ∗∗∗
---------------------------------------------
Qakbot (aka QBot or Pinkslipbot) is a malware trojan that has been used to operate one of the oldest and longest running cybercriminal enterprises. Qakbot has evolved from a banking trojan to a malware implant that can be used for lateral movement and the eventual deployment of ransomware. In August 2023, the Qakbot infrastructure was dismantled by law enforcement. However, just several months later in December 2023, the fifth (and latest) version of Qakbot was released, [...]
---------------------------------------------
https://www.zscaler.com/blogs/security-research/tracking-15-years-qakbot-de…
∗∗∗ Ransomware: Online-Tool entschlüsselt unter Umständen BlackCat & Co. ∗∗∗
---------------------------------------------
Stimmen die Voraussetzungen, können Ransomwareopfer auf einer Website Daten entschlüsseln, ohne Lösegeld zu zahlen.
---------------------------------------------
https://www.heise.de/-9614278.html
∗∗∗ A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs ∗∗∗
---------------------------------------------
A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders. Discovered by a security researcher named Florian and reported to Microsoft, the vulnerability is yet to be patched. In the meantime, the researcher has gotten the go-ahead from the company to publish a PoC exploit.
---------------------------------------------
https://www.helpnetsecurity.com/2024/01/31/windows-event-log-vulnerability/
∗∗∗ Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation ∗∗∗
---------------------------------------------
Update (Jan. 31): We released a follow-up blog post containing additional details from our investigations into this threat, along with more recommendations for defenders. Note: This is a developing campaign under active analysis by Mandiant and Ivanti. We will continue to add more indicators, detections, and information to this blog post as needed.
---------------------------------------------
https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-d…
∗∗∗ CISA and FBI Release Secure by Design Alert Urging Manufacturers to Eliminate Defects in SOHO Routers ∗∗∗
---------------------------------------------
Today, CISA and the Federal Bureau of Investigation (FBI) published guidance on Security Design Improvements for SOHO Device Manufacturers as a part of the new Secure by Design (SbD) Alert series that focuses on how manufacturers should shift the burden of security away from customers by integrating security into product design and development.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/01/31/cisa-and-fbi-release-sec…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (bind9 and glibc), Fedora (ncurses), Gentoo (containerd, libaom, and xorg-server, xwayland), Mageia (python-pillow and zlib), Oracle (grub2 and tomcat), Red Hat (avahi, c-ares, container-tools:3.0, curl, firefox, frr, kernel, kernel-rt, kpatch-patch, libfastjson, libmicrohttpd, linux-firmware, oniguruma, openssh, perl-HTTP-Tiny, python-pip, python-urllib3, python3, rpm, samba, sqlite, tcpdump, thunderbird, tigervnc, and virt:rhel and virt-devel:rhel modules), SUSE (python-Pillow, slurm, slurm_20_02, slurm_20_11, slurm_22_05, slurm_23_02, and xen), and Ubuntu (libde265, linux-nvidia, mysql-8.0, openldap, pillow, postfix, and xorg-server, xwayland).
---------------------------------------------
https://lwn.net/Articles/960248/
∗∗∗ Mattermost security updates 9.4.2 / 9.3.1 / 9.2.5 / 8.1.9 (ESR) released ∗∗∗
---------------------------------------------
We’re informing you about a Mattermost security update, which addresses low- to medium-level severity vulnerabilities. We highly recommend that you apply the update.
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-9-4-2-9-3-1-9-2-5-8…
∗∗∗ CISA ICS Advisories ∗∗∗
---------------------------------------------
- Hitron Systems Security Camera DVR
- Rockwell Automation ControlLogix and GuardLogix
- Rockwell Automation FactoryTalk Service Platform
- Rockwell Automation LP30/40/50 and BM40 Operator Interface
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories?f%5B0%5D=advisory…
∗∗∗ CISA Adds One Known Exploited Vulnerability to Catalog ∗∗∗
---------------------------------------------
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
CVE-2022-48618 Apple Multiple Products Improper Authentication Vulnerability
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2024/01/31/cisa-adds-one-known-expl…
∗∗∗ Security Advisory Report - OBSO-2401-03 ∗∗∗
---------------------------------------------
A Command injection vulnerability has been identified in the MyPortal@Work application of Atos OpenScape Business which, if successfully exploited, could allow a malicious actor to execute arbitrary scripts on a client machine.
The severity is rated high.
Customers are advised to update the systems with the available fix release.
---------------------------------------------
https://networks.unify.com/security/advisories/OBSO-2401-03.pdf
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ Google Chrome: Update schließt vier Sicherheitslücken ∗∗∗
---------------------------------------------
https://www.heise.de/-9613823.html
∗∗∗ SVD-2024-0112: Third-Party Package Updates in Splunk Add-on Builder - January 2024 ∗∗∗
---------------------------------------------
https://advisory.splunk.com//advisories/SVD-2024-0112
∗∗∗ SVD-2024-0111: Sensitive Information Disclosure to Internal Log Files in Splunk Add-on Builder ∗∗∗
---------------------------------------------
https://advisory.splunk.com//advisories/SVD-2024-0111
∗∗∗ SVD-2024-0110: Session Token Disclosure to Internal Log Files in Splunk Add-on Builder ∗∗∗
---------------------------------------------
https://advisory.splunk.com//advisories/SVD-2024-0110
∗∗∗ The WordPress 6.4.3 Security Update – What You Need to Know ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2024/01/the-wordpress-6-4-3-security-update-…
∗∗∗ Tor Code Audit Finds 17 Vulnerabilities ∗∗∗
---------------------------------------------
https://www.securityweek.com/tor-code-audit-finds-17-vulnerabilities/
∗∗∗ Update #5: Kritische Sicherheitslücken in Ivanti Connect Secure und Ivanti Policy Secure - aktiv ausgenützt - Patches verfügbar ∗∗∗
---------------------------------------------
https://cert.at/de/warnungen/2024/1/kritische-sicherheitslucken-in-ivanti-c…
∗∗∗ List of Security Fixes and Improvements in Veeam Backup for Nutanix AHV ∗∗∗
---------------------------------------------
https://www.veeam.com/kb4236
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-01-2024 18:00 − Dienstag 30-01-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Ransomwareattacke: Hacker greifen interne Daten von Schneider Electric ab ∗∗∗
---------------------------------------------
Angeblich steckt die Ransomwaregruppe Cactus hinter dem Angriff. Sie hat offenbar mehrere TByte an Daten exfiltriert und fordert ein Lösegeld.
---------------------------------------------
https://www.golem.de/news/ransomwareattacke-hacker-greifen-interne-daten-vo…
∗∗∗ What did I say to make you stop talking to me?, (Tue, Jan 30th) ∗∗∗
---------------------------------------------
We use Cowrie to emulate an SSH and Telnet server for our honeypots. Cowrie is great software maintained by Michel Oosterhof.
---------------------------------------------
https://isc.sans.edu/diary/rss/30604
∗∗∗ New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility ∗∗∗
---------------------------------------------
Threat hunters have identified a new campaign that delivers the ZLoader malware, resurfacing nearly two years after the botnets infrastructure was dismantled in April 2022.
---------------------------------------------
https://thehackernews.com/2024/01/new-zloader-malware-variant-surfaces.html
∗∗∗ Is Your SAP Cloud Connector Safe? The Risk You Can’t Ignore ∗∗∗
---------------------------------------------
In this article, we will discuss security issues and provide recommendations to mitigate the risks associated with using SAP CC on the Windows platform.
---------------------------------------------
https://redrays.io/blog/sap-cloud-connector-security/
∗∗∗ Ransomware-Bericht: Immer weniger Opfer zahlen Lösegeld ∗∗∗
---------------------------------------------
Sicherheitsforscher zeigen aktuelle Trends bei Verschlüsselungstrojanern auf. Unter anderem schrumpfen die Summen von Lösegeldern.
---------------------------------------------
https://www.heise.de/news/Ransomware-Bericht-Immer-weniger-Opfer-zahlen-Loe…
∗∗∗ Lieber nicht: Abnehm-Pillen von Keto Base ∗∗∗
---------------------------------------------
In einem gefälschten Online-Artikel werden Abnehm-Pillen von Keto Base beworben. Angeblich wurde dieses „Wundermittel“ zum schnellen Abnehmen in der TV-Show „Höhle des Löwen“ vorgestellt und finanziert. Dabei handelt es sich aber um Fake News. Dieses Angebot ist unseriös und schädigt im schlimmsten Fall Ihrer Gesundheit.
---------------------------------------------
https://www.watchlist-internet.at/news/lieber-nicht-abnehm-pillen-von-keto-…
∗∗∗ Trigona Ransomware Threat Actor Uses Mimic Ransomware ∗∗∗
---------------------------------------------
AhnLab SEcurity intelligence Center (ASEC) has recently identified a new activity of the Trigona ransomware threat actor installing Mimic ransomware.
---------------------------------------------
https://asec.ahnlab.com/en/61000/
∗∗∗ DarkGate malware delivered via Microsoft Teams - detection and response ∗∗∗
---------------------------------------------
While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via email or other media, a large proportion are likely unaware that Microsoft Teams chats could be a phishing vector.
---------------------------------------------
https://cybersecurity.att.com/blogs/security-essentials/darkgate-malware-de…
=====================
= Vulnerabilities =
=====================
∗∗∗ DLL Proxying: Trend Micro liefert Updates, weitere Hersteller angreifbar ∗∗∗
---------------------------------------------
Bei Antivirenprogrammen mehrerer Hersteller haben IT-Forscher DLL-Proxying-Schwachstellen gefunden. Trend Micro hat schon Updates.
---------------------------------------------
https://www.heise.de/news/DLL-Proxying-Trend-Micro-liefert-Updates-weitere-…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (pillow, postfix, and redis), Fedora (python-templated-dictionary and selinux-policy), Red Hat (gnutls, kpatch-patch, libssh, and tomcat), and Ubuntu (amanda, ceph, linux-azure, linux-azure-4.15, linux-kvm, and tinyxml).
---------------------------------------------
https://lwn.net/Articles/960008/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ XSA-450 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-450.html
∗∗∗ XSA-449 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-449.html
∗∗∗ Festo: Multiple products contain CoDe16 vulnerability ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-063/
∗∗∗ Pilz: Vulnerabiiity in PASvisu and PMI v8xx ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-050/
∗∗∗ Emerson Rosemount GC370XA, GC700XA, GC1500XA ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-01
∗∗∗ Mitsubishi Electric FA Engineering Software Products ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-02
∗∗∗ Mitsubishi Electric MELSEC WS Series Ethernet Interface Module ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-03
∗∗∗ Zyxel security advisory for post-authentication command injection vulnerability in NAS products ∗∗∗
---------------------------------------------
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily