=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 04-03-2014 18:00 − Mittwoch 05-03-2014 18:00
Handler: Alexander Riepl
Co-Handler: Christian Wojner
*** Windows XP: Microsoft drängt mit Popup zum Umstieg ***
---------------------------------------------
Microsoft will XP-Nutzer direkter darauf hinweisen, dass der Support für das Betriebssystem endet. Zusätzlich soll die bislang kostenpflichtige Migrationshilfe PCmover Express umsonst bereit - das Angebot hat aber einen Pferdefuss.
---------------------------------------------
http://www.heise.de/security/meldung/Windows-XP-Microsoft-draengt-mit-Popup…
*** 69 Prozent der beliebtesten Android Apps funken im Klartext ***
---------------------------------------------
Bei einer Untersuchung von 10,000 Android-Apps haben Forscher herausgefunden, dass die Mehrzahl ihre Datenverbindungen gar nicht verschlüsselt und weitere 26 Prozent SSL so einsetzen, dass die Verbindung angreifbar ist.
---------------------------------------------
http://www.heise.de/security/meldung/69-Prozent-der-beliebtesten-Android-Ap…
*** Geld her oder Seite weg: Erpressung mit DDoS-Angriff ***
---------------------------------------------
Angreifer fordern Geld, um Attacken auf Seiten zu stoppen
---------------------------------------------
http://derstandard.at/1392687169264
*** Blog: Tor hidden services - a safe haven for cybercriminals ***
---------------------------------------------
http://www.securelist.com/en/blog/8187/Tor_hidden_services_a_safe_haven_for…
*** Malware nutzt iTunes als Lockmittel ***
---------------------------------------------
Nachgebaute iTunes-Seiten locken zur Installation der vermeintlichen Apple-Software - stattdessen erhält der Nutzer Malware. Prominent platzierte Suchmaschinenwerbung zum Begriff "iTunes" dient als Zubringer.
---------------------------------------------
http://www.heise.de/security/meldung/Malware-nutzt-iTunes-als-Lockmittel-21…
*** Apache Shiro 1.2.2 LDAP Authentication Bypass ***
---------------------------------------------
Topic: Apache Shiro 1.2.2 LDAP Authentication Bypass Risk: High Text:Dear Apache Shiro Community, The Apache Shiro team has released Apache Shiro version 1.2.3. This is the third bug fix point...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030034
*** Windows Escalate UAC Protection Bypass (In Memory Injection) ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030039
*** HPSBHF02965 rev.1 - HP Security Management System, Remote Execution of Arbitrary Code ***
---------------------------------------------
A potential security vulnerability has been identified with HP Security Management System. The vulnerability could be remotely exploited to allow remote execution of arbitrary code.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** HPSBUX02973 SSRT101455 rev.1 - HP-UX Running Java6/7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities ***
---------------------------------------------
Potential security vulnerabilities have been identified in the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** WordPress Relevanssi Plugin "category_name" SQL Injection Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/56641
*** Java OpenID Server 1.2.1 XSS / Session Fixation ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030037
*** VU#823452: Serena Dimensions CM 12.2 Build 7.199.0 web client vulnerabilities ***
---------------------------------------------
Serena Dimensions CM 12.2 Build 7.199.0 web client and possibly earlier versions contains multiple cross-site scripting vulnerabilities.CWE-79: Improper Neutralization of Input
---------------------------------------------
http://www.kb.cert.org/vuls/id/823452
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 03-03-2014 18:00 − Dienstag 04-03-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** TLS: Sicherheitslücke bei Client-Authentifizierung ***
---------------------------------------------
Erneut gibt es Probleme mit dem TLS-Protokoll. Mit der Triple Handshake-Attacke kann ein bösartiger HTTPS-Server einem weiteren Server vorgaukeln, er hätte das Zertifikat eines Nutzers. Die meisten Anwender sind von dem Angriff vermutlich nicht betroffen.
---------------------------------------------
http://www.golem.de/news/tls-sicherheitsluecke-bei-client-authentifizierung…
*** Webspace: Sicherheitsrisiko FTP ***
---------------------------------------------
Wer eine eigene Webseite betreibt, überträgt sie meist per FTP zum Webhoster. Dabei kommt häufig keine Verschlüsselung zum Einsatz. Kein einziger großer Provider weist seine Kunden auf diese Risiken adäquat hin; bei manchen Providern ist eine verschlüsselte Verbindung überhaupt nicht möglich.
---------------------------------------------
http://www.golem.de/news/webspace-sicherheitsrisiko-ftp-1403-104889-rss.html
*** Großangriff auf Router: DNS-Einstellungen manipuliert ***
---------------------------------------------
Forscher entdeckten einen Großangriff auf Router: Bei über 300.000 Routern, die im Privat- oder Büroeinsatz sind, wurden angeblich die DNS-Einstellungen manipuliert. Die Angreifer hätten dadurch jederzeit den Datenverkehr der Geräte umleiten können.
---------------------------------------------
http://www.heise.de/security/meldung/Grossangriff-auf-Router-DNS-Einstellun…
*** Sicherheitslücke: GnuTLS jetzt mit "goto fail" ***
---------------------------------------------
Auch die Open-Source-Bibliothek für gesicherte Verbindungen weist einen schwerwiegenden Fehler beim überprüfen von Zertifikaten auf. Aktuelle Patches sollen ihn beheben.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsluecke-GnuTLS-jetzt-mit-got…
*** GNUTLS-SA-2014-2 - Certificate Verification Issue ***
---------------------------------------------
A vulnerability was discovered that affects the certificate verification functions of all gnutls versions. A specially crafted certificate could bypass certificate validation checks.
---------------------------------------------
http://gnutls.org/security.html#GNUTLS-SA-2014-2
*** WordPress plugin Google Analytics MU 2.3 CSRF ***
---------------------------------------------
Topic: WordPress plugin Google Analytics MU 2.3 CSRF Risk: Low Text:Details = Software: Google Analytics MU Version: 2.3 Homepage: http://wordpress.org/plugins/google-analytics-mu/ CVSS...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030018
*** Joomla 3.2.2 Cross Site Scripting ***
---------------------------------------------
Topic: Joomla 3.2.2 Cross Site Scripting Risk: Low Text:# == # Title ...| Persistent pre-auth XSS in Joomla # Version .| Joomla 3.2.2 # Date ....| 3.03.2014 #...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030030
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 28-02-2014 18:00 − Montag 03-03-2014 18:00
Handler: Alexander Riepl
Co-Handler: Christian Wojner
*** Komplexe Spionagesoftware namens Uroburos entdeckt ***
---------------------------------------------
Sicherheitsexperten von G Data haben eine mutmaßliche Geheimdienstsoftware entdeckt, die offenbar darauf abzielt, hochsensible und geheime Informationen von staatlichen Einrichtungen, Nachrichtendiensten und Großunternehmen zu stehlen.
---------------------------------------------
http://www.heise.de/security/meldung/Komplexe-Spionagesoftware-namens-Urobu…
Multiple vulnerabilities in Oracle Demantra 12.2.1
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014030004http://cxsecurity.com/issue/WLB-2014030007http://cxsecurity.com/issue/WLB-2014030006http://cxsecurity.com/issue/WLB-2014030005
*** Wo-möglich-Verschlüsselung für mehr Sicherheit ***
---------------------------------------------
Harte Verschlüsselung oder nur Wo-möglich-Verschlüsselung gegen NSA und Konsorten? Darüber diskutierte der STRINT-Workshop der IETF und des W3C am Wochenende in London.
---------------------------------------------
http://www.heise.de/security/meldung/Wo-moeglich-Verschluesselung-fuer-mehr…
*** DSA-2868 php5 ***
---------------------------------------------
denial of service
---------------------------------------------
http://www.debian.org/security/2014/dsa-2868
*** WordPress VideoWhisper Live Streaming Plugin Multiple Cross-Site Scripting Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57202
*** Apache Camel XSLT XML External Entities and Arbitrary Code Execution Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57125
*** Hintergrund: VM-Erkennung in Malware ***
---------------------------------------------
Die rote oder die blaue Pille? Immer mehr Schädlinge wollen wissen, ob ihre Umgebung echt oder nur virtuell ist.
---------------------------------------------
http://www.heise.de/security/artikel/VM-Erkennung-in-Malware-2131459.html
*** The Mobile Cybercriminal Underground Market in China ***
---------------------------------------------
The availability of affordable mobile Internet access has changed the computing landscape everywhere. More and more people are using mobile devices both for work and for entertainment. China is no exception. According to a report published by the China Internet Network Information Center (CNNIC), 81% of Chinese Internet users went online using their mobile phone ..
---------------------------------------------
http://blog.trendmicro.com/trendlabs-security-intelligence/the-mobile-cyber…
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 27-02-2014 18:00 − Freitag 28-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Are Automated Update Services the Next Surveillance Frontier? ***
---------------------------------------------
Automated update services that provide users with security patches and feature enhancements are also a potential hunting ground for intelligence agencies and law enforcement surveillance activity.
---------------------------------------------
http://threatpost.com/are-automated-update-services-the-next-surveillance-f…
*** DDoS and BCP 38, (Thu, Feb 27th) ***
---------------------------------------------
Quite often on many lists we will hear the term Best Current Practice (BCP) 38 bandied about and further recommendations to implement [1] [2][3][4] (See NANOG Mailing list archive) . Some will say "it will aid in DDoS mitigation" and even others will even state "All Internet Service Providers (ISP) should implement this." Now before the philosophical discussions ensue in the comments, it might be a good idea to discuss, technically, what it is? And perhaps what it can do?
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17735&rss
*** Oversharing, (Fri, Feb 28th) ***
---------------------------------------------
When ISC reader Michael contacted us about "odd UDP traffic from all over" that he was suddenly seeing in his firewall log, we at first assumed that his Internet connection had "inherited" a dynamic IP address that had before been used by a rampant file sharing user, and that Michael was now seeing the "after glow". We still asked for a PCAP (tcpdump) file though, and when we looked at what Michael sent back, we saw to our surprise...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17737&rss
*** Highly Effective Joomla Backdoor with Small Profile ***
---------------------------------------------
It feels like every day we're finding gems, or what appear to be gems to us. We try to balance the use of the term, but I can't lie, these are truly gems. The things they are doing, and by they I mean the attackers, are in some instance ingenious. I think you'll agree that...
---------------------------------------------
http://blog.sucuri.net/2014/02/highly-effective-joomla-backdoor-with-small-…
*** Tilon/SpyEye2 intelligence report ***
---------------------------------------------
Tilon, son of Silon, or... SpyEye2 evolution of SpyEye? The malware family commonly known as Tilon has been around for several years now. While several public analysis reports have described the malware; no one has thus far linked it with the well-known SpyEye malware family. In light of the recent news of the guilty plea...
---------------------------------------------
http://blog.fox-it.com/2014/02/25/tilonspyeye2-intelligence-report/
*** Malicious Proxy Auto-Config redirection ***
---------------------------------------------
Internet banking credentials are a desired target for cybercriminals. They can be targeted with man-in-the-middle attacks or through password stealing trojans such as Fareit, Zbot or Banker. A less known, yet commonly found in South America and to a lesser extent in Russia, method to gain unauthorized access to a user's banking credentials is through malicious Proxy Auto-Config (PAC) files. Normally, PAC files offer similar functionality to the hosts file, allowing IP/website redirection,...
---------------------------------------------
http://blogs.technet.com/b/mmpc/archive/2014/02/28/malicious-proxy-auto-con…
*** Notorious "Gameover" malware gets itself a kernel-mode rootkit... ***
---------------------------------------------
Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security...
---------------------------------------------
http://nakedsecurity.sophos.com/2014/02/27/notorious-gameover-malware-gets-…
*** [2014-02-28] Authentication bypass (SSRF) and local file disclosure in Plex Media Server ***
---------------------------------------------
The Plex Media Server proxy functionality fails to properly validate pre-authentication user requests. This allows unauthenticated attackers to make the Plex Media Server execute arbitrary HTTP requests and hence bypass all authentication and execute commands with administrative privileges. Furthermore, because of insufficient input validation, arbitrary local files can be disclosed without prior authentication including passwords and other sensitive information.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** [2014-02-28] Privilege escalation vulnerability in MICROSENS Profi Line Modular Industrial Switch Web Manager ***
---------------------------------------------
Attackers are able to elevate privileges during login from read-only user rights to full read/write or debug access rights by simply changing result values of the affected CGI script. This allows attackers to reconfigure the device.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** VU#534284: Synology DiskStation Manager VPN module hard-coded password vulnerability ***
---------------------------------------------
Synology DiskStation Manager 4.3-3810 update 1 and possibly earlier versions contain a VPN server module which contains a hard-coded password which cannot be changed. According to the original forum post...
---------------------------------------------
http://www.kb.cert.org/vuls/id/534284
*** Moodle 2.6.1 Cross Site Scripting ***
---------------------------------------------
Topic: Moodle 2.6.1 Cross Site Scripting Risk: Low Text:# == # Title ...| Moodle 2.6.1 # Version .| (Feb 27 2014) moodle-latest-26.zip # Date ....| 27.02.2014...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020247
*** Cisco IPS MainApp SNMP Denial of Service Vulnerability ***
---------------------------------------------
A vulnerability in the SNMP code of Cisco Intrusion Prevention System (IPS) Software could allow an unauthenticated, remote attacker to cause the MainApp process to become unresponsive. This creates a denial of service (DoS) condition because the Cisco IPS sensor is not able to execute several critical tasks including alert notification, event store management, and sensor authentication. The Cisco IPS web server will also be unavailable while the MainApp process is unresponsive. Additionally, due to this general system failure, other processes such as the Analysis Engine may not function properly.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Unified Communications Domain Manager Cross-Site Scripting Vulnerability ***
---------------------------------------------
A vulnerability in the web framework of Cisco Unified Communications Domain Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface on the affected system.
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Schneider Electric Floating License Manager Vulnerability ***
---------------------------------------------
Schneider Electric had become aware of an "unquoted service path" vulnerability in the Schneider Electric Floating License Manager, produced a patch that mitigates this vulnerability, and notified NCCIC/ICS-CERT.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-058-01
*** Schneider Electric OFS Buffer Overflow Vulnerability ***
---------------------------------------------
Schneider Electric has reported to NCCIC/ICS-CERT a Stack Buffer Overflow vulnerability supplied with the Schneider Electric OPC Factory Server (OSF).
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-14-058-02
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 26-02-2014 18:00 − Donnerstag 27-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Avaya to Patch Zero Days That Turn IP Phone into Radio Transmitters ***
---------------------------------------------
Avaya is expected to patch zero-day vulnerabilities in its latest one-X IP phones. The vulnerabilities and an exploit will be demonstrated this week at RSA Conference 2014.
---------------------------------------------
http://threatpost.com/avaya-to-patch-zero-days-that-turn-ip-phone-in-radio-…
*** Detecting malware on Mac OS X with USM and MIDAS ***
---------------------------------------------
Let's briefly review what we accomplished in the first post: Understood the capabilities and design of MIDAS Deployed MIDAS on a Mac OS X endpoint installed the MIDAS plugin in AlienVault USM Verified the integration by running MIDAS and confirming the events in the SIEM. How does this make us safer? More generally, what does this mean? To answer these questions we need to understand what plists and kexts mean from a security perspective. PlistsProperty list files contain configuration data...
---------------------------------------------
http://www.alienvault.com/open-threat-exchange/blog/detecting-malware-on-ma…
*** Ongoing NTP Amplification Attacks, (Wed, Feb 26th) ***
---------------------------------------------
Brett, who alerted us earlier this month regarding the mass exploit against Linksys devices has surfaced a current issue hes facing with ongoing NTP amplification attacks. A good US-CERT summary of the attack is here: https://www.us-cert.gov/ncas/alerts/TA14-013A. Brett indicates that: "We are seeing massive attacks on our NTP servers, attempting to exploit the traffic amplification vulnerability reported last month. Our IPs are being probed by an address in the Netherlands, and a couple...
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17723&rss
*** Yes, You Too Can Be An Evil Network Overlord - On The Cheap With OpenBSD, pflow And nfsen ***
---------------------------------------------
Have you ever wanted to know whats really going on in your network? Some free tools with surprising origins can help you to an almost frightening degree.One question I get a lot (or variants that end up being very close) is, "How do you keep up with whats happening in your network?". A close cousin is "how much do you actually know about your users?".The exact answer to both can have legal implications, so before I proceed to the tech content, Ill ask you to make sure you...
---------------------------------------------
http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html
*** Weekly Metasploit Update: Encoding-Fu, New Powershell Payload, Bug Fixes ***
---------------------------------------------
In this week's Metasploit weekly update, we begin with OJ TheColonial Reeves' new optimized sub encoding module (opt_sub.rb). As the name implies, this encoder takes advantage of the SUB assembly instruction to encode a payload with printable characters that are file path friendly. Encoders like this are incredibly useful for developing a memory corruption exploit...
---------------------------------------------
https://community.rapid7.com/community/metasploit/blog/2014/02/26/weekly-me…
*** Security: Cisco öffnet Snort-Schnittstelle ***
---------------------------------------------
Wenige Wochen nach der Übernahme des Snort-Entwicklers Sourcefire hat Cisco die Schnittstelle zu dem Intrusion Detection System unter dem Namen OpenAppID öffentlich gemacht. Zudem wurde der Malware-Schutz des aufgekauften Unternehmens in Ciscos Sicherheitsportfolio integriert.
---------------------------------------------
http://www.golem.de/news/security-cisco-oeffnet-snort-schnittstelle-1402-10…
*** Mac OS X 10.6 Snow Leopard: Apple aktualisiert nicht mehr ***
---------------------------------------------
Die letzten zwei größeren Sicherheitsupdates von Apple standen nur noch für Mavericks, Mountain Lion und Lion bereit. Dabei ist OS X 10.6 noch relativ weit verbreitet.
---------------------------------------------
http://www.heise.de/security/meldung/Mac-OS-X-10-6-Snow-Leopard-Apple-aktua…
*** Was the iOS SSL Flaw Deliberate? ***
---------------------------------------------
Last October, I speculated on the best ways to go about designing and implementing a software backdoor. I suggested three characteristics of a good backdoor: low chance of discovery, high deniability if discovered, and minimal conspiracy to implement. The critical iOS vulnerability that Apple patched last week is an excellent example. Look at the code. What caused the vulnerability is...
---------------------------------------------
https://www.schneier.com/blog/archives/2014/02/was_the_ios_ssl.html
*** Android & iOS: Gratis-Werkzeuge zur Malware-Analyse ***
---------------------------------------------
Die Linux-Distribution Santoku bringt alle Werkzeuge mit, um Malware und andere Apps für iOS und Android professionell unter die Lupe zu nehmen. Eine Kombination aus einer App und einem Webdienst analysiert unter anderem Datenströme von Apps.
---------------------------------------------
http://www.heise.de/security/meldung/Android-iOS-Gratis-Werkzeuge-zur-Malwa…
*** Atlassian - Security Bypass Vulnerabilities in various Products ***
---------------------------------------------
Security Bypass Vulnerabilities in Atlassian Bamboo, Confluence, FishEye, JIRA, Crucible and Stash
---------------------------------------------
https://secunia.com/advisories/57086https://secunia.com/advisories/57088https://secunia.com/advisories/57095https://secunia.com/advisories/57105https://secunia.com/advisories/56842https://secunia.com/advisories/56936
*** [2014-02-27] Local Buffer Overflow vulnerability in SAS for Windows ***
---------------------------------------------
Attackers are able to completely compromise SAS clients when a malicious SAS program gets executed as the software "SAS for Windows" is affected by a local buffer overflow vulnerability.
---------------------------------------------
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/2014…
*** Drupal - Vulnerabilities in third-party Modules and Themes ***
---------------------------------------------
Vulnerabilities in Open Omega (third-party theme), Content locking (anti-concurrent editing) (third-party module), Project Issue File Review (third-party module) and Mime Mail (third-party module)
---------------------------------------------
https://drupal.org/node/2205877https://drupal.org/node/2205807https://drupal.org/node/2205767https://drupal.org/node/2205991
*** Schneider Electric CitectSCADA Products Exception Handler Vulnerability (Update A) ***
---------------------------------------------
This updated advisory is a follow-up to the original advisory titled ICSA-13-350-01 Schneider Electric SCADA Products Exception Handler Vulnerability that was published February 25, 2014, on the NCCIC/ICS-CERT web site. This advisory was originally posted to the US-CERT secure Portal library on December 16, 2013. Schneider Electric requested the title change to reduce confusion.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-350-01A
=======================
= End-of-Shift report =
=======================
Timeframe: Dienstag 25-02-2014 18:00 − Mittwoch 26-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Chameleon: Forschungsvirus verbreitet sich von WLAN zu WLAN ***
---------------------------------------------
Britische Wissenschaftler haben unter dem Namen "Chameleon" einen vollständigen Router-Wurm geschaffen, der das Internet nicht braucht. Die Malware kopiert sich von einem Router zum anderen per WLAN und kann sich so epidemieartig ausbreiten. Aber auch Wege zur Abwehr solcher Gefahren sind absehbar. (WLAN, Virus)
---------------------------------------------
http://www.golem.de/news/chameleon-forschungs-virus-verbreitet-sich-von-wla…
*** DDoSing a Cell Phone Network ***
---------------------------------------------
Interesting research: Abstract: The HLR/AuC is considered to be one of the most important network elements of a 3G network. It can serve up to five million subscribers and at least one transaction with HLR/AuC is required for every single phone call or data session. This paper presents experimental results and observations that can be exploited to perform a novel...
---------------------------------------------
https://www.schneier.com/blog/archives/2014/02/ddosing_a_cell.html
*** IE Zero-day Exploit Being Used in Widespread Attacks ***
---------------------------------------------
The number of attacks exploiting a yet-to-be-patched vulnerability in Internet Explorer has increased dramatically over the past few days, indicating the exploit is no longer used just in targeted attacks against particular groups of people.
---------------------------------------------
http://www.cio.com/article/748778/IE_Zero_day_Exploit_Being_Used_in_Widespr…
*** QuickTime 7.7.5 für Windows behebt diverse Sicherheitslücken ***
---------------------------------------------
Apples Multimediaumgebung enthält unter Windows eine ganze Reihe von sicherheitsrelevanten Bugs. Version 7.7.5 soll sie beheben - ein schnelles Update ist angeraten.
---------------------------------------------
http://www.heise.de/security/meldung/QuickTime-7-7-5-fuer-Windows-behebt-di…
*** Announcing EMET 5.0 Technical Preview ***
---------------------------------------------
Today, we are thrilled to announce a preview release of the next version of the Enhanced Mitigation Experience Toolkit, better known as EMET. You can download EMET 5.0 Technical Preview here. This Technical Preview introduces new features and enhancements that we expect to be key components of the final EMET 5.0 release. We are releasing this technical preview to gather customer feedback about the new features and enhancements. Your feedback will affect the final EMET 5.0 technical
---------------------------------------------
https://blogs.technet.com/b/srd/archive/2014/02/25/announcing-emet-5-0-tech…
*** VU#684412: libpng denial-of-service vulnerability ***
---------------------------------------------
Vulnerability Note VU#684412 libpng denial-of-service vulnerability Original Release date: 25 Feb 2014 | Last revised: 25 Feb 2014 Overview libpng versions 1.6.0 through 1.6.9 contain a denial-of-service vulnerability. Description CWE-835: Loop with Unreachable Exit Condition (Infinite Loop) - CVE-2014-0333Glenn Randers Pehrson of the PNG Development Group reports:The progressive decoder in libpng16 enters an infinite loop, thus hanging the application, when it encounters a zero-length IDAT...
---------------------------------------------
http://www.kb.cert.org/vuls/id/684412
*** Schneider Electric SCADA Products Exception Handler Vulnerability ***
---------------------------------------------
Researcher Carsten Eiram of Risk Based Security has identified an exception handling vulnerability in Schneider Electric’s CitectSCADA application. The original vulnerability reported by Mr. Eiram had already been fixed in CitectSCADA v7.20SP2. While investigating this vulnerability report, Schneider Electric discovered additional related vulnerabilities and has produced a patch that mitigates them in SCADA Expert Vijeo Citect, CitectSCADA, and PowerSCADA Expert.
---------------------------------------------
http://ics-cert.us-cert.gov/advisories/ICSA-13-350-01
*** IBM AIX OpenSSL Multiple Denial of Service Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57041
*** Python Buffer Overflow in socket.recvfrom_into() Lets Remote Users Execute Arbitrary Code ***
---------------------------------------------
http://www.securitytracker.com/id/1029831
*** Cisco Unified Communications Manager CAPF Unauthenticated Device Information Update Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Unified Communications Manager OS Administration CSRF Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Unified Contact Center Express CCMConfig Sensitive Information Disclosure Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
*** Cisco Unified Contact Center Express Serviceability Page CSRF Vulnerability ***
---------------------------------------------
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014…
=======================
= End-of-Shift report =
=======================
Timeframe: Montag 24-02-2014 18:00 − Dienstag 25-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Android users under attack through malicious ads in Facebook ***
---------------------------------------------
Cyber-criminals are always trying to attract people's attention in order to carry out their crimes. So it should be no surprise that they have now found a combined way of using Facebook (the world's largest social network), WhatsApp (the leading text messaging program for smartphones, recently bought by Facebook) and Android (the most popular operating...
---------------------------------------------
http://pandalabs.pandasecurity.com/android-users-under-attack-through-malic…
*** New attack completely bypasses Microsoft zero-day protection app ***
---------------------------------------------
Whitehats ability to sidestep EMET strongly suggest criminal hackers can, too.
---------------------------------------------
http://feeds.arstechnica.com/~r/arstechnica/security/~3/aCb9-4Ke6D8/
*** Poisoned YouTube ads serve Caphaw banking trojan ***
---------------------------------------------
YouTubes ad network was compromised to host the Styx exploit kit, researchers found.
---------------------------------------------
http://www.scmagazine.com/poisoned-youtube-ads-serve-caphaw-banking-trojan/…
*** Blog: The first Tor Trojan for Android ***
---------------------------------------------
Virus writers of Android Trojans have traditionally used Windows malware functionality as a template. Now, yet another technique from Windows Trojans has been implemented in malware for Android: for the first time we have detected an Android Trojan that uses a domain in the .onion pseudo zone as a C&C. The Trojan uses the anonymous Tor network built on a network of proxy servers. As well as providing users with anonymity,...
---------------------------------------------
http://www.securelist.com/en/blog/8184/The_first_Tor_Trojan_for_Android
*** Touchlogger: iOS im Lauscheinsatz ***
---------------------------------------------
Die Sicherheitsexperten von Fireeye Labs haben eine iOS-App entwickelt, mit der sich alle Eingaben auf der Touchscreen-Oberfläche im Hintergrund mitschneiden und an einen Server übermitteln lassen.
---------------------------------------------
http://www.golem.de/news/touchlogger-ios-im-lauscheinsatz-1402-104776-rss.h…
*** The Tenth Anniversary of Mobile Malware ***
---------------------------------------------
2014 marks the tenth anniversary of mobile malware. It all began in 2004, when the first variant of SymbOS.Cabir was submitted to security researchers. The analysis revealed that this worm targeted Symbian OS, which was a very popular mobile operating system at the time. Infected phones would search for nearby Bluetooth devices that...
---------------------------------------------
http://www.symantec.com/connect/blogs/tenth-anniversary-mobile-malware
*** Best Practices in Computer Network Defense ***
---------------------------------------------
This article was published in the book in Computer Network Defense: Incident Detection and Response. Edited by Melissa E. Hathaway, NATO Science for Peace and Security Series, 2014. The article is about the Dutch approach, the importance of intertnational cooperation and the role of the Dutch Cyber Security Council.
---------------------------------------------
http://www.ncsc.nl/english/current-topics/news/best-practices-in-computer-n…
*** "goto fail": Demo-Exploit für SSL-Schwachstelle in iOS und OS X ***
---------------------------------------------
Der Sicherheitsforscher Aldo Cortesi hat sein Tool mitmproxy angepasst, um den verschlüsselten Datenverkehr von ungepatchten iOS-Geräten und Macs mit OS X 10.9 Mavericks mitzuschneiden. Fast alles lasse sich mitlesen, so Cortesi.
---------------------------------------------
http://www.heise.de/security/meldung/goto-fail-Demo-Exploit-fuer-SSL-Schwac…
*** HPSBST02937 rev.1 - HP StoreVirtual 4000 and StoreVirtual VSA Software dbd_manager, Remote Execution of Arbitrary Code ***
---------------------------------------------
A potential security vulnerability has been identified with HP StoreVirtual 4000 and StoreVirtual VSA Software (formerly known as HP LeftHand Virtual SAN Appliance) dbd_manager. The vulnerability could be remotely exploited resulting in execution of arbitrary code.
---------------------------------------------
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispl…
*** HPSBMU02971 rev.1 - HP Application Information Optimizer, Remote Execution of Code, Information Disclosure ***
---------------------------------------------
A potential security vulnerability has been identified in the Web Console component of HP Application Information Optimizer (formerly HP Database Archiving). The vulnerability could be exploited to allow remote execution of code and information disclosure.
---------------------------------------------
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispl…
*** Bugtraq: WiFiles HD v1.3 iOS - File Include Web Vulnerability ***
---------------------------------------------
http://www.securityfocus.com/archive/1/531236
*** MYBB 1.6.12 search.php Sql injection ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020202
*** GitHub RCE by Environment variable injection Bug Bounty ***
---------------------------------------------
Topic: GitHub RCE by Environment variable injection Bug Bounty Risk: High Text:GitHub RCE by Environment variable injection Bug Bounty writeup Disclaimer: Ill keep this really short but I hope youll g...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020209
*** TYPO3 6.1.7 XSS / Disclosure / Shell Upload ***
---------------------------------------------
Topic: TYPO3 6.1.7 XSS / Disclosure / Shell Upload Risk: High Text:# == # Title ...| Multiple vulnerabilities in Typo3 CMS # Version .| introductionpackage-6.1.7 # Date .....
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020208
*** FreePBX 2.x Remote Command Execution ***
---------------------------------------------
Topic: FreePBX 2.x Remote Command Execution Risk: High Text:App : Freepbx 2.x Download : schmoozecom.net Auther : i-Hmx Mail : n0p1337(a)gmail.com Home : security arrays inc. , sec4ever...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020206
*** Zen Cart E-Commerce 1.5.1 Multiple vulnerabilities ***
---------------------------------------------
Topic: Zen Cart E-Commerce 1.5.1 Multiple vulnerabilities Risk: High Text:# == # Title ...| Multiple vulnerabilities in Zen Cart e-commerce # Version .| zen-cart-v1.5.1-full-file...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020203
*** WordPress Search Everything Plugin SQL Injection Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/56820
*** AutoCAD Insecure Library and FAS File Loading Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57002
*** OATH Toolkit libpam-oath replay ***
---------------------------------------------
http://xforce.iss.net/xforce/xfdb/91316
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 21-02-2014 18:00 − Montag 24-02-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
*** Researchers Develop Complete Microsoft EMET Bypass ***
---------------------------------------------
Researchers at Bromium Labs are expected to deliver a paper today that explains how they were able to bypass all of the memory protection mitigations in Microsofts Enhanced Mitigation Experience Toolkit
---------------------------------------------
http://threatpost.com/researchers-develop-complete-microsoft-emet-bypass/10…
*** Apples SSL/TLS bug (22 Feb 2014) ***
---------------------------------------------
Yesterday, Apple pushed a rather spooky security update for iOS that suggested that something was horribly wrong with SSL/TLS in iOS but gave no details. Since the answer is at the top of the Hacker News thread, I guess the cats out of the bag already and were into the misinformation-quashing stage now.
---------------------------------------------
https://www.imperialviolet.org/2014/02/22/applebug.html
*** An In-depth Analysis of Linux/Ebury ***
---------------------------------------------
ESET has been analyzing and tracking an OpenSSH backdoor and credential stealer named Linux/Ebury. The result of this work on the Linux/Ebury malware family is part of a joint research effort with CERT‑Bund, the Swedish National Infrastructure for Computing, the European Organization for Nuclear Research (CERN) and other organizations forming an international Working Group.
---------------------------------------------
http://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/
*** Microsoft Windows Crash Reports Reveal New APT, POS Attacks ***
---------------------------------------------
You never know what youll glean from a Windows crash report: security researchers recently unearthed a previously unknown advanced persistent threat campaign as well as a new point-of-sale system attack by perusing and analyzing those crash reports also known as Dr. Watson.
---------------------------------------------
http://www.darkreading.com/attacks-breaches/microsoft-windows-crash-reports…
*** NIST Unveils Crypto Standards Proposal ***
---------------------------------------------
Because of concerns of possible National Security Agency meddling with its cryptographic standards, the National Institute of Standards and Technology has issued a draft report proposing revisions in how it develops cryptographic standards.
---------------------------------------------
http://www.govinfosecurity.com/nist-unveils-crypto-standards-proposal-a-6519
*** Freier Zugriff auf Fernsteuerungen für Industrieanlagen ***
---------------------------------------------
Ein Projekt der FU Berlin dokumentiert, dass weltweit tausende Industrieanlagen über das Internet erreichbar, aber nur unzureichend geschützt sind. Es entstand eine interaktive Karte, auf der potenziell angreifbare Anlagen eingezeichnet sind.
---------------------------------------------
http://www.heise.de/security/meldung/Freier-Zugriff-auf-Fernsteuerungen-fue…
*** Security vulnerabilities found in 80% of best-selling SOHO wireless routers ***
---------------------------------------------
Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon's top 25 best-selling SOHO wireless router models have security vulnerabilities.
---------------------------------------------
http://www.net-security.org/secworld.php?id=16399
*** eGroupWare Multiple PHP Object Injection Vulnerabilities ***
---------------------------------------------
https://secunia.com/advisories/57047
*** JBoss RichFaces Malformed Push Request Denial of Service Vulnerability ***
---------------------------------------------
https://secunia.com/advisories/57053
*** Barracuda Firewall Exception Handling Cross Site Scripting ***
---------------------------------------------
Topic: Barracuda Firewall Exception Handling Cross Site Scripting Risk: Low Text:Document Title: Barracuda Bug Bounty #36 Firewall - Client Side Exception Handling Web Vulnerability References ...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020186
*** DSA-2866 gnutls26 ***
---------------------------------------------
certificate verification flaw
---------------------------------------------
http://www.debian.org/security/2014/dsa-2866
*** ICONICS GENESIS32 Insecure ActiveX Control ***
---------------------------------------------
NCCIC/ICS-CERT discovered a vulnerability in the ICONICS GENESIS32 application during resolution of unrelated products. ICONICS has produced a patch for all vulnerable versions of its GENESIS32 product. ICONICS GENESIS32 Version 9.0 and newer are not vulnerable to this ActiveX vulnerability.
---------------------------------------------
https://ics-cert.us-cert.gov/advisories/ICSA-14-051-01
*** HPSBMU02964 rev.1 - HP Service Manager, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access, Disclosure of Information and Authentication Issues ***
---------------------------------------------
Potential security vulnerabilities have been identified with HP Service Manager. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, unauthorized access, disclosure of Information, and authentication issues.
---------------------------------------------
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_…
*** ASUS router drive-by code execution via XSS and authentication bypass ***
---------------------------------------------
Several ASUS routers include reflected Cross-Site Scripting (CWE-79) and authentication bypass (CWE-592) vulnerabilities. An attacker who can lure a victim to browse to a web site containing a specially crafted JavaScript payload can execute arbitrary commands on the router as administrator (root). No user interaction is required.
---------------------------------------------
https://sintonen.fi/advisories/asus-router-auth-bypass.txt
=======================
= End-of-Shift report =
=======================
Timeframe: Donnerstag 20-02-2014 18:00 − Freitag 21-02-2014 18:00
Handler: Alexander Riepl
Co-Handler: Stephan Richter
*** Adobe Flash: Zero-Day-Exploit wird aktiv ausgenutzt ***
---------------------------------------------
Adobe hat diesen Monat erneut einen Sicherheitspatch für den Flash Player veröffentlicht. Dieser sollte schleunigst eingespielt werden. Derzeit laufen Attacken auf den Flash Player, bei dem ein Sicherheitsloch aktiv ausgenutzt wird. (Adobe, Server)
---------------------------------------------
http://www.golem.de/news/adobe-flash-zero-day-exploit-wird-aktiv-ausgenutzt…http://blogs.adobe.com/psirt/?p=1059http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
*** Sicherheitsupdate für freie Datenbank PostgreSQL ***
---------------------------------------------
Die Entwickler schließen mehrere Sicherheitslücken, die Anwendern eine Veränderung ihrer Rechte erlaubten. Außerdem warnen sie vor einem noch nicht behobenen Fehler, der das Kapern eines System-Accounts ermöglicht.
---------------------------------------------
http://www.heise.de/security/meldung/Sicherheitsupdate-fuer-freie-Datenbank…http://www.postgresql.org/about/news/1506/
*** Spamvertised "You received a new message from Skype voicemail service" themed emails lead to Angler exploit kit ***
---------------------------------------------
We've just intercepted a currently circulating malicious spam campaign that's attempting to trick potential botnet victims into thinking that they've received a legitimate Voice Message Notification from Skype. In reality though, once socially engineered users click on the malicious link found in the bogus emails, they're automatically exposed to the client-side exploits served by the Angler exploit kit.
---------------------------------------------
http://www.webroot.com/blog/2014/02/20/spamvertised-received-new-message-sk…
*** Erpressungs-Trojaner Bitcrypt geknackt ***
---------------------------------------------
Der Erpressungs-Trojaner Bitcrypt verschlüsselt Dateien des Anwenders und rückt die Daten nur gegen Zahlung von Lösegeld wieder raus. Sicherheitsexperten gelang es jedoch, die Verschlüsselung zu knacken.
---------------------------------------------
http://www.heise.de/security/meldung/Erpressungs-Trojaner-Bitcrypt-geknackt…
*** Google Fixes 28 Security Flaws in Chrome 33 ***
---------------------------------------------
Google Chrome 33 is out, and the new version of the browser includes fixes for 28 security vulnerabilities, including a number of high-severity bugs. The company paid out more than $13,000 in rewards to researchers who reported vulnerabilities that were fixed in this release.
---------------------------------------------
https://threatpost.com/google-fixes-28-security-flaws-in-chrome-33/104391
*** HP Service Manager Bugs Let Remote Users Execute Arbitrary Code and Deny Service and Conduct Cross-Site Scripting and Cross-Site Requset Forgery Attacks ***
---------------------------------------------
CVE Reference: CVE-2013-6202
Date: Feb 21 2014
Impact: Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
---------------------------------------------
http://www.securitytracker.com/id/1029803http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDispl…
*** AdRotate 3.9.4 SQL Injection ***
---------------------------------------------
Topic: AdRotate 3.9.4 SQL Injection Risk: Medium Text:Advisory ID: HTB23201 Product: AdRotate Vendor: AJdG Solutions Vulnerable Version(s): 3.9.4 and probably prior Tested Versi...
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020178
=======================
= End-of-Shift report =
=======================
Timeframe: Mittwoch 19-02-2014 18:00 − Donnerstag 20-02-2014 18:00
Handler: Alexander Riepl
Co-Handler: Christian Wojner
*** Malicious iFrame Injections Host Payload on Tumblr ***
---------------------------------------------
It's always fun to watch malware developers using different techniques to code their creations. Sometimes it's a matter of obfuscation, placement, injection, but this time it's how they code it to be dynamic. I believe this is not the first one that uses this service, but it's the first time I'm seeing ..
---------------------------------------------
http://blog.sucuri.net/2014/02/malicious-iframe-injections-host-payload-on-…
*** Health Care Systems Poorly Protected, Many Already Compromised ***
---------------------------------------------
New report shows that health care industry intellectual property, payment information, and patient data are poorly protected and, in many cases, already compromised.
---------------------------------------------
http://threatpost.com/health-care-systems-poorly-protected-many-already-com…
*** Microsoft release FixIt for IE9/IE10 Zero Day, (Thu, Feb 20th) ***
---------------------------------------------
Microsoft has published a TechNet article detailing the availability of a "FixIt" for the current IE9/IE10 zero day which has been doing the rounds. Corporate users will presumably have to wait until the availability of the patch which Microsoft say will be released during the monthly patching cycle..
---------------------------------------------
http://isc.sans.edu/diary.html?storyid=17684&rss
*** Microsoft Security Advisory (2934088) ***
---------------------------------------------
Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 10. Only Internet Explorer 9 and Internet Explorer 10 are affected by this vulnerability. Other supported versions of Internet Explorer are not affected. Applying the Microsoft Fix it solution, "MSHTML Shim Workaround," prevents ..
---------------------------------------------
https://technet.microsoft.com/en-us/security/advisory/2934088
*** Fritzbox-Lücke: Jetzt auch bei WLAN-Repeatern ***
---------------------------------------------
Auf den Routern haben zwar längst noch nicht alle Nutzer die Sicherheitslücke gestopft, aber zumindest stehen Firmware-Updates bereit. Nun bessert AVM auch die Software anderer Produkte mit WLAN-Schnittstelle aus.
---------------------------------------------
http://www.heise.de/security/meldung/Fritzbox-Luecke-Jetzt-auch-bei-WLAN-Re…
*** Datenbank-Leck in Leoben, Hack-Angriff auf Energie Steiermark ***
---------------------------------------------
Zusammenhang beider Vorfälle möglich - Zugriff auf Gas-Kundendaten bei Energie Steiermark
---------------------------------------------
http://derstandard.at/1392685633659
*** eXtplorer Joomla! Authentication Bypass Security Issue ***
---------------------------------------------
https://secunia.com/advisories/57022
*** SA-CONTRIB-2014-022 - Slickgrid - Access bypass ***
---------------------------------------------
The module doesnt check access sufficiently, allowing users to ..
---------------------------------------------
https://drupal.org/node/2200491
*** Drupal Maestro 7.x Cross Site Scripting ***
---------------------------------------------
http://cxsecurity.com/issue/WLB-2014020165
*** [remote] - MediaWiki Thumb.php Remote Command Execution ***
---------------------------------------------
http://www.exploit-db.com/exploits/31767