=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 23-05-2023 18:00 − Mittwoch 24-05-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Barracuda warns of email gateways breached via zero-day flaw ∗∗∗
---------------------------------------------
Barracuda, a company known for its email and network security solutions, warned customers today that some of their Email Security Gateway (ESG) appliances were breached last week by targeting a now-patched zero-day vulnerability.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/barracuda-warns-of-email-gat…
∗∗∗ Legion Malware Upgraded to Target SSH Servers and AWS Credentials ∗∗∗
---------------------------------------------
An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services (AWS) credentials associated with DynamoDB and CloudWatch.
---------------------------------------------
https://thehackernews.com/2023/05/legion-malware-upgraded-to-target-ssh.html
∗∗∗ Malvertising via brand impersonation is back again ∗∗∗
---------------------------------------------
In recent months, numerous incidents have shown that malvertising is on the rise again and affecting the user experience and trust in their favorite search engine. Indeed, Search Engine Results Pages (SERPs) include paid Google ads that in some cases lead to scams or malware.
---------------------------------------------
https://www.malwarebytes.com/blog/threat-intelligence/2023/05/malvertising-…
∗∗∗ Von legitim zu bösartig: Die Verwandlung einer Android‑App innerhalb eines Jahres ∗∗∗
---------------------------------------------
ESET-Forscher entdecken AhRat - ein neuer Android-RAT auf der Basis von AhMyth - der Dateien exfiltriert und Audio aufzeichnet.
---------------------------------------------
https://www.welivesecurity.com/deutsch/2023/05/23/von-legitim-zu-bosartig-a…
∗∗∗ Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own ∗∗∗
---------------------------------------------
MikroTik patches a major security defect in its RouterOS product a full five months after it was exploited at Pwn2Own Toronto.
---------------------------------------------
https://www.securityweek.com/mikrotik-belatedly-patches-routeros-flaw-explo…
∗∗∗ Zahlreiche World4You Phishing-Mails im Umlauf! ∗∗∗
---------------------------------------------
Website-Betreiber:innen aufgepasst: Kriminelle versenden aktuell vermehrt E-Mails im Namen des österreichischen Hosting-Providers World4You. Darin wird meist fälschlicherweise behauptet, dass Rechnungen nicht beglichen oder Webadressen gesperrt wurden.
---------------------------------------------
https://www.watchlist-internet.at/news/zahlreiche-world4you-phishing-mails-…
∗∗∗ CISA and Partners Update the #StopRansomware Guide, Developed through the Joint Ransomware Task Force (JRTF) ∗∗∗
---------------------------------------------
Today, CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) published an updated version of the #StopRansomware Guide, as ransomware actors have accelerated their tactics and techniques since its initial release in 2020.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/23/cisa-and-partners-update…
=====================
= Vulnerabilities =
=====================
∗∗∗ VMSA-2023-0010 ∗∗∗
---------------------------------------------
NSX-T contains a reflected cross-site scripting vulnerability due to a lack of input validation. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.3.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2023-0010.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libssh and sofia-sip), Fedora (cups-filters, dokuwiki, qt5-qtbase, and vim), Oracle (git, python-pip, and python3-setuptools), Red Hat (git, kernel, kpatch-patch, rh-git227-git, and sudo), SUSE (openvswitch, rmt-server, and texlive), and Ubuntu (binutils, cinder, cloud-init, firefox, golang-1.13, Jhead, liblouis, ncurses, node-json-schema, node-xmldom, nova, python-glance-store, python-os-brick, and runc).
---------------------------------------------
https://lwn.net/Articles/932827/
∗∗∗ Nextcloud: user_oidc app is missing bruteforce protection ∗∗∗
---------------------------------------------
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x…
∗∗∗ Nextcloud: User session not correctly destroyed on logout ∗∗∗
---------------------------------------------
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q…
∗∗∗ Nextcloud: Basic auth header on WebDAV requests is not brute-force protected ∗∗∗
---------------------------------------------
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m…
∗∗∗ Apple security updates: iTunes 12.12.9 for Windows ∗∗∗
---------------------------------------------
https://support.apple.com/kb/HT213763
∗∗∗ F5: K000134744 : Intel BIOS vulnerability CVE-2022-38087 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000134744
∗∗∗ F5: K000134747 : PHP vulnerability CVE-2023-0568 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000134747
∗∗∗ Bosch: Unrestricted SSH port forwarding in BVMS ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-025794-bt.html
∗∗∗ Bosch: Vulnerability in Wiegand card data interpretation ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-391095-bt.html
∗∗∗ Bosch: .NET Remote Code Execution Vulnerability in BVMS, BIS and AMS ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-110112-bt.html
∗∗∗ IBM App Connect Enterprise and IBM Integration Bus are vulnerable to a remote attacker due to the module xml2js (CVE-2023-0842) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997617
∗∗∗ IBM App Connect Enterprise is vulnerable to a denial of service due to cURL libcurl and Google protobuf-java. (CVE-2022-42915, CVE-2021-22569, CVE-2022-3509, CVE-2022-3171, CVE-2022-3510) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997631
∗∗∗ IBM InfoSphere Information Server is affected by a remote code execution vulnerability (CVE-2023-32336) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6995879
∗∗∗ This Power System update is being released to address CVE 2023-30438 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6993021
∗∗∗ TADDM affected by multiple vulnerabilities due to IBM Java and its runtime ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997919
∗∗∗ Vulnerability in IBM\u00ae Runtime Environment Java\u2122 Version 8 \u00a0affect Cloud Pak System. [CVE-2023-30441] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997913
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server used by IBM Rational ClearQuest (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997097
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server used by IBM Rational ClearQuest (CVE-2022-39161) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997921
∗∗∗ A security vulnerability has been identified in IBM HTTP Server shipped with IBM WebSphere Application Server used by IBM Rational ClearQuest (CVE-2022-39161) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997923
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server used by IBM Rational ClearQuest (CVE-2023-24966) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997925
∗∗∗ Red Hat OpenShift on IBM Cloud is affected by a Kubernetes API server security vulnerability (CVE-2022-3172) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997115
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 22-05-2023 18:00 − Dienstag 23-05-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Malicious Windows kernel drivers used in BlackCat ransomware attacks ∗∗∗
---------------------------------------------
The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malicious-windows-kernel-dri…
∗∗∗ Sicherheitslücke in Samsung-Smartphones wird angegriffen ∗∗∗
---------------------------------------------
Eine Sicherheitslücke in Samsung-Smartphones, die das Unternehmen mit den Mai-Updates schließt, wird von Angreifern missbraucht. Einige Details sind unklar.
---------------------------------------------
https://heise.de/-9062566
∗∗∗ BrutePrint: Attacke knackt Schutz mit Fingerabdrucksensoren ∗∗∗
---------------------------------------------
IT-Sicherheitsforscher haben einen Angriff namens BrutePrint auf den Zugangsschutz von Smartphones mit Fingerabdrucksensoren vorgestellt.
---------------------------------------------
https://heise.de/-9062997
∗∗∗ OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel ∗∗∗
---------------------------------------------
Cedric Halbronn and Alex Plaskett presented at OffensiveCon on the 19th of May 2023 on Exploit Engineering – Attacking the Linux kernel.
---------------------------------------------
https://research.nccgroup.com/2023/05/23/offensivecon-2023-exploit-engineer…
∗∗∗ Willhaben: Betrug mit PayLivery erkennen ∗∗∗
---------------------------------------------
Betrügerische Käufer:innen fälschen den PayLivery-Dienst von Willhaben und täuschen Ihnen vor, dass sie bereits bezahlt haben. Sie locken Sie auf eine Fake-Zahlungsplattform, wo Sie Ihre Kreditkartendaten zur Anforderung der Zahlung angeben müssen. Anschließend fordert man Sie auf, den Zahlungseingang in Ihrer Bank-App zu bestätigen. In Wirklichkeit geben Sie aber eine Zahlung frei und verlieren Ihr Geld.
---------------------------------------------
https://www.watchlist-internet.at/news/willhaben-betrug-mit-paylivery-erken…
∗∗∗ Android app breaking bad: From legitimate screen recording to file exfiltration within a year ∗∗∗
---------------------------------------------
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio
---------------------------------------------
https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitima…
∗∗∗ Hacker nutzen Dropbox für betrügerische E-Mails ∗∗∗
---------------------------------------------
Aufgrund der Verbindung zu Dropbox scheinen die Nachrichten harmlos zu sein. Auch Sicherheitslösungen beanstanden unter Umständen die URLs zu Dropbox nicht. Nutzer laufen indes Gefahr, ihre Anmeldedaten an Hacker weiterzugeben.
---------------------------------------------
https://www.zdnet.de/88409355/hacker-nutzen-dropbox-fuer-betruegerische-e-m…
∗∗∗ DarkCloud Infostealer Being Distributed via Spam Emails ∗∗∗
---------------------------------------------
AhnLab Security Emergency response Center (ASEC) has recently discovered the DarkCloud malware being distributed via spam email. DarkCloud is an Infostealer that steals account credentials saved on infected systems, and the threat actor installed ClipBanker alongside DarkCloud.
---------------------------------------------
https://asec.ahnlab.com/en/53128/
∗∗∗ Lazarus Group Targeting Windows IIS Web Servers ∗∗∗
---------------------------------------------
AhnLab Security Emergency response Center (ASEC) has recently confirmed the Lazarus group, a group known to receive support on a national scale, carrying out attacks against Windows IIS web servers.
---------------------------------------------
https://asec.ahnlab.com/en/53132/
∗∗∗ Info Stealer Abusing Codespaces Puts Discord Users at Risk ∗∗∗
---------------------------------------------
In this entry, we detail our research findings on how an info stealer is able to achieve persistence on a victim’s machine by modifying the victim’s Discord client.
---------------------------------------------
https://www.trendmicro.com/en_us/research/23/e/info-stealer-abusing-codespa…
=====================
= Vulnerabilities =
=====================
∗∗∗ WordPress 6.2.2: Durch Sicherheitspatch ausgelösten Fehler ausgebügelt ∗∗∗
---------------------------------------------
Die WordPress-Entwickler haben ein Sicherheitsupdate korrigiert. Die aktuelle Version steht ab sofort zum Download bereit.
---------------------------------------------
https://heise.de/-9062515
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (node-nth-check), Mageia (mariadb and python-reportlab), Slackware (c-ares), SUSE (geoipupdate and qt6-svg), and Ubuntu (linux, linux-aws, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-bluefield, linux-gcp, linux-hwe, linux-raspi2, linux-snapdragon, and linux-gcp, linux-hwe-5.19).
---------------------------------------------
https://lwn.net/Articles/932693/
∗∗∗ CISA Releases Four Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
CISA released four Industrial Control Systems (ICS) advisories on May 23, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
* ICSA-23-143-01 Hitachi Energy AFS65x, AFS67x, AFR67x and AFF66x Products
* ICSA-23-143-02 Hitachi Energy RTU500
* ICSA-23-143-03 Mitsubishi Electric MELSEC Series CPU module
* ICSA-23-143-04 Horner Automation Cscape
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/23/cisa-releases-four-indus…
∗∗∗ This Power System update is being released to address CVE 2023-30440 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997133
∗∗∗ IBM® MobileFirst Platform is vulnerable to CVE-2023-24998 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997293
∗∗∗ Vulnerabilities in Python may affect IBM Spectrum Protect Plus Container backup and restore for Kubernetes and OpenShift ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997507
∗∗∗ IBM Java SDK and IBM Java Runtime for IBM i are vulnerable to exposing sensitive information due to flaws and configurations (CVE-2023-30441). ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997499
∗∗∗ IBM App Connect Enterprise Certified Container DesignerAuthoring and IntegrationServer operands may be vulnerable to denial of service due to [CVE-2012-0881], [CVE-2013-4002] and [CVE-2022-23437] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6985605
∗∗∗ Multiple Security Vulnerabilities have been fixed in the IBM Directory Server and IBM Directory Suite products (CVE-2022-22476, CVE-2022-34165) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997581
∗∗∗ Multiple Security Vulnerabilities have been fixed in the IBM Directory Server and IBM Directory Suite products (CVE-2022-22473. CVE-2021-38951) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997587
∗∗∗ Multiple Security Vulnerabilities have been fixed in IBM Security Directory Server, IBM Security Directory Suite and IBM Security Verify Directory. ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997593
∗∗∗ Multiple Security Vulnerabilities have been fixed in the IBM Directory Server and IBM Directory Suite products (CVE-2022-21496, CVE-2021-35550, CVE-2021-2163, CVE-2021-35603) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997585
∗∗∗ A vulnerability in IBM SDK, Java Technology Edition affect IBM Operations Analytics Predictive Insights ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997589
∗∗∗ CVE-2022-41723 and CVE-2022-41721 may affect IBM CICS TX Advanced ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997601
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 19-05-2023 18:00 − Montag 22-05-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Aktuelle Qakbot/Pikabot-Welle in Österreich ∗∗∗
---------------------------------------------
Aktuell ist neben anderen Ländern auch Österreich wieder von einer Phishing/Malspam-Welle durch Qakbot/Pikabot betroffen. Die aktuelle Kampagne läuft unter dem Namen BB28 und führt nach einer erfolgten Infektion zum Nachladen von Cobalt Strike und in weiterer Folge oft zu Ransomware - hier im Speziellen häufig BlackBasta. Eine Besonderheit dieser Kampagne ist das Auftreten eines potentiellen Nachfolgers oder Mitstreiters von Qakbot namens Pikabot.
---------------------------------------------
https://cert.at/de/aktuelles/2023/5/aktuelle-qakbotpikabot-welle-in-osterre…
∗∗∗ CISA warns of Samsung ASLR bypass flaw exploited in attacks ∗∗∗
---------------------------------------------
CISA warned today of a security vulnerability affecting Samsung devices used in attacks to bypass Android address space layout randomization (ASLR) protection.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cisa-warns-of-samsung-aslr-b…
∗∗∗ Cloned CapCut websites push information stealing malware ∗∗∗
---------------------------------------------
A new malware distribution campaign is underway impersonating the CapCut video editing tool to push various malware strains to unsuspecting victims.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/cloned-capcut-websites-push-…
∗∗∗ Notorious Cyber Gang FIN7 Returns Cl0p Ransomware in New Wave of Attacks ∗∗∗
---------------------------------------------
The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the threat actor's first ransomware campaign since late 2021. Microsoft, which detected the activity in April 2023, is tracking the financially motivated actor under its new taxonomy Sangria Tempest.
---------------------------------------------
https://thehackernews.com/2023/05/notorious-cyber-gang-fin7-returns-cl0p.ht…
∗∗∗ IcedID Macro Ends in Nokoyawa Ransomware ∗∗∗
---------------------------------------------
In this case we document an incident taking place during Q4 of 2022 consisting of threat actors targeting Italian organizations with Excel maldocs that deploy IcedID. The threat actors deploying such a campaign may hope to target organizations who have not updated their Microsoft Office deployments after the newly released patches to block macros on documents downloaded from the internet.
---------------------------------------------
https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomwa…
∗∗∗ Microsoft: BEC Scammers Use Residential IPs to Evade Detection ∗∗∗
---------------------------------------------
BEC scammers use residential IP addresses in attacks to make them seem locally generated and evade detection.
---------------------------------------------
https://www.securityweek.com/microsoft-bec-scammers-use-residential-ips-to-…
∗∗∗ Webinar: Wie schütze ich mich vor Love Scams? ∗∗∗
---------------------------------------------
Sie täuschen die große Liebe vor und bringen ihr Gegenüber damit um hohe Geldsummen: Beim Love-Scamming erschleichen sich Betrüger:innen auf Online-Partnerbörsen und in Sozialen Netzwerken das Vertrauen ihrer Opfer, um an deren Geld zu kommen. Nehmen Sie kostenlos teil: Dienstag 30. Mai 2023, 18:30 - 20:00 Uhr via zoom
---------------------------------------------
https://www.watchlist-internet.at/news/webinar-wie-schuetze-ich-mich-vor-lo…
∗∗∗ Gratis-Testangebot einer Lichttherapie nur ein Verkaufsgespräch ∗∗∗
---------------------------------------------
Um Kund:innen zu gewinnen, verspricht Lumina Vital Ihnen Gratis-Anwendungen. Telefonisch wird auf einen Besuch bei Ihnen zu Hause gedrängt. Auch wenn Sie keinem Datum zusagen, bekommen Sie einen Brief mit einem fixierten Termin zugeschickt. Lassen Sie sich nicht unter Druck setzen, wenn Sie nichts kaufen möchten!
---------------------------------------------
https://www.watchlist-internet.at/news/gratis-testangebot-einer-lichttherap…
∗∗∗ Threat Hunting mit PowerShell – Sicherheit auch mit kleinem Budget ∗∗∗
---------------------------------------------
[English]IT-Sicherheit sollte keine Frage des Geldes sein – das sind oft vorgeschobene Ausreden. MVP Tom Wechsler hat sich einige Gedanken um das Thema gemacht und zeigt, wie man sogar mit der PowerShell und wenigen Zeilen Code nach Problemen in der … Weiterlesen →
---------------------------------------------
https://www.borncity.com/blog/2023/05/22/threat-hunting-mit-powershell-sich…
∗∗∗ Distribution of Remcos RAT Exploiting sqlps.exe Utility of MS-SQL Servers ∗∗∗
---------------------------------------------
AhnLab Security Emergency response Center (ASEC) has recently discovered the case of Remcos RAT being installed on poorly managed MS-SQL servers. Unlike the past attack, the recent case showed the threat actor using sqlps to distribute the malware.
---------------------------------------------
https://asec.ahnlab.com/en/52920/
∗∗∗ Cloud-Based Malware Delivery: The Evolution of GuLoader ∗∗∗
---------------------------------------------
Antivirus products are constantly evolving to become more sophisticated and better equipped to handle complex threats. As a result, malware developers strive to create new threats that can bypass the defenses of antivirus products. “Packing” and “crypting” services are specifically designed to resist analysis. GuLoader is one of the most prominent services cybercriminals use to evade antivirus detection.
---------------------------------------------
https://research.checkpoint.com/2023/cloud-based-malware-delivery-the-evolu…
=====================
= Vulnerabilities =
=====================
∗∗∗ CUPS: Sicherheitslücke in Drucksystem ermöglicht Schadcodeausführung ∗∗∗
---------------------------------------------
Im Drucksystem CUPS können Angreifer im Netz eine Sicherheitslücke missbrauchen, um beliebigen Code einzuschmuggeln und auszuführen.
---------------------------------------------
https://heise.de/-9061315
∗∗∗ Angreifer könnten Entwicklungsumgebungen mit Jenkins attackieren ∗∗∗
---------------------------------------------
Softwareentwickler aufgepasst: Es gibt wichtige Sicherheitsupdates für mehrere Jenkins-Plug-ins. Angreifer könnten auf Log-in-Daten zugreifen.
---------------------------------------------
https://heise.de/-9061545
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (cups-filters, imagemagick, libwebp, sqlite, and texlive-bin), Fedora (chromium and vim), Gentoo (librecad, mediawiki, modsecurity-crs, snakeyaml, and tinyproxy), Mageia (apache-mod_security, cmark, dmidecode, freetype2, glib2.0, libssh, patchelf, python-sqlparse, sniproxy, suricata, and webkit2), Oracle (apr-util and firefox), Red Hat (git), SUSE (containerd, openvswitch, python-Flask, runc, terraform-provider-aws, and terraform-provider-null), and Ubuntu (tar).
---------------------------------------------
https://lwn.net/Articles/932625/
∗∗∗ Tornado vulnerable to open redirect ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN45127776/
∗∗∗ WordPress 6.2.2 Security Release ∗∗∗
---------------------------------------------
https://wordpress.org/news/2023/05/wordpress-6-2-2-security-release/
∗∗∗ F5: K000134681 : Spring Framework vulnerability CVE-2023-20861 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000134681
∗∗∗ F5: K000134706 : Python IDNA vulnerability CVE-2022-45061 ∗∗∗
---------------------------------------------
https://my.f5.com/manage/s/article/K000134706
∗∗∗ CISA Adds Three Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/22/cisa-adds-three-known-ex…
∗∗∗ Vulnerability in IBM Java SDK affects IBM Tivoli Business Service Manager (CVE-2023-30441) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6995893
∗∗∗ Security vulnerability in IBM Java SDK affect IBM Tivoli Netcool Impact (CVE-2023-30441) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6995895
∗∗∗ Multiple vulnerabilities in IBM Java SDK affect AIX ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6995887
∗∗∗ IBM Security Guardium is affected by an AWS SDK vulnerability (CVE-2022-31159) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6960215
∗∗∗ IBM Operational Decision Manager April 2023 - Multiple CVEs ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997063
∗∗∗ Multiple vulnerabilities of Mozilla Firefox (less than Firefox 102.9ESR) have affected APM Synthetic Playback Agent ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997069
∗∗∗ A vulnerability in IBM Java SDK affects IBM Tivoli Monitoring for Virtual Environments Base(CVE-2023-30441) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997075
∗∗∗ A vulnerability in IBM Java SDK affects IBM Tivoli Monitoring for Virtual Environments Agent for Linux Kernel-based Virtual Machines (CVE-2023-30441) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997083
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server used by IBM Rational ClearQuest (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997097
∗∗∗ There are multiple vulnerabilites that affect IBM Engineering Requirements Quality Assistant On-Premises ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997107
∗∗∗ IBM App Connect Enterprise and IBM Integration Bus are affected by a vulnerability in the IBM SDK, Java Technology Edition [CVE-2023-30441] ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6997131
∗∗∗ IBM b-type SAN switches and directors affected by XSS vulnerabilities CVE-2017-6225. ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/650695
∗∗∗ IBM b-type SAN Network\/Storage switches is affected by a denial of service vulnerability, caused by a CPU consumption in the IPv6 stack (CVE-2017-6227). ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/650699
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 17-05-2023 18:00 − Freitag 19-05-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Attacken könnten bevorstehen: Kritische Root-Lücken bedrohen Cisco-Switches ∗∗∗
---------------------------------------------
Cisco hat unter anderem mehrere kritische Sicherheitslücken in verschiedenen Small-Business-Switches geschlossen. Aber nicht alle Modelle bekommen Updates.
---------------------------------------------
https://heise.de/-9059775
∗∗∗ Passwortmanager KeePass: Sicherheitsforscher liest Master-Passwort aus ∗∗∗
---------------------------------------------
Einem Sicherheitsforscher ist es gelungen, Master-Passwörter von KeePass auszulesen. Entsprechende Angriffe sind allerdings aufwendig.
---------------------------------------------
https://heise.de/-9059945
∗∗∗ Zero-Days und mehr: Ein Blick auf Apples jüngste Sicherheitspatches ∗∗∗
---------------------------------------------
iOS 16.5, macOS 13.4 und die anderen Updates patchen wie üblich auch Sicherheitsfehler. Auch bereits ausgenutzte Fehler sind dabei.
---------------------------------------------
https://heise.de/-9059799
∗∗∗ Malware infizierte fast 10 Millionen Android-Handys ∗∗∗
---------------------------------------------
Zahlreiche Smartphones wurden mit vorinstallierter, schädlicher Software ausgeliefert.
---------------------------------------------
https://futurezone.at/produkte/android-schadsoftware-infiziert-10-millionen…
∗∗∗ MalasLocker ransomware targets Zimbra servers, demands charity donation ∗∗∗
---------------------------------------------
A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of demanding a ransom payment, the threat actors claim to require a donation to charity to provide an encryptor and prevent data leaking.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malaslocker-ransomware-targe…
∗∗∗ Hackers target vulnerable Wordpress Elementor plugin after PoC released ∗∗∗
---------------------------------------------
Hackers are now actively probing for vulnerable Essential Addons for Elementor plugin versions on thousands of WordPress websites in massive Internet scans, attempting to exploit a critical account password reset flaw disclosed earlier in the month.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-target-vulnerable-wo…
∗∗∗ Playing for the Wrong Team: Dangerous Functionalities in Microsoft Teams Enable Phishing and Malware Delivery by Attackers ∗∗∗
---------------------------------------------
Microsoft is a major productivity partner for many organizations and enterprises. These organizations widely trust Microsoft Office’s suite of products as a reliable foundation for their daily cloud ecosystem needs. However, as Proofpoint has shown in the past, this migration to the cloud also introduces new kinds of threats.
---------------------------------------------
https://www.proofpoint.com/us/blog/threat-insight/dangerous-functionalities…
∗∗∗ RATs found hiding in the npm attic ∗∗∗
---------------------------------------------
ReversingLabs researchers discovered two malicious packages that contained TurkoRat, an open source infostealer that lurked on npm for two months before being detected.
---------------------------------------------
https://www.reversinglabs.com/blog/rats-found-hiding-in-the-npm-attic
∗∗∗ The Paillier Cryptosystem with Applications to Threshold ECDSA ∗∗∗
---------------------------------------------
You may have heard of RSA (b. 1977), but have you heard of its cousin, Paillier (b. 1999)? In this post, we provide a close look at the Paillier homomorphic encryption scheme [Paillier1999], what it offers, how it’s used in complex protocols, and how to implement it securely.
---------------------------------------------
https://research.nccgroup.com/2023/05/19/the-paillier-cryptosystem-with-app…
∗∗∗ All your building are belong to us ∗∗∗
---------------------------------------------
TL;DR: Building Management Systems (BMS) bring new risks to businesses that haven’t had previous experience of securing Operational Technology (OT). While there might not be direct financial gain from hacking BMS, these systems can be a soft target for attackers to pivot into your business operations. IoT offerings in this space can help manage risk within your networks, but can also provide unintended access to sensitive information.
---------------------------------------------
https://www.pentestpartners.com/security-blog/all-your-building-are-belong-…
∗∗∗ CVE-2023-20869/20870: Exploiting VMware Workstation at Pwn2Own Vancouver ∗∗∗
---------------------------------------------
This post covers an exploit chain demonstrated by Nguyễn Hoàng Thạch (@hi_im_d4rkn3ss) of STAR Labs SG Pte. Ltd. during the Pwn2Own Vancouver event in 2023. During the contest, he used an uninitialized variable bug and a stack-based buffer overflow in VMware to escalate from a guest OS to execute code on the underlying hypervisor.
---------------------------------------------
https://www.thezdi.com/blog/2023/5/17/cve-2023-2086920870-exploiting-vmware…
∗∗∗ VSCode Security: Malicious Extensions Detected- More Than 45,000 Downloads- PII Exposed, and Backdoors Enabled ∗∗∗
---------------------------------------------
Highlights: CloudGuard Spectral detected malicious extensions on the VSCode marketplace Users installing these extensions were enabling attackers to steal PII records and to set remote shell to their machines Once detected, we’ve alerted VSCode on these extensions. Soon after notification, they were removed by the VSCode marketplace team. VSCode (short for Visual Studio Code) is a popular and free source code editor developed by Microsoft.
---------------------------------------------
https://blog.checkpoint.com/securing-the-cloud/malicious-vscode-extensions-…
∗∗∗ Visualizing QakBot Infrastructure ∗∗∗
---------------------------------------------
This blog post seeks to draw out some high-level trends and anomalies based on our ongoing tracking of QakBot command and control (C2) infrastructure. By looking at the data with a broader scope, we hope to supplement other research into this particular threat family, which in general focuses on specific infrastructure elements; e.g., daily alerting on active C2 servers.
---------------------------------------------
https://www.team-cymru.com/post/visualizing-qakbot-infrastructure
=====================
= Vulnerabilities =
=====================
∗∗∗ File Chooser Field - Moderately critical - Server Side Request Forgery, Information Disclosure - SA-CONTRIB-2023-015 ∗∗∗
---------------------------------------------
The File Chooser Field allows users to upload files using 3rd party plugins such as Google Drive and Dropbox. This module fails to validate user input sufficiently which could under certain circumstances lead to a Server Side Request Forgery (SSRF) vulnerability [...]
---------------------------------------------
https://www.drupal.org/sa-contrib-2023-015
∗∗∗ SECURITY BULLETIN: May 2023 Security Bulletin for Trend Micro Apex Central ∗∗∗
---------------------------------------------
Trend Micro has released a new build for Trend Micro Apex Central that resolves several known vulnerabilities.
---------------------------------------------
https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US
∗∗∗ SECURITY BULLETIN: May 2023 Security Bulletin for Trend Micro Apex One ∗∗∗
---------------------------------------------
Trend Micro has released a new Critical Patch (CP) for Trend Micro Apex One and Trend Micro Apex One as a Service that resolves several known vulnerabilities.
---------------------------------------------
https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US
∗∗∗ Cisco Security Advisories 2023-05-17 ∗∗∗
---------------------------------------------
Cisco has published 9 security advisories: (1x Critical, 8x Medium)
---------------------------------------------
https://sec.cloudapps.cisco.com/security/center/Search.x?publicationTypeIDs…
∗∗∗ CISA Releases Five Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
* ICSA-23-138-04 Johnson Controls OpenBlue Enterprise Manager Data Collector * ICSA-23-138-03 Hitachi Energy’s MicroSCADA Pro/X SYS600 Products * ICSA-23-138-02 Mitsubishi Electric MELSEC WS Series * ICSA-23-138-01 Carlo Gavazzi Powersoft * ICSA-20-051-02 Rockwell Automation FactoryTalk Diagnostics (Update B)
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/18/cisa-releases-five-indus…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (chromium and libapache2-mod-auth-openidc), Fedora (clevis-pin-tpm2, greetd, keyring-ima-signer, libkrun, mirrorlist-server, nispor, nmstate, qt5-qtbase, rust-afterburn, rust-below, rust-bodhi-cli, rust-cargo-c, rust-coreos-installer, rust-fedora-update-feedback, rust-git-delta, rust-gst-plugin-reqwest, rust-pore, rust-rpm-sequoia, rust-sequoia-octopus-librnp, rust-sequoia-policy-config, rust-sequoia-sq, rust-sevctl, rust-tealdeer, and rust-ybaas), Oracle (apr-util, curl, emacs, firefox, kernel, libreswan, mysql, nodejs and nodejs-nodemon, openssh, thunderbird, and webkit2gtk3), Red Hat (apr-util, emacs, firefox, git, jenkins and jenkins-2-plugins, kernel, kpatch-patch, and thunderbird), Scientific Linux (apr-util, firefox, and thunderbird), Slackware (curl), SUSE (cups-filters, curl, java-1_8_0-openjdk, kernel, mysql-connector-java, and ovmf), and Ubuntu (cups-filters, git, linux-gcp-4.15, linux-oracle, linux-raspi, node-minimatch, ruby2.3, ruby2.5, ruby2.7, and runc).
---------------------------------------------
https://lwn.net/Articles/932371/
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (cups-filters, kitty, mingw-LibRaw, nispor, rust-ybaas, and rust-yubibomb), Mageia (kernel-linus), Red Hat (jenkins and jenkins-2-plugins), SUSE (openvswitch and ucode-intel), and Ubuntu (linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop, linux-oracle-5.15, linux-ibm, linux-oracle, and linux-oem-6.0).
---------------------------------------------
https://lwn.net/Articles/932464/
∗∗∗ Path Traversal in SymBox, SymOS (SYSS-2023-014) ∗∗∗
---------------------------------------------
Das Webinterface von SymBox, SymOS ermöglicht ein Path Traversal, wodurch Zugriff auf Systemdateien außerhalb des Web Root erlangt werden kann.
---------------------------------------------
https://www.syss.de/pentest-blog/path-traversal-in-symbox-symos-syss-2023-0…
∗∗∗ Spring Boot available now, fixing CVE-2023-20883 ∗∗∗
---------------------------------------------
https://spring.io/security/cve-2023-20883
∗∗∗ Mattermost security updates 7.10.1 / 7.9.4 / 7.8.5 (ESR) released ∗∗∗
---------------------------------------------
https://mattermost.com/blog/mattermost-security-updates-7-10-1-7-9-4-7-8-5-…
∗∗∗ CPE2023-002 Vulnerabilities of IJ Network Tool regarding Wi-Fi connection setup – 18 May 2023 ∗∗∗
---------------------------------------------
https://www.canon-europe.com/support/product-security-latest-news/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 16-05-2023 18:00 − Mittwoch 17-05-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Hackers use Azure Serial Console for stealthy access to VMs ∗∗∗
---------------------------------------------
A financially motivated cybergang tracked by Mandiant as UNC3944 is using phishing and SIM swapping attacks to hijack Microsoft Azure admin accounts and gain access to virtual machines.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-use-azure-serial-con…
∗∗∗ Phishing: Streit um Google-TLDs .zip und .mov ∗∗∗
---------------------------------------------
IT- und Sicherheitsexperten streiten sich um die Sinnhaftigkeit und Risiken neuer gTLD. Neu sind die Probleme allerdings nicht.
---------------------------------------------
https://www.golem.de/news/phishing-streit-um-google-tlds-zip-und-mov-2305-1…
∗∗∗ Minas – on the way to complexity ∗∗∗
---------------------------------------------
Kaspersky analysis of a complicated multi-stage attack dubbed Minas that features a number of detection evasion and persistence techniques and results in a cryptocurrency miner infection.
---------------------------------------------
https://securelist.com/minas-miner-on-the-way-to-complexity/109692/
∗∗∗ Wemo Wont Fix Smart Plug Vulnerability Allowing Remote Operation ∗∗∗
---------------------------------------------
IoT security research firm Sternum has discovered (and disclosed) a buffer overflow vulnerability in the Wemo Mini Smart Plug V2. The firms blog post is full of interesting details about how this device works (and doesnt), but a key takeaway is that you can predictably trigger a buffer overflow by passing the device a name longer than its 30-character limit -- a limit enforced solely by Wemos own apps -- with third-party tools.
---------------------------------------------
https://it.slashdot.org/story/23/05/17/141200/wemo-wont-fix-smart-plug-vuln…
∗∗∗ Respawning Malware Persists on PyPI ∗∗∗
---------------------------------------------
A bad actor on GitHub laces his repositories with malware written in Python and hosted on PyPI. Minutes after his malware is taken down from PyPI, the same malware respawns on PyPI under a slightly different name. He then immediately updates all of his repositories to point to this new package. Most of his GitHub projects are bots or some variety of a stealer.
---------------------------------------------
https://blog.phylum.io/respawning-malware-persists-on-pypi/
∗∗∗ Neue Scam-Website im Umlauf: finanavas.com ∗∗∗
---------------------------------------------
Investmentbetrüger versuchen mit einer neuen Website Leuten Geld aus der Tasche zu ziehen. Sie nutzen Telegram, um "Investoren" um den Finger zu wickeln.
---------------------------------------------
https://heise.de/-9058909
∗∗∗ Abo-Falle statt Informationen zu Telefonnummern auf reversera.com/de ∗∗∗
---------------------------------------------
In einer Zeit ständiger betrügerischer Anrufe und „Cold-Calls“ ist ein Service, der einem Informationen zu Telefonnummern und den Besitzer:innen liefert, äußerst nützlich. Reversera.com/de der АLРНАСLІС LТD bietet angeblich genau das an. Tatsächlich spielte man uns im Test bei erfundenen Nummern ein Ergebnis vor. Um dieses einsehen zu können, hätten wir 50 Cent per Kreditkarte bezahlen müssen, doch die Zahlung führt in eine Abo-Falle!
---------------------------------------------
https://www.watchlist-internet.at/news/abo-falle-statt-informationen-zu-tel…
∗∗∗ How to encrypt your email (and why you should) ∗∗∗
---------------------------------------------
If you send emails with sensitive or private info inside, you should consider email encryption. Heres what to know.
---------------------------------------------
https://www.zdnet.com/article/how-to-encrypt-your-email-and-why-you-should/
∗∗∗ WordPress 6.2.1 freigegeben ∗∗∗
---------------------------------------------
Die Entwickler haben zum 16. Mai 2023 WordPress Version 6.2.1 veröffentlicht. Es handelt sich um ein Wartungs- und Sicherheitsupdate, welches 30 Fehler behebt. Details lassen sich in den Veröffentlichungsmitteilungen nachlesen.
---------------------------------------------
https://www.borncity.com/blog/2023/05/16/wordpress-6-2-1-freigegeben/
∗∗∗ SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack ∗∗∗
---------------------------------------------
In 2022, Mandiant identified attacker activity centered in Microsoft Azure that Mandiant attributed to UNC3944. Mandiant’s investigation revealed that the attacker employed malicious use of the Serial Console on Azure Virtual Machines (VM) to install third-party remote management software within client environments. This method of attack was unique in that it avoided many of the traditional detection methods employed within Azure and provided the attacker with full administrative access to the VM. Unfortunately, cloud resources are often poorly misunderstood, leading to misconfigurations that can leave these assets vulnerable to attackers. While methods of initial access, lateral movement, and persistence vary from one attacker to another, one thing is clear: Attackers have their eyes on the cloud.
---------------------------------------------
https://www.mandiant.com/resources/blog/sim-swapping-abuse-azure-serial
∗∗∗ CISA and Partners Release BianLian Ransomware Cybersecurity Advisory ∗∗∗
---------------------------------------------
CISA, the Federal Bureau of Investigation (FBI), and the Australian Cyber Security Centre (ACSC) have released a joint Cybersecurity Advisory (CSA) with known BianLian ransomware and data extortion group technical details. Microsoft and Sophos contributed to the advisory. To reduce the likelihood and impact of BianLian and other ransomware incidents, CISA encourages organizations to implement mitigations recommended in this advisory.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/16/cisa-and-partners-releas…
=====================
= Vulnerabilities =
=====================
∗∗∗ Webbrowser: Kritische Sicherheitslücke in Google Chrome ∗∗∗
---------------------------------------------
Google hat ein Update für den Chrome-Webbrowser herausgegeben. Es schließt mindestens eine kritische Sicherheitslücke. Angreifer könnten Schadcode einschleusen.
---------------------------------------------
https://heise.de/-9057932
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (netatalk), Mageia (connman, firefox/nss/rootcerts, freeimage, golang, indent, kernel, python-django, python-pillow, and thunderbird), Red Hat (apr-util, firefox, java-1.8.0-ibm, libreswan, and thunderbird), SUSE (conmon, curl, java-11-openjdk, and libheif), and Ubuntu (libwebp, linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-hwe-5.15, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle, linux, linux-aws, linux-aws-hwe, linux-kvm, linux, linux-aws, linux-azure, linux-azure-5.19, linux-kvm, linux-lowlatency, linux-raspi, node-eventsource, and openjdk-8, openjdk-lts, openjdk-17, openjdk-20).
---------------------------------------------
https://lwn.net/Articles/932130/
∗∗∗ Vulnerability Summary for the Week of May 8, 2023 ∗∗∗
---------------------------------------------
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
---------------------------------------------
https://www.cisa.gov/news-events/bulletins/sb23-135
∗∗∗ Path Traversal in IP-Symcon (SYSS-2023-014) ∗∗∗
---------------------------------------------
Das Webinterface von IP-Symcon ermöglicht ein Path Traversal, wodurch Zugriff auf Systemdateien außerhalb des Web Root erlangt werden kann.
---------------------------------------------
https://www.syss.de/pentest-blog/path-traversal-in-ip-symcon-syss-2023-014
∗∗∗ Security Advisory - Traffic Hijacking Vulnerability in Huawei Routers ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-thvihr-70…
∗∗∗ Stored XSS Schwachstelle in der Umbenennen Funktionalität von Wekan (Open-Source Kanban) ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/stored-xss-schwachste…
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 15-05-2023 18:00 − Dienstag 16-05-2023 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ VirusTotal AI code analysis expands Windows, Linux script support ∗∗∗
---------------------------------------------
Google has added support for more scripting languages to VirusTotal Code Insight, a recently introduced artificial intelligence-based code analysis feature.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/virustotal-ai-code-analysis-…
∗∗∗ Open-source Cobalt Strike port Geacon used in macOS attacks ∗∗∗
---------------------------------------------
Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more to target macOS devices.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/open-source-cobalt-strike-po…
∗∗∗ Signals Defense With Faraday Bags & Flipper Zero, (Tue, May 16th) ∗∗∗
---------------------------------------------
There are situations where it is desired to block signals between devices. Commonly scenarios are when traveling, in a location of uncertain safety, or otherwise concerned with data privacy and geolocation. I was curious how well a faraday bags and similar products protected wireless communications.
---------------------------------------------
https://isc.sans.edu/diary/rss/29840
∗∗∗ Triple Threat: Breaking Teltonika Routers Three Ways ∗∗∗
---------------------------------------------
Comprehensive research was conducted on Teltonika Networks’ IIoT products, with a focus on industrial cellular devices widely used in various industries, specifically, the Teltonika Remote Management System, and RUT model routers.
---------------------------------------------
https://claroty.com/team82/research/triple-threat-breaking-teltonika-router…
∗∗∗ You’ve been kept in the dark (web): exposing Qilin’s RaaS program ∗∗∗
---------------------------------------------
All you need to know about Qilin ransomware and its operations targeting critical sectors.
---------------------------------------------
https://www.group-ib.com/blog/qilin-ransomware/
∗∗∗ Seitenkanalangriff auf Cortex-M: Zugriff auf sensible Informationen ∗∗∗
---------------------------------------------
Auf der Blackhat Asia haben IT-Forscher Seitenkanalangriffe auf ARM-Cortex-M-Mikroprozessoren vorgestellt. Sie ermöglichen Zugriff auf sensible Informationen.
---------------------------------------------
https://heise.de/-9057108
∗∗∗ It’s always DNS, here’s why… ∗∗∗
---------------------------------------------
There’s an old adage in network and Internet support: When something breaks in any network “it was DNS”. Sadly it’s usually true.
---------------------------------------------
https://www.pentestpartners.com/security-blog/its-always-dns-heres-why/
∗∗∗ Vorsicht vor Anrufen von „austriamegachance.com“ ∗∗∗
---------------------------------------------
Ihr Telefon klingelt. Austria Mega Chance meldet sich, eine Lotto-Tipp-Dienstleistung. Ihnen werden hohe Gewinnchancen beim Lotto versprochen und eine Dienstleistung für Gemeinschaftstipps angeboten. Die aufdringliche Person entlockt Ihnen Kontodaten. Einige Zeit später werden Ihnen dann monatlich, ohne schriftliche Infos oder einen Vertrag unterschieben zu haben, knapp 70 Euro von Ihrem Konto abgebucht. Wir zeigen Ihnen, was Sie tun können!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-anrufen-von-austriamega…
∗∗∗ Microsoft SharePoint scannt Password-geschützte ZIP-Archive ∗∗∗
---------------------------------------------
Es sieht so aus, dass Microsoft in seinen Cloud-Speichern auch ZIP-Archive auf schädliche Inhalte (und ggf. weitere Inhalte) scannt – auch Archive, die vom Benutzer mit einem Kennwort vor der Einsichtnahme geschützt sind.
---------------------------------------------
https://www.borncity.com/blog/2023/05/16/microsoft-sharepoint-scannt-passwo…
∗∗∗ The Dragon Who Sold His Camaro: Analyzing Custom Router Implant ∗∗∗
---------------------------------------------
Through our investigation, we have gained a deeper comprehension of the ways in which attackers are employing malware to target edge devices, particularly routers. Our efforts have led us to uncover several of the tactics and tools utilized by Camaro Dragon in their attacks.
---------------------------------------------
https://research.checkpoint.com/2023/the-dragon-who-sold-his-camaro-analyzi…
∗∗∗ 8220 Gang Evolves With New Strategies ∗∗∗
---------------------------------------------
We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability.
---------------------------------------------
https://www.trendmicro.com/en_us/research/23/e/8220-gang-evolution-new-stra…
∗∗∗ How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry ∗∗∗
---------------------------------------------
In this post, we’re going to learn how Foundry can be used to write a proof of concept (PoC) for uninitialized smart contract vulnerabilities.
---------------------------------------------
https://www.cyberark.com/resources/threat-research-blog/how-to-write-a-poc-…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
IBM Cloud Pak for Network Automation, IBM Control Desk, IBM Maximo, IBM Edge Application Manager, IBM Cloud Automation Manager, Tivoli Monitoring, IBM Business Monitor, IBM Business Automation Workflow Enterprise Service Bus, WebSphere Application Server, Tivoli Application Dependency Discovery Manager, IBM Operations Analytics - Predictive Insights, IBM Security Verify Information Queue.
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
∗∗∗ CISA Releases Three Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
* ICSA-23-136-02 Rockwell ArmorStart
* ICSA-23-136-03 Rockwell Automation FactoryTalk Vantagepoint
* ICSA-23-136-01 Snap One OvrC Cloud
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/16/cisa-releases-three-indu…
∗∗∗ JavaScript-Sandbox vm2: PoC zeigt neuen Sandbox-Ausbruch ∗∗∗
---------------------------------------------
Eine kritische Lücke in der JavaScript-Sandbox vm2 können Angreifer zum Ausbruch missbrauchen. Aktualisierte Software steht bereit, die die Lücken schließt.
---------------------------------------------
https://heise.de/-9056842
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (epiphany-browser, python-ipaddress, and sqlparse), Fedora (python-django3 and qemu), Red Hat (apr-util, autotrace, bind, bind9.16, container-tools:4.0, container-tools:rhel8, ctags, curl, device-mapper-multipath, dhcp, edk2, emacs, freeradius:3.0, freerdp, frr, gcc-toolset-12-binutils, git, git-lfs, go-toolset:rhel8, grafana, grafana-pcp, gssntlmssp, Image Builder, kernel, kernel-rt, libarchive, libreswan, libtar, libtiff, mingw-expat, mysql:8.0, net-snmp, pcs, php:7.4, poppler, postgresql-jdbc, python-mako, python27:2.7, python38:3.8 and python38-devel:3.8, python39:3.9 and python39-devel:3.9, samba, sysstat, tigervnc, unbound, virt:rhel and virt-devel:rhel, wayland, webkit2gtk3, xorg-x11-server, and xorg-x11-server-Xwayland), SUSE (dmidecode, postgresql13, prometheus-sap_host_exporter, python-cryptography, rekor, and thunderbird), and Ubuntu (firefox, matrix-synapse, and mysql-8.0).
---------------------------------------------
https://lwn.net/Articles/932033/
∗∗∗ D-Link DIR-2150 DIR-2150 Firmware Release Notes v1.06 ∗∗∗
---------------------------------------------
https://support.dlink.com.au/Download/download.aspx?product=DIR-2150
∗∗∗ XSA-431 ∗∗∗
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-431.html
∗∗∗ Zahlreiche Schwachstellen in Serenity and StartSharp Software ∗∗∗
---------------------------------------------
https://sec-consult.com/de/vulnerability-lab/advisory/zahlreiche-schwachste…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 12-05-2023 18:00 − Montag 15-05-2023 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ The .zip gTLD: Risks and Opportunities, (Fri, May 12th) ∗∗∗
---------------------------------------------
About ten years ago, ICANN started the "gTLD" program. "Generic TLDs" allows various brands to register their own trademark as a TLD. Instead of "google.com", you now can have ".google"! Applying for a gTLD isn't cheap, and success isn't guaranteed. But since its inception, dozens of new gTLDs have been approved and started to be used [1]. The reputation of these new gTLDs has been somewhat mixed.
---------------------------------------------
https://isc.sans.edu/diary/rss/29838
∗∗∗ XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks ∗∗∗
---------------------------------------------
Cybersecurity researchers have discovered an ongoing phishing campaign that makes use of a unique attack chain to deliver the XWorm malware on targeted systems. Securonix, which is tracking the activity cluster under the name MEME#4CHAN, said some of the attacks have primarily targeted manufacturing firms and healthcare clinics located in Germany.
---------------------------------------------
https://thehackernews.com/2023/05/xworm-malware-exploits-follina.html
∗∗∗ CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware ∗∗∗
---------------------------------------------
Poorly managed Microsoft SQL (MS SQL) servers are the target of a new campaign thats designed to propagate a category of malware called CLR SqlShell that ultimately facilitates the deployment of cryptocurrency miners and ransomware.
---------------------------------------------
https://thehackernews.com/2023/05/clr-sqlshell-malware-targets-ms-sql.html
∗∗∗ New MichaelKors Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems ∗∗∗
---------------------------------------------
A new ransomware-as-service (RaaS) operation called MichaelKors has become the latest file-encrypting malware to target Linux and VMware ESXi systems as of April 2023. The development points to cybercriminal actors increasingly setting their eyes on the ESXi, cybersecurity firm CrowdStrike said in a report shared with The Hacker News.
---------------------------------------------
https://thehackernews.com/2023/05/new-michaelkors-ransomware-as-service.html
∗∗∗ WordPress Field Builder Plugin Vulnerability Exploited in Attacks Two Days After Patch ∗∗∗
---------------------------------------------
PoC exploit targeting an XSS vulnerability in the Advanced Custom Fields WordPress plugin started being used in malicious attacks two days after patch.
---------------------------------------------
https://www.securityweek.com/wordpress-field-builder-plugin-vulnerability-e…
∗∗∗ Webinar: Smartphone, Tablet & Co. sicher nutzen ∗∗∗
---------------------------------------------
Wie kann ich meine persönlichen Daten am Smartphone, Tablet & Co. schützen? In diesem Webinar zeigen wir Ihnen die wichtigsten Sicherheitseinstellungen – von Berechtigungen über Datenschutz bis hin zu Nutzungszeiten. Nehmen Sie kostenlos teil: Dienstag 23. Mai 2023, 18:30 - 20:00 Uhr via zoom
---------------------------------------------
https://www.watchlist-internet.at/news/webinar-smartphone-tablet-co-sicher-…
∗∗∗ Mit diesen 3 Einstellungen schützen Sie Ihr Smartphone ∗∗∗
---------------------------------------------
Sie denken Ihr Smartphone ist mit einer Bildschirmsperre vor fremden Zugriffen gut geschützt? Falsch! Kriminelle finden Wege, um in gestohlene oder verlorene Smartphones einzudringen. Im schlimmsten Fall greifen sie auf Ihre Banking-App zu und räumen Ihr Konto ab. Wir zeigen Ihnen 3 wichtige Einstellungen, um Ihr Smartphone bei Verlust oder Diebstahl zu schützen.
---------------------------------------------
https://www.watchlist-internet.at/news/mit-diesen-3-einstellungen-schuetzen…
∗∗∗ Ransomware tracker: The latest figures [May 2023] ∗∗∗
---------------------------------------------
Note: this Ransomware Tracker is updated on the second Sunday of each month to stay current Although ransomware attacks overall were down in April compared to the prior month, attacks against healthcare organizations shot up to one of its highest levels in years as hospitals and doctors offices increasingly find themselves targeted by hackers.
---------------------------------------------
https://therecord.media/ransomware-tracker-the-latest-figures
=====================
= Vulnerabilities =
=====================
∗∗∗ Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks ∗∗∗
---------------------------------------------
Several security vulnerabilities have been disclosed in cloud management platforms associated with three industrial cellular router vendors that could expose operational technology (OT) networks to external attacks. The findings were presented by Israeli industrial cybersecurity firm OTORIO at the Black Hat Asia 2023 conference last week. The 11 vulnerabilities allow "remote code execution and full control over hundreds of thousands of devices and OT networks - in some cases, even those not actively configured to use the cloud."
---------------------------------------------
https://thehackernews.com/2023/05/industrial-cellular-routers-at-risk-11.ht…
∗∗∗ Screen SFT DAB 600/C: Multiple Vulnerabilities ∗∗∗
---------------------------------------------
* Authentication Bypass Account Creation Exploit * Authentication Bypass Password Change Exploit * Authentication Bypass Erase Account Exploit * Authentication Bypass Admin Password Change Exploit * Authentication Bypass Reset Board Config Exploit * Unauthenticated Information Disclosure (userManager.cgx)
---------------------------------------------
https://www.zeroscience.mk/en/vulnerabilities/
∗∗∗ SECURITY BULLETIN: May 2023 Security Bulletin for Trend Micro Mobile Security (Enterprise) ∗∗∗
---------------------------------------------
CVE Identifier(s): CVE-2023-32521 through CVE-2023-32528 Trend Micro has released a new build for Trend Micro Mobile Security (Enterprise) that resolves several vulnerabilities.
---------------------------------------------
https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US
∗∗∗ Multiple Vulnerabilities in Kiddoware Kids Place Parental Control Android App ∗∗∗
---------------------------------------------
Multiple vulnerabilities have been identified in the Kiddoware Kids Place Parental Control Android App. Users of the parent's web dashboard can be attacked via cross site scripting or cross site request forgery vulnerabilities, or attackers may upload arbitrary files to the children's devices. Furthermore, children are able to bypass any restrictions without the parents noticing.
---------------------------------------------
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities…
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (golang-websocket, kernel, postgresql-11, and thunderbird), Fedora (firefox, kernel, libreswan, libssh, tcpreplay, and thunderbird), SUSE (dcmtk, gradle, libraw, postgresql12, postgresql13, postgresql14, and postgresql15), and Ubuntu (firefox, nova, and thunderbird).
---------------------------------------------
https://lwn.net/Articles/931892/
∗∗∗ VM2 Security Advisory: Inspect Manipulation ∗∗∗
---------------------------------------------
A threat actor can edit options for console.log.
---------------------------------------------
https://github.com//patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
∗∗∗ VM2 Security Advisory: Sandbox Escape ∗∗∗
---------------------------------------------
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
---------------------------------------------
https://github.com//patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5
∗∗∗ WAGO: Unauthenticated command execution via Web-based-management ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-007/
∗∗∗ Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-008/
∗∗∗ MB Connect Line: Multiple vulnerabilities in mbConnect24 and mymbConnect24 ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2023-002/
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 11-05-2023 18:00 − Freitag 12-05-2023 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Windows: Windows-Sicherheitspatch kann Bootmedien unbrauchbar machen ∗∗∗
---------------------------------------------
Aktuell lässt sich Secure Boot in Windows durch eine Lücke umgehen. Bis die gefixt ist, wird es wohl noch bis 2024 dauern - aus Gründen.
---------------------------------------------
https://www.golem.de/news/windows-windows-sicherheitspatch-kann-bootmedien-…
∗∗∗ New Stealthy Variant of Linux Backdoor BPFDoor Emerges from the Shadows ∗∗∗
---------------------------------------------
A previously undocumented and mostly undetected variant of a Linux backdoor called BPFDoor has been spotted in the wild, cybersecurity firm Deep Instinct said in a technical report published this week. "BPFDoor retains its reputation as an extremely stealthy and difficult-to-detect malware with this latest iteration," security researchers Shaul Vilkomir-Preisman and Eliran Nissan said.
---------------------------------------------
https://thehackernews.com/2023/05/new-variant-of-linux-backdoor-bpfdoor.html
∗∗∗ Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG ∗∗∗
---------------------------------------------
This joint advisory provides detection methods for exploitation of CVE-2023-27350 as well and indicators of compromise (IOCs) associated with Bl00dy Ransomware Gang activity. FBI and CISA strongly encourage users and administrators to immediately apply patches, and workarounds if unable to patch. FBI and CISA especially encourage organizations who did not patch immediately to assume compromise and hunt for malicious activity using the detection signatures in this CSA.
---------------------------------------------
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-131a
∗∗∗ Mehrere Sicherheitslücken in VMwares Cloud-Management Aria Operations ∗∗∗
---------------------------------------------
Patches schließen mehrere Sicherheitslücken, die die Ausweitung von Rechten innerhalb von VMwares Cloud-Management Aria Operationse erlauben.
---------------------------------------------
https://heise.de/-9012909
∗∗∗ Verschlüsselungstrojaner: Es gibt Hoffnung für BlackCat-Opfer ∗∗∗
---------------------------------------------
Stimmen die Voraussetzungen, können Opfer des Verschlüsselungstrojaner BlackCat wieder auf ihre Daten zugreifen.
---------------------------------------------
https://heise.de/-9010373
∗∗∗ Shopsystem: Kritische Sicherheitslücke in Prestashop wird angegriffen ∗∗∗
---------------------------------------------
Eine kritische Sicherheitslücke klafft im Shopping-System Prestashop. Angreifer missbrauchen sie bereits. Ein aktueller Softwarestand schützt.
---------------------------------------------
https://heise.de/-9010286
∗∗∗ Cisco: SD-WAN-Zertifikate abgelaufen, jetzt updaten! ∗∗∗
---------------------------------------------
Cisco Systems weist seine Kundschaft darauf hin, dass einige SD-WAN Appliances der vEdge-Reihe dringende Updates benötigen.
---------------------------------------------
https://heise.de/-9014471
∗∗∗ Enforce Zero Trust in Microsoft 365 – Part 2: Protect against external users and applications ∗∗∗
---------------------------------------------
In the first blog post of this series, we have seen how strong authentication, i.e., Multi-Factor Authentication (MFA), could be enforced for users using a free Azure Active Directory subscription within the Microsoft 365 environment. In this blog post, we will continue to harden the configuration of our Azure AD tenant to enforce Zero Trust [...]
---------------------------------------------
https://blog.nviso.eu/2023/05/12/enforce-zero-trust-in-microsoft-365-part-2…
=====================
= Vulnerabilities =
=====================
∗∗∗ Severe Security Flaw Exposes Over a Million WordPress Sites to Hijack ∗∗∗
---------------------------------------------
The issue, tracked as CVE-2023-32243, has been addressed by the plugin maintainers in version 5.7.2 that was shipped on May 11, 2023. Essential Addons for Elementor has over one million active installations.
---------------------------------------------
https://thehackernews.com/2023/05/severe-security-flaw-exposes-over.html
∗∗∗ VMSA-2023-0009: VMware Aria Operations (formerly vRealize Operations) ∗∗∗
---------------------------------------------
CVSSv3 Range: 6.4-8.8 CVE(s): CVE-2023-20877, CVE-2023-20878, CVE-2023-20879, CVE-2023-20880 VMware Aria Operations update addresses multiple Local Privilege Escalations and a Deserialization issue
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2023-0009.html
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (postgresql-13 and webkit2gtk), Fedora (git), SUSE (helm and skopeo), and Ubuntu (cinder, nova, python-glance-store, and python-os-brick).
---------------------------------------------
https://lwn.net/Articles/931760/
∗∗∗ Case update: DIVD-2022-00068 - Multiple vulnerabilities identified within White Rabbit Switch from CERN ∗∗∗
---------------------------------------------
Last event: 11 Apr 2023 - CERN released White Rabbit Switch 6.0.2, which contains a fix for CVE-2023-22577 and CVE-2023-22581.
---------------------------------------------
https://csirt.divd.nl/cases/DIVD-2022-00068/
∗∗∗ Beekeeper Studio vulnerable to code injection ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN11705010/
∗∗∗ [R1] Nessus Version 10.5.2 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2023-20
∗∗∗ IBM WebSphere Application Server, which is bundled with IBM Cloud Pak for Applications, is vulnerable to an XML External Entity (XXE) Injection vulnerability (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989667
∗∗∗ IBM WebSphere Application Server, which is bundled with IBM WebSphere Hybrid Edition, is vulnerable to an XML External Entity (XXE) Injection vulnerability (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989665
∗∗∗ Deserialization vulnerability affect IBM Business Automation Workflow BPM Event Emitters - CVE-2022-1471 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6988027
∗∗∗ Multiple Vulnerabilities in Multicloud Management Security Services ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6991215
∗∗∗ IBM i Modernization Engine for Lifecycle Integration is vulnerable to cross-site scripting (CVE-2022-0225) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6991217
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server shipped with IBM WebSphere Remote Server (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6991213
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 10-05-2023 18:00 − Donnerstag 11-05-2023 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Interview: Hacker Witold Waligóra über Seitenkanalangriffe ∗∗∗
---------------------------------------------
Wir haben beim Hacker Witold Waligóra nachgehakt, was man mit Seitenkanalattacken erreichen kann und wie man sich dagegen schützt.
---------------------------------------------
https://heise.de/-8983428
∗∗∗ Smishing: Vorsicht vor betrügerischer Reisepass-SMS! ∗∗∗
---------------------------------------------
Haben Sie ein SMS bekommen, in dem behauptet wird Ihr Reisepass wäre fertig? Klicken Sie nicht auf den Link "oesterreich.at-anmelden.net", es handelt sich um einen Betrugsversuch!
---------------------------------------------
https://www.watchlist-internet.at/news/smishing-vorsicht-vor-betruegerische…
∗∗∗ Fake in-browser Windows updates push Aurora info-stealer malware ∗∗∗
---------------------------------------------
A recently spotted malvertising campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information stealing malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/fake-in-browser-windows-upda…
∗∗∗ RapperBot DDoS malware adds cryptojacking as new revenue stream ∗∗∗
---------------------------------------------
New samples of the RapperBot botnet malware have added cryptojacking capabilites to mine for cryptocurrency on compromised Intel x64 machines.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/rapperbot-ddos-malware-adds-…
∗∗∗ Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs ∗∗∗
---------------------------------------------
Two years ago, a popular ransomware-as-a-service groups source code got leaked. Now other ransomware groups are using it for their own purposes.
---------------------------------------------
https://www.darkreading.com/cloud/multiple-ransomware-groups-adapt-babuk-co…
∗∗∗ New ransomware trends in 2023 ∗∗∗
---------------------------------------------
On the eve of the global Anti-Ransomware Day, Kaspersky researchers share an overview of the key trends observed among ransomware groups.
---------------------------------------------
https://securelist.com/new-ransomware-trends-in-2023/109660/
∗∗∗ Analysis of CLR SqlShell Used to Attack MS-SQL Servers ∗∗∗
---------------------------------------------
This blog post will analyze the CLR SqlShell malware that is being used to target MS-SQL servers. Similar to WebShell, which can be installed on web servers, SqlShell is a malware strain that supports various features after being installed on an MS-SQL server, such as executing commands from threat actors and carrying out all sorts of malicious behavior.
---------------------------------------------
https://asec.ahnlab.com/en/52479/
=====================
= Vulnerabilities =
=====================
∗∗∗ Experts share details of five flaws that can be chained to hack Netgear RAX30 Routers ∗∗∗
---------------------------------------------
Researchers disclosed the details of five vulnerabilities that can be chained to take over some Netgear router models.
---------------------------------------------
https://securityaffairs.com/146111/hacking/netgear-router-exploit-2.html
∗∗∗ Zyxel Chained Remote Code Execution ∗∗∗
---------------------------------------------
This module exploits multiple vulnerabilities in the `zhttpd` binary (/bin/zhttpd) and `zcmd` binary (/bin/zcmd). It is present on more than 40 Zyxel routers and CPE devices. The remote code execution vulnerability can be exploited by chaining the local file disclosure vulnerability in the zhttpd binary that allows an unauthenticated attacker to read the entire configuration of the router [..]
---------------------------------------------
https://cxsecurity.com/issue/WLB-2023050030
∗∗∗ Multiple vulnerabilities in Danfoss EM100 ∗∗∗
---------------------------------------------
Multiple injection-related vulnerabilities exist in a set of Danfoss products, among which the EM100. These vulnerabilities should be considered serious and could lead to the full compromise of your system. It is advised to phase out the EM100, as its vendor Danfoss confirms the EM100 to be End of Life and that it will not be releasing a patch for this product. [..] If this is not possible, ensure it is not connected to the public Internet.
---------------------------------------------
https://csirt.divd.nl/cases/DIVD-2023-00021/
∗∗∗ Wordfence Intelligence Weekly WordPress Vulnerability Report (May 1, 2023 to May 7, 2023) ∗∗∗
---------------------------------------------
Last week, there were 58 vulnerabilities disclosed in 43 WordPress Plugins and 3 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database [..] Review those vulnerabilities in this report now to ensure your site is not affected.
---------------------------------------------
https://www.wordfence.com/blog/2023/05/wordfence-intelligence-weekly-wordpr…
∗∗∗ CISA Releases Fifteen Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
* ICSA-23-131-01 Siemens Solid Edge
* ICSA-23-131-02 Siemens SCALANCE W1750D
* ICSA-23-131-03 Siemens Siveillance
* ICSA-23-131-04 Siemens SIMATIC Cloud Connect 7
* ICSA-23-131-05 Siemens SINEC NMS Third-Party
* ICSA-23-131-06 Siemens SCALANCE LPE9403
* ICSA-23-131-07 Sierra Wireless AirVantage
* ICSA-23-131-08 Teltonika Remote Management System and RUT Model Routers
* ICSA-23-131-09 Rockwell Automation Kinetix 5500 EtherNetIP Servo Drive
* ICSA-23-131-10 Rockwell Automation Arena Simulation Software
* ICSA-23-131-11 BirdDog Cameras & Encoders
* ICSA-23-131-12 SDG PnPSCADA
* ICSA-23-131-13 PTC Vuforia Studio
* ICSA-23-131-14 Rockwell PanelView 800
* ICSA-23-131-15 Rockwell ThinManager
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2023/05/11/cisa-releases-fifteen-in…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (firefox-esr and nvidia-graphics-drivers-legacy-390xx), Fedora (firefox, java-11-openjdk, LibRaw, moodle, python-django3, and vtk), Slackware (mozilla), SUSE (buildah, cloud-init, container-suseconnect, firefox, golang-github-prometheus-prometheus, kernel, and ntp), and Ubuntu (heat, linux-azure-fde-5.15, linux-raspi, linux-oem-5.17, linux-oem-6.0, linux-raspi, linux-raspi-5.4, linux-raspi2, neutron, openvswitch, and sqlparse).
---------------------------------------------
https://lwn.net/Articles/931638/
∗∗∗ ThinkPad Dock Firmware Update Tool Elevation of Privilege Vulnerability ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500562-THINKPAD-DOCK-DRIVER-EL…
∗∗∗ CVE-2023-0008 PAN-OS: Local File Disclosure Vulnerability in the PAN-OS Web Interface (Severity: MEDIUM) ∗∗∗
---------------------------------------------
https://security.paloaltonetworks.com/CVE-2023-0008
∗∗∗ CVE-2023-0007 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Panorama Web Interface (Severity: MEDIUM) ∗∗∗
---------------------------------------------
https://security.paloaltonetworks.com/CVE-2023-0007
∗∗∗ Security vulnerabilities have been identified in IBM Db2 shipped with IBM Security Guardium Key Lifecycle Manager (CVE-2022-43930, CVE-2014-3577, CVE-2022-43927, CVE-2022-43929) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989465
∗∗∗ IBM Content Manager Enterprise Edition is affected by a vulnerability in Eclipse Openj9 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6987029
∗∗∗ Content Manager Enterprise Edition is affected by a vulnerability in FasterXML jackson ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856659
∗∗∗ Content Manager Enterprise Edition is affected by a vulnerability in FasterXML jackson ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856661
∗∗∗ Content Manager Enterprise Edition is affected by a vulnerability in FasterXML jackson ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6856663
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server shipped with Tivoli Netcool\/OMNIbus WebGUI - IBM\u00ae Java SDK CVE-2023-30441 ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989589
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server shipped with Tivoli Netcool\/OMNIbus WebGUI (CVE-2023-24966) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989591
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server shipped with Tivoli Netcool\/OMNIbus WebGUI (CVE-2022-39161) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989593
∗∗∗ Vega Vulnerabilities affect IBM Decision Optimization in IBM Cloud Pak for Data (CVE-2023-26486, CVE-2023-26487) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989625
∗∗∗ IBM WebSphere Application Server is vulnerable to an XML External Entity (XXE) Injection vulnerability (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989451
∗∗∗ Multiple Security Vulnerabilities have been fixed in IBM Security Verify Access ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989653
∗∗∗ A security vulnerability has been identified in IBM WebSphere Application Server shipped with Asset and Service Management (CVE-2023-27554) ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/node/6989657
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 09-05-2023 18:00 − Mittwoch 10-05-2023 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Patchday: Adobe schließt Schadcode-Lücke in Substance 3D Painter ∗∗∗
---------------------------------------------
Es gibt wichtige Sicherheitsupdates für Adobe Substance 3D Painter. Wer damit 3D-Modelle bearbeitet, sollte die Anwendung aktualisieren.
---------------------------------------------
https://heise.de/-8991973
∗∗∗ Microsoft Patchday: Angreifer verschaffen sich System-Rechte unter Windows ∗∗∗
---------------------------------------------
Microsoft schließt unter anderem in Windows mehrere kritische Schadcode-Lücken. Attacken laufen bereits, weitere könnten bevorstehen.
---------------------------------------------
https://heise.de/-8991967
∗∗∗ Kritische Schwachstellen ermöglichen Übernahme von Aruba Access Points ∗∗∗
---------------------------------------------
Die HPE-Tochter Aruba schließt mehrere, zum Teil kritische Sicherheitslücken in den Access Points. Angreifer aus dem Netz könnten Schadcode einschleusen.
---------------------------------------------
https://heise.de/-8992292
∗∗∗ Patchday: 18 Sicherheitsnotizen zu teils kritischen Lücken in SAP-Software ∗∗∗
---------------------------------------------
Am Mai-Patchday dichtet SAP zum Teil kritische Sicherheitslücken in der Software des Unternehmens ab. IT-Verantwortliche sollten die Updates zügig anwenden.
---------------------------------------------
https://heise.de/-8992005
∗∗∗ Root-Rechte für lokale Angreifer dank Lücken im Linux-Kernel ∗∗∗
---------------------------------------------
In zwei Komponenten des Linuxkernels verstecken sich Sicherheitslücken, die lokalen Angreifern eine Rootshell spendieren. Ein erster Exploit ist öffentlich.
---------------------------------------------
https://heise.de/-8992648
∗∗∗ Easily bypassed patch makes zero-click Outlook flaw exploitable again (CVE-2023-29324) ∗∗∗
---------------------------------------------
Among the vulnerabilities fixed by Microsoft on May 2023 Patch Tuesday is CVE-2023-29324, a bug in the Windows MSHTML platform that Microsoft rates as “important.” Akamai’s research team and Ben Barnea, the researcher who’s credited with finding the flaw, disagree with that assessment, because “the new vulnerability [CVE-2023-29324] re-enables the exploitation of a critical vulnerability [CVE-2023-23397] that was seen in the wild and used by APT operators.”
---------------------------------------------
https://www.helpnetsecurity.com/2023/05/10/cve-2023-29324/
∗∗∗ Vorsicht vor betrügerischem Tier-, Welpen- und Katzenhandel im Internet ∗∗∗
---------------------------------------------
Vermehrt werden der Watchlist Internet aktuell betrügerische Tierangebote aus dem Internet und auf Social Media wie Facebook gemeldet. Süße Bilder junger Kätzchen und Hunde auf Websites, die Vertrauen schaffen sollen, verleiten zu einer unüberlegten Bestellung und Vorabzahlung. Eine Lieferung erfolgt nie – egal wie vielen Zahlungsaufforderungen der kriminellen Züchter:innen nachgekommen wird!
---------------------------------------------
https://www.watchlist-internet.at/news/vorsicht-vor-betruegerischem-tier-we…
∗∗∗ Free Tool Unlocks Some Encrypted Data in Ransomware Attacks ∗∗∗
---------------------------------------------
"White Phoenix" automated tool for recovering data on partially encrypted files hit with ransomware is available on GitHub.
---------------------------------------------
https://www.darkreading.com/attacks-breaches/free-tool-unlocks-some-encrypt…
∗∗∗ PwnAssistant - Controlling /homes via a Home Assistant RCE ∗∗∗
---------------------------------------------
[..] we decided to look into the very established and known open-source automation ecosystem known as Home Assistant. [..] So without further ado, come with us on this journey to understanding the Home Assistant architecture, enumerating the attack surface and trawling for pre-authentication vulnerabilities within the code base.
---------------------------------------------
https://www.elttam.com/blog/pwnassistant/
∗∗∗ Xjquery Wave of WordPress SocGholish Injections ∗∗∗
---------------------------------------------
By the end of March, 2023, we started noticing a new wave of SocGholish injections that used the intermediary xjquery[.]com domain. It appeared to be another evolution of the same malware. This time, however, attackers were using the same tricks in a different way.
---------------------------------------------
https://blog.sucuri.net/2023/05/xjquery-wave-of-wordpress-socgholish-inject…
∗∗∗ ESET APT Activity Report Q4 2022–Q1 2023 ∗∗∗
---------------------------------------------
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
---------------------------------------------
https://www.welivesecurity.com/2023/05/09/eset-apt-activity-report-q42022-q…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (emacs), Fedora (chromium, community-mysql, and LibRaw), Red Hat (nodejs nodejs-nodemon, nodejs:18, and webkit2gtk3), Slackware (mozilla), SUSE (amazon-ssm-agent, conmon, distribution, docker-distribution, google-cloud-sap-agent, ignition, kernel, ntp, prometheus-ha_cluster_exporter, protobuf-c, python-cryptography, runc, and shim), and Ubuntu (ceph, freetype, and node-css-what).
---------------------------------------------
https://lwn.net/Articles/931488/
∗∗∗ ICS Patch Tuesday: Siemens, Schneider Electric Address Few Dozen Vulnerabilities ∗∗∗
---------------------------------------------
Siemens and Schneider Electric’s Patch Tuesday advisories for May 2023 address a few dozen vulnerabilities found in their products.
---------------------------------------------
https://www.securityweek.com/ics-patch-tuesday-siemens-schneider-electric-a…
∗∗∗ Chipmaker Patch Tuesday: Intel, AMD Address Over 100 Vulnerabilities ∗∗∗
---------------------------------------------
Intel and AMD have informed their customers about a total of more than 100 vulnerabilities found in their products.
---------------------------------------------
https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-address-over…
∗∗∗ Hitachi Energy MSM ∗∗∗
---------------------------------------------
CVSS v3 9.8
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Hitachi Energy
Equipment: Modular Switchgear Monitoring (MSM)
Vulnerabilities: Improper Restriction of Excessive Authentication Attempts, Authentication Bypass by Capture-replay, Code Injection, Improper Restriction of Operations within the Bounds of a Memory Buffer, NULL Pointer Dereference, Insufficient Entropy
---------------------------------------------
https://www.cisa.gov/news-events/ics-advisories/icsa-23-129-02
∗∗∗ Vulnerability Spotlight: Authentication bypass, use-after-free vulnerabilities found in a library for the µC/OS open-source operating system ∗∗∗
---------------------------------------------
TALOS-2022-1680 (CVE-2022-41985) could allow an attacker to bypass the authentication protocol on the operating system, or cause a denial-of-service, by sending the targeted machine a specially crafted set of network packets.
---------------------------------------------
https://blog.talosintelligence.com/vulnerability-spotlight-authentication-b…
∗∗∗ SLP Protocol Denial-of-Service Guidance ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500563-SLP-PROTOCOL-DENIAL-OF-…
∗∗∗ Multi-vendor BIOS Security Vulnerabilities (May 2023) ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500559-MULTI-VENDOR-BIOS-SECUR…
∗∗∗ ThinkPad Dock Driver Elevation of Privilege Vulnerability ∗∗∗
---------------------------------------------
http://support.lenovo.com/product_security/PS500562-THINKPAD-DOCK-DRIVER-EL…
∗∗∗ [R1] Nessus Network Monitor Version 6.2.1 Fixes Multiple Vulnerabilities ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2023-19
∗∗∗ IBM Security Bulletins ∗∗∗
---------------------------------------------
https://www.ibm.com/support/pages/bulletin/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily