=====================
= End-of-Day report =
=====================
Timeframe: Freitag 08-04-2022 18:00 − Montag 11-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Android banking malware takes over calls to customer support ∗∗∗
---------------------------------------------
A banking trojan for Android that researchers call Fakecalls comes with a powerful capability that enables it to take over calls to a banks customer support number and connect the victim directly with the cybercriminals operating the malware.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/android-banking-malware-take…
∗∗∗ Security: OpenSSH 9.0 veröffentlicht ∗∗∗
---------------------------------------------
Die neue Version von OpenSSH bringt unter anderem eine Härtung gegen Faktorisierungsattacken mit zukünftigen Quantencomputern mit.
---------------------------------------------
https://www.golem.de/news/security-openssh-9-0-veroeffentlicht-2204-164550-…
∗∗∗ Method For String Extraction Filtering, (Sat, Apr 9th) ∗∗∗
---------------------------------------------
In diary entry "XLSB Files: Because Binary is Stealthier Than XML", Xavier shows how to extract strings (URLs) from binary files that make up an Excel spreadsheet. This inspired me to make a tool to parse this XLSB file format: "Quickie: Parsing XLSB Documents". Now I'm presenting another method, one that uses string analysis.
---------------------------------------------
https://isc.sans.edu/diary/rss/28532
∗∗∗ Mirai-Botnet missbraucht Spring4Shell-Sicherheitsleck ∗∗∗
---------------------------------------------
Sicherheitsforscher haben beobachtet, dass das Mirai-Botnet die Spring4Shell-Schwachstelle angreift und dadurch die Malware verbreitet.
---------------------------------------------
https://heise.de/-6668646
∗∗∗ Denonia cryptominer is first malware to target AWS Lambda ∗∗∗
---------------------------------------------
There is now malware in serverless environments. Dubbed Denonia, it specifically targets the AWS Lambda to perform cryptojacking.
---------------------------------------------
https://blog.malwarebytes.com/business-2/2022/04/denonia-cryptominer-is-fir…
∗∗∗ Octo Android Trojan Allows Cybercrooks to Conduct On-Device Fraud ∗∗∗
---------------------------------------------
Threat Fabric security researchers have analyzed an Android banking trojan that allows its operators to perform on-device fraud.
---------------------------------------------
https://www.securityweek.com/octo-android-trojan-allows-cybercrooks-conduct…
∗∗∗ Think Like a Criminal: Knowing Popular Attack Techniques to Stop Bad Actors Faster ∗∗∗
---------------------------------------------
Analyzing the attack goals of adversaries is important to be able to better align defenses against the speed of changing attack techniques. By focusing on a handful of techniques, you can effectively shut down malware’s methods of choice for getting in and making itself at home. To achieve this, you need to know which key areas to be focusing on in the coming months.
---------------------------------------------
https://www.securityweek.com/think-criminal-knowing-popular-attack-techniqu…
∗∗∗ Love-Scam - Wie unterstütze ich Betroffene? ∗∗∗
---------------------------------------------
Hilfe! Mein Mutter, mein Onkel, meine Bekannte liebt eine:n Internetbetrüger:in. Für Außenstehende ist der Fall meist klar: Die Internetliebe ist ein:e Betrüger:in. Das Opfer möchte dies aber nicht glauben und überweist immer wieder Geld. Was tun? Wie können Sie Opfer von Liebesbetrüger:innen unterstützen?
---------------------------------------------
https://www.watchlist-internet.at/news/love-scam-wie-unterstuetze-ich-betro…
∗∗∗ New SolarMarker (Jupyter) Campaign Demonstrates the Malware's Changing Attack Patterns ∗∗∗
---------------------------------------------
A new version of SolarMarker malware appears to upgrade evasion abilities and demonstrates that the infostealer and backdoor continues to evolve.
---------------------------------------------
https://unit42.paloaltonetworks.com/solarmarker-malware/
∗∗∗ Insider-Bedrohungen greifen nach außen ∗∗∗
---------------------------------------------
Wenn Mitarbeiter auf eigene Faust zum Cyberkrieger werden wollen, kann das die Unternehmenssicherheit ebenso gefährden wie traditionelle Insider- und externe Bedrohungen, berichtet Andreas Riepen, Regional Sales Director Central Europe bei Vectra AI, in einem Gastbeitrag.
---------------------------------------------
https://www.zdnet.de/88400523/insider-bedrohungen-greifen-nach-aussen/
∗∗∗ Cyber-Sicherheit im Gesundheitswesen ∗∗∗
---------------------------------------------
Das Gesundheitswesen ist nach wie vor einer der am häufigsten durch Hacker angegriffenen Bereiche. Lieder wurden in der Vergangenheit entsprechende Hausaufgaben lange aufgeschobene.
---------------------------------------------
https://www.borncity.com/blog/2022/04/10/cyber-sicherheit-im-gesundheitswes…
=====================
= Vulnerabilities =
=====================
∗∗∗ Popular Ruby Asciidoc toolkit patched against critical vuln – get the update now! ∗∗∗
---------------------------------------------
A rogue line-continuation character can trick the code into validating just the second half of the line, but executing all of it.
---------------------------------------------
https://nakedsecurity.sophos.com/2022/04/08/popular-ruby-asciidoc-toolkit-p…
∗∗∗ Spring: It isnt just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too., (Mon, Apr 11th) ∗∗∗
---------------------------------------------
Our "First Seen URL" page did show attempts to access /actuator/gateway/routes this weekend. So I dug in a bit deeper to see what these scans are all about. [...] The scan for /actuator/gateway/routes may be looking for systems that are possibly vulnerable to CVE-2022-22947 or other vulnerabilities in the Spring Cloud function (we had at least three different vulnerabilities recently).
---------------------------------------------
https://isc.sans.edu/diary/rss/28538
∗∗∗ ABB Cyber Security Advisory: ARM600 M2M Gateway NSS library and polkit vulnerabilities ∗∗∗
---------------------------------------------
These vulnerabilities affect cryptographic libraries and privilege handling. Subsequently, a successful exploit could allow attackers to execute code with root user privileges or to elevate a non-privileged user to a privileged user.
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001254&Language…
∗∗∗ ABB Cyber Security Advisory: Arctic Wireless Gateway Firewall vulnerability (CVE-2022-0947) ∗∗∗
---------------------------------------------
A vulnerability is found in the ABB Arctic wireless gateways in a specific configuration and when using firmware versions from 2.4.0 or later until version 3.4.10.
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001253&Language…
∗∗∗ Verschlüsselungsschwächen in Datenmanagementsoftware Dell EMC PowerScale OneFS ∗∗∗
---------------------------------------------
Admins von Systemen mit Dell EMC PowerScale OneFS sollten die Software aus Sicherheitsgründen auf den aktuellen Stand bringen.
---------------------------------------------
https://heise.de/-6668566
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (gzip, libxml2, minidlna, openjpeg2, thunderbird, webkit2gtk, wpewebkit, xen, and xz-utils), Fedora (crun, unrealircd, and vim), Mageia (389-ds-base, busybox, flatpak, fribidi, gdal, python-paramiko, and usbredir), openSUSE (opera and seamonkey), Oracle (kernel and kernel-container), Red Hat (firefox), Scientific Linux (firefox), Slackware (libarchive), SUSE (389-ds, libsolv, libzypp, zypper, and python), and Ubuntu (python-django and tcpdump).
---------------------------------------------
https://lwn.net/Articles/890936/
∗∗∗ XSS vulnerability patched in Directus data engine platform ∗∗∗
---------------------------------------------
The platform is described as a "flexible powerhouse for engineers."
---------------------------------------------
https://www.zdnet.com/article/xss-vulnerability-patched-in-directus-data-en…
∗∗∗ Webmin: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0412
∗∗∗ Security Bulletin: Operations Dashboard is vulnerable to Go CVE-2022-23806 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-operations-dashboard-is-v…
∗∗∗ Security Bulletin: Vulnerabilities have been identified in Apache Log4j and the application code shipped with the DS8000 Hardware Management Console (HMC) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-have-been…
∗∗∗ Security Bulletin: IBM WebSphere Application Server Liberty for IBM i is vulnerable to spoofing and clickjacking attacks due to swagger-ui (CVE-2018-25031, CVE-2021-46708) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-websphere-application…
∗∗∗ Security Bulletin: IBM Sterling Global Mailbox is vulnerable to denial of service due to Jackson-Databind (217968 ) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-global-mailb…
∗∗∗ Security Bulletin: Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to log4js-node CVE-2022-21704 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-platform-navigator-and-au…
∗∗∗ Security Bulletin: A cross-site scripting (XSS) vulnerability may impact IBM Cúram Social Program Management(CVE-2021-39068) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-cross-site-scripting-xs…
∗∗∗ Security Bulletin: Vulnerability in IBM Java Runtime affects Host On-Demand ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-java…
∗∗∗ Security Bulletin: Cúram Social Program Management may be affected by Denial of Service vulnerability in Google Gson (217225) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cram-social-program-manag…
∗∗∗ Security Bulletin: Operations Dashboard is vulnerable to Go CVE-2022-24921 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-operations-dashboard-is-v…
∗∗∗ Security Bulletin: Operations Dashboard is vulnerable to Go CVE-2022-23772 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-operations-dashboard-is-v…
∗∗∗ Security Bulletin: Operations Dashboard is vulnerable to Go CVE-2022-23773 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-operations-dashboard-is-v…
∗∗∗ Security Bulletin: Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to node-request-retry CVE-2022-0654 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-platform-navigator-and-au…
∗∗∗ Security Bulletin: A vulnerability in Spring Framework affects IBM Tivoli Application Dependency Discovery Manager (CVE-2020-5421). ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-in-spring…
∗∗∗ Security Bulletin: IBM Sterling B2B Integrator vulnerable to cross-site Ajax request vulnerability due to Prototype JavaScript (CVE-2008-7220) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-b2b-integrat…
∗∗∗ Security Bulletin: IBM Security Guardium Insights is affected by multiple vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-ins…
∗∗∗ Security Bulletin: Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple CVEs in Node.js ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-platform-navigator-and-au…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 07-04-2022 18:00 − Freitag 08-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Malicious web redirect service infects 16,500 sites to push malware ∗∗∗
---------------------------------------------
A new TDS (Traffic Direction System) operation called Parrot has emerged in the wild, having already infected servers hosting 16,500 websites of universities, local governments, adult content platforms, and personal blogs.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/malicious-web-redirect-servi…
∗∗∗ Mirai malware now delivered using Spring4Shell exploits ∗∗∗
---------------------------------------------
The Mirai malware is now leveraging the Spring4Shell exploit to infect vulnerable web servers and recruit them for DDoS (distributed denial of service) attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/mirai-malware-now-delivered-…
∗∗∗ CVE-2021-30737, @xerubs 2021 iOS ASN.1 Vulnerability ∗∗∗
---------------------------------------------
Originally this post was just a series of notes I took last year as I was trying to understand this bug. But the bug itself and the narrative around it are so fascinating that I thought it would be worth writing up these notes into a more coherent form to share with the community.
---------------------------------------------
https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-i…
∗∗∗ Public Report – Google Enterprise API Security Assessment ∗∗∗
---------------------------------------------
During the autumn of 2021, Google engaged NCC Group to perform a review of the Android 12 Enterprise API to evaluate its compliance with the Security Technical Implementation Guides (STIG) matrix provided by Google.
---------------------------------------------
https://research.nccgroup.com/2022/04/07/public-report-google-enterprise-ap…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (libtiff), Debian (chromium), Fedora (buildah and chromium), openSUSE (firefox), SUSE (firefox, libsolv, libzypp, and openjpeg2), and Ubuntu (firefox and python-oslo.utils).
---------------------------------------------
https://lwn.net/Articles/890718/
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Host On-Demand ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM SPSS Analytic Server is vulnerable to LDAP Injection (CVE-2021-39031) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spss-analytic-server-…
∗∗∗ Security Bulletin: IBM has announced a release for IBM Security Verify Governance in response to a security vulnerability (CVE-2021-22931) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-announced-a-relea…
∗∗∗ Security Bulletin: IBM has announced a release for IBM Security Verify Governance in response to a security vulnerability (CVE-2022-21824) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-announced-a-relea…
∗∗∗ Security Bulletin: Vulnerability in IBM Java Runtime affects Host On-Demand ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-java…
∗∗∗ Security Bulletin: IBM Sterling B2B Integrator is vulnerable to cross-site request forgery (CVE-2020-4668) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-b2b-integrat…
∗∗∗ Security Bulletin: Vulnerability in json4j – CVE-2021-3918 (Publicly disclosed vulnerability) impacts IBM Watson Machine Learning Accelerator ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-json4j-c…
∗∗∗ Security Bulletin: IBM Maximo Asset Management and the IBM Maximo Manage application in IBM Maximo Application Suite may be vulnerable to arbitrary code execution due to Apache Log4j 1.2 (CVE-2021-4104) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-manageme…
∗∗∗ Security Bulletin: IBM Planning Analytics Workspace is affected by security vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-wo…
∗∗∗ Security Bulletin: Apache Log4j vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilit…
∗∗∗ Security Bulletin: LDAP vulnerability in WebSphere Liberty Profile can affect IBM InfoSphere Global Name Management ENS (CVE-2021-39031) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ldap-vulnerability-in-web…
∗∗∗ WebKitGTK and WPE WebKit Security Advisory WSA-2022-0004 ∗∗∗
---------------------------------------------
https://webkitgtk.org/security/WSA-2022-0004.html
∗∗∗ D-LINK Router: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0405
∗∗∗ D-LINK Router: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten ∗∗∗
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0406
∗∗∗ Microsoft Edge 100.0.1185.36 fixt Schwachstelle ∗∗∗
---------------------------------------------
https://www.borncity.com/blog/2022/04/08/microsoft-edge-100-0-1185-36-fixt-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 06-04-2022 18:00 − Donnerstag 07-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New FFDroider malware steals Facebook, Instagram, Twitter accounts ∗∗∗
---------------------------------------------
A new information stealer named FFDroider has emerged, stealing credentials and cookies stored in browsers to hijack victims social media accounts.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-ffdroider-malware-steals…
∗∗∗ A Bad Luck BlackCat ∗∗∗
---------------------------------------------
A new ransomware actor started advertising its services on a Russian underground forum. They presented themselves as ALPHV, but the group is also known as BlackCat.
---------------------------------------------
https://securelist.com/a-bad-luck-blackcat/106254/
∗∗∗ What is BIMI and how is it supposed to help with Phishing., (Thu, Apr 7th) ∗∗∗
---------------------------------------------
Phishing works because it is hard to figure out if an email or a website is authentic. Over the years, many technical solutions have been implemented to make it easier to recognize valid senders or a valid website.
---------------------------------------------
https://isc.sans.edu/diary/rss/28528
∗∗∗ SharkBot Banking Trojan Resurfaces On Google Play Store Hidden Behind 7 New Apps ∗∗∗
---------------------------------------------
As many as seven malicious Android apps discovered on the Google Play Store masqueraded as antivirus solutions to deploy a banking trojan called SharkBot.
---------------------------------------------
https://thehackernews.com/2022/04/sharkbot-banking-trojan-resurfaces-on.html
∗∗∗ Whatsapp-Kettenbrief: "Milka" erneut Köder für gefälschte Gewinnspiele ∗∗∗
---------------------------------------------
Kriminelle werden nicht müde, die Schokoladenmarke für ihre Zwecke zu nutzen. Erst recht kurz vor Ostern.
---------------------------------------------
https://heise.de/-6665629
∗∗∗ DSGVO-Verstoß auf Ihrer Webseite? Lassen Sie sich nicht verunsichern! ∗∗∗
---------------------------------------------
Uns wurden zahlreiche E-Mails gemeldet, die auf einen DSGVO-Verstoß auf der Website von Unternehmen hinweisen. Das E-Mail bezieht sich auf die Verwendung von Google Analytics. Es besteht kein Grund zur Sorge, doch langfristig sollten Sie nach Alternativen zu dem Google-Dienst suchen.
---------------------------------------------
https://www.watchlist-internet.at/news/dsgvo-verstoss-auf-ihrer-webseite-la…
∗∗∗ CISA Adds Three Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/04/06/cisa-adds-three-k…
∗∗∗ CVE-2022-26381: Gone by others! Triggering a UAF in Firefox ∗∗∗
---------------------------------------------
Memory corruption vulnerabilities have been well known for a long time and programmers have developed various methods to prevent them. One type of memory corruption that is very hard to prevent is the use-after-free and the reason is that it has too many faces!
---------------------------------------------
https://www.thezdi.com/blog/2022/4/7/cve-2022-26381-gone-by-others-triggeri…
=====================
= Vulnerabilities =
=====================
∗∗∗ Palo Alto Networks firewalls, VPNs vulnerable to OpenSSL bug ∗∗∗
---------------------------------------------
American cybersecurity company Palo Alto Networks warned customers on Wednesday that some of its firewall, VPN, and XDR products are vulnerable to a high severity OpenSSL infinite loop bug disclosed three weeks ago.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/palo-alto-networks-firewalls…
∗∗∗ Jetzt aktualisieren: VMware patcht teils kritische Sicherheitslücken ∗∗∗
---------------------------------------------
Mehrere VMware-Produkte sind von teils kritischen Lücken betroffen, durch die Angreifer Schadcode einschleusen könnten. Es gibt Updates und Gegenmaßnahmen.
---------------------------------------------
https://heise.de/-6665440
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (bind), Debian (firefox-esr), Fedora (fribidi, gdal, and mingw-gdal), openSUSE (pdns-recursor and SDL2), Oracle (kernel), Slackware (mozilla), SUSE (glibc and openvpn-openssl1), and Ubuntu (fribidi and linux-azure-5.13, linux-oracle-5.13).
---------------------------------------------
https://lwn.net/Articles/890620/
∗∗∗ Multiple Cisco Security Products Simple Network Management Protocol Service Denial of Service Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Webex Meetings Java Deserialization Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Web Security Appliance Filter Bypass Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Secure Network Analytics Network Diagrams Application Cross-Site Scripting Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Bulletin: Denial of Service vulnerability affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-denial-of-service-vulnera…
∗∗∗ Security Bulletin: Apache Log4j vulnerability ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilit…
∗∗∗ April 6, 2022 TNS-2022-08 [R1] Stand-alone Security Patch Available for Tenable.sc versions 5.19.0 to 5.20.1: Patch 202204.1 ∗∗∗
---------------------------------------------
http://www.tenable.com/security/tns-2022-08
∗∗∗ VMSA-2022-0012 ∗∗∗
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2022-0012.html
∗∗∗ K51048910: Eclipse Jetty vulnerability CVE-2021-28169 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K51048910
∗∗∗ Critical Authentication Bypass Vulnerability Patched in SiteGround Security Plugin ∗∗∗
---------------------------------------------
https://www.wordfence.com/blog/2022/04/critical-authentication-bypass-vulne…
∗∗∗ WEIDMUELLER: Multiple vulnerabilities in Modbus TCP/RTU Gateways ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2022-008/
∗∗∗ Pepperl+Fuchs WirelessHART-Gateway ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-097-01
∗∗∗ ABB SPIET800 and PNI800 ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-097-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 05-04-2022 18:00 − Mittwoch 06-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Microsoft detects Spring4Shell attacks across its cloud services ∗∗∗
---------------------------------------------
Microsoft said that its currently tracking a "low volume of exploit attempts" targeting the critical Spring4Shell (aka SpringShell) remote code execution (RCE) vulnerability across its cloud services.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/microsoft-detects-spring4she…
∗∗∗ Windows MetaStealer Malware, (Wed, Apr 6th) ∗∗∗
---------------------------------------------
The malware abuses legitimate services by Github and transfer.sh to host these data binaries.
All URLs, domains, and IP addresses were still active for the infection approximately 3 hours before I posted this diary.
---------------------------------------------
https://isc.sans.edu/diary/rss/28522
∗∗∗ Zero-Day-Lücken: Ältere macOS- und iOS-Versionen weiter angreifbar ∗∗∗
---------------------------------------------
Aktiv ausgenutzte Lücken hat Apple nur in iOS 15 und macOS 12 gestopft. Sicherheitsforschern zufolge sind aber auch ältere Betriebssystemversionen verwundbar.
---------------------------------------------
https://heise.de/-6664730
∗∗∗ Wenn der PC plötzlich steckenbleibt, nicht bei Microsoft anrufen! ∗∗∗
---------------------------------------------
Die Betrugsmasche, bei der sich Kriminelle als Microsoft-Angestellte ausgeben und ihre Opfer telefonisch kontaktieren, ist weitläufig bekannt. Aktuell erhalten Betroffene vermehrt keinen Anruf, sondern werden durch Pop-ups auf ihren Bildschirmen, die die Nutzung des Computers einschränken, zu Anrufen bewegt. Achtung: Nicht anrufen, sonst drohen Geld- und Datenverluste!
---------------------------------------------
https://www.watchlist-internet.at/news/wenn-der-pc-ploetzlich-steckenbleibt…
∗∗∗ Fake e‑shops on the prowl for banking credentials using Android malware ∗∗∗
---------------------------------------------
This campaign was first identified at the end of 2021, with the attackers impersonating the legitimate cleaning service Maid4u. Distributed through Facebook ads, the campaign tempts potential victims to download Android malware from a malicious website. It is still ongoing as of the publication of this blogpost, with even more distribution domains registered after its discovery. In January 2022, MalwareHunterTeam shared three more malicious websites and Android trojans attributed to this campaign.
---------------------------------------------
https://www.welivesecurity.com/2022/04/06/fake-eshops-prowl-banking-credent…
∗∗∗ Analyzing a “multilayer” Maldoc: A Beginner’s Guide ∗∗∗
---------------------------------------------
In this blog post, we will not only analyze an interesting malicious document, but we will also demonstrate the steps required to get you up and running with the necessary analysis tools. There is also a howto video for this blog post.
---------------------------------------------
https://blog.nviso.eu/2022/04/06/analyzing-a-multilayer-maldoc-a-beginners-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Fortinet Security Advisories (FortiClient, FortiEDR, FortiWAN) ∗∗∗
---------------------------------------------
* FortiClient (Linux) - Improper directories permissions
* FortiClient (Linux) - external access to confighandler webserver
* FortiClient (Windows) - privilege escalation in online installer due to incorrect working directory
* FortiEDR - Denial of service due to folder access permission change
* FortiEDR - Hardcoded AES key enable disabling local Collector
* FortiEDR - Insecure RSA key transport
* FortiWAN - Improper cryptographic operations in Dynamic Tunnel Protocol
* FortiWAN - Pervasive OS command
---------------------------------------------
https://www.fortiguard.com/psirt?date=04-2022
∗∗∗ VMSA-2022-0011 ∗∗∗
---------------------------------------------
CVSSv3 Range: 5.3-9.8
CVE(s): CVE-2022-22954, CVE-2022-22955,CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961
Synopsis: VMware Workspace ONE Access, Identity Manager and vRealize Automation updates address multiple vulnerabilities.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2022-0011.html
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (rizin), Fedora (fish, gdal, mingw-fribidi, mingw-gdal, mingw-openexr, mingw-python-pillow, mingw-python3, and python-pillow), Mageia (chromium-browser-stable), Oracle (Extended Lifecycle Support (ELS) Unbreakable Enterprise kernel and kernel), Red Hat (kernel, kernel-rt, and Red Hat OpenStack Platform 16.2 (python-waitress)), Scientific Linux (kernel), Slackware (mozilla), SUSE (mozilla-nss), and Ubuntu (h2database).
---------------------------------------------
https://lwn.net/Articles/890404/
∗∗∗ Security Vulnerabilities fixed in Thunderbird 91.8 ∗∗∗
---------------------------------------------
CVE-2022-1097, CVE-2022-28281, CVE-2022-1197, CVE-2022-1196, CVE-2022-28282, CVE-2022-28285, CVE-2022-28286, CVE-2022-24713, CVE-2022-28289
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/
∗∗∗ Spring Cloud Data Flow 2.9.4 Released ∗∗∗
---------------------------------------------
On behalf of the team and everyone who has contributed, I’m happy to announce that Spring Cloud Dataflow 2.9.4 has been released and is now available from Maven Central. This release contains an update of the Spring Boot version and addresses a couple of CVEs.
Notable Changes in 2.9.4:
* Update to Spring Boot 2.5.12
* Resolves CVE-2022-22965
* Resolves CVE-2021-29425
---------------------------------------------
https://spring.io/blog/2022/04/05/spring-cloud-data-flow-2-9-4-released
∗∗∗ Improper Authentication Management Vulnerability in some Huawei Products ∗∗∗
---------------------------------------------
http://www.huawei.com/en/psirt/security-advisories/2022/huawei-sa-20220406-…
∗∗∗ Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to spoofing attacks and clickjacking due to swagger-ui (CVE-2018-25031, CVE-2021-46708) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-websphere-application…
∗∗∗ Security Bulletin: Watson Query potentially exposes adminstrator's key under some conditions due to CVE-2022-22410 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-watson-query-potentially-…
∗∗∗ Security Bulletin: Cross-site scripting vulnerability affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) – CVE-2021-38893 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cross-site-scripting-vuln…
∗∗∗ Security Bulletin: Vulnerabilities with Apache HTTP Server affect IBM Cloud Object Storage Systems (Apr 2022 V1) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-with-apac…
∗∗∗ K49419538: libxml2 vulnerability CVE 2016-4658 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K49419538?utm_source=f5support&utm_mediu…
∗∗∗ WAGO: Multiple Products affected by Linux Kernel Vulnerability Dirty Pipe ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2022-009/
∗∗∗ LifePoint Informatics Patient Portal ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-22-095-01
∗∗∗ Rockwell Automation ISaGRAF ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-095-01
∗∗∗ Johnson Controls Metasys ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-095-02
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 04-04-2022 18:00 − Dienstag 05-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ WhatsApp voice message phishing emails push info-stealing malware ∗∗∗
---------------------------------------------
A new WhatsApp phishing campaign impersonating WhatsApps voice message feature has been discovered, attempting to spread information-stealing malware to at least 27,655 email addresses.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/whatsapp-voice-message-phish…
∗∗∗ SpringShell RCE vulnerability: Guidance for protecting against and detecting CVE-2022-22965 ∗∗∗
---------------------------------------------
Microsoft provides guidance for customers looking for protection against exploitation and ways to detect vulnerable installations on their network of the critical vulnerability CVE-2022-22965, also known as SpringShell or Spring4Shell.
---------------------------------------------
https://www.microsoft.com/security/blog/2022/04/04/springshell-rce-vulnerab…
∗∗∗ WebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools, (Tue, Apr 5th) ∗∗∗
---------------------------------------------
Looking through my honeypot logs for some Spring4Shell exploits (I didn't find anything interesting), I came across this attempt to exploit an older WebLogic vulnerability (likely %%cve:2020-14882%% or %%cve:2020-14883%%). The exploit itself is "run of the mill," but the script downloaded is going through an excessively long list of competitors to disable and disabled cloud monitoring tools, likely to make detecting and response more difficult.
---------------------------------------------
https://isc.sans.edu/diary/rss/28520
∗∗∗ ZDI-22-547: (0Day) (Pwn2Own) Samsung Galaxy S21 Exposed Dangerous Method Local Privilege Escalation Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 phones. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-22-547/
∗∗∗ Phishing-Angriffe auf Kryptowährungssektor nach Einbruch bei MailChimp ∗∗∗
---------------------------------------------
Nach einem Einbruch beim Marketing-Mail-Anbieter MailChimp haben Cyberkriminelle versucht, per Phishing an Kryptowährungen von Krypto-Wallet-Kunden zu gelangen.
---------------------------------------------
https://heise.de/-6662971
∗∗∗ CISA advises D-Link users to take vulnerable routers offline ∗∗∗
---------------------------------------------
CISA has advised users to take certain vulnerable D-Link routers offline since the existing vulnerabilities are know to be actively exploited and the models have reached EOL and will not get patched.
---------------------------------------------
https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/04/cisa-adv…
∗∗∗ Threat Spotlight: AsyncRAT campaigns feature new version of 3LOSH crypter ∗∗∗
---------------------------------------------
Ongoing malware distribution campaigns are using ISO disk images to deliver AsyncRAT, LimeRAT and other commodity malware to victims.The infections leverage process injection to evade detection by endpoint security software.
---------------------------------------------
http://blog.talosintelligence.com/2022/04/asyncrat-3losh-update.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Android Security Bulletin—April 2022 ∗∗∗
---------------------------------------------
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Security patch levels of 2022-04-05 or later address all of these issues.
---------------------------------------------
https://source.android.com/security/bulletin/2022-04-01
∗∗∗ Xen Security Advisory CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361 / XSA-400 ∗∗∗
---------------------------------------------
IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues.
The precise impact is system specific, but would likely be a Denial of
Service (DoS) affecting the entire host. Privilege escalation and
information leaks cannot be ruled out.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-400.html
∗∗∗ Xen Security Advisory CVE-2022-26357 / XSA-399 ∗∗∗
---------------------------------------------
race in VT-d domain ID cleanup.
The precise impact is system specific, but would typically be a Denial
of Service (DoS) affecting the entire host. Privilege escalation and
information leaks cannot be ruled out.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-399.html
∗∗∗ Xen Security Advisory CVE-2022-26356 / XSA-397 ∗∗∗
---------------------------------------------
Racy interactions between dirty vram tracking and paging log dirty hypercalls.
An attacker can cause Xen to leak memory, eventually leading to a Denial of
Service (DoS) affecting the entire host.
---------------------------------------------
https://xenbits.xen.org/xsa/advisory-397.html
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Arch Linux (polkit, postgresql, and zlib), openSUSE (389-ds and opera), Red Hat (kpatch-patch), SUSE (389-ds and util-linux), and Ubuntu (waitress).
---------------------------------------------
https://lwn.net/Articles/890258/
∗∗∗ Kyocera Printer: Schwachstelle ermöglicht Offenlegung von Informationen ∗∗∗
---------------------------------------------
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Kyocera Printer ausnutzen, um Informationen offenzulegen.
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0391
∗∗∗ Citrix Hypervisor Security Update ∗∗∗
---------------------------------------------
This issue may allow privileged code in a guest VM to cause the host to crash or become unresponsive. The issue only affects systems with Intel CPUs where the malicious guest VM has had a physical PCI device assigned to it by the host administrator using the PCI passthrough feature.
The issue has the following identifier: CVE-2022-26357
Customers who have not assigned a physical PCI device to a guest VM are not affected by this issue. Customers who are running on systems with only AMD CPUs are also not affected by this issue.
---------------------------------------------
https://support.citrix.com/article/CTX390511
∗∗∗ Sicherheitsupdate für Webbrowser Google Chrome ∗∗∗
---------------------------------------------
https://heise.de/-6662814
∗∗∗ Security Bulletin: IBM MQ Operator and Queue manager container images are vulnerable to multiple issues within Red Hat UBI packages and the IBM WebSphere Application Server Liberty shipped with IBM MQ Operator v1.7 CD Release ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-operator-and-queue…
∗∗∗ Security Bulletin: A security vulnerability has been identified in Dojo Toolkil shipped with IBM Tivoli Netcool Impact (CVE-2021-23450) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-…
∗∗∗ Security Bulletin: IBM Tivoli Netcool Impact is affected by an Apache Log4j vulnerability (CVE-2022-23302) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-impact…
∗∗∗ Security Bulletin: A vulnerability has been identified in IBM WebSphere Application Server Liberty shipped with IBM Tivoli Netcool Impact (CVE-2021-39031) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-has-been-…
∗∗∗ Security Bulletin: A vulnerability has been identified in IBM WebSphere Application Server Liberty shipped with IBM Tivoli Netcool Impact (CVE-2022-22310) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-a-vulnerability-has-been-…
∗∗∗ Security Bulletin: IBM Maximo Asset Management may be vulnerable to arbitrary code execution due to Apache Log4j 1.2 (CVE-2021-4104) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-maximo-asset-manageme…
∗∗∗ Security Bulletin: IBM Tivoli Netcool Impact is affected by an Apache Log4j vulnerability (CVE-2022-23305) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-impact…
∗∗∗ Security Bulletin: IBM MQ Appliance affected by account enumeration and denial of service vulnerabilities (CVE-2022-22356 and CVE-2022-22355) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-appliance-affected…
∗∗∗ Security Bulletin: One or more security vulnerabilities has been identified in IBM® DB2® shipped with IBM PureData System for Operational Analytics ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-one-or-more-security-vuln…
∗∗∗ Security Bulletin: IBM Tivoli Netcool Impact is affected by gson vulnerability (C2021-0419) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-impact…
∗∗∗ K29855410: Vim vulnerabilities CVE-2022-0261, CVE-2022-0318, CVE-2022-0361, CVE-2022-0392, and CVE-2022-0413 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K29855410?utm_source=f5support&utm_mediu…
∗∗∗ K08827426: Vim vulnerability CVE-2022-0359 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K08827426?utm_source=f5support&utm_mediu…
∗∗∗ Security Vulnerabilities fixed in Firefox ESR 91.8 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/
∗∗∗ Security Vulnerabilities fixed in Firefox 99 ∗∗∗
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2022-13/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 01-04-2022 18:00 − Montag 04-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Stephan Richter
=====================
= News =
=====================
∗∗∗ Fake-Shop-Alarm: Vorsicht beim Online-Einkauf von Markenware! ∗∗∗
---------------------------------------------
Wer Markenkleidung oder -schuhe online kaufen will, sollte sich vergewissern, dass das Angebot seriös ist. Denn derzeit tauchen zahlreiche Fake-Shops auf, die angeben, beliebte Markenware zu verkaufen. Keine dieser betrügerischen Shops hat ein Impressum auf der Seite, die Webadresse hat außerdem nichts mit den angebotenen Waren zu tun. Das sind typische Merkmale für Fake-Shops und gute Gründe, hier nicht einzukaufen!
---------------------------------------------
https://www.watchlist-internet.at/news/fake-shop-alarm-vorsicht-beim-online…
∗∗∗ Explaining Spring4Shell: The Internet security disaster that wasn’t ∗∗∗
---------------------------------------------
Vulnerability in the Spring Java Framework is important, but its no Log4Shell.
---------------------------------------------
https://arstechnica.com/?p=1845362
∗∗∗ Beastmode botnet boosts DDoS power with new router exploits ∗∗∗
---------------------------------------------
A Mirai-based distributed denial-of-service (DDoS) botnet tracked as Beastmode (aka B3astmode) has updated its list of exploits to include several new ones, three of them targeting various models of Totolink routers.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/beastmode-botnet-boosts-ddos…
∗∗∗ Emptying the Phishtank: Are WordPress sites the Mosquitoes of the Internet?, (Mon, Apr 4th) ∗∗∗
---------------------------------------------
In November, an accountant working for a construction company received an innocent enough-looking email: An update on the terms to submit bills to a local county. Seeing the email, the accountant clicked on the link and quickly downloaded the new document after entering their Outlook 365 credentials. The PDF looked all right but was something the accountant had already downloaded a couple of weeks ago from the county’s official website. [...] This, turns out, was a typical case of “business email compromise.”
---------------------------------------------
https://isc.sans.edu/diary/rss/28516
∗∗∗ WordPress Popunder Malware Redirects to Scam Sites ∗∗∗
---------------------------------------------
Over the last year we’ve seen an ongoing malware infection which redirects website visitors to scam sites. So far this year our monitoring has detected over 3,000 websites infected with this injection this year and over 17,000 in total since we first detected it in March of 2021. The reported behaviour is always the same: After a few seconds of loading, the website will redirect to a dodgy scam site.
---------------------------------------------
https://blog.sucuri.net/2022/04/wordpress-popunder-malware-redirects-to-sca…
∗∗∗ Brokenwire Hack Could Let Remote Attackers Disrupt Charging for Electric Vehicles ∗∗∗
---------------------------------------------
A group of academics from the University of Oxford and Armasuisse S+T has disclosed details of a new attack technique against the popular Combined Charging System (CCS) that could potentially disrupt the ability to charge electric vehicles at scale. Dubbed "Brokenwire," the method interferes with the control communications that transpire between the vehicle and charger to wirelessly abort the abort the charging sessions from a distance of as far as 47m (151ft).
---------------------------------------------
https://thehackernews.com/2022/04/brokenwire-hack-could-let-remote.html
∗∗∗ Deep Dive Analysis - Borat RAT ∗∗∗
---------------------------------------------
[...] During our regular OSINT research, Cyble Research Labs came across a new Remote Access Trojan (RAT) named Borat. Unlike other RATs, the Borat provides Ransomware, DDOS services, etc., to Threat Actors along with usual RAT features, further expanding the malware capabilities.
---------------------------------------------
https://blog.cyble.com/2022/03/31/deep-dive-analysis-borat-rat/
∗∗∗ FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 ∗∗∗
---------------------------------------------
Recent public research asserts threat groups sharing overlaps with FIN7 transitioned to targeted ransomware operations involving REVIL, DARKSIDE, BLACKMATTER, and ALPHV ransomware. With the purported shift to ransomware operations, Mandiant is publishing our research on the evolution of FIN7 which we haven’t publicly written about since Mahalo FIN7, published in 2019.
---------------------------------------------
https://www.mandiant.com/resources/evolution-of-fin7
∗∗∗ Hacker accessed 319 crypto- and finance-related Mailchimp accounts, company said ∗∗∗
---------------------------------------------
Email marketing firm Mailchimp announced on Monday that a hacker breached its internal tools and managed to gain access to 319 Mailchimp accounts for companies in the cryptocurrency and finance industries.
---------------------------------------------
https://therecord.media/hacker-accessed-319-crypto-and-finance-related-mail…
∗∗∗ Kaseya Full Disclosure ∗∗∗
---------------------------------------------
In honor of our appearance on the Ransomware Files podcast episode #5 we are releasing the full details of the vulnerabilities we found during our research into Kaseya VSA of which some were used by REvil to attack Kaseya’s customers. The details can be found in our CVE entries: [...]
---------------------------------------------
https://csirt.divd.nl/2022/04/04/Kaseya-VSA-Full-Disclosure/
=====================
= Vulnerabilities =
=====================
∗∗∗ 15-Year-Old Bug in PEAR PHP Repository Couldve Enabled Supply Chain Attacks ∗∗∗
---------------------------------------------
A 15-year-old security vulnerability has been disclosed in the PEAR PHP repository that could permit an attacker to carry out a supply chain attack, including obtaining unauthorized access to publish rogue packages and execute arbitrary code.
---------------------------------------------
https://thehackernews.com/2022/04/15-year-old-bug-in-pear-php-repository.ht…
∗∗∗ FG-IR-22-059: Vulnerability in OpenSSL library ∗∗∗
---------------------------------------------
A security advisory was released affecting the version of OpenSSL library used in some Fortinet products.
---------------------------------------------
https://fortiguard.fortinet.com/psirt/FG-IR-22-059
∗∗∗ VMSA-2022-0010 ∗∗∗
---------------------------------------------
A critical vulnerability in Spring Framework project identified by CVE-2022-22965 has been publicly disclosed which impacts VMware products.
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2022-0010.html
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (asterisk, qemu, and zlib), Fedora (389-ds-base, ghc-cmark-gfm, ghc-hakyll, gitit, libkiwix, openssl, pandoc, pandoc-citeproc, patat, phoronix-test-suite, seamonkey, and skopeo), Mageia (libtiff, openjpeg2, and php-smarty), openSUSE (python), Oracle (httpd), Red Hat (httpd), and SUSE (libreoffice, python, and python36).
---------------------------------------------
https://lwn.net/Articles/890187/
∗∗∗ Microsoft Edge 100.0.1185.29 fixt Schwachstellen ∗∗∗
---------------------------------------------
Microsoft hat zum 1. April 2022 (kein April-Scherz) den Chromium-Edge Browser auf die Version Edge 100.0.1185.29 aktualisiert. Es handelt sich um ein Wartungsupdate, das eine Reihe Schwachstellen schließt und den 100er-Entwicklungszweig einleitet.
---------------------------------------------
https://www.borncity.com/blog/2022/04/02/microsoft-edge-100-0-1185-29-fixt-…
∗∗∗ Kaspersky Anti-Virus: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://www.cert-bund.de/advisoryshort/CB-K22-0384
∗∗∗ Vulnerability in Spring Framework Affecting Cisco Products: March 2022 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Vulnerability in Spring Cloud Function Framework Affecting Cisco Products: March 2022 ∗∗∗
---------------------------------------------
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Integration Bus and IBM App Connect Enterprise ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: Vulnerability in Netty – CVE-2021-43797 may affect IBM Watson Assistant for IBM Cloud Pak for Data. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-netty-cv…
∗∗∗ Security Bulletin: Vulnerability in IBM Java SDK affect IBM WebSphere Cast Iron Solution & App Connect Professional ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-java…
∗∗∗ Security Bulletin: IBM App Connect Enterprise & IBM Integration Bus are vulnerable to arbitrary code execution due to Apache Log4j (CVE-2022-23307, CVE-2022-23302) and SQL injection due to Apache Log4j (CVE-2022-23305) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-app-connect-enterpris…
∗∗∗ Security Bulletin: Cloud Pak for Security contains packages that have multiple vulnerabilities ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cloud-pak-for-security-co…
∗∗∗ Security Bulletin: Cross-Site Scripting and information disclosure vulnerabilities are addressed with IBM Cloud Pak for Business Automation iFixes for March 2022 (CVE-2021-29835, CVE-39046) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cross-site-scripting-and-…
∗∗∗ Security Bulletin: IBM Spectrum Discover is vulnerable to Docker CLI (CVE-2021-41092) and Apache Log4j (CVE-2021-4104, CVE-2022-23302, CVE-2022-23305, CVE-2022-23307) weaknesses ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-discover-is-…
∗∗∗ Security Bulletin: IBM Informix Dynamic Server in Cloud Pak for Data is vulnerable to denial of service and arbitrary code execution due to Apache Log4j (CVE-2021-45105, CVE-2021-45046) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-informix-dynamic-serv…
∗∗∗ Security Bulletin: Vulnerability in IBM Java SDK affect IBM WebSphere Cast Iron Solution & App Connect Professional ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-ibm-java…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM WebSphere Cast Iron Solution & App Connect Professional ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 31-03-2022 18:00 − Freitag 01-04-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ New BlackGuard password-stealing malware sold on hacker forums ∗∗∗
---------------------------------------------
A new information-stealing malware named BlackGuard is winning the attention of the cybercrime community, now sold on numerous darknet markets and forums for a lifetime price of $700 or a subscription of $200 per month.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-blackguard-password-stea…
∗∗∗ Viasat confirms satellite modems were wiped with AcidRain malware ∗∗∗
---------------------------------------------
A newly discovered data wiper malware that wipes routers and modems has been deployed in the cyberattack that targeted the KA-SAT satellite broadband service to wipe SATCOM modems on February 24, affecting thousands in Ukraine and tens of thousands more across Europe.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/viasat-confirms-satellite-mo…
∗∗∗ Phishing uses Azure Static Web Pages to impersonate Microsoft ∗∗∗
---------------------------------------------
Phishing attacks are abusing Microsoft Azures Static Web Apps service to steal Microsoft, Office 365, Outlook, and OneDrive credentials.
---------------------------------------------
https://www.bleepingcomputer.com/news/microsoft/phishing-uses-azure-static-…
∗∗∗ FORCEDENTRY: Sandbox Escape ∗∗∗
---------------------------------------------
In this post we'll take a look at that sandbox escape. It's notable for using only logic bugs. In fact it's unclear where the features that it uses end and the vulnerabilities which it abuses begin.
---------------------------------------------
https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.h…
∗∗∗ iOS-Updates: Automatik braucht mehrere Wochen ∗∗∗
---------------------------------------------
Wer will, dass sein iPhone auf aktuellem Stand ist, sollte händisch aktualisieren. Die automatische Verteilung braucht lange, bestätigt Apples Softwarechef.
---------------------------------------------
https://heise.de/-6657879
∗∗∗ CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) ∗∗∗
---------------------------------------------
CVE-2022-22965, aka SpringShell, is a remote code execution vulnerability in the Spring Framework. We provide a root cause analysis and mitigations.
---------------------------------------------
https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/
∗∗∗ The spectre of Stuxnet: CISA issues alert on Rockwell Automation ICS vulnerabilities ∗∗∗
---------------------------------------------
The flaws can be exploited to execute code on vulnerable controllers and workstations.
---------------------------------------------
https://www.zdnet.com/article/cisa-issues-alert-on-critical-ics-vulnerabili…
∗∗∗ Spring Framework RCE, Mitigation Alternative ∗∗∗
---------------------------------------------
Yesterday we announced a Spring Framework RCE vulnerability CVE-2022-22965, listing Apache Tomcat as one of several preconditions. The Apache Tomcat team has since released versions 10.0.20, 9.0.62, and 8.5.78 all of which close the attack vector on Tomcat’s side. While the vulnerability is not in Tomcat itself, in real world situations, it is important to be able to choose among multiple upgrade paths that in turn provides flexibility and layered protection.
---------------------------------------------
https://spring.io/blog/2022/04/01/spring-framework-rce-mitigation-alternati…
=====================
= Vulnerabilities =
=====================
∗∗∗ IBM Security Bulletins 2022-03-31 ∗∗∗
---------------------------------------------
IBM App Connect Enterprise Certified Container, IBM Sterling Partner Engagement Manager, IBM QRadar Network Security, IBM Security Access Manager for Enterprise, IBM Urbancode Deploy, IBM Tivoli Application Dependency Discovery Manager, IBM Tivoli Netcool Impact, Watson Knowledge Catalog InstaScan
---------------------------------------------
https://www.ibm.com/blogs/psirt/
∗∗∗ Kritische Sicherheitslücke: Gitlab-Update außer der Reihe ∗∗∗
---------------------------------------------
Die Gitlab-Entwickler haben ein Update veröffentlicht, um Sicherheitslücken zu schließen. Eine kritische Lücke könnte Angreifern die Kontoübernahme ermöglichen.
---------------------------------------------
https://heise.de/-6660080
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (wireshark), Fedora (389-ds-base), Mageia (golang, wavpack, and zlib), openSUSE (yaml-cpp), SUSE (expat and yaml-cpp), and Ubuntu (linux, linux-aws, linux-kvm, linux-lts-xenial, linux-aws-5.4, linux-azure, linux-gcp, linux-gcp-5.13, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-aws-hwe, linux-gcp-4.15, linux-oracle, linux-intel-5.13, and tomcat9).
---------------------------------------------
https://lwn.net/Articles/889983/
∗∗∗ Sicherheitsupdates: iOS 15.4.1 und macOS Monterey 12.3.1 ∗∗∗
---------------------------------------------
Apple hat zum 31. März 2022 zwei Sicherheitsupdates für macOS 12.3.1 (Monterey) und iOS/iPad OS 15.4.1 freigegeben. Diese schließen die Schwachstellen CVE-2022-22675 (in AppleAVD für iOS und macOS) und CVE-2022-22674 im macOS Intel Grafiktreiber.
---------------------------------------------
https://www.borncity.com/blog/2022/04/01/sicherheitsupdates-ios-15-4-1-und-…
∗∗∗ K56241216: OpenLDAP vulnerabilities CVE-2020-25709 and CVE-2020-25710 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K56241216
∗∗∗ K44994972: Linux kernel vulnerability CVE-2020-25704 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K44994972
∗∗∗ Schneider Electric SCADAPack Workbench ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-090-01
∗∗∗ Hitachi Energy e-mesh EMS ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-090-02
∗∗∗ Fuji Electric Alpha5 ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-090-03
∗∗∗ Mitsubishi Electric FA Products ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-090-04
∗∗∗ General Electric Renewable Energy MDS Radios ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-090-06
∗∗∗ CISA Adds Seven Known Exploited Vulnerabilities to Catalog ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/03/31/cisa-adds-seven-k…
∗∗∗ Mehrere Schwachstellen in ZA|ARC (SYSS-2021-063/-064/-065/-066/-067) ∗∗∗
---------------------------------------------
https://www.syss.de/pentest-blog/mehrere-schwachstellen-in-zaarc-syss-2021-…
∗∗∗ SA45100 - CVE-2022-0778-OpenSSL-Vulnerability may lead to DoS attack ∗∗∗
---------------------------------------------
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/CVE-2022-0778…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 30-03-2022 18:00 − Donnerstag 31-03-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Spring patches leaked Spring4Shell zero-day RCE vulnerability ∗∗∗
---------------------------------------------
Spring released emergency updates to fix the Spring4Shell zero-day remote code execution vulnerability, which leaked prematurely online before a patch was released.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/spring-patches-leaked-spring…
∗∗∗ Java: Exploit für RCE-Lücke in Spring geleakt ∗∗∗
---------------------------------------------
Unter Umständen reicht ein HTTP-Request, um Spring-Anwendungen eine Webshell unterzujubeln. Die Lücke wird wohl bereits ausgenutzt.
---------------------------------------------
https://www.golem.de/news/java-exploit-fuer-rce-luecke-in-spring-geleakt-22…
∗∗∗ SpringShell Detector - searches compiled code (JAR/WAR binaries) for potentially vulnerable web apps ∗∗∗
---------------------------------------------
The SpringShell vulnerability may affect some web applications using Spring Framework, but requires a number of conditions to be exploitable. One specific condition which may be rather rare (and therefore render most applications non-exploitable in practice) is the existence of Spring endpoints which bind request parameters to a non-primitive (Java Bean) type. This tool can be used to scan compiled code and verify whether such endpoints exist in the codebase.
---------------------------------------------
https://github.com/jfrog/jfrog-spring-tools
∗∗∗ Simple local Spring vulnerability scanner ∗∗∗
---------------------------------------------
This is a simple tool that can be used to find instances of Spring vulnerable to CVE-2022-22965 ("SpringShell") in installations of Java software such as web applications. JAR and WAR archives are inspected and class files that are known to be vulnerable are flagged.
---------------------------------------------
https://github.com/hillu/local-spring-vuln-scanner
∗∗∗ Spring4Shell: Security Analysis of the latest Java RCE 0-day vulnerabilities in Spring ∗∗∗
---------------------------------------------
Weve been taking a look at the new zero-day exploit, dubbed Spring4Shell, supposedly discovered in Spring Core to determine if its a problem or not, as well as explained another RCE vulnerability found in Spring.
---------------------------------------------
https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities
∗∗∗ Calendly actively abused in Microsoft credentials phishing ∗∗∗
---------------------------------------------
Phishing actors are actively abusing Calendly to kick off a clever sequence to trick targets into entering their email account credentials on the phishing page.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/calendly-actively-abused-in-…
∗∗∗ Lazarus Trojanized DeFi app for delivering malware ∗∗∗
---------------------------------------------
We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a full-featured backdoor.
---------------------------------------------
https://securelist.com/lazarus-trojanized-defi-app/106195/
∗∗∗ Conti-nuation: methods and techniques observed in operations post the leaks ∗∗∗
---------------------------------------------
This post describes the methods and techniques we observed during recent incidents that took place after the Coni data leaks.
---------------------------------------------
https://research.nccgroup.com/2022/03/31/conti-nuation-methods-and-techniqu…
=====================
= Vulnerabilities =
=====================
∗∗∗ QNAP warns severe OpenSSL bug affects most of its NAS devices ∗∗∗
---------------------------------------------
Taiwan-based network-attached storage (NAS) maker QNAP warned on Tuesday that most of its NAS devices are impacted by a high severity OpenSSL bug disclosed two weeks ago.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/qnap-warns-severe-openssl-bu…
∗∗∗ “VMware Spring Cloud” Java bug gives instant remote code execution – update now! ∗∗∗
---------------------------------------------
Easy unauthenticated remote code execution - PoC code already out
---------------------------------------------
https://nakedsecurity.sophos.com/2022/03/30/vmware-spring-cloud-java-bug-gi…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libgc and pjproject), Fedora (cobbler, mingw-openjpeg2, and openjpeg2), Mageia (openvpn), openSUSE (abcm2ps, fish3, icingaweb2, kernel-firmware, nextcloud, openSUSE-build-key, python2-numpy, salt, and zlib), Slackware (vim), SUSE (kernel-firmware, opensc, python2-numpy, python3, salt, and zlib), and Ubuntu (dosbox, linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.13, linux-hwe-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux, linux-aws, [...]
---------------------------------------------
https://lwn.net/Articles/889852/
∗∗∗ The Old Switcheroo: Hiding Code on Rockwell Automation PLCs ∗∗∗
---------------------------------------------
CVE-2022-1161 affects numerous versions of Rockwell’s Logix Controllers and has a CVSS score of 10, the highest criticality. CVE-2022-1159 affects several versions of its Studio 5000 Logix Designer application, and has a CVSS score of 7.7, high severity.
---------------------------------------------
https://claroty.com/2022/03/31/blog-research-hiding-code-on-rockwell-automa…
∗∗∗ WordPress Plugin "Advanced Custom Fields" vulnerable to missing authorization ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN42543427/
∗∗∗ Anti Spam by CleanTalk - Moderately critical - SQL Injection - SA-CONTRIB-2022-032 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2022-032
∗∗∗ Security Bulletin: IBM Db2 Web Query for i is vulnerable to denial of service in Apache Commons Compress (CVE-2021-36090), arbitrary code execution in Apache Log4j (CVE-2021-44832), and cross-site scripting in TIBCO WebFOCUS (CVE-2021-35493) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-web-query-for-i-i…
∗∗∗ Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in NumPy ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-…
∗∗∗ Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM WebSphere Cast Iron Solution & App Connect Professional ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-…
∗∗∗ Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in XStream ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-…
∗∗∗ Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in FasterXML jackson-databind ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-…
∗∗∗ Security Bulletin: IBM Tivoli Netcool/OMNIbus Transport Module Common Integration Library is vulnerable to HTTP request smuggling due to Netty (CVE-2021-43797) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-omnibu…
∗∗∗ Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in TensorFlow ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-…
∗∗∗ Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Go ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-…
∗∗∗ Security Bulletin: IBM QRadar Network Security is affected by Wget vulnerability (CVE-2021-31879) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-securi…
∗∗∗ Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Spring ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-…
∗∗∗ Security Bulletin: IBM Security Verify Access is vulnerable to obtaining sensitive information due to improper validation of JWT tokens. ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-verify-acces…
∗∗∗ CVE-2022-0778 Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778 (Severity: HIGH) ∗∗∗
---------------------------------------------
https://security.paloaltonetworks.com/CVE-2022-0778
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 29-03-2022 18:00 − Mittwoch 30-03-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Mars Stealer malware pushed via OpenOffice ads on Google ∗∗∗
---------------------------------------------
A newly launched information-stealing malware variant called Mars Stealer is rising in popularity, and threat analysts are now spotting the first notable large-scale campaigns employing it.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/mars-stealer-malware-pushed-…
∗∗∗ Viasat shares details on KA-SAT satellite service cyberattack ∗∗∗
---------------------------------------------
US satellite communications provider Viasat has shared an incident report regarding the cyberattack that affected its KA-SAT consumer-oriented satellite broadband service on February 24, the day Russia invaded Ukraine.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/viasat-shares-details-on-ka-…
∗∗∗ Angriff auf Schnellllader: Forscher können Ladevorgänge per Funk unterbrechen ∗∗∗
---------------------------------------------
CCS hat sich als Standard beim Schnellladen von Elektroautos etabliert. Doch der Ladevorgang lässt sich durch Funksignale zum Absturz bringen.
---------------------------------------------
https://www.golem.de/news/schnelllladen-forscher-bringen-ccs-ladevorgaenge-…
∗∗∗ Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks ∗∗∗
---------------------------------------------
Team Nautilus has uncovered a Python-based ransomware attack that, for the first time, was targeting Jupyter Notebook, a popular tool used by data practitioners. The attackers gained initial access via misconfigured environments, then ran a ransomware script that encrypts every file on a given path on the server and deletes itself after execution to conceal the attack.
---------------------------------------------
https://blog.aquasec.com/python-ransomware-jupyter-notebook
∗∗∗ Kostenlose Webinar-Reihe: So schützen Sie sich im Internet ∗∗∗
---------------------------------------------
Mit Unterstützung der Arbeiterkammer Burgenland veranstalten unsere KollegInnen von saferinternet.at ab 5. April eine Webinar-Reihe. Die kostenlosen Webinare sind für alle interessierten Erwachsenen offen und beschäftigen sich mit dem sicheren und verantwortungsvollen Umgang mit digitalen Medien. Mit dabei sind auch ExpertInnen der Watchlist Internet.
---------------------------------------------
https://www.watchlist-internet.at/news/kostenlose-webinar-reihe-so-schuetze…
∗∗∗ Investigating an engineering workstation – Part 2 ∗∗∗
---------------------------------------------
In this second post we will focus on specific evidence written by the TIA Portal. As you might remember, in the first part we covered standard Windows-based artefacts regarding execution of the TIA Portal and usage of projects.
---------------------------------------------
https://blog.nviso.eu/2022/03/30/investigating-an-engineering-workstation-p…
∗∗∗ Advanced warning: probable remote code execution (RCE) in Spring, an extremely popular Java framework ∗∗∗
---------------------------------------------
This notice is intended to alert you that there may be a significant issue with Spring which, if confirmed, would require immediate attention.In the morning (New York time) on Wednesday, March 29th, 2022, a member of the security research team KnownSec posted a now-removed screenshot to Twitter purporting to show a trivially-exploited remote code execution vulnerability against Spring core, the most popular Java framework in use on the Internet. The researcher did not provide a proof-of-concept or public details.
---------------------------------------------
https://bugalert.org/content/notices/2022-03-29-spring.html
=====================
= Vulnerabilities =
=====================
∗∗∗ Jetzt aktualisieren! Angriffe auf Sicherheitslücke in Trend Micro Apex Central ∗∗∗
---------------------------------------------
Trend Micro warnt vor Angriffen auf eine Sicherheitslücke in zentralen Verwaltungssoftware Apex Central. Zum Abdichten des Lecks stehen Updates bereit.
---------------------------------------------
https://heise.de/-6656849
∗∗∗ VMSA-2022-0009 ∗∗∗
---------------------------------------------
CVSSv3 Range: 5.5
CVE(s): CVE-2022-22948
Synopsis: VMware vCenter Server updates address an information disclosure vulnerability
---------------------------------------------
https://www.vmware.com/security/advisories/VMSA-2022-0009.html
∗∗∗ Reflected XSS in Spam protection, AntiSpam, FireWall by CleanTalk ∗∗∗
---------------------------------------------
On February 15, 2022, the Wordfence Threat Intelligence team finished research on two separate vulnerabilities in Spam protection, AntiSpam, FireWall by CleanTalk, a WordPress plugin with over 100,000 installations. [...] A patched version, 5.174.1, was made available on March 25, 2022.
---------------------------------------------
https://www.wordfence.com/blog/2022/03/reflected-xss-in-spam-protection-ant…
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by CentOS (expat, firefox, httpd, openssl, and thunderbird), Debian (cacti), Fedora (kernel, rsh, unrealircd, and xen), Mageia (kernel and kernel-linus), openSUSE (apache2, java-1_8_0-ibm, kernel, openvpn, and protobuf), Oracle (openssl), Red Hat (httpd:2.4, kernel, kpatch-patch, and openssl), SUSE (apache2, java-1_7_1-ibm, java-1_8_0-ibm, kernel, openvpn, protobuf, and zlib), and Ubuntu (chromium-browser and paramiko).
---------------------------------------------
https://lwn.net/Articles/889682/
∗∗∗ SaltStack Salt: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in SaltStack Salt ausnutzen, um Dateien zu manipulieren, einen Denial of Service Zustand herbeizuführen, Privilegien zu erweitern oder beliebigen Programmcode auszuführen.
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0371
∗∗∗ Trend Micro AntiVirus für Mac: Schwachstelle ermöglicht Privilegieneskalation ∗∗∗
---------------------------------------------
Ein lokaler Angreifer kann eine Schwachstelle in Trend Micro AntiVirus für Mac ausnutzen, um seine Privilegien zu erhöhen.
---------------------------------------------
http://www.cert-bund.de/advisoryshort/CB-K22-0370
∗∗∗ Google Releases Security Updates for Chrome ∗∗∗
---------------------------------------------
Google has released Chrome version 100.0.4896.60 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/03/30/google-releases-s…
∗∗∗ Password-Hash-Preisgabe im CMS Statamic (SYSS-2022-022) ∗∗∗
---------------------------------------------
Im CMS Statamic können in der REST-API Passwort-Hash-Werte aller Benutzer:innen ausgelesen werden. Dies kann zur Übernahme der Website führen.
---------------------------------------------
https://www.syss.de/pentest-blog/password-hash-preisgabe-in-statamic-cms-sy…
∗∗∗ Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU – Oct 2021and Jan 2022 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sdk-java-technology-e…
∗∗∗ Security Bulletin: An Eclipse Jetty vulnerability affects IBM Rational Functional Tester ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-an-eclipse-jetty-vulnerab…
∗∗∗ PHOENIX CONTACT: Vulnerabilities in XML parser library Expat (libexpat) ∗∗∗
---------------------------------------------
https://cert.vde.com/de/advisories/VDE-2022-005/
∗∗∗ Buffer Overflow Vulnerability in Recovery Image ∗∗∗
---------------------------------------------
https://psirt.bosch.com/security-advisories/bosch-sa-446276-bt.html
∗∗∗ CVE-2022-0778: Sicherheitslücken mit Denial of Service-Potential in OpenSSL ∗∗∗
---------------------------------------------
https://www.sprecher-automation.com/it-sicherheit/security-alerts
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily
=====================
= End-of-Day report =
=====================
Timeframe: Montag 28-03-2022 18:00 − Dienstag 29-03-2022 18:00
Handler: Thomas Pribitzer
Co-Handler: Robert Waldner
=====================
= News =
=====================
∗∗∗ Sophos warns critical firewall bug is being actively exploited ∗∗∗
---------------------------------------------
British-based cybersecurity vendor Sophos warned that a recently patched Sophos Firewall bug allowing remote code execution (RCE) is now actively exploited in attacks.
---------------------------------------------
https://www.bleepingcomputer.com/news/apple/sophos-warns-critical-firewall-…
∗∗∗ Triton Malware Still Targeting Energy Firms ∗∗∗
---------------------------------------------
The FBIs latest Private Industry Notification warns the energy sector that the group behind Triton is still up to no good.
---------------------------------------------
https://www.darkreading.com/attacks-breaches/triton-malware-still-targeting…
∗∗∗ Linux-Kernel: Netfilter-Bug gibt Nutzern Root-Rechte ∗∗∗
---------------------------------------------
Im Linux-Kernel sind mehrere Fehler im Netfilter-Code gefunden worden, die es einem Nutzer ermöglichen, Root-Rechte zu erlangen. Das Kernel-Team hat für alle unterstützten Versionszweige Updates veröffentlicht.
CVE-2022-1015, CVE-2022-1016).
---------------------------------------------
https://www.golem.de/news/linux-kernel-netfilter-bug-gibt-nutzern-root-rech…
∗∗∗ A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM Packages ∗∗∗
---------------------------------------------
A threat actor dubbed "RED-LILI" has been linked to an ongoing large-scale supply chain attack campaign targeting the NPM package repository by publishing nearly 800 malicious modules.
---------------------------------------------
https://thehackernews.com/2022/03/a-threat-actor-dubbed-red-lili-has-been.h…
∗∗∗ Betrügerische SMS im Namen der Volksbank ∗∗∗
---------------------------------------------
Aktuell kursieren betrügerische SMS im Namen der Volksbank. EmpfängerInnen werden dringlich aufgefordert, auf einen Link zu klicken – angeblich, weil das Konto gesperrt wurde. Achtung: Dabei handelt es sich um Betrug. Wer den Link anklickt, landet auf einer gefälschten Login-Seite der Volksbank. Dort werden Zugangsdaten gestohlen!
---------------------------------------------
https://www.watchlist-internet.at/news/betruegerische-sms-im-namen-der-volk…
∗∗∗ Log4Shell exploited to infect VMware Horizon servers with backdoors, crypto miners ∗∗∗
---------------------------------------------
A patch was released in December 2021, but as is often the case with internet-facing servers, many systems have not been updated.
According to Sophos, the latest Log4Shell attacks target unpatched VMware Horizon servers with three different backdoors and four cryptocurrency miners.
---------------------------------------------
https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-…
∗∗∗ Verblecon: Sophisticated New Loader Used in Low-level Attacks ∗∗∗
---------------------------------------------
Indications the attacker may not realize the potential capabilities of the malware they are using.
---------------------------------------------
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ve…
∗∗∗ Mitigating Attacks Against Uninterruptable Power Supply Devices ∗∗∗
---------------------------------------------
CISA and the Department of Energy (DOE) are aware of threat actors gaining access to a variety of internet-connected uninterruptable power supply (UPS) devices, often through unchanged default usernames and passwords. Organizations can mitigate attacks against their UPS devices, which provide emergency power in a variety of applications when normal power sources are lost, by removing management interfaces from the internet.
---------------------------------------------
https://us-cert.cisa.gov/ncas/current-activity/2022/03/29/mitigating-attack…
=====================
= Vulnerabilities =
=====================
∗∗∗ Wyze Cam flaw lets hackers remotely access your saved videos ∗∗∗
---------------------------------------------
The authentication bypass flaw tracked as CVE-2019-9564 was addressed by the Wyze team via a security update on September 24, 2019.
The remote execution vulnerability, assigned CVE-2019-12266, was fixed via an app update on November 9, 2020, 21 months after its initial discovery.
The worst treatment of the bunch was reserved for the SD card issue, which was fixed only on January 29, 2022, when Wyze pushed a fixing firmware update.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/wyze-cam-flaw-lets-hackers-r…
∗∗∗ ZDI-22-545: (0Day) Siemens Simcenter Femap NEU File Parsing Out-Of-Bounds Write Information Disclosure Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-22-545/
∗∗∗ Kritische Schadcode-Lücke in In-Memory-Datenbank Redis geschlossen ∗∗∗
---------------------------------------------
Das Zusammenspiel von Debian-Systemen und Redis kann zu ernsten Sicherheitsproblemen führen. Dagegen abgesicherte Versionen schaffen Abhilfe.
---------------------------------------------
https://heise.de/-6655726
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (libdatetime-timezone-perl, pjproject, and tzdata), Mageia (chromium-browser-stable, docker, graphicsmagick, and libtiff), Oracle (expat), Red Hat (expat, httpd:2.4, openssl, and screen), Scientific Linux (expat and openssl), and Ubuntu (libtasn1-6, linux-oem-5.14, openjdk-lts, and paramiko).
---------------------------------------------
https://lwn.net/Articles/889571/
∗∗∗ Sicherheitswarnung: Authentifizierungsschwachstelle CVE-2022-0342 in Zyxel USG/ZyWALL ∗∗∗
---------------------------------------------
In verschiedenen Zyxel Firewall-Produkten gibt es eine kritische Authentifizierungs-Schwachstelle (CVE-2022-0342). Durch diese Sicherheitslücke wird eine Übernahme der Firewall möglich. Zyxel stellt zwar für Geräte, die noch im Support sind, Firmware-Updates bereits.
---------------------------------------------
https://www.borncity.com/blog/2022/03/29/sicherheitswarnung-authentifizieru…
∗∗∗ CVE-2018-25032: Zlib Memory Corruption Vulnerability ∗∗∗
---------------------------------------------
You may be thinking: ‘Wait, this new CVE starts with 2018.., this must be a mistake?’. In fact, it is not a mistake. This is about a CVE that everyone thought was patched years ago but now appears to be alive and well.
[...]
Linux distributions such as Ubuntu and Alpine have already implemented the fix in their latest releases, so you may want to update Zlib to your platform’s release of version 1.2.12, and re-compile any programs with the updated library.
---------------------------------------------
https://orca.security/resources/blog/zlib-memory-corruption-vulnerability-c…
∗∗∗ Security Bulletin: CVE-2021-44228 log4j affects MAS Monitor 8.4, 8.5 and 8.6 ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2021-44228-log4j-affe…
∗∗∗ Security Bulletin: MAS Monitor 8.4, 8.5, and 8.6 log4j ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-mas-monitor-8-4-8-5-and-8…
∗∗∗ Security Bulletin: Critical Vulnerabilities in libraries used by libraries that IBM Spectrum discover is using (libraries of libraries) ∗∗∗
---------------------------------------------
https://www.ibm.com/blogs/psirt/security-bulletin-critical-vulnerabilities-…
∗∗∗ K33548065: Eclipse Jetty vulnerability CVE-2018-12536 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K33548065?utm_source=f5support&utm_mediu…
∗∗∗ K03674368: Linux kernel vulnerability CVE-2021-3715 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K03674368?utm_source=f5support&utm_mediu…
∗∗∗ Philips e-Alert ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsma-22-088-01
∗∗∗ Rockwell Automation ISaGRAF ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-088-01
∗∗∗ Omron CX-Position ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02
∗∗∗ Hitachi Energy LinkOne WebView ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-088-03
∗∗∗ Modbus Tools Modbus Slave ∗∗∗
---------------------------------------------
https://us-cert.cisa.gov/ics/advisories/icsa-22-088-04
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily