[CERT-daily] Tageszusammenfassung - Montag 20-06-2016
Daily end-of-shift report
team at cert.at
Mon Jun 20 18:07:21 CEST 2016
=======================
= End-of-Shift report =
=======================
Timeframe: Freitag 17-06-2016 18:00 − Montag 20-06-2016 18:00
Handler: Robert Waldner
Co-Handler: n/a
*** Locky, Dridex, and Angler among cybercrime groups to experience fall in activity ***
---------------------------------------------
There has been a sudden drop off in activity relating to a number of major malware families in recent weeks. Dridex (W32.Cridex), Locky (Trojan.Cryptolocker.AF), the Angler exploit kit and Necurs (Backdoor.Necurs), are among the threats who appear affected by this development.
---------------------------------------------
http://www.symantec.com/connect/blogs/locky-dridex-and-angler-among-cybercrime-groups-experience-fall-activity
*** Erpressungs-Trojaner RAA kommt mit Passwort-Dieb im Huckepack daher ***
---------------------------------------------
Der Computer-Schädling RAA soll nicht nur Daten als Geisel nehmen und ein Lösegeld verlangen, sondern auch einen Trojaner mitbringen, der Passwörter abgreift.
---------------------------------------------
http://heise.de/-3242139
*** You Acer holes! PC maker leaks payment cards in e-store hack ***
---------------------------------------------
Lost info includes names, addresses, numbers and security codes Acers insecure customer database spilled peoples personal information - including full payment card numbers - into hackers hands for more than a year.
---------------------------------------------
http://go.theregister.com/feed/www.theregister.co.uk/2016/06/17/what_a_pain_in_the_acer/
*** New Ransomware Written Entirely In JavaScript ***
---------------------------------------------
An anonymous reader writes: Security researchers have discovered a new form of ransomware written entirely in JavaScript and using the CryptoJS library to encode a users files. Researchers say the file is being distributed through email attachments, according to SC Magazine, which reports that "Opening the attachment kicks off a series of steps that not only locks up the victims files, but also downloads some additional malware onto the target computer. ...
---------------------------------------------
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/MLUCGZ3AfdM/new-ransomware-written-entirely-in-javascript
*** GoToMyPC remote desktop service resets all passwords in wake of attack ***
---------------------------------------------
GoToMyPC, a remote computer administration service offered by Citrix, has forced a password reset for all customers in the wake of what they call a 'very sophisticated password attack.' Effective immediately, you will be required to reset your GoToMyPC password before you can login again, the company told customers via email on Sunday, and advised them to use their regular GoToMyPC login link to reset the password, or go through the 'Forgot Password' link
---------------------------------------------
https://www.helpnetsecurity.com/2016/06/20/gotomypc-resets-passwords/
*** Understanding Critical Windows Artifacts and Their Relevance During Investigation-Part 1 ***
---------------------------------------------
In this article, we will learn about critical Windows artifacts, what they mean, where they are located in the system, what can be inferred from them and how can they help in actual during the investigation. This will be a series of articles and in Part 1, we will learn about the NTFS timestamps which ...
---------------------------------------------
http://resources.infosecinstitute.com/understanding-critical-windows-artifacts-and-their-relevance-during-investigation-part-1/
*** IBM Security Bulletins ***
---------------------------------------------
*** IBM Security Bulletin: Multiple Vulnerabilities in OpenSSL and a vulnerability in GNU glibc affect IBM Security Proventia Network Enterprise Scanner ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984794
---------------------------------------------
*** IBM Security Bulletin: IBM Maximo Asset Management is vulnerable to cross-site scripting, caused by improper validation of user-supplied input (CVE-2016-0399) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21984134
---------------------------------------------
*** IBM Security Bulletin: Information disclosure vulnerability affects IBM Sterling B2B Integrator (CVE-2016-0341) ***
http://www-01.ibm.com/support/docview.wss?uid=swg21985111
---------------------------------------------
*** Cisco Security Advisories ***
---------------------------------------------
*** Cisco IOS XE Software SNMP Subsystem Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-iosxe
---------------------------------------------
*** Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-fmc
---------------------------------------------
*** Cisco cBR-8 Series Converged Broadband Router SNMP Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160617-cbr
---------------------------------------------
*** Cisco IOS Software Link Layer Discovery Protocol Processing Code Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-ios
---------------------------------------------
*** Cisco IOS Software Link Layer Discovery Protocol Processing Code Denial of Service Vulnerability ***
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160616-ios1
---------------------------------------------
More information about the Daily
mailing list