End-of-Shift report
Timeframe: Mittwoch 16-10-2013 18:00 − Donnerstag 17-10-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
Bug Hunters Find 25 ICS, SCADA Vulnerabilities
A trio of researchers have uncovered 25 security vulnerabilities in various supervisory control and data acquisition (SCADA) and industrial control system (ICS) protocols.
http://threatpost.com/bug-hunters-find-25-ics-scada-vulnerabilities/102599
Researchers uncover holes that open power stations to hacking
Hacks could cause power outages and dont need physical access to substations.
http://arstechnica.com/security/2013/10/researchers-uncover-holes-that-open-power-stations-to-hacking/
Raising awareness quickly: A look at basic password hygiene
Rapid7s tips for strengthing your first line of defense
http://www.csoonline.com/article/741540/raising-awareness-quickly-a-look-at-basic-password-hygiene?source=rss_application_security
Mass iFrame injection campaign leads to Adobe Flash exploits
We´ve intercepted an ongoing malicious campaign, relying on injected/embedded iFrames at Web sites acting as intermediaries for a successful client-side exploits to take place. Let´s dissect the campaign, expose the malicious domains portfolio/infrastructure it relies on, as well as directly connect it with historical malicious activity, in this particular case, a social engineering campaign pushing fake browser updates.
http://www.webroot.com/blog/2013/10/17/mass-iframe-injection-campaign-leads-adobe-flash-exploits/
Top 20 Free Digital Forensic Investigation Tools for SysAdmins
Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it´s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn a new skill, these suites and utilities will help you conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging and mobile forensics.
http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/
Hintergrund: Standardpasswörter kein Sicherheitsrisiko?
Das ICS-CERT, zuständig für kritische Infrastruktur wie Staudämme und Atomkraftwerke, sagt Standardpasswörter stellen kein Sicherheitsrisiko dar solange sie gut dokumentiert und änderbar sind. Ist das wirklich so?
http://www.heise.de/security/artikel/Standardpasswoerter-kein-Sicherheitsrisiko-1980853.html
Apple iMessage Open to Man in the Middle, Spoofing Attacks
The Apple iMessage protocol has been shrouded in secrecy for years now, but a pair of security researchers have reverse-engineered the protocol and found that Apple controls the encryption key infrastructure for the system and therefore has the ability to read users´ text messages or decrypt them and hand them over at the order of a government agency.
http://threatpost.com/apple-imessage-open-to-man-in-the-middle-spoofing-attacks/102610
IBM Storwize V7000 Unified Multiple Vulnerabilities
https://secunia.com/advisories/55247
Bugtraq: PayPal Inc Bug Bounty #61 - Persistent Mail Encoding Vulnerability
http://www.securityfocus.com/archive/1/529250
Puppet Enterprise Dashboard Report YAML Handling Vulnerability
https://secunia.com/advisories/55362
Drupal Context Mulitple Vulnerabilities
http://cxsecurity.com/issue/WLB-2013100111
Drupal Simplenews Cross Site Scripting
http://cxsecurity.com/issue/WLB-2013100112
Vuln: Cisco Identity Services Engine CVE-2013-5539 Arbitrary File Upload Vulnerability
http://www.securityfocus.com/bid/63031
Bugtraq: Security Advisory for Bugzilla 4.4.1, 4.2.7 and 4.0.11
http://www.securityfocus.com/archive/1/529262
Panda Security for Business Pagent.exe code execution
http://xforce.iss.net/xforce/xfdb/88091