Tageszusammenfassung - Montag 28-10-2013

End-of-Shift report

Timeframe: Freitag 25-10-2013 18:00 − Montag 28-10-2013 18:00 Handler: Matthias Fraidl Co-Handler: n/a

Email contains phishing scam, not iPhone 5S

A new phishing email circulating the globe is preying on Apple fans who cant wait to get their hands on the coming iPhone 5S and iPhone 5c devices.

http://www.scmagazine.com/email-contains-phishing-scam-not-iphone-5s/article/311080/


Blog: Cryptolocker Wants Your Money!

A new ransomware Trojan is on the loose. The attackers give you roughly three days to pay them, otherwise your data is gone forever.

http://www.securelist.com/en/blog/208214109/Cryptolocker_Wants_Your_Money


Blog-Software Wordpress 3.7 aktualisiert sich selbst

In der neuen Version 3.7 hält sich die Blog-Software Wordpress selbst aktuell: Sicherheitsupdates werden künftig im Hintergrund automatisch eingespielt, wenn die Konfiguration das zulässt. Weitere Neuerungen dienen ebenfalls vorrangig der Sicherheit.

http://www.heise.de/security/meldung/Blog-Software-Wordpress-3-7-aktualisiert-sich-selbst-1985697.html


Periodic Connections to Control Server Offer New Way to Detect Botnets

A number of recent botnets and advanced threats use HTTP as their primary communications channel with their control servers. McAfee Labs research during the last couple of years reveals that more than 60 percent of the top botnet families depend on HTTP. These numbers have increased significantly over the last few quarters.

http://blogs.mcafee.com/mcafee-labs/periodic-links-to-control-server-offer-new-way-to-detect-botnets


Improving Hadoop Security with Host Intrusion Detection (Part 2)

This is a continuation of our previous post on Hadoop security. As we mentioned in our earlier post, we can use OSSEC to monitor for the file integrity of these existing Hadoop and HBase systems. OSSEC creates logs which a system administrator can use to check for various system events. It´s worth noting that big data systems ...

http://blog.trendmicro.com/trendlabs-security-intelligence/improving-hadoop-security-with-host-intrusion-detection-part-2/


Active Perl/Shellbot Trojan

ISC received a submission from Zach of a Perl/Shellbot.B trojan served by fallencrafts[.]info/download/himad.png. The trojan has limited detection on Virustotal and the script contains a 'hostauth' of sosick[.]net[3] and the IRC server where the compromised systems are connecting to is located at 89.248.172.144. What we have so far, it appears it is exploiting older version of Plesk.

http://isc.sans.edu/diary.html?storyid=16907&rss


LinkedIn kann Mails mitlesen

Die kürzlich eingeführte Intro-Technik für iOS bringt dem Berufsnetzwerk Kritik ein: Sie sei ein Traum für Angreifer und Sicherheitsdienste. Die Firma verteidigt sich: Alles sei sicher und man respektiere die Privatsphäre der Nutzer.

http://www.heise.de/security/meldung/LinkedIn-kann-Mails-mitlesen-2034490.html


Einbruch bei Buffer

Der Social-Media-Dienst wurde gestern gehackt. Laut Unternehmensblog sollen weder Passwörter noch Kreditkarteninformationen abhanden gekommen sein.

http://www.heise.de/security/meldung/Einbruch-bei-Buffer-2034519.html


Storewize: IBM warnt vor Sicherheitslücke in Storage-Systemen

In den SAN-Controllern der Serie Storewize von IBM steckt eine Lücke, mit der ein Angreifer die Konfiguration ändern und auch Daten löschen kann. Abhilfe schafft ein Firmware-Update, das schon bereitsteht. (IBM, Netzwerk)

http://www.golem.de/news/storewize-ibm-warnt-vor-sicherheitsluecke-in-storage-systemen-1310-102388-rss.html


End User Devices Security and Configuration Guidance

UK Gov Configuration guidance for the following platforms: End User Devices Security Guidance: Windows Phone 8 End User Devices Security Guidance: Android 4.2 End User Devices Security Guidance: Windows 7 and Windows 8 End User Devices Security Guidance: Ubuntu 12.04 End User Devices Security Guidance: Windows 8 RT ...

https://www.gov.uk/government/collections/end-user-devices-security-guidance--2


Bypassing security scanners by changing the system language

Luiz Eduardo and Joaquim Espinhara´s found that the majority of pentesting tools analyze specific problems in web applications - such as SQL injection - via the return messages that are provided by the application, and not by the error code that is reported by the database management system. So, what would happen if the setup language was not English, but Chinese or Portuguese? As their research showed, if the target SQL server doesnt use English by default, the scanners wont be able to

http://www.net-security.org/secworld.php?id=15832


Cisco Identity Services Engine contains an input validation vulnerability

Vulnerability Note VU#952422 Cisco Identity Services Engine contains an input validation vulnerability Original Release date: 28 Oct 2013 | Last revised: 28 Oct 2013 Overview Cisco Identity Services Engine contains an input validation vulnerability (CWE-20). Description CWE-20: Improper Input ValidationCisco Identity Services Engine (ISE) contains an input validation vulnerability.

http://www.kb.cert.org/vuls/id/952422


I challenged hackers to investigate me and what they found out is chilling

It´s my first class of the semester at New York University. I´m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message.

http://pandodaily.com/2013/10/26/i-challenged-hackers-to-investigate-me-and-what-they-found-out-is-chilling/


Spam-Versender. Schauen Sie doch mal bitte in Ihren Junk-Ordner

Werbefilter funktionieren inzwischen ziemlich zuverlässig. Das wissen auch die Spam-Versender. Deshalb schicken sie noch eine zweite Nachricht hinterher.

http://www.heise.de/security/meldung/Spam-Versender-Schauen-Sie-doch-mal-bitte-in-Ihren-Junk-Ordner-2034941.html


Scan Shows 65% of ReadyNAS Boxes on Web Vulnerable to Critical Bug

It´s been known for some time now several months, in fact that there is a critical, remotely exploitable vulnerability in some of Netgear´s ReadyNAS storage boxes, and a patch has been available since July. However, many of the boxes exposed to the Web are still vulnerable, and a recent scan by HD Moore of Rapid7 found that ...

http://threatpost.com/scan-shows-65-of-readynas-boxes-on-web-vulnerable-to-critical-bug/102706


Vuln: Cisco Catalyst 3750 Series Switches Default Credentials Security Bypass Vulnerabilities

http://www.securityfocus.com/bid/63342


Bugtraq: Multiple CSRF Horde Groupware Web mail Edition 5.1.2

http://www.securityfocus.com/archive/1/529466


Bugtraq: DD-WRT v24-sp2 Command Injection

http://www.securityfocus.com/archive/1/529463


Apache Struts2 showcase multiple XSS

http://cxsecurity.com/issue/WLB-2013100185


DSA-2787 roundcube

http://www.debian.org/security/2013/dsa-2787


Woltlab Burning Board Regenbogenwiese 2007 Addon SQL Injection Exploit.

http://www.exploit-db.com/exploits/29023


GnuPG Side-Channel Attack Lets Local Users Recover RSA Secret Keys

http://www.securitytracker.com/id/1029242


DSA-2785 chromium-browser

http://www.debian.org/security/2013/dsa-2785