End-of-Shift report
Timeframe: Freitag 06-12-2013 18:00 − Montag 09-12-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
RuggedCom ROS Multiple Vulnerabilities
Siemens has reported to NCCIC/ICS-CERT multiple vulnerabilities in the RuggedCom Rugged OS (ROS). Siemens has produced a firmware update that mitigates these vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to hijack an active Web session and access administrative functions on the devices without proper authorization. These vulnerabilities could be exploited remotely.
http://ics-cert.us-cert.gov/advisories/ICSA-13-340-01
The Biggest Security Stories of 2013
As 2013 comes to a close, security experts are looking back at the major stories and developments of the year, including the Edward Snowden NSA leaks and major malware attacks. In this video, Vitaly Kamluk of Kaspersky Lab examines the biggest security news of 2013 and talks about the lasting effects they may have.
http://threatpost.com/the-biggest-security-stories-of-2013/103125
Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt
Just dont bork our crim-busting honeypots again Microsoft has teamed up with the FBI to launch a renewed attempt to disrupt the operations of the infamous ZeroAccess botnet.
http://www.theregister.co.uk/2013/12/06/zeroaccess_zombienet_takedown/
FAQ: Pony Malware Payload Discovery
Our team´s discovery of the spoils of yet another instance of Pony 1.9 has kept us busy the past couple of days. We´ve enjoyed explaining our discovery to journalists and trying our best to answer the questions that arise over social networks and email with each publication of a story. A lot of those questions tend to be similar.
http://blog.spiderlabs.com/2013/12/faq-pony-malware-payload-discovery.html
2014 Predictions: Blurring Boundaries
The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking "does privacy still exist?", cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things, but boring was not one of them.
http://blog.trendmicro.com/trendlabs-security-intelligence/2014-predictions-blurring-boundaries/
The state of targeted attacks
Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners who have involvement in defensive efforts against APTs launched at their organisations.
http://www.net-security.org/secworld.php?id=16059
Android-Apps: Sicherheitslücke durch fehlerhafte SSL-Prüfung
Das Fraunhofer-Institut für Sichere Informationstechnologie hat mehrere Android-Apps ausfindig gemacht, bei denen die fehlerhafte Prüfung des SSL-Zertifikats den Zugriff auf Zugangsdaten möglich macht. Nur etwa die Hälfte aller kontaktierten Hersteller hat die Sicherheitslücke bisher geschlossen.
http://www.golem.de/news/android-apps-sicherheitsluecke-durch-fehlerhafte-ssl-pruefung-1312-103250-rss.html
The world´s most dangerous mobile phone spying app just moved into the tablet and iPad market
The evolution of GPS and the smart-phone market has spawned a macabre industry of surveillance apps designed to be covertly installed onto the cellphones of vulnerable employees, business associates, partners and children.
http://www.privacysurgeon.org/blog/incision/the-worlds-most-dangerous-mobile-phone-spying-app-just-moved-into-the-tablet-and-ipad-market/
Bypassing Windows AppLocker using a Time of Check Time of Use vulnerability
Windows AppLocker is Microsoft´s replacement to Software Restriction Policies in Windows 7, Windows 8, Server 2008 and Server 2012. Windows AppLocker has been promoted by several government agencies such as the National Security Agency and the New Zealand National Cyber Security Center as an effective mechanism to combat the execution of unauthorized code on modern Microsoft Windows based systems.
http://www.nccgroup.com/media/495634/2013-12-04_-_ncc_-_technical_paper_-_bypassing_windows_applocker__2_.pdf
Automater - IP URL and MD5 OSINT Analysis
Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal.
http://www.tekdefense.com/automater/
Drei GIMP-Lücken auf einen Streich
Das Sicherheits-Team von Red Hat hat drei Speicherverwaltungsprobleme in der Bildverarbeitungssoftware GIMP gefunden und beseitigt, die dazu ausgenutzt werden könnten, dem Benutzer Schadcode unterzuschieben.
http://www.heise.de/security/meldung/Drei-GIMP-Luecken-auf-einen-Streich-2062907.html
Malicious multi-hop iframe campaign affects thousands of Web sites, leads to a cocktail of client-side exploits - part two
Ever since we exposed and profiled the evasive, multi-hop, mass iframe campaign that affected thousands of Web sites in November, we continued to monitor it, believing that the cybercriminal(s) behind it, would continue operating it, basically switching to new infrastructure once the one exposed in the post got logically blacklisted, thereby undermining the impact of the campaign internationally.
http://www.webroot.com/blog/2013/12/09/malicious-multi-hop-iframe-campaign-affects-thousands-web-sites-leads-cocktail-client-side-exploits-part-two/
Putting malware in the picture
Spammers actively spread malware using fake notifications on behalf of various financial and banking institutions, booking and delivery services and other companies. The arsenal of tricks used by cybercriminals is constantly being updated. In particular, in recent years we have registered a number of English- and German-language mass mailings in which the attackers try to hide malware under photos and pictures.
https://www.securelist.com/en/blog/8159/Putting_malware_in_the_picture
[webapps] - Zimbra 0day exploit / Privilegie escalation via LFI
http://www.exploit-db.com/exploits/30085
D-Link DSR Router Remote Root Shell Exploit
http://cxsecurity.com/issue/WLB-2013120055
WordPress DZS Video Gallery 3.1.3 Remote File Disclosure
http://cxsecurity.com/issue/WLB-2013120050
cURL Certificate Validation Flaw Lets Remote Users Spoof SSL Servers
http://www.securitytracker.com/id/1029434
Security Bulletin: Multiple Security vulnerability fix for IBM Tivoli Storage Manager Administration Center (CVE-2012-5081, CVE-2013-0169, CVE-2013-0443).
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_multiple_security_vulnerability_fix_for_ibm_tivoli_storage_manager_administration_center_cve_2012_5081_cve_2013_0169_cve_2013_0443?lang=en_us
Steinberg MyMp3PRO SEH buffer overflow
http://xforce.iss.net/xforce/xfdb/89468