End-of-Shift report
Timeframe: Montag 09-12-2013 18:00 − Dienstag 10-12-2013 18:00
Handler: Matthias Fraidl
Co-Handler: n/a
French Government Spoofs Google Certificate
Google revoked digital certificates for some of its domains that had been fraudulently signed by an intermediate certificate authority with links to ANSSI, Frances cyber-defense agency.
http://threatpost.com/french-government-spoofs-google-certificate/103128
How We Decoded Some Nasty Multi-Level Encoded Malware
>
From time to time, we come up with interesting bits of malware that are just calling us to decode and learn more about them. This is one of those cases. Recently, I crossed pathes with this little gem: That snippet is encoded malicious content.
http://blog.sucuri.net/2013/12/how-we-decoded-some-nasty-multi-level-encoded-malware.html
Microsoft Security Advisory (2916652): Improperly Issued Digital Certificates Could Allow Spoofing - Version: 1.0
Microsoft is aware of an improperly issued subordinate CA certificate that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. The subordinate CA certificate was improperly issued by the Directorate General of the Treasury (DG Trésor), subordinate to the Government of France CA (ANSSI), which is a CA present in the Trusted Root Certification Authorities Store. This issue affects all supported releases of Microsoft Windows. Microsoft is not currently aware of attacks related to this issue.
http://technet.microsoft.com/en-us/security/advisory/2916652
Untouched P2P Communication Infrastructure Keeps ZeroAccess Up and Running
Microsofts takedown of the ZeroAccess botnet wasnt a complete success. Experts point out that Microsoft targeted only the money-making aspects of the botnet, and that its communication protocol was untouched.
http://threatpost.com/untouched-p2p-communication-infrastructure-keeps-zeroaccess-up-and-running/103133
The Curious Case of the Malicious IIS Module
Recently, we´ve seen a few instances of a malicious DLL that is installed as an IIS module making its rounds in forensic cases. This module is of particular concern as it is currently undetectable by almost all anti-virus products. The malware is used by attackers to target sensitive information in POST requests, and has mechanisms in place for data exfiltration.
http://blog.spiderlabs.com/2013/12/the-curious-case-of-the-malicious-iis-module.html
CyanogenMod to have built in text message encryption system
People are now more concerned regarding their privacy after discovering about efforts made by governments to spy on their communications. The most practical solution to keep messages, emails and calls secure is to use a cryptographic encryption mechanism. However, just like the name of the method, the installation process is complex for most users. To solve this, CyanogenMod will come equipped with built in encryption system for text messages.
http://www.muktware.com/2013/12/cyanogenmod-built-text-message-encryption-system/17305
Phantom menace? A guide to APTs - and why most of us have little to fear from these 'cyberweapons'
APTs - or Advanced Persistent Threats - are the most menacing cyber attack there is, some say. Orchestrated by teams of hundreds of experts, they penetrate systems so deeply that they can remain for years, stealing secrets by the terabyte.
http://www.welivesecurity.com/2013/12/09/phantom-menace-a-guide-to-apts-and-why-most-of-us-have-little-to-fear-from-these-cyberweapons/
New security features added to Microsoft accounts
We´re excited to announce that over the next couple of days we´re rolling out a few new capabilities - based on your ongoing feedback - that give you more visibility and control of your Microsoft account.
http://blogs.technet.com/b/microsoft_blog/archive/2013/12/09/new-security-features-added-to-microsoft-accounts.aspx?Redirected=true
Analysis: Kaspersky Security Bulletin 2013. Overall statistics for 2013
This section of the report forms part of the Kaspersky Security Bulletin 2013 and is based on data obtained and processed using Kaspersky Security Network. KSN integrates cloud-based technologies into personal and corporate products, and is one of Kaspersky Lab´s most important innovations.
http://www.securelist.com/en/analysis/204792318/Kaspersky_Security_Bulletin_2013_Overall_statistics_for_2013
November 2013 virus activity review from Doctor Web
December 2, 2013 Virus analysts at the Russian anti-virus company Doctor Web discovered and examined quite a variety of information security threats in November 2013. In particular, a Trojan targeting SAP business software and malware that generates fake search results on Windows machines were added to the Dr.Web virus database at the beginning of the month.
http://news.drweb.com/show/?i=4122&lng=en&c=9
DSA-2812 samba
http://www.debian.org/security/2013/dsa-2812
RSA Security Analytics Core Can Be Accessed By Remote Users
http://www.securitytracker.com/id/1029446
pam_userdb password hashes arent compared case-sensitive
http://cxsecurity.com/issue/WLB-2013120069
TYPO3-CORE-SA-2013-004: Multiple Vulnerabilities in TYPO3 CMS
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
McAfee Email Gateway 7.6 multiple vulnerabilities
http://seclists.org/fulldisclosure/2013/Dec/18