Tageszusammenfassung - Montag 1-12-2014

End-of-Shift report

Timeframe: Freitag 28-11-2014 18:00 − Montag 01-12-2014 18:00 Handler: Stephan Richter Co-Handler: n/a

[Update] (Keine) Sicherheitsheitslücke in Ciscos H.264-Modul für Firefox

Cisco hat eine Sicherheitswarnung wegen seines jüngst für Firefox bereitgestellten Video-Codecs herausgegeben. [update]Allerdings soll dies nicht die im aktuellen Webbrowser verwendete Version betreffen.[/update]

http://www.heise.de/security/meldung/Update-Keine-Sicherheitsheitsluecke-in-Ciscos-H-264-Modul-fuer-Firefox-2468153.html


EVIL researchers dupe EVERY 32 bit GPG print

Keys fall in four seconds Researchers have found collision attacks for 32 bit GPG keys leaving the superseded technology well and truly dead.

http://go.theregister.com/feed/www.theregister.co.uk/2014/12/01/evil_researchers_dupe_every_32bit_gpg_print/


Critical denial of service vulnerability in OpenVPN servers

A critical denial of service security vulnerability affecting OpenVPN servers was recently brought to our attention. A fixed version of OpenVPN (2.3.6) will be released today/tomorrow (1st Dec 2014) at around 18:00 UTC.

https://forums.openvpn.net/topic17625.html


FIN4: Stealing Insider Information for an Advantage in Stock Trading?

FireEye tracks a threat group that we call “FIN4,” whose intrusions seem to have a different objective: to obtain an edge in stock trading. FIN4 appears to conduct intrusions that are focused on a single objective: obtaining access to insider information capable of making or breaking the stock prices of public companies. The group specifically targets the emails of C-level executives, legal counsel, regulatory, risk, and compliance personnel, and other individuals who would regularly discuss confidential, market-moving information.

https://www.fireeye.com/blog/threat-research/2014/11/fin4_stealing_insid.html


ENISA survey: New Directions in securing personal Data

Under the growing interest in the areas of personal data protection and cryptography, ENISA has launched a project with the objective to detect the existing technological gaps in the fields.

http://www.enisa.europa.eu/media/news-items/enisa-survey-new-directions-in-securing-personal-data


Flushing out the Crypto Rats - Finding "Bad Encryption" on your Network, (Mon, Dec 1st)

Just when folks get around to implementing SSL, we need to retire SSL! Not a week goes buy that a client isnt asking me about SSL (or more usually TLS) vulnerabilities or finding issue son their network. In a recent case, my client had just finished a datacenter / PCI audit, and had one of his servers come up as using SSL 2.0, which of course has been deprecated since 1996 - the auditors recommendation was to update to SSL 3.0 (bad recommendation, keep reading on). When he then updated to SSL...

https://isc.sans.edu/diary.html?storyid=19009&rss


AGbot DDoS Attacks Internet VNC Servers

Last week, our FortiGuard Labs Threat Intelligence system was able to capture a DDoS attack targeting internet VNC servers. The attack was raised by a brand new IrcBot, which we are detecting as W32/AGbot.AB!tr. Let's now dig into the details of this attack.

http://blog.fortinet.com/post/agbot-ddos-attacks-internet-vnc-servers


Researchers identify POS malware targeting ticket machines, electronic kiosks

Electronic kiosks and ticketing systems are being targeted by a new type of point-of-sale (POS) threat known as "d4re|dev1|," which acts as an advanced backdoor with remote administration and has RAM scraping and keylogging features, according to IntelCrawler.

http://www.scmagazine.com/researchers-identify-pos-malware-targeting-ticket-machines-electronic-kiosks/article/385558/


Early version of new POS malware family spotted

A security researcher came across what appears to be a new family of point-of-sale malware that few antivirus programs were detecting. Nick Hoffman, a reverse engineer, wrote the Getmypass malware shares traits that are similar to other so-called RAM scrapers, which collect unencrypted payment card data held in a payment system's memory.

http://www.cio.com/article/2853274/early-version-of-new-pos-malware-family-spotted.html


Sandbox Escape Bug in Adobe Reader Disclosed

Details and exploit code for a vulnerability in Adobe Reader have surfaced and the bug can be used to break out of the Reader sandbox and execute arbitrary code. The bug was discovered earlier this year by a member of Google's Project Zero and reported to Adobe, which made a change to Reader that made it...

http://threatpost.com/sandbox-escape-bug-in-adobe-reader-disclosed/109637


Using Shodan from the Command-Line

Have you ever needed to write a quick script to download data from Shodan? Or setup a cronjob to check what Shodan found on your network recently? How about getting a list of IPs out of the Shodan API? For the times where you'd like to have easy script-friendly access to Shodan there's now a new command-line tool appropriately called shodan.

http://shodanio.wordpress.com/2014/12/01/using-shodan-from-the-command-line/


l+f: Türsteuerung mit Hintertür

Beim Türsteuerungsmodul Entrypass N5200 ist der Name Programm: Rein kommt jeder - zumindest wenn er nicht durch die Tür sondern übers Netz kommt.

http://www.heise.de/security/meldung/l-f-Tuersteuerung-mit-Hintertuer-2470024.html


Dridex Phishing Campaign uses Malicious Word Documents, (Mon, Dec 1st)

This is a guest diary submitted by Brad Duncan. During the past few months, Botnet-based campaigns have sent waves of phishing emails associated with Dridex. Today, well examine a wave that occurred approximately 3 weeks ago. The emails contained malicious Word documents, and with macros enabled, these documents infected Windows computers with Dridex malware. Various people have posted about Dridex [1] [2], and some sites like Dynamoos blog [3] and TechHelpList [4] often report on these and

https://isc.sans.edu/diary.html?storyid=19011&rss


Malware: Gefälschte Telekom-Rechnungen mit vollständigen Kundennamen

Die seit November 2014 kursierenden Mails mit Malware in Form von Dateianhängen an vermeintlichen Rechnungen der Telekom haben eine neue Qualität erreicht. Die Empfänger werden darin nun mit ihrem Vor- und Nachnamen angesprochen.

http://www.golem.de/news/malware-gefaelschte-telekom-rechnungen-mit-vollstaendigen-kundennamen-1412-110884-rss.html


Clubbing Seals - Exploring the Ecosystem of Third-party Security Seals

Is this website secure? Well, it just contains statically generated content and holds no personal information, so most likely it is. But how would you be able to tell whether it actually is secure? This problem is exactly what security seal providers are trying to tackle. These seal providers offer a service which allows website owners to show their customers that their website is secure, and therefore safe to use. This works as follows:...

https://vagosec.org/2014/11/clubbing-seals/


Raiffeisen warnt vor Trojaner beim Online-Banking

Keine "Test-Überweisungen" durchführen

http://derstandard.at/2000008856256


DSA-3081 libvncserver

security update

http://www.debian.org/security/2014/dsa-3081


DSA-3080 openjdk-7

security update

http://www.debian.org/security/2014/dsa-3080


DSA-3083 mutt

security update

http://www.debian.org/security/2014/dsa-3083


DSA-3082 flac

security update

http://www.debian.org/security/2014/dsa-3082


Security Notice-Statement on Multiple Vulnerabilities in Huawei P2 Smartphone

Nov 29, 2014 17:47

http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/hw-400614.htm


Vuln: LibYAML and Perl YAML-LibYAML Module scanner.c Remote Denial of Service Vulnerability

http://www.securityfocus.com/bid/71349


Bugtraq: CVE-2014-3809: Reflected XSS in Alcatel Lucent 1830 PSS-32/16/4

http://www.securityfocus.com/archive/1/534124