End-of-Shift report
Timeframe: Freitag 02-05-2014 18:00 − Montag 05-05-2014 18:00
Handler: Stephan Richter
Co-Handler: n/a
Lnk files in Email Malware Distribution
Recently I have noticed more use of .lnk files used in malware distribution via email. These files are Windows Shortcut files, typically used for shortcuts on your system, such as on your desktop. The use of .lnk files in emails is not new, but a recent sample caught my eye and I took a closer look. The original email, as it would appear to the recipient, looked like this, purporting to be from an individual at Automatic Data Processing, and containing what looks to be a PDF document and a ZIP
http://feedproxy.google.com/~r/SpiderlabsAnterior/~3/VEYzrNB7xos/lnk-files-in-email-malware-distribution.html
PHP Updated to Fix OpenSSL Flaws, Other Bugs
The maintainers of PHP have released two new versions of the scripting language that fix a number of bugs, including a pair of vulnerabilities related to OpenSSL. Versions 5.4.28 and 5.5.12 both contain that important patch, as well as fixes for more than a dozen other vulnerabilities. The fix for the OpenSSL flaws is in both...
http://threatpost.com/php-updated-to-fix-heartbleed-other-bugs/105867
iOS 7 Update Silently Removes Encryption For Email Attachments
An anonymous reader writes "Apple has removed encrypted email attachments from iOS 7. Apple said back in June 2010 in regards to iOS 4.0: Data protection is available for devices that offer hardware encryption, including iPhone 3GS and later, all iPad models, and iPod touch (3rd generation and later). Data protection enhances the built-in hardware encryption by protecting the hardware encryption keys with your passcode. This provides an additional layer of protection for your email
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/FyN_d8fBQgo/story01.htm
Attack Prediction: Malicious gTLD Squatting May Be The Next Big Threat
Late last year, ICANN began expanding the generic Top-Level Domains (gTLDs). In addition to the standard .COM, .ORG, and .NET TLDs, over 1,300 new names could become available in the next few years. These new gTLDs and internationalized domain names (IDNs) are awesome ideas if you think about the creativity sparked around the names one can possibly register.
http://labs.opendns.com/2014/04/23/malicious-gtld-squatting/
Spear Phishing Emails: A Psychological Tactic of Threat Actors
By exploiting network security vulnerabilities, today's generation of threat actors are able to install advanced polymorphic malware to steal data and damage reputations. But their manipulation efforts aren't limited to codes and machines - they extend to people, too.
http://www.seculert.com/blog/2014/05/spear-phishing-emails-a-psychological-tactic-of-threat-actors.html
Evolution of Encrypting Ransomware
Recently we've seen a big change in the encrypting ransomware family and we're going to shed light on some of the newest variants and the stages of evolution that have led the high profile malware to where it is today. For those that aren't aware of what encrypting ransomware is, its a cryptovirus that encrypts all your data from local hard drives, network shared drives, removable hard drives and USB. The encryption is done using an RSA -2048 asymmetric public key which makes...
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/hp9iym0nxN0/
Symantec Critical System Protection for Windows Default Policy Bypass
Revisions None Severity Symantec does not believe that this bypass represents Symantec Critical System Protection (SCSP) vulnerability. The policy bypass ...
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2014&suid=20140502_00
Bugtraq: [ANN][SECURITY] Struts 1 - CVE-2014-0114 -Mitigation Advice Available, Possible RCE Impact
http://www.securityfocus.com/archive/1/532008
Vuln: F5 Networks BIG-IQ Remote Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/67191
F5 BIG-IQ 4.1.0.2013.0 Password Change Exploit
Topic: F5 BIG-IQ 4.1.0.2013.0 Password Change Exploit Risk: High Text:## # This module requires Metasploit: http//metasploit.com/download # Current source:
https://github.com/rapid7/metasploit-fr...
http://cxsecurity.com/issue/WLB-2014050012
OpenSSL Null Pointer Dereference in do_ssl3_write() Lets Remote Users Deny Service
http://www.securitytracker.com/id/1030188
[webapps] - Seagate BlackArmor NAS - Multiple Vulnerabilities
http://www.exploit-db.com/exploits/33159
Vuln: WordPress NextCellent Gallery Plugin CVE-2014-3123 Multiple Cross Site Scripting Vulnerabilities
http://www.securityfocus.com/bid/67085
IBM Tivoli Netcool/Portal vulnerable to CVE-2014-0160 & CVE-2014-0076
Security vulnerabilities have been discovered in OpenSSL. CVE(s): CVE-2014-0160 and CVE-2014-0076 Affected product(s) and affected version(s): IBM Tivoli Netcool/Portal 2.1.2 Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin:
http://www-01.ibm.com/support/docview.wss?uid=swg21671783 X-Force Database:
http://xforce.iss.net/xforce/xfdb/92322 X-Force Database:
http://xforce.iss.net/xforce/xfdb/91990
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_tivoli_netcool_portal_vulnerable_to_cve_2014_0160_cve_2014_0076?lang=en_us
IBM Security Bulletin: Multiple OpenSSL vulnerabilities in Tivoli Endpoint Manager for Remote Control. (CVE-2013-4353,CVE-2013-6449)
Security vulnerabilities exist in the version of OpenSSL shipped with Tivoli Endpoint Manager for Remote Control. CVE(s): CVE-2013-4353 and CVE-2013-6449 Affected product(s) and affected version(s): Tivoli Endpoint Manager for Remote Control version 8.2.1. Refer to the following reference URLs for remediation and additional vulnerability details: Source Bulletin:
http://www.ibm.com/support/docview.wss?uid=swg21669040 X-Force Database:
http://xforce.iss.net/xforce/xfdb/90201 X-Force
https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_multiple_openssl_vulnerabilities_in_tivoli_endpoint_manager_for_remote_control_cve_2013_4353_cve_2013_6449?lang=en_us
Bugtraq: [HP security bulletins]
http://www.securityfocus.com/archive/1/532002
http://www.securityfocus.com/archive/1/532001
http://www.securityfocus.com/archive/1/532003
http://www.securityfocus.com/archive/1/532004
http://www.securityfocus.com/archive/1/532007
http://www.securityfocus.com/archive/1/532010
http://www.securityfocus.com/archive/1/532011
http://www.securityfocus.com/archive/1/532012
http://www.securityfocus.com/archive/1/532013
http://www.securityfocus.com/archive/1/532014
http://www.securityfocus.com/archive/1/532022
http://www.securityfocus.com/archive/1/532023