End-of-Shift report
Timeframe: Dienstag 06-12-2016 18:00 − Mittwoch 07-12-2016 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
Onlinewerbung: Forscher stoppen monatelange Malvertising-Kampagne
Über eine Malvertising-Kampagne ist in den vergangenen Monaten Schadcode verteilt worden. Die Macher des Stegano-Exploit-Kits versteckten dabei unsichtbare Pixel in Werbeanzeigen und nutzen Exploits in Flash und dem Internet Explorer.
http://www.golem.de/news/onlinewerbung-forscher-stoppen-monatelange-malvertising-kampagne-1612-124928-rss.html
Petya-Variante: Goldeneye-Ransomware verschickt überzeugende Bewerbungen
Kurz vor dem Jahresende gibt es erneut eine größere Ransomware-Kampagne in Deutschland. Kriminelle verschicken mit Goldeneye professionell aussehende Bewerbungen an Personalabteilungen - und nutzen möglicherweise Informationen des Arbeitsamtes.
http://www.golem.de/news/petya-variante-goldeneye-ransomware-verschickt-ueberzeugende-bewerbungen-1612-124940-rss.html
Kriminelle könnten Daten von Visa-Kreditkarten vergleichsweise einfach erraten
In einer Studie zeigen Sicherheitsforscher, wie sie CVV-Nummern und andere Kreditkarten-Daten in wenigen Sekunden erraten und damit anschließend Geld überweisen.
https://heise.de/-3564898
Flash Exploit Found in Seven Exploit Kits
An Adobe Flash Player vulnerability used by the Sofacy APT gang was also found in seven of the top exploit kits, according to an analysis by Recorded Future.
http://threatpost.com/flash-exploit-found-in-seven-exploit-kits/122284/
Explained: Domain Generating Algorithm
Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same domain at a given time.Categories: Security world TechnologyTags: algorithmdgadomainDomain Generating AlgorithmgeneratinggenerationPieter Arntz(Read more...)
https://blog.malwarebytes.com/security-world/2016/12/explained-domain-generating-algorithm/
Attacking NoSQL applications, (Tue, Dec 6th)
In last couple of years, the MEAN stack (MongoDB, Express.js, Angular.js and Node.js) became the stack of choice for many web application developers. The main reason for this popularity is the fact that the stack supports both client and server side programs written in JavaScript, allowing easy development. The core database used by the MEAN stack, MongoDB, is a NoSQL database program that uses JSON-like documents with dynamic schemas allowing huge flexibility. Although NoSQL databases are not...
https://isc.sans.edu/diary.html?storyid=21787&rss
MSRT December 2016 addresses Clodaconas, which serves unsolicited ads through DNS hijacking
In this month's Microsoft Malicious Software Removal Tool (MSRT) release, we continue taking down unwanted software, the pesky threats that force onto our computers things that we neither want nor need. BrowserModifier:Win32/Clodaconas, for instance, displays ads when you're browsing the internet. It modifies search results pages so that you see unsolicited ads related to your...
https://blogs.technet.microsoft.com/mmpc/2016/12/06/msrt-december-2016-addresses-clodaconas-which-serves-unsolicited-ads-through-dns-hijacking/
Unrestricted Backend Login Method Seen in OpenCart
>
From the attacker's perspective, creating ways to maintain access to a compromised website is desirable. This allows them to further distribute malware and perform different kinds of malicious activities. One of the ways attackers try to secure their access is by adding admin users, or pieces of malicious code throughout the site. This allows them to regain access easily, if needed. However, we recently found a unique way to achieve this kind of breach.
https://blog.sucuri.net/2016/12/unrestricted-backend-login.html
Crims using anti-virus exclusion lists to send malware to where it can do most damage
When vendors tell you what to whitelist, crims are reading too Advanced malware writers are using anti-virus exclusion lists to better target victims, researchers say.
http://go.theregister.com/feed/www.theregister.co.uk/2016/12/07/clever_crims_using_av_exclusion_lists_as_malware_safe_harbour/
Deep Analysis of the Online Banking Botnet TrickBot
TrickBot aims at stealing online banking information from browsers when victims are visiting online banks. The targeted banks are from Australia, New Zealand, Germany, United Kingdom, Canada, United States, Israel, and Ireland, to name a few.
http://blog.fortinet.com/2016/12/06/deep-analysis-of-the-online-banking-botnet-trickbot
Debugging war story: the mystery of NXDOMAIN
The following blog post describes a debugging adventure on Cloudflares Mesos-based cluster. This internal cluster is primarily used to process log file information so that Cloudflare customers have analytics, and for our systems that detect and respond to attacks.The problem encountered didnt have any effect on our customers,
https://blog.cloudflare.com/debugging-war-story-the-mystery-of-nxdomain/
Popular smart toys violate children's privacy rights?
My Friend Cayla and i-Que, two extremely popular "smart" toys manufactured by Los Angeles-based Genesis Toys, do not safeguard basic consumer (and children's) rights to security and privacy, researchers have found. The toys come with companion apps, and the latter use services by Nuance Communications, a company headquartered in Massachussetts that specializes in voice-and speech-recognition services for a variety of industries.
https://www.helpnetsecurity.com/2016/12/07/smart-toys-privacy-rights/
Bugtraq: [ESNC-2041217] Critical Security Vulnerability in PwC ACE Software for SAP Security
http://www.securityfocus.com/archive/1/539883
Security Advisory - Privilege Escalation Vulnerability in Some Huawei Storage Products
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-01-storage-en
Security Advisory - Dirty COW Vulnerability in Huawei Products
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-01-dirtycow-en
Security Advisory - FRP Bypass Vulnerability in Huawei Smart Phones
http://www.huawei.com/en/psirt/security-advisories/2016/huawei-sa-20161207-01-smartphone-en
Tesla Gateway ECU Vulnerability
This advisory contains mitigation details for a Gateway ECU vulnerability in Teslas Model S automobile.
https://ics-cert.us-cert.gov/advisories/ICSA-16-341-01
Locus Energy LGate Command Injection Vulnerability
This advisory contains mitigation details for a command injection vulnerability in Locus Energy's LGate application.
https://ics-cert.us-cert.gov/advisories/ICSA-16-231-01-0
F5 Security Advisories
Security Advisory: Python urllib and urllib2 library vulnerability CVE-2016-5699
https://support.f5.com:443/kb/en-us/solutions/public/k/10/sol10420455.html?ref=rss
Security Advisory: libxml2 vulnerability CVE-2016-1839
https://support.f5.com:443/kb/en-us/solutions/public/k/26/sol26422113.html?ref=rss
Security Advisory: libxml2 vulnerability CVE-2016-1840
https://support.f5.com:443/kb/en-us/solutions/public/k/14/sol14614344.html?ref=rss
Security Advisory: PHP vulnerability CVE-2016-7127
https://support.f5.com:443/kb/en-us/solutions/public/k/89/sol89002224.html?ref=rss
Security Advisory: PHP vulnerabilities CVE-2016-6288 and CVE-2016-6289
https://support.f5.com:443/kb/en-us/solutions/public/k/34/sol34985231.html?ref=rss
Security Advisory: libxml2 vulnerability CVE-2016-1838
https://support.f5.com:443/kb/en-us/solutions/public/k/71/sol71926235.html?ref=rss
Cisco Security Advisories
Cisco AnyConnect Secure Mobility Client Local Privilege Escalation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1
Cisco Web Security Appliance Drop Decrypt Policy Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa1
Cisco Web Security Appliance HTTP URL Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-wsa
Cisco Firepower Management Center Information Disclosure Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-vdc
Cisco Unified Communications Manager IM and Presence Service Information Disclosure Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ucm
Cisco Prime Collaboration Assurance Cross-Site Scripting Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-pca
Cisco Identity Services Engine Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ise1
Cisco Identity Services Engine Active Directory Integration Component Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ise
Cisco IOS XR Software Default Credentials Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-iosxr
Cisco IOS and Cisco IOS XE Software Zone-Based Firewall Feature Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-zbf
Cisco IOS XR Software HTTP 2.0 Request Handling Event Service Daemon Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xr
Cisco IOS and IOS XE Software SSH X.509 Authentication Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xe-x509
Cisco IOS Frame Forwarding Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios
Cisco Intercloud Fabric Director Static Credentials Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-icf
Cisco Hybrid Media Service Privilege Escalation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-hms
Cisco FirePOWER Malware Protection Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fpwr
Cisco Firepower Management Center and Cisco FireSIGHT System Software Malicious Software Detection Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-firepower
Cisco FireAMP Connector Endpoint Software Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-fireamp
Cisco Expressway Series Software Security Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-expressway
Cisco Email Security Appliance SMTP Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-esa1
Cisco Email Security Appliance and Web Security Appliance Content Filter Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-esa
Cisco Unified Communications Manager Unified Reporting Upload Tool Directory Traversal Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cur
Cisco Unified Communications Manager Administration Page Cross-Site Scripting Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cucm
Cisco ONS 15454 Series Multiservice Provisioning Platforms TCP Port Management Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cons
Cisco Emergency Responder Directory Traversal Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cer1
Cisco Emergency Responder Cross-Site Request Forgery Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cer
Cisco IOx Application-Hosting Framework Directory Traversal Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-caf
Cisco Security Appliances AsyncOS Software Update Server Certificate Validation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asyncos
Cisco ASR 5000 Series IKEv2 Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asr1
Cisco ASR 5000 Series IPv6 Packet Processing Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-asr
Next End-of-Shift report: 2016-12-09