End-of-Day report
Timeframe: Montag 14-10-2019 18:00 - Dienstag 15-10-2019 18:00
Handler: Stephan Richter
Co-Handler: n/a
News
Cyberangriffe: Attribution ist wie ein Indizienprozess
Russland hat den Bundestag gehackt! China wollte die Bayer AG ausspionieren! Bei großen Hackerangriffen ist oft der Fingerzeig auf den mutmaßlichen Täter nicht weit. Knallharte Beweise dafür gibt es selten, Hinweise sind aber kaum zu vermeiden.
https://www.golem.de/news/cyberangriffe-attribution-ist-wie-ein-indizienprozess-1910-143527-rss.html
Update now! Windows users targeted by iTunes Software Updater zero-day
The flaw is a rare -unquoted path class- described as "so thoroughly documented that you would expect programmers to be well aware..." But thats not the case.
https://nakedsecurity.sophos.com/2019/10/15/update-now-windows-users-targeted-by-itunes-software-updater-zero-day/
Top 10 Website Hardening Tips
Website hardening means adding layers of protection to reduce the risk of website attacks, a process known as -defense in depth.- Here are our top 10 virtual hardening principles: [...]
https://blog.sucuri.net/2019/10/top-10-website-hardening-tips.html
Threat Actor Profile: TA407, the Silent Librarian
[...] Since our blog post, colleagues at Secureworks have provided further details on one actor we highlighted, tracked by Proofpoint as TA407, also known as Silent Librarian, Cobalt Dickens, and Mabna Institute. In this blog, we provide additional insight into the actor and their evolving TTPs in ongoing, academia-focused campaigns.
https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta407-silent-librarian
Europol: Ransomware remains top threat in IOCTA report
The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report. We highlight their key findings and remind readers how to better protect themselves.
https://blog.malwarebytes.com/awareness/2019/10/europol-ransomware-remains-top-threat-in-iocta-report/
Researchers Find New Backdoor Used by Winnti Hackers
ESET security researchers were able to identify a new backdoor associated with the threat actor known as the Winnti Group.
https://www.securityweek.com/researchers-find-new-backdoor-used-winnti-hackers
SMS von -InfoSMS- führt in Abo-Falle
Aktuell sind vermehrt betrügerische SMS vom Absender -InfoSMS- im Umlauf. In der SMS heißt es, dass der Besitzer der Handynummer gesucht wird. Für nähere Informationen werden Sie aufgefordert, einem Link zu folgen. Sie landen dann auf einer gefälschten Media Markt Seite, wo ein angeblicher Gewinn auf Sie wartet. Sie werden Ihren Gewinn jedoch nie erhalten, es handelt sich um eine Abo-Falle.
https://www.watchlist-internet.at/news/sms-von-infosms-fuehrt-in-abo-falle/
Vulnerabilities
Security Bulletins Posted
Adobe has published security bulletins for Adobe Experience Manager (APSB19-48), Adobe Acrobat and Reader (APSB19-49), Adobe Experience Manager Forms (APSB19-50) and Adobe Download Manager (APSB19-51). Adobe recommends users update their product installations to the latest versions using the instructions referenced in the bulletin. This posting is provided -AS IS- with no warranties and confers no rights.
https://blogs.adobe.com/psirt/?p=1795
Security updates for Tuesday
Security updates have been issued by Debian (sudo and xtrlock), openSUSE (sudo), Red Hat (Single Sign-On), Slackware (sudo), SUSE (binutils, dhcp, ffmpeg, kernel, kubernetes-salt, sudo, and tcpdump), and Ubuntu (sudo).
https://lwn.net/Articles/802328/
PHOENIX CONTACT Security Advisory for Automation Worx Software Suite
Phoenix Contact Automationworx Suite: *.bcp-file Memory Corruption Remote Code Execution Vulnerability and *.mwt-file Out-OfBounds Read Remote Code Execution Vulnerability
https://cert.vde.com/de-de/advisories/vde-2019-016
sudo: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten
http://www.cert-bund.de/advisoryshort/CB-K19-0902
WordPress: Mehrere Schwachstellen
http://www.cert-bund.de/advisoryshort/CB-K19-0903
IBM Security Bulletin: Multiple Vulnerabilities in IBM Java Runtime affect IBM Cloud Private
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-multiple-vulnerabilities-in-ibm-java-runtime-affect-ibm-cloud-private/
IBM Security Bulletin: IBM Security Guardium is affected by an Oracle MySQL vulnerabilities
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium-is-affected-by-an-oracle-mysql-vulnerabilities/
IBM Security Bulletin: IBM MQ Appliance is affected by kernel vulnerabilities (CVE-2019-11479, CVE-2019-11478 and CVE-2019-11477)
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-mq-appliance-is-affected-by-kernel-vulnerabilities-cve-2019-11479-cve-2019-11478-and-cve-2019-11477/
IBM Security Bulletin: IBM Security Guardium Big Data Intelligence is affected by a Using Components with Known Vulnerabilities vulnerability
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-security-guardium-big-data-intelligence-is-affected-by-a-using-components-with-known-vulnerabilities-vulnerability/
IBM Security Bulletin: Vulnerability CVE-2019-4031 affects IBM Workload Scheduler
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-vulnerability-cve-2019-4031-affects-ibm-workload-scheduler/
TYPO3-EXT-SA-2019-018: Remote Code Execution in extension "freeCap CAPTCHA" (sr_freecap)
https://typo3.org/security/advisory/typo3-ext-sa-2019-018/
TYPO3-EXT-SA-2019-017: Multiple vulnerabilities in extension "SLUB: Event Registration" (slub_events)
https://typo3.org/security/advisory/typo3-ext-sa-2019-017/
TYPO3-EXT-SA-2019-016: Information Disclosure in extension "Direct Mail" (direct_mail)
https://typo3.org/security/advisory/typo3-ext-sa-2019-016/
TYPO3-EXT-SA-2019-015: SQL Injection in extension "URL redirect" (url_redirect)
https://typo3.org/security/advisory/typo3-ext-sa-2019-015/
Linux kernel vulnerability CVE-2019-16714
https://support.f5.com/csp/article/K48351130?utm_source=f5support&utm_medium=RSS
OpenLDAP vulnerability CVE-2019-13565
https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS
HPESBHF03933 rev.6 - HPE Products using certain Intel Processors, Microarchitectural Data Sampling (MDS) Side Channel Vulnerabilities, Local Disclosure of Information
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03933en_us