Tageszusammenfassung - 06.12.2021

End-of-Day report

Timeframe: Freitag 03-12-2021 18:00 - Montag 06-12-2021 18:00 Handler: Thomas Pribitzer Co-Handler: Robert Waldner

News

Is My Site Hacked? 4 Gut Checks

Today, we-re looking at 4 quick gut check tests you can do to get the answer to the question, -is my site hacked?-

https://blog.sucuri.net/2021/12/is-my-site-hacked-4-gut-checks.html


Warning: Yet Another Zoho ManageEngine Product Found Under Active Attacks

Enterprise software provider Zoho on Friday warned that a newly patched critical flaw in its Desktop Central and Desktop Central MSP is being actively exploited by malicious actors, marking the third security vulnerability in its products to be abused in the wild in a span of four months. The issue, assigned the identifier CVE-2021-44515, is an authentication bypass vulnerability ...

https://thehackernews.com/2021/12/warning-yet-another-zoho-manageengine.html


Malicious KMSPico Windows Activator Stealing Users Cryptocurrency Wallets

Users looking to activate Windows without using a digital license or a product key are being targeted by tainted installers to deploy malware designed to plunder credentials and other information in cryptocurrency wallets. The malware, dubbed "CryptBot," is an information stealer capable of obtaining credentials for browsers, cryptocurrency wallets, browser cookies, credit cards, and capturing screenshots from the infected systems.

https://thehackernews.com/2021/12/malicious-kmspico-windows-activator.html


The Importance of Out-of-Band Networks

Out-of-band (or "OoB") networks are usually dedicated to management tasks. Many security appliances and servers have dedicated management interfaces that are used to set up, control, and monitor the device. A best practice is to connect those management interfaces to a dedicated network that is not directly connected to the network used to carry applications/users data.

https://isc.sans.edu/diary/rss/28102


Who Is the Network Access Broker -Babam-?

Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing remote access credentials -- such as usernames and passwords needed to remotely connect to the targets network. In this post well look at the clues left behind by "Babam," the handle chosen by a cybercriminal who has sold such access to ransomware groups on many occasions ...

https://krebsonsecurity.com/2021/12/who-is-the-network-access-broker-babam/


Emotet-s back and it isn-t wasting any time

Last month we reported on how another notorious bit of malware, TrickBot, was helping Emotet come back from the dead. And then yesterday, several security researchers saw another huge spike in Emotet-s activity.

https://blog.malwarebytes.com/trojans/2021/12/emotets-back-and-it-isnt-wasting-any-time/

Vulnerabilities

Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: - Execute code on the affected device or cause it to reload unexpectedly - Cause LLDP database corruption on the affected device

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T


IBM Security Bulletins 2021-12-03

IBM Event Streams, IBM Cloud Automation Manager, IBM Data Studio Client, EDB PostreSQL with IBM, EDB Postgres Advanced Server with IBM, IBM Data Management Platform (Enterprise, Standard), IBM QRadar SIEM

https://www.ibm.com/blogs/psirt/


Security updates for Monday

Security updates have been issued by Arch Linux (isync, lib32-nss, nss, opera, and vivaldi), Debian (gerbv and xen), Fedora (autotrace, chafa, converseen, digikam, dmtx-utils, dvdauthor, eom, kxstitch, libsndfile, nss, pfstools, php-pecl-imagick, psiconv, q, R-magick, rss-glx, rubygem-rmagick, seamonkey, skopeo, synfig, synfigstudio, vdr-scraper2vdr, vdr-skinelchihd, vdr-skinnopacity, vdr-tvguide, vim, vips, and WindowMaker), Mageia (golang, kernel, kernel-linus, mariadb, and vim), openSUSE (aaa_base, python-Pygments, singularity, and tor), Red Hat (nss), Slackware (mozilla), SUSE (aaa_base, kernel, openssh, php74, and xen), and Ubuntu (libmodbus, lrzip, samba, and uriparser).

https://lwn.net/Articles/877821/


ABB Cyber Security Advisory: OmniCore RobotWare Missing Authentication Vulnerability CVE ID: CVE-2021-22279

https://search.abb.com/library/Download.aspx?DocumentID=SI20265&LanguageCode=en&DocumentPartId=&Action=Launch


F5 K50839343: NGINX ModSecurity WAF vulnerability CVE-2021-42717

https://support.f5.com/csp/article/K50839343


F5 K12705583: OpenSSH vulnerability CVE-2021-41617

https://support.f5.com/csp/article/K12705583


Auerswald COMpact Multiple Backdoors

https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/


Auerswald COMpact Arbitrary File Disclosure

https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-006/


Auerswald COMpact Privilege Escalation

https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-005/


Auerswald COMfortel 1400/2600/3600 IP Authentication Bypass

https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/