Tageszusammenfassung - 25.05.2021

End-of-Day report

Timeframe: Freitag 21-05-2021 18:00 - Dienstag 25-05-2021 18:00 Handler: Dimitri Robl Co-Handler: Stephan Richter

News

Vorsicht bei SMS-Benachrichtigungen zum Lieferstatus einer Bestellung

Sie erwarten ein Paket? Dann sollten Sie besonders vorsichtig sein, wenn Sie per SMS, Informationen über den Status Ihrer Bestellung erhalten, denn Kriminelle versenden momentan massenhaft gefälschte Lieferbenachrichtigungen. Um Details zu erfahren, werden Sie aufgefordert auf einen Link zu klicken. Tun Sie das keinesfalls, [...]

https://www.watchlist-internet.at/news/vorsicht-bei-sms-benachrichtigungen-zum-lieferstatus-einer-bestellung/


Jetzt patchen! Kritische Windows-Lücke betrifft mehr Systeme als gedacht

Ein Sicherheitsforscher hat eine weitere verwundbare Komponente in Windows-Systemen entdeckt. Updates sind bereits verfügbar.

https://heise.de/-6052749


Qnap sichert NAS spät gegen Qlocker-Attacken ab

Seit April hat es ein Erpressungstrojaner auf Netzwerkspeicher von Qnap abgesehen. Erst jetzt gibt es Sicherheitspatches.

https://heise.de/-6052783


Evolution of JSWorm ransomware

There are times when a single ransomware family has evolved from a mass-scale operation to a highly targeted threat - all in the span of two years. In this post we want to talk about one of those families, named JSWorm.

https://securelist.com/evolution-of-jsworm-ransomware/102428/


"Serverless" Phishing Campaign, (Sat, May 22nd)

The Internet is full of code snippets and free resources that you can embed in your projects. SmtpJS is one of those small projects that are very interesting for developers but also bad guys. It's the first time that I spot a phishing campaign that uses this piece of JavaScript code.

https://isc.sans.edu/diary/rss/27446


Video: Making Sense Of Encrypted Cobalt Strike Traffic, (Sun, May 23rd)

Brad posted another malware analysis with capture file of Cobalt Strike traffic.

https://isc.sans.edu/diary/rss/27448


Web Applications and Internal Penetration Tests

Until recently, I really didnt care about web applications on an internal penetration test. Whether it was as an entry point or target, I was not interested, since I typically had far better targets and could compromise the networks anyway. However, the times have changed, internal environments are much more restricted, not many services are exposed, and applications are the main reason for the tests. This is not supposed to be a guide to analyze web applications, but some thoughts [...]

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/web-applications-and-internal-penetration-tests/


Apple- Issues Patches to Combat Ongoing 0-Day Attacks on macOS, tvOS

Apple on Monday rolled out security updates for iOS, macOS, tvOS, watchOS, and Safari web browser to fix multiple vulnerabilities, including an actively exploited zero-day flaw in macOS Big Sur and expand patches for two previously disclosed zero-day flaws. Tracked as CVE-2021-30713, the zero-day concerns a permissions issue in Apples Transparency, Consent, and Control (TCC) framework in macOS

https://thehackernews.com/2021/05/apple-issues-patches-to-combat-ongoing.html


OT Systems Increasingly Targeted by Unsophisticated Hackers: Mandiant

Unsophisticated threat actors - in many cases motivated by financial gain - have increasingly targeted internet-exposed operational technology (OT) systems, according to research conducted by Mandiant, FireEye-s threat intelligence and incident response unit.

https://www.securityweek.com/ot-systems-increasingly-targeted-unsophisticated-hackers-mandiant


DarkChronicles: the consequences of the Colonial Pipeline attack

This article began as an overview of the Colonial Pipeline incident. However, the events unfolded so rapidly that the scope of the publication has gone beyond a single incident.

https://ics-cert.kaspersky.com/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/

Vulnerabilities

VU#799380: Devices supporting Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure

Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing.

https://kb.cert.org/vuls/id/799380


VU#667933: Pulse Connect Secure Samba buffer overflow

Pulse Connect Secure (PCS) gateway contains a buffer overflow vulnerability in Samba-related code that may allow an authenticated remote attacker to execute arbitrary code.

https://kb.cert.org/vuls/id/667933


Trend Micro: Home Network Security Station gegen drei Schwachstellen abgesichert

Ein Firmware-Update schützt Home Network Security Stations vor Angriffsmöglichkeiten, von denen zwei, obwohl nur lokal ausnutzbar, hohe Risiken bergen sollen.

https://heise.de/-6053146


Security updates for Monday

Security updates have been issued by Debian (libx11, prosody, and ring), Fedora (ceph, glibc, kernel, libxml2, python-pip, slurm, and tpm2-tss), Mageia (bind, libx11, mediawiki, openjpeg2, postgresql, and thunderbird), openSUSE (Botan, cacti, cacti-spine, chromium, djvulibre, fribidi, graphviz, java-1_8_0-openj9, kernel, libass, libxml2, lz4, and python-httplib2), and Slackware (expat).

https://lwn.net/Articles/857132/


Security updates for Tuesday

Security updates have been issued by Fedora (python-eventlet), openSUSE (grub2 and mpv), and Red Hat (kpatch-patch and rh-ruby25-ruby).

https://lwn.net/Articles/857212/


[20210503] - Core - CSRF in data download endpoints

https://developer.joomla.org:443/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html


[20210502] - Core - CSRF in AJAX reordering endpoint

https://developer.joomla.org:443/security-centre/853-20210502-core-csrf-in-ajax-reordering-endpoint.html


[20210501] - Core - Adding HTML to the executable block list of MediaHelper::canUpload

https://developer.joomla.org:443/security-centre/852-20210501-core-adding-html-to-the-executable-block-list-of-mediahelper-canupload.html


Pulse Secure VPNs Get Quick Fix for Critical RCE

https://threatpost.com/pulse-secure-vpns-critical-rce/166437/


IBM Security Bulletins

https://www.ibm.com/blogs/psirt/


NGINX Controller vulnerability CVE-2021-23018

https://support.f5.com/csp/article/K97002210


NGINX Controller vulnerability CVE-2021-23021

https://support.f5.com/csp/article/K36926027


NGINX Controller vulnerability CVE-2021-23020

https://support.f5.com/csp/article/K45263486


SYSS-2021-010: Path Traversal in LANCOM R&S Unified Firewalls

https://www.syss.de/pentest-blog/syss-2021-010-path-traversal-in-lancom-rs-unified-firewalls