Tageszusammenfassung - 21.12.2022

End-of-Day report

Timeframe: Dienstag 20-12-2022 18:00 - Mittwoch 21-12-2022 18:00 Handler: Thomas Pribitzer Co-Handler: n/a

News

Hackers bombard PyPi platform with information-stealing malware

The PyPi python package repository is being bombarded by a wave of information-stealing malware hiding inside malicious packages uploaded to the platform to steal software developers data.

https://www.bleepingcomputer.com/news/security/hackers-bombard-pypi-platform-with-information-stealing-malware/


VirusTotal cheat sheet makes it easy to search for specific results

VirusTotal has published a cheat sheet to help researchers create queries leading to more specific results from the malware intelligence platform.

https://www.bleepingcomputer.com/news/security/virustotal-cheat-sheet-makes-it-easy-to-search-for-specific-results/


FBI warns of search engine ads pushing malware, phishing

The FBI warns that threat actors are using search engine advertisements to promote websites distributing ransomware or stealing login credentials for financial institutions and crypto exchanges.

https://www.bleepingcomputer.com/news/security/fbi-warns-of-search-engine-ads-pushing-malware-phishing/


Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT

After Microsoft announced this year that macros from the Internet will be blocked by default in Office , many threat actors have switched to different file types such as Windows Shortcut (LNK), ISO or ZIP files, to distribute their malware.

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/malicious-macros-adapt-to-use-microsoft-publisher-to-push-ekipa-rat/


Fake jQuery Domain Redirects Site Visitors to Scam Pages

A recent infection has been making its rounds across vulnerable WordPress sites, detected on over 160 websites so far at the time of writing.

https://blog.sucuri.net/2022/12/fake-jquery-domain-redirects-site-visitors-scam.html


Kindersicherungs-Apps: Smarte Kids könnten Eltern attackieren

Sicherheitsforscher haben Android-Apps untersucht, über die Eltern Internetzugriffe von Kindern einschränken können. Doch Schwachstellen weichen den Schutz auf.

https://heise.de/-7435146


Adult popunder campaign used in mainstream ad fraud scheme

Taking advantage of cost effective and high traffic adult portals, a threat actor is secretly defrauding advertisers by displaying Google ads under the disguise of an XXX page.

https://www.malwarebytes.com/blog/threat-intelligence/2022/12/adult-popunder-campaign-used-in-mainstream-ad-fraud-scheme


Meddler-in-the-Middle Phishing Attacks Explained

Meddler-in-the-Middle (MitM) phishing attacks show how threat actors find ways to get around traditional defenses and advice.

https://unit42.paloaltonetworks.com/meddler-phishing-attacks/


Godfather: A banking Trojan that is impossible to refuse

Group-IB discovers banking Trojan targeting users of more than 400 apps in 16 countries.

https://blog.group-ib.com/godfather-trojan


Didn-t Notice Your Rate Limiting: GraphQL Batching Attack

In this article, we will discuss how allowing multiple queries or requesting multiple object instances in a single network call can be abused leading to massive data leaks or Denial of Service (DoS).

https://checkmarx.com/blog/didnt-notice-your-rate-limiting-graphql-batching-attack/


A Technical Analysis of CVE-2022-22583 and CVE-2022-32800

This blog entry discusses the technical details of how we exploited CVE-2022-22583 using a different method. We also tackle the technical details of CVE-2022-32800, another SIP-bypass that we discovered more recently, in this report.

https://www.trendmicro.com/en_us/research/22/l/a-technical-analysis-of-cve-2022-22583-and-cve-2022-32800.html


Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks

In this blog entry, we discuss findings from our investigation of this ransomware and the tools that Royal ransomware actors used to carry out their attacks.

https://www.trendmicro.com/en_us/research/22/l/conti-team-one-splinter-group-resurfaces-as-royal-ransomware-wit.html

Vulnerabilities

Jetzt patchen! Attacken auf Exchange Server im ProxyNotShell-Kontext gesichtet

Sicherheitsforscher warnen vor einem neuen Exploit, der ProxyNotShell-Schutzkonzepte umgeht. Es gibt aber Sicherheitsupdates.

https://heise.de/-7434860


Security updates for Wednesday

Security updates have been issued by Debian (xorg-server), Fedora (samba, snakeyaml, thunderbird, xorg-x11-server, and xrdp), Slackware (libksba and sdl), and SUSE (cni, cni-plugins, java-1_7_1-ibm, kernel, openssl-3, and supportutils).

https://lwn.net/Articles/918313/


Passwordless Persistence and Privilege Escalation in Azure

Adversaries are always looking for stealthy means of maintaining long-term and stealthy persistence and privilege in a target environment. Certificate-Based Authentication (CBA) is an extremely attractive persistence option in Azure for three big reasons.

https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f


Installers generated by Squirrel.Windows may insecurely load Dynamic Link Libraries

https://jvn.jp/en/jp/JVN29902403/


Critical Vulnerability in Hikvision Wireless Bridges Allows CCTV Hacking

https://www.securityweek.com/critical-vulnerability-hikvision-wireless-bridges-allows-cctv-hacking


Mattermost security updates 7.5.2, 7.4.1, 7.1.5 (ESR) released

https://mattermost.com/blog/mattermost-security-updates-7-5-2-7-4-1-7-1-5-esr-released/


Rechteausweitung in Razer Synapse (SYSS-2022-047)

https://www.syss.de/pentest-blog/rechteausweitung-in-razer-synapse-syss-2022-047


IBM App Connect Enterprise and IBM Integration Bus are vulnerable to denial of service due to the package org.yaml:snakeyaml and jackson-databind

https://www.ibm.com/support/pages/node/6849213


GraphQL Denial of Service security vulnerability CVE-2022-37734

https://www.ibm.com/support/pages/node/6828663


IBM App Connect Enterprise and IBM Integration Bus are vulnerable to a remote attacker due to Node.js (CVE-2022-43548 & CVE-2022-35256)

https://www.ibm.com/support/pages/node/6849223


Security vulnerabilities have been fixed in IBM Security Verify Governance, Identity Manager virtual appliance component

https://www.ibm.com/support/pages/node/6849249


OpenSSH as used by IBM Cloud Pak for Security is vulnerable to privilege escalation (CVE-2021-41617)

https://www.ibm.com/support/pages/node/6850775