Tageszusammenfassung - 25.04.2022

End-of-Day report

Timeframe: Freitag 22-04-2022 18:00 - Montag 25-04-2022 18:00 Handler: Thomas Pribitzer Co-Handler: Stephan Richter


Einbruch in kritische Infrastrukturen: Experten zeigen, wie einfach es ist

Niederländische Forscher haben beim Hackerwettbewerb Pwn2Own demonstriert, wie leicht sich Industriesoftware übernehmen lässt, die zentrale Dienste steuert.


Netzwerkspeicher: Apple-Protokolle reißen Sicherheitslücken in Qnap-NAS

Die Unterstützung von Apples Netzwerkprotokollen durch netatalk in Qnap-NAS-Systemen bringt teils kritische Sicherheitslücken mit. Erste Updates stehen bereit.


Hacker-Gruppe Lapsus$ soll Sourcecode von T-Mobile kopiert haben

Angreifer sind mit erbeuteten Zugangsdaten in Computer-Systeme von T-Mobile eingebrochen. Kundendaten sollen nicht betroffen sein.


Fake-E-Mail von Spotify: Kriminelle versuchen Ihr Konto zu übernehmen

Kriminelle versenden momentan gefälschte Spotify-E-Mails, um Ihr Konto zu übernehmen und Kreditkartendaten zu stehlen. Nutzer:innen erhalten vom Absender -Spotify-Rechnung- ein Schreiben, in dem ein Problem mit Ihrer Zahlung vorgetäuscht wird. Im E-Mail werden Sie gebeten, auf einen Button zu klicken. Dieser führt dann auf eine gefälschte Spotify-Login-Seite. Daten, die dort eingetippt werden, landen direkt bei Kriminellen.


New powerful Prynt Stealer malware sells for just $100 per month

Threat analysts have spotted yet another addition to the growing space of info-stealer malware infections, named Prynt Stealer, which offers powerful capabilities and extra keylogger and clipper modules.


DDoS attacks in Q1 2022

Against the backdrop of the conflict between Russia and Ukraine, the number of DDoS attacks in Q1 2022 increased by 4.5 times against Q1 2021. A significant proportion of them were by hacktivists.


Are Roku Streaming Devices Safe from Exploitation?, (Sat, Apr 23rd)

I have noticed in the past several weeks random scans specifically for Roku streaming devices (and likely other types) captured by my honeypot. If they can be compromised, what can be gain? Settings like stored payment information, personal information (email/password), subscription, App selected, etc. Like any other devices, it is important to keep the OS and Apps up-to-date.


Simple PDF Linking to Malicious Content, (Mon, Apr 25th)

Last week, I found an interesting piece of phishing based on a PDF file. Today, most of the PDF files that are delivered to end-user are not malicious, I mean that they dont contain an exploit to trigger a vulnerability and infect the victims computer. They are just used as a transport mechanism to deliver more malicious content. Yesterday, Didier analyzed the same kind of Word document[1]. They are more and more common because they are (usually) not blocked by common filters at the perimeter.


Researcher Releases PoC for Recent Java Cryptographic Vulnerability

A proof-of-concept (PoC) code demonstrating a newly disclosed digital signature bypass vulnerability in Java has been shared online. The high-severity flaw in question, CVE-2022-21449 (CVSS score: 7.5), impacts the following versions of Java SE and Oracle GraalVM Enterprise Edition - [...]


Defeating BazarLoader Anti-Analysis Techniques

Anti-analysis techniques make it harder for malware analysts to do their work. We cover BazarLoader anti-analysis techniques and how to defeat them.


Webcam hacking: How to know if someone may be spying on you through your webcam

Camfecting doesn-t -just- invade your privacy - it could seriously impact your mental health and wellbeing. Here-s how to keep an eye on your laptop camera.


Quantum Ransomware

In one of the fastest ransomware cases we have observed, in under four hours the threat actors went from initial access, to domain wide ransomware. The initial access vector for [...]


FBI Releases IOCs Associated with BlackCat/ALPHV Ransomware

The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with attacks involving BlackCat/ALPHV, a Ransomware-as-a-Service that has compromised at least 60 entities worldwide. CISA encourages users and administrators to review the IOCs and technical details in FBI Flash CU-000167-MW and apply the recommended mitigations.


Malware analysis report on SparrowDoor malware

A technical analysis of a new variant of the SparrowDoor malware.



Critical Bug in Everscale Wallet Couldve Let Attackers Steal Cryptocurrencies

A security vulnerability has been disclosed in the web version of the Ever Surf wallet that, if successfully weaponized, could allow an attacker to gain full control over a victims wallet.


IBM Security Bulletins 2022-04-22

IBM Cloud Private, IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data, IBM Sterling File Gateway, IBM Watson Explorer, IBM Planning Analytics, IBM App Connect Enterprise


IBM schließt kritische Sicherheitslücken in Cognos Analytics

In der Business-Intelligence-Software IBM Cognos Analytics könnten Angreifer unter anderem Schadcode einschleusen. Aktualisierte Software behebt die Probleme.


Sicherheitsupdates Atlassian Jira: Angreifer könnten Authentifizierung umgehen

Die Entwickler haben eine kritische Sicherheitslücke im Projektmanagement-Tool Jira geschlossen.


Security updates for Monday

Security updates have been issued by Fedora (kernel, kernel-headers, kernel-tools, libinput, podman-tui, and vim), Mageia (git, gzip/xz, libdxfrw, libinput, librecad, and openscad), and SUSE (dnsmasq, git, libinput, libslirp, libxml2, netty, podofo, SDL, SDL2, and tomcat).


Opportunistic Exploitation of WSO2 CVE-2022-29464

On April 18, 2022, MITRE published CVE-2022-29464, an unrestricted file upload vulnerability affecting various WSO2 products.


FreeRADIUS: Mehrere Schwachstellen


Multiple Vulnerabilities in Netatalk