Tageszusammenfassung - 30.05.2022

End-of-Day report

Timeframe: Freitag 27-05-2022 18:00 - Montag 30-05-2022 18:00 Handler: Thomas Pribitzer Co-Handler: n/a


Clop ransomware gang is back, hits 21 victims in a single month

After effectively shutting down their entire operation for several months, between November and February, the Clop ransomware is now back according to NCC Group researchers.


New Windows Subsystem for Linux malware steals browser auth cookies

Hackers are showing an increased interest in the Windows Subsystem for Linux (WSL) as an attack surface as they build new malware, the more advanced samples being suitable for espionage and downloading additional malicious modules.


New GoodWill Ransomware Forces Victims to Donate Money and Clothes to the Poor

Cybersecurity researchers have disclosed a new ransomware strain called GoodWill that compels victims into donating for social causes and provide financial assistance to people in need.


Understanding CVE-2022-22972 (VMWare Workspace One Access Auth Bypass)

We-ve got a copy of the vulnerable version of VMWare Workspace One Access, and we-ve gone through the extremely boring process of setting it up (oh the joys of vulnerability research). At this stage, we want to try and narrow down exactly where this vulnerability exists in code.


Bösartige Browser-Erweiterung: ChromeLoader kommt als ISO getarnt

Eine bösartige Erweiterung kann allen Browserverkehr über unerwünschte Server leiten und so Daten abschöpfen. ChromeLoader geht dabei trickreich vor.


Probleme mit Ihrer Lebensversicherung? Vorsicht vor Beratungsleistungen von konsumentenschuetzer.com

Im Internet finden Sie die Beratungsagentur -Konsumentenschützer-, die Ihren Vertrag prüft und bei Bedarf eine Klage bei Ihrer Versicherung einbringt. Wir raten zur Vorsicht.


Microsoft findet Schwachstellen in Apps großer Mobilfunkprovider (Mai 2022)

Das Microsoft 365 Defender Research Team hat in einem mobilen Framework von mce Systems einige Schwachstellen gefunden.


Detecting BCD Changes To Inhibit System Recovery

Earlier this year, we observed a rise in malware that inhibits system recovery. This tactic is mostly used by ransomware and wiper malware. One notable example of such malware is -Hermetic wiper-. To inhibit recovery an attacker has many possibilities, one of which is changing the Boot Configuration Database (BCD).


Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices

Alien Labs has discovered that EnemyBot is expanding its capabilities, exploiting recently identified vulnerabilities (2022), and now targeting IoT devices, web servers, Android devices and content management system (CMS) servers.


GitHub RepoJacking Weakness Exploited in the Wild by Attackers

A logical flaw in GitHub allows attackers to take control over thousands of repositories, enabling the poisoning of popular open-source packages. This flaw is yet to be fixed and the steps to exploit it were recently published.



New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme, (Mon, May 30th)

It was a long weekend for many European countries and it-s an off-day in the US but we were aware of a new attack vector for Microsoft Office documents.


Zero-Day-Lücke in Microsoft Office ermöglicht Codeschmuggel

Sicherheitsforscher haben ein Word-Dokument entdeckt, das beim Öffnen Schadcode nachladen und ausführen kann. Aktuelle Software scheint davor zu schützen.


Security updates for Monday

Security updates have been issued by Debian (modsecurity-apache, pngcheck, rsyslog, and smarty3), Fedora (firefox, golang-github-opencontainers-runc, gron, kernel, kernel-headers, kernel-tools, logrotate, mingw-pcre2, and rubygem-git), Mageia (admesh, chromium-browser-stable, golang, kernel, kernel-linus, and pidgin), Red Hat (firefox, openvswitch2.13, openvswitch2.15, openvswitch2.16, rsyslog, and thunderbird), SUSE (bind, curl, opera, pcp, postgresql12, and postgresql14), [...]


Security Bulletin: PowerVC installation on RHEL is vulnerable to MariaDB with CVE-2021-46669, CVE-2022-24048, MariaDB - 219814, MariaDB - 219815, CVE-2022-24050, CVE-2022-24052


Security Bulletin: IBM Security Guardium is affected by a number of security vulnerabilities in Netty, which is used by Guardium (CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2021-37137)


Security Bulletin: IBM Security Guardium is affected by multiple vulnerabilities in Apache Thrift


Security Bulletin: A vulnerability exists in golang x/crypto (CVE-2020-9283) which is consumed by IBM CICS TX Standard


Security Bulletin: A vulnerability exists in golang x/crypto (CVE-2020-9283) which is consumed by IBM CICS TX Advanced


Security Bulletin: IBM Security Guardium is affected by FasterXML jackson-databind vulnerabilities (CVE-2020-25649, X-Force ID 217968)


Security Bulletin: Automation Assets in IBM Cloud Pak for Integration is vulnerable to remote attack due to Moment.js CVE-2022-24785


Security Bulletin: Cross-Site Request Forgery vulnerability affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) - CVE-2022-22361


Security Bulletin: IBM Security Guardium is affected by path traversal and crypto vulnerabilities (CVE-2021-29425, CVE-2021-39076)


Security Bulletin: IBM Security Guardium is affected by multiple vulnerabilities


MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service