End-of-Day report
Timeframe: Mittwoch 23-08-2023 18:00 - Donnerstag 24-08-2023 18:00
Handler: Robert Waldner
Co-Handler: Michael Schlagenhaufer
News
New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute
The SmokeLoader malware is being used to deliver a new Wi-Fi scanning malware strain called Whiffy Recon on compromised Windows machines. "The new malware strain has only one operation. Every 60 seconds it triangulates the infected systems positions by scanning nearby Wi-Fi access points as a data point for Googles geolocation API," [...]
https://thehackernews.com/2023/08/new-whiffy-recon-malware-triangulates.html
Using LLMs to reverse JavaScript variable name minification
This blog introduces a novel way to reverse minified Javascript using large language models (LLMs) like ChatGPT and llama2 while keeping the code semantically intact. The code is open source and available at Github
https://thejunkland.com/blog/using-llms-to-reverse-javascript-minification
Microsoft: Windows-Update-Vorschauen schützen vor Downfall-CPU-Lücke
Microsoft hat die Vorschauen auf die Windows-Updates im September veröffentlicht. Sie bringen Gegenmaßnahmen für die Downfall-Intel-CPU-Lücke mit.
https://heise.de/-9283485
FBI: Patches for Recent Barracuda ESG Zero-Day Ineffective
The Federal Bureau of Investigation says that the patches released for a recent Barracuda Email Security Gateway (ESG) vulnerability were not effective, advising organizations to -remove all ESG appliances immediately-.
https://www.securityweek.com/fbi-patches-for-recent-barracuda-esg-zero-day-ineffective/
Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
This is the third documented campaign attributed to this actor in less than a year, with the actor reusing the same infrastructure throughout these operations.
https://blog.talosintelligence.com/lazarus-quiterat/
Tunnel Warfare: Exposing DNS Tunneling Campaigns using Generative Models - CoinLoader Case Study
In this blog post, we provide a deep dive into Check Point-s ongoing use of such a model to sweep across this haystack, and routinely thwart malicious campaigns abusing the DNS protocol to communicate with C&C servers. We focus on one such campaign, of CoinLoader, and lay out its infrastructure as well as an in-depth technical analysis of its DNS tunnelling functionality.
https://research.checkpoint.com/2023/tunnel-warfare-exposing-dns-tunneling-campaigns-using-generative-models-coinloader-case-study/
Vulnerabilities
Sicherheitsupdates: DoS-Attacken auf Firewalls und Switches von Cisco möglich
Angreifer können Geräte von Cisco via DoS-Attacken lahmlegen. Der Netzwerkausrüster hat Sicherheitspatches veröffentlicht.
https://heise.de/-9283445
Security Advisories for Drupal contributed projects
* Config Pages - Moderately critical - Information Disclosure * Shorthand - Critical - Access bypass * SafeDelete - Moderately critical - Access bypass * Data field - Moderately critical - Access bypass * ACL - Critical - Arbitrary PHP code execution * Forum Access - Critical - Arbitrary PHP code execution * Flexi Access - Critical - Arbitrary PHP code execution
https://www.drupal.org/security/contrib
CVE-2023-35150: Arbitrary Code Injection in XWiki.org XWiki
[..] detail a recently patched remote code execution vulnerability in the XWiki free wiki software platform. This bug was originally discovered by Michael Hamann with public Proof-of-Concept (PoC) code provided by Manuel Leduc. Successful exploitation of this vulnerability would allow an authenticated attacker to perform an arbitrary code injection on affected systems.
https://www.zerodayinitiative.com/blog/2023/8/22/cve-2023-35150-arbitrary-code-injection-in-xwikiorg-xwiki
Security updates for Thursday
Security updates have been issued by Debian (w3m), Fedora (libqb), Mageia (docker-containerd, kernel, kernel-linus, microcode, php, redis, and samba), Oracle (kernel, kernel-container, and openssh), Scientific Linux (subscription-manager), SUSE (ca-certificates-mozilla, erlang, gawk, gstreamer-plugins-base, indent, java-1_8_0-ibm, kernel, kernel-firmware, krb5, libcares2, nodejs14, nodejs16, openssl-1_1, openssl-3, poppler, postfix, redis, webkit2gtk3, and xen), and Ubuntu (php8.1).
https://lwn.net/Articles/942654/
Synology-SA-23:12 Synology SSL VPN Client
https://www.synology.com/en-global/support/security/Synology_SA_23_12
MISP 2.4.175 released with various bugs fixed, improvements and security fixes.
https://www.misp-project.org/2023/08/24/MISP.2.4.175.released.html/
-OPTO 22 SNAP PAC S1
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02
-CODESYS Development System
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-03
CODESYS Development System
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-04
CODESYS Development System
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-05
-Rockwell Automation Input/Output Modules
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-06
KNX Protocol
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-01
Multiple Vulnerabilities in IBM Java SDK affect IBM WebSphere Application Server and IBM WebSphere Application Server Liberty due to July 2023 CPU
https://www.ibm.com/support/pages/node/7028350
IBM Security Guardium is affected by multiple vulnerabilities
https://www.ibm.com/support/pages/node/7028511
IBM Security Guardium is affected by multiple vulnerabilities (CVE-2023-30435, CVE-2023-30436, CVE-2023-30437)
https://www.ibm.com/support/pages/node/7028506
IBM Security Guardium is affected by an Improper Restriction of Excessive Authentication Attempts vulnerability (CVE-2022-43904)
https://www.ibm.com/support/pages/node/7028509
IBM Security Guardium is affected by an SQL Injection vulnerability (CVE-2023-33852)
https://www.ibm.com/support/pages/node/7028514
IBM Security Verify Access OpenID Connect Provider container has fixed multiple vulnerabilities (CVE-2022-43868, CVE-2022-43739, CVE-2022-43740)
https://www.ibm.com/support/pages/node/7028513
AIX is affected by security restrictions bypass (CVE-2023-24329) due to Python
https://www.ibm.com/support/pages/node/7028095
IBM Elastic Storage System is affected by a vulnerability in OpenSSL (CVE-2022-4304)
https://www.ibm.com/support/pages/node/7028709
IBM Data Risk Manager is affected by multiple vulnerabilities
https://www.ibm.com/support/pages/node/7028713
IBM App Connect Enterprise Certified Container DesignerAuthoring operands are vulnerable to loss of confidentiality due to [CVE-2023-26268]
https://www.ibm.com/support/pages/node/7028728
IBM App Connect Enterprise Certified Container operands that use the Box or Snowflake connectors are vulnerable to arbitrary code execution due to [CVE-2023-37466], [CVE-2023-37903]
https://www.ibm.com/support/pages/node/7028727