Tageszusammenfassung - 28.10.2024

End-of-Day report

Timeframe: Freitag 25-10-2024 18:00 - Montag 28-10-2024 18:00 Handler: Michael Schlagenhaufer Co-Handler: Alexander Riepl

News

Amazon seizes domains used in rogue Remote Desktop campaign to steal data

Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to steal Windows credentials and data using malicious Remote Desktop Protocol connection files.

https://www.bleepingcomputer.com/news/security/amazon-seizes-domains-used-in-rogue-remote-desktop-campaign-to-steal-data/


Redline, Meta infostealer malware operations seized by police

The Dutch National Police seized the network infrastructure for the Redline and Meta infostealer malware operations in "Operation Magnus," warning cybercriminals that their data is now in the hands of the law enforcement.

https://www.bleepingcomputer.com/news/legal/redline-meta-infostealer-malware-operations-seized-by-police/


70 Zero-Day-Lücken ausgenutzt: Pwn2Own-Hacker knacken Samsung Galaxy S24 und mehr

Bei dem Wettbewerb wurden auch diverse Kameras, Drucker und NAS-Systeme attackiert. An ein Pixel 8 oder iPhone 15 hat sich aber niemand rangetraut.

https://www.golem.de/news/70-zero-day-luecken-ausgenutzt-pwn2own-hacker-knacken-samsung-galaxy-s24-und-mehr-2410-190238.html


The Windows Registry Adventure #4: Hives and the registry layout

To a normal user or even a Win32 application developer, the registry layout may seem simple: there are five root keys that we know from Regedit (abbreviated as HKCR, HKLM, HKCU, HKU and HKCC), and each of them contains a nested tree structure that serves a specific role in the system. But as one tries to dig deeper and understand how the registry ..

https://googleprojectzero.blogspot.com/2024/10/the-windows-registry-adventure-4-hives.html


Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties."The group is currently ..

https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html


Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.

https://www.wired.com/story/cybercriminals-disruptive-hacking-us-elections-dhs-report/


Vulnerabilities of Realtek SD card reader driver, part 1

These vulnerabilities enable non-privileged users to leak the contents of kernel pool and kernel stack, write to arbitrary kernel memory, and, the most interesting, read and write physical memory from user mode via the DMA capability of the device. The vulnerabilities have remained undisclosed for years, affecting many OEMs, including Dell, ..

https://zwclose.github.io/2024/10/14/rtsper1.html


Inside the Open Directory of the -You Dun- Threat Group

The DFIR Report-s Threat Intel Team detected an open directory in January 2024 and analyzed it for trade craft and threat actor activity. Once reviewed, we identified it was related to the Chinese speaking hacking group that call themselves -You Dun- ..

https://thedfirreport.com/2024/10/28/inside-the-open-directory-of-the-you-dun-threat-group/


Die NSA empfiehlt wöchentliches Smartphone-Reboot

Interessante Information, die mir die Woche untergekommen ist. Die US-Sicherheitsbehörde NSA (National Security Agency, Inlandsgeheimdienst) empfiehlt einmal wöchentlich sein Smartphone neu zu starten. Das ganze hat einen sicherheitstechnischen Hintergrund. Durch den Neustart soll Malware, die nicht persistent ..

https://www.borncity.com/blog/2024/10/27/die-nsa-empfiehlt-woechentliches-smartphone-reboot/


Anatomy of an LLM RCE

As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a ..

https://www.cyberark.com/resources/threat-research-blog/anatomy-of-an-llm-rce


Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives

In September 2024, Google Threat Intelligence Group (consisting of Google-s Threat Analysis Group (TAG) and Mandiant) discovered UNC5812, a suspected Russian hybrid espionage and influence operation, delivering Windows and Android malware using a Telegram persona named "Civil Defense". "Civil Defense" claims to be a provider of free ..

https://cloud.google.com/blog/topics/threat-intelligence/russian-espionage-influence-ukrainian-military-recruits-anti-mobilization-narratives/


Secure Coding: Unbefugten Zugriff durch Path Traversal (CWE-22) verhindern

CWE-22 beschreibt die unsachgemäße Veränderung eines Pfadnamens auf ein eingeschränktes Verzeichnis. Wie lässt sich die Schwachstelle in den Griff bekommen?

https://heise.de/-9982270


Black Basta-Gruppe nutzt Microsoft Teams-Chatfunktion

Die als "Black Basta" bekannte Ransomware-Gruppe hat einen neuen Mechanismus entwickelt, der die Chatfunktion von Microsoft Teams zur Kontaktaufnahme ausnutzt.

https://heise.de/-9995322


Nvidia: Rechteausweitung durch Sicherheitslücken in Grafiktreiber möglich

Nvidia warnt vor mehreren Sicherheitslücken in den Grafiktreibern, die etwa das Ausweiten der Rechte ermöglichen. Updates stehen bereit.

https://heise.de/-9995842


Lagebericht 2024: Fast 8 Millionen Mal installierte Malware in Google Play

IT-Forscher haben die mobile-Malware-Situation der vergangenen 12 Monate untersucht. Mehr als 200 App-Fälschungen lauerten in Google Play.

https://heise.de/-9996456


VMware Tanzu Spring Security: Umgehung von Autorisierungsregeln möglich

In VMware Tanzu Spring Security klafft eine kritische Sicherheitslücke, die Angreifern die Umgehung von Autorisierungsregeln ermöglicht.

https://heise.de/-9996582


Vulnerabilities

Security updates for Monday

Security updates have been issued by AlmaLinux (kernel, python3.12, and python3.9), Debian (activemq, chromium, libheif, nss, and twisted), Fedora (chromium, dnsdist, dotnet8.0, edk2, glibc, libdigidocpp, mbedtls3.6, NetworkManager-libreswan, oath-toolkit, podman-tui, prometheus-podman-exporter, python-fastapi, python-openapi-core, ..

https://lwn.net/Articles/996085/


Chatwork Desktop Application (Windows) uses a potentially dangerous function

https://jvn.jp/en/jp/JVN78335885/


K000148252: Python tarfile vulnerability CVE-2024-6232

https://my.f5.com/manage/s/article/K000148252


K000148256: libarchive vulnerability CVE-2018-1000880

https://my.f5.com/manage/s/article/K000148256