End-of-Day report
Timeframe: Montag 12-02-2024 18:00 - Dienstag 13-02-2024 18:00
Handler: Thomas Pribitzer
Co-Handler: Michael Schlagenhaufer
News
The (D)Evolution of Pikabot
Pikabot is a malware loader that originally emerged in early 2023. Over the past year, ThreatLabz has been tracking the development of Pikabot and its modus operandi. There was a significant increase in usage in the second half of 2023 following the FBI-led takedown of Qakbot. This was likely the result of a BlackBasta ransomware affiliate replacing Qakbot with Pikabot for initial access. However, Pikabot ceased activity shortly after Christmas 2023, with its version number being 1.1.19 at that time. In recent campaigns, which started in February 2024, Pikabot reemerged with significant changes in its code base and structure.
https://www.zscaler.com/blogs/security-research/d-evolution-pikabot
GMX, Web.de, Online-Dienste: Angriffe auf Zugangsdaten nehmen zu
Etwas alarmistisch melden einige Medien, dass es vermehrt Angriffe auf Zugangskonten von GMX oder Web.de gebe, die unter anderem sehr populäre Webmail-Dienste bereitstellen. Es werden dort bei zahlreichen Konten sehr hohe Zahlen für fehlerhafte Log-in-Versuche angezeigt. Es handelt sich offenbar um die alltäglichen Angriffe auf Zugangsdaten von Cyberkriminellen, die versuchen, mit gestohlenen Accountinformationen auf Online-Dienste zuzugreifen.
https://www.heise.de/-9626994
Vorsicht vor gefälschten WKÖ-E-Mails
Kriminelle geben sich als Wirtschaftskammer Österreich aus und bitten Unternehmen in einem E-Mail, Kontaktdaten zu aktualisieren. Klicken Sie keinesfalls auf den Link, Sie werden auf eine gefälschte WKÖ-Seite geführt. Dort stehlen Kriminelle Firmen- und Bankdaten.
https://www.watchlist-internet.at/news/vorsicht-vor-gefaelschten-wkoe-e-mails/
Directory.ReadWrite.All Is Not As Powerful As You Might Think
Directory.ReadWrite.All is an MS Graph permission that is frequently cited as granting high amounts of privilege, even being equated to the Global Admin Entra ID role [..] Misleading or incorrect documentation create most of the misconceptions regarding this permission.
https://posts.specterops.io/directory-readwrite-all-is-not-as-powerful-as-you-might-think-c5b09a8f78a8
Ongoing Microsoft Azure account hijacking campaign targets executives
A phishing campaign detected in late November 2023 has compromised hundreds of user accounts in dozens of Microsoft Azure environments, including those of senior executives.
https://www.bleepingcomputer.com/news/security/ongoing-microsoft-azure-account-hijacking-campaign-targets-executives/
Fileless Revenge RAT Malware
AhnLab SEcurity intelligence Center (ASEC) recently discovered the distribution of Revenge RAT malware that had been developed based on legitimate tools. It appears that the attackers have used tools such as -smtp-validator- and -Email To Sms-. At the time of execution, the malware creates and runs both a legitimate tool and a malicious file, making it difficult for users to realize that a malicious activity has occurred.
https://asec.ahnlab.com/en/61584/
Vulnerabilities
Request Tracker Write-up (CVE-2023-41259, CVE-2023-41260)
Without authentication we were able to extract file-attachments that were uploaded to RT, including e-mails received from and to users regarding tickets and issues. We also found it was possible to obtain information about tickets and users.
https://www.linkedin.com/pulse/request-tracker-write-up-tom-wolters-ygsae
PowerDNS Security Advisory 2024-01: crafted DNSSEC records in a zone can lead to a denial of service in Recursor
An attacker can publish a zone that contains crafted DNSSEC related records. While validating results from queries to that zone using the RFC mandated algorithms, the Recursor-s resource usage can become so high that processing of other queries is impacted, resulting in a denial of service. Note that any resolver following the RFCs can be impacted, this is not a problem of this particular implementation.
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
DNS-Server: Bind und Unbound stolpern über Sicherheitslücke "KeyTrap"
Mit einer präparierten DNS-Anfrage können Angreifer eine hohe Prozessorlast verursachen und den Dienst für legitime Nutzer so blockieren. Patches stehen bereit.
https://www.heise.de/-9627276
Sicherheitslücken: Angreifer können Dell Unity kompromittieren
Die Fehler stecken in Dell Unity Operating Enviroment (OE). Die Entwickler geben an, die Ausgabe 5.4.0.0.5.094 repariert zu haben. Von den Sicherheitsproblemen sind unter anderem Dell EMC Unity, Dell EMC Unity XT 380F und Dell EMC Unity Hybrid betroffen. Alle verwundbaren Produkte sind in der Warnmeldung aufgelistet.
https://www.heise.de/-9626407
Qnap: Sicherheitslücken in Firmware erlauben Einschleusen von Befehlen
In der Sicherheitswarnung schreibt Qnap, dass es sich um zwei Schwachstellen handelt. Die Beschreibung für beide lautet: Eine Befehlsschmuggel-Schwachstelle wurde in mehreren Qnap-Betriebssystemversionen gemeldet. Sofern sie missbraucht werden, erlauben sie Nutzern, Befehle über das Netzwerk auszuführen (CVE-2023-47218, CVE-2023-50358, CVSS 5.8, Risiko "mittel").
https://www.heise.de/-9626319
SAP patcht: 13 Sicherheitslücken abgedichtet
SAP verteilt Software-Updates, die Schwachstellen aus 13 Sicherheitsmitteilungen ausbessern. Eine Lücke ist kritisch.
https://www.heise.de/-9626592
Security updates for Tuesday
Security updates have been issued by Fedora (clamav and virtiofsd), Oracle (gimp), Red Hat (gnutls and nss), SUSE (kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t and squid), and Ubuntu (openssl).
https://lwn.net/Articles/961937/
IBM Security Bulletins
https://www.ibm.com/support/pages/bulletin/
TYPO3 Security Advisories
https://typo3.org/help/security-advisories
Autodesk: Multiple Vulnerabilities in Autodesk InfraWorks software
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0001
Mitsubishi Electric MELSEC iQ-R Series Safety CPU
https://www.cisa.gov/news-events/ics-advisories/icsa-24-044-01
HIMA: Multiple products affected by DoS and Port-Based-VLAN Crossing
https://cert.vde.com/de/advisories/VDE-2024-013/
Schneider Electric Security Advisories
https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp
SSA-943925 V1.0: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1
https://cert-portal.siemens.com/productcert/html/ssa-943925.html
SSA-871717 V1.0: Multiple Vulnerabilities in Polarion ALM
https://cert-portal.siemens.com/productcert/html/ssa-871717.html
SSA-806742 V1.0: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4
https://cert-portal.siemens.com/productcert/html/ssa-806742.html
SSA-797296 V1.0: XT File Parsing Vulnerability in Parasolid
https://cert-portal.siemens.com/productcert/html/ssa-797296.html
SSA-753746 V1.0: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products
https://cert-portal.siemens.com/productcert/html/ssa-753746.html
SSA-716164 V1.0: Multiple Vulnerabilities in Scalance W1750D
https://cert-portal.siemens.com/productcert/html/ssa-716164.html
SSA-665034 V1.0: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices
https://cert-portal.siemens.com/productcert/html/ssa-665034.html
SSA-647068 V1.0: Ripple20 in SIMATIC RTLS Gateways
https://cert-portal.siemens.com/productcert/html/ssa-647068.html
SSA-602936 V1.0: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1
https://cert-portal.siemens.com/productcert/html/ssa-602936.html
SSA-580228 V1.0: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3
https://cert-portal.siemens.com/productcert/html/ssa-580228.html
SSA-543502 V1.0: Local Privilege Escalation Vulnerability in Unicam FX
https://cert-portal.siemens.com/productcert/html/ssa-543502.html
SSA-516818 V1.0: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices
https://cert-portal.siemens.com/productcert/html/ssa-516818.html
SSA-108696 V1.0: Multiple Vulnerabilities in SIDIS Prime before V4.0.400
https://cert-portal.siemens.com/productcert/html/ssa-108696.html
SSA-017796 V1.0: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation
https://cert-portal.siemens.com/productcert/html/ssa-017796.html
SSA-000072 V1.0: Multiple File Parsing Vulnerabilities in Simcenter Femap
https://cert-portal.siemens.com/productcert/html/ssa-000072.html