End-of-Day report
Timeframe: Mittwoch 22-01-2025 18:00 - Donnerstag 23-01-2025 18:00
Handler: Michael Schlagenhaufer
Co-Handler: n/a
News
Zendesk-s Subdomain Registration Abused in Phishing Scams
Leveraging Zendesk-s communication features, they can send phishing emails disguised as legitimate customer support messages. These emails often include malicious links or attachments to lure victims into clicking.
https://hackread.com/zendesk-subdomain-registration-abused-phishing-scams/
Heimserver-Betriebssystem: Updates beheben Sicherheitslücken in Unraid
Angreifer könnten die Lücken ausnutzen, um dem UnRAID-Admin eigenen Javascript-Code oder bösartige Plug-ins unterzuschieben. [..] Alle Sicherheitslücken sind in der Anfang Januar veröffentlichten neuesten Major-Version 7.0.0 und in einem Bugfix-Release für die Vorgängerversion behoben.
https://heise.de/-10253366
Researchers say new attack could take down the European power grid
Late last month, researchers revealed a finding that-s likely to shock some people and confirm the low expectations of others: Renewable energy facilities throughout Central Europe use unencrypted radio signals to receive commands to feed or ditch power into or from the grid that serves some 450 million people throughout the continent.
https://arstechnica.com/security/2025/01/could-hackers-use-new-attack-to-take-down-european-power-grid/
Telegram captcha tricks you into running malicious PowerShell scripts
Threat actors on X are exploiting the news around Ross Ulbricht to direct unsuspecting users to a Telegram channel that tricks them into executing PowerShell code that infects them with malware.
https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/
Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
The attack chain begins when a victim visits a compromised website, which directs them to a bogus CAPTCHA page that specifically instructs the site visitor to copy and paste a command into the Run prompt in Windows that uses the native mshta.exe binary to download and execute an HTA file from a remote server. [..] The HTA file, in turn, executes a PowerShell command to launch a next-stage payload, a PowerShell script that unpacks a second PowerShell script responsible for decoding and loading the Lumma payload, but not before taking steps to bypass the Windows Antimalware Scan Interface (AMSI) in an effort to evade detection.
https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices firmware as well as misconfigured security features.
https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
Supply chain attack hits Chrome extensions, could expose millions
Cybersecurity outfit Sekoia is warning Chrome users of a supply chain attack targeting browser extension developers that has potentially impacted hundreds of thousands of individuals already. [..] A number of the potentially affected extensions (according to Booz Allen Hamilton's report) appear to have been pulled from the Chrome Web Store at the time of writing.
https://go.theregister.com/feed/www.theregister.com/2025/01/22/supply_chain_attack_chrome_extension/
Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory in response to exploitation in September 2024 of vulnerabilities in Ivanti Cloud Service Appliances (CSA): CVE-2024-8963, an administrative bypass vulnerability; CVE-2024-9379, a SQL injection vulnerability; and CVE-2024-8190 and CVE-2024-9380, remote code execution vulnerabilities.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a
Denuvo Analysis
Denuvo is an anti-tamper and digital rights management system (DRM). It is primarily used to protect digital media such as video games from piracy and reverse engineering efforts. Unlike traditional DRM systems, Denuvo employs a wide range of unique techniques and checks to confirm the integrity of both the game-s code and licensed user.
https://connorjaydunn.github.io/blog/posts/denuvo-analysis/
Vulnerabilities
Kritische Sicherheitslücke in SonicWall SMA1000 - aktiv ausgenutzt - Update verfügbar
In SonicWall SMA1000 Appliance Management Console (AMC) und Central Management Console (CMC) wurde eine kritische Sicherheitslücke entdeckt, die bereits aktiv von Angreifern ausgenutzt wird. Die Schwachstelle ermöglicht die Ausführung von beliebigem Code ohne vorherige Authentifizierung. CVE-Nummer(n): CVE-2025-23006
https://www.cert.at/de/warnungen/2025/1/sonicwall-amc-cmc-rce
Critical zero-days impact premium WordPress real estate plugins
The RealHome theme and the Easy Real Estate plugins for WordPress are vulnerable to two critical severity flaws that allow unauthenticated users to gain administrative privileges. [..] Also, Patchstack says the vendor released three versions since September, but no security fixes to address the critical issues were introduced. Hence, the issues remain unfixed and exploitable.
https://www.bleepingcomputer.com/news/security/critical-zero-days-impact-premium-wordpress-real-estate-plugins/
Schwachstellen in Jenkins-Plug-ins gefährden Entwicklungsumgebungen
Unter bestimmten Bedingungen können Angreifer Softwareentwicklungsserver mit Jenkins-Plug-ins attackieren. Darunter fallen etwa die Plug-ins Azure Service Fabric und Zoom.
https://heise.de/-10254105
Security updates for Thursday
Security updates have been issued by AlmaLinux (redis:6), Debian (frr and git-lfs), Fedora (SDL2_sound and webkit2gtk4.0), Gentoo (firefox, GPL Ghostscript, libgsf, libuv, PHP, Qt, QtWebEngine, and Yubico pam-u2f), Mageia (chromium-browser-stable), SUSE (helmfile, nvidia-modprobe, qt6-webengine, ruby3.4-rubygem-actioncable-8.0-8.0.1-1.1, ruby3.4-rubygem-actionpack-8.0-8.0.1-1.1, ruby3.4-rubygem-actiontext-8.0-8.0.1-1.1, ruby3.4-rubygem-actionview-8.0-8.0.1-1.1, ruby3.4-rubygem-activejob-8.0-8.0.1-1.1, ruby3.4-rubygem-activerecord-8.0-8.0.1-1.1, ruby3.4-rubygem-activestorage-8.0-8.0.1-1.1, ruby3.4-rubygem-rails-8.0-8.0.1-1.1, and ruby3.4-rubygem-railties-8.0-8.0.1-1.1), and Ubuntu (bluez, openjpeg2, and python-django).
https://lwn.net/Articles/1005946/
Drupal: Ignition Error Pages - Critical - Cross Site Scripting - SA-CONTRIB-2025-007
https://www.drupal.org/sa-contrib-2025-007
Drupal: Material Admin - Critical - Unsupported - SA-CONTRIB-2025-006
https://www.drupal.org/sa-contrib-2025-006
Drupal: Flattern - Multipurpose Bootstrap Business Profile - Critical - Unsupported - SA-CONTRIB-2025-005
https://www.drupal.org/sa-contrib-2025-005
Drupal: AI (Artificial Intelligence) - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2025-004
https://www.drupal.org/sa-contrib-2025-004
QNAP: Multiple Vulnerabilities in Rsync
https://www.qnap.com/en-us/security-advisory/QSA-25-02
Hitachi Energy RTU500 Series Product
https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-02
mySCADA myPRO Manager
https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-01
HMS Networks Ewon Flexy 202
https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-06