Week in review

AUSCERT Week in Review for 15th November 2019

15 Nov 2019

AUSCERT Week in Review for 15th November 2019 Greetings, Emotet is up officially by 730%. It feels better when things are officially reported by researchers. By the time the report is out most of the front line people would have already felt and dealt with the effects of this campaign. Criminals are going where the money is, no not the banks, but server of all flavour for their processing power. Also this week Bash got bashed and Intel says we can’t tell about their intel until they say so but what they say may have been fixed six months ago, a story that did not sell well with some Dutch security boffins. Feels like things are going fast, well I’ll play the researcher and tell you post-priori they certainly are and that security automation and response is the future. Oh hang on you also knew that too. Fact is that when you are at the front lines you get front row seat to the details as they happen. That’s why keeping communication lines open to AUSCERT, either push by report, or pull from feeds such as Malicious URL, MSIN, and MISP feeds provides you the intelligence the moment it happens. As for news, here’s a summary (including excerpts) of some of the moreinteresting stories we’ve seen this week: ——- Title: PureLocker Ransomware Can Lock Files on Windows, Linux, and macOSAuthor: Ionut IlascuDate Published: November 13th, 2019 Excerpt: “Cybercriminals have developed ransomware that can be ported to all major operating systems and is currently used in targeted attacks against production servers. The new name is PureLocker. Malware researchers analyzed samples for Windows but a Linux variant is also being used in attacks. Built to dodge detection. The malware is carefully designed to evade detection, hiding malicious or dubious behavior in sandbox environments, posing as the Crypto++ cryptographic library, and using functions normally seen in libraries for music playback.” Title: Lateral Phishing Makes for Dangerous Waters, Here’s How You Can Avoid Getting Caught in the NetAuthor: Anurag KaholDate: November 13th, 2019 Excerpt: “Like regular phishing, a lateral phishing attack has the goal of gaining access to private information and begins with a user receiving an email that is attempting to extract login credentials or PII. However, the main differentiator between the two attack methods is that lateral phishing is conducted from a compromised email address within an organization. Once a hacker gains access to a legitimate email account, whether it belongs to a CEO or an intern, the hacker can then use it to target individuals within the company. Lateral phishing techniques are highly effective. When hackers impersonate someone that the recipient knows and trusts, said recipient tends to lower her or his guard, making it more likely that sensitive information will be surrendered.” Title: Researchers Discover Massive Increase in Emotet Activity Author : Helpnet SecurityDate: November 13th, 2019 Excerpt: “Emotet had a 730% increase in activity in September after being in a near dormant state, Nuspire discovered. Emotet, a modular banking Trojan, has added additional features to steal contents of victim’s inboxes and steal credentials for sending outbound emails. Those credentials are sent to the other bots in its botnet which are used to then transmit Emotet attack messages. When Emotet returned in September, it appeared with TrickBot and Ryuk ransomware to cause the most damage to a network.” Title: Microsoft Patch Tuesday Updates Fix CVE-2019-1429 Flaw Exploited in the WildAuthor: Pierluigi PaganiniDate: November 13th, 2019 Excerpt: “Microsoft’s Patch Tuesday updates for November 2019 address 74 flaws, including an Internet Explorer vulnerability, tracked as CVE-2019-1429, that has been exploited in the wild. Microsoft doesn’t provide any information on the nature of the active attacks, it only pointed out that they are likely limited at this time. The CVE-2019-1429 zero-day is a scripting engine memory corruption vulnerability that affects Internet Explorer 9, 10 and 11. Microsoft. “A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same use rights as the current user.” read the security advisory published by Microsoft. “If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.” Title: Intel launches security blog, pushes security patchesAuthor: Doug OlenickDate: November 13th, 2019 “Intel has joined the Patch Tuesday crowd with a platform update that covered 77 vulnerabilities, two of which were rated critical.The chip maker noted the security updates in a new blog the company said it will use to disseminate security updates, bug bounty topics, new security research, and engagement activities within the security research community.Intel is dividing its updates by advisory with each covering a single or set of products.” Title: Intel Fixes a Security Flaw It Said Was Repaired 6 Months AgoAuthor : Kim ZetterDate : November 12th, 2019 Excerpt:“Last May, when Intel released a patch for a group of security vulnerabilities researchers had found in the company’s computer processors, Intel implied that all the problems were solved. But that wasn’t entirely true, according to Dutch researchers at Vrije Universiteit Amsterdam who discovered the vulnerabilities and first reported them to the tech giant in September 2018. The software patch meant to fix the processor problem addressed only some of the issues the researchers had found.”   Here are this week’s noteworthy security bulletins (in no particular order): 1. ESB-2019.4311 – [Appliance] Phillips IntelliBridge EC40 and Phillips IntelliBridge EC80: Access privileged data – Remote/unauthenticated“…to execute software, modify system configuration, or view/update files, including unidentifiable patient data.” 2. ESB-2019.4300 – [Cisco] Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD): Root compromise – Existing account “.. to execute arbitrary code with root privileges on the underlying Linux operating system.” 3. ASB-2019.0337 – [Win] McAfee Data Loss Prevention ePO: Access confidential data – Existing account“…remote attackers with access to the network to collect login details to the LDAP server..” 4. ESB-2019.4289 – [Virtual] microcode: Access privileged data – Existing account“..speculative execution may be able to infer the value of data in the microarchitectural structures..” Wishing you the best from AUSCERT and hope to see you safe next week,Geoffroy

Learn more

Week in review

AUSCERT Week in Review for 8th November 2019

7 Nov 2019

AUSCERT Week in Review for 8th November 2019 Greetings, As the week comes to a close, here are some articles that may help ease you into the weekend. BlueKeep attacks are happening, but it’s not a worm Date published: 03/11/2019 Author: Catalin Cimpanu Excerpt: “This BlueKeep campaign has been happening at scale for almost two weeks, but it’s been only spotted today by cybersecurity expert Kevin Beaumont. The British security expert said he found the exploits in logs recorded by honeypots he set up months before and forgot about. First attacks date back to October 23, Beaumont told ZDNet. Beaumont’s discovery was confirmed by Marcus “MalwareTech” Hutchins, the security researcher who stopped the WannaCry ransomware outbreak, and who’s a recognized expert in the BlueKeep exploit.” QSnatch malware already infected thousands of QNAP NAS devices Date published: 04/11/2019 Author: Pierluigi Paganini Excerpt: “A couple of weeks ago, the experts at the National Cyber Security Centre of Finland (NCSC-FI), published a report on the QSnatch malware. The experts were alerted about the malware in October and immediately launched an investigation. “NCSC-FI received reports via the Autoreporter service during mid October of infected devices attempting to communicate to specific command and control (C2) servers.” reads the report. “The original infection method remains unknown, but during that phase malicious code is injected to the firmware of the target system, and the code is then run as part of normal operations within the device. After this the device has been compromised. The malware uses domain generation algorithms to retrieve more malicious code from C2 servers.” Trend Micro reveals that customer data was illegally sold following inside-job ‘security incident’ Date published: 06/11/2019 Author: Mark Wyci?lik-Wilson Excerpt: “Security firm Trend Micro has revealed details of an inside scam which led to personal details of its customers being exposed. The security incident dates back to August this year, and the company says that it was made aware of customers being contacted by fake Trend Micro support staff. Following an investigation lasting until the end of October, it was determined that it was a member of staff that had fraudulently gained access to a customer database and sold personal data to a third party.” Buran Ransomware; the Evolution of VegaLocker Date published: 05/11/2019 Authors: Alexandre Mundo and Marc Rivero Lopez Excerpt: “This ransomware was announced in a well-known Russian forum with the following message: “Buran is a stable offline cryptoclocker, with flexible functionality and support 24/7. Functional: Reliable cryptographic algorithm using global and session keys + random file keys; Scan all local drives and all available network paths; High speed: a separate stream works for each disk and network path; Skipping Windows system directories and browser directories; Decryptor generation based on an encrypted file; Correct work on all OSs from Windows XP, Server 2003 to the latest; The locker has no dependencies, does not use third-party libraries, only mathematics and vinapi;” The announcement says that Buran is compatible with all versions of the Windows OS’s (but during our analysis we found how, in old systems like Windows XP, the analyzed version did not work) and Windows Server and, also, that they will not infect any region inside the CIS segment.” Critical Remote Code Execution Flaw Found in Open Source rConfig Utility Date published: 04/11/2019 Authors: Tom Spring Excerpt: “Two bugs in the network configuration utility rConfig have been identified, both allowing remote code execution on affected systems. Worse, one is rated critical and allows for a user to attack a system remotely – sans authentication. RConfig is a free open-source configuration management utility used by over 7,000 network engineers to take snapshots of over 7 million network devices, according the project’s website. The vulnerabilities (CVE-2019-16663, CVE-2019-16662) are both tied to rConfig version 3.9.2. The more serious of the two vulnerabilities (CVE-2019-16662) allows an attacker to execute system commands on affected devices via GET requests, which can lead to command instructions.” Here are this week’s noteworthy security bulletins: 1) Tenable.sc: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ASB-2019.0310/ Tenable Security Center received stand-alone patches that address multiple vulnerabilities affecting PHP. The most severe of these could lead to a remote denial of service attack and Cross-Site Scripting attacks. 2) Android: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ASB-2019.0311/ Android received its monthly update that addresses 38 vulnerabilities. These include a remote code execution and privilege escalation vulnerabilities. 3) Cisco Web Security Appliance: Cross-site scripting – Remote with user interaction https://portal.auscert.org.au/bulletins/ESB-2019.4172/ Cisco Web Security Appliance received fixes for a couple of vulnerabilities. This particular bulletin addresses an update for fixing a reflected XSS vulnerability. 4) IBM QRadar SIEM: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ESB-2019.4193/ Last, but most certainly not least, IBM’s QRadar SIEM received fixes for over 39 vulnerabilities, including local arbitrary code execution, remote Denial of Service, and remote information disclosure. ..and with that, have a great weekend all!  Nick

Learn more

Week in review

AUSCERT Week in Review for 1st November 2019

1 Nov 2019

AUSCERT Week in Review for 1st November 2019 Greetings, As the week comes to a close, here are some articles that may help ease you into the weekend. xHelper Trojan Variant Reinstalls Itself After Removal, Infects 45K Date published: 29/10/2019 Author: Sergiu Gatlan Excerpt: “While the infection vector used by the threat actor behind the new xHelper variant is not yet known, Symantec’s research team suspects that the app component that bundles the xHelper payloads is downloaded by a malicious system app that might come pre-installed on some smartphone brands. The fact that “numerous users have been complaining on forums about the persistent presence of this malware on their devices, despite performing factory resets and manually uninstalling it,” seems to further consolidate their hypothesis. — xHelper reports can be found on Reddit and Google Play’s Help forums. The number of devices infected with the xHelper Android malware grows each day, since “in the past month alone, there was an average of 131 devices infected each day, and an average of 2,400 devices persistently infected throughout the month,” as Symantec’s research team adds.” Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users Date published: 29/10/2019 Author: Swati Khandelwal Excerpt: “Developed by NSO Group, Pegasus allows access to an incredible amount of data from victims’ smartphones remotely, including their text messages, emails, WhatsApp chats, contact details, calls records, location, microphone, and camera. Pegasus is NSO’s signature product that has previously been used against several human rights activists and journalists, from Mexico to the United Arab Emirates two years ago, and Amnesty International staffers in Saudi Arabia and another Saudi human rights defender based abroad earlier last year. Though NSO Group always claims it legally sells its spyware only to governments with no direct involvement, WhatsApp head Will Cathcart says the company has evidence of NSO Group’s direct involvement in the recent attacks against WhatsApp users.” Industrial equipment to come under fire at the world’s largest hacking contest Date published: 28/10/2019 Author: Catalin Cimpanu Excerpt: “Industrial equipment will be the primary focus of the next edition of Pwn2Own, the world’s largest and most well-known hacking contest. This is the first time that security researchers will be allowed to hack ICS (industrial control systems) software and protocols at Pwn2Own. For most of its 12-year history, the contest has featured browsers and operating systems as the primary targets for white-hat hackers looking to make a name for themselves and earn huge cash rewards. In recent years, contest organizers have been diversifying the target portfolio with virtual machines, Tesla cars, and even Facebook Portal devices. Now, the organizers, Trend Micro’s Zero-Day Initiative (ZDI) project, say the next Pwn2Own contest will be solely focused on ICS devices and their respective software.” Johannesburg Authorities Refuse to Pay Hackers’ Bitcoin Ransom Date published: 30/10/2019 Authors: Marie Huillet Excerpt: “Authorities in Johannesburg are holding firm in their refusal to pay a ransom of 4 Bitcoin to hackers who targeted municipal systems last week. In a statement posted to its official Twitter handle on Oct. 28, the Johannesburg city council confirmed the attack had affected services that included billing, property valuation and land information systems, as well as its eHealth and Libraries services. The breach, which occurred on Oct. 24, was accompanied by a ransom demand of 4 Bitcoin (BTC) — worth close to $37,000 to press time — payable by Oct. 28.” New Adwind Variant Targets Windows, Chromium Credentials Date published: 29/10/2019 Authors: Lindsey O’Donnell Excerpt: “Once delivered, this new Adwind variant obfuscates the initial JAR file, blocking against any signature-based detection methods. “Malware that takes advantage of common Java functionality is notoriously difficult to detect or detonate in a sandbox for the simple fact that Java is so common on the web,” researchers with Menlo Security said in a Tuesday post. “In fact, any effort to block or limit Java would result in much of the internet breaking down — a non-starter for users who increasingly rely on rich web apps or SaaS platforms for their day-to-day responsibilities.” The JAR file then decrypts and loads a loader, which then loads an initial set of modules and sends out a request that is responsible for initializing the RAT with the command-and-control (C2) server.” Here are this week’s noteworthy security bulletins: 1) ALERT php5: Execute arbitrary code/commands – Remote/unauthenticated https://portal.auscert.org.au/bulletins/ESB-2019.3963/ Debian released an update to address a buffer underflow vulnerability in its php5-fpm implementation. The vulnerability, CVE-2019-11043, is being actively exploited in the wild to perform remote code execution. PHP 5.6 reached End Of Life on 1st January 2019. Updates to address the same vulnerability followed for php7.0, php7.3 on Debian, Ubuntu and SUSE. 2) Fortiguard FortiClient: Root compromise – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.4008/ Forticlient end point protection solution for Mac OS received a fix to address a local security check bypass. This could result in local command execution with root privileges. The vulnerability arose due to improper sanitisation of special elements in a command. 3) Apple MacOS: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ESB-2019.4010/ Apple released a bunch of security fixes for its products; MacOS, iOS, iPadOS, TV, Watch and Safari. Needless to say, the fixed vulnerabilities ranged from UI spoofing to remote code execution. 4) sudo: Root compromise – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3979/ Red Hat released an update to fix a privilege escalation vulnerability which allowed a local attacker to execute privileged commands by leveraging the “Runas” specification, effectively bypassing the need to authenticate as root. Red Hat has stated: “This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example: someuser myhost = (ALL, !root) /usr/bin/somecommand” ..and with that, have a great weekend all!  Nick

Learn more

Blogs

2019 Cyber Security Survey

28 Oct 2019

2019 Cyber Security Survey Complete the 2019 Cyber Security Survey The cyber landscape is constantly changing, and the number and level of sophistication of attacks are increasing.  Being aware of the latest cyber security threats and trends in the industry can help your organisation put the right measures in place to protect against cyber threats.  Is your organisation prepared to manage the impact of a significant cyber event?  How do your cyber practices stack up against other organisations in your industry? The fourth BDO and AUSCERT Cyber Security Survey is now open. This annual survey, aimed at key decision makers, identifies the current cyber security trends, issues and threats facing businesses in Australia and New Zealand. Participation gives you direct access to our survey report, allowing you to: Compare your organisation’s cyber maturity against peers Benchmark your business’ current cyber security efforts with trends in your industry Identify potential gaps in your organisation’s cyber security approach Determine ways to improve your organisation’s cyber security culture, planning and response measures. Take part now Don’t miss out on your chance to gain free insight into the maturity of your organisation’s cyber security approach. The survey closes at midnight on Friday 1 November. The survey is anonymous and takes less than 10 minutes to complete. The survey also offers the chance to win one of three Apple Watches.* For more information about this survey contact our team: membership@auscert.org.au * Refer to the survey competition terms and conditions.    

Learn more

Week in review

AUSCERT Week in Review for 25th October 2019

25 Oct 2019

AUSCERT Week in Review for 25th October 2019 Greetings, This week we saw both Google and Mozilla release updates to patch multiple vulnerabilities in the Chrome and Firefox browsers, part of the on-going battle to ensure we are a little safer whilst we battle the web. Additionally, with consumer protection in mind, Apple pulled eighteen malicious apps from the iOS store, whilst on Google Play Store, forty two adware Android apps were removed.  However, despite measures taken by vendors to protect us from the ‘evilz’, we must still remember that have to take responsibility for our own actions and choices.  Be vigilant with your app choice and always perform due diligence. Every day we are more invested in staying connected to both people and systems, and Naked Security informed audiences in an article this week that people still think of phishing as being solely an email borne scam. However, the article correctly reminded readers that the technique is applied by scammers to communications streams available on our electronic devices, including social message, instant messaging and SMS text messages. Please feel free to dive into the associated articles:——————————————————————————– iBye, bad guy: Apple yanks 18 iOS store apps that sheltered advert-mashing malwareDate: October 24Author: The Register 42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese StudentDate: October 24Author: The Hacker News Phishy text message tries to steal your cellphone accountDate: October 18Author: Naked Security ——————————————————————————– Here are four of this week’s interesting security bulletins: ASB-2019.0308Google Chrome was patched to resolve multiple vulnerabilities which when unpatched offered an interesting selection of impact/access factors. ESB-2019.3941Mozilla also patched multiple vulnerabilities in Firefox, resolving a bunch of ‘Remote with User Interaction’ associated impacts. ESB-2019.3947Red Hat plugged a nifty vulnerability related to little old sudo which researchers found would lead to root compromise when exploited. ESB-2019.3958VMware issued update to resolve a vulnerability associated with its vCenter Server Appliance, addressing a sensitive information disclosure vulnerability (remote unauthenticated) in backup and restore. ——————————————————————————– As always, stay safe, stay patched, and make it a good weekend! Best regards,Colin and Patch the AUSCERT cat

Learn more

Blogs

AUSCERT at the APCERT Conference 2019

22 Oct 2019

AUSCERT at the APCERT Conference 2019 AUSCERT was represented at the recent APCERT 2019 gathering in Singapore by Senior Information Security Analyst, Geoff Thonon and Senior Security System Administrator, Colby Prior.  Highlights of this work trip included the below initiatives.  _____________________________________________________________________________________________________________________________ APCERT-AGM 2019 Teams that are part of APCERT (Asia Pacific Computer Emergency Team)[1] took part in the APCERT Conference 2019 which kicked off on Sunday the 29th September.  This was Day One of the APCERT Annual General Meeting and like with all groups that meet once-a-year, the day was filled with reports on the years’ activities. Working Groups [2] were queued up and reported on the progress of various projects that makes the APCERT community more effective as a whole.  [1] http://www.apcert.org/[2] http://www.apcert.org/about/structure/groups.html   AUSCERT @ APCERT Drill-WG AUSCERT co-presented  with the convenor of ThaiCERT on the APCERT-Drill that took place in 2019 [1].  AUSCERT rallied the group to participate in and briefed them about the APCERT-Drill 2020, within a diverse set of roles.  Along with rallying the group for the coming Drill, some factors were highlighted in using the currently available platform(s) within APCERT in terms of communication and coordination, as well as using this event to further further promote cooperation with all new CERTs/CSIRTs in the Asia Pacific region.    [1] http://www.apcert.org/documents/pdf/APCERT_Drill2019_Press%20Release.pdf ______________________________________________________________________________________________________________________________ We look forward to hosting the APCERT-Drill in 2020 and to meeting our colleagues at the next APCERT annual conference!

Learn more

Week in review

AUSCERT Week in Review for 18th October 2019

18 Oct 2019

AUSCERT Week in Review for 18th October 2019 Greetings, This week we saw Oracle release its quarterly “Critical Patch Updates,Alerts and Bulletins”. Numerous vulnerabilities and patches were reportedin their broad range of products, that will need to be managed. We canexpect many other vendors to release patches over the next few weeks fortheir products which might be built around Oracle technologies includingdatabases and Java products. Please refer to our webpage for details of upcoming events – hosted bothby AUSCERT as well as other industry groups:https://wordpress-admin.auscert.org.au/resources/events/ — Here’s a summary (including excerpts) of some of the more interestingstories we’ve seen this week: Title: Germany’s cyber-security agency recommends Firefox as most secure browserhttps://www.zdnet.com/article/germanys-cyber-security-agency-recommends-firefox-as-most-secure-browser/Author: Catalin CimpanuDate: 17 October 2019Excerpt:“Germany’s BSI tested Firefox, Chrome, IE, and Edge. Firefox was onlybrowser to pass all minimum requirements for mandatory security features.” Title: Sudo? More like Su-doh: There’s a fun bug that gives restrictedsudoers root access (if your config is non-standard)https://www.theregister.co.uk/2019/10/14/linux_sudo_security_bug/Author: Chris WilliamsDate: 14 October 2019Excerpt:“Linux users who are able to run commands as other users, via the sudoermechanism, though not as the all-powerful root user, can still run commandsas root, thanks to a fascinating coding screw-up.” Title: MacGibbon joins local cyber security push to challenge multinationalshttps://www.itnews.com.au/news/macgibbon-joins-local-cyber-security-push-to-challenge-multinationals-532376/Author: Justin HendryDate: 15 October 2019Excerpt:“Two of Australia’s most high-profile IT executives have joined forcesto form the nation’s largest dedicated cyber security company, a movethat directly challenges the dominance of large US-affiliated vendors insecuring key contracts with major corporates and government.” Title: ATO phone scammers turn up at Adelaide man’s house dressed as police with eftpos machinehttps://www.abc.net.au/news/2019-10-15/ato-scammers-turn-up-at-house-with-eftpos-machine/11603144/Author: Eugene BoisvertDate: 16 October 2019Excerpt:“Two men turned up to another man’s house with an eftpos machine demandingmoney after earlier calling him pretending to be from the AustralianTaxation Office (ATO), according to SA Police.” Title: Planting tiny spy chips in hardware can cost as little as $200https://arstechnica.com/information-technology/2019/10/planting-tiny-spy-chips-in-hardware-can-cost-as-little-as-200/Author: Andy GreenbergDate: 13 October 2019Excerpt:“Proof-of-concept shows how easy it may be to hide malicious chips insideIT equipment.” — Here are some of this week’s noteworthy security bulletins (in no particularorder): ESB-2019.3826 – [UNIX/Linux][Ubuntu] sudo: Root compromise – Existing accounthttps://portal.auscert.org.au/bulletins/ESB-2019.3826/– See article above for discussion of issue. ASB-2019.0294 – [Win][UNIX/Linux] Oracle Java SE: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/ASB-2019.0294/– One of the outputs from Oracle’s CPU this week. ESB-2019.3835 – [SUSE] linux kernel: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/ESB-2019.3835/– Another root compromise vulnerability. ESB-2019.3881 – [Cisco] Cisco Identity Services Engine: Multiplevulnerabilitieshttps://portal.auscert.org.au/bulletins/ESB-2019.3881/– Cisco had a big week too reporting vulnerabilities and patches, this isone of those. ESB-2019.3861 – [Win][Mac] Acrobat and Reader: Multiple vulnerabilitieshttps://portal.auscert.org.au/bulletins/ESB-2019.3861/– 68 CVEs reported! — Stay safe, stay patched and have a great weekend,Marcus.  

Learn more

Week in review

AUSCERT Week in Review for 11th October 2019

11 Oct 2019

AUSCERT Week in Review for 11th October 2019 Greetings, In the words of the Beatles, “it’s getting better all the time”. That is, flawed software is always being discovered and fixed. A cynic might add that flawed software is being created faster than the fix process can keep up. Microsoft’s monthly Patch Tuesday came and went this week without any major dramas, but popular macOS terminal app iTerm fixed a major RCE thanks to research funded by Mozilla, and D-Link have given up entirely on certain home routers, leaving them open to any botnet which will have them. Critical Security Issue identified in iTerm2 as part of Mozilla Open Source Audit Date: 2019-10-09 Author: The Hacker News A 7-year-old critical remote code execution vulnerability has been discovered in iTerm2 macOS terminal emulator app—one of the most popular open source replacements for Mac’s built-in terminal app. Tracked as CVE-2019-9535, the vulnerability in iTerm2 was discovered as part of an independent security audit funded by the Mozilla Open Source Support Program and conducted by cybersecurity firm Radically Open Security. “MOSS selected iTerm2 for a security audit because it processes untrusted data, and it is widely used, including by high-risk targets (like developers and system administrators),” Mozilla says. ‘Hypocritical and ironic’: NSA whistleblower dropped from speaking at Melbourne cybersecurity conference Date: 2019-10-08 Author: ABC News A high-profile American whistleblower and a privacy researcher have been unexpectedly dropped from addressing a Government-backed cybersecurity event underway in Melbourne. Thomas Drake and Dr Suelette Dreyfus of the University of Melbourne were both told their talks were “incongruent” with CyberCon, despite being invited to speak months earlier. Mr Drake’s presentation was to address national security and surveillance, while Dr Dreyfus planned to explore the use of safe digital drop boxes for anti-corruption whistleblowing. Beware of Fake Amazon AWS Suspension Emails for Unpaid Bills Date: 2019-10-09 Author: BLEEPING COMPUTER A billing notice from a vendor, especially one like Amazon, that states that your account has been suspended for unpaid bills, may confuse a user enough to click on the email link. Attackers are capitalizing on this confusion by sending emails that pretend to be from Amazon AWS Support at postmaster@amazon.com and that use a subject of “Your service has now been suspended”. D-Link Home Routers Open to Remote Takeover Will Remain Unpatched Date: 2019-10-07 Author: ThreatPost D-Link won’t patch a critical unauthenticated command-injection vulnerability in its routers that could allow an attacker to remotely take over the devices and execute code. The vulnerability (CVE-2019-16920) exists in the latest firmware for the DIR-655, DIR-866L, DIR-652 and DHP-1565 products, which are Wi-Fi routers for the home market. With no patch available, affected users should upgrade their devices as soon as possible. Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers’ Interaction Date: 2019-10-04 Author: The Hacker News Almost every application contains security vulnerabilities, some of which you may find today, but others would remain invisible until someone else finds and exploits them—which is the harsh reality of cybersecurity and its current state. And when we say this, Signal Private Messenger—promoted as one of the most secure messengers in the world—isn’t any exception. Google Project Zero researcher Natalie Silvanovich discovered a logical vulnerability in the Signal messaging app for Android that could allow malicious caller to force a call to be answered at the receiver’s end without requiring his/her interaction. Australia, US negotiate CLOUD Act data swap pact Date: 2019-10-08 Author: iTnews Australian law enforcement and national security agencies are set to have greater access to data held by US-based cloud providers under an agreement being negotiated with the US government. But the bilateral agreement, if finalised and approved, will also require Australian-based cloud providers to hand over data requested by US law enforcement authorities. Short October Patch Tuesday Includes Remote Desktop Client, Browser, and Authentication Patches Date: 2019-10-08 Author: TrendLabs Security Intelligence Blog October’s Patch Tuesday is relatively modest, with Microsoft releasing a total of 59 patches. However, this shorter list still warrants attention. Nine of the 59 were still identified as Critical, while the remaining 50 were labeled Important. Most of the critical bulletins were for various Internet Explorer and Microsoft Edge vulnerabilities, with one covering a Remote Desktop Client vulnerability. The Important bulletins fixed several issues, including NLTM and Microsoft IIS server vulnerabilities. 10 Steps to Assess SOC Maturity in SMBs Date: 2019-10-07 Author: Dark Reading Facing a system and organisation controls audit doesn’t have to be stressful for small and midsize businesses if they follow these guidelines. Preparing for a system and organisation controls (SOC) compliance audit for the first time can be challenging. Many organisations, especially small to midsize businesses (SMBs), underestimate the level of planning and effort that goes into completing a successful SOC audit, adding to their security-related stress. Without proper preparation, SMBs risk missing milestones and deadlines, which can result in additional fees to complete a SOC audit. Addressing these 10 questions can help an organisation prevent delays, determine their level of preparedness to complete an audit, and hopefully limit unnecessary work and effort from process owners and employees critical to the business. Yes, MFA Isn’t Perfect. But That’s Not a Reason for Your Company Not to Use It Date: 2019-10-08 Author: Bitdefender When computer users and businesses ask me for a single step they could take to dramatically enhance their security it’s easy to answer: enable multi-factor authentication. Multi-factor authentication (MFA) offers an additional layer of protection for accounts that means even if a criminal manages to phish, guess or crack your password, even if a data breach spills your login credentials, there’s a very good chance your account won’t be compromised. Multi-factor authentication is a great way to improve your security from some of the most common attacks that are out there, but that’s not to say it’s perfect. Stay safe, stay patched and have a good weekend! Patch the AUSCERT cat

Learn more

Blogs

Ryuk Ransomware and Action – Summary Information

9 Oct 2019

Ryuk Ransomware and Action – Summary Information Hello! Welcome to my first blog post, today topic involves Ryuk Ransomware, which has had some press of late thought it might be useful to supply summary details about this ransomware variant to aid understanding and steps to aid mitigation. Written for quick absorption, without further ado, please find ready for consumption a non-exhaustive, best effort ‘Ryuk Ransomware and Action – Summary Information’ below the fold (popcorn optional).   ** Ryuk Ransomware and Action – Summary Information ** Meaning: “Gift of God”Highly complex ransomware, constantly under development Primary purpose: “Money Maker”Secondary purpose: Potential sald for further exploit (compromised host marketplace) Trojan Associations: – Emotet (modular malware, emerged in 2014, primarily used as downloader for other malware, i.e., trickbot & IcedID)– Trickbot (spyware, emerged 2016, mainly used to target banks, distributed via spam email or Emotet’s geo-based d/l function) *Highlevel Process Flow – Ryuk Ransomware (quick simple flow)*– Spam email /w malicious doc– Emotet and/or Trickbot malware installed– Credential theft– Create new Admin User– Lateral movement through network– Recon Active Directory– Attempts to disable host security protection and 3rd-party backup services– Deletes Windows VSS shadow copies– Ryuk ransomware deployed *Detail/Notes* Ryuk Stealth Aspect: – Dropper is deleted by payload– Encryption could occur days, weeks or year after infection– Activation delay presumed to be surveillance related / actors performing reconnaisance on their ‘big game’ – Known Anti-forensics include PowerShell anti-logging scripts, anti-analysis infinite loop Encrypted file extension: .RYK Ransom note filename: “RyukReadMe.txt”Ransom note includes: – Two private email addresses– In addition, variants observed, one includes payment related details, whilst another doesn’t and victim to make contact Lateral movement: – RDP Usage (via brute force and vulnerability exploit)– SMB exploit (MS17-010)– Continues until privileges recovered to reach DC. Makes use of any or all of following tools:– PsExec (free Microsoft sysinternals tool): To push Ryuk binary to individual hosts– PowerShell Empire: D/L and installed as a service, PowerShell agents and keyloggers– ‘pwgrab’ (Trickbot module) for recovering credentials– Mimikatz: Steal admin credentials and create persistent backdoors Persistence: – Early variants had persistence, – recent reports indicates newer variants do not persist after restart– be prepared for either Interesting: – TrickBot is leveraged for lateral movement and to infect as many machines as possible   (It then deploys Ryuk at a randomly determined time)– When TrickBot compromises a machine, it is bundled with a library of modules, used to:  – perform reconnaissance  – harvest credentials  – perform lateral movement – Ryuk:  – attempts to disable AV products and delete Windows VSS shadow copies before ransomware starts encryption procedure  – operates with a whitelist of three file extension types: exe, dll and hrmlog     (hrmlog believed to be a debug log filename created during development of Ryuk’s 2017 predecessor, Hermes ransomware)  – disables several 3rd-party backup services, including Acronis, SQLSafe, VEEAM, and Zoolz – PowerShell Empire, a well-known penetration-testing tool, is no longer maintained by its creators (respected members of the infosec community)   – its capabilities and behaviors closely resemble those used by current nation state advanced persistent threat actors   – evades security solutions, operating in a covert manner, and enabling attackers’ total control over compromised systems   – Empire’s use among cybercriminals grew exponentially and in 2018, the UK’s National Cyber Security Center included Empire on its shortlist of the five most dangerous publicly available hacking tools   – However, development of Empire framework stopped after creators said “project reached its initial goal” – Ryuk victims may have a small chance of getting free decryption through Security firm Emisoft’s free decrypt tools *Defending against Ryuk and other ransomware*Considerations that usual methods for delivering ransomware are rarely complicated, simply relying on tried and tested techniques such as:– exploiting vulnerabilities– sending spam and phishing emails– stealing user credentials (also consider obtained via credential stuffing) User/staff awareness!– enhance your user saviness and confidence in identifying and appropriately fielding suspicious emails– encourage users to be avid first line reporters ASD Essential 8 Mitigation Strategies:– preventing malware delivery and execution  – application whitelisting  – configure MS Office Macro setting  – patch Apps  – user app hardening– limiting the extent of cyber security incidents  – restrict administrative privileges  – MFA  – patch operating systems– recovering data and system availability  – daily backups Other Government produced advisories:– Follow ACSC “Guidelines for System Management” (October 2019), ensuring networks and systems are patched or appropriate measures are in place  – advice included under ‘When patches are not available’– Review NCSC guidance publication named “Mitigating Malware”, specifically section four titled (see references for url):  – “What to do if you (or your organisation) has been infected with malware” Enterprise deployment or configuration considerations include… Follow industry best practice wherever, or whenever possible, however specific recommendations as follows… Following good practice, non-exhaustive:– Restrict use of system administration tools, i.e., PsExec, do admins really need to use it?– Disable unnecessary services, i.e., RDP/terminal services Backups – you might have them, but recommend testing them during quiet times! Logging:– goes without saying, but logs are essential– ensure logging is enabled wherever possible (and you have capacity for it), inc PowerShell logging and security– sysmon is also a handy tool,   – free from MS sysinternals  – offers valuable capabilities, event collection, processes, netcons, hashes, registry mods, file creations and more!  – SIEM forwarding, i.e., a sysmon add-on for splunk exists Software Restriction Policy (SRP):– SRPs are a Group Policy-based feature that identifies software programs running on computers in a domain– controls the ability of those programs to run, including specific file path locations, e.g., %APPDATA% directory in the user profile – Software restriction policies are part of the Microsoft security and management strategy Perform annual policy reviews and enforce compliance Detecting Compromised Hosts:– review available Indicators of Compromise (IoCs)   – SIEM, security solution revews (searchable audit trail if not fed into SIEM), cloud analytic services (e.g., MS Defender ATP)– Email Security / Gateway reviews  – ID recipients of an identified phishing email, solutions such as Mimecast can track users interaction with rewritted urls, malware may not have activated yet– undertake appropriate scanning / log reviews   – outbound traffic f/w log reviews  – vulnerability scan assets within specified IP ranges to detect assets and associated vulns, especially SMB related, e.g., eternalblue    (shine your light in your network! did you know about all assets listed in results?)  – SCCM review, are you offering all appropriate patches?    – marry up what is listed vuln wise within your vulnerabilty scanning tool asset results, and what is offered by SCCM     – use automatic deployment rules (ADRs) rather than adding new updates to an existing software update group    – typically, you use ADRs to deploy monthly software updates Proactiveness:Configure alerting on detection of – anomalous command execution, e.g., “vssadmin.exe Delete Shadows /All /Quiet”– unusual administrative tool use within SIEM, e.g., PsExec, net commands – privileged and service account monitoring– obfuscated commands, see something obfucated? it can’t be good PsExec spotlight:– The service PSEXESVC will be installed on the remote system  – 4697 and/or 7045 event log entry    – Note, the 4697 event, if available, may also contain account information  – may also have 4624 and/or 4625 Windows Event log entries, capturing the logon events of the tool usage.– SIEM search Application Compatibility Cache / RecentFileCache.bcf– evidence of program execution in the Application Compatibility Cache (“AppCompat”) and/or Amcache,   – replaces the RecentFileCache.bcf in newer Windows operating systems Last note on the topic of ‘external providers’ or contractors, non-exhaustive considerations:– their need to following org policy– what access into Enterprise they have– their skill level *Reading List*https://resources.infosecinstitute.com/what-you-should-know-about-ryuk-ransomware/https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ryuk-ransomware-shows-diversity-in-targets-consistency-in-higher-payoutshttps://success.trendmicro.com/solution/1123892-ryuk-ransomware-informationhttps://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/examining-ryuk-ransomware-through-the-lens-of-managed-detection-and-responsehttps://blog.trendmicro.com/trendlabs-security-intelligence/trickbots-bigger-bag-of-tricks/https://blog.malwarebytes.com/cybercrime/malware/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays/https://blog.malwarebytes.com/botnets/2019/09/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign/https://blog.talosintelligence.com/2019/09/emotet-is-back-after-summer-break.htmlhttps://www.wired.com/story/what-is-credential-stuffing/https://www.sentinelone.com/blog/ryuk-ransomware-targets-av-solutions-not-just-files/https://www.zdnet.com/article/development-stops-on-powershell-empire-framework-after-project-reaches-its-goal/https://arstechnica.com/information-technology/2019/01/new-ransomware-rakes-in-4-million-by-adopting-a-big-game-hunting-strategy/https://arstechnica.com/information-technology/2019/09/worlds-most-destructive-botnet-returns-with-stolen-passwords-and-email-in-tow/https://news.sophos.com/en-us/2019/10/04/rolling-back-ryuk-ransomware/https://www.bleepingcomputer.com/news/security/dch-hospital-pays-ryuk-ransomware-for-decryption-key/https://www.emsisoft.com/ransomware-decryption-tools/https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-toolshttps://www.ncsc.gov.uk/guidance/mitigating-malwarehttps://www.secjuice.com/enterprise-powershell-protection-logging/https://docs.microsoft.com/en-us/windows-server/identity/software-restriction-policies/software-restriction-policieshttps://4sysops.com/archives/application-whitelisting-software-restriction-policies-vs-applocker-vs-windows-defender-application-control/http://woshub.com/how-to-block-viruses-and-ransomware-using-software-restriction-policies/https://docs.microsoft.com/en-us/sccm/sum/deploy-use/automatically-deploy-software-updateshttps://www.blackhat.com/docs/us-17/thursday/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdfhttps://www.splunk.com/blog/2019/06/12/defending-against-common-phishing-frameworks-kits-with-splunk-enterprise-security-content-updates.htmlhttps://www.splunk.com/blog/2019/06/12/monitor-for-investigate-and-respond-to-phishing-payloads-with-splunk-enterprise-security-content-update.htmlhttps://www.splunk.com/blog/2017/07/06/hellsbells-lets-hunt-powershells.htmlhttps://digital-forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-divehttps://medium.com/@bromiley/digging-into-sysinternals-psexec-64c783bace2bEmotet:   https://attack.mitre.org/software/S0367/Trickbot: https://attack.mitre.org/software/S0266/PsExec:   https://attack.mitre.org/software/S0029/https://docs.microsoft.com/en-us/sysinternals/downloads/sysmonhttps://splunkbase.splunk.com/app/1914/https://github.com/MHaggis/sysmon-dfirhttps://www.zdnet.com/article/new-zealand-comcom-suffers-breach-after-laptop-theft/ *Further reading*https://www.cyber.gov.au/ism/guidelines-system-managementhttps://www.sans.org/reading-room/whitepapers/detection/disrupting-empire-identifying-powershell-empire-command-control-activity-38315https://www.cisco.com/c/dam/en/us/products/se/2019/2/Collateral/cybersecurity-series-threat.pdfhttps://www.staysmartonline.gov.au/   AUSCERT as a non-profit organisation aims to help all, and it is also my personal hope that this post will serve to empower Australians, even if in a small way.  Arriving during Stay Smart Online Week (7-13 October), it’s my pleasure to make this post to support the community, and their efforts in reversing or recovering from cybercrime.  For more information about Stay Smart Online week, please visit the dedicated Australian government website (see further reading). This post has been formed from a wide range of articles, blogs and publications (see reading list) and curious readers are encouraged to dig further if interested.  I will also highlight the important and informative efforts that those varying industry author groups or organisations have made, and continue to make. All efforts are critical in understanding the specific and evolving threats, and research made towards mitigation steps, or methodology formation.   Stay safe and stay smart! Colin Colin Chamberlain CISSP, GCFA, eCTHPSenior Information Security AnalystAUSCERT

Learn more

Week in review

AUSCERT Week in Review for 4th October 2019

4 Oct 2019

AUSCERT Week in Review for 4th October 2019 AUSCERT Week in Review04 October 2019 This week the ANU publicly released their report on the Nov 2018 breach oftheir administrative systems. This report is unique in that, as per thereport’s Forward, “provides details on the attack including the methodsused by the attacker” and “this publicly available report is the first ofits kind in Australia following a cyber attack on a public institution”. Members are encouraged to review the report to understand some of thethreats also faced by them and where possible incorporate the valuablelessons learned.     New Checkm8 jailbreak released for all iOS devices running A5 to A11 chipsDate: 27 SeptemberAuthor: ZDNet A security researcher has released today a new jailbreak that impactsall iOS devices running on A5 to A11 chipsets — chips included in allApple products released between 2011 and 2017, spanning eight generationsof devices, from iPhone 4S to iPhone 8 and X. Victorian hospitals targeted in ransomware attackDate: 1 OctoberAuthor: ABC News The Victorian Government is investigating the scale of a ransomwareattack by “sophisticated cyber criminals” on some of the state’s majorregional hospitals that has forced healthcare providers to go offline. Critical Remote Code Execution Vulnerability Patched in Exim Email ServerDate: 1 October A Critical vulnerability recently addressed in the popular open-sourceemail server Exim could lead to remote code execution.   Inside a massive cyber hack that risks compromising future leaders around the globeDate: 2 October Without anyone clicking on a link, a massive cyber attack of unprecedentedsophistication gained access to private information of potentiallyhigh-ranking officials across the globe. Thanks to the release of a 5,000-word report into the incident, the publiccan see for the fist time how sophisticated and extensive the attack onthe ANU was.   ANU hackers built ‘shadow ecosystem’ to stay hidden for six weeksDate: 3 October  

Learn more

Week in review

AUSCERT Week in Review for 27th September 2019

27 Sep 2019

AUSCERT Week in Review for 27th September 2019 Greetings, This week has been a mix of something old and something new. On the old side, a vBulletin zero-day gained attention, and whilst this was shocking news to some, it was old news to others as we learned it had been an exploited commodity for years. It’s good to be in the know it seems. Being in the know was echoed by Atlassian who published a community article stating their intention to retire support for Internet Explorer, coming at the same time as ZDNet’s report that Microsoft had released two brand-spanking patches, one to plug an IE zero-day, and the other squash a Defender bug. In a change of tact, interesting to hear that hackers are looking into new methods of injecting card stealing code on “Layer 7” routers to steal payment card details, instead of utilising websites. Whether this focus change is due to frustration in having their lovingly crafted websites taken-down, or in wanting to remain undetected for longer, one things is certain, this should highlight an organisations need to perform effective asset management and patch management practices. And in considering vulnerable assets, we should also consider those non-traditional or non-managed devices that connect to our networks and become potential threat vectors. As remote working practices are becoming more widely accepted, InsiderPro reported to the evolution of the Bring Your Own Device (BYOD) policy has recently raised discussions regarding Bring Your Own Office (BYOO). Perhaps it’s time to splash out on two sweet 27″ monitors for your home office. Lastly, a reminder to both enterprise and consumers that Windows 7 support will end on 14 January 2020, so perhaps new year, new secure you! And if you’re an Apple device user, then definitely check Wired’s article for checking your iOS 13 privacy and security features. vBulletin Zero-Day Exploited for Years, Gets Unofficial PatchDate: 25 SeptemberAuthor: BleepingComputer A zero-day exploit for the vBulletin forum platform was publicly disclosed and quickly used to attack affected versions of the forum software. It turns out, though, that this exploit has been known, utilized, and sold by researchers and attackers for years. Retiring IE11 support for Atlassian cloud, server, and data center productsDate: 23 SeptemberAuthor: AtlassianURL: https://community.atlassian.com/t5/Feedback-Forum-articles/Retiring-IE11-support-for-Atlassian-cloud-server-and-data-center/ba-p/1185312 In 2015 Microsoft released Edge as the browser to supersede Internet Explorer (IE). Since then IE has not received major updates, or added support for many modern web standards. Microsoft recently discouraged the use of Internet Explorer as a default browser, and we’ve also seen a decrease in IE11 usage across our cloud, server, and data center products over time. To allow us to continue to take advantage of modern web standards to deliver improved functionality and the best possible user experience across all of our products, we have decided to end support for IE11. Microsoft releases out-of-band security update to fix IE zero-day & Defender bugDate: 23 SeptemberAuthor: ZDNet Microsoft has released an emergency out-of-band security update today to fix two critical security issues — a zero-day vulnerability in the Internet Explorer scripting engine that has been exploited in the wild, and a Microsoft Defender bug.The updates stand out because Microsoft usually likes to stay the course and only release security updates on the second Tuesday of every month. The company rarely breaks this pattern, and it’s usually only for very important security issues. Hackers looking into injecting card stealing code on routers, rather than websitesDate: 25 SeptemberAuthor: ZDNet Security researchers at IBM have found evidence that hackers have been working on creating malicious scripts they can deploy on commercial-grade “Layer 7” routers to steal payment card details. Why your company needs a BYOO (bring your own office) policyDate: 23 SeptemberAuthor: InsiderPro Remote work is not a trend. It’s there to stay. Insider Pro columnist Mike Elgan explains why it’s time to re-orient your organisation’s thinking around workshifting and BYOO. Just as the reality of consumer devices drove the BYOD policy trend, the reality of remote work demands the systematic thinking and communication of a bring your own office (BYOO) policy. Windows 7 support will end on January 14, 2020Date: Aug 3, 2019Author: Microsoft Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 will be January 14, 2020. After that, technical assistance and software updates from Windows Update that help protect your PC will no longer be available for the product. The iOS 13 Privacy and Security Features You Should KnowDate: 22 SeptemberAuthor: WIRED Your iPhone just got a major security upgrade. The reputation of iOS security may have taken some dings of late, but it’s still one of the most secure consumer operating systems available. Here are all the ways the latest version keeps you even more protected. Here are some noteworthy bulletins from the week: ESB-2019.3609Adobe ColdFusion patched to resolve two critical and one important vulnerability. ESB-2019.3617Cisco IOx multiple vulnerabilities. ESB-2019.3616Cisco IOS XR root compromise vulnerability. ESB-2019.3648Confidential data access vulnerabilities patched in Apple iOS and iPadOS. ESB-2019.3641Apple iOS, macOS and watchOS were all patched due to an out-of-bounds readwith significant implications. As always, stay safe, stay patched, and make it a good weekend!Colin

Learn more

Week in review

AUSCERT Week in Review for 6th September 2019

26 Sep 2019

AUSCERT Week in Review for 6th September 2019 Greetings, Ask yourself this question. “Should I always believe what you see (or hear)?” As the week comes to a close, here are some articles that may help ease you into the weekend. Privacy concerns mount over Chinese face-swap app Zao Date published: 03/09/2019  Author: Mark Wycislik-Wilson Excerpt: “Zao — a Chinese face-swapping app with the potential to be used to create deepfakes — went viral over the weekend, shooting to the top of the App Store download charts. But concerns have been raised not only over the potential for the app to be abused, but also over its privacy policies. Of particular concern are clauses which grant the developers “free, irrevocable, permanent, transferable, and relicense-able” rights over users’ photos. Zao responded by tweaking its privacy policy, but complaints are still flooding in.” Nemty Ransomware Gets Distribution from RIG Exploit Kit Date published: 03/09/2019 Author: Ionut Ilascu Excerpt: “BleepingComputer saw that the post-encryption ransom demand was around $1,000 in bitcoin. Unfortunately, there is no free decryption tool available at the moment and the malware makes sure to remove the file shadows created by Windows. Security researcher Mol69 noticed that the file-encrypting malware is now a payload in malvertising campaigns from RIG exploit kit (EK). The malware used the .nemty extension for the encrypted files but the variant observed by Mol69 adds ‘._NEMTY_Lct5F3C_’ at the end of the processed files.” Scammer Successfully Deepfaked CEO’s Voice To Fool Underling Into Transferring $243,000 Date published: 03/09/2019 Author: Jennings Brown Excerpt: “The CEO of an energy firm based in the UK thought he was following his boss’s urgent orders in March when he transferred funds to a third-party. But the request actually came from the AI-assisted voice of a fraudster.” Threat Actor behind Astaroth is now using Cloudflare Workers to bypass your Security Solutions. Date published: 01/09/2019 Author: Marcel Afrahim Excerpt: “You might have seen the recently published report about a widespread fileless campaign called Astaroth by Microsoft Research Team that completely “lived off the land”: it only ran system tools throughout a complex attack chain. If you haven’t, you SHOULD definitely read the details of the research article done by the Microsoft team here. Following the report, the group behind the Astaroth attack campaign changed tactics and they ran a similar campaign again earlier in august with few changes, notably use of Cloudflare Workers. In this article I will try to show highlight the changes and show a clear chain of attack from the delivery till infection, something Microsoft research article failed to do.”   Here are this week’s noteworthy-ish security bulletins: 1) Firefox and Firefox ESR: Multiple vulnerabilities https://portal.auscert.org.au/bulletins/ASB-2019.0252/ Mozilla released updates for Firefox and Firefox ESR that addressed a large number of vulnerabilties, the most severe being a remote code execution vulnerability stemming from poor sanitization of logging related command line parameters. Luckily, this issue only affects Windows and not many people use that! 2) Cisco Small Business RV160, 260, and 340 Series VPN Routers: Root compromise – Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3369/ A number of Cisco small business VPN routers have been identified as being affected by a number of vulnerabilities. The most important of these deal with hardcoded password hashes stored for the root user stored in the firmware and the ability to view undocumented user accounts, which includes the “root” account! If you own any of these, please read the bulletin and update! 3) Cisco Identity Services Engine: Cross-site scripting – Remote with user interaction https://portal.auscert.org.au/bulletins/ESB-2019.3364/ More from Cisco! Cisco fixed a reflected XSS vulnerability in web-based management interface of its ISE product. 4) Cisco Content Security Management Appliance – Access confidential data –Existing account https://portal.auscert.org.au/bulletins/ESB-2019.3362/ Just one more Cisco bulletin. Cisco released a fix for an information disclosure vulnerability in its CCSM appliance, which originates from a role permissions implementation error allowing unauthorised access to other users spam folders, for example. Stay safe, stay patched, keep your eyes peeled and have a great weekend free of paranoia!  Nick

Learn more