101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

482
active users

#infoseccommunity

0 posts0 participants0 posts today
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⚠️ Windows SmartScreen Bypass Alert: CVE-2024-21351 Unveiled 🔓"</p><p>A new vulnerability, CVE-2024-21351, exposes a security feature bypass in Windows SmartScreen, enabling attackers to execute arbitrary code by tricking users into opening a malicious file. This flaw, with a CVSS score of 7.6, follows the previously patched CVE-2023-36025, indicating a method to circumvent Microsoft's efforts in securing its SmartScreen feature. Attackers exploit this vulnerability actively in the wild, despite Microsoft's release of an official fix. </p><p>Technical breakdown: CVE-2024-21351 allows code injection into SmartScreen, bypassing protections and potentially leading to data exposure or system unavailability. Cybersecurity professionals must understand the attack vector, which requires social engineering to convince a user to open a malicious file.</p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://infosec.exchange/tags/CVE2024" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2024</span></a>-21351 <a href="https://infosec.exchange/tags/SmartScreenBypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartScreenBypass</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> 🛡️💻🔧</p><p>Mitre CVE Summary: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21351" rel="nofollow noopener" target="_blank">CVE-2024-21351</a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 <a href="https://infosec.exchange/tags/FortinetFlaw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortinetFlaw</span></a> Alert! RCE Vulnerability in SSL VPN - Act Now! 🚨"</p><p>Fortinet's SSL VPN is in the spotlight due to a newly discovered RCE vulnerability, potentially exploited in recent attacks due to the existence of an exploit being publicly available. Identified as CVE-2022-40684 (FG-IR-24-015) (Critical/9.8 rating), this flaw allows unauthenticated attackers to execute arbitrary code. Upgrading to version 6.2.16, 6.4.15, 7.0.14, 7.2.7 or 7.4.3 eliminates this vulnerability. Security researchers urge immediate patching as exploits are likely circulating. 🛡️💻🔐</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/SSLVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSLVPN</span></a> <a href="https://infosec.exchange/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a></p><p>Source: <a href="https://www.bleepingcomputer.com/news/security/new-fortinet-rce-flaw-in-ssl-vpn-likely-exploited-in-attacks/" rel="nofollow noopener" target="_blank">BleepingComputer</a>, <a href="https://www.tenable.com/plugins/nessus/190238" rel="nofollow noopener" target="_blank">Tenable</a></p><p>Tags: <a href="https://infosec.exchange/tags/CVE2022" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2022</span></a>-40684 <a href="https://infosec.exchange/tags/FORTIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FORTIOS</span></a> <a href="https://infosec.exchange/tags/SecurityUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdate</span></a> <a href="https://infosec.exchange/tags/Mitigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitigation</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/FGIR24015" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FGIR24015</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 2x High Alert: Ivanti's CVE-2024-21888 - Privilege Escalation Vulnerability AND CVE-2024-21893 - Server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure🚨"</p><p>A high-severity vulnerability, CVE-2024-21888, has been identified in Ivanti Connect Secure &amp; Ivanti Policy Secure (versions 9.x, 22.x). This vulnerability permits privilege escalation, allowing a user to gain administrative privileges. </p><p>And also a high vulnerability, named CVE-2024-21893, has been discovered in Ivanti Connect Secure and Policy Secure up to versions 9.1R18/22.6R2. This vulnerability affects the SAML component and can be exploited remotely. It allows an attacker to manipulate unknown input, leading to a server-side request forgery issue. There is no publicly available exploit. </p><p>A patch has been released to address this vulnerability. Admins are advised to apply patches ASAP and consider a factory reset of devices as an extra precaution.</p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/VulnerabilityAlert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityAlert</span></a> <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://infosec.exchange/tags/CVE202421888" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202421888</span></a> <a href="https://infosec.exchange/tags/CVE2024221893" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2024221893</span></a> <a href="https://infosec.exchange/tags/PrivilegeEscalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeEscalation</span></a> <a href="https://infosec.exchange/tags/PatchManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchManagement</span></a> <a href="https://infosec.exchange/tags/InfosecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfosecCommunity</span></a> <a href="https://infosec.exchange/tags/SystemAdmins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemAdmins</span></a> 🔐💻🛡️ </p><p>Source: <a href="https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US" rel="nofollow noopener" target="_blank">Ivanti's Forums</a> <a href="https://www.tenable.com/cve/CVE-2024-21888" rel="nofollow noopener" target="_blank">Tenable</a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Akira Ransomware Strikes! Bucks County's Emergency Services Crippled 🚨"</p><p>Bucks County's emergency dispatch system faced a severe cyberattack, which is now traced back to the notorious Akira ransomware gang. This attack resulted in significant operational disruptions, forcing emergency services to revert to manual methods. As a sophisticated group known for targeting governments and businesses globally, Akira's modus operandi includes charging exorbitant ransoms for releasing hijacked data. The county, in collaboration with federal agencies, continues to investigate, maintaining operational 9-1-1 services despite the challenges.</p><p>Source: <a href="https://www.nbcphiladelphia.com/news/local/akira-ransomware-behind-bucks-co-security-attack-that-crippled-emergency-dispatch-system-officials-say/3759350/" rel="nofollow noopener" target="_blank">Hayden Mitman via nbcphiladelphia.com</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/EmergencyServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmergencyServices</span></a> <a href="https://infosec.exchange/tags/AkiraRansomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AkiraRansomware</span></a> <a href="https://infosec.exchange/tags/BucksCounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BucksCounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> 🚒🔒💻</p><p>Additional insights from Sophos News highlight the Akira ransomware gang's techniques, including exploiting Remote Desktop Protocol (RDP) for lateral movement and utilizing tools like Advanced IP Scanner for network reconnaissance. They're known for persistence tactics, such as creating user accounts and modifying registry keys for sustained access. Defense evasion strategies include uninstalling security tools and manipulating Windows Defender settings. For command-and-control, AnyDesk and bespoke Trojans are employed for remote network access.</p><p>This deep dive into Akira's tactics emphasizes the need for robust cybersecurity measures in critical infrastructure sectors.</p><p>Source: <a href="https://news.sophos.com/en-us/2023/12/21/akira-again-the-ransomware-that-keeps-on-taking/" rel="nofollow noopener" target="_blank">Sophos News</a></p><p>Tags: <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/RansomwareTactics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomwareTactics</span></a> <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> 🛡️💡💻</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⚠️ Chae$ 4.1: Taunting direct message to researchers at Morphisec within the source code. ⚠️"</p><p>The original Chae$ malware was identified in September 2023, and its latest version, dubbed Chae$ 4.1, employs advanced code polymorphism to bypass antivirus detection. It also includes a direct message to Morphisec researchers thanking them for their effort and hoping not to disappoint. </p><p>That's got to sting...</p><p>🛡️💻🔒</p><p>Source: <a href="https://www.hackread.com/fake-fix-chaes-4-1-malware-hides-driver-downloads/" rel="nofollow noopener" target="_blank">Hackread by Deeba Ahmed</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAlert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAlert</span></a> <a href="https://infosec.exchange/tags/Chae" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chae</span></a>$Malware <a href="https://infosec.exchange/tags/Morphisec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Morphisec</span></a> <a href="https://infosec.exchange/tags/AdvancedThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdvancedThreats</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/DriverScam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DriverScam</span></a> <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://infosec.exchange/tags/UserAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UserAwareness</span></a> 🚨🌍💡</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"DarkGate Malware Unleashed: A New Threat in the Cybersecurity Arena 🚨"</p><p>The Splunk Threat Research Team has recently conducted an in-depth analysis of DarkGate malware, uncovering its utilization of the AutoIt scripting language for malicious purposes. This malware is notorious for its sophisticated evasion techniques and persistence, posing a significant threat. DarkGate employs multi-stage payloads and leverages obfuscated AutoIt scripts, making it difficult to detect through traditional methods. It is capable of exfiltrating sensitive data and establishing command-and-control communications, underscoring the need for vigilant detection strategies.</p><p>The key tactics and techniques of DarkGate include keylogging, remote connections, registry persistence, browser information theft, and C2 communication. One of its attack vectors involves the use of malicious PDF files that trigger the download of a .MSI file containing the DarkGate payload, demonstrating the complex strategies employed by adversaries.</p><p>For threat emulation and testing, the team recommends employing an Atomic Test focused on AutoIt3 execution (as per the MITRE ATT&amp;CK technique T1059). Security teams are advised to concentrate on endpoint telemetry sources such as Process Execution &amp; Command Line Logging, Windows Security Event Logs, and PowerShell Script Block Logging for effective detection.</p><p>Special commendations to authors Teoderick Contreras and Michael Haag, and the entire Splunk Threat Research Team, for their comprehensive analysis.</p><p>Tags: <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> <a href="https://infosec.exchange/tags/AutoIt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AutoIt</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/MITREATTACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITREATTACK</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/SplunkResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SplunkResearch</span></a></p><p><a href="https://www.splunk.com/en_us/blog/security/enter-the-gates-an-analysis-of-the-darkgate-autoit-loader.html" rel="nofollow noopener" target="_blank">Blog Splunk Threat Research Team</a></p>
cackalackycon<p>Do you have a mentee, friend, or even yourself that's done something cool and ready to present it this year?</p><p>We encourage you to submit it to Cackalacky Con <a href="https://infosec.exchange/tags/callforpapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>callforpapers</span></a> open now for the <a href="https://infosec.exchange/tags/infoseccommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoseccommunity</span></a> <a href="https://infosec.exchange/tags/conference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conference</span></a> on May 17-19, 2024</p><p><a href="https://infosec.exchange/tags/CFP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CFP</span></a> <a href="https://infosec.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://infosec.exchange/tags/hackercon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackercon</span></a> </p><p><a href="https://docs.google.com/forms/d/e/1FAIpQLSeEzxjhhfyjbgrJtlTeJhPyVsmHhTBdopg9dw3WZ71KeIXVMg/viewform" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.google.com/forms/d/e/1FAI</span><span class="invisible">pQLSeEzxjhhfyjbgrJtlTeJhPyVsmHhTBdopg9dw3WZ71KeIXVMg/viewform</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"Intellexa and Cytrox: The Evolution of Spyware into Intel Agency-Grade Threats 🚨"</p><p>In a recent study by Cisco Talos researchers, they delved into the complex workings of Predator Spyware, a highly advanced commercial spyware. Developed by the Intellexa Alliance, which encompasses firms like Cytrox, Nexa Technologies, and Senpai Technologies, Predator has gained notoriety for its ability to remain operational even after a device reboot, a feature dependent on the specific licensing option chosen by the client. Moreover, the spyware is designed with geographical usage restrictions, but these can be relaxed for an additional charge.</p><p>The spyware, notorious enough to be listed on the U.S. Entity List in July 2023 for its role in cyber espionage, relies heavily on a loader component known as Alien. This symbiotic relationship enhances Predator's effectiveness, particularly in targeting both Android and iOS devices.</p><p>Predator stands out for its exclusive licensing model, often priced at millions of dollars, thereby restricting its accessibility to only sophisticated cybercriminals. It belongs to a class of spyware, akin to Pegasus, that exploits zero-day vulnerabilities. However, these programs also can purchase exploit chains from external brokers. Notably, Intellexa's business strategy involves offloading the setup of attack infrastructure to its customers, a move that allows the company to maintain plausible deniability.</p><p>Source: <a href="https://blog.talosintelligence.com/intellexa-and-cytrox-intel-agency-grade-spyware/" rel="nofollow noopener" target="_blank">Talos Intelligence Blog</a></p><p>Tags: <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> <a href="https://infosec.exchange/tags/Cytrox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cytrox</span></a> <a href="https://infosec.exchange/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DigitalSurveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSurveillance</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> 🌐🔓🕵️‍♂️📱</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 <a href="https://infosec.exchange/tags/NKabuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NKabuse</span></a> Exposed: North Korean APT's Sophisticated Cyber Espionage 🕵️‍♂️🌍"</p><p>Kaspersky's Global Emergency Response Team (GERT) and GReAT have identified a new multiplatform threat named "NKAbuse," which exploits the NKN (New Kind of Network) protocol. This malware, written in Go, targets primarily Linux desktops but can also infect MISP and ARM systems, posing a risk to IoT devices. NKAbuse infiltrates systems by uploading an implant, establishing persistence through a cron job, and installing itself in the host's home folder. It offers a range of capabilities, including flooding, backdoor access, and remote administration (RAT).</p><p>The initial attack vector exploited an old vulnerability related to Struts2 (CVE-2017-5638 - Apache Struts2), targeting a financial company. NKAbuse uses the NKN protocol for bot communication, enabling it to perform a variety of DDoS attacks and act as a backdoor. It also has RAT capabilities, allowing it to capture screenshots, manage files, and execute system commands. This threat is notable for its use of blockchain technology, ensuring reliability and anonymity, and has been detected in Colombia, Mexico, and Vietnam. </p><p>The article, written by Costin Raiu, Brian Bartholomew, and team, unravels IoC's and NKabuse's tactics, including a custom backdoor and strategic web compromises. 🧩🔐</p><p>Source: <a href="https://securelist.com/unveiling-nkabuse/111512/" rel="nofollow noopener" target="_blank">Securelist - Unveiling NKabuse</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberEspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberEspionage</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/KonniRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KonniRAT</span></a> <a href="https://infosec.exchange/tags/StateSponsored" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsored</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⚠️ ATMZOW's Sophisticated Skimming: 40 New Domains Uncovered ⚠️"</p><p>Sucuri's Denis Sinegubko (@unmaskparasites on Twitter) has found 40 new domains linked to the ATMZOW skimmer group. They're known for infecting Magento sites since 2015. These new domains use Google Tag Manager to hide their malicious activity, making it hard to detect and prolonging their attack. ATMZOW keeps coming up with new ways to steal credit card info, showing how cyber threats keep evolving. This reminds us to keep an eye on unfamiliar website scripts. </p><p>A recent report revealed that ATMZOW compromised 40 new Google Tag Manager domains, affecting thousands of sites. They target Google Tag Manager because it's widely used and can insert code. The breach involves complex code in the GTM-TVKQ79ZS container, making it tough to decipher. The attackers also use a naming strategy for their domains to avoid detection. They've created new containers like GTM-NTV2JTB4 and GTM-MX7L8F2M with the same bad code, reinfecting compromised websites. Stay informed and stay safe! 💻🔍🛡️</p><p>Source: <a href="https://blog.sucuri.net/2023/12/40-new-domains-of-magecart-veteran-atmzow-found-in-google-tag-manager.html" rel="nofollow noopener" target="_blank">Sucuri Blog</a></p><p>Tags: <a href="https://infosec.exchange/tags/ATMZOW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATMZOW</span></a> <a href="https://infosec.exchange/tags/Magecart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Magecart</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/EcommerceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EcommerceSecurity</span></a> <a href="https://infosec.exchange/tags/ObfuscationTechniques" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ObfuscationTechniques</span></a> <a href="https://infosec.exchange/tags/GoogleTagManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleTagManager</span></a> <a href="https://infosec.exchange/tags/InfosecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfosecCommunity</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🔍 Decoding PlugX: A Comprehensive Analysis by Splunk Threat Research Team 🛡️"</p><p>The Splunk Threat Research Team delves into the PlugX malware, revealing its sophisticated side-loading technique and multi-layered encryption methods. 🕵️‍♂️💻</p><p>Highlights:</p><ul><li>PlugX employs side-loading and RC4 algorithm for stealthy execution.</li><li>Utilizes 'msbtc.exe' for malicious code execution.</li><li>STRT's 'plugx_extractor.py' tool aids in threat analysis and data extraction.</li><li>Keylogging and user impersonation are among its insidious features.</li></ul><p>Indicators of Compromise (IoCs):</p><ul><li>msbtc.cfg (SHA256: 66f9cc42c27cf689911f6ba3e24ad9cbec6fa3066a50c448d4cbf5d8a66d2eb5)</li><li>msbtc.dat (SHA256: f991c13a24df578a9f31741a263dc1405eac660d4e749465991bac68eccdc490)</li><li>More in the article.</li></ul><p>Thanks to Teoderick Contreras and team for this insightful piece!👏</p><p>Source: <a href="https://www.splunk.com/en_us/blog/security/unmasking-the-enigma-a-historical-dive-into-the-world-of-plugx-malware.html" rel="nofollow noopener" target="_blank">Splunk Blog</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/PlugX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PlugX</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Splunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Splunk</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/SideLoading" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SideLoading</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> 🌍🔐📊</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⚠️ Apache Struts Vulnerability Alert: CVE-2023-41835 🛡️"</p><p>A recent security bulletin, ESB-2023.7343, has highlighted a significant vulnerability in Apache Struts, affecting versions 2.0.0 through 2.5.31 and 6.1.2.1 through 6.3.0. The issue, identified as CVE-2023-41835, carries a CVSS score of 7.5, indicating a high level of severity. This vulnerability arises when multipart requests exceed the maxStringLength limit, leading to the retention of uploaded files in the struts.multipart.saveDir, even if the request is denied. The recommended action is to upgrade to Struts versions 2.5.32, 6.1.2.2, or 6.3.0.1 or later, which contain the necessary patches. For further details and updates, refer to the original bulletin at <a href="https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft" rel="nofollow noopener" target="_blank">Apache Struts Security Bulletin</a>. For detailed vulnerability info, visit <a href="https://www.cve.org/CVERecord?id=CVE-2023-41835" rel="nofollow noopener" target="_blank">CVE-2023-41835</a>.</p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/ApacheStruts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheStruts</span></a> <a href="https://infosec.exchange/tags/CVE202341835" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202341835</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> 🌍🔐🛡️</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⚠️ <a href="https://infosec.exchange/tags/HPEOneView" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HPEOneView</span></a> Alert! Triple Vulnerability Threat Uncovered ⚠️"</p><p>Hewlett Packard Enterprise's OneView Software is under the spotlight with three critical vulnerabilities identified. These flaws can lead to authentication bypass, sensitive data exposure, and even denial of service. If you're using HPE OneView, it's time to patch up! 🛡️</p><p>Vulnerabilities:<br>1️⃣ CVE-2023-30908 – Remote Authentication Bypass: Scored a whopping 9.8 on CVSS, this flaw allows attackers to bypass authentication due to mishandling of user credentials in HPE OneView. Kudos to Sina Kheirkhah (<span class="h-card" translate="no"><a href="https://infosec.exchange/@SinSinology" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SinSinology</span></a></span>) from the Summoning Team (@SummoningTeam) for reporting this! 🕵️‍♂️</p><p>2️⃣ CVE-2022-4304 – Disclosure of Sensitive Information: A timing-based side channel in OpenSSL's RSA Decryption can leak sensitive info. Attackers can exploit this by sending numerous trial decryption messages. 📩</p><p>3️⃣ CVE-2023-2650 – Denial of Service: This flaw lies in OpenSSL's OBJ_obj2txt() method, allowing attackers to launch a DoS attack on HPE OneView. 🚫</p><p>Impacted? 🤔 Versions prior to v8.5 and v6.60.05 patch are vulnerable. But don't fret! HPE has released patches for these versions. Head to the HPE Support Center and upgrade ASAP! ⏳</p><p>Source: <a href="https://cybersecuritynews.com/hpe-oneview-vulnerability/" rel="nofollow noopener" target="_blank">Guru's Article, September 11, 2023</a></p><p>Tags: <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/HPE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HPE</span></a> <a href="https://infosec.exchange/tags/VulnerabilityAlert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityAlert</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> <a href="https://infosec.exchange/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a> <a href="https://infosec.exchange/tags/AuthenticationBypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AuthenticationBypass</span></a> <a href="https://infosec.exchange/tags/SensitiveDataLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SensitiveDataLeak</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a></p>