Malware Devil

Wednesday, June 30, 2021

2021-06-30 – TA551 (Shathak) pushes Trickbot with DarkVNC and Cobalt Strike

The post 2021-06-30 – TA551 (Shathak) pushes Trickbot with DarkVNC and Cobalt Strike appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/2021-06-30-ta551-shathak-pushes-trickbot-with-darkvnc-and-cobalt-strike/?utm_source=rss&utm_medium=rss&utm_campaign=2021-06-30-ta551-shathak-pushes-trickbot-with-darkvnc-and-cobalt-strike

PrintNightmare, the zero-day hole in Windows – here’s what to do

All bugs are equal. But some bugs ar emore equal than others.
Read More

The post PrintNightmare, the zero-day hole in Windows – here’s what to do appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do/?utm_source=rss&utm_medium=rss&utm_campaign=printnightmare-the-zero-day-hole-in-windows-heres-what-to-do

Why DAST – from Project Management Perspective

Watch today’s episode of ESW on Why DAST – from Project Management Perspective with Suha Akyuz from Netsparker at https://securityweekly.com/esw233 !

The post Why DAST – from Project Management Perspective appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/why-dast-from-project-management-perspective/?utm_source=rss&utm_medium=rss&utm_campaign=why-dast-from-project-management-perspective

We Infiltrated a Counterfeit Check Ring! Now What?

Imagine waking up each morning knowing the identities of thousands of people who are about to be mugged for thousands of dollars each. You know exactly when and where each of those muggings will take place, and you’ve shared this information in advance with the authorities each day for a year with no outward indication that they are doing anything about it. How frustrated would you be?

A counterfeit check image [redacted] that was intended for a person helping this fraud gang print and mail phony checks tied to a raft of email-based scams. One fraud-fighting group is intercepting hundreds to thousands of these per day.

Such is the curse of the fraud fighter known online by the handles “Brianna Ware” and “BWare” for short, a longtime member of a global group of volunteers who’ve infiltrated a cybercrime gang that disseminates counterfeit checks tied to a dizzying number of online scams.

For the past year, BWare has maintained contact with an insider from the criminal group that’s been sending daily lists of would-be victims who are to receive counterfeit checks printed using the real bank account information of legitimate companies.

“Some days we’re seeing thousands of counterfeit checks going out,” BWare said.

The scams used in connection with the fraudulent checks vary widely, from fake employment and “mystery shopper” schemes to those involving people who have been told they can get paid to cover their cars in advertisements (a.k.a. the “car wrap” scam).

A form letter mailed out with a counterfeit check urges the recipient to text a phone number after the check has been deposited.

Most of the counterfeit checks being disseminated by this fraud group are in amounts ranging from $2,500 to $5,000. The crimes that the checks enable are known variously as “advanced fee” scams, in that they involve tricking people into making payments in anticipation of receiving something of greater value in return.

But in each scheme the goal is the same: Convince the recipient to deposit the check and then wire a portion of the amount somewhere else. A few days after the check is deposited, it gets invariably canceled by the organization whose bank account information was on the check. And then person who deposited the phony check is on the hook for the entire amount.

“Like the car wrap scam, where they send you a check for $5,000, and you agree to keep $1,000 for your first payment and send the rest back to them in exchange for the car wrap materials,” BWare said. “Usually the check includes a letter that says they want you to text a specific phone number to let them know you received the check. When you do that, they’ll start sending you instructions on how and where to send the money.”

A typical confirmation letter that accompanies a counterfeit check for a car wrap scam.

Traditionally, these groups have asked recipients to transit money via wire transfer. But these days, BWare said, the same crooks are now asking people to forward the money via mobile applications like CashApp and Venmo.

BWare and other volunteer fraud fighters believe the fake checks gang is using people looped into phony employment schemes and wooed through online romance scams to print the counterfeit checks, and that other recruits are responsible for mailing them out each day.

“More often than not, the scammers creating the shipping labels will provide those to an unwitting accomplice, or the accomplice is told to log in to an account and print the labels,” BWare explained.

Often the counterfeit checks and labels forwarded by BWare’s informant come with notes attached indicating the type of scam with which they are associated.

“Sometimes they’re mystery shopper scams, and other times it’s overpayment for an item sold on Craigslist,” BWare said. “We don’t know how the scammers are getting the account and routing numbers for these checks, but they are drawn on real companies and always scan fine through a bank’s systems initially. The recipients can deposit them at any bank, but we try to get the checks to the banks when we can so they have a heads up.”

SHRINKING FROM THE FIREHOSE?

Roughly a year ago, BWare’s group started sharing its intelligence with fraud investigators at FedEx and the U.S. Postal Service — the primary delivery mechanisms for these counterfeit checks.

Both the USPS and FedEx have an interest in investigating because the fraudsters in this case are using stolen shipping labels paid for by companies who have no idea their FedEx or USPS accounts are being used for such purposes.

“In most cases, the name of the sender will be completely unrelated to what’s being sent,” BWare said. “For example, you’ll see a label for a letter to go out with a counterfeit check for a car wrap scam, and the sender on the shipping label will be something like XYZ Biological Resources.”

But BWare says a year later, there is little sign that anyone is interested in acting on the shared intelligence.

“It’s so much information that they really don’t want it anymore and they’re not doing anything about it,” BWare said of FedEx and the USPS. “It’s almost like they’re turning a blind eye. There are so many of these checks going out each day that instead of trying to drink from the firehouse, they’re just turning their heads.”

FedEx did not respond to requests for comment. The U.S. Postal Inspection Service responded with a statement saying it “does not comment publicly on its investigative procedures and operational protocols.”

ANY METHOD THAT WORKS

Ronnie Tokazowski is a threat researcher at Agari, a security firm that has closely tracked many of the groups behind these advanced fee schemes [KrebsOnSecurity interviewed Tokazowski in 2018 after he received a security industry award for his work in this area].

Tokazowski said it’s likely the group BWare has infiltrated is involved in a myriad other email fraud schemes, including so-called “business email compromise” (BEC) or “CEO scams,” in which the fraudsters impersonate executives at a company in the hopes of convincing someone at the firm to wire money for payment of a non-existent invoice. According to the FBI, BEC scams netted thieves nearly $2 billion in 2020 — far more than any other type of cybercrime.

In a report released in 2019 (PDF), Agari profiled a group it dubbed “Scattered Canary” that is operating principally out of West Africa and dabbles in a dizzying array of schemes, including BEC and romance scams, FEMA and SBA loans, unemployment insurance fraud, counterfeit checks and of course money laundering.

Image: Agari.

Tokazowski said he doesn’t know if the group BWare is watching has any affiliation with Scattered Canary. But he said his experience with Scattered Canary shows these groups tend to make money via any and all methods that reliably produce results.

“One of the things that came out of the Scattered Canary report was that the actors we saw doing BEC scams were the same actors doing the car wrap and various Craigslist scams involving fake checks,” he said. “The people doing this type of crime will have tutorials on how to run the scam, how to wire money out for unemployment fraud, how to target people on Craigslist, and so on. It’s very different from the way a Russian hacking group might go after one industry vertical or piece of software or focus on one or two types of fraud. They will follow any method they can that works.”

Tokazowski said he’s taken his share of flack from people on social media who say his focus on West African nations as the primary source of these advanced fee and BEC scams is somehow racist [KrebsOnSecurity experienced a similar response to the 2013 stories, Spy Service Exposes Nigerian ‘Yahoo Boys’, and ‘Yahoo Boys’ Have 419 Facebook Friends].

But Tokazowski maintains he has been one of the more vocal proponents of the idea that trying to fight these problems by arresting those involved is something of a Sisyphean task, and that it makes way more sense to focus on changing the economic realities in places like Nigeria, which has been a hotbed of advanced fee activity for decades.

Nigeria has the world’s second-highest unemployment rate — rising from 27.1 percent in 2019 to 33 percent in 2020, according to the National Bureau of Statistics. The nation also is among the world’s most corrupt, according to 2020 findings from Transparency International.

“Education is definitely one piece, as raising awareness is hands down the best way to get ahead of this,” Tokazowski said. “But we also need to think about ways to create more business opportunities there so that people who are doing this to put food on the table have more legitimate opportunities. Unfortunately, thanks to the level of corruption of government officials, there are a lot of cultural reasons that fighting this type of crime at the source is going to be difficult.”

Read More

The post We Infiltrated a Counterfeit Check Ring! Now What? appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/we-infiltrated-a-counterfeit-check-ring-now-what/?utm_source=rss&utm_medium=rss&utm_campaign=we-infiltrated-a-counterfeit-check-ring-now-what

Indexsinas SMB Worm Campaign Infests Whole Enterprises

The self-propagating malware’s attack chain is complex, using former NSA cyberweapons, and ultimately drops cryptominers on targeted machines.
Read More

The post Indexsinas SMB Worm Campaign Infests Whole Enterprises appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/indexsinas-smb-worm-campaign-infests-whole-enterprises/?utm_source=rss&utm_medium=rss&utm_campaign=indexsinas-smb-worm-campaign-infests-whole-enterprises

MalWare Labs & Why You Should Challenge Shift-Left Testing – ESW #233

Threat hunters are under increased pressure to rapidly analyze, classify, detect and respond to malicious files. ReversingLabs is stepping forward to address these needs with its new Malware Lab Solution. The ReversingLabs Malware Lab solution powers the next generation of threat hunting by delivering a unique combination of static and dynamic analysis capabilities at scale to identify malicious files including those in the software supply chain.

This segment is sponsored by Reversing Labs.

Visit https://securityweekly.com/ReversingLabs to learn more about them!

The development life cycle as we know it is rapidly changing, and today’s AppSec testing needs to keep up with shorter and faster processes. A shift-left approach is no longer enough to protect web assets – you need much more dynamic tools and ways of working.

This segment is sponsored by Detectify.

Visit https://securityweekly.com/detectify to learn more about them!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw233

The post MalWare Labs & Why You Should Challenge Shift-Left Testing – ESW #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/malware-labs-why-you-should-challenge-shift-left-testing-esw-233/?utm_source=rss&utm_medium=rss&utm_campaign=malware-labs-why-you-should-challenge-shift-left-testing-esw-233

Noname Security, JFrog Acquires Vdoo, Micro Segmentation, & AWS Buys Wickr – ESW #233

This week, In the Enterprise News, Atos launches thinkAI, AWS welcomes Wickr to the team, U.S. DoD approves two (ISC)² certifications as requirements for staff, JFrog to acquire Vdoo, & more!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw233

The post Noname Security, JFrog Acquires Vdoo, Micro Segmentation, & AWS Buys Wickr – ESW #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/noname-security-jfrog-acquires-vdoo-micro-segmentation-aws-buys-wickr-esw-233/?utm_source=rss&utm_medium=rss&utm_campaign=noname-security-jfrog-acquires-vdoo-micro-segmentation-aws-buys-wickr-esw-233

Why DAST – from Project Management Perspective – Suha Akyuz – ESW #233

More than 96% of software development projects fail across the globe because too many businesses rely on the legacy DevOps process which allows us to run security testing right before going to production. Using the legacy DevOps can lead to a downfall of the project management triangle (Budget, Scope, and Time). However, with more efficient use of dynamic application security testing tools (DAST) in every single stage/sprint, the legacy DevOps can be transformed into DevSecOps, in turn preventing our projects from failing.

This segment is sponsored by Netsparker.

Visit https://securityweekly.com/netsparker to learn more about them!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw233

The post Why DAST – from Project Management Perspective – Suha Akyuz – ESW #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/why-dast-from-project-management-perspective-suha-akyuz-esw-233/?utm_source=rss&utm_medium=rss&utm_campaign=why-dast-from-project-management-perspective-suha-akyuz-esw-233

Why MTTR is Bad for SecOps

Kerry Matre, senior director at Mandiant, discusses the appropriate metrics to use to measure SOC and analyst performance, and how MTTR leads to bad behavior.
Read More

The post Why MTTR is Bad for SecOps appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/why-mttr-is-bad-for-secops/?utm_source=rss&utm_medium=rss&utm_campaign=why-mttr-is-bad-for-secops

Zero-Day Used to Wipe My Book Live Devices

Threat actors may have been duking it out for control of the compromised devices, first using a 2018 RCE, then password-protecting a new vulnerability.
Read More

The post Zero-Day Used to Wipe My Book Live Devices appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/zero-day-used-to-wipe-my-book-live-devices/?utm_source=rss&utm_medium=rss&utm_campaign=zero-day-used-to-wipe-my-book-live-devices

PoC Exploit Circulating for Critical Windows Print Spooler Bug

The “PrintNightmare” bug may not be fully patched, some experts are warning, leaving the door open for widespread remote code execution attacks.
Read More

The post PoC Exploit Circulating for Critical Windows Print Spooler Bug appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/poc-exploit-circulating-for-critical-windows-print-spooler-bug/?utm_source=rss&utm_medium=rss&utm_campaign=poc-exploit-circulating-for-critical-windows-print-spooler-bug

SolarMarker Malware Stealing User Information Through PDFs

The hackers behind the malware called SolarMarker have begun using an innovative and unexpected means of distributing their poisoned code.

They’ve started publishing PDF documents filled with SEO (Search Engine Optimization) keywords in a bid to boost the visibility of malicious websites that pose as Google Drive, but in fact, are simply repositories for the malware itself.

A potential victim may get an email containing a PDF promising detailed information on attractive insurance rates or attractive credit card deals. Clicking on the links in the PDF will redirect the victim to a site designed to look like Google Drive, with instructions to download a different file on the drive. It is the act of clicking the file on the drive that dooms the user.

SEO is a tried and true marketing tactic used by legitimate business owners to drive traffic to their sites, co-opted, in this case, for a nefarious purpose. Unfortunately, it has proven to be a wildly effective thus far.

As to the malware itself, SolarMarker is a backdoor malware that steals login credentials and other data from web browsers. So it’s not harmful on its own, but it makes it easier for the hackers controlling it to introduce damaging malware down the road and/or steal a victim’s identity.

Crowdstrike was the first company to sound the alarm when researchers at the company first discovered the unusual marketing campaign for the malware. Note that thus far, at least, SolarMarker’s makers seem to have focused the bulk of their attention on North America.

PDFs have been used for a very long time to deliver malicious payloads, but the unusual methodology used here makes this attack noteworthy. Be on your guard against any PDFs you or your staff receive from unknown, un-trusted sources. Clicking links embedded in those files may net you much more than you bargained for, and not in a good way.

Used with permission from Article Aggregator

Read More

The post SolarMarker Malware Stealing User Information Through PDFs appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/solarmarker-malware-stealing-user-information-through-pdfs/?utm_source=rss&utm_medium=rss&utm_campaign=solarmarker-malware-stealing-user-information-through-pdfs

Menlo Security Poll Finds Resistance to Ransom Demands

A poll of 8,571 individuals conducted on Twitter by Menlo Security suggests business and IT leaders are becoming more inclined to accept financial losses rather than cave to ransomware demands. A full 79% of respondents said they would not pay ransom to regain access to their data. Among those that would pay, however, two in..

The post Menlo Security Poll Finds Resistance to Ransom Demands appeared first on Security Boulevard.

Read More

The post Menlo Security Poll Finds Resistance to Ransom Demands appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/menlo-security-poll-finds-resistance-to-ransom-demands/?utm_source=rss&utm_medium=rss&utm_campaign=menlo-security-poll-finds-resistance-to-ransom-demands

Vulnerabilities in Microsoft Print Spooler (CERT-EU Security Advisory 2021-033)

On the 8th or June 2021, Microsoft as part of the Patch Tuesday release has issues updates that addressed multiple vulnerabilities including the Windows Print Spooler Remote Code Execution Vulnerability CVE-2021-1675 with CVSS score 7.8. This vulnerability was initially rated as a low-importance elevation-of-privilege vulnerability, but on the 21th of June Microsoft reviewed the issue and labeled it as a remote code execution flaw.
Proof-of-concept exploit code for the CVE-2021-1675 flaw has been published online, the flaw impacts the Windows Print Spooler service and could be exploited to compromise Windows systems. Moreover, because normally the Spooler service is enabled by default, it is highly recommended to apply the patches as soon as possible.
Read More

The post Vulnerabilities in Microsoft Print Spooler (CERT-EU Security Advisory 2021-033) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/vulnerabilities-in-microsoft-print-spooler-cert-eu-security-advisory-2021-033/?utm_source=rss&utm_medium=rss&utm_campaign=vulnerabilities-in-microsoft-print-spooler-cert-eu-security-advisory-2021-033

🔴 LIVE: Enterprise Security Weekly #233

This week, in our first segment, we welcome Suha Akyuz, Application Security Manager of Invicti Security, to discuss “Why DAST, from Project Management Perspective”! Then, we jump straight into the Enterprise News! Finally, we close out the show with two pre-recorded interviews from RSA featuring Mario Vuksan, CEO & Co-Founder of ReversingLabs, & Rickard Carlsson, Co-founder & CEO of Detectify!

→Full Show Notes: https://www.securityweekly.com/esw233

→Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly

The post 🔴 LIVE: Enterprise Security Weekly #233 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/%f0%9f%94%b4-live-enterprise-security-weekly-233/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-enterprise-security-weekly-233

CVE-2021-1675: Incomplete Patch and Leaked RCE Exploit, (Wed, Jun 30th)

[preliminary. please let us know if we missed something or made any mistakes]

As part of Microsoft’s June patch Tuesday, Microsoft released a patch for CVE-2021-1675. At the time, the vulnerability was considered a privilege escalation vulnerability. Microsoft considered exploitation “less likely” [1].

On June 21st, Microsoft modified the description of the vulnerability upgrading it to a remote code execution vulnerability. Earlier this week, an RCE exploit was posted to GitHub. While the exploit code was quickly removed, it had already been forked multiple times and can still easily be found on GitHub.

Further, it appears that the patch released by Microsoft on June 6th was incomplete. This exploit will work on fully patched systems, according to multiple reports. But remote exploitation requires normal user credentials [2].

A successful attack will leave the attacker with SYSTEM privileges.

What should you do:

Patch systems that need to run the printer spool service.
Disable the printer spool service where possible. You only need it on systems that share printers. You do not need it on clients that only print to shared printers.
Block port 445/TCP and 135/TCP at your perimeter. (that is a good idea anyway)

What we do not know for sure:

The effectiveness of the June patch is disputed. Some say that it may prevent the PoC from working, but there is evidence that it does not fully patch the vulnerability.
Are there any exploit scenarios that do not require valid user credentials?
Some reports indicate issues with printing after applying the June patch.

[1] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675
[2] https://twitter.com/gentilkiwi/status/1410066827590447108?s=21


Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post CVE-2021-1675: Incomplete Patch and Leaked RCE Exploit, (Wed, Jun 30th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/cve-2021-1675-incomplete-patch-and-leaked-rce-exploit-wed-jun-30th/?utm_source=rss&utm_medium=rss&utm_campaign=cve-2021-1675-incomplete-patch-and-leaked-rce-exploit-wed-jun-30th

Colombian police arrest Gozi malware suspect after 8 years at large

Safe at home, apparently, but not so safe overseas.
Read More

The post Colombian police arrest Gozi malware suspect after 8 years at large appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/colombian-police-arrest-gozi-malware-suspect-after-8-years-at-large/?utm_source=rss&utm_medium=rss&utm_campaign=colombian-police-arrest-gozi-malware-suspect-after-8-years-at-large

Feds Told to Better Manage Facial Recognition, Amid Privacy Concerns

A GAO report finds government agencies are using the technology regularly in criminal investigations and to identify travelers, but need stricter management to protect people’s privacy and avoid inaccurate identification
Read More

The post Feds Told to Better Manage Facial Recognition, Amid Privacy Concerns appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/feds-told-to-better-manage-facial-recognition-amid-privacy-concerns/?utm_source=rss&utm_medium=rss&utm_campaign=feds-told-to-better-manage-facial-recognition-amid-privacy-concerns

Police warn of WhatsApp scams in time for Social Media Day

Happy Social Media Day! Make it a day to review whether your social media security really is up to scratch.
Read More

The post Police warn of WhatsApp scams in time for Social Media Day appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/police-warn-of-whatsapp-scams-in-time-for-social-media-day/?utm_source=rss&utm_medium=rss&utm_campaign=police-warn-of-whatsapp-scams-in-time-for-social-media-day

REvil’s Linux Version Targets VMware ESXi Virtual Machines

Organizations running ESXi environments that thought they had somehow escaped the attention of REvil ransomware operators are in for a rude awakening – the ransomware-as-a-service’s repertoire now includes a Linux version aimed squarely at VMware ESXi virtual machines, according to researchers at MalwareHunterTeam. Vitali Kremez at Advanced Intel examined the findings and tweeted some of..

The post REvil’s Linux Version Targets VMware ESXi Virtual Machines appeared first on Security Boulevard.

Read More

The post REvil’s Linux Version Targets VMware ESXi Virtual Machines appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/revils-linux-version-targets-vmware-esxi-virtual-machines/?utm_source=rss&utm_medium=rss&utm_campaign=revils-linux-version-targets-vmware-esxi-virtual-machines

Demystifying SSD Security

You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best practices to follow. SSD Best Practices Step 1: Shut down your device in public spaces when you are not using it. Resume time..

The post Demystifying SSD Security appeared first on Security Boulevard.

Read More

The post Demystifying SSD Security appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/demystifying-ssd-security/?utm_source=rss&utm_medium=rss&utm_campaign=demystifying-ssd-security

A New Approach to Tackling Cybersecurity Threats

Last month, the FBI warned that ransomware attacks, like the one on the Colonial Pipeline, are a growing problem. From attacks on the Miami-Dade School District to Apple’s $50 million ransomware mess, the agency is investigating growing instances of cybercriminals wreaking havoc and confusion by holding vital services, citizen’s private information, and critical data hostage..

The post A New Approach to Tackling Cybersecurity Threats appeared first on Security Boulevard.

Read More

The post A New Approach to Tackling Cybersecurity Threats appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/a-new-approach-to-tackling-cybersecurity-threats/?utm_source=rss&utm_medium=rss&utm_campaign=a-new-approach-to-tackling-cybersecurity-threats

Data Breaches Rise as Organizations Shift to the Cloud

As more and more organizations make the move into public clouds, a corresponding rise in cloud data breaches has followed, according to an IDC survey of 200 security decision-makers in the U.S. The survey found nearly all (98%) of the companies surveyed had experienced at least one cloud data breach in the past 18 months,..

The post Data Breaches Rise as Organizations Shift to the Cloud appeared first on Security Boulevard.

Read More

The post Data Breaches Rise as Organizations Shift to the Cloud appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/data-breaches-rise-as-organizations-shift-to-the-cloud/?utm_source=rss&utm_medium=rss&utm_campaign=data-breaches-rise-as-organizations-shift-to-the-cloud

ISC Stormcast For Wednesday, June 30th, 2021 https://isc.sans.edu/podcastdetail.html?id=7564, (Wed, Jun 30th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Wednesday, June 30th, 2021 https://isc.sans.edu/podcastdetail.html?id=7564, (Wed, Jun 30th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/isc-stormcast-for-wednesday-june-30th-2021-https-isc-sans-edu-podcastdetail-htmlid7564-wed-jun-30th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-wednesday-june-30th-2021-https-isc-sans-edu-podcastdetail-htmlid7564-wed-jun-30th

ESB-2021.2285 – [Win][Linux] Exacq Technologies exacqVision Enterprise Manager: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2285
Advisory (icsa-21-180-02) Exacq Technologies exacqVision Enterprise Manager
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Exacq Technologies exacqVision Enterprise Manager
Publisher: ICS-CERT
Operating System: Linux variants
Windows
Impact/Access: Cross-site Scripting — Existing Account
Reduced Security — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-27658

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-02

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-02)

Exacq Technologies exacqVision Enterprise Manager

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 4.3
o ATTENTION: Exploitable remotely/low attack complexity
o Vendor: Exacq Technologies, Inc., a subsidiary of Johnson Controls Inc.
o Equipment: exacqVision Enterprise Manager
o Vulnerability: Cross-site Scripting

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to send
malicious requests on behalf of the victim.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Exacq Technologies exacqVision Enterprise Manager
software are affected:

o exacqVision Enterprise Manager: Version 20.12 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE
SCRIPTING’) CWE-79

The software does not sufficiently validate, filter, escape, and/or encode
user-controllable input before it is placed in output used as a web page, which
is served to other users. This may allow an attacker to send malicious requests
on behalf of the victim.

CVE-2021-27658 has been assigned to this vulnerability. A CVSS v3 base score of
4.3 has been calculated; the CVSS vector string is ( AV:N/AC:L/PR:L/UI:N/S:U/
C:N/I:L/A:N ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: Ireland

3.4 RESEARCHER

Milan Kyselica and Roman Stevanak reported this vulnerability to Johnson
Controls, Inc.

4. MITIGATIONS

Johnson Controls recommends upgrading all previous versions of exacqVision
Enterprise Manager to v21.03

For more detailed mitigation instructions, please see Johnson Controls Product
Security Advisory JCI-PSA-2021-08 v1

Additional security notices and product security guidance can be found at the
Johnson Controls ICS Product Security page .

CISA recommends users take defensive measures to minimize the risk of
exploitation of this vulnerability. Specifically, users should:

o Minimize network exposure for all control system devices and/or systems,
and ensure that they are not accessible from the Internet .
o Locate control system networks and remote devices behind firewalls, and
isolate them from the business network.
o When remote access is required, use secure methods, such as Virtual Private
Networks (VPNs), recognizing VPNs may have vulnerabilities and should be
updated to the most current version available. Also recognize VPN is only
as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target this vulnerability.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=kAdR
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2285 – [Win][Linux] Exacq Technologies exacqVision Enterprise Manager: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2285-winlinux-exacq-technologies-exacqvision-enterprise-manager-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2285-winlinux-exacq-technologies-exacqvision-enterprise-manager-multiple-vulnerabilities

ESB-2021.2281 – [Win] AVEVA System Platform: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2281
Advisory (icsa-21-180-05) AVEVA System Platform
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: AVEVA System Platform
Publisher: ICS-CERT
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-33010 CVE-2021-33008

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-05

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-05)

AVEVA System Platform

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 8.8
o ATTENTION: Exploitable from adjacent network/low attack complexity
o Vendor: AVEVA Software, LLC
o Equipment: System Platform
o Vulnerabilities: Missing Authentication for Critical Function, Uncaught
Exception

2. RISK EVALUATION

Successful exploitation of these vulnerabilities, if exploited and chained
together, could allow a malicious entity to achieve arbitrary code execution
with system privileges or cause a denial-of-service condition.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

o AVEVA reports the vulnerability affects AVEVA System Platform versions 2017
through 2020 R2 P01 (inclusive)

3.2 VULNERABILITY OVERVIEW

3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306

The software does not perform any authentication for functionality that
requires a provable user identity.

CVE-2021-33008 has been assigned to this vulnerability. A CVSS v3 base score of
8.0 has been calculated; the CVSS vector string is ( AV:A/AC:L/PR:L/UI:N/S:U/
C:H/I:H/A:H ).

3.2.2 UNCAUGHT EXCEPTION CWE-248

An exception is thrown from a function, but it is not caught, which may cause a
denial-of-service condition.

CVE-2021-33010 has been assigned to this vulnerability. A CVSS v3 base score of
6.5 has been calculated; the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/
C:N/I:N/A:H ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Chemical, Critical Manufacturing, Energy,
Food and Agriculture, and Water and Wastewater Systems
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: United Kingdom

3.4 RESEARCHER

Sharon Brizinov of Claroty reported these vulnerabilities to AVEVA.

4. MITIGATIONS

AVEVA recommends organizations evaluate the impact of these vulnerabilities
based on their operational environment, architecture, and product
implementation.

AutoBuild service is intended to be used only on the GR Node of System Platform
during configuration. If the AutoBuild service is enabled on any Runtime nodes,
it should be disabled. Furthermore, if the AutoBuild functionality is not used
on the GR Node, the AutoBuild service can be disabled on the GR Node as an
alternative mitigation that does not require patching.

AVEVA recommends users who need to continually use the AutoBuild functionality
and cannot disable it in System Platform Versions 2017 through 2020 R2 P01
(inclusive) are affected by the vulnerabilities and should first upgrade to one
of the System Platform versions listed below, then apply the corresponding
security update:

o System Platform 2020 R2 P01, 2020 R2, 2020: Apply AVEVA Communication
Drivers Pack 2020 R2.1
o System Platform 2017 U3 SP1 P01:

1. First apply AVEVA Communication Drivers Pack 2020 R2 AVEVA notes that
Activated Licensing is required to apply AVEVA Communication Drivers Pack
2020 R2 on top of System Platform 2017 U3 SP1 P01. For information on AVEVA
license compatibility, please contact AVEVA Customer Support
2. Then apply AVEVA Communication Drivers Pack 2020 R2.1

Please see AVEVA’s security bulletin AVEVA-2021-002 for more information.

CISA recommends users take defensive measures to minimize the risk of
exploitation of these vulnerabilities. Specifically, users should:

o Minimize network exposure for all control system devices and/or systems,
and ensure that they are not accessible from the Internet .
o Locate control system networks and remote devices behind firewalls, and
isolate them from the business network.
o When remote access is required, use secure methods, such as Virtual Private
Networks (VPNs), recognizing VPNs may have vulnerabilities and should be
updated to the most current version available. Also recognize VPN is only
as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target these vulnerabilities.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=oduq
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2281 – [Win] AVEVA System Platform: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2281-win-aveva-system-platform-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2281-win-aveva-system-platform-multiple-vulnerabilities

ESB-2021.2282 – [Win] Panasonic FPWIN Pro: Access confidential data – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2282
Advisory (icsa-21-180-03) Panasonic FPWIN Pro
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Panasonic FPWIN Pro
Publisher: ICS-CERT
Operating System: Windows
Impact/Access: Access Confidential Data — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-32972

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-03

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-03)

Panasonic FPWIN Pro

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 5.9
o ATTENTION: Low attack complexity
o Vendor: Panasonic
o Equipment: FPWIN Pro
o Vulnerability: Improper Restriction of XML External Entity Reference

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow a remote attacker to
retrieve sensitive information from the file system where affected software is
installed.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Panasonic reports this vulnerability affects the following products:

o FPWIN Pro programming control software: All Versions 7.5.1.1 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611

A specially crafted project file specifying a URI causes the XML parser to
access the URI and embed the contents, which may allow an attacker to disclose
information that is accessible in the context of the user executing software.

CVE-2021-32972 has been assigned to this vulnerability. A CVSS v3 base score of
5.9 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:L/UI:R/S:C/
C:H/I:N/A:N ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Critical
Manufacturing, Food and Agriculture
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: Japan

3.4 RESEARCHER

Michael Heinzl reported this vulnerability to CISA.

4. MITIGATIONS

Panasonic has released FPWIN Pro v7.5.2.0 to address this vulnerability.

For more information about this issue, please contact the Panasonic Product
Security Incident Response Team .

CISA recommends users take the following measures to protect themselves from
social engineering attacks:

o Do not click web links or open unsolicited attachments in email messages.
o Refer to Recognizing and Avoiding Email Scams for more information on
avoiding email scams.
o Refer to Avoiding Social Engineering and Phishing Attacks for more
information on social engineering attacks.

CISA recommends users take defensive measures to minimize the risk of
exploitation of this vulnerability. CISA reminds organizations to perform
proper impact analysis and risk assessment prior to deploying defensive
measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target this vulnerability. This
vulnerability is not exploitable remotely.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=uvjp
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2282 – [Win] Panasonic FPWIN Pro: Access confidential data – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2282-win-panasonic-fpwin-pro-access-confidential-data-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2282-win-panasonic-fpwin-pro-access-confidential-data-existing-account

ESB-2021.2283 – [Appliance] JTEKT TOYOPUC PLC: Denial of service – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2283
Advisory (icsa-21-180-04) JTEKT TOYOPUC PLC
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: JTEKT TOYOPUC PLC
Publisher: ICS-CERT
Operating System: Network Appliance
Impact/Access: Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-27477

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-04

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-04)

JTEKT TOYOPUC PLC

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 6.5
o ATTENTION: Exploitable from an adjacent network/low attack complexity
o Vendor: JTEKT Corporation
o Equipment: TOYOPUC PLC
o Vulnerability : Improper Restriction of Operations within the Bounds of a
Memory Buffer

2. RISK EVALUATION

Successful exploitation of this vulnerability could crash the device being
accessed.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of the PLC are affected:

o PC10G-CPU
o 2PORT-EFR
o Plus CPU
o Plus EX
o Plus EX2
o Plus EFR
o Plus EFR2
o Plus 2P-EFR
o PC10P-DP
o PC10P-DP-IO
o Plus BUS-EX
o Nano 10GX
o Nano 2ET
o PC10PE
o PC10PE-16/16P
o PC10E
o FL/ET-T-V2H
o PC10B
o PC10B-P
o Nano CPU
o PC10P
o PC10GE

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER
CWE-119

When the affected products receive an invalid frame, the outside area of a
receive buffer for FL-net are overwritten. As a result, the PLC CPU detects a
system error, and the affected products stop.

CVE-2021-27477 has been assigned to this vulnerability. A CVSS v3 base score of
6.5 has been calculated; the CVSS vector string is ( AV:A/AC:L/PR:N/UI:N/S:U/
C:N/I:N/A:H ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: Japan

3.4 RESEARCHER

Chris Yang of Trend Micro’s Zero Day Initiative reported this vulnerability to
CISA.

4. MITIGATIONS

JTEKT has updated to the following PLC firmware versions to address the
vulnerability:

o PC10G-CPU: Versions 3.91 or later
o 2PORT-EFR: Versions 1.50 or later
o PC10P-DP: Versions 1.50 or later
o PC10P-DP-IO: Versions 1.50 or later
o Nano 10GX: Versions 3.00 or later
o Nano 2ET: Versions 2.40 or later
o PC10PE: Versions 1.02 or later
o PC10PE-16/16P: Versions 1.02 or later
o PC10E: Versions 1.12 or later
o FL/ET-T-V2H: Versions F2.8 E1.5 or later
o PC10B: Versions 1.11 or later
o PC10B-P: Versions 1.11 or later
o Nano CPU: Versions 2.08 or later
o PC10P: Versions 1.05 or later
o PC10GE: Versions 1.04 or later

PLUS SERIES

o Plus CPU: Versions 3.11 or later
o Plus EX: Versions 3.11 or later
o Plus EX2: Versions 3.11 or later
o Plus EFR: Versions 3.11 or later
o Plus EFR2: Versions 3.11 or later
o Plus 2P-EFR: Versions 3.11 or later
o Plus BUS-EX: Version 2.13 or later

There is no need to update Plus series expansion boards. If you use a Plus
series expansion board, update Plus CPU or Plus BUS-EX to which the expansion
board is connected.

For firmware updates, visit the JTEKT website .

As a general security measure, JTEKT Corporation recommends users only build
networks with trusted FL-net products.

Requests for additional information can be sent to JTEKT Corporation via
website form .

CISA recommends users take defensive measures to minimize the risk of
exploitation of this vulnerability. CISA reminds organizations to perform
proper impact analysis and risk assessment prior to deploying defensive
measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target this vulnerability.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=wdXV
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2283 – [Appliance] JTEKT TOYOPUC PLC: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2283-appliance-jtekt-toyopuc-plc-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2283-appliance-jtekt-toyopuc-plc-denial-of-service-remote-unauthenticated

ESB-2021.2284 – [Win][Linux] Exacq Technologies exacqVision Web Service: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2284
Advisory (icsa-21-180-01) Exacq Technologies exacqVision Web Service
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Exacq Technologies exacqVision Web Service
Publisher: ICS-CERT
Operating System: Linux variants
Windows
Impact/Access: Cross-site Scripting — Remote with User Interaction
Reduced Security — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-27659

Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-21-180-01

– ————————–BEGIN INCLUDED TEXT——————–

ICS Advisory (ICSA-21-180-01)

Exacq Technologies exacqVision Web Service

Original release date: June 29, 2021

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided
“as is” for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .

1. EXECUTIVE SUMMARY

o CVSS v3 5.3
o ATTENTION: Exploitable remotely/low attack complexity
o Vendor: Exacq Technologies, Inc., a subsidiary of Johnson Controls Inc.
o Equipment: exacqVision Web Service
o Vulnerability: Cross-site Scripting

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to send
malicious requests on behalf of the victim.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Exacq Technologies exacqVision Web Service software
are affected:

o exacqVision Web Service: Version 21.03 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE
SCRIPTING’) CWE-79

The software does not sufficiently validate, filter, escape, and/or encode
user-controllable input before it is placed in output used as a web page, which
is served to other users. This may allow an attacker to send malicious requests
on behalf of the victim.

CVE-2021-27659 has been assigned to this vulnerability. A CVSS v3 base score of
5.3 has been calculated; the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/
C:N/I:L/A:N ).

3.3 BACKGROUND

o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: Ireland

3.4 RESEARCHER

Milan Kyselica and Roman Stevanak reported this vulnerability to Johnson
Controls, Inc.

4. MITIGATIONS

Johnson Controls recommends upgrading all previous versions of exacqVision Web
Service to v21.06

For more detailed mitigation instructions, please see Johnson Controls Product
Security Advisory JCI-PSA-2021-09 v1

Additional security notices and product security guidance can be found at the
Johnson Control ICS Product Security page .

CISA recommends users take defensive measures to minimize the risk of
exploitation of this vulnerability. Specifically, users should:

o Minimize network exposure for all control system devices and/or systems,
and ensure that they are not accessible from the Internet .
o Locate control system networks and remote devices behind firewalls, and
isolate them from the business network.
o When remote access is required, use secure methods, such as Virtual Private
Networks (VPNs), recognizing VPNs may have vulnerabilities and should be
updated to the most current version available. Also recognize VPN is only
as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.cisa.gov . Several recommended practices are
available for reading and download, including Improving Industrial Control
Systems Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper,
ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target this vulnerability.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYNwJneNLKJtyKPYoAQiXwQ/+L86hquCM/byTm2QtTUUkVyzVYztxF26O
wye7BIKyzy5stncEoKurXarTyMlvkLJdcSiGYE3iwLvpS7nDfoGkP6KAy7KnXOXr
rxq85C5bmyRLbOQfkYTo7z9fe+FE97I9Ye8lRVpVl5S4Y8qOMPg0KZCeMLmSmWjR
p1wpUmFx6wM5rUcteB8Z77KU71c0sfNybJXHvZdnCupUNz47kA6SObYmzjU9HSvR
YI6XzcwE6CmRxUWJQvIfUI3aTWCYJlyoI7NxRCfetTFo11wall4WViN8vcENn3Nu
hzCiMJ0T5v+eoZm4dchBfD5frneDxvAMNWsbWcmnmop7whOTXcJXDc3r5figbE0D
ku5k2Go2tg36f35moEDs1CekBxiKHfWfIJ+KoPqC82XLNy+hGioidy7dUmdg5rtP
Bw7LFpZ/fucHEPXPpBLDteWzIjO8K5KajIMCqoonb0rwOV9F7IlIc6gSGrukFkz9
i6GhM8MwIoNF0ZWLcgZ1PWm36CkOD8CquTGzMKma2Y44OVGLeyW4UCOX1bg+Wcru
3noMa1hPhiuWJ8v9IseRhG1Kjiwye7xoFmHHd1mWHUtCMwO8a3i9WE+3wgN1G0QY
Xfr9EHvg7W7gU6y7PI6bFKp62FLQPXxOHQCpF2g9XefF+U/M69DtkSMugbDHzvWn
yNA3sL23ReU=
=Q6Gn
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2284 – [Win][Linux] Exacq Technologies exacqVision Web Service: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2284-winlinux-exacq-technologies-exacqvision-web-service-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2284-winlinux-exacq-technologies-exacqvision-web-service-multiple-vulnerabilities

ESB-2021.2271 – [RedHat] 389-ds:1.4: Denial of service – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2271
389-ds:1.4 security and bug fix update
30 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: 389-ds:1.4
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Denial of Service — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3514

Reference: ESB-2021.2024

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2595

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: 389-ds:1.4 security and bug fix update
Advisory ID: RHSA-2021:2595-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2595
Issue date: 2021-06-29
CVE Names: CVE-2021-3514
=====================================================================

1. Summary:

An update for the 389-ds:1.4 module is now available for Red Hat Enterprise
Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) – aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The
base packages include the Lightweight Directory Access Protocol (LDAP)
server and command-line utilities for server administration.

Security Fix(es):

* 389-ds-base: sync_repl NULL pointer dereference in
sync_create_state_control() (CVE-2021-3514)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* ACIs are being evaluated against the Replication Manager account in a
replication context. (BZ#1968588)

* A connection can be erroneously flagged as replication conn during
evaluation of an aci with ip bind rule (BZ#1970791)

* Large updates can reset the CLcache to the beginning of the changelog
(BZ#1972721)

* Changelog cache can upload updates from a wrong starting point (CSN)
(BZ#1972738)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1952907 – CVE-2021-3514 389-ds-base: sync_repl NULL pointer dereference in sync_create_state_control()
1960720 – CVE-2021-3514 389-ds:1.4/389-ds-base: sync_repl NULL pointer dereference in sync_create_state_control() [rhel-8] [rhel-8.4.0.z]
1968588 – ACIs are being evaluated against the Replication Manager account in a replication context. [rhel-8.4.0.z]
1970791 – A connection can be erroneously flagged as replication conn during evaluation of an aci with ip bind rule [rhel-8.4.0.z]
1972721 – Large updates can reset the CLcache to the beginning of the changelog [rhel-8.4.0.z]
1972738 – Changelog cache can upload updates from a wrong starting point (CSN) [rhel-8.4.0.z]

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
389-ds-base-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.src.rpm

aarch64:
389-ds-base-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-debugsource-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-devel-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-legacy-tools-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-legacy-tools-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-libs-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-libs-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-snmp-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm
389-ds-base-snmp-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.aarch64.rpm

noarch:
python3-lib389-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.noarch.rpm

ppc64le:
389-ds-base-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-debugsource-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-devel-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-legacy-tools-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-legacy-tools-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-libs-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-libs-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-snmp-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm
389-ds-base-snmp-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.ppc64le.rpm

s390x:
389-ds-base-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-debugsource-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-devel-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-legacy-tools-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-legacy-tools-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-libs-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-libs-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-snmp-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm
389-ds-base-snmp-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.s390x.rpm

x86_64:
389-ds-base-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-debugsource-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-devel-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-legacy-tools-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-legacy-tools-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-libs-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-libs-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-snmp-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm
389-ds-base-snmp-debuginfo-1.4.3.16-16.module+el8.4.0+11446+fc96bc48.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3514
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBYNtGdtzjgjWX9erEAQiZSRAAjwLLGnMmBPInL9f9xSB0MC4U6eX1jXTy
KBQTqFEzBCFjztQ12Cxuz4AzhQuULpncgTHSGOZIZ9YuPUsqQY7e4y3oNF4VLTGx
fgXe/cE4ZthKzMZmj5ol1Qeuooym03XpD2SQA1SpEZ7uenVITZUPiM8fQrre1oB3
X0ecHxSNVuT6Q93KGXH0/pXlYTDoq6Sw2DuiGyLHTTuvsPMjWOfoPYvuV553PCfv
0zBQJE/KT1O9FIbPCImZd3075Uvk/TC4KryU5mEbpmaM1Zpjovg2vKm7RZUI7c/u
Bp2/emKRj+hJJRlkyAof/sUA8db/Vz3z/fpZdJLN4ME34H+PvUrcY89tkQHKGg9R
LSHL9GZCEjvwlFLnhhMuwuiXPw6j7L/0JVk+YW055Q7QsiJgHnuOFhmIm8jt6ClE
fGCrKCTfLZVc2Aw6/tDuzYCT51DHdfsbaMMAOHJE2tAr2qIJBEHnc+ORiRsBlmYB
iy2E9eOMhT1IL1285Q4CZ2M4jbQ6mr72q7JCuze54PbeCKDLAaQuHzHDF/YEM4D0
yMCllkfLKxowo64r7NSspc7m1T/LmOht3LNYMewfE7LX6SqYqYx3cAGwcKHZKH35
tpVk/whAkNDxChDvpbJPkn7+Zbi9uhGcQjCTXB1tvfPG+Tx2P3/qbZlc+t9rMqWa
aCgccqLLJ4E=
=HLbq
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=XzZZ
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2271 – [RedHat] 389-ds:1.4: Denial of service – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/06/30/esb-2021-2271-redhat-389-ds1-4-denial-of-service-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2271-redhat-389-ds1-4-denial-of-service-existing-account

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...