Malware Devil

Monday, July 12, 2021

Tripwire Patch Priority Index for June 2021

Tripwire’s June 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Cacti, Docker, Adobe, and Microsoft. First on the patch priority list this month are patches for Microsoft SharePoint (CVE-2021-31181), Cacti (CVE-2020-14295), and Docker (CVE-2019-5736). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as […]… Read More

The post Tripwire Patch Priority Index for June 2021 appeared first on The State of Security.

The post Tripwire Patch Priority Index for June 2021 appeared first on Security Boulevard.

Read More

The post Tripwire Patch Priority Index for June 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/tripwire-patch-priority-index-for-june-2021/?utm_source=rss&utm_medium=rss&utm_campaign=tripwire-patch-priority-index-for-june-2021

The False Identity Frenzy and the Need for Authentication

Emil Sayegh, president and CEO of Ntirety, unpacks the issue of inauthentic identities opening doors to untraceable, fake social accounts and the impact that it has on society. Emil is a cloud visionary and is known as one of the “fathers of OpenStack.” Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 In the latest episode of the Tripwire […]… Read More

The post The False Identity Frenzy and the Need for Authentication appeared first on The State of Security.

The post The False Identity Frenzy and the Need for Authentication appeared first on Security Boulevard.

Read More

The post The False Identity Frenzy and the Need for Authentication appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/the-false-identity-frenzy-and-the-need-for-authentication/?utm_source=rss&utm_medium=rss&utm_campaign=the-false-identity-frenzy-and-the-need-for-authentication

Phishing, Ransomware Driving Wave of Data Breaches

Data compromises have increased every month this year except May. If that trend continues, or even if there is only an average of 141 new compromises per month for the next six months, the total will still exceed the previous high of 1,632 breaches set in 2017. These were among the findings of the nonprofit..

The post Phishing, Ransomware Driving Wave of Data Breaches appeared first on Security Boulevard.

Read More

The post Phishing, Ransomware Driving Wave of Data Breaches appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/phishing-ransomware-driving-wave-of-data-breaches/?utm_source=rss&utm_medium=rss&utm_campaign=phishing-ransomware-driving-wave-of-data-breaches

Major Insurance Companies in Europe Discover That Their Applications Have Security Issues

A new article in TechTimes is highlighting the results of a study on the web application security for Insurers in Europe.  The study found that the web applications of major insurance companies in Europe contain security weaknesses.  The study looked at the web applications of Europe’s top 10 insurance providers, and every company examined had some degree of security vulnerability.

The post Major Insurance Companies in Europe Discover That Their Applications Have Security Issues appeared first on K2io.

The post Major Insurance Companies in Europe Discover That Their Applications Have Security Issues appeared first on Security Boulevard.

Read More

The post Major Insurance Companies in Europe Discover That Their Applications Have Security Issues appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/major-insurance-companies-in-europe-discover-that-their-applications-have-security-issues/?utm_source=rss&utm_medium=rss&utm_campaign=major-insurance-companies-in-europe-discover-that-their-applications-have-security-issues

Top 5 Physical Security Considerations

With the rise of IoT technology across every aspect of business, security convergence is quickly becoming the new norm. In a world where just about everything is connected to the internet and to other devices, old strategies are becoming obsolete. Treating IT and physical security as separate entities and ignoring physical security’s impact on cybersecurity..

The post Top 5 Physical Security Considerations appeared first on Security Boulevard.

Read More

The post Top 5 Physical Security Considerations appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/top-5-physical-security-considerations/?utm_source=rss&utm_medium=rss&utm_campaign=top-5-physical-security-considerations

Setting and achieving your application security goals

Ensuring application security and resilience is largely a technical endeavor. From source code development to vulnerability and penetration testing and all the variables in between, there are a lot of moving parts on the technical side. It’s important, however, to remember the soft side of…

Read more

The post Setting and achieving your application security goals appeared first on Acunetix.

The post Setting and achieving your application security goals appeared first on Security Boulevard.

Read More

The post Setting and achieving your application security goals appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/setting-and-achieving-your-application-security-goals/?utm_source=rss&utm_medium=rss&utm_campaign=setting-and-achieving-your-application-security-goals

How to Prepare for a Cyberattack

Preventing cyberattacks isn’t easy. If it were, there wouldn’t be a continuous stream of ransomware attacks dominating news feeds, nor would the president of the United States feel compelled to issue executive orders on cybersecurity or to declare that ransomware attacks should be treated like terrorism. While preventing cyberattacks isn’t easy, avoiding one is a..

The post How to Prepare for a Cyberattack appeared first on Security Boulevard.

Read More

The post How to Prepare for a Cyberattack appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/how-to-prepare-for-a-cyberattack/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-prepare-for-a-cyberattack

Cities Key in War on Ransomware, Neuberger Tells Mayors

When the cybersecurity industry talks about how critical public-private collaboration is to fending off and responding to threats, most of the “public” part of the conversation centers around the federal government, with individual states more recently finding a louder voice. But an all-out defense against the kind of attacks recently seen against supply chains, critical..

The post Cities Key in War on Ransomware, Neuberger Tells Mayors appeared first on Security Boulevard.

Read More

The post Cities Key in War on Ransomware, Neuberger Tells Mayors appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/cities-key-in-war-on-ransomware-neuberger-tells-mayors/?utm_source=rss&utm_medium=rss&utm_campaign=cities-key-in-war-on-ransomware-neuberger-tells-mayors

How a Single Digital Certificate Expiry Impacted 11 Countries?

It was early December 6th 2018, a cold winter morning when the security team at Swedish multinational networking and telecommunications company Ericsson received the jolt of their lives. A digital certificate used by Ericsson for its SGSN-MME (Serving GPRS Support Node – Mobility Management Entity) had expired. The impact? Over 32 million people in the […]

The post How a Single Digital Certificate Expiry Impacted 11 Countries? appeared first on AppViewX.

The post How a Single Digital Certificate Expiry Impacted 11 Countries? appeared first on Security Boulevard.

Read More

The post How a Single Digital Certificate Expiry Impacted 11 Countries? appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/how-a-single-digital-certificate-expiry-impacted-11-countries/?utm_source=rss&utm_medium=rss&utm_campaign=how-a-single-digital-certificate-expiry-impacted-11-countries

Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

Details on the Kaseya supply-chain and REvil ransomware attack, a new zero-day exploit called “PrintNightmare” affects all Windows versions before June, and how randomly generated passwords in a popular password manager were not so random. ** Links mentioned on the show ** REvil Used 0-Day in Kaseya Ransomware Attack, Demands $70 Million Ransom https://thehackernews.com/2021/07/revil-used-0-day-in-kaseya-ransomware.html https://grahamcluley.com/revil-ransomware-rampages-following-kaseya-supply-chain-attack/ […]

The post Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability appeared first on The Shared Security Show.

The post Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability appeared first on Security Boulevard.

Read More

The post Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/kaseya-ransomware-attack-printnightmare-zero-day-kaspersky-password-manager-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=kaseya-ransomware-attack-printnightmare-zero-day-kaspersky-password-manager-vulnerability

ISC Stormcast For Monday, July 12th, 2021 https://isc.sans.edu/podcastdetail.html?id=7580, (Mon, Jul 12th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, July 12th, 2021 https://isc.sans.edu/podcastdetail.html?id=7580, (Mon, Jul 12th) appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/isc-stormcast-for-monday-july-12th-2021-https-isc-sans-edu-podcastdetail-htmlid7580-mon-jul-12th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-july-12th-2021-https-isc-sans-edu-podcastdetail-htmlid7580-mon-jul-12th

ESB-2021.2349 – [SUSE] xstream: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2349
Security update for xstream
12 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: xstream
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands — Remote/Unauthenticated
Delete Arbitrary Files — Remote/Unauthenticated
Denial of Service — Remote/Unauthenticated
Access Confidential Data — Remote/Unauthenticated
Unauthorised Access — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21351 CVE-2021-21350 CVE-2021-21349
CVE-2021-21348 CVE-2021-21347 CVE-2021-21346
CVE-2021-21345 CVE-2021-21344 CVE-2021-21343
CVE-2021-21342 CVE-2021-21341

Reference: ESB-2021.2185
ESB-2021.1939
ESB-2021.1594

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for xstream

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1840-2
Rating: important
References: #1184372 #1184373 #1184374 #1184375 #1184376 #1184377
#1184378 #1184379 #1184380 #1184796 #1184797
Cross-References: CVE-2021-21341 CVE-2021-21342 CVE-2021-21343 CVE-2021-21344
CVE-2021-21345 CVE-2021-21346 CVE-2021-21347 CVE-2021-21348
CVE-2021-21349 CVE-2021-21350 CVE-2021-21351
Affected Products:
SUSE Linux Enterprise Module for SUSE Manager Server 4.2
______________________________________________________________________________

An update that fixes 11 vulnerabilities is now available.

Description:

This update for xstream fixes the following issues:

o Upgrade to 1.4.16
o CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#
1184796)
o CVE-2021-21349: SSRF can lead to a remote attacker to request data from
internal resources (bsc#1184797)
o CVE-2021-21350: arbitrary code execution (bsc#1184380)
o CVE-2021-21348: remote attacker could cause denial of service by consuming
maximum CPU time (bsc#1184374)
o CVE-2021-21347: remote attacker to load and execute arbitrary code from a
remote host (bsc#1184378)
o CVE-2021-21344: remote attacker could load and execute arbitrary code from
a remote host (bsc#1184375)
o CVE-2021-21342: server-side forgery (bsc#1184379)
o CVE-2021-21341: remote attacker could cause a denial of service by
allocating 100% CPU time (bsc#1184377)
o CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#
1184373)
o CVE-2021-21345: remote attacker with sufficient rights could execute
commands (bsc#1184372)
o CVE-2021-21343: replace or inject objects, that result in the deletion of
files on the local host (bsc#1184376)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Module for SUSE Manager Server 4.2:
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-1840=1

Package List:

o SUSE Linux Enterprise Module for SUSE Manager Server 4.2 (noarch):
xstream-1.4.16-3.8.1

References:

o https://www.suse.com/security/cve/CVE-2021-21341.html
o https://www.suse.com/security/cve/CVE-2021-21342.html
o https://www.suse.com/security/cve/CVE-2021-21343.html
o https://www.suse.com/security/cve/CVE-2021-21344.html
o https://www.suse.com/security/cve/CVE-2021-21345.html
o https://www.suse.com/security/cve/CVE-2021-21346.html
o https://www.suse.com/security/cve/CVE-2021-21347.html
o https://www.suse.com/security/cve/CVE-2021-21348.html
o https://www.suse.com/security/cve/CVE-2021-21349.html
o https://www.suse.com/security/cve/CVE-2021-21350.html
o https://www.suse.com/security/cve/CVE-2021-21351.html
o https://bugzilla.suse.com/1184372
o https://bugzilla.suse.com/1184373
o https://bugzilla.suse.com/1184374
o https://bugzilla.suse.com/1184375
o https://bugzilla.suse.com/1184376
o https://bugzilla.suse.com/1184377
o https://bugzilla.suse.com/1184378
o https://bugzilla.suse.com/1184379
o https://bugzilla.suse.com/1184380
o https://bugzilla.suse.com/1184796
o https://bugzilla.suse.com/1184797

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYOu6I+NLKJtyKPYoAQhjFQ//a3mT0lB4+Ps8ovGSn/bzW1dDBARGeP5l
K4ZTpW3f5nY70UT9dQ6jJ+fzf80u+9qIVz3S5zmuJ2jfh6LWKhjv+tZHc+oMoZo4
L3zjKHwUTeYeIdaTexoz2KF/7ZMBRM74S2V2DuatMtY7JGpOSbNnqTdOVayzFBCG
C76u1lWKf25y9zhW9nR3nnGOM0fZTX4iv5VMENIGjfcZUGLqyMV1IaAOceOmbM0P
MMSHAkooMDEqTogsXzTTKUCIGyTJ6s8jKXlMc+EIXW9Cx0lsDHcu4i7JpAnRok7q
Fxscilh1fWfLSZehUjwfMnudI+tFp2u2mcwBSJtmJXrVgH+2dHPi+o2s8plz0JNv
V2vxHgn2Gzd1tXUxhR45ngqxn79Xwh0hI0TAvt42Q26u7G8dXXoveRpq1xZNF4fc
rS/Jt4kONcY+TyCYRDYmzuL8yUMdI9e+ZizW/Mf9tS+rX/OcLOtxr4USWpBsUBZ2
wDc954sf2lAImYGm2ZyMEthGfQgf1q7a6u58zHXYr0Ab6Gn7yYBIclm8Fz3GHQ5c
NRzGRXIW95sBzESokZWYJGRwHoFyRHwNaTrNzyu8AzG9JMhjpvH25rCaO1JwqRub
33cmide6zfYUQzO/uTTAnVDpMPCWBT1QxHCrV938sTo+PoyPOWDZ8f/2CcW+Hpbj
YiaeqfQseqI=
=dQWT
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2349 – [SUSE] xstream: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/esb-2021-2349-suse-xstream-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2349-suse-xstream-multiple-vulnerabilities

ESB-2021.2346 – [SUSE] permissions: Increased privileges – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2346
Security update for permissions
12 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: permissions
Publisher: SUSE
Operating System: SUSE
Impact/Access: Increased Privileges — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-8013 CVE-2019-3690 CVE-2019-3688

Reference: ESB-2020.1588
ESB-2020.0747

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20212280-1

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for permissions

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:2280-1
Rating: moderate
References: #1047247 #1050467 #1093414 #1097665 #1123886 #1150734
#1155939 #1157198 #1160594 #1160764 #1161779 #1163922
#1171883 #1182899
Cross-References: CVE-2019-3688 CVE-2019-3690 CVE-2020-8013
Affected Products:
SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

An update that solves three vulnerabilities and has 11 fixes is now available.

Description:

This update for permissions fixes the following issues:

o Fork package for 12-SP5 (bsc#1155939)
o make btmp root:utmp (bsc#1050467, bsc#1182899)
o pcp: remove no longer needed / conflicting entries (bsc#1171883). Fixes a
potential security issue.
o do not follow symlinks that are the final path element (CVE-2020-8013, bsc#
1163922)
o fix handling of relative directory symlinks in chkstat
o whitelist postgres sticky directories (bsc#1123886)
o fix regression where chkstat breaks without /proc available (bsc#1160764,
bsc#1160594)
o fix capability handling when doing multiple permission changes at once (bsc
#1161779,
o fix invalid free() when permfiles points to argv (bsc#1157198)
o the eror should be reported for permfiles[i], not argv[i], as these are not
the same files. (bsc#1047247, bsc#1097665)
o fix /usr/sbin/pinger ownership to root:squid (bsc#1093414, CVE-2019-3688)
o fix privilege escalation through untrusted symlinks (bsc#1150734,
CVE-2019-3690)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-2280=1

Package List:

o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
permissions-20170707-6.4.1
permissions-debuginfo-20170707-6.4.1
permissions-debugsource-20170707-6.4.1

References:

o https://www.suse.com/security/cve/CVE-2019-3688.html
o https://www.suse.com/security/cve/CVE-2019-3690.html
o https://www.suse.com/security/cve/CVE-2020-8013.html
o https://bugzilla.suse.com/1047247
o https://bugzilla.suse.com/1050467
o https://bugzilla.suse.com/1093414
o https://bugzilla.suse.com/1097665
o https://bugzilla.suse.com/1123886
o https://bugzilla.suse.com/1150734
o https://bugzilla.suse.com/1155939
o https://bugzilla.suse.com/1157198
o https://bugzilla.suse.com/1160594
o https://bugzilla.suse.com/1160764
o https://bugzilla.suse.com/1161779
o https://bugzilla.suse.com/1163922
o https://bugzilla.suse.com/1171883
o https://bugzilla.suse.com/1182899

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYOuWT+NLKJtyKPYoAQh8XxAAohDb47T7pqeOsqleoiSyt1GHMpS08Uh/
Cu1z/Y3DMsc/4c5WaafAqtplLCfmx2b62XDZFCAP7nFZ26Hf/NiN0Lc2EI2MMA4m
LK3C/Q9HlJeJOOZlaIdUZWTmQI6upYnY36X5XThLoAdopZn3liNMqUAbUeHn2IUL
XeYAXMKD3S3g9Vu3NBdm82eVK0+TYaEjQXPN7sI34bYdeXskzLjutjsDCFwILJ9N
jxuP+NEql31J+4Y9YVqfGk0xRH32m6GJM/gH2J2QW+Vyn2SES6w5+dMh9Evlb7pN
1mOVLZyghQcpZ7XSuv5ftnADhDSe1mY8pcMRCb4CTjomlj3D9DcgYGOnJlJIsgd5
d7OGuXeFRewk/1b58hdKFT7mU2GZxTvgMSzkDx5pMcVv7ncQz4bZ+Kg7NFnJMG+7
c5myy13skXvlq98bh0CshRHq58CtInpz8VRkentclpRlK/ATvLp/bTXxPVwxopVF
9lzoH9PdBMIkmDREq9bTziJVgherAy06Iy15Nh/efhadJP11B4UWsIWN73RKJfmq
EuUKywc01jXIAfFcDihnmaQZUTnT3+9sfnWjMSSwAZUgiaMueQe+DYQyA0qwhp8+
nrQkKw+n3RghM8PgBQDr7HJ7iJxKg4TISTkhCG1yHzD7vBPSoYW7cl3ET5h1SDm9
11B99JSq+oE=
=6X12
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2346 – [SUSE] permissions: Increased privileges – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/esb-2021-2346-suse-permissions-increased-privileges-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2346-suse-permissions-increased-privileges-existing-account

ESB-2021.2347 – [SUSE] postgresql13: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2347
Security update for postgresql13
12 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: postgresql13
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Access Confidential Data — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-32029 CVE-2021-32028 CVE-2021-32027

Reference: ESB-2021.2181
ESB-2021.1844

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211785-2

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for postgresql13

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1785-2
Rating: moderate
References: #1179945 #1183118 #1183168 #1185924 #1185925 #1185926
Cross-References: CVE-2021-32027 CVE-2021-32028 CVE-2021-32029
Affected Products:
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
______________________________________________________________________________

An update that solves three vulnerabilities and has three fixes is now
available.

Description:

This update for postgresql13 fixes the following issues:

o Upgrade to version 13.3:
o CVE-2021-32027: Fixed integer overflows in array subscripting calculations
(bsc#1185924).
o CVE-2021-32028: Fixed mishandling of junk columns in INSERT … ON CONFLICT
… UPDATE target lists (bsc#1185925).
o CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE …
RETURNING outputs for joined cross-partition updates (bsc#1185926).

o Don’t use %_stop_on_removal, because it was meant to be private and got
removed from openSUSE. %_restart_on_update is also private, but still
supported and needed for now (bsc#1183168).
o Re-enable build of the llvmjit subpackage on SLE, but it will only be
delivered on PackageHub for now (bsc#1183118).
o Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1785=
1

Package List:

o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64
ppc64le s390x x86_64):
postgresql13-test-13.3-5.10.1

References:

o https://www.suse.com/security/cve/CVE-2021-32027.html
o https://www.suse.com/security/cve/CVE-2021-32028.html
o https://www.suse.com/security/cve/CVE-2021-32029.html
o https://bugzilla.suse.com/1179945
o https://bugzilla.suse.com/1183118
o https://bugzilla.suse.com/1183168
o https://bugzilla.suse.com/1185924
o https://bugzilla.suse.com/1185925
o https://bugzilla.suse.com/1185926

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=1BHJ
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2347 – [SUSE] postgresql13: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/esb-2021-2347-suse-postgresql13-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2347-suse-postgresql13-multiple-vulnerabilities

ESB-2021.2348 – [Debian] apache2: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2348
apache2 security update
12 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: apache2
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands — Remote/Unauthenticated
Denial of Service — Remote/Unauthenticated
Provide Misleading Information — Remote/Unauthenticated
Access Confidential Data — Remote/Unauthenticated
Reduced Security — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-31618 CVE-2021-30641 CVE-2021-26691
CVE-2021-26690 CVE-2020-35452 CVE-2020-1934
CVE-2020-1927

Reference: ASB-2021.0086
ESB-2021.2341
ESB-2021.2260.2
ESB-2021.2253
ESB-2021.2229

Original Bulletin:
https://www.debian.org/lts/security/2021/dla-2706

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– – ————————————————————————-
Debian LTS Advisory DLA-2706-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
July 09, 2021 https://wiki.debian.org/LTS
– – ————————————————————————-

Package : apache2
Version : 2.4.25-3+deb9u10
CVE ID : CVE-2020-1927 CVE-2020-1934 CVE-2020-35452 CVE-2021-26690
CVE-2021-26691 CVE-2021-30641 CVE-2021-31618

Several vulnerabilities have been found in the Apache HTTP server, which
could result in denial of service. In addition the implementation of
the MergeSlashes option could result in unexpected behaviour.

For Debian 9 stretch, these problems have been fixed in version
2.4.25-3+deb9u10.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=WUI2
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=strm
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2348 – [Debian] apache2: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/12/esb-2021-2348-debian-apache2-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2348-debian-apache2-multiple-vulnerabilities

Sunday, July 11, 2021

Connecting RaaS, REvil, Kaseya and your security posture

Ransomware is an epidemic that adversely affects the lives of both individuals and large companies, where criminals demand payments to release infected digital assets.

In the wake of the ransomware success, Ransomware-as-a-Service (RaaS) is being offered as a franchise model that allows people without programming skills to become active attackers and take part in the ransomware economy. This is a way of democratizing crime, giving ordinary people and smaller players an easier way into the criminal market, while reducing the risk of exposure for the ones on top of the value chain. For instance, a dissatisfied employee might decide to partner up with a RaaS developer to effectively infect an organization from the inside and then splitting the profit.

Wait a minute, this sounds like SaaS (Software as a Service) with the exception of mal-intent and ‘R’ prefix instead of ‘S’ ?

Yes, these organized cybercrime groups have been known to offer 24/7 technical support, subscriptions, quality assurance, affiliate schemes, and online forums just like legitimate SaaS companies. They know that offering a quality service to their (admittedly) criminally-minded clients will help both sides of the venture to become wealthy at the expense of victimized individuals or organizations that they prey upon.

What led to the inception of RaaS ?

The first ransomware, known as AIDS (Aids Info Disk or PC Cyborg Trojan), was observed in the wild already in 1989, spreading through the exchange of floppy disks. Following AIDS ransomware, number of ransomware families were quite low for more than two decades, especially the ones with sophisticated destructive capabilities. However, this all changed with the advent of stronger encryption schemes in the ransomware code and especially the availability of cryptocurrency as a payment method which is fairly difficult to track by law enforcement. In the wake of the ransomware success, ransomware-as-a-service (RaaS) has become an entry point for criminals with little programming skills to participate and earn money from ransomware.

Is there an underpinning supply-chain that benefits a RaaS provider?

Contacting ransomware service providers using dark-net markets, prospective and existing criminal networks can cheaply obtain tailor-made ransomware ready to be used on their prospective victims. In addition to the creation fee, the service providers may take a 20–30% revenue share of the ransom as well.

RaaS can have different delivery formats,

such as source code that the buyer compiles themselves,
pre-compiled binaries or an interactive interface where the buyer inputs information about the victims.
Quality testing weaponized source code or per-compiled binaries to ensure that it operates as expected (usually tested on low risk victims)

This collaborative strategy is a way of achieving a faster rate of infections with a lower risk of getting caught.

Who are the stakeholders in such a ransomware based supply chain?

The stakeholders involved in the underground economy have different responsibilities and expose themselves to different types of risks. They defined several roles, including

virus writers (developers),
website masters/crackers,
envelope (account) stealers,
virtual asset stealers/brokers and
sellers and players (buyers)
mixers and tumblers (money laundering post-transaction)

What is the economics of such an attack from offender and victim’s point of view?

Similar to a SaaS pricing and distribution model, a victim is profiled and targeted based on their business domain, market share, clients that they serve and WTPR (willingness to pay ransom). The amount of a single ransomware can be of a fixed price or discriminated based on several factors (basis associated with complexity of vulnerability the malware is exploiting).

Who is REvil and why are they relevant to this conversation?

REvil (also known as Sodin and Sodinokibi) is a ransomware-as-a-service (RAAS) enterprise that first came to prominence in April 2019. Their claim to fame is based on the employed tactics and techniques which include and not limited it

Their ideal victim profile (like ideal customer profile in SaaS) range from home users to F500 companies
Known to successfully extort far larger payments from large corporate companies
Execute methodical workflow to exfiltrate data prior to encrypting for ransomware (apply additional pressure to leak if victim chooses to restore from backup and not pay ransom)
Yes, REvil has its own web presence (a web site) and often release/update a so-called “Happy Blog” listing their victims, sample of exfiltrated data and a “trial” decryption upon sample subset as a proof-of-decryption (this almost sounds like a SaaS activation, acquisition and retention funnel)
A timer countdown is often pinned to a victim’s profile in order to pressure for response/payment.

Who is Kaseya and why are they relevant to this conversation?

Kaseya sells unified IT monitoring & management software for MSP (Managed Service Providers) and IT reams (multi and single site). The MSPs in turn sell monitoring and management services to their customers. Let’s visualize the supply chain distribution of Kaseya software

How did REvil victimize Kaseya?

Kaseya’s VSA server v9.5.6 had multiple vulnerabilities that were responsibly disclosed by Frank Breedijk. The vulnerabilities including and not limited to

SQL command injection — patched April 10th, 2021
Local File Inclusion — patched May 8th, 2021
Credentials Leak — unpatched (CVE rating 10/10) leading to Request Forgery token bypass
a 2FA (2 factor authentication) bypass on limited API scope — unpatched (CVE rating 9.9) leading to Authentication bypass + Code Injection. The 2FA logic only protected the VSA dashboard but not Live Connect
Having more than 1 tab open in Live Connect, with remote-connect into a fleet PC/virtual desktop/workstation & rebooting it would cause it to reconnect from the last opened tab instead (cross connect within and across fleet instances)
a reflected XSS upon a authenticated API path — unpatched

During the month of June/July 2021, REvil discovered the exposed VSA servers (possibly via recon) and further on, discovered the unpatched vulnerabilities. REvil took credit for launching one of the farthest reaching ransomware attacks on record beginning July 2 and demanded $70 million in Bitcoin in exchange for a universal decryption routine.

The unpatched vulnerabilities on the exposed VSA servers were exploited to introduce a malicious script that was sent to all computers managed by the server, thereby transitively reaching all the end clients. The script further on encrypted the systems.
Trustwave discovered that the malware won’t execute on systems that have Russian, Ukrainian, Belarusian and Romanian default languages set and former Soviet bloc nations in Central Asia, Caucasus as well as Syria.

Credits : https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/diving-deeper-into-the-kaseya-vsa-attack-revil-returns-and-other-hackers-are-riding-their-coattails/

Why did Kaseya fail to address these inherent security issues?

As per the latest Bloomberg article,

Among the most glaring problems was software underpinned by outdated code, the use of weak encryption and passwords in Kaseya’s products and servers, a failure to adhere to basic cybersecurity practices such as regularly patching software and a focus on sales at the expense of other priorities, the employees said.

One of the former employees said that in early 2019 he sent company leaders a 40-page memo detailing security concerns and was fired about two weeks later, which he believed was related to his repeated efforts to flag the problems.

Another employee said Kaseya rarely patched its software or servers and stored customer passwords in clear text — meaning they were unencrypted — on third-party platforms, practices the employee described as glaring security flaws.

Some engineers and developers at the company said employees quit over frustration that new features and products were being prioritized over fixing problems. Others were laid off in 2018, when Kaseya began moving jobs to Minsk, Belarus, where it recruited more than 40 people to do software development work that had previously been carried out in the U.S., according to two of the former employees familiar with the matter. Four of the ex-workers said they viewed the outsourcing of work to Belarus as a potential security issue, given the country’s close political allegiance with the Russian government.

Should we (as SaaS and software vendors) be concerned ?

As U.S. Army Gen. Keith Alexander, aptly paraphrased — “Either you know you’ve been hacked, or you’ve been hacked and you don’t know you’ve been hacked,”

If you are authoring and distributing software as COTS or SaaS (agent, runtime observability, management-monitoring, transactions based, web-based, etc) you should concerned and stay on top of measuring your supply chain’s security posture.

What should we (as SaaS and software vendors) be measuring ?

Detecting Vulnerabilities (OWASP/NIST/MITRE ATT&CK) in your application source code (severity does not matter as a low severe vulnerability can be chained with a logic flaw to initiate an attack sequence)
Detecting Business logic flaws in your application — example IDOR (Insecure Direct Object Reference)
Detecting sensitive data, secrets and token leaks that can be weaponized to infiltrate your hosted applications.
Detecting vulnerable OSS (open source software) that are exploitable on an exposed path
Detecting risk of insider attacks — identify use of suspicious APIs and code flows that can be weaponized in an attack sequence

These detection capabilities should not occur in isolation as context is lost if not correlated.

What should we do and how can ShiftLeft help?

Let’s collectively examine the how we can protect ourselves from this situation

Pay attention to every vulnerability reported (critical or non-critical) and determine if it can become a candidate of an attack chain. Even a simple vulnerability can be weaponized by a RaaS vendor in the dark-net.
Classify your sensitive data and secrets and then determine its lineage, provenance and exposure/leak across all points in your software stack.
Apply the same rigor/discipline of vulnerability discovery and disclosure with all sites of software development (multi-office, offshore development) and vendors that you partner with.
Identify insider attacker risk, as a dissatisfied employee might decide to partner up with a RaaS developer to effectively infect an organization from the inside and then splitting the profit.
Identify and regularly update open source libraries that are vulnerable and can be exploited on exposed API endpoints.
Protect ALL endpoints using 2FA (not just a subset) and operate at heightened level of security

We at ShiftLeft have been studying and provisioning advanced detection policies using code property graph since mid 2019 (that includes OWASP based vulnerabilities, sensitive data leaks, insider attacks, exploitable open source based vulnerabilities, exposed API endpoints). Speak to us and we can help assess and recommend more efficient processes and procedures.

Connecting RaaS, REvil, Kaseya and your security posture was originally published in ShiftLeft Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Connecting RaaS, REvil, Kaseya and your security posture appeared first on Security Boulevard.

Read More

The post Connecting RaaS, REvil, Kaseya and your security posture appeared first on Malware Devil.



https://malwaredevil.com/2021/07/11/connecting-raas-revil-kaseya-and-your-security-posture/?utm_source=rss&utm_medium=rss&utm_campaign=connecting-raas-revil-kaseya-and-your-security-posture

Network Security News Summary for Monday July 12nd, 2021

Post Content

The post Network Security News Summary for Monday July 12nd, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/07/11/network-security-news-summary-for-monday-july-12nd-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-july-12nd-2021

Cybereason and Doosan Corp Partner to Secure APAC Enterprises

Cybereason is excited to announce a partnership with South Korean multinational conglomerate and Global Fortune 2000 leader the Doosan Corporation (Doosan Digital Innovation, or DDI) to protect enterprises from sophisticated cyberattacks on endpoints and across their networks. 

The post Cybereason and Doosan Corp Partner to Secure APAC Enterprises appeared first on Security Boulevard.

Read More

The post Cybereason and Doosan Corp Partner to Secure APAC Enterprises appeared first on Malware Devil.



https://malwaredevil.com/2021/07/11/cybereason-and-doosan-corp-partner-to-secure-apac-enterprises/?utm_source=rss&utm_medium=rss&utm_campaign=cybereason-and-doosan-corp-partner-to-secure-apac-enterprises

BSidesNoVA 2021 – Kyle Fiducia’s, Chris Gates’, Bob Weiss’, Nick Ippolito’s & Arash Parsa’s ‘Panel: Offensive Security’

Our thanks to BSidesNoVA for publishing their outstanding videos on the organization’s YouTube channel.

Permalink

The post BSidesNoVA 2021 – Kyle Fiducia’s, Chris Gates’, Bob Weiss’, Nick Ippolito’s & Arash Parsa’s ‘Panel: Offensive Security’ appeared first on Security Boulevard.

Read More

The post BSidesNoVA 2021 – Kyle Fiducia’s, Chris Gates’, Bob Weiss’, Nick Ippolito’s & Arash Parsa’s ‘Panel: Offensive Security’ appeared first on Malware Devil.



https://malwaredevil.com/2021/07/11/bsidesnova-2021-kyle-fiducias-chris-gates-bob-weiss-nick-ippolitos-arash-parsas-panel-offensive-security/?utm_source=rss&utm_medium=rss&utm_campaign=bsidesnova-2021-kyle-fiducias-chris-gates-bob-weiss-nick-ippolitos-arash-parsas-panel-offensive-security

XKCD ‘Nightmare Code’

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Nightmare Code’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Nightmare Code’ appeared first on Malware Devil.



https://malwaredevil.com/2021/07/11/xkcd-nightmare-code/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-nightmare-code

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...