neurovagrant, to Cybersecurity
@neurovagrant@masto.deoan.org avatar

Whole lot of IDN Homoglyph Attack registrations via GoDaddy and hosted on Amazon the past few days. Examples from yesterday and today:

xn--fcbook-pta36b[.]com (fácębook[.]com)

xn--xnt-rmal15isb[.]com (xƭínïtƴ[.]com)

xn--xnt-vmag15isb[.]com (xƭînïtƴ[.]com)

xn--goole-b3b[.]com (gooǵle[.]com)

neurovagrant,
@neurovagrant@masto.deoan.org avatar

Also seeing a Cloudflare-protected IDN targeting the Binance "smartchain" minucoin:

xn--minucin-gx4c[.]com (minucọin[.]com)

A Namecheap-registered, Limenet-hosted IDN impersonating fedex:

xn--fdx-krab[.]com (fėdėx[.]com)

neurovagrant,
@neurovagrant@masto.deoan.org avatar

This is a neat one. Not an IDN, but thanks to the fine folks at Squarespace:

maersk-internal[.]com

Something tells me Maersk isn't running internal software on... Squarespace.

(A reminder that Maersk is one of the most-impersonated brands out there, along with Fedex).

neurovagrant, (edited )
@neurovagrant@masto.deoan.org avatar

Seeing an actor register a bunch of domains through OwnRegistrar, protected by Cloudflare, that contain both "okta" and "segment" - several are already marked as active phishing sites.

gateway-okta-segment[.]com
segment-okta-gateway[.]com
segment-okta-portal[.]co
segment-okta-access[.]com
segment-okta-portal[.]com

neurovagrant,
@neurovagrant@masto.deoan.org avatar

Also seeing a cluster of Namesilo registrations of okta-company or company-okta domains and similar.

okta-keap[.]com and keap-okta[.]com (small biz CRM)

okta-plaid[.]com and plaid-okta[.]com (payments)

astranis-okta[.]app (satcom)

bizzabo-okta[.]com (event mgmt)

adasupport-okta[.]com and okta-adasupport[.]com (cust service platform)

okta-verified[.]com

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

BrandyWine have filed an 8-K with the SEC for a “third party deploying encryption” which is a unique way of saying ransomware

https://www.sec.gov/Archives/edgar/data/1060386/000119312524133132/d824906d8k.htm

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

DocGo have filed an 8-K with the SEC for a security breach. Medical records related to ambulances in the US.

https://www.sec.gov/Archives/edgar/data/1822359/000182235924000037/dcgo-20240507.htm

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

LockBit are claiming they have hit Deutsche Telekom

nopatience, to random
@nopatience@swecyb.com avatar

NoName are going bananas with DDoS-attacks against Finland since a few days ago.

Sup?

mttaggart, to Aruba

CVSS 9.8 Buffer overflow -> RCE in ArubaOS:

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

Note that it says "results in the ability," not "may result in the ability" to execute remote code.

Affected Products 
================= 
HPE Aruba Networking 
  - Mobility Conductor (formerly Mobility Master) 
  - Mobility Controllers 
  - WLAN Gateways and SD-WAN Gateways managed by Aruba Central 
  
Affected Software Versions: 
  - ArubaOS 10.5.x.x:       10.5.1.0 and below 
  - ArubaOS 10.4.x.x:       10.4.1.0 and below 
  - ArubaOS 8.11.x.x:       8.11.2.1 and below 
  - ArubaOS 8.10.x.x:       8.10.0.10 and below 
  
The following ArubaOS and SD-WAN software versions that are End 
of Maintenance are affected by these vulnerabilities and are not 
patched by this advisory: 
  - ArubaOS 10.3.x.x:          all 
  - ArubaOS 8.9.x.x:           all 
  - ArubaOS 8.8.x.x:           all 
  - ArubaOS 8.7.x.x:           all 
  - ArubaOS 8.6.x.x:           all 
  - ArubaOS 6.5.4.x:           all 
  - SD-WAN 8.7.0.0-2.3.0.x:    all 
  - SD-WAN 8.6.0.4-2.2.x.x:    all 

More vulns in the replies.

www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-004.txt
support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04640en_us&docLocale=en_US

mttaggart,

CVE-2024-26304: CVSS 9.8

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote codeby sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211).Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Dropbox have filed an 8-K with the SEC for a breach. Access included user Oauth, API and MFA tokens.

https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm

mttaggart, to Cybersecurity

Okay 20% of repos is...high.

Our research reveals that nearly 20% of these public repositories (almost three million repositories!) actually hosted malicious content. The content ranged from simple spam that promotes pirated content, to extremely malicious entities such as malware and phishing sites, uploaded by automatically generated accounts.

jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/

neurovagrant, to Cybersecurity
@neurovagrant@masto.deoan.org avatar

Few things are as ubiquitous in the US as road toll fees, and a @DomainTools colleague has now published a post about a threat actor targeting folks with fake toll scams.

https://www.domaintools.com/resources/blog/you-must-pay-the-toll-troll/

neurovagrant, to random
@neurovagrant@masto.deoan.org avatar

also, thanks to the folks at Namecheap and Sedo Gmbh for registering and hosting

xn--shareoint-kvc[.]com

which displays in most contexts as

shareƿoint[.]com

(note the irregular p)

neurovagrant,
@neurovagrant@masto.deoan.org avatar

GoDaddy and CloudFlare's entries in today's thread going strong with

xn--nstagram-w70d[.]com

which displays in most contexts as:

ỉnstagram[.]com

New NS record as of today pointing at Cloudflare, looks like it's just spinning up.

Previous landing page for this domain, from 2020:

neurovagrant,
@neurovagrant@masto.deoan.org avatar

Gandi also scores high on my craplist, with

login-mailchimp[.]com

which I'm sure is super legit. (Keep in mind Mailchimp, Hubspot, and related B2B SaaS companies continue to be targeted for cryptocurrency heists.)

Gandi registration and hosting
Newly active as of 2024-04-27

neurovagrant,
@neurovagrant@masto.deoan.org avatar

globalprotectdownload[.]org had some great timing

first seen 2024-04-08

(the PANGP vuln came out 04-12 I think)

1&1Ionos/United Domains out of Germany, completely different domain profile from PAN itself.

neurovagrant, to random
@neurovagrant@masto.deoan.org avatar

Seeing a handful of newly registered domains with VMware-impersonating landing pages.

Registrar: Gname
IP: CloudFlare
NS: share-dns[.]com
First observed: 2024-04-24

Landing page impersonating vmware:
gl-vmwareopts[.]com
vmwarewebs[.]com
gl-vmwarewebs[.]com

Same domain profile, currently 404's:
vmwareopts[.]com

neurovagrant,
@neurovagrant@masto.deoan.org avatar

Looking at my favorite pet peeves, IDN homoglyph domains, it appears actors are targeting procurement SaaS procurify[.]com from Russian IPs, example:

xn--procurfy-h2a[.]com

which in most contexts displays as:

procurífy[.]com

(note the diacritical mark over the i)

Interestingly, the IP hosts several other sites targeting Brunei and Dubai.

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

🚨🚨 two zero days in Cisco ASA AnyConnect under exploitation since last year

CVE-2024-20353 and CVE-2024-20359

https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

INC Ransomware claim they have 3tb of NHS Scotland data.

It may be related to the ongoing ransomware breach at NHS Dumfries and Galloway (“cyber attack”)

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

INC Ransomware have dumped patient data from the NHS Dumfries and Galloway incident https://www.bbc.com/news/articles/cglvpnpxx87o

For what it’s worth, I think it’s good the Scottish government didn’t pay - they should use their powers to suppress data proliferation.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Huge US healthcare provider Change Healthcare has a “cybersecurity incident” going on for 15 hours and has shut down systems. https://techcrunch.com/2024/02/21/change-healthcare-cyberattack/

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

The CEO says entry to Change Healthcare was via an unspecified Citrix vulnerability https://www.reuters.com/technology/cybersecurity/unitedhealth-hackers-took-advantage-citrix-vulnerabilty-break-ceo-says-2024-04-29/

This conflicts with a prior WSJ report saying lack of MFA. Although maybe lack of MFA on Netscaler was the vulnerability.

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

TechCrunch has really good coverage: https://techcrunch.com/2024/04/30/uhg-change-healthcare-ransomware-compromised-credentials-mfa/

Change Healthcare didn’t use MFA on Citrix Netscaler. It was a bog standard ransomware incident.

One learning for the industry btw - I saw loads of threat intel channels circulating incorrect info about the incident. That’s fine, but some (eg the health info sharing authorities) reshared this wrong info.

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

The CEO of UnitedHealth is due to give testimony in Washington on their Change Healthcare ransomware incident tomorrow, where he will say “Our company alone repels an attempted intrusion every 70 seconds – thwarting more than 450,000 intrusions per year”

That sound impressive, but if you own a Windows PC at home, you’re doing the same thing - it’s called the built in firewall.

Not having MFA on Citrix Netscaler is also called negligence.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • rosin
  • InstantRegret
  • ethstaker
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • thenastyranch
  • Youngstown
  • tacticalgear
  • slotface
  • Durango
  • khanakhh
  • kavyap
  • megavids
  • everett
  • vwfavf
  • normalnudes
  • osvaldo12
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ngwrru68w68
  • anitta
  • provamag3
  • tester
  • modclub
  • JUstTest
  • All magazines