GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

NoName057(16) are targeting the UK today, so I shall start monitoring them and naming their targets and attack types.

Their targeting: https://raw.githubusercontent.com/GossiTheDog/Monitoring/main/NoName/targets_2023_12_07_11am.txt

Currently:
pa.eastcambs.gov.uk
politics.leics.gov.uk
www.liverpool.gov.uk
www.mil.be
www.bollington-tc.gov.uk
www.cranbrooktowncouncil.gov.uk
cert.be
my.swiftcard.org.uk
www.monarchie.be
www.premier.be
www.david-clarinval.be
www.dekamer.be
www.senaat.be

#threatintel #noname

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

A bunch of people have alerted me to a vulnerability in #MoveIT, a secure file transfer app used heavily in the UK.

I did some digging and it looks like it’s a zero day under active exploitation. Not 100% on threat actor yet but it may be one of the ransomware/extortion groups.

Really serious, impacted orgs should shut down the server. Thread follows. #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

⚠️ want a highly impactful, actively exploited border gateway zero days situation to wake you up?

Ivanti Pulse Secure aka Ivanti Connect Secure and Ivanti Policy Secure Gateway customers - prepare to deploy mitigations and await follow on patches.

In the wild exploitation, probable nation state - includes authentication (including MFA) bypass and code execution.

Looks like Ivanti have done a really good job identifying.

I call it ConnectAround.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Interesting Citrix Netscaler bug being mass exploited in the wild for about a month.

This is the HTTP request:

GET /oauth/idp/.well-known/openid-configuration HTTP/1.1
Host: a <repeated 24812 times>
Connection: close

It replies with system memory, which includes session tokens that you can use it gain remote access, bypassing authentication including MFA.

I think this one may have more legs than people realise.

https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Regarding MGM Resorts - while there are reports things are fixed, this very definitely isn’t true.

I’ve been monitoring their on prem network border - everything is down still. DMZ, WAN etc. #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Orange Spain outage looks real, BGP hijack by somebody for laughs apparently. #threatintel https://benjojo.co.uk/u/benjojo/h/r1zj333N4L6cF7P1xv

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

A few days ago, IT systems and services at Leicester City Council stopped working. Councillors were not told the cause. (Link: https://www.leicestermercury.co.uk/news/leicester-news/systems-outage-leicester-city-council-9151322)

At 7pm this Friday, they tweeted it is a "cyber incident". Services are still offline.

#threatintel

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

A ransomware attack on the Industrial and Commercial Bank of China has disrupted the US Treasury market #threatintel https://www.ft.com/content/8dd2446b-c8da-4854-9edc-bf841069ccb8

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Cyber Toufan are back wiping companies who do business with Israel.

I think they realised companies have been restoring using their dumps (they also wipe backups). #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

An org hit by ransomware is telling me the threat actor got in via WS_FTP, for infos, so you might want to prioritise patching that. #threatintel.

mttaggart, (edited ) to infosec

Hey, KeePassXC did get its own vuln!: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35866

Basically neither the master password change dialog nor the 2FA settings dialog require the current master password to function. So to exploit this, you'd need GUI access to a machine with an unlocked KeePassXC session. It's not nearly as scary as the KeePass vuln we saw a few weeks ago, but appears to be planned to be addressed in version 2.8.0.

EDIT: This is a BOGUS CVE that was created in bad faith. None of this should be considered a "vulnerability" so much as "how password managers work." Apologies to @keepassxc, who do fantastic work and whose project I use professionally and endorse.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

HT to @brett, apparently LockBit 3.0’s site has been seized by the NCA.

If real, the NCA should note the leaked data, file share and private note servers and portals are still online. #threatintel

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

Nissan Australia and New Zealand are dealing with a “cyber incident”, which likely translates as ‘paying the ransom with the help of the Australian government’. https://www.nissan.com.au/

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

I did a write up about Cyber Toufan - over 100 orgs breached and data dumped, including multiple cyber security vendors, about a third haven't been able to recover after being wiped. Includes TTPs, suggestions.

Customers of customers of customers of customers have been getting emails from threat actor, who are sending what are the first (?) lobbying emails from hack of a supply chain.

https://doublepulsar.com/cyber-toufan-goes-oprah-mode-with-free-linux-system-wipes-of-over-100-organisations-eaf249b042dc

#threatintel #cybertoufan

SophosXOps, to random

During a recent investigation, Sophos X-Ops discovered a trojanized Windows installer for CloudChat, an instant messaging application. Looking into this supply chain attack further, we found that the official distribution server for the application had been compromised, and delivered a Window installer modified to load an additional, malicious DLL. This DLL contained an encrypted payload that connected back to a C2 server to download and execute the next stage malware. We contacted the vendor when we found this issue, but at the time of posting haven’t received a response.

#Sophosxops #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

ransomchats - open source #ransomware negotiations

https://ransomch.at/

Example chat Royal Mail, watch their ransomware play out in real time: https://ransomch.at/lockbit3.0-royalmailgroup_com

Data in JSON format. https://github.com/Casualtek/Ransomchats

HT @ValeryMarchive #threatintel

postmodern, to infosec

Now that Twitter is rate limiting access, and more users who create Twitter's content are leaving, I wonder how this will impact all of those so-called "Threat Intel" companies? I know of at least one which was likely getting most of it's data from Twitter searches. I'm guessing most of these companies will pay for the Blue Checkmark to retain access to Twitter's now Premium API, but what's the point if the users who create the data are leaving? The second option is moving their data-mining operations over to ActivePub, except ActivePub isn't curated by fancy algorithms, it's just a raw fire hose.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Threat actors have remotely wiped the infrastructure of Infotel JSC, which provides communication interconnects amongst Russian banks. They’ve been down since yesterday. A group called Cyber Anarchy Squad are claiming credit. #threatintel

image/jpeg

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

🚨 patch your Cisco AnyConnect boxes 🚨

For a 2020 vulnerability. Really.

Lots of ransomware cases coming in for Cisco AnyConnect/ASA recently and find finally we know how - CVE-2020-3259

It was a vuln which allowed a CitrixBleed style memory dump, found by a Russian research org now under US sanctions. Ransomware operators have an exploit.

Sadly it looks like many orgs never patched.

https://www.truesec.com/hub/blog/akira-ransomware-and-exploitation-of-cisco-anyconnect-vulnerability-cve-2020-3259

#threatintel

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

There's a zero day in Confluence being exploited in the wild, to bypass authentication. Vendor aren't calling it zero day (of course) but it is.

CVE-2023-22515 - allows you to use /setup URL to create a new admin user on existing instance.

Advisory: https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html

FAQ:
https://confluence.atlassian.com/kb/faq-for-cve-2023-22515-1295682188.html

#threatintel #vulnerability

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Apparently law enforcement have seized AlphV ransomware's portal (it had reappeared in the past week and started listing victims again). http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/

#threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

LockBit have apparently reappeared, claiming they have hit the FBI. #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Black Basta have hit ABB. Their biggest victim so far, it’s bigger than Capita.

Not in article but Black Basta are using Qakbot via web links - eg SEO poisoning, fake browse updates.

#threatintel #qakbot #blackbasta

https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

Cyber Anarchy Squad - who recently hit Infotel in Russia - are claiming they have hit #Dozortel (aka DoZor-Teleport), the satellite internet provider in Russia.

They are saying they've impacted firmware on client modems.

So far, I can confirm a network outage at Dozortel.

#threatintel

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • kavyap
  • DreamBathrooms
  • khanakhh
  • GTA5RPClips
  • osvaldo12
  • magazineikmin
  • mdbf
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • everett
  • Durango
  • JUstTest
  • ngwrru68w68
  • modclub
  • tester
  • tacticalgear
  • cubers
  • thenastyranch
  • cisconetworking
  • ethstaker
  • Leos
  • provamag3
  • normalnudes
  • anitta
  • lostlight
  • All magazines