majorlinux, to apple
@majorlinux@toot.majorshouse.com avatar
simontsui, to microsoft

Microsoft has discovered exploitation of a 0-day vulnerability in the SysAid IT support software in limited attacks by Lace Tempest, a threat actor that distributes Clop ransomware. Microsoft notified SysAid about the issue (CVE-2023-47246), which they immediately patched.
Link: https://twitter.com/msftsecintel/status/1722444141081076219

cc: @AAKL @avoidthehack

BenjaminHCCarr, to Russia
@BenjaminHCCarr@hachyderm.io avatar
simontsui, to cisco

Cisco Security Advisory: Actively exploited Zero-Day CVE-2023-20198 Cisco IOS XE Software Web UI Privilege Escalation Vulnerability. "Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system."

Link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Tags: cc: @dangoodin @avoidthehack @campuscodi

PogoWasRight, to infosec

From BankInfoSecurity:

"Hackers potentially linked to the Russian GRU Main Intelligence Directorate carried out a series of highly coordinated cyberattacks targeting Danish critical infrastructure in the nation's largest cyber incident on record, according to a new report.

SektorCERT, a nonprofit cybersecurity center for critical sectors in Denmark, reported that attackers gained access to the systems of 22 companies overseeing various components of Danish energy infrastructure in May. The report published Sunday says hackers exploited zero-day vulnerabilities in Zyxel firewalls, which many Danish critical infrastructure operators use to protect their networks."

Read more: https://www.bankinfosecurity.com/denmark-hit-largest-cyberattack-on-record-a-23584

#CriticalInfrastructure #hack #zeroday #databreach #infosec #cybersecurity

@campuscodi @briankrebs @GossiTheDog @BleepingComputer

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

→ 🇺🇸 🇨🇳 The US Navy, NATO, and are using a shady Chinese company’s chips
→ 🦠 🏢 Group Starts Naming Victims of Zero-Day Attacks
→ ☁️ 🪣 New Supply Chain Attack Exploits Abandoned to Distribute Malicious Binaries
→ ☁️ Vulnerabilities in Led to Unauthorized Access to User Sessions
→ 🇨🇳 🦠 ESG zero-day attacks linked to suspected Chinese hackers
→ 🇷🇺 🇺🇸 Russian national arrested in Arizona, charged for alleged role in ransomware attacks
→ 🇷🇺 🇺🇦 Russia-backed hackers unleash new USB-based malware on ’s military
→ 🇺🇸 💰 LockBit Ransomware Extorts $91 Million from U.S. Companies
→ 🇷🇺 🇺🇦 identifies new hacking unit within Russian military intelligence
→ 🦠 Fake Researcher Profiles Spread through Repositories as PoC Exploits
→ 🎣 👟 Massive campaign uses 6,000 sites to impersonate 100 brands
→ 🇨🇳 Chinese Cyberspies Caught Exploiting ESXi
→ 🩹 Microsoft , June 2023 Edition
→ ☁️ Microsoft: Azure Portal was caused by traffic “spike”
→ 🇨🇳 🇺🇸 's cyber now aimed at infrastructure, warns CISA boss
→ 🇰🇷 🇨🇳 Ex-Samsung executive alleged to have stolen tech to recreate chip plant in China
→ 🇨🇭 🗄️ Swiss Fear Government Data Stolen in Cyberattack
→ 🩹 🔐 fixes critical RCE flaw in SSL-VPN devices, patch now

📚 This week's recommended reading is: "The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values — and What We Can Do About It" by Prof Mary Aiken

Subscribe to the to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-242023

simontsui, to random

Ron Bowes @iagox86 at @greynoise describes payloads leveraging the Ivanti Connect Secure vulnerabilities #CVE202346805 and #CVE202421887 to install cryptominers. IOC provided.
🔗 https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers

#threatintel #Ivanti #ConnectSecure #zeroday #vulnerability #eitw #IOC #KEV

simontsui, to random

ARM Mali GPU Driver Zero-Day CVE-2023-4211: A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory. There is evidence that this vulnerability may be under limited, targeted exploitation. Reported by Google's Threat Analysis Group and Google Project Zero.
Link: https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities

Tags:

simontsui, to random

Microsoft Security Response Center (MSRC) posted an official response for Microsoft products identified as impacted by CVE-2023-4863 and CVE-2023-5217, the two exploited Zero-Days in open-source libraries (disclosed by Google on 11 and 27 September 2023 respectively) found to affect other applications beyond Google Chrome. cc: @dangoodin
Link: https://msrc.microsoft.com/blog/2023/10/microsofts-response-to-open-source-vulnerabilities-cve-2023-4863-and-cve-2023-5217/

Tags: #CVE20234863 #CVE20235217 #activeexploitation #zeroday #libwebp #libvpx #webp

LMGsecurity, to Cybersecurity

Heads up: and issued a maximum severity alert urging you to patch Atlassian Confluence immediately due to critical security vulnerabilities. Read more: https://www.bleepingcomputer.com/news/security/cisa-fbi-urge-admins-to-patch-atlassian-confluence-immediately/

censys, to cisco

Read our full analysis on the #Cisco IOS XE Web UI #zeroDay here: https://censys.com/cve-2023-20198-cisco-ios-xe-zeroday/

As of last night, we're seeing over 34k devices that appear to be compromised...

The #CensysResearch team is continuing to monitor exposure and devices with signs of compromise.

#threatResearch #vulnerability #CVE202320198 #zeroDay

simontsui, to cisco

Cisco Zero-Day Threat Actor Update:

Fox-IT observed that the implant placed on tens of thousands of Cisco devices has been altered to check for an Authorization HTTP header value before responding. "This explains the much discussed plummet of identified compromised systems in recent days. Using a different fingerprinting method, Fox-IT identifies 37890 Cisco devices that remain compromised."
Link: https://www.linkedin.com/posts/fox-it_2_important-we-have-observed-that-the-implant-activity-7122238350849150976-Qy1-/

johnlogic, to infosec
@johnlogic@sfba.social avatar

Via Rob Hansen on Facebook: "Amanda Spindel was the first to alert me to a new zero-day attack on Chrome that's now being seen in the wild. If you're running Chrome or a Chrome-derived browser like Edge or Opera, please update immediately."

(I use mostly the DuckDuckGo and Mozilla Firefox browsers.)

https://www.forbes.com/sites/daveywinder/2023/11/29/new-critical-google-chrome-security-warning-as-0-day-attacks-confirmed/?sh=2661414d4044

osma, to telegram
@osma@mas.to avatar

#ISW, May 8 assessment: "Reports indicate that there is an available open-source tool that allows people to search by specific coordinates for Telegram users who have enabled a certain location-sharing setting."

But of course there is. The russian-engineering, roll-your-own-crypto, cryptocoin-shilling, encrypted-but-not-encrypted messaging app to have a zero-day exploited privacy flaw exposing users' location? I can't imagine where such failures would come from.

#telegram #zeroday #privacy

certbund, to random German

❗️#CERTWarnung❗️
Mindestens seit Dezember werden #Ivanti Connect Secure und Policy Secure-Lösungen mithilfe von #ZeroDay-#Schwachstellen angegriffen. Patches stehen bislang noch nicht zur Verfügung. Der Hersteller bietet jedoch Mitigationsmaßnahmen an.
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-205101-1032.pdf

simontsui, to apple

Hot off the press: Apple zero day: CVE-2024-23222 affects Webkit: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.

#Apple #zeroday #vulnerability #activeexploitation #eitw #CVE202423222

zeljkazorz, to Cybersecurity

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on supported (and some legacy) versions of Windows could spell trouble for enterprise defenders.

Discovered by a security researcher named Florian and reported to Microsoft, the vulnerability is yet to be patched. In the meantime, the researcher has gotten the go-ahead from the company to publish a PoC exploit.

@0patch

simontsui, to random

In CISA's ICS advisory, they revealed that several Hitron Systems Security Camera DVR denial of service vulnerabilities were being actively exploited. These are Zero days reported by Akamai.

  • CVE-2024-22768 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22769 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22770 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22771 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-22772 (7.4 high) improper input validation to Denial of Service
  • CVE-2024-23842 (7.4 high) improper input validation to Denial of Service

🔗 https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-04

simontsui, to random

watchTowr reports additional zero-days uncovered on a fully patched Ivanti appliance. No further information due to 90 day vulnerability disclosure policy.

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #CVE_2024_21888
#CVE_2024_21893 cc: @todb @ntkramer @campuscodi @serghei @dangoodin @catc0n
CVE_2024_21893

simontsui, to random

Volexity recently disclosed details related to exploitation of Ivanti Connect Secure VPN, revealing how the attacker chained two zero-day vulnerabilities to achieve remote code execution. When investigating the source of compromise, Volexity employed memory forensics, analyzing a memory sample collected from a suspected compromised VPN device, which allowed Volexity to zero in on the source of the compromise. "The lesson for analysts is to independently verify the integrity and trustworthiness of high-value targets using memory forensics, rather than only relying on tools that run on a potentially compromised device."
🔗 https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/

simontsui, to random

New Fortinet zero-day:
CVE-2024-21762 (9.6 critical) FortiOS - Out-of-bound Write in sslvpnd: A out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.

Note: This is potentially being exploited in the wild.

🔗 https://www.fortiguard.com/psirt/FG-IR-24-015

#Fortinet #FortiOS #zeroday #activeexploitation #eitw #CVE_2024_21762

simontsui,

Why you should care about CVE-2024-21762:

Fortinet vulnerabilities have historically been targeted by People’s Republic of China (PRC) state-sponsored cyber actors. On 19 January 2023, Mandiant reported the exploitation of FortiOS SSL VPN vulnerability CVE-2022-42475 as a zero-day by suspected Chinese threat actors. Mandiant published a subsequent blog post on 16 March 2023 detailing the exploitation of another FortiOS zero-day CVE-2022-41328 by the Chinese threat actor UNC3886. CISA, FBI and NSA assess that PRC state-sponsored cyber actors are seeking to position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States. CISA’s joint cybersecurity advisory on 07 February 2024 states that Chinese Advanced Persistent Threat (APT) Volt Typhoon likely obtained initial access by exploiting CVE-2022-42475 in a network perimeter FortiGate 300D firewall that was not patched. Fortinet also provided case studies of Volt Typhoon targeting of manufacturing, consulting, local government, and internet service provider sectors, and post-exploitation activity described as Living Off the Land (LotL) techniques.

jikodesu, to tech
@jikodesu@mastodon.social avatar

"Google said it discovered the unknown Variston customer using these zero-days in March 2023 to target iPhones in Indonesia. The hackers delivered an SMS text message containing a malicious link that infected the target’s phone with spyware, and then redirected the victim to a news article by the Indonesian newspaper Pikiran Rakyat."

https://techcrunch.com/2024/02/06/government-hackers-targeted-iphones-owners-with-zero-days-google-says/?guccounter=1

xtaran, to linux
@xtaran@chaos.social avatar

The xz backdoor storm isn't over yet and the next storm seems coming up: #LocalPrivilegeEscalation in the #Linux #kernel 5.15 to 6.5 (at least): https://github.com/YuriiCrimson/ExploitGSM

Affects at least #Debian 12 Stable and #Ubuntu 22.04 LTS (including HWE kernels).

(Via https://twitter.com/matteyeux/status/1777974230325354579 and https://www.reddit.com/r/linux/comments/1c0i7tx/someone_found_a_kernel_0day/)

#LPE #Exploit #ZeroDay #ZeroDayExploit #ZDE

simontsui, to random

CISA issues Emergency Directive 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities in response to CVE-2023-46805 (8.2 high, disclosed by Ivanti on 10 January 2024 as exploited zero-days) authentication bypass in Ivanti Connect Secure VPN Version 9.x and 22.x and CVE-2024-21887 (9.1 critical) command injection in Ivanti Connect Secure VPN Version 9.x and 22.x

🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities

simontsui,

CISA released supplemental directions for Emergency Directive 24-01 Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities. This assumes anyone running Ivanti Connect Secure or Ivanti Policy Secure solutions have been compromised and the remediation steps include isolating the device from resources, continue threat hunting, performing a factory reset, applying the patch, etc.
🔗 https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities#SupplementalDirectionV1

#Ivanti #ConnectSecure #vulnerability #zeroday #eitw #activeexploitation #UTA0178 #UNC5221 #CVE_2023_46805 #CVE_2024_21887 #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #CVE_2024_21888 #CVE_2024_21893 #EmergencyDirective

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • everett
  • osvaldo12
  • magazineikmin
  • thenastyranch
  • rosin
  • normalnudes
  • Youngstown
  • Durango
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • tester
  • InstantRegret
  • ethstaker
  • GTA5RPClips
  • tacticalgear
  • Leos
  • anitta
  • modclub
  • khanakhh
  • cubers
  • cisconetworking
  • provamag3
  • megavids
  • lostlight
  • All magazines