happygeek, to infosec

Happy New Year. Happy New Google Chrome Zero-Day.

By me at Forbes: The first exploited Chrome zero-day lands in 2024. That didn’t take long…

https://www.forbes.com/sites/daveywinder/2024/01/17/first-new-google-hack-attack-warning-for-2024-update-chrome-now/

br00t4c, to random
@br00t4c@mastodon.social avatar
certbund, to random German

❗️#CERTWarnung❗️
Mindestens seit Dezember werden #Ivanti Connect Secure und Policy Secure-Lösungen mithilfe von #ZeroDay-#Schwachstellen angegriffen. Patches stehen bislang noch nicht zur Verfügung. Der Hersteller bietet jedoch Mitigationsmaßnahmen an.
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-205101-1032.pdf

br00t4c, to random
@br00t4c@mastodon.social avatar

Apache OFBiz zero-day pummeled by exploit attempts after disclosure

https://go.theregister.com/feed/www.theregister.com/2024/01/08/apache_ofbiz_zeroday/

thenewoil, to Cybersecurity
Freemind, to Cybersecurity
@Freemind@mastodon.online avatar

In an effort to prevent further exploitation, Google has refrained from disclosing specific details about the security flaw but has acknowledged the existence of an active exploit in the wild.

#Cybersecurity #Google #Chrome #Vulnerability #ZeroDay

https://cybersec84.wordpress.com/2023/12/21/critical-security-alert-new-chrome-zero-day-vulnerability-found/

happygeek, to infosec

New by me at Forbes: Google has issued a patch for all Chrome users just 24 hours after TAG hackers revealed a high-severity zero-day. Kudos for the speedy response!

https://www.forbes.com/sites/daveywinder/2023/12/21/hackers-prompt-emergency-google-0-day-attack-patch-for-chrome-users/

kensims, to chrome

The Hacker News:
Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild - Update ASAP

https://thehackernews.com/2023/12/urgent-new-chrome-zero-day.html

thenewoil, to Cybersecurity
simontsui, to cisco

Cisco security advisory contains a zero-day: A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. CVE-2023-20275 (4.1 medium severity). The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about the vulnerability that is described in this advisory. The Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.
🔗 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77

cc: @campuscodi

#Cisco #CVE202320275 #zeroday #vulnerability

simontsui, to apple

Hot off the press: CISA adds the two Apple Zero-Days to the Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation:

  • CVE-2023-42916 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability
  • CVE-2023-42917 Apple Multiple Products WebKit Memory Corruption Vulnerability

johnlogic, to infosec
@johnlogic@sfba.social avatar

Via Rob Hansen on Facebook: "Amanda Spindel was the first to alert me to a new zero-day attack on Chrome that's now being seen in the wild. If you're running Chrome or a Chrome-derived browser like Edge or Opera, please update immediately."

(I use mostly the DuckDuckGo and Mozilla Firefox browsers.)

https://www.forbes.com/sites/daveywinder/2023/11/29/new-critical-google-chrome-security-warning-as-0-day-attacks-confirmed/?sh=2661414d4044

br00t4c, to random
@br00t4c@mastodon.social avatar

Mirai we go again: Zero-day flaws see routers and cameras co-opted into botnet

https://go.theregister.com/feed/www.theregister.com/2023/11/23/zeroday_routers_mirai_botnet/

simontsui, to random

Akamai reports that two unidentified Zero-Day RCE vulnerabilities are actively being exploited in the wild to build a distributed denial-of-service (DDoS) InfectedSlurs botnet. The payload targets routers and network video recorder (NVR) devices with default admin credentials and installs Mirai variants when successful. Akamai implies that the two Zero-Days affect router and NVR models, and would reveal details after the vendor(s) release a patch in December. Note: the threat actors use racial slurs and offensive language in their filenames. IOC provided, as well as YARA and Snort rules.
Link: https://www.akamai.com/blog/security-research/2023/nov/new-rce-botnet-spreads-mirai-via-zero-days

#zeroday #vulnerability #eitw #activeexploitation #ddos #InfectedSlurs #botnet #Mirai #YARA #Snort #IOC

simontsui, to random

Google TAG: Zimbra 0-day used to target international government organizations
In June 2023, Google’s Threat Analysis Group (TAG) discovered an in-the-wild 0-day exploit targeting Zimbra Collaboration, an email server many organizations use to host their email. Since discovering the 0-day, now patched as CVE-2023-37580, TAG has observed four different groups exploiting the same bug to steal email data, user credentials, and authentication tokens. Most of this activity occurred after the initial fix became public on Github. To ensure protection against these types of exploits, TAG urges users and organizations to keep software fully up-to-date and apply security updates as soon as they become available.
Link: https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/

cc: @AAKL @todb @campuscodi #zeroday #eitw #vulnerability #CVE202337580 #GoogleTAG #zimbra

simontsui, to microsoft

Happy Patch Tuesday to those who celebrate: Microsoft, 59 vulnerabilities, 5 zero-days:

  • CVE-2023-36025 Windows SmartScreen Security Feature Bypass Vulnerability (8.8 high)
  • CVE-2023-36033 Windows DWM Core Library Elevation of Privilege Vulnerability (7.8 high, publicly disclosed too)
  • CVE-2023-36036 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability (7.8 high)
  • publicly disclosed: CVE-2023-36413 Microsoft Office Security Feature Bypass Vulnerability (6.5 medium)
  • publicly disclosed: CVE-2023-36038 ASP.NET Core Denial of Service Vulnerability (8.2 high)



cc: @AAKL @avoidthehack @todb EDIT: added 2 publicly disclosed (considered zero-days)

simontsui,

@AAKL @avoidthehack @todb
CISA Adds Three Known Exploited Vulnerabilities to Catalog based on evidence of active exploitation:

  • CVE-2023-36025 Windows SmartScreen Security Feature Bypass Vulnerability (8.8 high)
  • CVE-2023-36033 Windows DWM Core Library Elevation of Privilege Vulnerability (7.8 high, publicly disclosed)
  • CVE-2023-36036 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability (7.8 high)

Link: https://www.cisa.gov/news-events/alerts/2023/11/14/cisa-adds-three-known-exploited-vulnerabilities-catalog

PogoWasRight, to infosec

From BankInfoSecurity:

"Hackers potentially linked to the Russian GRU Main Intelligence Directorate carried out a series of highly coordinated cyberattacks targeting Danish critical infrastructure in the nation's largest cyber incident on record, according to a new report.

SektorCERT, a nonprofit cybersecurity center for critical sectors in Denmark, reported that attackers gained access to the systems of 22 companies overseeing various components of Danish energy infrastructure in May. The report published Sunday says hackers exploited zero-day vulnerabilities in Zyxel firewalls, which many Danish critical infrastructure operators use to protect their networks."

Read more: https://www.bankinfosecurity.com/denmark-hit-largest-cyberattack-on-record-a-23584

#CriticalInfrastructure #hack #zeroday #databreach #infosec #cybersecurity

@campuscodi @briankrebs @GossiTheDog @BleepingComputer

br00t4c, to random
@br00t4c@mastodon.social avatar

MOVEit cybercriminals unearth fresh zero-day to exploit on-prem SysAid hosts

https://go.theregister.com/feed/www.theregister.com/2023/11/09/moveit_cybercriminals_behind_latest_sysaid/

simontsui, to China

Washington Post: Chinese hackers are increasingly implanting sophisticated, disruptive malware in U.S. critical infrastructure that’s difficult to uncover. NSA says it’s seeing a rise in China’s use of previously unknown or “zero-day” vulnerabilities, as well as “living off the land" techniques.
Link: https://www.washingtonpost.com/politics/2023/11/10/nsa-officials-call-out-chinese-hackers-stealthy-off-limits-hacks/

#China #NSA #USA #livingofftheland #zeroday #cybersecuritynews

AAKL, to Cybersecurity

deleted_by_author

  • Loading...
  • simontsui,

    @avoidthehack @AAKL Yep, I tooted about it yesterday morning while the news was fresh. There's a Microsoft Threat Intelligence tweet. The official SysAid security advisory describes post-compromise activity and includes PowerShell commands and Indicators of Compromise. The Huntress article contains technical analysis and additional IOC.

    CISA and federal agencies are aware of the exploited Zero-Day, and are likely to add at least 2-3 to the Known Exploited Vulnerabilities Catalog soon.

    #SysAid #zeroday #eitw #activeexploitation #CVE202347246 #IOC #CL0P #ransomware #cybercrime #Microsoft #vulnerability #KEV #KnownExploitedVulnerabilitiesCatalog

    simontsui, to microsoft

    Microsoft has discovered exploitation of a 0-day vulnerability in the SysAid IT support software in limited attacks by Lace Tempest, a threat actor that distributes Clop ransomware. Microsoft notified SysAid about the issue (CVE-2023-47246), which they immediately patched.
    Link: https://twitter.com/msftsecintel/status/1722444141081076219

    cc: @AAKL @avoidthehack

    simontsui, to random

    Security Week: The Atlassian Confluence improper authorization vulnerability CVE-2023-22518 (9.1 critical severity, disclosed 31 October 2023 by Atlassian, significant data loss) is reported under active exploitation. CVE-2023-22518 has a now-public Proof of Concept, as well as technical details (released by Project Discovery). See GreyNoise observations of CVE-2023-22518 exploitation.
    Link: https://www.securityweek.com/exploitation-of-critical-confluence-vulnerability-begins/

    simontsui,

    Rapid7 is observing exploitation of Atlassian Confluence in multiple customer environments, with some of the exploits targeting CVE-2023-22518 and even CVE-2023-22515, potentially leading to ransomware deployment. Edit: Post-exploitation behavior and IOC included.

    CVE-2023-22515 is an actively exploited broken access control zero-day vulnerability that was disclosed on 04 October 2023 with a CVSS score of 10.0 critical, that Microsoft observed being exploited by Chinese state hackers.
    Link: https://www.rapid7.com/blog/post/2023/11/06/etr-rapid7-observed-exploitation-of-atlassian-confluence-cve-2023-22518/

    #CVE202322518 #CVE202322515 #Atlassian #Confluence #zeroday #IOC #KEV #KnownExploitedVulnerabilitiesCatalog #CISA #China #ransomware #Cerber #eitw #activeexploitation cc: @AAKL

    simontsui,

    In case you missed it (because I had), Atlassian updated their security advisory on CVE-2023-22518: " we observed several active exploits and reports of threat actors using ransomware. We have escalated CVE-2023-22518 from CVSS 9.1 to 10, the highest critical rating, due to the change in the scope of the attack." CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    Link: https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html

    jbzfn, to Cybersecurity
    @jbzfn@mastodon.social avatar

    🔥 New Microsoft Exchange zero-days allow RCE, data theft attacks
    @BleepingComputer

    「 Despite Microsoft acknowledging the reports, its security engineers decided the flaws weren't severe enough to guarantee immediate servicing, postponing the fixes for later.

    ZDI disagreed with this response and decided to publish the flaws under its own tracking IDs to warn Exchange admins about the security risks 」

    https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/

    #MicrosoftExchange #Cybersecurity #RCE #ZeroDay

    dc, to microsoft
    @dc@social.advancedsoftware.engineering avatar

    " is impacted by four zero-day vulnerabilities that attackers can remotely to execute arbitrary code or disclose sensitive information on affected installations."

    https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • everett
  • magazineikmin
  • mdbf
  • thenastyranch
  • khanakhh
  • rosin
  • Youngstown
  • ethstaker
  • slotface
  • modclub
  • kavyap
  • DreamBathrooms
  • Durango
  • provamag3
  • ngwrru68w68
  • InstantRegret
  • tacticalgear
  • GTA5RPClips
  • cubers
  • normalnudes
  • osvaldo12
  • tester
  • anitta
  • cisconetworking
  • megavids
  • Leos
  • lostlight
  • All magazines