simontsui, to random

VulnCheck wrote about 7777-Botnet with the following information:

  • 7777-Botnet remains active, and VulnCheck used co-located services to theorize the botnet is infecting TP-Link, Xiongmai, and Hikvision devices using CVE-2017-7577, CVE-2018-10088, CVE-2022-45460, CVE-2021-36260, and/or CVE-2022-24355.
  • The botnet also appears to infect other systems like MVPower, Zyxel NAS, and GitLab, although at a very low volume.
  • The botnet doesn’t just start a service on port 7777. It also spins up a SOCKS5 server on port 11228.

🔗 https://vulncheck.com/blog/ip-intel-7777-botnet

#7777Botnet #botnet #TPLink #Xiongmai #Hikvision #CVE202177577 #CVE201810088 #CVE202245460 #CVE202136260 #CVE202224355 #MVPower #Zyxel #GitLab

avoidthehack, to security

advisory for authentication bypass and command injection vulnerabilities in products

CVE-2023-35137 - improper authentication
CVE-2023-35138 - command injection
CVE-2023-37927 - improper neutralization of special elements
CVE-2023-37928 - post auth command injection
CVE-2023-4473 - command injection
CVE-2023-4474 - improper neutralization of special elements

Fortunately, Zyxel has released patches for these. Update to the latest .

https://www.techspot.com/news/101025-zyxel-warns-users-against-new-critical-vulnerabilities-nas.html

simontsui, to random

Zyxel security advisory for authentication bypass and command injection vulnerabilities in NAS products:

  • CVE-2023-35137 (7.5 high) improper authentication
  • CVE-2023-35138 (9.8 critical) command injection
  • CVE-2023-37927 (8.8 high) improper neutralization
  • CVE-2023-37928 (8.8 high) post-authentication command injection
  • CVE-2023-4473 (9.8 critical) command injection
  • CVE-2023-4474 (9.8 critical) improper neutralization of special elements

🔗 https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products

simontsui, to Russia

Denmark's CERT (SektorCERT) reported that 22 companies that operate parts of Danish energy infrastructure were compromised in a May 2023 coordinated attack, linked to SANDWORM actors. Sandworm is a state-sponsored APT publicly attributed to Russian General Staff Main Intelligence Directorate’s Russian (GRU’s) Main Centre for Special Technologies (GTsST) by the U.S. government. The attackers leveraged a Zyxel vulnerability CVE-2023-28771 (9.8 critical) to gain control of the firewall. SektorCERT's incident response report includes a detailed analysis and timeline of the attack, recommendations and IOC.
Link: https://media.licdn.com/dms/document/media/D4D1FAQG-Qsry8BH9dg/feedshare-document-pdf-analyzed/0/1699785104486?e=1700697600&v=beta&t=icNMQ-rDYgeSojoaax-1KpC7YrCF7MVtkrDClSFiKIY

#cyberespionage #GRU #SANDWORM #Russia #Denmark #criticalinfrastructure #APT #threatintel #IOC #CVE202328771 #Zyxel

itnewsbot, to security

Zyxel users still getting hacked by DDoS botnet emerge as public nuisance No. 1 - Enlarge (credit: Aurich Lawson / Ars Technica)

Organizations t... - https://arstechnica.com/?p=1955893 #vulnerability #security #exploit #biz#botnet #zyxel

AAKL, to linux
0x58, to infosec

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

➝ 🇺🇸 🪖 Air Force denies running simulation where AI drone “killed” its operator
➝ 🇺🇸 🏂 Snowboards discloses after February attack
➝ 🇺🇸 🧪 Enzo Biochem Attack Exposes Information of 2.5M Individuals
➝ 🧠 🤖 Introducing Charlotte AI, ’s Generative AI Security Analyst
➝ 🐍 🦠 Malicious Packages Using Compiled Code to Bypass Detection
➝ 🇰🇵 🎠 N. Korean ScarCruft Hackers Exploit LNK Files to Spread
➝ 🦠 📱 New Zero-Click Hack Targets Users with Stealthy Root-Privilege
➝ 🇷🇺 🇺🇸 says U.S. accessed thousands of phones in spy plot
➝ 🇯🇵 🚗 Discloses New Data Breach Involving Vehicle, Customer Information
➝ ☁️ 👻 Organizations Warned of ‘Ghost Sites’ Exposing Sensitive Information
➝ 🔐 👀 faces $30 million fine over Ring, Alexa violations
➝ 🔐 🧱 Active Mirai Botnet Variant Exploiting Devices for Attacks
➝ 🇷🇺 🇺🇦 Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access
➝ 🦠 🤖 Found in Apps With Over 420 Million Downloads
➝ 🦠 🚪 malware spread via Google Ads for , GIMP, more
➝ 👛 Southeast Asian hacking crew racks up victims, rapidly expands criminal campaign
➝ 🍏 finds bug that lets hackers bypass SIP root restrictions
➝ 🦠 🚪 zero-day abused since 2022 to drop new malware, steal data
➝ 🇬🇷 Worst cyberattack in disrupts high school exams, causes political spat
➝ 🇮🇳 🎠 Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Users
➝ 🇺🇸 U.S. Department of Defense releases 2023 Cyber Strategy
➝ 📱☝🏻 New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
➝ 🇯🇵 🎠 New GobRAT Remote Access Targeting Routers in
➝ 🦠 📂 Clever ‘File Archiver In The Browser’ phishing trick uses domains

📚 This week's recommended reading is: "Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks" by Scott J. Shapiro

Subscribe to the to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-222023

itnewsbot, to random

Researchers tell owners to “assume compromise” of unpatched Zyxel firewalls - Enlarge (credit: Getty Images)

Firewalls made by Zyxel are bei... - https://arstechnica.com/?p=1943400 #vulnerabilities #firewalls #security #exploits #biz#zyxel

raptor, to random

Analysis of #Zyxel firewall #RCE vulnerability CVE-2023-28771

“A caller-supplied error message is being written to a log file by constructing a system command and executing this command via a call to system to perform the write.”

https://attackerkb.com/topics/N3i8dxpFKS/cve-2023-28771

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

Lost my toot on it from last month, but I recommend you patch any #Zyxel Zywall devices for CVE-2023-28771 - it's super exploitable, pre-auth and facing to internet by design. #CVE202328771 #vulnerabilities

Exploit by @testanull

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

This #Zyxel vuln is being mass exploited now by Mirai botnet, target = whole internet. #CVE202328771

Payload https://www.virustotal.com/gui/file/f962134b1486261f1a28831c6605e0e404c39e6e29f88e4b24ce6ed3a559795c

A fuck ton of SMB VPN boxes are owned. #threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

This is the media now so orgs can respond 🤣 it’s part of why Mirai got flooded. #zyxel

https://www.securityweek.com/zyxel-firewalls-hacked-by-mirai-botnet-via-recently-patched-vulnerability/

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

You can write TI briefs about the #Zyxel Mirai thing now 🤣 https://infosec.exchange/@shadowserver/110442626213838177

securityaffairs, to random Italian

#Zyxel fixed a critical #RCE flaw in its firewall devices and urges customers to install the patches
https://securityaffairs.com/145416/hacking/zyxel-firewall-cve-2023-28771-rce.html
#securityaffairs #hacking #malware

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • magazineikmin
  • cisconetworking
  • tacticalgear
  • mdbf
  • rosin
  • Youngstown
  • slotface
  • khanakhh
  • GTA5RPClips
  • kavyap
  • ngwrru68w68
  • DreamBathrooms
  • megavids
  • everett
  • ethstaker
  • modclub
  • cubers
  • love
  • normalnudes
  • Durango
  • InstantRegret
  • provamag3
  • tester
  • Leos
  • osvaldo12
  • JUstTest
  • All magazines