GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Remember the Okta breach a few months ago, where they explained it only impacted 1% of customers?

Turns it out is 100% of customers. They also stole data about Okta's staff, but they apparently didn't tell themselves either.

https://www.bloomberg.com/news/articles/2023-11-29/okta-says-hackers-stole-data-for-all-customer-support-users

#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Microsoft filing with the SEC to say Russia SVR hacked the email accounts of its own cyber staff in November, they discovered this week: https://www.sec.gov/Archives/edgar/data/789019/000119312524011295/d708866dex991.htm

GossiTheDog, (edited )
@GossiTheDog@cyberplace.social avatar

Update on the Microsoft 365 hack - Russia has used the exfiltrated data to push further into Microsoft’s network.

“In recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our corporate email systems to gain, or attempt to gain, unauthorized access. This has included access to some of the company’s source code repositories and internal systems.”

https://msrc.microsoft.com/blog/2024/03/update-on-microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/

#threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

On Friday night, Fujitsu quietly added a notice buried on their website in Japanese saying they’d been breached and that customer information may have been accessed. https://pr.fujitsu.com/jp/news/2024/03/15-1.html

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

A bunch of people have alerted me to a vulnerability in #MoveIT, a secure file transfer app used heavily in the UK.

I did some digging and it looks like it’s a zero day under active exploitation. Not 100% on threat actor yet but it may be one of the ransomware/extortion groups.

Really serious, impacted orgs should shut down the server. Thread follows. #threatintel

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

🚨 If you use Palo-Alto GlobalProtect VPN, there’s an in the wild zero day being used to gain access to organisations.

CVE-2024-3400, patch out now (edit: they haven’t released patches yet) https://security.paloaltonetworks.com/CVE-2024-3400

Thread throughout the day as more info drops. It’s easy to exploit. #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

🚨 patch your Cisco AnyConnect boxes 🚨

For a 2020 vulnerability. Really.

Lots of ransomware cases coming in for Cisco AnyConnect/ASA recently and find finally we know how - CVE-2020-3259

It was a vuln which allowed a CitrixBleed style memory dump, found by a Russian research org now under US sanctions. Ransomware operators have an exploit.

Sadly it looks like many orgs never patched.

https://www.truesec.com/hub/blog/akira-ransomware-and-exploitation-of-cisco-anyconnect-vulnerability-cve-2020-3259

#threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Dropbox have filed an 8-K with the SEC for a breach. Access included user Oauth, API and MFA tokens.

#threatintel

https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm

knitcode, to infosec

I am looking for a technical writer with a strong Intel/networking background and the ability to take the deep technical content my group creates and convert it into multiple more accessible pieces. For example, the VexTrio paper we released this week. Our work is designed for experts in the security industry. The person I'm looking for can use it to create writings for consumers and customers. If that's you, text me here or on LinkedIn. #threatintel #infosec #cybersecurity

Appreciate boosts for reach.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Interesting Citrix Netscaler bug being mass exploited in the wild for about a month.

This is the HTTP request:

GET /oauth/idp/.well-known/openid-configuration HTTP/1.1
Host: a <repeated 24812 times>
Connection: close

It replies with system memory, which includes session tokens that you can use it gain remote access, bypassing authentication including MFA.

I think this one may have more legs than people realise.

https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar

There's a zero day in Confluence being exploited in the wild, to bypass authentication. Vendor aren't calling it zero day (of course) but it is.

CVE-2023-22515 - allows you to use /setup URL to create a new admin user on existing instance.

Advisory: https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html

FAQ:
https://confluence.atlassian.com/kb/faq-for-cve-2023-22515-1295682188.html

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Orange Spain outage looks real, BGP hijack by somebody for laughs apparently. #threatintel https://benjojo.co.uk/u/benjojo/h/r1zj333N4L6cF7P1xv

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

⚠️ want a highly impactful, actively exploited border gateway zero days situation to wake you up?

Ivanti Pulse Secure aka Ivanti Connect Secure and Ivanti Policy Secure Gateway customers - prepare to deploy mitigations and await follow on patches.

In the wild exploitation, probable nation state - includes authentication (including MFA) bypass and code execution.

Looks like Ivanti have done a really good job identifying.

I call it ConnectAround. #threatintel #connectaround

GossiTheDog, (edited )
@GossiTheDog@cyberplace.social avatar

More hilarity on - there’s now two NEW vulnerabilities in Ivanti Pulse Secure, being actively exploited as zero days too - no patches for many versions.

Updated advisory with updated mitigations you need to reapply:
https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

CVEs: CVE-2024-21893 and CVE-2024-21888

CERT advisory: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-205101-1032.pdf?__blob=publicationFile&v=2

Ivanti recommend you factory reset your devices in their advisory.

HT @fthy

iaintshootinmis, to infosec
@iaintshootinmis@digitaldarkage.cc avatar

Gonna write this up better later. But thanks to @tbaraki , we found a fluke in Microsoft's SignonLogs table. Sometime in the last few days they made UserPrincipalName case sensitive.

So our alerts looking for breakglassadmin@CompanyName.onmicrosoft.com started failing because we were using (==) instead of (has).

Would highly recommend you check your alerting and see which operands you're using in your queries.

#InfoSec #threatintel #Logging

SophosXOps, to random

During a recent investigation, Sophos X-Ops discovered a trojanized Windows installer for CloudChat, an instant messaging application. Looking into this supply chain attack further, we found that the official distribution server for the application had been compromised, and delivered a Window installer modified to load an additional, malicious DLL. This DLL contained an encrypted payload that connected back to a C2 server to download and execute the next stage malware. We contacted the vendor when we found this issue, but at the time of posting haven’t received a response.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

An org hit by ransomware is telling me the threat actor got in via WS_FTP, for infos, so you might want to prioritise patching that. #threatintel.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Threat actors have remotely wiped the infrastructure of Infotel JSC, which provides communication interconnects amongst Russian banks. They’ve been down since yesterday. A group called Cyber Anarchy Squad are claiming credit. #threatintel

image/jpeg

simontsui, to random

Rapid7 found notable similarities between BlackHunt ransomware and LockBit, which suggested that it uses leaked code of Lockbit. In addition, it uses some techniques similar to REvil ransomware. Rapid7 provided a technical analysis of a BlackHunt sample, describing functionalities and MITRE ATT&CK techniques. IOC provided.
🔗 https://www.rapid7.com/blog/post/2024/02/05/exploring-the-not-so-secret-code-of-blackhunt-ransomware-2/

ntkramer, to random

🍽️ & #threatintel | The Cisco, F5, Ivanti, Juniper, JetBrains, and OwnCloud exploitation attempts have jumped so much in the last two days that they squashed the normal scale of the charts.

https://viz.greynoise.io/trends?view=trending

volexity, to random

@volexity provides an update on its Ivanti Connect Secure VPN report concerning chained exploitation of CVE-2024-21887/CVE-2023-46805. Based on new data, 1700+ devices have been compromised following widespread exploitation. More details here: https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

If you use GoAnywhere MFT, a widely abused FTP program by Cl0p recently, you might want to upgrade as they seem to have forgot to mention something important from over a month ago.

Now CVE-2024-0204

#threatintel

GossiTheDog, (edited )
@GossiTheDog@cyberplace.social avatar

GoAnywhere MFT vulnerability is incredibly easy to exploit. Another path traversal, 1998 style. Expect extortion.

Pretty credible the vendor didn’t tell people about the flaw clearly in December, ie allocate a CVE. Critical infrastructure runs this software. HT @simontsui

https://www.horizon3.ai/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-deep-dive/

#threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Huge US healthcare provider Change Healthcare has a “cybersecurity incident” going on for 15 hours and has shut down systems. https://techcrunch.com/2024/02/21/change-healthcare-cyberattack/

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

The CEO of UnitedHealth is due to give testimony in Washington on their Change Healthcare ransomware incident tomorrow, where he will say “Our company alone repels an attempted intrusion every 70 seconds – thwarting more than 450,000 intrusions per year”

That sound impressive, but if you own a Windows PC at home, you’re doing the same thing - it’s called the built in firewall.

Not having MFA on Citrix Netscaler is also called negligence.

#threatintel #ransomware

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Wall Street Journal has a leak from the Change Healthcare ransomware incident

  • Initial entry was via a remote access system without MFA
  • Dwell time was 9 days
  • They paid the ransom, then got held to ransom again and had data leaked anyway

https://www.wsj.com/articles/change-healthcare-hackers-broke-in-nine-days-before-ransomware-attack-7119fdc6

#threatintel #ransomware

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Apparently law enforcement have seized AlphV ransomware's portal (it had reappeared in the past week and started listing victims again). http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/

#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Looks like the #AlphV ransomware takedown by law enforcement has gone wrong. #threatintel HT @brett

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines