leakix

@leakix@mastodon.social

Maintaining and reporting for LeakIX.

We are NOT affiliated with any ransomware campaign.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

leakix, to random

🚨 New plugin for #QNAP indexing hosts vulnerable to CVE-2024-21899.

~8500 vulnerable hosts were found.

Hosting providers & CERTs have been notified.

Patch now!

Thanks: @Gi7w0rm

image/png

leakix, to iOS

🔎 In the last episode of the #IOS XE exploit research saga, we find out how they replaced Nginx config files.

CVE-2023-20273: IOS XE root privilege escalation and implant installation.

https://blog.leakix.net/2023/10/cisco-root-privesc/

leakix, to random

🚨 Cisco Implant traffic detected from 192.3.101[.]111 .

Looking for DNS settings, likely to ID targets.

Also more at https://mastodon.social/@SI_FalconTeam/111314289536498986

leakix, to vmware

🚨 CVE-2023-34048 - New plugin released for .

Found ~1100 vulnerable public services with DCERPC enabled. Patch now!
Out of 1911 vulnerable hosts 1100 are not fire-walled.

Alerts have been dispatched to CERTs and hosting providers.

Thanks: @Gi7w0rm

leakix, to vmware

CVE-2023-45498 / CVE-2023-45499, announced yesterday affects #VinChin #VMWare #Backup and enables a remote attacker to achieve remote code execution.

Vendor failed to acknowledge the vulnerability.

Blog post, IOCs and demo at https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/

Hopefully the first of many CVEs discovered by our research team!

hrbrmstr, to random
@hrbrmstr@mastodon.social avatar

🚨We ( @greynoise ) are seeing initial scans looking for compromised Cisco IOS devices (CVE-2023-20198): https://viz.greynoise.io/query?gnql=tags:%22Cisco%20IOS%20XE%20CVE-2023-20198%20Scanner%22

^^ hit most of the fleet. Looks like there may be a second IP using a slight variant of the path/query string (investigating it now).

@vulncheck has a great blog indicating scores of impacted devices in the wild: https://vulncheck.com/blog/cisco-implants

leakix,
leakix, to cisco

🚨🚨🚨 Whatever you were thinking about CVE-2023-20198 (#Cisco IOS EX) it's 100x worse.

We used @TalosSecurity IOC check and found ~30k implants.

That's 30k devices infected (routers, switches, VPNs), under the control of threat actors.

That's excluding rebooted devices.

Source: https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

deleted_by_author

  • Loading...
  • leakix,

    @GossiTheDog I'm currently losing my mind getting my ass kicked by 15 Crimson's ship to end this quest.

    I now have to level up first to unlock class B ships :')

    GossiTheDog, (edited ) to random
    @GossiTheDog@cyberplace.social avatar

    deleted_by_author

  • Loading...
  • leakix,

    @GossiTheDog we had previous data points, it gets worse.

    https://twitter.com/leak_ix/status/1689292559632285696

    We came to suspect the same thing.

    leakix,
    leakix,

    @GossiTheDog I'll be honest with all the failed mitigations I lost track of the timeline but the plugin is accurate on the versions and CVEs . It's the 2017 build that caught my attention.

    leakix, to random

    🚨 CVE-2023-35082 - Plugin updated for finding vulnerable MobileIron Core instances taking into account the recent developments affecting versions higher than 11.2.

    ~1.3k found,

    Hosting providers and national CERTs have been notified.

    Sources:

    image/png

    leakix, to random

    🤷Ivanti MobileIron Core strikes back :
    CVE-2023-35081 - Remote Arbitrary File Write (RCE)

    We are seeing 3 new version being deployed :
    11.10.0.3, 11.9.1.2 and 11.8.1.2

    It seems that current exploitation is chained together with CVE-2023-35078 so the scope should be authenticated IF previously patched.

    Sources:

    leakix, to random

    💡If you're looking for precise version information on #Ivanti MobileIron Core aka EPMM without disclosing the 0day, you can get it from:

    /mifs/c/windows/api/v2/device/registration

    head > script > src attribute

    Looks like someone mixed 2 template variables.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • cubers
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • tester
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • anitta
  • Leos
  • provamag3
  • modclub
  • lostlight
  • All magazines