Unlocking the Vault :: Unauthenticated Remote Code Execution against CommVault Command Center https://srcincite.io/blog/2021/11/22/unlocking-the-vault.html
New ransomware actor uses password-protected archives to bypass encryption protection https://news.sophos.com/en-us/2021/11/18/new-ransomware-actor-uses-password-protected-archives-to-bypass-encryption-protection/
Sophos News
New ransomware actor uses password-protected archives to bypass encryption protection
Calling themselves “Memento team”, actors use Python-based ransomware that they reconfigured after setbacks.
Multiple Concrete CMS vulnerabilities (part1 – RCE) https://www.fortbridge.co.uk/research/multiple-vulnerabilities-in-concrete-cms-part1-rce/
Cyber Security Services - London
Multiple Concrete CMS vulnerabilities ( part1 - RCE )
Multiple vulnerabilities in concrete cms. A race condition in the file upload which resulted in RCE in Concrete CMS
All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients https://claroty.com/2021/11/19/blog-research-all-roads-lead-to-openvpn-pwning-industrial-remote-access-clients/
Claroty
All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients
Claroty's researchers discovered a new attack concept to target VPNs. Learn more.
Kernel Karnage – Part 3 (Challenge Accepted) https://blog.nviso.eu/2021/11/16/kernel-karnage-part-3-challenge-accepted/
NVISO Labs
Kernel Karnage – Part 3 (Challenge Accepted)
While I was cruising along, taking in the views of the kernel landscape, I received a challenge … 1. Player 2 has entered the game The past weeks I mostly experimented with existing tooling and got…
Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains https://www.trendmicro.com/en_us/research/21/k/Squirrelwaffle-Exploits-ProxyShell-and-ProxyLogon-to-Hijack-Email-Chains.html
Trend Micro
Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains
Squirrelwaffle is known for using the tactic of sending malicious spam as replies to existing email chains. We look into how by investigating its exploit of Microsoft Exchange Server vulnerabilities, ProxyLogon and ProxyShell.
CVE-2021-41277 Metabase Local File Inclusion https://github.com/0x0021h/expbox/blob/main/CVE-2021-41277.yaml
CVE-2021-42306 CredManifest: App Registration Certificates Stored in Azure Active Directory https://www.netspi.com/blog/technical/cloud-penetration-testing/azure-cloud-vulnerability-credmanifest/
NetSPI
CVE-2021-42306 CredManifest: App Registration Certificates Stored in Azure Active Directory
The vulnerability, found by NetSPI’s cloud pentesting practice director, Karl Fosaaen, affects any organization that uses Automation Account "Run as" accounts in Azure.
Hotpatching on Windows https://techcommunity.microsoft.com/t5/windows-kernel-internals-blog/hotpatching-on-windows/ba-p/2959541
TECHCOMMUNITY.MICROSOFT.COM
Hotpatching on Windows
Introduction A core priority of the Windows Kernel team is to keep the operating system, applications, and users secure. Like many operating systems, Windows has a large codebase, a driver ecosystem, and a complex set of dependencies. Every day, many malicious…
Babadeda Crypter targeting crypto, NFT, and DeFi communities https://blog.morphisec.com/the-babadeda-crypter-targeting-crypto-nft-defi-communities
Morphisec
Babadeda Crypter Targeting Crypto, NFT, and DeFi Communities
Morphisec Labs encountered a new malware called Babadeda targeting cryptocurrency enthusiasts through Discord. We reveal how it can be stopped.
Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos http://www.righto.com/2021/11/reverse-engineering-yamaha-dx7.html?m=1
Righto
Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos
The Yamaha DX7 digital synthesizer was released in 1983 and became "one of the most important advances in the history of modern popular mu...
CVE-2021-22048: VMware vCenter Server Privilege Escalation Vulnerability https://securityonline.info/cve-2021-22048-vmware-vcenter-server-privilege-escalation-vulnerability/
Cybersecurity News
CVE-2021-22048: VMware vCenter Server Privilege Escalation Vulnerability
VMware officially released a risk notice for vCenter Server privilege escalation, the vulnerability number is CVE-2021-22048
CVE-2021-43557: Apache APISIX: Path traversal in request_uri variable https://xvnpw.github.io/posts/cve_2021_43557_apache_apisix_path_traversal_in_request_uri_variable/
xvnpw personal blog
CVE-2021-43557: Apache APISIX: Path traversal in request_uri variable
In this article I will present my research on insecure usage of $request_uri variable in Apache APISIX ingress controller. My work end up in submit of security vulnerability, which was positively confirmed and got CVE-2021-43557. At the end of article I will…
Android APT spyware, targeting Middle East victims, enhances evasiveness https://news.sophos.com/en-us/2021/11/23/android-apt-spyware-targeting-middle-east-victims-improves-its-capabilities/
Sophos News
Android APT spyware, targeting Middle East victims, enhances evasiveness
The phone spyware has new features that confer resistance to takedowns or manual removal
A Deep Dive Into SoWaT: APT31’s Multifunctional Router Implant https://imp0rtp3.wordpress.com/2021/11/25/sowat/
imp0rtp3
A Deep Dive Into SoWaT: APT31’s Multifunctional Router Implant
Executive Summary APT31 is long known to use Operational Relay Boxes (ORBs) and compromise routers.This report examines in detail their only publicly known router implant, dubbed “SoWaT”…
Nice reading » What can you do with an ISA specification? https://alastairreid.github.io/uses-for-isa-specs/
alastairreid.github.io
What can you do with an ISA specification?
ISA specifications describe the behaviour of a processor: the instructions,
memory protection, the privilege mechanisms, debug mechanisms, etc.
The traditional form of an ISA specification is as a paper document but,
as ISAs have grown, this has become unwieldy.…
memory protection, the privilege mechanisms, debug mechanisms, etc.
The traditional form of an ISA specification is as a paper document but,
as ISAs have grown, this has become unwieldy.…
Avaddon Ransomware Analysis https://atos.net/en/lp/securitydive/avaddon-ransomware-analysis
Looking for vulnerabilities in MediaTek audio DSP https://research.checkpoint.com/2021/looking-for-vulnerabilities-in-mediatek-audio-dsp/
Check Point Research
Looking for vulnerabilities in MediaTek audio DSP - Check Point Research
Research By: Slava Makkaveev Introduction Taiwan’s MediaTek has been the global smartphone chip leader since Q3 2020. MediaTek Systems on a chip (SoCs) are embedded in approximately 37% of all smartphones and IoT devices in the world, including high-end phones…