Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.55K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
/ Critical Vulnerability Fixed In Essential Addons for Elementor Plugin (WordPress)

https://patchstack.com/articles/critical-vulnerability-fixed-in-essential-addons-for-elementor-plugin/

/ In January 2021, PwC observed a phishing page that prompted an investigation into a new threat actor we now call ‘White Tur’

https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/threat-actor-of-in-tur-est.html

/ BotenaGo strikes again - malware source code uploaded to GitHub

https://cybersecurity.att.com/blogs/labs-research/botenago-strike-again-malware-source-code-uploaded-to-github
City of Dallas - Data Loss Report

https://dallascityhall.com/departments/ciservices/Pages/Report-on-Data-Loss.aspx

I love such reports, if you have links of data losses / breaches, will send links to me please)

P.S. Thx for the link dear subscriber ✌️
 
/ Active Exploitation of Zero-day XSS Vulnerability in Zimbra Details
The campaigns came in multiple waves across two attack phases. The initial phase was aimed at reconnaissance and involved emails designed to simply track if a target received and opened the messages. The second phase came in several waves that contained email messages luring targets to click a malicious attacker-crafted link.

/ Cisco Small Business RV Series Routers Vulnerabilities Details
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers.

/ Scanning for Generalized Transient Execution Gadgets in the Linux Kernel Details
We confirm our findings by demonstrating an end-to-end proof-of-concept exploit for one of the gadgets found.

/ CISA Adds One Known Exploited Vulnerability to Catalog Details
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below.

/ Path traversal and dereference of symlinks when passing Helm value files Details
All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts.

/ ACTINIUM targets Ukrainian organizations Details
Phishing again. ⚡️ Already blocked in Sys-Admin BLD (https://lab.sys-adm.in/)
 
 
BLD DNS - Обновление в сторону скорости и безопасности. Краткий отчет.

Уже почти, как полгода открытый превентивный DoT/DoH BLD DNS сервис бесплатно приносит пользу блокируя малварные, фишинговые, трекинговые и рекламные домены, экономя трафик, время и мозговые ресурсы своим пользователям.

За это время были заблокировано множество фишинговых кампаний (типа franken-phish), малварных и рамсомварных компаний (типа Pegasus или Kaseya), про блокировку рекламных и трекинговых доменов говорить наверное и не стоит, можно лишь упомянуть, что их количество превышет 1 миллион поинтов из текущих ~двух.

⚡️ В обшей сложности блокируется ~9%-15% процентов вредоносности из ~10 миллионов запросов в месяц из разных стран мира, это очень радует спасибо всем кто пользуется и привносит вклад в проект .

Что добавилось в этом году:
• новый регион, теперь регионов 4 - Казахстан, Германия, Сингапур, Нидерлады
• несколько сетов по вендорам для нивелирования false-positive срабатываний
• добавлен дуплексный режим DoH (443, 8443)
• надеюсь скоро добавится конструктор сетов блокировок BLD DNS (анонс)

Со своей стороны хочется сделать открытый сервис еще более открытым, доступным, надежным, напомню, что сервис живет благодаря помощи друзей, пользователей, тестировщиков проекта, здесь будет полезна и твоя помощь уважаемый user_name твой вклад, как умственный или временной или финансовый будет неоценим, а твой user_name будет отражен в разделе благодарностей на официальном сайте BLD DNS - https://lab.sys-adm.in 🙂

P.S. Спасибо друзьям из Nitro Team за ряд идей по безопасности проекта.
Всем успехов и добра, с уважением @sysadminkz. Берегите себя. Pace to all ✌️
Sys-Admin InfoSec pinned «  BLD DNS - Обновление в сторону скорости и безопасности. Краткий отчет. Уже почти, как полгода открытый превентивный DoT/DoH BLD DNS сервис бесплатно приносит пользу блокируя малварные, фишинговые, трекинговые и рекламные домены, экономя трафик, время и…»
 
/ The evolution of a Mac trojan: UpdateAgent’s progression Details
The trojan, tracked as UpdateAgent, started as a relatively basic information-stealer but was observed distributing secondary payloads in the latest campaign, a capability that it added in one of its multiple iterations. Reminiscent of the progression of info-stealing trojans in other platforms, UpdateAgent may similarly become a vector for other threats to infiltrate target systems.

/ Decrypted: TargetCompany Ransomware Details
The extension of the encrypted files and the ransom note indicated the TargetCompany ransomware (not related to Target the store), which can be decrypted under certain circumstances.

/ Indicators of Compromise Associated with LockBit 2.0 Ransomware (PDF) Details
LockBit 2.0 operates as an affiliate-based Ransomware-as-a-Service (RaaS) and employs a wide variety of tactics, techniques, and procedures (TTPs), creating significant challenges for defense and mitigation. LockBit 2.0 ransomware compromises victim networks through a variety of
techniques, including, but not limited to, purchased access, unpatched vulnerabilities, insider access, and zero day exploits.

/ Blocking internet macros by default in MS Office Details
For macros in files obtained from the internet, users will no longer be able to enable content with a click of a button. A message bar will appear for users notifying them with a button to learn more. The default is more secure and is expected to keep more users safe including home users and information workers in managed organizations.

/ Qbot Likes to Move It, Move It Details
We did not observe the initial access for this case but assess with medium to high confidence that a malicious email campaign was used to deliver an Excel (xls) document. Following the opening of the xls document, the initial Qbot DLL loader was downloaded and saved to disk. Interestingly, the name of the DLL contained a .html extension to disguise the portable executable nature of the payload. Once executed, the Qbot process creates a scheduled task to elevate itself to system.
 
/ Windows Kernel Elevation of Privilege Vulnerability

CVE-2022-21989

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21989
Windows DNS Server Remote Code Execution Vulnerability

CVE-2022-21984 (important update)

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21984
NGINX - If is Evil... when used in location context

(EN) Directive if has problems when used in location context, in some cases it doesn’t do what you expect but something completely different instead. In some cases it even segfaults. It’s generally a good idea to avoid it if possible.

(RU) Директива if - у нее есть проблемы при использовании в контексте локаций, в некоторых случаях эта директива делает не то, что ожидается, а нечто совершенно другое.

На оф. сайте рекомендуют избегать этой директивы, если это возможно. А ты знал? Я нет - сюрприз 😄

https://www.nginx.com/resources/wiki/start/topics/depth/ifisevil/
/ Most Common Antivirus Evasion and Bypass Techniques

The following are some of the most prevalent methods used by hackers to avoid antivirus detection:

https://www.socinvestigation.com/most-common-antivirus-evasion-and-bypass-techniques/

Additional article - Top 10 web hacking techniques of 2021

..
the latest iteration of our annual community-powered effort to identify the most significant web security research released in the last year:

https://portswigger.net/research/top-10-web-hacking-techniques-of-2021
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
StackScraper - Capturing sensitive data using real-time stack scanning against a remote process

tool to show how much data can be extracted from a running process without requiring any injection techniques

https://www.x86matthew.com/view_post?id=stack_scraper
/ NaturalFreshMall: a mass store hack

More than 350 ecommerce stores infected with malware in a single day. Magento under attack..:

https://sansec.io/research/naturalfreshmall-mass-hack

And another article from the same category - Critical Vulnerabilities in PHP Everywhere Allow Remote Code Execution

https://www.wordfence.com/blog/2022/02/critical-vulnerabilities-in-php-everywhere-allow-remote-code-execution/
/ About the security content of iOS 15.3.1 and iPadOS 15.3.1

WebKit. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited

https://support.apple.com/en-us/HT213093