BLD DNS: One more server received as a gift from X-rdp.co
Hey, several days ago I published post (En denoscription) about the new server that was added to the BLD DNS infrastructure.
Today, I glad to present to you new server provided for BLD DNS from X-RDP.CO, located in Canada, I am really very happy, now I tested this server and want to present to you some information about of him:
- Speedtest - Download 940Mbps / Upload 236Mbps
- Storage IO - Write 1.1GB/s / Read7.1 GB/s
- CPU - AMD EPYC, 2395 MHz, KVM (AMD-V), 5 CPU Cores, 2 GB RAM
This server provided minimum on one year, I hope this service will bring a lot of benefits to the users of the service.
And I have another news - I requested from x-rdp.co discount coupon code and now I glad to present yo you
- Code: SYS10
- Discoint: 10%
I want to express my gratitude to the hosting, thank you, success to you and prosperity!
Take you care and safety. PEACE ✌️
P.S. BLD DNS Project site: https://lab.sys-adm.in
#bld #dns #thanks
/ Spyware dubbed Facestealer infects 100,000+ Google Play users
https://blog.pradeo.com/spyware-facestealer-google-play
https://blog.pradeo.com/spyware-facestealer-google-play
Pradeo
Spyware dubbed Facestealer infects 100,000+ Google Play users
Pradeo has detected a malicious mobile application currently distributed on Google Play and installed by 100,000+ users.
/ Certain HP Print Products, Digital Sending Products – Potential remote code execution and buffer overflow
https://support.hp.com/us-en/document/ish_5948778-5949142-16/hpsbpi03780
https://support.hp.com/us-en/document/ish_5948778-5949142-16/hpsbpi03780
/ Deadbolt Ransomware is Back
QNAP uder attack:
https://censys.wpengine.com/deadbolt-ransomware-is-back/
QNAP uder attack:
https://censys.wpengine.com/deadbolt-ransomware-is-back/
/ Repeatable Failures: AMI UsbRt - Six Years Later, Firmware Attack Vector Still Affect Millions Of Enterprise Devices
Binarly Research Team Coordinates Patching of Dell BIOS Code Execution Vulnerabilities
https://binarly.io/posts/AMI_UsbRt_Repeatable_Failures_A_6_year_old_attack_vector_still_affecting_millions_of_enterprise_devices/index.html
Binarly Research Team Coordinates Patching of Dell BIOS Code Execution Vulnerabilities
https://binarly.io/posts/AMI_UsbRt_Repeatable_Failures_A_6_year_old_attack_vector_still_affecting_millions_of_enterprise_devices/index.html
Sys-Admin InfoSec pinned « BLD DNS: One more server received as a gift from X-rdp.co Hey, several days ago I published post (En denoscription) about the new server that was added to the BLD DNS infrastructure. Today, I glad to present to you new server provided for BLD DNS from X…»
/ Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
https://www.volexity.com/blog/2022/03/22/storm-cloud-on-the-horizon-gimmick-malware-strikes-at-macos/
https://www.volexity.com/blog/2022/03/22/storm-cloud-on-the-horizon-gimmick-malware-strikes-at-macos/
Volexity
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
In late 2021, Volexity discovered an intrusion in an environment monitored as part of its Network Security Monitoring service. Volexity detected a system running frp, otherwise known as fast reverse […]
/ Mēris and TrickBot standing on the shoulders of giants
Mikrotik under attack:
https://decoded.avast.io/martinhron/meris-and-trickbot-standing-on-the-shoulders-of-giants/
Mikrotik under attack:
https://decoded.avast.io/martinhron/meris-and-trickbot-standing-on-the-shoulders-of-giants/
Gendigital
Mēris and TrickBot standing on the shoulders of giants
Introduction to MikroTik Vulnerabilities
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
2022_ThreatDetectionReport_RedCanary.pdf
10.8 MB
Red Canary’s 2022 Threat Detection Report
Based on in-depth analysis of over 30,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insight into the threats we observe, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why. This is our most expansive report to date, but our intention remains the same: The Threat Detection Report exists to help you understand and detect threats
Based on in-depth analysis of over 30,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insight into the threats we observe, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why. This is our most expansive report to date, but our intention remains the same: The Threat Detection Report exists to help you understand and detect threats
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
/ Ramsomware encryption speed rating
https://www.splunk.com/en_us/blog/security/gone-in-52-seconds-and-42-minutes-a-comparative-analysis-of-ransomware-encryption-speed.html
https://www.splunk.com/en_us/blog/security/gone-in-52-seconds-and-42-minutes-a-comparative-analysis-of-ransomware-encryption-speed.html
Splunk
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed | Splunk
With the release of SURGe's new ransomware research, Splunker Shannon Davis shares a closer look into measuring how fast ransomware encrypts files.
/ Malicious npm packages target Azure developers to steal personal data
https://jfrog.com/blog/large-scale-npm-attack-targets-azure-developers-with-malicious-packages/
https://jfrog.com/blog/large-scale-npm-attack-targets-azure-developers-with-malicious-packages/
JFrog
Large-scale npm attack targets Azure developers with malicious packages
JFrog discovers hundreds of npm malicious packages in a large-scale typosquatting attack designed to steal PII from Azure developers. Find out more >
/ DNS stub zones might fail to load, which might cause DNS resolution issues
After installing updates released January 25, 2022 ( KB5009616) and later on affected versions of Windows Server running the DNS Server role, DNS stub zones might not load correctly, which might cause DNS name resolution to fail.
https://docs.microsoft.com/en-us/windows/release-health/status-windows-10-1809-and-windows-server-2019#2795msgdesc
After installing updates released January 25, 2022 ( KB5009616) and later on affected versions of Windows Server running the DNS Server role, DNS stub zones might not load correctly, which might cause DNS name resolution to fail.
https://docs.microsoft.com/en-us/windows/release-health/status-windows-10-1809-and-windows-server-2019#2795msgdesc
Docs
Windows 10, version 1809 and Windows Server 2019 known issues and notifications
View announcements and review known issues and fixes for Windows 10 version 1809 and Windows Server 2019
Secure BLD: Защита от оверлимитных запросов
За последнее время было замечено злоупотребление ресурсами BLD DNS, как это выглядит:
1. Штатное состояние - Опытным путем выявлено: 10к-20к запросов в час, это штатная работа средней организации.
2. Злоупотребление - Превышение максимально-допустимого количества запросов, например 20к+ запросов в час.
Как пример - NextDNS платная подписка начинается с 300к запросов в месяц. Штатное состояние BLD DNS покрывает месячный лимит NextDNS менее, чем за двое суток 🤘
Есть клиенты сервиса генерирующие по 100к запросов в час‼️, пропускная способность BLD DNS позволяет выдерживать хорошие нагрузки. Несколько миллионов в сутки - штатная работа BLD на сегодняшний день, но благодаря злоупотреблению суточная норма, легко превращается в часовой показатель, это не есть хорошо.
Возражений нет - задонать, уведомь и будем решать, если надо сделаем выделенный инстанс, не проблема (донаты вообще не воспрещаются, а даже приветсвуются, так как поддержка сервиса идет за счет внутренних ресурсов проекта).
Так же есть BLD+ (об этом пару месяцев назад был анонс), поэтому - welcome.
Превентивные меры
Вчера прилетело ~300к запросов за час сразу с нескольких IP адресов, стало понятно, что нужно что-то делать:
- Был разработан механизм автоматической блокировки абьюсеров 🎉
- На сегодня (пока) работает по формуле - 20000k запров в 1 час = бан 10 минут (кто будет отваливаться, сразу ко мне @sysadminkz, будем решать)
- Решение имеет "белые списки", так что оверлимитчикам welcome to donate area
- Решение полностью автономное, работает в автоматическом режиме.
Note: Кто знает, что у него генерится большое количество запросов и знает свой IP, можно заблаговременно обратиться ко мне.
~~~ EN
Recently, abuse of BLD DNS resources has been noticed, how it looks like:
1. Legitimate state - Experimentally revealed: 10k-20k requests per hour, this is the regular work of an medium organization.
2. Abuse - Exceeding the maximum allowable number of requests, for example 20k+ requests per hour.
As an example - NextDNS paid subnoscription starts with 300k requests per month. The regular state of BLD DNS covers the monthly NextDNS limit in less than two days 🤘
Today, there are clients of the service generating 100k requests per hour‼️, the bandwidth of BLD DNS allows to work with hight loads. Several million per day is the regular work of BLD today, but thanks to the abuse of the daily norm, it easily turns into an hourly norm, this is not good.
No objections - donate, and notify me and we will decide what we need to do, no problem(donations are not prohibited at all, but even welcome, since the support of the service comes at the expense of the internal resources of the project).
BLD+ mode specifically created for overlimits (there was an announcement about this a couple of months ago (https://news.1rj.ru/str/sysadm_in_channel/3740 )), therefore - welcome.
Preventive measures
Yesterday BLD received ~300k requests arrived in an hour from several IP addresses at once, it became clear that something needed to be done:
- The mechanism of automatic blocking of abusers was developed 🎉
- Today (so far) it works according to the formula - 20000k requests in 1 hour = ban 10 minutes (who will fall off, immediately contact me @sysadminkz, we will decide)
- The solution has "whitelists", so the are welcome to donate area and then welcome to BLD back.
- The blocking solution is completely autonomous, works in automatic mode.
Note: Who knows that he generates a large number of requests and knows own IP, you can contact me in advance.
Take you care. PEACE ✌️
За последнее время было замечено злоупотребление ресурсами BLD DNS, как это выглядит:
1. Штатное состояние - Опытным путем выявлено: 10к-20к запросов в час, это штатная работа средней организации.
2. Злоупотребление - Превышение максимально-допустимого количества запросов, например 20к+ запросов в час.
Как пример - NextDNS платная подписка начинается с 300к запросов в месяц. Штатное состояние BLD DNS покрывает месячный лимит NextDNS менее, чем за двое суток 🤘
Есть клиенты сервиса генерирующие по 100к запросов в час‼️, пропускная способность BLD DNS позволяет выдерживать хорошие нагрузки. Несколько миллионов в сутки - штатная работа BLD на сегодняшний день, но благодаря злоупотреблению суточная норма, легко превращается в часовой показатель, это не есть хорошо.
Возражений нет - задонать, уведомь и будем решать, если надо сделаем выделенный инстанс, не проблема (донаты вообще не воспрещаются, а даже приветсвуются, так как поддержка сервиса идет за счет внутренних ресурсов проекта).
Так же есть BLD+ (об этом пару месяцев назад был анонс), поэтому - welcome.
Превентивные меры
Вчера прилетело ~300к запросов за час сразу с нескольких IP адресов, стало понятно, что нужно что-то делать:
- Был разработан механизм автоматической блокировки абьюсеров 🎉
- На сегодня (пока) работает по формуле - 20000k запров в 1 час = бан 10 минут (кто будет отваливаться, сразу ко мне @sysadminkz, будем решать)
- Решение имеет "белые списки", так что оверлимитчикам welcome to donate area
- Решение полностью автономное, работает в автоматическом режиме.
Note: Кто знает, что у него генерится большое количество запросов и знает свой IP, можно заблаговременно обратиться ко мне.
~~~ EN
Recently, abuse of BLD DNS resources has been noticed, how it looks like:
1. Legitimate state - Experimentally revealed: 10k-20k requests per hour, this is the regular work of an medium organization.
2. Abuse - Exceeding the maximum allowable number of requests, for example 20k+ requests per hour.
As an example - NextDNS paid subnoscription starts with 300k requests per month. The regular state of BLD DNS covers the monthly NextDNS limit in less than two days 🤘
Today, there are clients of the service generating 100k requests per hour‼️, the bandwidth of BLD DNS allows to work with hight loads. Several million per day is the regular work of BLD today, but thanks to the abuse of the daily norm, it easily turns into an hourly norm, this is not good.
No objections - donate, and notify me and we will decide what we need to do, no problem(donations are not prohibited at all, but even welcome, since the support of the service comes at the expense of the internal resources of the project).
BLD+ mode specifically created for overlimits (there was an announcement about this a couple of months ago (https://news.1rj.ru/str/sysadm_in_channel/3740 )), therefore - welcome.
Preventive measures
Yesterday BLD received ~300k requests arrived in an hour from several IP addresses at once, it became clear that something needed to be done:
- The mechanism of automatic blocking of abusers was developed 🎉
- Today (so far) it works according to the formula - 20000k requests in 1 hour = ban 10 minutes (who will fall off, immediately contact me @sysadminkz, we will decide)
- The solution has "whitelists", so the are welcome to donate area and then welcome to BLD back.
- The blocking solution is completely autonomous, works in automatic mode.
Note: Who knows that he generates a large number of requests and knows own IP, you can contact me in advance.
Take you care. PEACE ✌️
Sys-Admin InfoSec pinned «Secure BLD: Защита от оверлимитных запросов За последнее время было замечено злоупотребление ресурсами BLD DNS, как это выглядит: 1. Штатное состояние - Опытным путем выявлено: 10к-20к запросов в час, это штатная работа средней организации. 2. Злоупотребление…»
Debian GNU/Linux 11.3 “Bullseye” Released with 83 Security Updates and 92 Bug Fixes
https://www.debian.org/News/2022/20220326
P.S. I wrote simple noscript for upgrade Debian to latest release and install unattended-upgrades (tested and use on Debian 11):
https://github.com/m0zgen/apt-automatic
https://www.debian.org/News/2022/20220326
P.S. I wrote simple noscript for upgrade Debian to latest release and install unattended-upgrades (tested and use on Debian 11):
https://github.com/m0zgen/apt-automatic
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
RIUS - RTLO Injection URI Spoofing CVE-2020-20093; 20094; 20095; 20096
https://github.com/zadewg/RIUS
https://github.com/zadewg/RIUS
GitHub
GitHub - zadewg/RIUS: CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing
CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing - GitHub - zadewg/RIUS: CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing
CVE-2022-0543: Redis Lua Sandbox Escape and Remote Code Execution
https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers
https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers
Juniper Networks
CVE-2022-0543: Redis Lua Sandbox Escape and Remote Code Execution
Juniper Threat Labs uncovers an attack that targets Redis Servers using the recently disclosed vulnerability CVE-2022-0543.
/ Resolved RCE in Sophos Firewall (CVE-2022-1040)
An authentication bypass vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall and responsibly disclosed to Sophos
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce
An authentication bypass vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall and responsibly disclosed to Sophos
https://www.sophos.com/en-us/security-advisories/sophos-sa-20220325-sfos-rce
/ Vidar Malware Launcher Concealed in Help File (CHM)
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vidar-malware-launcher-concealed-in-help-file/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vidar-malware-launcher-concealed-in-help-file/
Trustwave
Vidar Malware Launcher Concealed in Help File | Trustwave
Appending a malicious file to an unsuspecting file format is one of the tricks our adversaries use to evade detection. Recently, we came across an interesting email campaign employing this technique to deliver the info stealer Vidar malware.
/ A Beautiful Factory For Malicious Packages
Hundreds of malicious packages attempting to use a dependency confusion attack. The attacker has fully-automated the process of NPM account creation and has open dedicated accounts, one per package, making his new malicious packages batch harder to spot:
https://checkmarx.com/blog/a-beautiful-factory-for-malicious-packages/
Hundreds of malicious packages attempting to use a dependency confusion attack. The attacker has fully-automated the process of NPM account creation and has open dedicated accounts, one per package, making his new malicious packages batch harder to spot:
https://checkmarx.com/blog/a-beautiful-factory-for-malicious-packages/
Checkmarx
A Beautiful Factory for Malicious Packages
In the past month, Checkmarx SCS research team has been tracking the malicious activity of RED-LILI, which marks a significant milestone in the development of software supply-chain attacks. After gathering enough clues, the team has reconstructed this threat…
/ New Conversation Hijacking Campaign Delivering IcedID
his post describes the technical analysis of a new campaign detected by Intezer’s research team, which initiates attacks with a phishing email that uses conversation hijacking to deliver IcedID.
One way IcedID infects machines is via phishing emails. The infection chain that commonly has been used is an email with an attached password protected “zip” archive. Inside the archive is a macro enabled office document that executes the IcedID installer. Some phishing emails reuse previously stolen emails to make the lure more convincing:
https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/
his post describes the technical analysis of a new campaign detected by Intezer’s research team, which initiates attacks with a phishing email that uses conversation hijacking to deliver IcedID.
One way IcedID infects machines is via phishing emails. The infection chain that commonly has been used is an email with an attached password protected “zip” archive. Inside the archive is a macro enabled office document that executes the IcedID installer. Some phishing emails reuse previously stolen emails to make the lure more convincing:
https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/
Unit 42
TA551: Email Attack Campaign Switches from Valak to IcedID
We continue to monitor the email attack campaign TA551, AKA Shathak, which has recently pushed IcedID, a family of information-stealing malware.