/ Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild
*with bypass antivirus
https://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/
*with bypass antivirus
https://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/
/ UDP-based, application-layer protocol implementations are vulnerable to network loops
..An unauthenticated attacker can use maliciously-crafted packets against a UDP-based vulnerable implementation of application protocols (e.g., DNS, NTP, TFTP) that can lead to Denial-of-Service (DOS) and/or abuse of resources..:
https://kb.cert.org/vuls/id/417980
..An unauthenticated attacker can use maliciously-crafted packets against a UDP-based vulnerable implementation of application protocols (e.g., DNS, NTP, TFTP) that can lead to Denial-of-Service (DOS) and/or abuse of resources..:
https://kb.cert.org/vuls/id/417980
www.kb.cert.org
CERT/CC Vulnerability Note VU#417980
Implementations of UDP-based application protocols are vulnerable to network loops
/ SQLi (SQL Injection) org.postgresql:postgresql Dependency in Bamboo Data Center and Server
This Critical severity org.postgresql:postgresql Dependency vulnerability was introduced in versions 8.2.1, 9.0.0, 9.1.0, 9.2.1, 9.3.0, 9.4.0, and 9.5.0 of Bamboo Data Center and Server.
https://jira.atlassian.com/browse/BAM-25716
This Critical severity org.postgresql:postgresql Dependency vulnerability was introduced in versions 8.2.1, 9.0.0, 9.1.0, 9.2.1, 9.3.0, 9.4.0, and 9.5.0 of Bamboo Data Center and Server.
https://jira.atlassian.com/browse/BAM-25716
📢 Открытый практикум DevOps by Rebrain: Как выживать инженеру в потоке тонны звонков
Время:
• 26 Марта (Вторник) 19:00 МСК
Программа:
• Подходы к оптимизации времени
• Фреймворк потока
• Капсульный подход управления календарём
• Тулсет
↘ Регистрация
Ведёт:
Александр Крылов – Опыт работы в DevOps более 7 лет. Спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
Время:
• 26 Марта (Вторник) 19:00 МСК
Программа:
• Подходы к оптимизации времени
• Фреймворк потока
• Капсульный подход управления календарём
• Тулсет
↘ Регистрация
Ведёт:
Александр Крылов – Опыт работы в DevOps более 7 лет. Спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
/ AWS one-click account takeover vulnerability...
..one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance:
https://www.tenable.com/blog/flowfixation-aws-apache-airflow-service-takeover-vulnerability-and-why-neglecting-guardrails
..one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance:
https://www.tenable.com/blog/flowfixation-aws-apache-airflow-service-takeover-vulnerability-and-why-neglecting-guardrails
Tenable®
FlowFixation: AWS Apache Airflow Service Takeover Vulnerability and Why Neglecting Guardrails Puts Major CSPs at Risk
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved…
/ GoFetch is a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs).
https://gofetch.fail/
https://gofetch.fail/
gofetch.fail
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers
A new microarchitectural side-channel attack exploiting data memory-dependent prefetchers in Apple silicons.
/ ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms
https://comsec.ethz.ch/research/dram/zenhammer/
https://comsec.ethz.ch/research/dram/zenhammer/
/ The latest emerging C2 was primarily focused on Asus devices, and grew to over 6,000 bots in a period of 72 hours.
ASUS routers under attack:
https://blog.lumen.com/the-darkside-of-themoon/
ASUS routers under attack:
https://blog.lumen.com/the-darkside-of-themoon/
Lumen Blog
The darkside of TheMoon
Learn how the Black Lotus Labs team rediscovered a botnet named TheMoon, which has eclipsed its old size and activity.
/ Alert: PROXYLIB and LumiApps Transform Mobile Devices into Proxy Nodes
Residential proxies are frequently used by threat actors to conceal malicious activity, including advertising fraud and the use of bots. Access to residential proxy networks is often purchased from other threat actors who create them through enrolling unwitting users’ devices as nodes in the network through malware embedded in mobile, CTV or desktop applications...
How VPN app can convert your device to malicious proxy node:
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib-and-lumiapps-transform-mobile-devices-into-proxy-nodes
Residential proxies are frequently used by threat actors to conceal malicious activity, including advertising fraud and the use of bots. Access to residential proxy networks is often purchased from other threat actors who create them through enrolling unwitting users’ devices as nodes in the network through malware embedded in mobile, CTV or desktop applications...
How VPN app can convert your device to malicious proxy node:
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib-and-lumiapps-transform-mobile-devices-into-proxy-nodes
📢 Открытый практикум: Кросс-командные взаимодействия - учимся жить дружно
Время:
• 2 Апреля (Вторник) 19:00 МСК
Программа:
• Предпосылки для построения или изменения процесса взаимодействия
• Построение процесса взаимодействия команд DEV, QA с DevOps командой, когда вы единая служба
• Построение процесса работы DevOps с OPS/support
↘ Детали
Ведёт:
Александр Крылов – Опыт работы в DevOps более 7 лет. Спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
Время:
• 2 Апреля (Вторник) 19:00 МСК
Программа:
• Предпосылки для построения или изменения процесса взаимодействия
• Построение процесса взаимодействия команд DEV, QA с DevOps командой, когда вы единая служба
• Построение процесса работы DevOps с OPS/support
↘ Детали
Ведёт:
Александр Крылов – Опыт работы в DevOps более 7 лет. Спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
/ Out of the shadows – ’darcula’ iMessage and RCS smishing attacks target USPS and global postal services
https://www.netcraft.com/blog/darcula-smishing-attacks-target-usps-and-global-postal-services/
https://www.netcraft.com/blog/darcula-smishing-attacks-target-usps-and-global-postal-services/
Netcraft
Out of the shadows - ’darcula’ iMessage and RCS smishing attacks target USPS and global postal services | Netcraft
Chinese-language Phishing-as-a-Service platform ‘darcula’ targets organizations in 100+ countries with sophisticated techniques using more than 20,000 phish ...
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
Microsoft Edge browser, designated CVE-2024–21388. This flaw could have allowed an attacker to exploit a private API, initially intended for marketing purposes, to covertly install additional browser extensions with broad permissions without the user’s knowledge.
https://labs.guard.io/cve-2024-21388-microsoft-edges-marketing-api-exploited-for-covert-extension-installation-879fe5ad35ca
Microsoft Edge browser, designated CVE-2024–21388. This flaw could have allowed an attacker to exploit a private API, initially intended for marketing purposes, to covertly install additional browser extensions with broad permissions without the user’s knowledge.
https://labs.guard.io/cve-2024-21388-microsoft-edges-marketing-api-exploited-for-covert-extension-installation-879fe5ad35ca
Medium
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
By Oleg Zaytsev (Guardio Labs)
/ PyPi Is Under Attack: Project Creation and User Registration Suspended
https://checkmarx.com/blog/pypi-is-under-attack-project-creation-and-user-registration-suspended/
https://checkmarx.com/blog/pypi-is-under-attack-project-creation-and-user-registration-suspended/
Checkmarx
PyPi Is Under Attack
A few hours ago, The Python Package Index (PyPi) suspended new project creation and new user registration to mitigate an ongoing malware upload campaign. The research team of Checkmarx simultaneously investigated a campaign of multiple malicious packages…
/ Password Spray Attacks Impacting Remote Access VPN Services
https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html
https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html
Cisco
Recommendations Against Password Spray Attacks Aimed at Remote Access VPN Services in Secure Firewall
This document describes recommendations to consider against password spray attacks aimed at Remote Access VPN (RAVPN) services configured on Cisco
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
DinodasRAT Linux implant targeting entities worldwide
https://securelist.com/dinodasrat-linux-implant/112284/
https://securelist.com/dinodasrat-linux-implant/112284/
Securelist
Analysis of DinodasRAT Linux implant
In this article, we share our analysis of a recent version of the DinodasRAT implant for Linux, which may have been active since 2022.
📢 Оптимизированный профиль для устройств Apple
После последних атак на одного из хостинг-провайдеров
Загрузите оптимизированный профиль с сайта проекта и просто установите его поверх существующего:
👉 openbld.net/docs/get-started/setup-mobile-devices/apple/
Если ваша система работает нормально, обновление не обязательно. Просто помните, что такая возможность существует. Мир ✌️
P.S. Будут вопросы по обновлению - Welcome😎
--- En ---
📢 Optimized Profile for Apple Devices
Following recent attacks on one of the hosting providers within
Download the optimized profile from the project website and simply install it over your existing one:
👉 openbld.net/docs/get-started/setup-mobile-devices/apple/
If your system is functioning normally, updating is not mandatory. Just remember that the option is available. Peace! ✌️
P.S. If you have any questions regarding the update - Welcome😎
После последних атак на одного из хостинг-провайдеров
OpenBLD.net, я обновил топологию серверов для оптимизации доставки контента, особенно для пользователей Apple.Загрузите оптимизированный профиль с сайта проекта и просто установите его поверх существующего:
👉 openbld.net/docs/get-started/setup-mobile-devices/apple/
Если ваша система работает нормально, обновление не обязательно. Просто помните, что такая возможность существует. Мир ✌️
P.S. Будут вопросы по обновлению - Welcome
--- En ---
📢 Optimized Profile for Apple Devices
Following recent attacks on one of the hosting providers within
OpenBLD.net, I have updated the server topology to optimize content delivery, especially for Apple users.Download the optimized profile from the project website and simply install it over your existing one:
👉 openbld.net/docs/get-started/setup-mobile-devices/apple/
If your system is functioning normally, updating is not mandatory. Just remember that the option is available. Peace! ✌️
P.S. If you have any questions regarding the update - Welcome
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
According official Kali twitter blog post - The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today
Hack via hacker distro?)
CVE - https://nvd.nist.gov/vuln/detail/CVE-2024-3094
🔹 FAQ on the xz-utils backdoor: https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
🔹 Checker vulnerability: https://github.com/FabioBaroni/CVE-2024-3094-checker/blob/main/CVE-2024-3094-checker.sh
🔹 Detection: https://github.com/byinarie/CVE-2024-3094-info
🔹 More details: https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils
Hack via hacker distro?)
CVE - https://nvd.nist.gov/vuln/detail/CVE-2024-3094
Please open Telegram to view this post
VIEW IN TELEGRAM
X (formerly Twitter)
Kali Linux (@kalilinux) on X
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the…
/ OWASP Data Breach
OWASP Foundation became aware of a misconfiguration of OWASP’s old Wiki web server, leading to a data breach involving decade+-old member resumes:
https://owasp.org/blog/2024/03/29/OWASP-data-breach-notification.html
OWASP Foundation became aware of a misconfiguration of OWASP’s old Wiki web server, leading to a data breach involving decade+-old member resumes:
https://owasp.org/blog/2024/03/29/OWASP-data-breach-notification.html
owasp.org
OWASP Data Leak Notification | OWASP Foundation
OWASP Data Leak Notification on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
Расписание:
↘ Детали
P.S. Запись практикума “DevOps by Rebrain” в подарок за регистрацию
Please open Telegram to view this post
VIEW IN TELEGRAM
/ HTTP/2 CONTINUATION Flood: Technical Details
https://nowotarski.info/http2-continuation-flood-technical-details/
https://nowotarski.info/http2-continuation-flood-technical-details/
nowotarski.info
HTTP/2 `CONTINUATION` Flood: Technical Details
Preface In October 2023 I learned about HTTP/2 Rapid Reset attack, dubbed “the largest DDoS attack to date”. I didn’t have deep knowledge of HTTP/2 back then. I knew its basics like frames or HPACK but I was focusing more on HTTP/1.1 protocol and programming…