What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
codewhitesec.webp 2023-04-11 15:22:39 Restrictions d'exploitation Java dans les temps JDK modernes
Java Exploitation Restrictions in Modern JDK Times
(lien direct)
Java deserialization gadgets have a long history in context of vulnerability research and at least go back to the year 2015. One of the most popular tools providing a large set of different gadgets is ysoserial by Chris Frohoff. Recently, we observed increasing concerns from the community why several gadgets do not seem to work anymore with more recent versions of JDKs. In this blog post we try to summarize certain facts to reenable some capabilities which seemed to be broken. But our journey did not begin with deserialization in the first place but rather looking for alternative ways of executing Java code in recent JDK versions. In this blost post, we\'ll focus on OpenJDK and Oracle implementations. Defenders should therefore adjust their search patterns to these alternative code execution patterns accordingly.ScriptEngineManager - It\'s GoneInitially, our problems began on another exploitation track not related to deserialization. Often code execution payloads in Java end with a final call to java.lang.Runtime.getRuntime().exec(args), at  least in a proof-of-concept exploitation phase. But as a Red Team, we always try to maintain a low profile and avoid actions that may raise suspicion like spawing new (child) processes. This is a well-known and still hot topic discussed in the context of C2 frameworks today, especially when it comes to AV/EDR evasion techniques. But this can also be applied to Java exploitation. It is a well-known fact that an attacker has the choice between different approaches to stay within the JVM to execute arbitrary Java code, with new javax.script.ScriptEngineManager().getEngineByName(engineName).eval(scriptCode) probably being the most popular one over the last years. The input code used is usually based on JavaScript being executed by the referenced ScriptEngine available, e.g. Nashorn (or Rhino).But since Nashorn was marked as deprecated in Java 11 (JEP 335), and removed entirely in Java 15 (JEP 372), this means that a target using a JDK version >= 15 won\'t process JavaScript payloads anymore by default. Instead of hoping for other manually added JavaScript engines by developers for a specific target, we could make use of a "new" Java code evaluation API: JShell, a read-eval-print loop (REPL) tool that was introduced with Java 9 (JEP 222). Mainly used in combination with a command line interface (CLI) for testing Java code snippets, it allows programmatic access as well (see JShell API). This new evaluation call reads like jdk.jshell.JShell.create().eval(javaCode), executing Java code snippets (not JavaScript!). Further call variants exist, too. We found this being mentioned already in 2019 used in context of a SpEL Injection payload. This all sounded to good to be true but nevertheless some restrictions seemed to apply. "The input should be exactly one complete snippet of source code, that is, one expression, statement, variable declaration, method declaration, class declaration, or import." So, we started to play with some Java code snippets using the JShell API. First, we realized that it is indeed possible to use import statements within such snippets but interestingly the subsequent statements were not executed anymore. This should have been expected by re Tool Vulnerability ★★
knowbe4.webp 2023-04-11 13:16:54 Cyberheistnews Vol 13 # 15 [Le nouveau visage de la fraude] FTC fait la lumière sur les escroqueries d'urgence familiale améliorées AI-AI
CyberheistNews Vol 13 #15 [The New Face of Fraud] FTC Sheds Light on AI-Enhanced Family Emergency Scams
(lien direct)
CyberheistNews Vol 13 #15 CyberheistNews Vol 13 #15  |   April 11th, 2023 [The New Face of Fraud] FTC Sheds Light on AI-Enhanced Family Emergency Scams The Federal Trade Commission is alerting consumers about a next-level, more sophisticated family emergency scam that uses AI which imitates the voice of a "family member in distress." They started out with: "You get a call. There\'s a panicked voice on the line. It\'s your grandson. He says he\'s in deep trouble - he wrecked the car and landed in jail. But you can help by sending money. You take a deep breath and think. You\'ve heard about grandparent scams. But darn, it sounds just like him. How could it be a scam? Voice cloning, that\'s how." "Don\'t Trust The Voice" The FTC explains: "Artificial intelligence is no longer a far-fetched idea out of a sci-fi movie. We\'re living with it, here and now. A scammer could use AI to clone the voice of your loved one. All he needs is a short audio clip of your family member\'s voice - which he could get from content posted online - and a voice-cloning program. When the scammer calls you, he\'ll sound just like your loved one. "So how can you tell if a family member is in trouble or if it\'s a scammer using a cloned voice? Don\'t trust the voice. Call the person who supposedly contacted you and verify the story. Use a phone number you know is theirs. If you can\'t reach your loved one, try to get in touch with them through another family member or their friends." Full text of the alert is at the FTC website. Share with friends, family and co-workers:https://blog.knowbe4.com/the-new-face-of-fraud-ftc-sheds-light-on-ai-enhanced-family-emergency-scams A Master Class on IT Security: Roger A. Grimes Teaches Ransomware Mitigation Cybercriminals have become thoughtful about ransomware attacks; taking time to maximize your organization\'s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4. With 30+ years of experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making Ransomware Data Breach Spam Malware Hack Tool Threat ChatGPT ChatGPT ★★
GoogleSec.webp 2023-04-11 12:11:33 Annonce de l'API DEPS.DEV: données de dépendance critiques pour les chaînes d'approvisionnement sécurisées
Announcing the deps.dev API: critical dependency data for secure supply chains
(lien direct)
Posted by Jesper Sarnesjo and Nicky Ringland, Google Open Source Security Team Today, we are excited to announce the deps.dev API, which provides free access to the deps.dev dataset of security metadata, including dependencies, licenses, advisories, and other critical health and security signals for more than 50 million open source package versions. Software supply chain attacks are increasingly common and harmful, with high profile incidents such as Log4Shell, Codecov, and the recent 3CX hack. The overwhelming complexity of the software ecosystem causes trouble for even the most diligent and well-resourced developers. We hope the deps.dev API will help the community make sense of complex dependency data that allows them to respond to-or even prevent-these types of attacks. By integrating this data into tools, workflows, and analyses, developers can more easily understand the risks in their software supply chains. The power of dependency data As part of Google\'s ongoing efforts to improve open source security, the Open Source Insights team has built a reliable view of software metadata across 5 packaging ecosystems. The deps.dev data set is continuously updated from a range of sources: package registries, the Open Source Vulnerability database, code hosts such as GitHub and GitLab, and the software artifacts themselves. This includes 5 million packages, more than 50 million versions, from the Go, Maven, PyPI, npm, and Cargo ecosystems-and you\'d better believe we\'re counting them! We collect and aggregate this data and derive transitive dependency graphs, advisory impact reports, OpenSSF Security Scorecard information, and more. Where the deps.dev website allows human exploration and examination, and the BigQuery dataset supports large-scale bulk data analysis, this new API enables programmatic, real-time access to the corpus for integration into tools, workflows, and analyses. The API is used by a number of teams internally at Google to support the security of our own products. One of the first publicly visible uses is the GUAC integration, which uses the deps.dev data to enrich SBOMs. We have more exciting integrations in the works, but we\'re most excited to see what the greater open source community builds! We see the API as being useful for tool builders, researchers, and tinkerers who want to answer questions like: What versions are available for this package? What are the licenses that cover this version of a package-or all the packages in my codebase? How many dependencies does this package have? What are they? Does the latest version of this package include changes to dependencies or licenses? What versions of what packages correspond to this file? Taken together, this information can help answer the most important overarching question: how much risk would this dependency add to my project? The API can help surface critical security information where and when developers can act. This data can be integrated into: IDE Plugins, to make dependency and security information immediately available. CI Tool Vulnerability ★★
CVE.webp 2023-04-11 09:15:07 CVE-2023-25955 (lien direct) OUTIL NATIONAL NUMÉRIQUE DES INFORMATIONS DES INFORMATIONS TOUTES les versions restreint inapproprié les références d'entités externes XML (XXE).En traitant un fichier XML spécialement conçu, les fichiers arbitraires sur le PC peuvent être accessibles par un attaquant.
National land numerical information data conversion tool all versions improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker.
Tool
The_Hackers_News.webp 2023-04-07 11:45:00 Microsoft prend des mesures juridiques pour perturber les cybercriminels \\ 'Utilisation illégale de l'outil de grève du cobalt
Microsoft Takes Legal Action to Disrupt Cybercriminals\\' Illegal Use of Cobalt Strike Tool
(lien direct)
Microsoft a déclaré qu'il s'était associé au Fortra et au Centre d'analyse des informations sur les informations sur la santé (ISAC) pour lutter contre les abus de la grève du cobalt par les cybercriminels pour distribuer des logiciels malveillants, y compris le ransomware. À cette fin, l'unité des crimes numériques du géant de la technologie (DCU) a révélé qu'elle avait obtenu une ordonnance du tribunal aux États-Unis pour "supprimer des copies illégales de la grève de Cobalt afin qu'elles ne puissent plus être utilisées par
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle the abuse of Cobalt Strike by cybercriminals to distribute malware, including ransomware. To that end, the tech giant\'s Digital Crimes Unit (DCU) revealed that it secured a court order in the U.S. to "remove illegal, legacy copies of Cobalt Strike so they can no longer be used by
Tool ★★
CS.webp 2023-04-06 16:00:00 Microsoft mène des efforts pour perturber l'utilisation illicite de la grève du cobalt, un dangereux outil de piratage entre les mauvaises mains
Microsoft leads effort to disrupt illicit use of Cobalt Strike, a dangerous hacking tool in the wrong hands
(lien direct)
> L'action contre les versions illicites des applications légitimes de grève de Cobalt représente l'aboutissement d'une enquête d'un an.
>The action against illicit versions of legitimate Cobalt Strike applications represents the culmination of a year-long investigation.
Tool ★★
RecordedFuture.webp 2023-04-06 08:35:00 Microsoft, Fortra obtient une autorisation légale pour contrer la grève des cobalt
Microsoft, Fortra get legal permission to counter Cobalt Strike abuse
(lien direct)
Microsoft et deux organisations partenaires ont obtenu une ordonnance du tribunal pour aller après les infrastructures cybercriminales associées à l'abus rampant de la grève du cobalt - un outil de test légitime que les attaquants ont utilisé pour faire des ravages dans l'industrie de la santé.Dans une initiative [annoncée jeudi] (https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/), la société \'sUnité des crimes numériques (DCU) - aux côtés de l'organisme à but non lucratif
Microsoft and two partner organizations have been granted a court order to go after cybercriminal infrastructure associated with the rampant abuse of Cobalt Strike - a legitimate testing tool that attackers have used to wreak havoc on the healthcare industry. In an initiative [announced Thursday](https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/), the company\'s Digital Crimes Unit (DCU) - alongside the nonprofit
Tool ★★★
InfoSecurityMag.webp 2023-04-04 16:00:00 NOUVEAU RORSCHWAGE "RORSCHACH" via un produit commercial
New "Rorschach" Ransomware Spread Via Commercial Product
(lien direct)
La souche ransomware utilise un composant signé de l'outil de service de vidage Palo Alto Cortex XDR
The ransomware strain uses a signed component of the Palo Alto Cortex XDR Dump Service Tool
Ransomware Tool ★★
CVE.webp 2023-04-04 13:15:09 CVE-2023-29000 (lien direct) Le client de bureau NextCloud est un outil pour synchroniser les fichiers à partir du serveur NextCloud.En commençant par la version 3.0.0 et avant la version 3.7.0, en espérant que le serveur renvoie un certificat qui appartient à la clé de la clé de l'utilisateur, un serveur malveillant pourrait amener le client de bureau à crypter des fichiers avec une clé connue de l'attaquant.Ce problème est résolu dans NextCloud Desktop 3.7.0.Aucune solution de contournement connue n'est disponible.
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available.
Tool
CVE.webp 2023-04-04 13:15:08 CVE-2023-28997 (lien direct) Le client de bureau NextCloud est un outil pour synchroniser les fichiers à partir du serveur NextCloud.À partir de la version 3.0.0 et avant la version 3.6.5, un administrateur de serveur malveillant peut récupérer et modifier le contenu des fichiers cryptés de bout en bout.Les utilisateurs doivent mettre à niveau le client de bureau NextCloud à 3.6.5 pour recevoir un correctif.Aucune solution de contournement connue n'est disponible.
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can recover and modify the contents of end-to-end encrypted files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
Tool
CVE.webp 2023-04-04 13:15:08 CVE-2023-28998 (lien direct) Le client de bureau NextCloud est un outil pour synchroniser les fichiers à partir du serveur NextCloud.En commençant par la version 3.0.0 et avant la version 3.6.5, un administrateur de serveur malveillant peut accéder à un dossier crypté de bout en bout.Ils peuvent décrypter des fichiers, récupérer la structure du dossier et ajouter de nouveaux fichiers.?Les utilisateurs doivent mettre à niveau le client de bureau NextCloud à 3.6.5 pour recevoir un correctif.Aucune solution de contournement connue n'est disponible.
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files.? Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
Tool
Checkpoint.webp 2023-04-04 07:09:13 Travels en toute sécurité?La recherche sur les points de chèque met en lumière un marché souterrain croissant en vendant des points de vol, des récompenses de l'hôtel et des diplômes volés des comptes de compagnies aériennes
Safe Travels? Check Point Research puts a spotlight on a growing underground market selling flight points, hotel rewards and stolen credential of airline accounts
(lien direct)
> Faits saillants: Check Point Research (RCR) révèle une industrie croissante qui vend des informations d'identification aux comptes de hôtels et de compagnies aériennes volés.L'objectif final est d'avoir accès aux comptes avec des points de récompense et de le vendre.La RCR fournit des exemples comprenant un outil de forçage brute dédié utilisé pour voler des comptes, des informations d'identification volées en vente et des «agents de voyage» vendant des vols à prix réduits récupérés à l'aide de comptes de compagnies aériennes / hôtelières volées.Contexte avec les prix des compagnies aériennes en flèche de nos jours, au milieu de l'inflation mondiale, les gens recherchent toujours des ventes de dernière minute, des offres spéciales et seront généralement tentées de suivre toute offre lucrative qui diminuera les prix lourds dont nous avons tous besoin pour [& # 8230;]
>Highlights: Check Point Research (CPR) reveals a growing industry selling credentials to stolen hotel and airline accounts. End goal is to get access to accounts with reward points and sell it. CPR provides examples including dedicated brute forcing tool used to steal accounts, stolen credentials on sale and “travel agents” selling discounted flights retrieved using stolen airline / hotel accounts. Background With airline prices skyrocketing these days, amidst the global inflation, people are always seeking last minute sales, special offers and will usually be tempted to follow any lucrative offer that will decrease the heavy prices we all need to […]
Tool ★★
Anomali.webp 2023-04-03 22:13:00 Anomali Cyber Watch: Injecteurs du presse-papiers, infostelleurs, malvertising, pay-per-install, chaîne d'approvisionnement et vulnérabilités
Anomali Cyber Watch: Clipboard-injectors, Infostealers, Malvertising, Pay-per-install, Supply chain, and Vulnerabilities
(lien direct)
& nbsp; Anomali Cyber Watch: Balada Injecteur exploite WordPress Elementor Pro, ICON 3CX Stealer détecté par Yara, Koi Loader-Stealer Compresshes-then-Encrypts Streams, et plus. Les diverses histoires de l'intelligence des menaces dans cette itération de l'anomali Cyber Watch discutent des sujets suivants: Injecteurs de presse.Les CIO liés à ces histoires sont attachés à Anomali Cyber Watch et peuvent être utilisés pour vérifier vos journaux pour une activité malveillante potentielle. Figure 1 - Diagrammes de résumé du CIO.Ces graphiques résument les CIO attachés à ce magazine et donnent un aperçu des menaces discutées. Cyber News et Intelligence des menaces Vulnérabilité à haute gravité dans WordPress Elementor Pro patchée (Publié: 31 mars 2023) La campagne Balada Injecteur cible les plugins et les thèmes de site Web vulnérables depuis au moins 2017. Sa nouvelle cible sont les sites Web WordPress WooCommerce avec une vulnérabilité de contrôle d'accès brisé dans le populaire site Web Plugin Elementor Pro.Cette vulnérabilité à haute gravité (CVSS V3.1: 8.8, élevée) a reçu un patch de sécurité le 22 mars 2023, par conséquent, l'injecteur de Balada cible des sites Web qui n'ont pas encore été corrigés.Les attaquants créent un nouvel utilisateur administrateur et insérent un script envoyant des visiteurs à une redirection multi-HOP aux fins de spam, d'escroquerie ou d'installation de logiciels publicitaires. Commentaire de l'analyste: Les administrateurs de sites Web doivent mettre à jour immédiatement s'ils ont Elementor Pro version 3.11.6 ou moins installé.Utilisez la numérisation côté serveur pour détecter le contenu malveillant non autorisé.Tous les indicateurs connus associés à la campagne Balada Injector sont disponibles dans la plate-forme Anomali et il est conseillé aux clients de les bloquer sur leur infrastructure. mitre att & amp; ck: [mitre att & amp; ck] t1587.004 - développer des capacités:Exploits | [mitre att & amp; ck] t1190 - exploiter l'application de formation publique Tags: Campagne: Balada Injecteur, site Web compromis, redirection, spam, arnaque, type malware: Adware, Contrôle d'accès cassé, vulnérabilité, élémentor Pro, WordPress 3cx: SupplyL'attaque en chaîne affecte des milliers d'utilisateurs dans le monde (Publié: 30 mars 2023) Un groupe de menaces non identifié lié à la Corée du Nord a trojanisé le bureau de 3cx \\, un client de bureau vocal et vidéo utilisé par 12 millions d'utilisateurs dans 190 pays.Les installateurs de Windows récents (18.12.407 et 18.12.416) et Mac (18.11.1213, 18.12.402, 18.12.407 et 18.12.416) ont été compromis.Les installateurs de Windows contenaient des versions propres de l'application ainsi que des DLL malveillantes prêtes pour l'attaque de chargement latéral DLL.Les versions MacOS affectées ont été compromises de la même manière et contenaient une version trojanisée de la bibliothèque dynamique nommée libffmpeg.dylib.La charge utile finale observée était un logiciel malveillant de volée d'informations téléchargé comme un fichier ICO à partir d'un référentiel GitHub spécifique. Commentaire de l'analyste: Les attaques de la chaîne d Malware Tool Vulnerability Threat ★★
SecureList.webp 2023-04-03 12:10:52 Pas seulement un infosteller: la porte dérobée de Gopuram a été déployée via une attaque de chaîne d'approvisionnement 3CX
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack
(lien direct)
Une DLL nommée Guard64.dll, qui a été chargée dans le processus 3CXDesktopApp.exe infecté, a été utilisé dans des déploiements récents d'une porte dérobée que nous avons surnommée «Gopuram» et avait suivi en interne depuis 2020.
A DLL named guard64.dll, which was loaded into the infected 3CXDesktopApp.exe process, was used in recent deployments of a backdoor that we dubbed “Gopuram” and had been tracking internally since 2020.
Tool Threat General Information ★★
AlienVault.webp 2023-04-03 10:00:00 10 raisons pour lesquelles les entreprises ont besoin de gestion des appareils mobiles (MDM)
10 Reasons why businesses need mobile device management (MDM)
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Mobile device management (MDM) refers to a type of software that allows businesses to manage, configure and secure mobile devices used by their employees. Companies use MDM solutions to maintain a secure environment across all the mobile devices they own or have access to, as well as provide features such as remote wipe, password policies, application management and data protection. This helps them ensure security while providing their employees with access to the applications and data they need. An increasing number of businesses are either accepting that they need MDM or realising that what they have in place is not sufficient. With that in mind, below are ten reasons why MDM is an integral part of doing business in the 21st century. 1. Enhanced security MDM technology provides an extra layer of security for businesses, protecting them from breaches and data loss. MDM solutions enable secure authentication, access control and encryption for devices, applications and data, which in turn helps to keep sensitive corporate information safe. ESIMs, or embedded SIM cards can enhance the security of mobile devices even further by allowing businesses to remotely manage and secure their devices. Improved security is one of the most important reasons why businesses need MDM solutions. With an ever-increasing number of cyber threats, it is essential for companies to take steps to keep their data and systems secure. MDM can help with this. 2. Increased productivity MDM makes it easier for employees to access the applications and data they need, increasing their productivity and efficiency. By providing them with secure access to the resources they need, MDM solutions help remove the frustration of not being able to do their job due to technical issues or security policies. The ability to securely access corporate resources from anywhere, at any time, helps boost employee productivity and gives them the freedom they need to work more flexibly. 3. Reduced costs MDM solutions can help reduce costs in several ways. They enable companies to better manage their mobile devices and applications, which ensures that they are up-to-date with the latest security patches and features. This helps reduce maintenance costs associated with managing outdated equipment. MDM solutions also make it easier for businesses to deploy new applications, as they don’t have to worry about manually configuring each device. This reduces expensive install times and makes it easier for employees to get started quickly. 4. Improved compliance MDM solutions help businesses comply with industry standards and regulations. They enable companies to configure devices to meet specific security requirements, as well as monitor and manage mobile devices so that they adhere to corporate policies. By ensuring that all company devices are configured securely, MDM solutions reduce the risk of data breaches and fines associated with non-compliance. What\'s more, they can help identify areas where businesses need to improve their compliance processes. 5. Easier troubleshooting MDM solutio Tool ★★
CVE.webp 2023-03-31 20:15:07 CVE-2022-4899 (lien direct) Une vulnérabilité a été trouvée dans ZSTD v1.4.10, où un attaquant peut fournir une chaîne vide comme argument à l'outil de ligne de commande pour provoquer un dépassement de tampon.
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
Tool Vulnerability
RecordedFuture.webp 2023-03-31 18:50:00 Les problèmes de confidentialité et de sécurité de Chatgpt entraînent une interdiction temporaire en Italie [ChatGPT privacy and safety concerns lead to temporary ban in Italy] (lien direct) L'Agence de protection des données d'Italie \\ a temporairement interdit le chatppt, alléguant que le puissant outil d'intelligence artificielle a été illégalement collecté des données des utilisateurs et ne protégeant pas les mineurs.Dans une disposition publiée jeudi, l'agence a écrit qu'Openai, la société propriétaire du chatbot, n'alerte pas les utilisateurs qu'il collecte leurs données.Ils soutiennent également que
Italy\'s data protection agency has temporarily banned ChatGPT, alleging the powerful artificial intelligence tool has been illegally collecting users\' data and failing to protect minors. In a provision released Thursday, the agency wrote that OpenAI, the company that owns the chatbot, does not alert users that it is collecting their data. They also contend that
Tool ChatGPT ChatGPT ★★★
CVE.webp 2023-03-30 16:15:07 CVE-2022-30350 (lien direct) AvanQuest Software RAD PDF (PDFescape Online) 3.19.2.2 est vulnérable à la fuite / divulgation d'informations.L'outil en ligne PDFescape offre aux utilisateurs une fonctionnalité "White Out" pour la expurgation d'images, de texte et d'autres graphiques à partir d'un document PDF.Cependant, ce mécanisme ne supprime pas les informations sous-jacentes de texte ou d'objet PDF du PDF.En conséquence, par exemple, le texte expurgé peut être copier par un lecteur PDF.
Avanquest Software RAD PDF (PDFEscape Online) 3.19.2.2 is vulnerable to Information Leak / Disclosure. The PDFEscape Online tool provides users with a "white out" functionality for redacting images, text, and other graphics from a PDF document. However, this mechanism does not remove underlying text or PDF object specification information from the PDF. As a result, for example, redacted text may be copy-pasted by a PDF reader.
Tool
CVE.webp 2023-03-29 19:15:22 CVE-2023-28642 (lien direct) Runc est un outil CLI pour reproduire et exécuter des conteneurs en fonction de la spécification OCI.Il a été constaté que Apparmor peut être contourné lorsque `/ proc` à l'intérieur du conteneur est systématique avec une configuration de montage spécifique.Ce problème a été résolu dans Runc version 1.1.5, en interdisant Symliend `/ Proc`.Voir PR # 3785 pour plus de détails.Il est conseillé aux utilisateurs de mettre à niveau.Les utilisateurs incapables de mettre à niveau doivent éviter d'utiliser une image de conteneur non fiable.
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
Tool
CVE.webp 2023-03-29 19:15:22 CVE-2023-25809 (lien direct) Runc est un outil CLI pour reproduire et exécuter des conteneurs en fonction de la spécification OCI.Dans les versions affectées, il a été constaté que Rootless Runc rend `/ sys / fs / cgroup` écrivable dans les conditons suivants: 1. Lorsque Runc est exécuté dans l'espace de noms d'utilisateur, et le` config.json` ne spécifie pas l'espace de noms CGroup comme non partagé(par exemple, `(docker | podman | nerdctl) run --cgroupns = host`, avec rootless docker / podman / nerdctl) ou 2. lorsque runc est exécuté en dehors de l'espace de noms d'utilisateur, et` / sys` est monté avec `rbind, et` / sys` est monté avec `RBIND, ro` (par exemple, `Runc Spec --Rootless`; cette condition est très rare).Un conteneur peut obtenir l'accès en écriture à la hiérarchie CGROUP appartenant à l'utilisateur `/sys/fs/cgroup/user.slice / ...` sur l'hôte.Les hiérarchies CGROUP des autres utilisateurs ne sont pas affectées.Il est conseillé aux utilisateurs de passer à la version 1.1.5.Les utilisateurs incapables de mettre à niveau peuvent désabuser l'espace de noms Cgroup (`(docker | podman | nerdctl) exécuter --cgroupns = private)`.Il s'agit du comportement par défaut de Docker / Podman / Nerdctl sur les hôtes CGroup V2.ou ajoutez `/ sys / fs / cgroup` à` masquedpaths`.
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users\'s cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`.
Tool
DarkReading.webp 2023-03-29 00:00:00 Microsoft Security Copilot utilise GPT-4 pour renforcer la réponse aux incidents de sécurité [Microsoft Security Copilot Uses GPT-4 to Beef Up Security Incident Response] (lien direct) Le nouvel outil d'assistant AI de Microsoft aide les équipes de cybersécurité à enquêter sur les incidents de sécurité et à rechercher des menaces.
Microsoft\'s new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.
Tool ★★
The_Hackers_News.webp 2023-03-28 23:38:00 Microsoft présente l'outil de copilote de sécurité GPT-4 pour autoriser les défenseurs [Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders] (lien direct) Microsoft a dévoilé mardi le copilote de sécurité en avant-première, marquant sa poussée continue pour intégrer les fonctionnalités axées sur l'IA dans le but d'offrir "une défense de bout en bout à la vitesse et à l'échelle de la machine". Propulsé par GPT-4 d'Openai \\ GPT-4 et son propre modèle spécifique à la sécurité, il est facturé comme un outil d'analyse de sécurité qui permet aux analystes de cybersécurité de répondre rapidement aux menaces, aux signaux de processus et
Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to offer "end-to-end defense at machine speed and scale." Powered by OpenAI\'s GPT-4 generative AI and its own security-specific model, it\'s billed as a security analysis tool that enables cybersecurity analysts to quickly respond to threats, process signals, and
Tool ★★
Anomali.webp 2023-03-28 21:28:00 Anomali Cyber Watch: Takeover comptable, APT, Banking Trojans, Chine, Cyberespionage, Inde, Malspam, Corée du Nord, Phishing, Skimmers, Ukraine et Vulnérabilités [Anomali Cyber Watch: Account takeover, APT, Banking trojans, China, Cyberespionage, India, Malspam, North Korea, Phishing, Skimmers, Ukraine, and Vulnerabilities] (lien direct) Aucun Sélectionné Sauter vers le contenu à l'aide d'Anomali Inc Mail avec les lecteurs d'écran Yury 1 sur 52 ACW CONSEIL POLOZOV ACCORDS MAR 27 MAR, 2023, 10: 11 & # 8239; AM (1 jour) pour moi, marketing, recherche Cher Jarom etMarketing, ACW est prêt https://ui.thereatstream.com/tip/6397663 - Yury Polozov |Analyste de renseignement sur la menace de Sr. |ATR |www.anomali.com Téléphone: + 1-347-276-5554 3 pièces jointes et taureau;Scanné par gmail & nbsp; Anomali Cyber Watch: Spies amer sur l'énergie nucléaire chinoise, Kimsuky prend le contrôle de Google pour infecter les appareils Android connectés, les mauvaises cibles magiques occupées des parties de l'Ukraine, et plus encore. Les diverses histoires de l'intelligence des menaces dans cette itération de l'anomali cyber watch discutent des sujets suivants: Takeover, APT, Banking Trojans, China, Cyberspionage, Inde, Malspam, North Corée, Phishing, Skimmers, Ukraine, et vulnérabilités .Les CIO liés à ces histoires sont attachés à Anomali Cyber Watch et peuvent être utilisés pour vérifier vos journaux pour une activité malveillante potentielle. Figure 1 - Diagrammes de résumé du CIO.Ces graphiques résument les CIO attachés à ce magazine et donnent un aperçu des menaces discutées. Cyber News et Intelligence des menaces campagne de phishingCible l'industrie chinoise de l'énergie nucléaire (Publié: 24 mars 2023) Actif Depuis 2013, le groupe amer (T-APT-17) est soupçonné d'être parrainé par le gouvernement indien.Des chercheurs Intezer ont découvert une nouvelle campagne amère ciblant les universitaires, le gouvernement et d'autres organisations de l'industrie de l'énergie nucléaire en Chine.Les techniques sont cohérentes avec les campagnes amères observées précédemment.L'intrusion commence par un e-mail de phishing censé provenir d'un véritable employé de l'ambassade du Kirghizistan.Les pièces jointes malveillantes observées étaient soit des fichiers HTML (CHM) compilés à Microsoft, soit des fichiers Microsoft Excel avec des exploits d'éditeur d'équation.L'objectif des charges utiles est de créer de la persistance via des tâches planifiées et de télécharger d'autres charges utiles de logiciels malveillants (les campagnes amères précédentes ont utilisé le voleur d'identification du navigateur, le voleur de fichiers, le keylogger et les plugins d'outils d'accès à distance).Les attaquants se sont appuyés sur la compression LZX et la concaténation des cordes pour l'évasion de détection. Commentaire de l'analyste: De nombreuses attaques avancées commencent par des techniques de base telles que des e-mails injustifiés avec une pièce jointe qui oblige l'utilisateur à l'ouvrir.Il est important d'enseigner l'hygiène de base en ligne à vos utilisateurs et la sensibilisation au phishing.Il est sûr de recommander de ne jamais ouvrir de fichiers CHM joints et de garder votre bureau MS Office entièrement mis à jour.Tous les indicateurs connus associés à cette campagne amère sont disponibles dans la plate-forme Anomali et il est conseillé aux clients de les bloquer sur leur infrastructure. mitre att & amp; ck: [mitre att & amp; ck] t1589.002 - rassembler l'identité des victimesInformations: Adresses e-mail | [mitre att & amp; ck] t1566.001 -Phishing: attachement de espionnage | [mitre at Malware Tool Threat Cloud APT 37 APT 43 ★★
knowbe4.webp 2023-03-28 13:00:00 Cyberheistnews Vol 13 # 13 [Oeil Overner] Comment déjouer les attaques de phishing basées sur l'IA sournoises [CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks] (lien direct) CyberheistNews Vol 13 #13 CyberheistNews Vol 13 #13  |   March 28th, 2023 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks Users need to adapt to an evolving threat landscape in which attackers can use AI tools like ChatGPT to craft extremely convincing phishing emails, according to Matthew Tyson at CSO. "A leader tasked with cybersecurity can get ahead of the game by understanding where we are in the story of machine learning (ML) as a hacking tool," Tyson writes. "At present, the most important area of relevance around AI for cybersecurity is content generation. "This is where machine learning is making its greatest strides and it dovetails nicely for hackers with vectors such as phishing and malicious chatbots. The capacity to craft compelling, well-formed text is in the hands of anyone with access to ChatGPT, and that\'s basically anyone with an internet connection." Tyson quotes Conal Gallagher, CIO and CISO at Flexera, as saying that since attackers can now write grammatically correct phishing emails, users will need to pay attention to the circumstances of the emails. "Looking for bad grammar and incorrect spelling is a thing of the past - even pre-ChatGPT phishing emails have been getting more sophisticated," Gallagher said. "We must ask: \'Is the email expected? Is the from address legit? Is the email enticing you to click on a link?\' Security awareness training still has a place to play here." Tyson explains that technical defenses have become very effective, so attackers focus on targeting humans to bypass these measures. "Email and other elements of software infrastructure offer built-in fundamental security that largely guarantees we are not in danger until we ourselves take action," Tyson writes. "This is where we can install a tripwire in our mindsets: we should be hyper aware of what it is we are acting upon when we act upon it. "Not until an employee sends a reply, runs an attachment, or fills in a form is sensitive information at risk. The first ring of defense in our mentality should be: \'Is the content I\'m looking at legit, not just based on its internal aspects, but given the entire context?\' The second ring of defense in our mentality then has to be, \'Wait! I\'m being asked to do something here.\'" New-school security awareness training with simulated phishing tests enables your employees to recognize increasingly sophisticated phishing attacks and builds a strong security culture. Remember: Culture eats strategy for breakfast and is always top-down. Blog post with links:https://blog.knowbe4.com/identifying-ai-enabled-phishing Ransomware Malware Hack Tool Threat Guideline ChatGPT ChatGPT ★★★
globalsecuritymag.webp 2023-03-28 10:14:08 Vivotek lance la caméra de reconnaissance faciale à comparer First Edge FD9387-FR-V2 [VIVOTEK Launches First Edge-Computing Facial Recognition Camera FD9387-FR-v2] (lien direct) Vivotek s'efforce de fournir des solutions de sécurité complètes et lance la toute première caméra de reconnaissance faciale qui intègre le calcul Edge pour aider les entreprises à identifier rapidement le sexe et l'âge des personnes dans la vidéo sur le bord, ainsi que ceux qui portent des masques. - revues de produits
VIVOTEK strives to provide comprehensive security solutions and launches first-ever facial recognition camera that integrates edge computing to help enterprises to quickly identify the gender and age of people in the video on edge, as well as those who are wearing masks. - Product Reviews
Tool Threat ★★★
DarkReading.webp 2023-03-28 00:00:00 CISA publie un outil de chasse aux services cloud de Microsoft \\ [CISA Releases Hunt Tool for Microsoft\\'s Cloud Services] (lien direct) CISA a publié l'outil de chasse et de réponse pour aider les défenseurs à extraire des artefacts de cloud sans effectuer d'analyses supplémentaires.
CISA released the hunt and response tool to help defenders extract cloud artifacts without performing additional analytics.
Tool Cloud ★★★★
The_Hackers_News.webp 2023-03-27 15:18:00 Microsoft émet un patch pour le défaut de confidentialité d'Acropalypse dans les outils de capture d'écran Windows [Microsoft Issues Patch for aCropalypse Privacy Flaw in Windows Screenshot Tools] (lien direct) Microsoft a publié une mise à jour hors bande pour aborder un défaut de déficience de confidentialité dans son outil d'édition de capture d'écran pour Windows 10 et Windows 11. Le problème, surnommé Acropalypse, pourrait permettre aux acteurs malveillants de récupérer des parties éditées de captures d'écran, potentiellement révélant des informations sensibles qui peuvent avoir été résolues. Suivi comme CVE-2023-28303, la vulnérabilité est notée de 3,3 sur le CVSS
Microsoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool for Windows 10 and Windows 11. The issue, dubbed aCropalypse, could enable malicious actors to recover edited portions of screenshots, potentially revealing sensitive information that may have been cropped out. Tracked as CVE-2023-28303, the vulnerability is rated 3.3 on the CVSS
Tool Vulnerability ★★
CyberSkills.webp 2023-03-24 00:00:00 Pourquoi les petites entreprises devraient apprendre les compétences nécessaires pour améliorer leur cybersécurité
Why Small Businesses should Learn the Skills to Improve their Cybersecurity
(lien direct)
Comme présenté dans le Supplement Irish Independent Business Resilience Toutes les entreprises courent un risque important de cyberattaque - y compris les PME.Cependant, ils peuvent se protéger avec la bonne formation et une approche de cybersécurité plus proactive. La plupart des petites et moyennes entreprises (PME) ne sont que trop conscientes des risques de cyberattaque, note Donna O \\ 'Shea, présidente de la cybersécurité à Munster Technological University (MTU) et le chef de projet à Cyber ​​Skills - un projet financé à l'échelle nationalequi vise à répondre à la pénurie de compétences en cybersécurité. Les menaces de cybersécurité croissantes pour les PME Selon le Cybersecurity Consortium Pmesec, 60% de toutes les cyberattaques en 2016 étaient destinées aux petites entreprises.Ce qui est de plus, 60% des PME qui ont été victimes d'attaques ne se sont pas rétablies et ont fermé dans les six mois.Malgré ces statistiques, les PME ne traitent pas toujours correctement les questions de cybersécurité - et pour diverses raisons. «Certains propriétaires d'entreprise peuvent manquer de confiance et de capacités techniques pour répondre aux risques de cybersécurité», explique O \\ 'Shea.«D'autres minimisent le problème et demandent: \\ 'Qui essaierait de pirater mon entreprise de toute façon? \' Mais si leur base de données de clients \\ 'Informations personnelles subit une violation, c'est un problème majeur de conformité du RGPD.» Il y a aussi beaucoup de dissonance cognitive entourant ce sujet, admet O \\ 'Shea.«Il y a une tendance à penser aux PME: \\ 'Oui, notre entreprise est en danger - mais nous allons l'oublier. \' Nous devons changer leur état d'esprit pour: \\ 'Oui, notre entreprise est en danger - mais nous pouvons y répondre correctement avec les bonnes compétences et la bonne formation. » Retirer la mystique autour de la cybersécurité Cyber ​​Skills a développé la cybersécurité pour les entreprises - une série d'ateliers relatable livrée par des experts de l'industrie.Cela a été conçu pour fournir aux propriétaires d'entreprise les connaissances et les compétences clés pour se protéger contre les cyberattaques et supprimer une partie de la mystique entourant le sujet. Être proactif sur la cybersécurité Depuis trop longtemps, les entreprises ont adopté une approche \\ 'défensive et réactionnaire de la cybersécurité - avec des pare-feu, des systèmes de détection d'intrusion et des anti-virus faisant tout le gros du travail.Bien que ce soient toutes des mesures de sécurité importantes à avoir mis en place, au moment où un système réagit à une violation, les dommages ont déjà été causés. «Au lieu de cela, nous exhortons les entreprises à adopter une approche prédictive et réactive de la cybersécurité», explique O \\ 'Shea.«Les ateliers les aident à identifier où se trouvent leurs plus grands risques d'attaque.Nous appliquons des modèles, des outils et des techniques bien connus et montrons aux PME comment créer un plan de réponse aux incidents et un plan de continuité des activités - adapté à leurs besoins - de sorte que, en cas d'attaque, ils peuvent se remettre en service aussi rapidement aussi rapidementcomme possible.En fin de compte, les entreprises doivent commencer à penser à la cybersécurité d'une manière plus structurée et proactive. » Pour en savoir plus sur la façon de gérer votre cyber-risque, contactez-nous concernant votre intérêt pour la série des ateliers sur les petites entreprises.
As featured in the Irish Independent Business Resilience supplement All businesses are at significant risk of cyberattack - including SMEs. However, they can protect themselves with the right training and a more proactive cybersecurity approach. Most small and medium-sized enterprises (SMEs) are only too aware of the risks of cyberattack, notes Donna O\'Shea, Chair of Cybersecurity at Munster Technological University (MTU) and Project Lead at Cyber Skills - a n
Hack Tool Technical ★★
Chercheur.webp 2023-03-23 11:05:07 Attaque de ransomware de masse [Mass Ransomware Attack] (lien direct) Une vulnérabilité dans un outil de transfert de données populaire a abouti à un attaque de ransomware de masse : TechCrunch a appris des dizaines d'organisations qui ont utilisé le logiciel de transfert de fichiers Goanywhere affecté au moment de l'attaque du ransomware, suggérant que davantage de victimes sont susceptibles de se manifester. Cependant, alors que le nombre de victimes de la masse s'élargit, l'impact connu est au mieux trouble. Depuis l'attaque fin janvier ou début février & # 8212; La date exacte n'est pas connue & # 8212; CloP a révélé moins de la moitié des 130 organisations qu'elle prétendait avoir compromises via Goanywhere, un système qui peut être hébergé dans laCloud ou sur un réseau d'organisation qui permet aux entreprises de transférer en toute sécurité d'énormes ensembles de données et autres fichiers volumineux ...
A vulnerability in a popular data transfer tool has resulted in a
mass ransomware attack: TechCrunch has learned of dozens of organizations that used the affected GoAnywhere file transfer software at the time of the ransomware attack, suggesting more victims are likely to come forward. However, while the number of victims of the mass-hack is widening, the known impact is murky at best. Since the attack in late January or early February—the exact date is not known—Clop has disclosed less than half of the 130 organizations it claimed to have compromised via GoAnywhere, a system that can be hosted in the cloud or on an organization’s network that allows companies to securely transfer huge sets of data and other large files...
Ransomware Tool Vulnerability Studies Cloud ★★★
AlienVault.webp 2023-03-23 10:00:00 Blackguard Stealer étend ses capacités dans une nouvelle variante [BlackGuard stealer extends its capabilities in new variant] (lien direct) AT&T Alien Labs researchers have discovered a new variant of BlackGuard stealer in the wild, infecting using spear phishing attacks. The malware evolved since its previous variant and now arrives with new capabilities. Key takeaways: BlackGuard steals user sensitive information from a wide range of applications and browsers. The malware can hijack crypto wallets copied to clipboard. The new variant is trying to propagate through removable media and shared devices. Background BlackGuard stealer is malware as a service sold in underground forums and Telegram since 2021, when a Russian user posted information about a new malware called BlackGuard. It was offered for $700 lifetime or $200 monthly, claiming it can collect information from a wide range of applications and browsers. In November 2022, an update for BlackGuard was announced in Telegram by its developer. Along with the new features, the malware author suggests free help with installing the command & control panel (Figure 1) announcement in Telegraph Figure 1. Announcement of new malware version in its Telegram channel. Analysis When executed, BlackGuard first checks if another instance is running by creating a Mutex. Then to ensure it will survive a system reboot, the malware adds itself to the “Run” registry key. The malware also checks if it\'s running in debugger mode by checking TickCount and checking if the current user belongs to a specific list to determine whether it is running in a malware sandbox environment. (Figure 2) Blackguard avoiding detection Figure 2. Malware will avoid execution if running under specific user names. Now all is ready for stealing the user’s sensitive data. It collects all stolen information in a folder where each piece of data is stored in a specific folder, such as Browsers, Files, Telegram, etc. (Figure 3) Blackguard main folder Figure 3. BlackGuard main folder with stolen data divided into folders. When it finishes collecting sensitive data, the malware will zip the main folder using the password “xNET3301LIVE” and send it to its command & control. (Figure 4) Zipped exfiltration data Figure 4. Zipping exfiltrated data with password and uploading to command & control. Browser stealth Along with collecting cookies, history and downloads of different browsers, BlackGuard also looks for the existence of special files and folders of different browsers. (This includes “Login Data”, AutoFill, History and Downloads. (Figure 5)  Blackguard collecting browser information Figure 5. Collecting browser information. Below is the list of browsers BlackGuard is looking for: Chromium Malware Tool Threat General Information ★★★
Darktrace.webp 2023-03-21 00:00:00 Authentification multi-facteurs: pas la solution miracle [Multi-Factor Authentication: Not the Silver Bullet] (lien direct) L'authentification multi-facteurs (MFA) a été largement adoptée comme mesure de sécurité par rapport aux méthodes de rachat de compte commun.Cependant, l'industrie constate de plus en plus d'exemples de compromis MFA dans lesquels les acteurs de menace exploitent l'outil de sécurité lui-même pour obtenir un accès au compte.
Multi-Factor Authentication (MFA) has been widely adopted as a security measure against common account takeover methods. However, the industry is seeing more and more examples of MFA compromise wherein threat actors exploit the security tool itself to gain account access.
Tool Threat ★★
Anomali.webp 2023-03-20 23:29:00 Anomali Cyber Watch: APT, China, Data leak, Injectors, Packers, Phishing, Ransomware, Russia, and Ukraine (lien direct) & nbsp; Anomali Cyber Watch: Winter Vivern imite la page Web de cybercrimes de la Poland, le télégramme trojanisé vole les clés de crypto-monnaie à partir de captures d'écran, Silkloder évite l'East Asian Menking Bookbox, et plus encore. Les diverses histoires de l'intelligence des menaces dans cette itération de l'anomali cyber watch discutent les sujets suivants: apt, Chine, fuite de données, injecteurs, packers, phishing, ransomware, Russie, et Ukraine.Les CIO liés à ces histoires sont attachés à Anomali Cyber Watch et peuvent être utilisés pour vérifier vos journaux pour une activité malveillante potentielle. Figure 1 - Diagrammes de résumé du CIO.Ces graphiques résument les CIO attachés à ce magazine et donnent un aperçu des menaces discutées. Cyber News et Intelligence des menaces Visern d'hiver |Découvrir une vague d'espionnage mondial (Publié: 16 mars 2023) Depuis décembre 2020, Winter Vivern se livrait à des campagnes de cyberespionnage alignées sur les objectifs du Bélarus et du gouvernement russe.Depuis janvier 2021, il a ciblé les organisations gouvernementales en Lituanie, en Inde, au Vatican et en Slovaquie.De la mi-2022 à décembre 2022, il a ciblé l'Inde et l'Ukraine: a usurpé l'identité du site Web du service de courrier électronique du gouvernement indien et a envoyé un excel macro-compétitif pour cibler un projet facilitant la reddition du personnel militaire russe.Au début de 2023, Winter Vivern a créé de fausses pages pour le bureau central de la Pologne pour la lutte contre la cybercriminalité, le ministère ukrainien des Affaires étrangères et le service de sécurité de l'Ukraine.Le groupe s'appuie souvent sur le simple phishing pour les références.Un autre type d'activité d'hiver VIVERN comprend des documents de bureau malveillants avec des macros, un script de chargeur imitant un scanner de virus et l'installation de la porte dérobée de l'ouverture.L'infrastructure malveillante du groupe comprend des domaines typosquattés et des sites Web WordPress compromis. Commentaire de l'analyste: Faites attention si un domaine demande vos mots de passe, essayez d'établir son authenticité et sa propriété.Les clients anomalis préoccupés par les risques pour leurs actifs numériques (y compris les domaines similaires / typosquattés) peuvent essayer Service de protection numérique premium d'Anomali \\ 's .De nombreuses attaques avancées commencent par des techniques de base telles que des e-mails injustifiés avec des pièces jointes malveillantes qui obligent l'utilisateur à l'ouvrir et à activer les macroses.Il est important d'enseigner à vos utilisateurs une hygiène de base en ligne et une conscience de phishing. mitre att & amp; ck: [mitre att & amp; ck] t1583.001 -Acquérir des infrastructures: domaines | [mitre att & amp; ck] t1566.001 - phishing: spearphishing attachement | [mitre att & amp; ck] t1059.001: powershell | [mitre att & amp; ck] t1059.003 - commande et scriptInterprète: Shell de commande Windows | [mitre att & amp; ck] t1105 - transfert d'outils d'en Ransomware Malware Tool Vulnerability Threat Cloud ★★
Pirate.webp 2023-03-20 16:19:22 DataSurgeon – Extract Sensitive Information (PII) From Logs (lien direct) DataSurgeon (ds) is a versatile tool designed to Extract Sensitive Information (PII) From Logs, it's intended to be used for incident response, penetration testing, and CTF challenges. Tool ★★
codewhitesec.webp 2023-03-20 12:30:04 JMX Exploitation Revisited (lien direct) The Java Management Extensions (JMX) are used by many if not all enterprise level applications in Java for managing and monitoring of application settings and metrics. While exploiting an accessible JMX endpoint is well known and there are several free tools available, this blog post will present new insights and a novel exploitation technique that allows for instant Remote Code Execution with no further requirements, such as outgoing connections or the existence of application specific MBeans. Introduction How to exploit remote JMX services is well known. For instance, Attacking RMI based JMX services by Hans-Martin Münch gives a pretty good introduction to JMX as well as a historical overview of attacks against exposed JMX services. You may want to read it before proceeding so that we're on the same page. And then there are also JMX exploitation tools such as mjet (formerly also known as sjet, also by Hans-Martin Münch) and beanshooter by my colleague Tobias Neitzel, which both can be used to exploit known vulnerabilities and JMX services and MBeans. However, some aspects are either no longer possible in current Java versions (e. g., pre-authenticated arbitrary Java deserialization via RMIServer.newClient(Object)) or they require certain MBeans being present or conditions such as the server being able to connect back to the attacker (e. g., MLet with HTTP URL). In this blog post we will look into two other default MBean classes that can be leveraged for pretty unexpected behavior: remote invocation of arbitrary instance methods on arbitrary serializable objects remote invocation of arbitrary static methods on arbitrary classes Tobias has implemented some of the gained insights into his tool beanshooter. Thanks! Read The Fine Manual By default, MBean classes are required to fulfill one of the following: follow certain design patterns implement certain interfaces For example, the javax.management.loading.MLet class implements the javax.management.loading.MLetMBean, which fulfills the first requirement that it implements an interface whose name of the same name but ends with MBean. The two specific MBean classes we will be looking at fulfill the second requirement: javax.management.StandardMBean javax.management.modelmbean.RequiredModelMBean Both classes provide features that don't seem to have gotten much attention yet, but are pretty powerful and allow interaction with the MBean server and MBeans that may even violate the JMX specification. The Standard MBean Class StandardMBean The StandardMBean was added to JMX 1.2 with the following description: […] the javax.management.StandardMBean class can be used to define standard MBeans with an interface whose name is not necessarily related to the class name of the MBean. – Java™ Management Extensions (JMX™) (Maintenance Release 2) Also: An MBean whose management interface is determined by reflection on a Java interface. –  Tool ★★
The_State_of_Security.webp 2023-03-17 09:58:00 Free decryptor released for Conti-based ransomware following data leak (lien direct) Security researchers have released a new decryption tool that should come to the rescue of some victims of a modified version of the Conti ransomware, helping them to recover their encrypted data for free. Conti was one of the most notorious ransomware groups, responsible for hundreds of attacks against organisations, which netted criminals over $150 million. Its victims included the government of Costa Rica which declared a national emergency after systems in multiple departments were severely impacted. However, things began to unravel for the Conti ransomware gang in February 2022, when the... Ransomware Tool General Information ★★★
RecordedFuture.webp 2023-03-16 20:56:00 Kaspersky releases decryptor for ransomware based on Conti source code (lien direct) Cybersecurity firm Kaspersky on Thursday released a decryptor that could help victims who had their data locked down by a version of the Conti ransomware. Kaspersky said the tool can be used on a malware strain that infected dozens of “companies and state institutions” throughout December 2022. Kaspersky did not name the strain, but experts Ransomware Malware Tool ★★
News.webp 2023-03-16 16:31:10 ReMarkable emits Type Folio keyboard cover for e-paper tablet (lien direct) Distraction-free long-life e-ink handheld writing tool becomes a typing tool too... but leaves us conflicted Norwegian e-ink tablet maker reMarkable has launched the Type Folio, a keyboard cover, causing one Reg hack to feel strangely conflicted.… Hack Tool ★★
InfoSecurityMag.webp 2023-03-16 10:30:00 NCSC Calms Fears Over ChatGPT Threat (lien direct) Tool won't democratize cybercrime, agency argues Tool Threat ChatGPT ChatGPT ★★
globalsecuritymag.webp 2023-03-15 17:49:06 WithSecure™: Chinese cyber crime tool acquired by Russian ransomware gangs (lien direct) WithSecure™: Chinese cyber crime tool acquired by Russian ransomware gangs - Malware Update Ransomware Tool
CS.webp 2023-03-15 17:25:05 Police shut down cryptocurrency mixer linked to laundering more than $3 billion in criminal funds (lien direct) North Korean hackers alone used the tool to launder bitcoin worth more than $700 million. Tool ★★
Checkpoint.webp 2023-03-15 11:00:34 Can your SASE solution block these top malware? (lien direct) >Malware is a go-to tactic and essential tool for attackers. According to Check Point Research’s 2023 Cyber Security Report, 32% of cyber attacks globally are based on multipurpose malware with email as the attack vector in 86% of those attacks. The most vicious malware are wipers, whose only purpose is to cause irreversible damage and… Malware Tool ★★
ComputerWeekly.webp 2023-03-15 11:00:00 Chinese Silkloader cyber attack tool falls into Russian hands (lien direct) Pas de details / No more details Tool ★★★
Netskope.webp 2023-03-14 18:17:21 Cloud Threats Memo: Cyber Espionage Campaign Using Remote Access Tools (lien direct) >Another day, another cyber espionage campaign exploiting two legitimate and well-known cloud services to deliver the malicious payload. Once again, this campaign was unearthed by researchers at Sentinel One, and it is aimed to distribute the Remcos Remote Access Tool (yet another example of a remote control tool used for malicious purposes) through the DBatLoader […] Tool Cloud ★★★
Anomali.webp 2023-03-14 17:32:00 Anomali Cyber Watch: Xenomorph Automates The Whole Fraud Chain on Android, IceFire Ransomware Started Targeting Linux, Mythic Leopard Delivers Spyware Using Romance Scam (lien direct)   Anomali Cyber Watch: Xenomorph Automates The Whole Fraud Chain on Android, IceFire Ransomware Started Targeting Linux, Mythic Leopard Delivers Spyware Using Romance Scam, and More. The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Android, APT, DLL side-loading, Iran, Linux, Malvertising, Mobile, Pakistan, Ransomware, and Windows. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence Xenomorph V3: a New Variant with ATS Targeting More Than 400 Institutions (published: March 10, 2023) Newer versions of the Xenomorph Android banking trojan are able to target 400 applications: cryptocurrency wallets and mobile banking from around the World with the top targeted countries being Spain, Turkey, Poland, USA, and Australia (in that order). Since February 2022, several small, testing Xenomorph campaigns have been detected. Its current version Xenomorph v3 (Xenomorph.C) is available on the Malware-as-a-Service model. This trojan version was delivered using the Zombinder binding service to bind it to a legitimate currency converter. Xenomorph v3 automatically collects and exfiltrates credentials using the ATS (Automated Transfer Systems) framework. The command-and-control traffic is blended in by abusing Discord Content Delivery Network. Analyst Comment: Fraud chain automation makes Xenomorph v3 a dangerous malware that might significantly increase its prevalence on the threat landscape. Users should keep their mobile devices updated and avail of mobile antivirus and VPN protection services. Install only applications that you actually need, use the official store and check the app description and reviews. Organizations that publish applications for their customers are invited to use Anomali's Premium Digital Risk Protection service to discover rogue, malicious apps impersonating your brand that security teams typically do not search or monitor. MITRE ATT&CK: [MITRE ATT&CK] T1417.001 - Input Capture: Keylogging | [MITRE ATT&CK] T1417.002 - Input Capture: Gui Input Capture Tags: malware:Xenomorph, Mobile, actor:Hadoken Security Group, actor:HadokenSecurity, malware-type:Banking trojan, detection:Xenomorph.C, Malware-as-a-Service, Accessibility services, Overlay attack, Discord CDN, Cryptocurrency wallet, target-industry:Cryptocurrency, target-industry:Banking, target-country:Spain, target-country:ES, target-country:Turkey, target-country:TR, target-country:Poland, target-country:PL, target-country:USA, target-country:US, target-country:Australia, target-country:AU, malware:Zombinder, detection:Zombinder.A, Android Cobalt Illusion Masquerades as Atlantic Council Employee (published: March 9, 2023) A new campaign by Iran-sponsored Charming Kitten (APT42, Cobalt Illusion, Magic Hound, Phosphorous) was detected targeting Mahsa Amini protests and researchers who document the suppression of women and minority groups i Ransomware Malware Tool Vulnerability Threat Guideline Conference APT 35 ChatGPT ChatGPT APT 36 APT 42 ★★
ESET.webp 2023-03-14 10:30:49 The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia (lien direct) ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group Tool ★★★
CVE.webp 2023-03-10 21:15:14 CVE-2023-0193 (lien direct) NVIDIA CUDA Toolkit SDK contains a vulnerability in cuobjdump, where a local user running the tool against a malicious binary may cause an out-of-bounds read, which may result in a limited denial of service and limited information disclosure. Tool Vulnerability
globalsecuritymag.webp 2023-03-09 17:20:02 ChatGPT: A tool for offensive cyber operations?! Not so fast! (lien direct) ChatGPT: A tool for offensive cyber operations?! Not so fast! By John Borrero Rodriguez, Trellix - Opinion Tool ChatGPT ★★
SecurityThroughEducation.webp 2023-03-08 13:00:14 Influence Techniques in Everyday Life: Sales (lien direct) People in many different professions use social engineering as a tool in everyday life. In the case of sales, social […] Tool ★★★
GoogleSec.webp 2023-03-08 12:04:53 OSV and the Vulnerability Life Cycle (lien direct) Posted by Oliver Chang and Andrew Pollock, Google Open Source Security Team It is an interesting time for everyone concerned with open source vulnerabilities. The U.S. Executive Order on Improving the Nation's Cybersecurity requirements for vulnerability disclosure programs and assurances for software used by the US government will go into effect later this year. Finding and fixing security vulnerabilities has never been more important, yet with increasing interest in the area, the vulnerability management space has become fragmented-there are a lot of new tools and competing standards. In 2021, we announced the launch of OSV, a database of open source vulnerabilities built partially from vulnerabilities found through Google's OSS-Fuzz program. OSV has grown since then and now includes a widely adopted OpenSSF schema and a vulnerability scanner. In this blog post, we'll cover how these tools help maintainers track vulnerabilities from discovery to remediation, and how to use OSV together with other SBOM and VEX standards. Vulnerability Databases The lifecycle of a known vulnerability begins when it is discovered. To reach developers, the vulnerability needs to be added to a database. CVEs are the industry standard for describing vulnerabilities across all software, but there was a lack of an open source centric database. As a result, several independent vulnerability databases exist across different ecosystems. To address this, we announced the OSV Schema to unify open source vulnerability databases. The schema is machine readable, and is designed so dependencies can be easily matched to vulnerabilities using automation. The OSV Schema remains the only widely adopted schema that treats open source as a first class citizen. Since becoming a part of OpenSSF, the OSV Schema has seen adoption from services like GitHub, ecosystems such as Rust and Python, and Linux distributions such as Rocky Linux. Thanks to such wide community adoption of the OSV Schema, OSV.dev is able to provide a distributed vulnerability database and service that pulls from language specific authoritative sources. In total, the OSV.dev database now includes 43,302 vulnerabilities from 16 ecosystems as of March 2023. Users can check OSV for a comprehensive view of all known vulnerabilities in open source. Every vulnerability in OSV.dev contains package manager versions and git commit hashes, so open source users can easily determine if their packages are impacted because of the familiar style of versioning. Maintainers are also familiar with OSV's community driven and distributed collaboration on the development of OSV's database, tools, and schema. Matching The next step in managing vulnerabilities is to determine project dependencies and their associated vulnerabilities. Last December we released OSV-Scanner, a free, open source tool which scans software projects' lockfiles, SBOMs, or git repositories to identify vulnerabilities found in the Tool Vulnerability ★★★★
GoogleSec.webp 2023-03-08 11:59:13 Thank you and goodbye to the Chrome Cleanup Tool (lien direct) Posted by Jasika Bawa, Chrome Security Team Starting in Chrome 111 we will begin to turn down the Chrome Cleanup Tool, an application distributed to Chrome users on Windows to help find and remove unwanted software (UwS). Origin story The Chrome Cleanup Tool was introduced in 2015 to help users recover from unexpected settings changes, and to detect and remove unwanted software. To date, it has performed more than 80 million cleanups, helping to pave the way for a cleaner, safer web. A changing landscape In recent years, several factors have led us to reevaluate the need for this application to keep Chrome users on Windows safe. First, the user perspective – Chrome user complaints about UwS have continued to fall over the years, averaging out to around 3% of total complaints in the past year. Commensurate with this, we have observed a steady decline in UwS findings on users' machines. For example, last month just 0.06% of Chrome Cleanup Tool scans run by users detected known UwS. Next, several positive changes in the platform ecosystem have contributed to a more proactive safety stance than a reactive one. For example, Google Safe Browsing as well as antivirus software both block file-based UwS more effectively now, which was originally the goal of the Chrome Cleanup Tool. Where file-based UwS migrated over to extensions, our substantial investments in the Chrome Web Store review process have helped catch malicious extensions that violate the Chrome Web Store's policies. Finally, we've observed changing trends in the malware space with techniques such as Cookie Theft on the rise – as such, we've doubled down on defenses against such malware via a variety of improvements including hardened authentication workflows and advanced heuristics for blocking phishing and social engineering emails, malware landing pages, and downloads. What to expect Starting in Chrome 111, users will no longer be able to request a Chrome Cleanup Tool scan through Safety Check or leverage the "Reset settings and cleanup" option offered in chrome://settings on Windows. Chrome will also remove the component that periodically scans Windows machines and prompts users for cleanup should it find anything suspicious. Even without the Chrome Cleanup Tool, users are automatically protected by Safe Browsing in Chrome. Users also have the option to turn on Enhanced protection by navigating to chrome://settings/security – this mode substantially increases protection from dangerous websites and downloads by sharing real-time data with Safe Browsing. While we'll miss the Chrome Cleanup Tool, we wanted to take this opportunity to acknowledge its role in combating UwS for the past 8 years. We'll continue to monitor user feedback and trends in the malware ecosystem, and when adversaries adapt their techniques again – which they will – we'll be at the ready. As always, please feel free to send us feedback or find us on Twitter @googlechrome. Malware Tool ★★★
Last update at: 2024-06-28 02:07:35
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter