www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-19T23:56:09+00:00 www.secnews.physaphae.fr CISCO Talos - Cisco Research blog Vulnerability Spotlight: Lansweeper directory traversal and cross-site scripting vulnerabilities 2022-12-01T15:47:25+00:00 https://blog.talosintelligence.com/vulnerability-spotlight-lansweeper-directory-traversal-and-cross-site-scripting-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8286344 False None None 3.0000000000000000 CISCO Talos - Cisco Research blog Researcher Spotlight: How working for Talos started out as an \'accident\' for Ashlee Benge before coming a second career 2022-11-29T13:00:41+00:00 https://blog.talosintelligence.com/researcher-spotlight-how-working-for-talos-started-out-as-an-accident-for-ashlee-benge-before-coming-a-second-career/ www.secnews.physaphae.fr/article.php?IdArticle=8280873 False Guideline None 2.0000000000000000 CISCO Talos - Cisco Research blog Vulnerability Spotlight: Callback Technologies CBFS Filter denial-of-service vulnerabilities 2022-11-22T15:56:01+00:00 https://blog.talosintelligence.com/vulnerability-spotlight-callback-technologies-cbfs-filter-denial-of-service-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8163539 False None None 3.0000000000000000 CISCO Talos - Cisco Research blog Threat Round up for November 11 to 18 2022-11-18T17:42:22+00:00 https://blog.talosintelligence.com/threat-roundup-1111-1118/ www.secnews.physaphae.fr/article.php?IdArticle=8093237 True None None None CISCO Talos - Cisco Research blog Get a Loda This: LodaRAT meets new friends 2022-11-17T13:01:13+00:00 https://blog.talosintelligence.com/get-a-loda-this/ www.secnews.physaphae.fr/article.php?IdArticle=8067772 False Malware None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Microsoft Office class attribute double-free vulnerability 2022-11-15T21:09:03+00:00 https://blog.talosintelligence.com/vulnerability-spotlight-microsoft-office-class-attribute-double-free-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8035056 False Vulnerability None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Use-after-free vulnerabilities in Foxit Reader could lead to arbitrary code execution 2022-11-10T20:27:19+00:00 https://blog.talosintelligence.com/vulnerability-spotlight-use-after-free-vulnerabilities-in-foxit-reader-could-lead-to-arbitrary-code-execution/ www.secnews.physaphae.fr/article.php?IdArticle=7933571 False Guideline None None CISCO Talos - Cisco Research blog Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns 2022-11-09T13:00:17+00:00 https://blog.talosintelligence.com/ipfs-abuse/ www.secnews.physaphae.fr/article.php?IdArticle=7905774 False Malware,Threat None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for November 2022 - Snort rules and prominent vulnerabilities 2022-11-08T18:22:00+00:00 https://blog.talosintelligence.com/microsoft-patch-tuesday-for-november-2022/ www.secnews.physaphae.fr/article.php?IdArticle=7892746 False None None 3.0000000000000000 CISCO Talos - Cisco Research blog Emotet coming in hot it reemerged later that year, rebuilding its infrastructure and]]> 2022-11-08T16:38:36+00:00 https://blog.talosintelligence.com/emotet-coming-in-hot/ www.secnews.physaphae.fr/article.php?IdArticle=7891463 False None None None CISCO Talos - Cisco Research blog The Company You Keep – Preparing for supply chain attacks with Talos IR 2022-11-08T14:33:30+00:00 https://blog.talosintelligence.com/talos-ir-supply-chain-preparedness/ www.secnews.physaphae.fr/article.php?IdArticle=7890826 False None None None CISCO Talos - Cisco Research blog Threat Advisory: High Severity OpenSSL Vulnerabilities CVE-2022-3602 and CVE-2022-3786, were announced in OpenSSL versions 3.0.0 to 3.0.6. These vulnerabilities can be exploited by sending an X.509 certificate with a specially crafted email address, potentially causing a buffer overflow resulting in a crash or]]> 2022-11-01T19:03:49+00:00 https://blog.talosintelligence.com/openssl-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=7768580 False None None None CISCO Talos - Cisco Research blog Researcher Spotlight: How Azim Khodjibaev went from hunting real-world threats to threats on the dark web 2022-10-31T18:59:51+00:00 https://blog.talosintelligence.com/researcher-spotlight-how-azim-khodjibaev-went-from-hunting-real-world-threats-to-threats-on-the-dark-web/ www.secnews.physaphae.fr/article.php?IdArticle=7757102 False Ransomware None None CISCO Talos - Cisco Research blog See Yourself in Cyber: A Cybersecurity Awareness Month recap 2022-10-28T13:03:21+00:00 https://blog.talosintelligence.com/see-yourself-in-cyber-a-cybersecurity-awareness-month-recap/ www.secnews.physaphae.fr/article.php?IdArticle=7718925 False None None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in InHand router could give attackers access to console, delete files 2022-10-27T15:04:42+00:00 https://blog.talosintelligence.com/vulnerability-spotlight-inhand-router-302-oct-2022/ www.secnews.physaphae.fr/article.php?IdArticle=7704450 False None None None CISCO Talos - Cisco Research blog Quarterly Report: Incident Response Trends in Q3 2022 Ransomware and pre-ransomware engagements make up 40 percent of threats seen this quarterBy Caitlin Huey.For the first time since compiling these reports, Cisco Talos Incident Response saw an equal number of ransomware and pre-ransomware engagements, making up nearly 40 percent of threats this quarter.  It can be difficult to determine what constitutes a pre-ransomware attack if ransomware never executes and encryption does not take place. However, Talos IR assesses that the combination of Cobalt Strike and credential-harvesting tools like Mimikatz, paired with enumeration and discovery techniques, indicates a high likelihood that ransomware is the final objective.This quarter featured a variety of publicly available tools and scripts hosted on GitHub repositories or other third-party websites to support operations across multiple stages of the attack lifecycle. This activity coincides with a general increase in the use of other dual-use tools, such as the legitimate red-teaming tool Brute Ratel and the recently discovered Manjusaka and Alchimist attack frameworks. TargetingAttackers targeted the education sector the most of any vertical this quarter, closely followed by the financial services, government, and energy sectors, respectively. For the first time since Q4 2021, telecommunications was not the top-targeted vertical. While the reason for the education sector being more frequently targeted this quarter is unknown, this is a popular time]]> 2022-10-25T08:00:00+00:00 http://blog.talosintelligence.com/2022/10/quarterly-report-incident-response.html www.secnews.physaphae.fr/article.php?IdArticle=7672144 False Ransomware,Tool,Vulnerability,Threat,Guideline None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in Abode Systems home security kit could allow attacker to take over cameras, remotely disable them Matt Wiseman of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered several vulnerabilities in the Abode Systems iota All-In-One Security Kit. This kit includes a main security camera and hub that can alert users of unwanted movement in their homes. It also includes several motion sensors that can be attached to windows and doors.  The devices communicate with the user via a website or app on their mobile device and can connect to smart hubs like Google Home, Amazon Alexa and Apple Homekit. The vulnerabilities Talos discovered could lead to a variety of conditions, including providing attackers with the ability to change users' login passwords, inject code onto the device, manipulate sensitive device configurations, and cause the system to shut down. The devices contain several format string injection vulnerabilities in various functions of its software that could lead to memory corruption, information disclosure and a denial of service. An attacker could send a malicious XML payload to trigger these vulnerabilities. TALOS-2022-1585 (CVE-2022-35884 - CVE-2022-35887) TALOS-2022-1584 (CVE-2022-33938) TALOS-2022-1581 (CVE-2022-35874 - CVE-2022-35877) TALOS-2022-1568 (CVE-2022-33204 – CVE-2022-33207) TALOS-2022-1561 (CVE-2022-29520) TALOS-2022-1558 (CVE-2022-33189) There are four other vulnerabilities - TALOS-2022-1567 (CVE-2022-27804), TALOS-2022-1566 (CVE-2022-29472), TALOS-2022-1563 (CVE-2022-32586) and TALOS-2022-1562 (CVE-2022-30603) - that can also lead to code execution, though it requires the adversary to send a specially crafted HTTP request, rather than XML.  TALOS-2022-1559 (CVE-2022-33192 - CVE-2022-33195), TALOS-2022-1558 (CVE-2022-33189), TALOS-2022-1557 (CVE-2022-30541) and ]]> 2022-10-20T09:30:53+00:00 http://blog.talosintelligence.com/2022/10/vuln-spotlight-abode-.html www.secnews.physaphae.fr/article.php?IdArticle=7584736 False Vulnerability,Guideline None None CISCO Talos - Cisco Research blog The benefits of taking an intent-based approach to detecting Business Email Compromise By Abhishek Singh.BEC is a multi-stage attack. Adversaries first identify targets, then they establish rapport with the victim before exploiting them for whatever their end goal is. In the case of BEC, a threat actor can impersonate any employee in the organization to trick targets.  A policy that checks for authorized email addresses of the sender can prevent BEC attacks. However, scaling the approach for every employee in a large organization is a challenge.  Building an executive profile based on email analysis using a machine learning model and scanning emails against that profile will detect BEC. Data collection for building and training machine learning algorithms can take time, though, opening a window of opportunity for threat actors to exploit.  Detection of exploitation techniques such as lookalike domains and any differences in the email addresses in the "From" and "Reply-to" fields can also detect BEC messages. However, the final verdict cannot account for the threat actor's intent.  The intent-based approach detects BEC and then classifies it into the type of scam. It catches BEC messages, irrespective of whether a threat actor is impersonating a C-level executive or any employee in an organization. Classification based on the type of scam can help identify which segment of an organization was targeted and which employees were being impersonated by the threat actor. The additional information will further assist in better designing preventive features to stop BEC. Business email compromise (BEC) is one of the most financially damaging online crimes. As per the internet crime 221 report, the total loss in 2021 due to BEC is around 2.4 billion dollars. Since 2013, BEC has resulted in a 43 billion dollars loss. The report defines BEC as a scam targeting businesses (not individuals) working with foreign suppliers and companies regularly performing wire transfer payments. Fraudsters carry out these sophisticated scams to conduct the unauthorized transfer of funds. This introduces the challenge of how to detect and block these campaigns as they continue to compromise organizations successfully. There are a variety of approaches to identifying BEC email messages, such as using policy to allow emails from authorized email addresses, detecting exploitation techniques used by threat actors, building profiles by analysis of emails, and validating against the profile to detect BEC. These approaches have a variety of limitations or shortcomings. Cisco Talos is taking a different approach and using an intent-based model to identify and block BEC messages. Before we get too deep into the intent-based model, take a deeper look at the commonly used approaches to block BEC from the simplistic through machine learning (ML) approaches. Policy-based detection The first place to start is with policy-based detection as it is one of the most common and simplistic approaches to blocking BEC campaigns. Let's start by looking at an example of a BEC email. ]]> 2022-10-18T08:41:18+00:00 http://blog.talosintelligence.com/2022/10/the-benefits-of-taking-intent-based.html www.secnews.physaphae.fr/article.php?IdArticle=7540074 False Threat,Medical,Cloud APT 38,APT 19,APT 29,APT 10,APT 37,Uber,APT 15,Yahoo None CISCO Talos - Cisco Research blog Video: How propaganda can spread on social media via memes, fake news its work in spotting and defeating fake news, disinformation and misinformation. And state-sponsored actors, unwitting social media users and even direct government agencies have played a part in spreading fake news during Russia's invasion of Ukraine. In this video, we'll look at a few examples of what essentially equates to propaganda spreading across social media, leading to false stories, headlines, posts and the continued degradation of the meaning of "truth."]]> 2022-10-14T09:02:11+00:00 http://blog.talosintelligence.com/2022/10/video-how-propaganda-can-spread-on.html www.secnews.physaphae.fr/article.php?IdArticle=7456865 False Guideline None None CISCO Talos - Cisco Research blog Alchimist: A new attack framework in Chinese for Mac, Linux and Windows By Chetan Raghuprasad, Asheer Malhotra and Vitor Ventura, with contributions from Matt Thaxton.Cisco Talos discovered a new attack framework including a command and control (C2) tool called "Alchimist" and a new malware "Insekt" with remote administration capabilities.The Alchimist has a web interface in Simplified Chinese with remote administration features.The attack framework is designed to target Windows, Linux and Mac machines. Alchimist and Insekt binaries are implemented in GoLang.This campaign consists of additional bespoke tools such as a MacOS exploitation tool, a custom backdoor and multiple off-the-shelf tools such as reverse proxies. Cisco Talos has discovered a new single-file command and control (C2) framework the authors call "Alchimist [sic]." Talos researchers found this C2 on a server that had a file listing active on the root directory along with a set of post-exploitation tools.Cisco Talos assesses with moderate-high confidence that this framework is being used in the wild. "Alchimist" is a 64-bit Linux executable written in GoLang and packed with assets including resources for the web interface and Insekt RAT payloads compiled for Windows and Linux. Insekt RAT, a new trojan Cisco Talos discovered, is Alchimist's beacon implant written in GoLang and has a variety of remote access capabilities that can be instrumented by the Alchimist C2 server.Alchimist C2 has a web interface written in Simplified Chinese and can generate a configured payload, establish remote sessions, deploy payload to the remote machines, capture screenshots, perform remote shellcode execution and run arbitrary commands. Among the remaining tools, Cisco Talos found a Mach-O dropper embedded with an exploit to target a known vulnerability CVE-2021-4034, a privilege escalation issue in polkit's pkexec utility, and a Mach-O bind shell backdoor. The Qualys Research Team discovered CVE-2021-4034 in November 2021, and in January 2022, the U.S.'s National Security Agency Cybersecurity Director warned that the vulnerability was being exploited in the wild. The server also contained dual-use tools like psexec and netcat, along with a scanning tool called "fscan," which the author defines as an "intranet scanning tool," essentially all the necessary tools for lateral movement. Alchimist framework The attack framework we discovered during the course of this research consists of a standalone C2 server called "Alchimist" and its corresponding implants the authors call the "Insekt" RAT family.Alchimist isn't the first self-contained framework we've discovered recently, with Manjusaka being another single file-based C2 framework disclosed by Talos recently. Both follow the same design philosophy, albeit implemented in different ways, to the point where they both seem to have the same list of requirements despite being implemented by different programmers. However, Manjusaka and Alchimist have virtually the same set of feat]]> 2022-10-13T08:00:07+00:00 http://blog.talosintelligence.com/2022/10/alchimist-offensive-framework.html www.secnews.physaphae.fr/article.php?IdArticle=7433830 False Malware,Tool,Vulnerability,Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Multiple issues in Robustel R1510 cellular router could lead to code execution, denial of service Francesco Benvenuto of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered nine vulnerabilities in the Robustel R1510 industrial cellular router, several of which could allow an adversary to inject operating system code remotely. The Robustel R1510 router is a dual-ethernet port wireless router that shares 3G and 4G wireless signals for use in industrial and internet-of-things environments. The router includes the use of open VPN tunneling, a cloud management platform to manage other devices and routers and different safeguards to manage data caps. Talos discovered five operating system command injection vulnerabilities in the router that an adversary could trigger by sending the targeted device a specially crafted network request. All these vulnerabilities have a CVSS severity score of 9.1 out of 10: TALOS-2022-1578 (CVE-2022-34850) TALOS-2022-1577 (CVE-2022-33150) TALOS-2022-1576 (CVE-2022-32765) TALOS-2022-1573 (CVE-2022-33325 - CVE-2022-33329) TALOS-2022-1572 (CVE-2022-33312 - CVE-2022-33314) TALOS-2022-1580 (CVE-2022-34845) and TALOS-2022-1570 (CVE-2022-32585) can also lead to arbitrary code execution, though this vulnerability exists when a user logs in as an administrator. An attacker could also send a specially crafted network request to trigger TALOS-2022-1575 (CVE-2022-35261 - CVE-2022-35271), a denial-of-service vulnerability in the device's web server hashFirst functionality that could allow an adversary to crash the web server.  Another vulnerability, TALOS-2022-1571 (CVE-2022-28127) also exists in the web server on the device, but instead could be exploited to remove arbitrary files, even though a path traversal check is in place. Cisco Talos worked with Robustel to ensure that these issues are resolved and an update is available for affected customers, all in adherence to Cisco's vulnerability disclosure policy. ]]> 2022-10-12T15:33:07+00:00 http://blog.talosintelligence.com/2022/10/vuln-spotlight-robustel-router.html www.secnews.physaphae.fr/article.php?IdArticle=7418472 False Vulnerability,Guideline None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for October 2022 - Snort rules and prominent vulnerabilities By Jon Munshaw and Vanja Svajcer.Microsoft released its monthly security update Tuesday, disclosing 83 vulnerabilities across the company's hardware and software line, including seven critical issues in Windows' point-to-point tunneling protocol. October's security update features 11 critical vulnerabilities, with the remainder being “important.”  One of the most notable vulnerabilities Microsoft fixed this month is CVE-2022-41038, a remote code execution issue in Microsoft SharePoint. There are several other SharePoint vulnerabilities included in this month's Patch Tuesday, though this seems the most severe, as Microsoft continues it to be “more likely” to be exploited.  An attacker must be authenticated to the target site with the correct permissions to use manage lists in SharePoint to exploit this vulnerability, and eventually gain the ability to execute remote code on the SharePoint server.  CVE-2022-37968, an elevation of privilege vulnerability in Azure Arc Connect, has the highest severity score out of all the vulnerabilities Microsoft fixed this month - a maximum 10 out of 10. Successful exploitation of this vulnerability, which affects the cluster connect feature of Azure Arc-enabled Kubernetes clusters, could allow an unauthenticated user to elevate their privileges as cluster admins and potentially gain control over the Kubernetes cluster. CVE-2022-37976 and CVE-2022-37979 are also critical elevation of privilege vulnerabilities in Windows Active Directory and Hyper-V, respectively.  The Windows' point-to-point tunneling protocol, which is a network protocol used to create VPN tunnels between public networks, contains eight vulnerabilities that Microsoft disclosed Tuesday, seven of which are rated “critical” severity: CVE-2022-22035CVE-2022-24504 CVE-2022-30198 CVE-2022-33634 CVE-2022-38000 CVE-2022-38047 CVE-2022-41081 CVE-2022-38000 is the most serious among the group wit]]> 2022-10-11T14:11:23+00:00 http://blog.talosintelligence.com/2022/10/microsoft-patch-tuesday-for-october.html www.secnews.physaphae.fr/article.php?IdArticle=7396114 False Vulnerability Uber None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Data deserialization in VMware vCenter could lead to remote code execution Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered an exploitable data deserialization vulnerability in the VMware vCenter server platform.  VMware is one of the most popular virtual machine solutions currently available, and its vCenter software allows users to manage an entire environment of VMs. The vulnerability Talos discovered is a post-authentication Java deserialization issue that could corrupt the software in a way that could allow an attacker to exploit arbitrary code on the target machine. TALOS-2022-1587 (CVE-2022-31680) is triggered if an adversary sends a specially crafted HTTP request to a targeted machine. The attacker would first have to log in with legitimate credentials to vCenter to be successful. Cisco Talos worked with VMware to ensure that this issue is resolved and an update is available for affected customers, all in adherence to Cisco's vulnerability disclosure policy. Users are encouraged to update these affected products as soon as possible: VMware vCenter Server, version 6.5, update 3t. Talos tested and confirmed this version of vCenter could be exploited by this vulnerability. The following Snort rules will detect exploitation attempts against this vulnerability: 60433. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org. ]]> 2022-10-10T10:23:17+00:00 http://blog.talosintelligence.com/2022/10/vuln-spotlight-vcenter-.html www.secnews.physaphae.fr/article.php?IdArticle=7383086 False Vulnerability None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Issue in Hancom Office 2020 could lead to code execution Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered an exploitable memory corruption vulnerability in Hancom Office 2020.  Hancom Office is a popular software collection among South Korean users that offers similar products to Microsoft Office, such as word processing and spreadsheet creation and management.  TALOS-2022-1574 (CVE-2022-33896) exists in the way the Hword word processing software processes XML files. An attacker could exploit this vulnerability by tricking the user into opening a specially crafted file, triggering a memory corruption error on the software and potentially leading to remote code execution on the targeted machine.   Cisco Talos worked with Hancom to ensure that this issue is resolved and an update is available for affected customers, all in adherence to Cisco's vulnerability disclosure policyUsers are encouraged to update these affected products as soon as possible: Hancom Office 2020, version 11.0.0.5357. Talos tested and confirmed this version of Hancom Office could be exploited by this vulnerability. The following Snort rules will detect exploitation attempts against this vulnerability: 60254 and 60255. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org. ]]> 2022-10-07T10:11:53+00:00 http://blog.talosintelligence.com/2022/10/vulnerability-spotlight-issue-in-hancom.html www.secnews.physaphae.fr/article.php?IdArticle=7335497 False Vulnerability,Guideline None None CISCO Talos - Cisco Research blog Developer account body snatchers pose risks to the software supply chain By Jaeson Schultz.Over the past several years, high-profile software supply chain attacks have increased in frequency. These attacks can be difficult to detect and source code repositories became a key focus of this research.Developer account takeovers present a substantial risk to the software supply chain because attackers who successfully compromise a developer account could conceal malicious code in software packages used by others.Talos analyzed several of the major software repositories to assess the level of developer account security, focusing specifically on whether developer accounts could be recovered by re-registering expired domain names and triggering password resets.Many software repositories have already begun taking steps to enhance the security of developer accounts. Talos has identified additional areas where the security of developer accounts could be improved. Talos worked with vulnerable repositories to resolve issues that we found. Software supply chain attacks, once the exclusive province of sophisticated state-sponsored attackers, have been gaining popularity recently among a broader range of cyber criminals. Attackers everywhere have realized that software supply chain attacks can be very effective, and can result in a large number of compromised victims. Software supply chain attacks more than tripled in 2021 when compared with 2020. Why are software supply chain attacks so effective? Organizations that possess solid cyber defenses may be difficult to attack directly. However, these same organizations are likely vulnerable to a software supply chain attack because they still regularly run/build software obtained from vendors who are trusted.Rather than attacking an entire software repository itself, or identifying an unpatched vulnerability in a software package, compromising the software supply chain can be as simple as attacking the accounts of the package developers and maintainers. Most software repositories track the identities of their software developers using those developers' email addresses. If a cybercriminal somehow gains access to a developer's email account, the attacker can theoretically generate password reset emails at these software repositories a]]> 2022-10-04T08:51:05+00:00 http://blog.talosintelligence.com/2022/10/developer-account-body-snatchers-pose.html www.secnews.physaphae.fr/article.php?IdArticle=7295714 False Malware,Vulnerability None None CISCO Talos - Cisco Research blog Researcher Spotlight: Globetrotting with Yuri Kramarz Black Hat security conference and critical national infrastructure. He's no stranger to cybersecurity on the big stage, but he still enjoys working with companies and organizations of all sizes in all parts of the world. “What really excites me is making companies more secure,” he said in a recent interview. “That comes down to a couple things, but it's really about putting a few solutions together at first and then hearing the customer's feedback and building from there.” Yuri is a senior incident response consultant with Cisco Talos Incident Response (CTIR) currently based in Qatar. He walks customers through various exercises, incident response plan creation, recovery in the event of a cyber attack and much more under the suite of offerings CTIR has. Since moving from the UK to Qatar, he is mainly focused on preparing various local entities in Qatar for the World Cup slated to begin in November. Qatar estimates more than 1.7 million people will visit the country for the international soccer tournament, averaging 500,000 per day at various stadiums and event venues. For reference, the World Bank estimates that 2.9 million people currently live in Qatar. This means the businesses and networks in the country will face more traffic than ever and will no doubt draw the attention of bad actors looking to make a statement or make money off ransomware attacks. “You have completely different angles in preparing different customers for defense during major global events depending on their role, technology and function,” Kramarz said.  In every major event, there were different devices, systems and networks interconnected to provide visitors and fans with various hospitality facilities that could be targeted in a cyber attack. Any country participating in the event needs to make sure they understand the risks associated with it and consider various adversary activities that might play out to secure these facilities. Kramarz has worked in several different geographic areas in his roughly 12-year security career, including Asia, the Middle East, Europe and the U.S. He has experience leading red team engagements (simulating attacks against targets to find potential security weaknesses) in traditional IT and ICS/OT environments, vulnerability research and blue team defense. The incident response field has been the perfect place for him to put all these skills to use. He joined Portcullis Securit]]> 2022-10-03T12:40:56+00:00 http://blog.talosintelligence.com/2022/10/researcher-spotlight-globetrotting-with.html www.secnews.physaphae.fr/article.php?IdArticle=7292967 False Ransomware,Hack,Vulnerability,Guideline None None CISCO Talos - Cisco Research blog Threat Advisory: Microsoft warns of actively exploited vulnerabilities in Exchange Server Cisco Talos has released new coverage to detect and prevent the exploitation of two recently disclosed vulnerabilities collectively referred to as "ProxyNotShell," affecting Microsoft Exchange Servers 2013, 2016 and 2019. One of these vulnerabilities could allow an attacker to execute remote code on the targeted server. Limited exploitation of these vulnerabilities in the wild has been reported. CVE-2022-41040 is a Server Side Request Forgery (SSRF) vulnerability, while CVE-2022-41082 enables Remote Code Execution (RCE) when PowerShell is accessible to the attackers. While no fixes or patches are available yet, Microsoft has provided mitigations for on-premises Microsoft Exchange users on Sept. 29, 2022. Even organizations that use Exchange Online may still be affected if they run a hybrid server. Cisco Talos is closely monitoring the recent reports of exploitation attempts against these vulnerabilities and strongly recommends users implement mitigation steps while waiting for security patches for these vulnerabilities. Exchange vulnerabilities have become increasingly popular with threat actors, as they can provide initial access to network environments and are often used to facilitate more effective phishing and malspam campaigns. The Hafnium threat actor exploited several zero-day vulnerabilities in Exchange Server in 2021 to deliver ransomware, and Cisco Talos Incident Response reported that the exploitation of Exchange Server issues was one of the four attacks they saw most often last year.Vulnerability details and ongoing exploitationExploit requests for these vulnerabilities look similar to previously discovered ProxyShell exploitation attempts:autodiscover/autodiscover.json?@evil.com/&Email=autodiscover/autodiscover.json%3f@evil.comSuccessful exploitation of the vulnerabilities observed in the wild leads to preliminary information-gathering operations and the persistence of WebShells for continued access to compromised servers. Open-source reporting indicates that webShells such as Antsword, a popular Chinese language-based open-source webshell, SharPyShell an ASP.NET-based webshell and China Chopper have been deployed on compromised systems consisting of the following artifacts:C:\inetpub\wwwroot\aspnet_client\Xml.ashxC:\Program Files\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\owa\auth\errorEE.aspxC:\Program Files\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\owa\auth\pxh4HG1v.ashxC:\Program Files\Microsoft\Exchange Server\V15]]> 2022-09-30T17:16:47+00:00 http://blog.talosintelligence.com/2022/09/threat-advisory-exchange-server-vulns.html www.secnews.physaphae.fr/article.php?IdArticle=7232588 False Malware,Threat,Guideline None None CISCO Talos - Cisco Research blog New campaign uses government, union-themed lures to deliver Cobalt Strike beacons By Chetan Raghuprasad and Vanja Svajcer. Cisco Talos discovered a malicious campaign in August 2022 delivering Cobalt Strike beacons that could be used in later, follow-on attacks.Lure themes in the phishing documents in this campaign are related to the job details of a government organization in the United States and a trade union in New Zealand. The attack involves a multistage and modular infection chain with fileless, malicious scripts. Cisco Talos recently discovered a malicious campaign with a modularised attack technique to deliver Cobalt Strike beacons on infected endpoints. The initial vector of this attack is a phishing email with a malicious Microsoft Word document attachment containing an exploit that attempts to exploit the vulnerability CVE-2017-0199, a remote code execution issue in Microsoft Office. If a victim opens the maldoc, it downloads a malicious Word document template hosted on an attacker-controlled Bitbucket repository. Talos discovered two attack methodologies employed by the attacker in this campaign: One in which the downloaded DOTM template executes an embedded malicious Visual Basic script, which leads to the generation and execution of other obfuscated VB and PowerShell scripts and another that involves the malicious VB downloading and running a Windows executable that executes malicious PowerShell commands to download and implant the payload. The payload discovered is a leaked version of a Cobalt Strike beacon. The beacon configuration contains commands to perform targeted process injection of arbitrary binaries and has a high reputation domain configured, exhibiting the redirection technique to masquerade the beacon's traffic. Although the payload discovered in this campaign is a Cobalt Strike beacon, Talos also observed usage of the Redline information-stealer and Amadey botnet executables as payloads. This campaign is a typical example of a threat actor using the technique of generating and executing malicious scripts in the victim's system memory. Defenders should implement behavioral protection capabilities in the organization's defense to effectively protect them against fileless threats. Organizations should be constantly vigilant on the Cobalt Strike beacons and implement layered defense capabilities to thwart the attacker's attempts in the earlier stage of the attack's infection chain. Initial vectorThe initial infection email is themed to entice the recipient to review the attached Word document and provide some of their personal information. Initial malicious email message.The maldocs have lures containing text related to the collection of personally identifiable information (PII) which is used to determ]]> 2022-09-28T08:18:45+00:00 http://blog.talosintelligence.com/2022/09/new-campaign-uses-government-union.html www.secnews.physaphae.fr/article.php?IdArticle=7178779 False Malware,Vulnerability,Threat,Guideline None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in popular library affect Unix-based devices Lilith >_> of Cisco Talos discovered these vulnerabilities. Cisco Talos recently discovered a memory corruption vulnerability in the uClibC library that could affect any Unix-based devices that use this library. uClibC and uClibC-ng are lightweight replacements for the popular gLibc library, which is the GNU Project's implementation of the C standard library. TALOS-2022-1517 (CVE-2022-29503 - CVE-2022-29504) is a memory corruption vulnerability in uClibC and uClibc-ng that can occur if a malicious user repeatedly creates threads. Many embedded devices utilize this library, but Talos specifically confirmed that the Anker Eufy Homebase 2, version 2.1.8.8h, is affected by this vulnerability. Anker confirmed that they've patched for this issue. However, uClibC has not issued an official fix, though we are disclosing this vulnerability in accordance with Cisco's 90-day vulnerability disclosure policy. Talos tested and confirmed the following software is affected by these vulnerabilities: uClibC, version 0.9.33.2 and uClibC-ng, version 1.0.40. ]]> 2022-09-22T10:01:26+00:00 http://blog.talosintelligence.com/2022/09/vuln-spotlight-uclibc-ng.html www.secnews.physaphae.fr/article.php?IdArticle=7062498 False Vulnerability None 2.0000000000000000 CISCO Talos - Cisco Research blog Insider Threats: Your employees are being used against you By Nick Biasini.Insider threats are becoming an increasingly common part of the attack chain, with malicious insiders and unwitting assets playing key roles in incidents over the past year.Social engineering should be part of any organization's policies and procedures and a key area for user education in 2023 and beyond.Mitigating these types of risks include education, user/access control, and ensuring proper processes and procedures are in place when and if employees leave the organization.Traditionally, attackers try to leverage vulnerabilities to deliver malicious payloads via exploitation. But more recently, that activity has shifted away from exploitation and consistently moved closer and closer to the user. Initially, threat actors loved to trick users into enabling malicious macros in Microsoft Office documents, but as Microsoft moves to blunt the effectiveness of macros, adversaries are always going to move to the next avenue to generate malicious revenue. This is where insider threats come into play. There are two broad categories of insider threats: the malicious insider and the unwitting asset. Both present unique challenges in detection and prevention for defenders and organizations' IT admins. Malicious InsidersThere are a variety of reasons a user may choose to become a malicious insider, and unfortunately, many of them are occurring today. Let's start with the most obvious: financial distress. When a user has a lot of debt, selling the ability to infect their employer can be a tempting avenue. We've seen examples of users trying to sell access into their employers' networks for more than a decade, having spotted them on dark web forums. The current climate is, unfortunately, ripe for this type of abuse. The economy is on the brink of a recession, inflation continues to spike, and the cryptocurrency markets have lost as much as 70% of their peak value from late 2021. Combined, these factors can create an environment where employees are susceptible to coercion, putting the enterprise at risk.Financial distress is a serious concern for employee compromise as evidenced by the fact that nearly half of the security clearance denials in the U.S. have to do with financial considerations. It is also a common factor in clearances being revoked, clearly demonstrating the risk it can present. This financial distress can also be leveraged by adversaries to force users to take actions they would not have otherwise by threatening to expose the issues publicly.Financial distress isn't the only factor that could drive an employee to turn against their employer. In today's highly polarized political climate, the risk that an employee may take malicious action against their employer due to a perceived political stance from the employer is ever present. These could be spurred on by the action or inaction organizations take related to a piece of legislation or other societal issues. ]]> 2022-09-22T07:58:29+00:00 http://blog.talosintelligence.com/2022/09/insider-threats-increasing.html www.secnews.physaphae.fr/article.php?IdArticle=7060782 False Threat None None CISCO Talos - Cisco Research blog Our current world, health care apps and your personal data By Ashlee Benge and Jonathan Munshaw.After the recent Supreme Court ruling in Dobbs v. Jackson Women's Health Organization, the use of third-party apps to track health care has recently come under additional scrutiny for privacy implications.Many of these apps have privacy policies that state they are authorized to share data with law enforcement investigations, though the exact application of those policies is unclear.The use of health-tracking apps and wearable tech is rising, raising questions around the application of the 14th Amendment's equal protection clause and HIPPA rules as to who can and cannot collect and share health care information. It's become second nature for many users to blindly click on the “Accept” button on an app or website's privacy policy and terms of service. But in the wake of the U.S. Supreme Court's ruling in Dobbs v. Jackson Women's Health Organization that reversed previous interpretations of the 14th amendment on privacy from Roe v. Wade, users of sensitive health apps need to be mindful of the kinds of data these apps keep, sell and share. It is a privacy ruling at its core, with the decision raising concerns about the government's ability to access our personal and private information. Today's digital surveillance infrastructures, coupled with new and existing laws, digital health histories are nearly impossible to protect. The use of health data tracking applications and wearable tech has rapidly increased in the past several years. These apps track a hodgepodge of data, from heart rate and blood oxygen level, to when and where a user works out, to what a user eats. Some of these fitness applications even track more sensitive data like sexual activity, body composition using progress photos, and sleep cycles. Blood glucose levels can be tracked continuously using a wearable sensor and app rather than routinely timed finger pricks. Privacy policies are only so privateAlthough there are stringent laws regarding the use of personally identifiable information tied to health records, there are grey areas in the way this legislation applies to the data collected by healthcare apps. Additionally, if the servers of these apps are breached or otherwise compromised, there may be no liability to the app. This breached data is often sold on readily accessible marketplaces. But even if there's no breach or illicit use of this information, apps and their creators can still learn a great deal about users. When health data collected by these apps is combined with other datasets like location data and what is available on social media profiles, advertisers, law enforcement agencies and more can craft a shockingly comprehensive view into the user's life. In some instances, this inferred profile can be used for nefarious purposes, even resulting in criminal charges. Even prior to recent rulings, police in Nebraska ]]> 2022-09-20T10:00:00+00:00 http://blog.talosintelligence.com/2022/09/our-current-world-health-care-apps-and.html www.secnews.physaphae.fr/article.php?IdArticle=7016713 False Guideline None None CISCO Talos - Cisco Research blog Gamaredon APT targets Ukrainian government agencies in new campaign By Asheer Malhotra and Guilherme Venere.Cisco Talos recently identified a new, ongoing campaign attributed to the Russia-linked Gamaredon APT that infects Ukrainian users with information-stealing malware.The adversary is using phishing documents containing lures related to the Russian invasion of Ukraine.LNK files, PowerShell and VBScript enable initial access, while malicious binaries are deployed in the post-infection phase.We discovered the use of a custom-made information stealer implant that can exfiltrate victim files of interest and deploy additional payloads as directed by the attackers. Cisco Talos discovered Gamaredon APT activity targeting users in Ukraine with malicious LNK files distributed in RAR archives. The campaign, part of an ongoing espionage operation observed as recently as August 2022, aims to deliver information-stealing malware to Ukrainian victim machines and makes heavy use of multiple modular PowerShell and VBScript (VBS) scripts as part of the infection chain. The infostealer is a dual-purpose malware that includes capabilities for exfiltrating specific file types and deploying additional binary and script-based payloads on an infected endpoint. The adversary uses phishing emails to deliver Microsoft Office documents containing remote templates with malicious VBScript macros. These macros download and open RAR archives containing LNK files that subsequently download and activate the next-stage payload on the infected endpoint. We observed considerable overlap between the tactics, techniques and procedures (TTPs), malware artifacts and infrastructure used in this campaign and those used in a series of attacks the Ukraine Computer Emergency Response Team (CERT-UA) recently attributed to Gamaredon.We also observed intrusion attempts against several Ukrainian entities. Based on these observations and Gamaredon's operational history of almost exclusively targeting Ukraine, we assess that this latest campaign is almost certainly directly targeting entities based in Ukraine.Attack ChainInitial AccessGamaredon APT actors likely gained initial footholds into targeted networks through malicious Microsoft Office documents distributed via email. This is consistent with spear-phishing techniques common to this APT. Malicious VBS macros concealed within remote templates execute when the user opens the document. The macros download RAR archives containing LNK files. The naming convention of the RAR archives in this campaign follows a similar pattern:31.07.2022.rar04.08.2022.rar ]]> 2022-09-15T08:02:21+00:00 http://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html www.secnews.physaphae.fr/article.php?IdArticle=6908845 False Malware,Threat None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for September 2022 - Snort rules and prominent vulnerabilities By Jon Munshaw and Asheer Malhotra. Microsoft released its monthly security update Tuesday, disclosing 64 vulnerabilities across the company's hardware and software line, a sharp decline from the record number of issues Microsoft disclosed last month. September's security update features five critical vulnerabilities, 10 fewer than were included in last month's Patch Tuesday. There are two moderate-severity vulnerabilities in this release and a low-security issue that's already been patched as a part of a recent Google Chromium update. The remainder is considered “important.” The most serious vulnerability exists in several versions of Windows Server and Windows 10 that could allow an attacker to gain the ability to execute remote code (RCE) by sending a singular, specially crafted IPv6 packet to a Windows node where IPSec is enabled. CVE-2022-34718 only affects instances that have IPSec enabled. This vulnerability has a severity score of 9.8 out of 10 and is considered “more likely” to be exploited by Microsoft. Microsoft disclosed one vulnerability that's being actively exploited in the wild - CVE-2022-37969. Microsoft's advisory states this vulnerability is already circulating in the wild and could allow an attacker to gain SYSTEM-level privileges by exploiting the Windows Common Log File System Driver. The adversary must first have the access to the targeted system and then run specific code, though no user interaction is required.CVE-2022-34721 and CVE-2022-34722 also have severity scores of 9.8, though they are “less likely” to be exploited, according to Microsoft. These are remote code execution vulnerabilities in the Windows Internet Key Exchange protocol that could be triggered if an attacker sends a specially crafted IP packet.Two other critical vulnerabilities, CVE-2022-35805 and CVE-2022-34700 exist in on-premises instances of Microsoft Dynamics 365. An authenticated attacker could exploit these vulnerabilities to run a specially crafted trusted solution package and execute arbitrary SQL commands. The attacker could escalate their privileges further and execute commands as the database owner. Talos would also like to highlight five important vulnerabilities that Microsoft considers to be “more likely” to be exploited:  CVE-2022-37957 - Windows Kernel Elevation of Privilege]]> 2022-09-13T14:24:22+00:00 http://blog.talosintelligence.com/2022/09/microsoft-patch-tuesday-for-september.html www.secnews.physaphae.fr/article.php?IdArticle=6872564 False Vulnerability None None CISCO Talos - Cisco Research blog Lazarus and the tale of three RATs By Jung soo An, Asheer Malhotra and Vitor Ventura.Cisco Talos has been tracking a new campaign operated by the Lazarus APT group, attributed to North Korea by the United States government. This campaign involved the exploitation of vulnerabilities in VMWare Horizon to gain an initial foothold into targeted organizations.Targeted organizations include energy providers from around the world, including those headquartered in the United States, Canada and Japan. The campaign is meant to infiltrate organizations around the world for establishing long term access and subsequently exfiltrating data of interest to the adversary's nation-state.Talos has discovered the use of two known families of malware in these intrusions - VSingle and YamaBot.Talos has also discovered the use of a recently disclosed implant we're calling "MagicRAT" in this campaign. IntroductionCisco Talos observed North Korean state-sponsored APT Lazarus Group conducting malicious activity between February and July 2022. Lazarus has been previously attributed to the North Korean government by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The entry vectors involve the successful exploitation of vulnerabilities in VMWare products to establish initial footholds into enterprise networks, followed by the deployment of the group's custom malware implants, VSingle and YamaBot. In addition to these known malware families, we have also discovered the use of a previously unknown malware implant we're calling "MagicRAT."This campaign was previously partially disclosed by other security firms, but our findings reveal more details about the adversary's modus operandi. We have also observed an overlap of command and control (C2) and payload-hosting infrastructure between our findings and the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) June advisory that detailed continued attempts from threat actors to compromise vulnerable VMWare Horizon servers.In this research, we illustrate Lazarus Group's post-exploitation tactics, techniques and procedures (TTPs) to establish a foothold, perform initial reconnaissance, deploy bespoke malware and move laterally across infected enterprises. We also provide details about the activities performed by the attackers when the VSingle backdoor is instrumented on the infected endpoints.In this campaign, Lazarus was primarily targeting energy companies in Canada, the U.S. and Japan. The main goal of these attacks was likely to establish long-term access into victim networks to conduct espionage operations in support of North Korean govern]]> 2022-09-08T08:39:42+00:00 http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html www.secnews.physaphae.fr/article.php?IdArticle=6785115 False Malware,Tool,Vulnerability,Threat,Medical APT 38 None CISCO Talos - Cisco Research blog Talos EMEA Monthly Threat Update: How do you know if cyber insurance is right for you? here.]]> 2022-09-08T05:00:00+00:00 http://blog.talosintelligence.com/2022/09/talos-emea-monthly-threat-update-how-do.html www.secnews.physaphae.fr/article.php?IdArticle=6782963 False Threat None None CISCO Talos - Cisco Research blog Multiple ransomware data leak sites experience DDoS attacks, facing intermittent outages and connectivity issues By Azim Khodjibaev, Colin Grady, Paul Eubanks.Since Aug. 20, 2022, Cisco Talos has been monitoring suspected distributed denial-of-service (DDoS) attacks resulting in intermittent downtime and outages affecting several ransomware-as-a-service (RaaS) data leak sites. While the source and origin of this activity remain unknown, this appears to be a concentrated effort against RaaS leak sites to disrupt their efforts to announce and post new victim information.Actors' responses have varied, with LockBit and ALPHV implementing new measures to counteract DDoS attacks against their sites while other groups like Quantum have simply resorted to redirecting web traffic elsewhere. LockBit also appears to have co-opted this technique by advertising that they are now adding DDoS as an extortion tactic in addition to encrypting and leaking data.RaaS leak sites experience intermittent outagesIn late August, Talos became aware of several prominent ransomware operations, such as ALPHV (also referred to as BlackCat) and LockBit, experiencing suspected DDoS attacks against their public data leak sites. These leak sites are typically hosted on Tor hidden services where, in a tactic known as double extortion, RaaS affiliates post victim information if the ransom demand is not met. On Aug. 26, we also observed at least seven more RaaS leak sites for LV, Hive, Everest, BianLian, Yanluowang, Snatch and Lorenz become inaccessible and go offline intermittently and/or experience slow traffic. Security researchers have also identified additional RaaS leak sites for Ragnar Locker and Vice Society which may have also been affected by this activity. However, we have only verified the Ragnar Locker claim at this time, as their leak site continues to experience outages. At the time of analysis, many of the aforementioned groups are still affected by connectivity issues and continue to face a variety of intermittent outages to their data leak sites, including frequent disconnects and unreachable hosts, suggesting that this is part of a sustained effort to thwart updates to those sites. On Aug. 20, a LockBit representative, "LockBitSupp", reported that nearly 1,000 servers were targeting the LockBit data leak sites, with nearly 400 requests per second. After reporting that their leak sites became unavailable due to a DDoS attack, LockBit provided screenshots alleging that the attack began as soon as they started to publish data to their leak site for Entrust, a digital security company LockBit targeted in July. ]]> 2022-09-07T11:00:19+00:00 http://blog.talosintelligence.com/2022/09/ransomware-leaksite-ddos.html www.secnews.physaphae.fr/article.php?IdArticle=6769011 False Ransomware None None CISCO Talos - Cisco Research blog MagicRAT: Lazarus\' latest gateway into victim networks By Jung soo An, Asheer Malhotra and Vitor Ventura.Cisco Talos has discovered a new remote access trojan (RAT) we're calling "MagicRAT," developed and operated by the Lazarus APT group, which the U.S. government believes is a North Korean state-sponsored actor.Lazarus deployed MagicRAT after the successful exploitation of vulnerabilities in VMWare Horizon platforms.We've also found links between MagicRAT and another RAT known as "TigerRAT," disclosed and attributed to Lazarus by the Korean Internet & Security Agency (KISA) recently.TigerRAT has evolved over the past year to include new functionalities that we illustrate in this blog. Executive SummaryCisco Talos has discovered a new remote access trojan (RAT), which we are calling "MagicRAT," that we are attributing with moderate to high confidence to the Lazarus threat actor, a state-sponsored APT attributed to North Korea by the U.S. Cyber Security & Infrastructure Agency (CISA). This new RAT was found on victims that had been initially compromised through the exploitation of publicly exposed VMware Horizon platforms. While being a relatively simple RAT capability-wise, it was built with recourse to the Qt Framework, with the sole intent of making human analysis harder, and automated detection through machine learning and heuristics less likely.We have also found evidence to suggest that once MagicRAT is deployed on infected systems, it launches additional payloads such as custom-built port scanners. Additionally, we've found that MagicRAT's C2 infrastructure was also used to host newer variants of known Lazarus implants such as TigerRAT. The discovery of MagicRAT in the wild is an indication of Lazarus' motivations to rapidly build new, bespoke malware to use along with their previously known malware such as TigerRAT to target organizations worldwide.Actor profile]]> 2022-09-07T08:01:43+00:00 http://blog.talosintelligence.com/2022/09/lazarus-magicrat.html www.secnews.physaphae.fr/article.php?IdArticle=6766837 False Malware,Threat,Medical APT 38 3.0000000000000000 CISCO Talos - Cisco Research blog Researcher Spotlight: How Asheer Malhotra looks for \'instant gratification\' in threat hunting Transparent Tribe group he's written about several times. “At some point, I say 'Hey, I don't think I've seen this before.' I start analyzing public disclosures, and slowly start gaining confidence and being able to craft a narrative around the motivations and tactics around a specific threat actor or malware campaign,” he said. In the case of Transparent Tribe, Malhotra's tracked their growth as a major player in the threat landscape in Asia, as they've added several remote access trojans to their arsenal, targeted high-profile government-adjacent entities in India and expanded their scope across the region.  When he's not threat hunting, Malhotra also speaks to Cisco customers about the current state of cybersecurity in briefings and delivers presentations at conferences around the world (mainly virtually during the COVID-19 pandemic).  “I always try to find the latest and new stuff to talk about. … I've been honing my skills and trying to speak more confidently publicly, but the confidence is backed up with the right kind of knowledge and the threat intelligence, that's what helps me succeed,” he said.  Malhotra is a native of India and spent most of his life there before coming to the U.S. for his master's degree at Mississippi State University. Mississippi was a far cry from everything else he had known up until that point, but he quickly adjusted. “That was the 'Deep South,'” he said. “So there was a culture shock, but the southern hospitality is such a real thing, and it felt very normal there.” Growing up, Malhotra always knew he wanted to work with computers, starting out as a teenager reverse-engineering exploits he'd see others talk about on the internet or just poking at smaller applications. His additional interest in politics and national security made it natural for him to combine the two and focus his research on state-sponsored actors.  He enjoys continuing his research in the Indian subcontinent and sees many parallels between the state of security in India and the U.S. “Th]]> 2022-09-06T08:00:00+00:00 http://blog.talosintelligence.com/2022/09/researcher-spotlight-how-asheer.html www.secnews.physaphae.fr/article.php?IdArticle=6750298 False Ransomware,Malware,Threat,Guideline APT 36 None CISCO Talos - Cisco Research blog ModernLoader delivers multiple stealers, cryptominers and RATs By Vanja SvajcerCisco Talos recently observed three separate, but related, campaigns between March and June 2022 delivering a variety of threats, including the ModernLoader bot, RedLine information-stealer and cryptocurrency-mining malware to victims. The actors use PowerShell, .NET assemblies, and HTA and VBS files to spread across a targeted network, eventually dropping other pieces of malware, such as the SystemBC trojan and DCRAT, to enable various stages of their operations. The attackers' use of a variety of off-the-shelf tools makes it difficult to attribute this activity to a specific adversary.The final payload appears to be ModernLoader, which acts as a remote access trojan (RAT) by collecting system information and deploying various modules. In the earlier campaigns from March, we also observed the attackers delivering the cryptocurrency mining malware XMRig. The March campaigns appeared to be targeting Eastern European users, as the constructor utility we analyzed had predefined script templates written in Bulgarian, Polish, Hungarian and Russian.The actors are attempting to compromise vulnerable web applications to serve malware and deliver threats via files masquerading as fake Amazon gift cards. Technical detailsInitial findingsIn June 2022, Cisco Talos identified an unusual command line execution in our telemetry. The decoded base64 command is below:Initial finding: A command executed on the system.The 31.41.244[.]231 IP is a Russian IP and hosts several other URLs with similar naming conventions. Autostart commandFollowing the discovery of the initial command, we identified two other command lines. They are a result of an autorun registered executable and the execution of a scheduled task.]]> 2022-08-30T08:00:09+00:00 http://blog.talosintelligence.com/2022/08/modernloader-delivers-multiple-stealers.html www.secnews.physaphae.fr/article.php?IdArticle=6625062 False Malware,Tool,Threat Yahoo None CISCO Talos - Cisco Research blog Ukraine Independence Day: Talos update Ukrainian infrastructure has largely stayed operational and, in most cases, exceeded expectations. It seems to have baffled most pundits, but for those that have spent years working in Ukraine, it's no surprise about the levels of dedication and commitment to protecting their critical infrastructure from those that would do it harm.  The team also covered how groundwork laid years ago is paying dividends now during the war, as well as an update on the types of cyber threats we're observing, including the deployment of the GoMet backdoor. At the beginning of the broadcast, Korzhevin shared what Independence Day of Ukraine means for him. "Independence is not an extra day off, but a value that should be used for the benefit of every citizen of our country," he added after the stream. "Independence is the will. Independence lives in every person. If we are independent, it means that we are free. That is, we live, not exist. The same goes for the state. Independence of Ukraine is when we have the possibility to develop the state as we want it and not as we are told when we have a real own history and not a twisted one when we speak our native language and not a hostile one. And now that there is a war in Ukraine, the most important task of our people is to preserve Independence. So that we, our children, grandchildren and all future generations of Ukrainians could live and build our state based on national traditions and core democratic values. Independence is primarily a way, not a condition. I believe that we will overcome all the difficulties in this way."Bengee added that Cisco and Talos have several resources available to any organizations in Ukraine that are in need of assistance. "If you are an organization in Ukraine who is interested in having Talos' help, and you would like to participate in our threat hunting program, please reach out via our social channels," she said. "We are offering our security products for free to Ukrainian organizations, as it's important to us to continue to support Ukraine throughout the duration of the conflict."A recording of the broadcast is available here and above.In our continued efforts to support Ukraine the following blogs have been translated into Ukrainian:  Current executive guidance for ongoing cyberattacks in Ukraine Talos on the developing situation in Ukraine Cisco stands on guard with our customers in Ukraine Threat Advisory: Opportunistic]]> 2022-08-24T12:50:34+00:00 http://blog.talosintelligence.com/2022/08/ukraine-independence-day-talos-update.html www.secnews.physaphae.fr/article.php?IdArticle=6505244 False Malware,Threat,Guideline None 4.0000000000000000 CISCO Talos - Cisco Research blog Ukraine and the fragility of agriculture security By Joe Marshall.The war in Ukraine has had far-reaching global implications and one of the most immediate effects felt will be on the global supply chain for food. This war-induced fragility has exposed the weaknesses of how we feed ourselves globally. Ransomware cartels and other adversaries are well aware of this and are actively exploiting that fragility. For the past six years, Cisco Talos has been actively involved in assisting public and private institutions in Ukraine to defend themselves against state-sponsored actors. Our involvement stretches the gamut from commercial to critical infrastructure, to election security. Our presence has afforded us unique opportunities and observations about cybersecurity in a macro and micro way. Ukraine has been a frequent victim of state-sponsored cyber attacks aimed at critical infrastructures like power and transportation. Talos is proud to stand with our partners in Ukraine and help defend their critical networks and help users there maintain access to necessary services. Now that Russia has invaded Ukraine, those threats have escalated to kinetic attacks that are wreaking havoc on a critical element of our world: agriculture and our global food supply chain. Even worse is the implications this war will have for future cyber attacks, as fragility is considered a lucrative element in deciding victimology by threat actors like ransomware cartels. To truly grasp the implications of the war in Ukraine, we have to examine how vital Ukrainian agriculture feeds the world, the current state of affairs, and what this means for the global cybersecurity posture to protect agricultural assets. Where there is weakness, there is opportunityRansomware cartels and their affiliates are actively targeting the agricultural industry. Moreover, these actors have done their homework and are targeting agricultural companies during the two times of the year where they cannot suffer disruptions: planting and harvesting. Per the published FBI PIN Alert: “Cyber actors may perceive cooperatives as lucrative targets with a willingness to pay due to the time-sensitive role they play in agricultural production.” This is far from unusual for these adversaries - they are shrewd and calculating, and understand their victims' weaknesses and industries. H]]> 2022-08-18T08:00:00+00:00 http://blog.talosintelligence.com/2022/08/ukraine-and-fragility-of-agriculture.html www.secnews.physaphae.fr/article.php?IdArticle=6392803 False Ransomware,Threat,Guideline,Cloud APT 10,APT 32,APT 37,APT 21,NotPetya,Uber,Guam,APT 28 None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in WWBN AVideo web app could lead to command injection, authentication bypass Claudio Bozzato of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered multiple vulnerabilities in the WWBN AVideo web application that could allow an attacker to carry out a wide range of malicious actions, including command injection and authentication bypass. AVideo is an open-source web application that allows users to build a video streaming and sharing platform. Anyone who joins the community can host videos on-demand, launch a live stream or encode different video formats.  TALOS-2022-1542 (CVE-2022-32777 - CVE-2022-32778), TALOS-2022-1549 (CVE-2022-32761) and TALOS-2022-1550 (CVE-2022-28710) are information disclosure vulnerabilities that are triggered if an adversary sends the targeted instance a specially crafted HTTP packet. TALOS-2022-1550 and TALOS-2022-1549 could allow the adversary to read arbitrarily selected files, while TALOS-2022-1542 could allow them to steal the session cookie. Some of the most serious vulnerabilities discovered in this product are code injection issues. TALOS-2022-1546 (CVE-2022-30534), TALOS-2022-1551 (CVE-2022-33147 - CVE-2022-33149) and TALOS-2022-1548 (CVE-2022-32572) are triggered in a similar way, but instead could lead to arbitrary command execution.  That could allow an attacker to gain access to an administrator's account: TALOS-2022-1537 (CVE-2022-26842) TALOS-2022-1538 (CVE-2022-32770 - CVE-2022-32772) TALOS-2022-1539 (CVE-2022-30690) TALOS-2022-1540 (CVE-2022-28712) The app also contains three privilege escalation vulnerabilities: TALOS-2022-1534 (CVE-2022-29468), TALOS-2022-1535 (CVE-2022-30605) and TALOS-2022-1545 (CVE-2022-32282). An attacker could exploit TALOS-2022-1545 to log in with only a hashed version of a user's password. TALOS-2022-1534 and TALOS-2022-1535 could be triggered if the attacker sends]]> 2022-08-16T11:54:34+00:00 http://blog.talosintelligence.com/2022/08/vuln-spotlight-wwbn-avideo-stream.html www.secnews.physaphae.fr/article.php?IdArticle=6355594 False Vulnerability,Guideline None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Three vulnerabilities in HDF5 file format could lead to remote code execution Dave McDaniel of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered three vulnerabilities in a library that works with the HDF5 file format that could allow an attacker to execute remote code on a targeted device. These issues arise in the libhdf5 gif2h5 tool that's normally used to convert a GIF file to the HDF5 format, commonly used to store large amounts of numerical data. An attacker could exploit these vulnerabilities by tricking a user into opening a specially crafted, malicious file. TALOS-2022-1485 (CVE-2022-25972) and TALOS-2022-1486 (CVE-2022-25942) are out-of-bounds write vulnerabilities in the gif2h5 tool that trigger a specific crash, opening the door for code execution from the adversary. TALOS-2022-1487 (CVE-2022-26061) works similarly but is a heap-based buffer overflow vulnerability. Cisco Talos is disclosing these vulnerabilities despite no official fix from HDF5 in adherence to the 90-day deadline outlined in Cisco's vulnerability disclosure policyUsers are encouraged to update these affected products as soon as possible: HDF5 Group libhdf5, version 1.10.4. Talos tested and confirmed these versions of the library could be exploited by these vulnerabilities. The following Snort rules will detect exploitation attempts against this vulnerability: 59296, 59297, 59300, 59301, 59303 and 59304. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org. ]]> 2022-08-16T10:03:51+00:00 http://blog.talosintelligence.com/2022/08/vuln-spotlight-hdf5-library.html www.secnews.physaphae.fr/article.php?IdArticle=6353242 False Tool,Vulnerability None None CISCO Talos - Cisco Research blog Cisco Talos shares insights related to recent cyber attack on Cisco here. Initial vectorInitial access to the Cisco VPN was achieved via the successful compromise of a Cisco employee's personal Google account. The user had enabled password syncing via Google Chrome and had stored their Cisco credentials in their browser, enabling that information to synchronize to their Google account. After obtaining the user's credentials, the attacker attempted to bypass multifactor authentication (MFA) using a variety of techniques, including voice phishing (aka "vishing") and MFA fatigue, the process of sending a high volume of push requests to the target's mobile device until the user accepts, either accidentally or simply to attempt to silence the repeated push notifications they are receiving. Vishing is an increasingly common social engineering technique whereby attackers try to trick employees into divulging sensitive information over the phone. In this instance, an employee reported that they received multiple calls over several days in which the callers – who spoke in English with various international accents and dialects – purported to be associated with support organizations trusted by the user.  Once the attacker had obtained initial access, they enrolled a series of new devices for MFA and authenticated successfully to the Cisco VPN. The attacker then escalated to administrative privileges, allowing them to login to multiple systems, which alerted our Cisco Security Incident Response Team (CSIRT), who subsequently responded to the incident. The actor in question dropped a variety of tools, including remote access tools like LogMeIn and TeamViewer, offensive security tools such as Cobalt Strike, PowerSploit, Mimikatz, and Impacket, and added their own backdoor accounts and persistence mechanisms. ]]> 2022-08-10T15:44:23+00:00 http://blog.talosintelligence.com/2022/08/recent-cyber-attack.html www.secnews.physaphae.fr/article.php?IdArticle=6235384 False Ransomware,Malware,Threat,Guideline None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for August 2022 - Snort rules and prominent vulnerabilities By Jon Munshaw and Vanja Svajcer.Microsoft released its monthly security update Tuesday, disclosing more than 120 vulnerabilities across its line of products and software, the most in a single Patch Tuesday in four months.  This batch of updates also includes a fix for a new vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) that's actively being exploited in the wild, according to Microsoft. MSDT was already the target of the so-called “Follina” zero-day vulnerability in June.  In all, August's Patch Tuesday includes 15 critical vulnerabilities and a single low- and moderate-severity issue. The remainder is classified as “important.” Two of the important vulnerabilities CVE-2022-35743 and CVE-2022-34713 are remote code execution vulnerabilities in MSDT. However, only CVE-2022-34713 has been exploited in the wild and Microsoft considers it “more likely” to be exploited. Microsoft Exchange Server contains two critical elevation of privilege vulnerabilities, CVE-2022-21980 and CVE-2022-24477. An attacker could exploit this vulnerability by tricking a target into visiting a malicious, attacker-hosted server or website. In addition to applying the patch released today, potentially affected users should enable Extended Protection on vulnerable versions of the server. The Windows Point-to-Point Tunneling Protocol is also vulnerable to three critical vulnerabilities. Two of them, CVE-2022-35744 and CVE-2022-30133, could allow an attacker to execute remote code on an RAS server machine. The other, CVE-2022-35747, could lead to a denial-of-service condition. CVE-2022-35744 has a CVSS severity score of 9.8 out of 10, one of the highest-rated vulnerabilities this month. An attacker could exploit these vulnerabilities by communicating via Port 1723. Affected users can render these issues unexploitable by blocking that port, though it runs the risk of disrupting other legitimate communications. Another critical code execution vulnerability, CVE-2022-35804, affects the SMB Client and Server and the way the protocol handles specific requests. An attacker could exploit this on the SMB Client by config]]> 2022-08-09T16:44:37+00:00 http://blog.talosintelligence.com/2022/08/microsoft-patch-tuesday-for-august-2022.html www.secnews.physaphae.fr/article.php?IdArticle=6218102 False Tool,Vulnerability,Guideline None 4.0000000000000000 CISCO Talos - Cisco Research blog Small-time cybercrime is about to explode - We aren\'t ready By Nick Biasini.The cybersecurity industry tends to focus on extremely large-scale or sophisticated, state-sponsored attacks. Rightfully so, as it can be the most interesting, technically speaking. When most people think of cybercrime they think of large-scale breaches because that's what dominates the headlines. However, the problem is much bigger. In 2021, the Internet Crime Complaint Center (IC3) received a staggering 847,376 complaints, with each victim losing a little more than $8,000 on average. Once you account for the high-value breaches, the true impact is even lower. The average person is far more likely to have their identity stolen or fall victim to some other sort of scam than be directly affected by a large-scale breach - and business is booming.A deeper look at the data from IC3 shows that the amount of complaints and revenue being generated from cybercrime continues to rise. Interestingly there is a huge jump in cybercrime during the pandemic with a staggering increase of more than 60% in complaints between 2019 and 2020, with it increasing further in 2021. It's clear that cybercrime is on the rise, but what's driving it?There have been a variety of reports that criminals are turning increasingly to cybercrime instead of traditional drug crimes, with which they were commonly associated in the past. This is both a blessing and a curse - it removes a lot of violence and crime from the streets but is adding a significant amount of pressure on local law enforcement. This is an international problem. Several recent reports highlight that this is also an issue in Italy and Spain.There are cybercriminals everywhere and the U.S. is no exception. What's changed is who is involved. Historically, cybercrime was considered white-collar criminal behavior perpetrated by those that were knowledgeable and turned bad. Now, technology has become such an integral part of our lives that anyone with a smartphone and desire can get started in cybercrime. The growth of cryptocurrencies and associated anonymity, whether legitimate or not, has garnered the attention of criminals that formerly operated in traditional criminal enterprises and have now shifted to cybercrime and identity theft.Cybercrime is a local law enforcement problemFor cybercrime to get the attention of national law enforcement,]]> 2022-08-08T08:42:23+00:00 http://blog.talosintelligence.com/2022/08/smalltime-cybercrime.html www.secnews.physaphae.fr/article.php?IdArticle=6202489 False Ransomware,Malware,Guideline None None CISCO Talos - Cisco Research blog New SDR feature released for Cisco Secure Email of a new mechanism that allows Cisco Secure Email customers the option to submit Sender Domain Reputation (SDR) disputes through TalosIntelligence.com.Customers now have the option of receiving self-service support through TalosIntelligence.com or may continue engaging with TAC. This new feature improves efficiency for Secure Email customers by streamlining the SDR dispute ticket process.Users can submit email sender domains and email addresses for investigation if they believe a domain or address should be marked as malicious or has been wrongfully marked as malicious. Please provide as much data as possible to assist our investigation team.]]> 2022-08-05T10:59:16+00:00 http://blog.talosintelligence.com/2022/08/new-sdr-feature-released-for-cisco.html www.secnews.physaphae.fr/article.php?IdArticle=6144406 False None None None CISCO Talos - Cisco Research blog Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns By Edmund Brumaghin, Azim Khodjibaev and Matt Thaxton, with contributions from Arnaud Zobec.Executive SummaryDark Utilities, released in early 2022, is a platform that provides full-featured C2 capabilities to adversaries.It is marketed as a means to enable remote access, command execution, distributed denial-of-service (DDoS) attacks and cryptocurrency mining operations on infected systems.Payloads provided by the platform support Windows, Linux and Python-based implementations and are hosted within the Interplanetary File System (IPFS), making them resilient to content moderation or law enforcement intervention.Since its initial release, we've observed malware samples in the wild leveraging it to facilitate remote access and cryptocurrency mining.What is "Dark Utilities?"In early 2022, a new C2 platform called "Dark Utilities" was established, offering a variety of services such as remote system access, DDoS capabilities and cryptocurrency mining. The operators of the service also established Discord and Telegram communities where they provide technical support and assistance for customers on the platform.Dark Utilities provides payloads consisting of code that is executed on victim systems, allowing them to be registered with the service and establish a command and control (C2) communications channel. The platform currently supports Windows, Linux and Python-based payloads, allowing adversaries to target multiple architectures without requiring significant development resources. During our analysis, we observed efforts underway to expand OS and system architecture support as the platform continues to see ongoing develo]]> 2022-08-04T08:00:13+00:00 http://blog.talosintelligence.com/2022/08/dark-utilities.html www.secnews.physaphae.fr/article.php?IdArticle=6123175 False Spam,Malware,Hack,Tool,Threat,Guideline APT 19 None CISCO Talos - Cisco Research blog 0xCC\'d 0xCC'dmanuals were thick plasticized paper on spiral bindingsmade to see use expected to tolerate the conditions just asyou were conditioned to dusty basement rooms low hangingyellowed flourescent lights heavy doors beige and gray andsquare doing nothing to help that all nighter we'll justadd a headache on top of that have fun nothing hurts whenyoure 20 or maybe you just didnt know you could not hurtdrop ceilings and too much air conditioning my friend gotpnuemonia on a 100 degree day from entering and leavingserver rooms he laughs about it by the way if the alarmgoes off run theyll kill you to keep the website uptext debuggers and assembly manuals and intel 3A our computingcenter at RPI was a gothic church the pews rows and rows ofgray purple lunch boxes candied irix gumdrops stoic yellowedSCO pizza boxes square blue chunky power buttons I was abeliever worshiping the saints studying hennessy groaningthrough chomsky it was more useful than I imagined it might bebringing life to hot dead business parks all bricks andbland cubicle walls with all the myriad ways to avoidthe frustrations with setting up test systems and chasingyour own tail foos ball minor explosives research chemicalsand every other manic desperate strangeness devised byour ingeniumwho devoted their nights and weekends to the stabilityof other people's e-shops willingly giving away life toretain the privilege of gaining sustenance from a workthey might have loved rather than one they certainly]]> 2022-08-04T07:01:56+00:00 http://blog.talosintelligence.com/2022/08/poems-0xCCd.html www.secnews.physaphae.fr/article.php?IdArticle=6122453 False Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in Alyac antivirus program could stop virus scanning, cause code execution Jaewon Min of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Update (Aug. 3, 2022): Talos disclosed two new vulnerabilities in the Alyac antivirus software and added their details to this post.Cisco Talos recently discovered out-of-bounds read and buffer overflow vulnerabilities in ESTsecurity Corp.'s Alyac antivirus software that could cause a denial-of-service condition or arbitrary code execution. Alyac is an antivirus software developed for Microsoft Windows machines. TALOS-2022-1452 (CVE-2022-21147) is a vulnerability that exists in a specific Alyac module that, eventually, leads to a crash of Alyac's scanning process, which effectively neutralizes the antivirus scan. If successful, an attacker could trigger this vulnerability to stop the program from scanning for malware, which would be crucial in a potential attack scenario. TALOS-2022-1527 (CVE-2022-32543) and TALOS-2022-1533 (CVE-2022-29886) are heap-based buffer overflow vulnerabilities that an attacker could exploit to execute arbitrary code on the targeted machine. The adversary would have to convince a user to open a specially crafted OLE file to trigger this condition.Cisco Talos worked with ESTsecurity to ensure that these issues are resolved and an update is available for affected customers, all in adherence to Cisco's vulnerability disclosure policyUsers are encouraged to update these affected products as soon as possible: ESTsoft Alyac, versions 2.5.7.7 and 2.5.8.544. Talos tested and confirmed ESTsoft Alyac, version 2.5.7.7, is affected by TALOS-2022-1452. Version 2.5.8.544 is vulnerable to TALOS-2022-1533 and TALOS-2022-1527.The following Snort rules will detect exploitation attempts against these vulnerabilities: 59014, 59015, and 60035 - 60042. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your]]> 2022-08-03T14:46:38+00:00 http://blog.talosintelligence.com/2022/05/vuln-spotlight-alyac-est.html www.secnews.physaphae.fr/article.php?IdArticle=6112317 True Vulnerability,Guideline None None CISCO Talos - Cisco Research blog Manjusaka: A Chinese sibling of Sliver and Cobalt Strike By Asheer Malhotra and Vitor Ventura.Cisco Talos recently discovered a new attack framework called "Manjusaka" being used in the wild that has the potential to become prevalent across the threat landscape. This framework is advertised as an imitation of the Cobalt Strike framework.The implants for the new malware family are written in the Rust language for Windows and Linux.A fully functional version of the command and control (C2), written in GoLang with a User Interface in Simplified Chinese, is freely available and can generate new implants with custom configurations with ease, increasing the likelihood of wider adoption of this framework by malicious actors.We recently discovered a campaign in the wild using lure documents themed around COVID-19 and the Haixi Mongol and Tibetan Autonomous Prefecture, Qinghai Province. These maldocs ultimately led to the delivery of Cobalt Strike beacons on infected endpoints.We have observed the same threat actor using the Cobalt Strike beacon and implants from the Manjusaka framework.IntroductionCisco Talos has discovered a relatively new attack framework called "Manjusaka" (which can be translated to "cow flower" from the Simplified Chinese writing) by their authors, being used in the wild.As defenders, it is important to keep track of offensive frameworks such as Cobalt Strike and Sliver so that enterprises can effectively defend against attacks employing these tools. Although we haven't observed widespread usage of this framework in the wild, it has the potential to be adopted by threat actors all over the world. This disclosure from Talos intends to provide early notification of the usage of Manjusaka. We also detail the framework's capabilities and the campaign that led to the discovery of this attack framework in the wild.The research started with a malicious Microsoft Word document (maldoc) that contained a Cobalt Strike (CS) beacon. The lure on this document mentioned a COVID-19 outbreak in Golmud City, one of the largest cities in the Haixi Mongol and Tibetan Autonomous Prefecture, Qinghai Province. During the investigation, Cisco Talos found no direct link between the campaign and the framework developers, aside from the usage of the framework (which is freely available on GitHub). However, we could not find any data that could support victimology definition. This is justifiable considering there's a low number of victims, indicating the early stages of the campaign, further supported by the maldoc metadata that indicates it was created in the second half of June 2022.While investigating the maldoc infection chain, we found an implant used to instrument Manjusaka infections, contacting the same IP address as the CS beacon. This implant is written in the Rust programming language and we found samples for Windows and Linux operating systems. The Windows implant included test samples, which had non-internet-routable IP addresses as command and control (C2). Talos also discovered the Manjusaka C2 executable - a fully functional C2 ELF binary written in GoLang with a User Interface in Simplified Chinese - on GitHub. While analyzing the C2, we generated implants by specifying our configurations. The developer advertises it has an advers]]> 2022-08-02T08:00:14+00:00 http://blog.talosintelligence.com/2022/08/manjusaka-offensive-framework.html www.secnews.physaphae.fr/article.php?IdArticle=6089620 False Malware,Threat,Guideline APT 19 None CISCO Talos - Cisco Research blog Vulnerability Spotlight: How misusing properly serialized data opened TCL LinkHub Mesh Wi-Fi system to 17 vulnerabilities By Carl Hurd. The TCL LinkHub Mesh Wi-Fi system is a multi-device Wi-Fi system that allows users to expand access to their network over a large physical area. What makes the LInkHub system unique is the lack of a network interface to manage the devices individually or in the mesh. Instead, a phone application is the only method to interact with these devices. This is noteworthy because, in theory, it significantly reduces the common attack surface on most small office/home office (SOHO) routers, as it moves the entire HTTP/S code base from the product. This means, in theory, fewer issues with integration or hacked-together scripts to trigger various functions within the device. One of the issues with this approach though is that its functionality still needs to reside somewhere for the user to manage the device. However, this setup leaves the LinkHub Mesh Wi-Fi system open to several vulnerabilities, which we are disclosing today. An attacker could exploit these vulnerabilities to carry out a variety of malicious actions, including injecting code at the operating system level, stealing credentials and causing a denial of service of the entire network. Cisco Talos is disclosing these vulnerabilities despite no official fix from TCL, all in adherence to Cisco's vulnerability disclosure policyMoving all the management functionality to the phone application makes it the most interesting path to research for this device. The first step is to understand the protocol used for communication. There are a few easy choices, TCL could have decided to use HTTP with hidden endpoints, or some hand-rolled protocol for communication, to make capturing and identifying the traffic the priority. Looking at the capture right away, it's not HTTP or another text-based protocol, so the next step is determining if this is a custom protocol or something more widely used. ]]> 2022-08-01T12:18:19+00:00 http://blog.talosintelligence.com/2022/08/vulnerability-spotlight-how-misusing.html www.secnews.physaphae.fr/article.php?IdArticle=6081054 False Vulnerability None None CISCO Talos - Cisco Research blog Researcher Spotlight: You should have been listening to Lurene Grenier years ago She was one of the first of the smaller research staff at the Sourcefire Vulnerability Research Team, which eventually merged with a few other teams to form Talos. Matt Watchinski, who is now the vice president of Talos, initially hired Grenier as a vulnerability exploit researcher, doing the job of what more than a dozen people do today for Talos. Grenier looked at vulnerability details for regular patch cycles like Microsoft Patch Tuesday and write her own exploit code for the vulnerabilities, which eventually fed into detection content that would block attackers' attempts to target these issues in the wild. She grew with VRT, eventually overseeing the Analyst Team, which today is the main producer of detection content for Cisco Secure products and Snort.  She eventually took a few other paths on her security journey outside of Cisco and Talos, but recently rejoined Talos as a special advisor to Watchinski, studying state-sponsored actors and major attacker trends using Talos' data and telemetry.  “My main directive is to come up with plans for this mountain of data that we have,” Grenier said. “I look at the data that we do have and see what outcomes for customers we can achieve with it. Can we create something like a semi-autonomous mediation plan when there is a breach? Can we track actors in a more granular manner so we can match them with what we've seen in the past?” Even during her time away from Talos, Grenier never lost connection, speaking at two Talos Threat Research Summits that were a part of Cisco Live. In 2018, she even gave a presentation on how organizations were not taking threats from state-sponsored actors seriously enough and warned about the theft of intellectual property. Some of the same techniques and actors she warned about in that talk resurfaced earlier this year in a warning from federal agencies in the U.S. and the U.K., stating that Chinese state-sponsored actors were stealing important IP and creating fraudulent “tech transfer” agreements. While Grenier still tracks these same actors daily, she views their activity as more of an inevitability that's going to produce the worst-case scenario rather than anything that can be avoided at this point. “It's like earthquakes or famine, it's really just horrible,” she said. At this point, Grenier is focusing her work on how to make attacks as costly as possible for the adversary, rather than trying to avoid them altogether. If her research can help even slow down an actor for a bit or cost them more resources when they go to attack again, that's a small victory to build off. “People have to see the cost of these breaches,” she said. “And they're not going to see the inflection point for a while now, but it will eventually become very obvious.” Although she spent several years away from Talos, coming back to the organization (a few hundred mor]]> 2022-08-01T08:00:00+00:00 http://blog.talosintelligence.com/2022/08/researcher-spotlight-you-should-have.html www.secnews.physaphae.fr/article.php?IdArticle=6078627 False Vulnerability,Threat,Guideline None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: How a code re-use issue led to vulnerabilities across multiple products By Francesco Benvenuto. Recently, I was performing some research on a wireless router and noticed the following piece of code: ]]> 2022-07-27T12:22:17+00:00 http://blog.talosintelligence.com/2022/07/vulnerability-spotlight-how-code-re-use.html www.secnews.physaphae.fr/article.php?IdArticle=5973224 False Vulnerability,Guideline,Medical APT 38,APT 19 None CISCO Talos - Cisco Research blog What Talos Incident Response learned from a recent Qakbot attack hijacking old email threads By Nate Pors and Terryn Valikodath.  Executive summary In a recent malspam campaign delivering the Qakbot banking trojan, Cisco Talos Incident Response (CTIR) observed the adversary using aggregated, old email threads from multiple organizations that we assess were likely harvested during the 2021 ProxyLogon-related compromises targeting vulnerable Microsoft Exchange servers. This campaign relies on external thread hijacking, whereby the adversary is likely using a bulk aggregation of multiple organizations' harvested emails to launch focused phishing campaigns against previously uncompromised organizations. This differs from the more common approach to thread hijacking, in which attackers use a single compromised organization's emails to deliver their threat. This many-to-one approach is unique from what we have generally observed in the past and is likely an indirect effect of the widespread compromises and exfiltration of large volumes of email from 2020 and 2021. Understanding the difference between external and single-victim thread hijacking is essential for detecting these threats. Below, we have several tips for defenders on how to identify key indicators of this activity. External thread hijacking  Cisco Talos has observed threat actors using external thread hijacking, a method by which attackers weaponize emails previously harvested from other organizations. This differs from the more common approach to thread hijacking, in which adversaries compromise the victim organization's Exchange server to obtain email threads that are then weaponized. We recently observed this in June 2022 as part of a broader campaign that delivered the Qakbot banking trojan. In this threat activity, the attackers used old emails harvested months to years ago during the 2021 ProxyLogon campaign, tracked as CVE-2021-26855, targeting vulnerable Exchange servers. External thread hijacking is not dependent on the threat actor gaining initial access to the victim environment. This is notable from a digital forensics and incident response (DFIR) perspective because the target organization only saw inbound phishing emails with its own legitimate emails as the source material, with multiple external organizations represented in the email threads. Our assessment of the adversary's use of emails obtained from the ProxyLogon compromises is based on a number of observations, including the timing of the emails and research into publicly acknowledged ProxyLogon compromises. The attackers selectively used these emails to target senders or recipients from the target organization. In the external thread hijacking attack observed by CTIR, the adversary likely took the following steps:  The attacker took control of multiple third-party organizations' Exchange servers or individual inboxes and exported emails for later use. The adversary selected the emails relevant to the target organization ]]> 2022-07-27T08:00:00+00:00 http://blog.talosintelligence.com/2022/07/what-talos-incident-response-learned.html www.secnews.physaphae.fr/article.php?IdArticle=5969866 False Malware,Threat None None CISCO Talos - Cisco Research blog Quarterly Report: Incident Response Trends in Q2 2022 By Caitlin Huey.For the first time in more than a year, ransomware was not the top threat Cisco Talos Incident Response (CTIR) responded to this quarter, as commodity malware surpassed ransomware by a narrow margin. This is likely due to several factors, including the closure of several ransomware groups, whether it be of their own volition or the actions of global law enforcement agencies and governments. Commodity malware was the top observed threat this quarter, a notable development given the general decrease in observations of attacks leveraging commodity trojans in CTIR engagements since 2020. These developments coincide with a general resurgence of certain email-based trojans in recent months, as law enforcement and technology companies have continued to attempt to disrupt and affect email-based malware threats like Emotet and Trickbot. This quarter featured malware such as the Remcos remote access trojan (RAT), Vidar infostealer, Redline Stealer and Qakbot (Qbot), a well-known banking trojan that in recent weeks, has been observed in new clusters of activity delivering a variety of payloads. TargetingThe top-targeted vertical continues to be telecommunications, following a trend where it was among the top targeted verticals in Q4 2021 and Q1 2022, closely followed by organizations in the education and health care sectors. Commodity malwareThis quarter saw a notable increase in commodity malware threats compared to previous quarters. Commodity]]> 2022-07-26T10:11:15+00:00 http://blog.talosintelligence.com/2022/07/quarterly-report-incident-response.html www.secnews.physaphae.fr/article.php?IdArticle=5951623 False Ransomware,Spam,Malware,Threat None None CISCO Talos - Cisco Research blog Attackers target Ukraine using GoMet backdoor Executive summarySince the Russian invasion of Ukraine began, Ukrainians have been under a nearly constant barrage of cyber attacks. Working jointly with Ukrainian organizations, Cisco Talos has discovered a fairly uncommon piece of malware targeting Ukraine - this time aimed at a large software development company whose software is used in various state organizations within Ukraine. We believe that this campaign is likely sourced by Russian state-sponsored actors or those acting in their interests. As this firm is involved in software development, we cannot ignore the possibility that the perpetrating threat actor's intent was to gain access to source a supply chain-style attack, though at this time we do not have any evidence that they were successful. Cisco Talos confirmed that the malware is a slightly modified version of the open-source backdoor named "GoMet." The malware was first observed on March 28, 2022. GoMet backdoorThe story of this backdoor is rather curious - there are two documented cases of its usage by sophisticated threat actors. First, in 2020, attackers were deploying this malware after the successful exploitation of CVE-2020-5902, a vulnerability in F5 BIG-IP so severe that USCYBERCOM posted a tweet urging all users to patch the application. The second is more recent and involved the successful exploitation of CVE-2022-1040, a remote code execution vulnerability in Sophos Firewall. Both cases are very similar. They both start with the exploitation of a public vulnerability on appliances where the malicious actors then dropped GoMet as a backdoor. As of publishing time, Cisco Talos has no reason to believe these cases are related to the usage of this backdoor in Ukraine. The original GoMet author posted the code on GitHub on March 31, 2019 and had commits until April 2, 2019. The commits didn't add any features but did fix some code convention aesthetics. The backdoor itself is a rather simple piece of software written in the Go programming language. It contains nearly all the usual functions an attacker might want in a remotely controlled agent. Agents can be deployed on a variety of operating systems (OS) or architectures (amd64, arm, etc.). GoMet supports job scheduling (via Cron or task scheduler depending on the OS), single command execution, file download, file upload or opening a shell. An additional notable feature of GoMet lies in its ability to daisy chain - whereby the attackers gain access to a network or machine and then use that same information to gain access to multiple networks and computers - connections from one implanted host to another. Such a feature could allow for communication out to the internet from otherwise completely "isolated" hosts.This version was changed by malicious actors, in the original code, the cronjob is configured to be executed once every hour on the hour. In our samples, the cronjob is configured to run every two seconds. This change makes the sample slightly more noisy since it executes every two seconds, but also prevents an hour-long sleep if the connection fails which would ]]> 2022-07-21T08:00:05+00:00 http://blog.talosintelligence.com/2022/07/attackers-target-ukraine-using-gomet.html www.secnews.physaphae.fr/article.php?IdArticle=5855247 False Malware,Vulnerability,Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Issue in Accusoft ImageGear could lead to memory corruption, code execution Emmanuel Tacheau of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered a use-after-free vulnerability in Accusoft ImageGear's PSD header processing function. The ImageGear library is a document-imaging developer toolkit that allows users to create, edit, annotate and convert various images. It supports more than 100 file formats such as DICOM, PDF and Microsoft Office. This vulnerability, TALOS-2022-1526 (CVE-2022-29465) could allow an attacker to cause a use-after-free condition by tricking the targeted user into opening a malformed .psd file in the application. The vulnerability leads to out-of-bounds heap writes, which causes memory corruption and, possibly, code execution. In adherence to Cisco's vulnerability disclosure policy, Accusoft patched this issue and released an update for ImageGear.Talos tested and confirmed Accusoft ImageGear, version 19.10, is affected by this vulnerability. The following Snort rules will detect exploitation attempts against this vulnerability: 60228 and 60229. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Cisco Secure Firewall Management Center or Snort.org. ]]> 2022-07-19T08:45:52+00:00 http://blog.talosintelligence.com/2022/07/accusoft-vuln-spotlight-.html www.secnews.physaphae.fr/article.php?IdArticle=5825836 True Vulnerability,Guideline None None CISCO Talos - Cisco Research blog EMEAR Monthly Talos Update: Training the next generation of cybersecurity researchers 2022-07-15T06:37:07+00:00 http://blog.talosintelligence.com/2022/07/emear-monthly-talos-update-training.html www.secnews.physaphae.fr/article.php?IdArticle=5747363 False Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Use-after-free condition in Google Chrome WebGPU 2022-07-14T06:24:52+00:00 http://blog.talosintelligence.com/2022/07/chrome-web-gpu-useafterfree.html www.secnews.physaphae.fr/article.php?IdArticle=5721431 False Vulnerability None None CISCO Talos - Cisco Research blog Transparent Tribe begins targeting education sector in latest campaign 2022-07-13T16:08:15+00:00 http://blog.talosintelligence.com/2022/07/transparent-tribe-targets-education.html www.secnews.physaphae.fr/article.php?IdArticle=5706785 False None APT 36 None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Adobe Acrobat DC use-after-free issue could lead to arbitrary code execution 2022-07-13T07:49:24+00:00 http://blog.talosintelligence.com/2022/07/vulnerability-spotlight-adobe-acrobat.html www.secnews.physaphae.fr/article.php?IdArticle=5697256 False None None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for July 2022 - Snort rules and prominent vulnerabilities 2022-07-12T09:33:37+00:00 http://blog.talosintelligence.com/2022/07/microsoft-patch-tuesday-for-july-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5672962 False None None None CISCO Talos - Cisco Research blog Threat Roundup for July 1 to July 8 2022-07-08T11:27:26+00:00 http://blog.talosintelligence.com/2022/07/threat-roundup-0701-0708.html www.secnews.physaphae.fr/article.php?IdArticle=5616258 True Threat None None CISCO Talos - Cisco Research blog Threat Source newsletter (July 7, 2022) - Teamwork makes the dream work 2022-07-07T10:00:00+00:00 http://blog.talosintelligence.com/2022/07/threat-source-newsletter-july-7-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5597350 False Threat None None CISCO Talos - Cisco Research blog Researcher Spotlight: Around the security world and back again with Nick Biasini 2022-07-05T04:00:00+00:00 http://blog.talosintelligence.com/2022/07/blog-post.html www.secnews.physaphae.fr/article.php?IdArticle=5560315 False Malware None None CISCO Talos - Cisco Research blog Threat Source newsletter (June 30, 2022) - AI voice cloning is somehow more scary than deepfake videos 2022-06-30T10:00:00+00:00 http://blog.talosintelligence.com/2022/06/threat-source-newsletter-june-30-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5474148 False Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Command injection vulnerabilities in Robustel cellular router _> of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered four vulnerabilities in the Robustel R1510 industrial cellular router.  The R1510 is a portable router that shares 2G, 3G and 4G wireless internet access. It comes with... [[ This is only the beginning! Please visit the blog for the complete entry ]]]]> 2022-06-30T09:41:18+00:00 http://blog.talosintelligence.com/2022/06/vuln-spotlight-robustel-cell-router.html www.secnews.physaphae.fr/article.php?IdArticle=5474149 False None None None CISCO Talos - Cisco Research blog De-anonymizing ransomware domains on the dark web 2022-06-28T04:00:00+00:00 http://blog.talosintelligence.com/2022/06/de-anonymizing-ransomware-domains-on.html www.secnews.physaphae.fr/article.php?IdArticle=5429818 False Ransomware None None CISCO Talos - Cisco Research blog Threat Roundup for June 17 to June 24 2022-06-24T13:59:06+00:00 http://blog.talosintelligence.com/2022/06/threat-roundup-0617-0624.html www.secnews.physaphae.fr/article.php?IdArticle=5367086 True Threat None None CISCO Talos - Cisco Research blog Avos ransomware group expands with new attack arsenal 2022-06-21T03:59:59+00:00 http://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html www.secnews.physaphae.fr/article.php?IdArticle=5307451 False Ransomware None None CISCO Talos - Cisco Research blog Threat Roundup for June 10 to June 17 2022-06-17T13:57:36+00:00 http://blog.talosintelligence.com/2022/06/threat-roundup-0610-0617.html www.secnews.physaphae.fr/article.php?IdArticle=5229367 True Threat None None CISCO Talos - Cisco Research blog Threat Source newsletter (June 16, 2022) - Three top takeaways from Cisco Live 2022-06-16T10:00:00+00:00 http://blog.talosintelligence.com/2022/06/threat-source-newsletter-june-16-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5195539 False Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in Anker Eufy Homebase could lead to code execution, authentication bypass _> of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered three vulnerabilities in the Anker Eufy Homebase 2.  The Eufy Homebase 2 is the video storage and networking gateway that works with Anker's Eufy Smarthome ecosystem.... [[ This is only the beginning! Please visit the blog for the complete entry ]]]]> 2022-06-15T11:14:49+00:00 http://blog.talosintelligence.com/2022/06/vuln-spotlight-anker-eufy-homebase.html www.secnews.physaphae.fr/article.php?IdArticle=5171456 False None None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for June 2022 - Snort rules and prominent vulnerabilities 2022-06-14T10:47:50+00:00 http://blog.talosintelligence.com/2022/06/microsoft-patch-tuesday-for-june-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5148777 False None None None CISCO Talos - Cisco Research blog Threat Source newsletter (June 9, 2022) - Get ready for Cisco Live 2022-06-09T10:06:57+00:00 http://blog.talosintelligence.com/2022/06/threat-source-newsletter-june-9-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5060204 False Threat None None CISCO Talos - Cisco Research blog Talos EMEA monthly update: Business email compromise 2022-06-09T04:16:12+00:00 http://blog.talosintelligence.com/2022/06/talos-emea-monthly-update-business.html www.secnews.physaphae.fr/article.php?IdArticle=5056732 False None None None CISCO Talos - Cisco Research blog Threat Advisory: Atlassian Confluence zero-day vulnerability under active exploitation 2022-06-03T16:08:10+00:00 http://blog.talosintelligence.com/2022/06/atlassian-confluence-0day.html www.secnews.physaphae.fr/article.php?IdArticle=4961477 False Vulnerability None None CISCO Talos - Cisco Research blog Threat Roundup for May 27 to June 3 2022-06-03T11:07:29+00:00 http://blog.talosintelligence.com/2022/06/threat-roundup-0527-0603.html www.secnews.physaphae.fr/article.php?IdArticle=4957104 True Threat None None CISCO Talos - Cisco Research blog Threat Source newsletter (June 2, 2022) - An RSA Conference primer 2022-06-02T10:00:00+00:00 http://blog.talosintelligence.com/2022/06/threat-source-newsletter-june-2-2022.html www.secnews.physaphae.fr/article.php?IdArticle=4935026 False Threat None None CISCO Talos - Cisco Research blog Threat Advisory: Zero-day vulnerability in Microsoft diagnostic tool MSDT could lead to code execution 2022-06-01T06:40:40+00:00 http://blog.talosintelligence.com/2022/06/msdt-follina-coverage.html www.secnews.physaphae.fr/article.php?IdArticle=4919904 False Tool,Vulnerability None None CISCO Talos - Cisco Research blog Researcher Spotlight: Martin Lee, EMEAR lead, Talos Strategic Communications 2022-05-31T05:00:00+00:00 http://blog.talosintelligence.com/2022/05/researcher-spotlight-martin-lee-emear.html www.secnews.physaphae.fr/article.php?IdArticle=4904835 False Threat None None CISCO Talos - Cisco Research blog Threat Roundup for May 20 to May 27 2022-05-27T12:38:24+00:00 http://blog.talosintelligence.com/2022/05/threat-roundup-0520-0527.html www.secnews.physaphae.fr/article.php?IdArticle=4845098 True Threat None None CISCO Talos - Cisco Research blog Threat Source newsletter (May 26, 2022) - BlackByte adds itself to the grocery list of big game hunters 2022-05-26T10:00:00+00:00 http://blog.talosintelligence.com/2022/05/threat-source-newsletter-may-26-2022.html www.secnews.physaphae.fr/article.php?IdArticle=4823459 False Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerabilities in Open Automation Software Platform could lead to information disclosure, denial of service 2022-05-25T07:18:30+00:00 http://blog.talosintelligence.com/2022/05/vuln-spotlight-open-automation-platform.html www.secnews.physaphae.fr/article.php?IdArticle=4804734 False None None None CISCO Talos - Cisco Research blog Threat Roundup for May 13 to May 20 2022-05-20T10:26:05+00:00 http://blog.talosintelligence.com/2022/05/threat-roundup-0513-0520.html www.secnews.physaphae.fr/article.php?IdArticle=4718580 True Threat None None CISCO Talos - Cisco Research blog Threat Source newsletter (May 19, 2022) - Why I\'m missing the days of iPods and LimeWire 2022-05-19T10:00:00+00:00 http://blog.talosintelligence.com/2022/05/threat-source-newsletter-may-19-2022.html www.secnews.physaphae.fr/article.php?IdArticle=4707872 False Threat None None CISCO Talos - Cisco Research blog The BlackByte ransomware group is striking users all over the globe 2022-05-18T04:04:21+00:00 http://blog.talosintelligence.com/2022/05/the-blackbyte-ransomware-group-is.html www.secnews.physaphae.fr/article.php?IdArticle=4686881 False Ransomware None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: Multiple memory corruption vulnerabilities in NVIDIA GPU driver 2022-05-17T06:55:04+00:00 http://blog.talosintelligence.com/2022/05/vuln-spotlight-nvidia-driver-memory.html www.secnews.physaphae.fr/article.php?IdArticle=4668342 False None None None CISCO Talos - Cisco Research blog Threat Roundup for May 6 to May 13 2022-05-13T12:04:28+00:00 http://blog.talosintelligence.com/2022/05/threat-roundup-0506-0513.html www.secnews.physaphae.fr/article.php?IdArticle=4593451 True None None None CISCO Talos - Cisco Research blog EMEAR Monthly Talos Update: Wiper malware 2022-05-13T05:00:00+00:00 http://blog.talosintelligence.com/2022/05/emear-monthly-talos-update-wiper-malware.html www.secnews.physaphae.fr/article.php?IdArticle=4590682 False Malware,Threat None None CISCO Talos - Cisco Research blog Threat Source newsletter (May 12, 2022) - Mandatory MFA adoption is great, but is it too late? 2022-05-12T11:00:00+00:00 http://blog.talosintelligence.com/2022/05/threat-source-newsletter-may-12-2022.html www.secnews.physaphae.fr/article.php?IdArticle=4585493 True Threat None 3.0000000000000000 CISCO Talos - Cisco Research blog Threat Source newsletter (May 12, 2022) - Mandatory MFA adoption is great, but is it too late? 2022-05-12T10:00:00+00:00 http://blog.talosintelligence.com/2022/05/threat-source-newsletter-may-12-2022.html www.secnews.physaphae.fr/article.php?IdArticle=4664612 False Threat None None CISCO Talos - Cisco Research blog Vulnerability Spotlight: How an attacker could chain several vulnerabilities in an industrial wireless router to gain root access 2022-05-12T05:00:00+00:00 http://blog.talosintelligence.com/2022/05/blog-post-.html www.secnews.physaphae.fr/article.php?IdArticle=4583274 True None None 3.0000000000000000 CISCO Talos - Cisco Research blog Vulnerability Spotlight: How an attacker could chain several vulnerabilities in an industrial wireless router to gain root access 2022-05-12T04:00:00+00:00 http://blog.talosintelligence.com/2022/05/blog-post-.html www.secnews.physaphae.fr/article.php?IdArticle=4594121 False None None None CISCO Talos - Cisco Research blog Bitter APT adds Bangladesh to their targets 2022-05-11T05:00:11+00:00 http://blog.talosintelligence.com/2022/05/bitter-apt-adds-bangladesh-to-their.html www.secnews.physaphae.fr/article.php?IdArticle=4577486 False None None None CISCO Talos - Cisco Research blog Microsoft Patch Tuesday for May 2022 - Snort rules and prominent vulnerabilities 2022-05-10T12:31:53+00:00 http://blog.talosintelligence.com/2022/05/microsoft-patch-tuesday-for-may-2022.html www.secnews.physaphae.fr/article.php?IdArticle=4574494 False Patching None 4.0000000000000000 CISCO Talos - Cisco Research blog Talos Incident Response added to German BSI Advanced Persistent Threat response list 2022-05-10T12:07:30+00:00 http://blog.talosintelligence.com/2022/05/talos-incident-response-added-to-german.html www.secnews.physaphae.fr/article.php?IdArticle=4574496 False Threat None 3.0000000000000000 CISCO Talos - Cisco Research blog Threat Advisory: Critical F5 BIG-IP Vulnerability 2022-05-10T09:24:11+00:00 http://blog.talosintelligence.com/2022/05/threat-advisory-critical-f5-big-ip-vuln.html www.secnews.physaphae.fr/article.php?IdArticle=4573385 False Vulnerability,Guideline None 4.0000000000000000 CISCO Talos - Cisco Research blog Vulnerability Spotlight: Vulnerability in Alyac antivirus program could stop virus scanning, cause denial of service 2022-05-10T07:20:09+00:00 http://blog.talosintelligence.com/2022/05/vuln-spotlight-alyac-est.html www.secnews.physaphae.fr/article.php?IdArticle=4572821 False Vulnerability None 4.0000000000000000