End-of-Day report
Timeframe: Dienstag 12-11-2024 18:00 - Mittwoch 13-11-2024 18:00
Handler: Alexander Riepl
Co-Handler: n/a
News
Itsmydata: Hackerin veröffentlicht erneut Bonitätsdaten von Jens Spahn
Erst über Bonify, nun über Itsmydata: Lilith Wittmann hat sich mal wieder Bonitätsdaten von Jens Spahn beschafft. Immerhin hat sich sein Score verbessert.
https://www.golem.de/news/itsmydata-hackerin-veroeffentlicht-erneut-bonitaetsdaten-von-jens-spahn-2411-190751.html
Threats in space (or rather, on Earth): internet-exposed GNSS receivers
Internet-exposed GNSS receivers pose a significant threat to sensitive operations. Kaspersky shares statistics on internet-exposed receivers for July 2024 and advice on how to protect against GNSS attacks.
https://securelist.com/internet-exposed-gnss-receivers-in-2024/114548/
Chinas Volt Typhoon crew and its botnet surge back with a vengeance
Ohm, for flux sake Chinas Volt Typhoon crew and its botnet are back, compromising old Cisco routers once again to break into critical infrastructure networks and kick off cyberattacks, according to security researchers.
https://www.theregister.com/2024/11/13/china_volt_typhoon_back/
Stromanbieter Tibber gehackt, 50.000 deutsche Kunden betroffen
Tibber bestätigt, dass Hacker eingedrungen sind und Kundendaten an sich gebracht haben. Im Darknet werden diese nun verkauft.
https://www.heise.de/news/Stromanbieter-Tibber-gehackt-50-000-deutsche-Kunden-betroffen-10030864.html
Sicherheitsupdates: Zoom Room Client & Co. angreifbar
Die Entwickler rüsten verschiedene Zoom-Apps gegen mögliche Angriffe. Davon sind unter anderem macOS und Windows betroffen.
https://www.heise.de/news/Sicherheitsupdates-Zoom-Room-Client-Co-angreifbar-10031648.html
Global Companies Are Unknowingly Paying North Koreans: Here-s How to Catch Them
We discuss North Koreas use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to counter this.
https://unit42.paloaltonetworks.com/north-korean-it-workers/
The November 2024 Security Update Review
It-s not quite the holiday season, despite what some early decorators will have you believe. It is the second Tuesday of the month, and that means Adobe and Microsoft have released their regularly scheduled updates. Take a break from your regular activities and join us as we review the details of their latest security alerts.If you-d rather watch the ..
https://www.thezdi.com/blog/2024/11/12/the-november-2024-security-update-review
How Italy became an unexpected spyware hub
Italy is home to six major spyware vendors and one supplier, with many smaller and harder-to-track enterprises emerging all the time, experts say.
https://therecord.media/how-italy-became-an-unexpected-spyware-hub
Germany warns of potential cyber threats from Russia ahead of snap election
-We must be especially prepared against threats like hacker attacks, manipulation, and disinformation," German Interior Minister Nancy Faeser said.
https://therecord.media/germany-cyber-threats-russia-elections
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions
Trend Micros Threat Hunting Team has observed EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity.
https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html
Bitdefender Finds New ShrinkLocker Ransomware, Releases Its Decryptor Tool
Bitdefender has released a free decryptor for ShrinkLocker ransomware, which exploits Windows BitLocker to encrypt ..
https://hackread.com/bitdefender-shrinklocker-ransomware-decryptor-tool/
Emerging Threats: Cybersecurity Forecast 2025
Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission.This year-s report draws on insights directly from Google ..
https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2025/
Defending Your Directory: An Expert Guide to Fortifying Active Directory Certificate Services (ADCS) Against Exploitation
In our latest technical blog series, our DFIR team are highlighting the most prominent Active Directory (AD) threats, describing the tell-tale signs that your AD might be at risk, and give experienced insight into the best prevention and mitigation strategies to shore up your AD security and bolster your digital identity protection.
https://www.nccgroup.com/us/research-blog/defending-your-directory-an-expert-guide-to-fortifying-active-directory-certificate-services-adcs-against-exploitation/
Making Sense of Kubernetes Initial Access Vectors Part 1 - Control Plane
Explore Kubernetes control plane access vectors, risks, and security strategies to prevent unauthorized access and protect your clusters from potential threats.
https://www.wiz.io/blog/making-sense-of-kubernetes-initial-access-vectors-part-1-control-plane
Time Boxed Penetration Testing for Web Applications
This article defines time boxed penetration testing and explains how it-s approached from a methodological standpoint. By focusing on high-risk areas, client-specific priorities, and sampling, time boxed testing can deliver efficient assessments within a limited timeframe.
https://projectblack.io/blog/time-boxed-penetration-testing/
Killing Filecoin nodes
By Simone Monica In January, we identified and reported a vulnerability in the Lotus and Venus clients of the Filecoin network that allowed an attacker to remotely crash a node and trigger a denial of service. This issue is ..
https://blog.trailofbits.com/2024/11/13/killing-filecoin-nodes/
Fault Injection - Down the Rabbit Hole
This series of articles describes fault injection attack techniques in order to understand their real potential by testing their limits and applicability with limited hardware (available on the market at an acceptable cost). It explores possible ways of using an attack that, in my opinion, is greatly underestimated.
https://security.humanativaspa.it/fault-injection-down-the-rabbit-hole/
Vulnerabilities
Security updates for Wednesday
Security updates have been issued by AlmaLinux (expat), Fedora (chromium and golang-github-nvidia-container-toolkit), Mageia (curl, expat, mpg123, networkmanager-libreswan, openssl, php-tcpdf, qbittorrent, and x11-server, x11-server-xwayland, and tigervnc), Red Hat (kernel and libsoup), Slackware (mozilla), SUSE (firefox, kernel, python-PyPDF2, and xen), and Ubuntu (dotnet9, ghostscript, linux-aws, linux-oem-6.8, and pydantic).
https://lwn.net/Articles/998044/
ZDI-24-1472: Veeam Backup Enterprise Manager AuthorizeByVMwareSsoToken Improper Certificate Validation Authentication Bypass Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-24-1472/
ZDI-24-1486: (0Day) G DATA Total Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-24-1486/
Critical Security Vulnerabilities Discovered in MZ Automation-s MMS Client
https://encs.eu/news/critical-security-vulnerabilities-discovered-in-mz-automations-mms-client/
Online Installer DLL Hijacking
https://fortiguard.fortinet.com/psirt/FG-IR-24-205
Fortinet Releases Security Updates for Multiple Products
https://www.cisa.gov/news-events/alerts/2024/11/12/fortinet-releases-security-updates-multiple-products