@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 24

@RISK: The Consensus Security Vulnerability Alert
June 13, 2019 – Vol. 19, Num. 24
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES June 6 – 13, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Cisco Communications Manager could allow attackers to remotely execute code
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Cisco patches remote code execution vulnerability in Communications Manager
Description: Cisco disclosed, and fixed, a remote code execution bug in its Communications Manager that could allow an attacker to remotely execute code on the victim’s system. The high-severity bug requires a patch, as there are no workarounds. An attacker could exploit this vulnerability by authenticating to the targeted system using administrator-level privileges and uploading a specially crafted file.
Reference: https://threatpost.com/cisco-high-severity-bugs/145446/
Snort SIDs: 50320

Title: Multiple vulnerabilities in Schneider Electric Modicon M580
Description: There are several vulnerabilities in the Schneider Electric Modicon M580 that could lead to a variety of conditions, including denial of service and the disclosure of sensitive information. The Modicon M580 is the latest in Schneider Electric’s Modicon line of programmable automation controllers. The majority of the bugs exist in UMAS requests made while operating the hardware.
Reference: https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html
Snort SIDs: 48521 – 48528

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Mozilla plans to release a premium version of the Firefox web browser that offers its own VPN service and secure cloud storage.
https://threatpost.com/mozilla-confirms-premium-firefox-browser-with-security-features/145542/

Microsoft recently deleted a database of 10 million images that were being used to train facial recognition technology.
https://www.bbc.com/news/technology-48555149

A new campaign known as “GoldBrute” was recently discovered, in which attackers attacked more than 1 million RDP servers via brute-force attempts.
https://www.infosecurity-magazine.com/news/goldbrute-campaign-brute-forces-1/

Facebook is suspending the program that pre-installs its app onto Huawei phones.
https://www.reuters.com/article/us-huawei-tech-usa-facebook-exclusive/exclusive-facebook-suspends-app-pre-installs-on-huawei-phones-idUSKCN1T80D7

Security researchers discovered more than 40,000 Kubernetes and Docker containers that are discoverable on the internet, many of which are misconfigured in a way that exposes personal data.
https://www.computing.co.uk/ctg/news/3077030/kubernetes-docker-containers-internet-personal-data-unit42

Attackers stole more than 19 million patient records from medical record firms LabCorp and Quest Diagnostics. The breach affected a third-party billing company called American Medical Collection Agency.
https://www.engadget.com/2019/06/05/quest-diagnostics-labcorp-amca-data-breach/

MOST PREVALENT MALWARE FILES June 6 – 13, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: scan analysis
Typical Filename: wup.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 0b07f5de5985d47bc153dbeef8c2ed23316861647c35dd328a1f9d2fdd541571
MD5: 8d1551d93a1393bd7f5a0037cd3fc22c
VirusTotal: scan analysis
Typical Filename: AppxSip
Claimed Product: mofcomp
Detection Name: W32.0B07F5DE59-89.SBX.VIOC

@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 23

@RISK: The Consensus Security Vulnerability Alert
June 06, 2019 – Vol. 19, Num. 23
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES May 30 – June 6, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: WordPress plugin vulnerability used in the wild to redirect users to malicious websites
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Attackers exploit bug in popular WordPress vulnerability to inject malicious JavaScript
Description: Attackers are exploiting a recently patched bug in a WordPress plugin that allows them to redirect users to malicious sites. The vulnerability exists in the content management system’s instant chat plugin, which can allow site managers to communicate directly with users. The bug allows attackers to inject malicious JavaScript into these sites, sending them to attacker-controlled websites or displaying malicious pop-ups.
Reference: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Snort SIDs: 50299

Title: Cisco Firepower protects against encrypted attacks exploiting Microsoft RDP bug
Description: Researchers at Cisco Talos discovered a new way to protect against encrypted attacks exploiting a recently disclosed vulnerability in Microsoft RDP. Microsoft disclosed the bug in May, but did not provide any guidance on how to mitigate attacks. A new method using Cisco Firepower Management Center allows users to protect themselves from attacks that would otherwise go virtually undetected.
Reference: https://blog.talosintelligence.com/2019/05/firepower-encrypted-rdp-detection.html
Snort SIDs: 50137

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Apple unveiled a new authentication system that will allow users to log into third-party sites with their Apple ID, which the company says will make it tougher for apps to track users.
https://www.securityweek.com/apple-unveils-privacy-focused-authentication-system

Security researchers say there is no evidence that the EternalBlue NSA exploit was used in a ransomware attack on the city of Baltimore.
https://krebsonsecurity.com/2019/06/report-no-eternal-blue-exploit-found-in-baltimore-city-ransomware/

A new malware, which pulls together several open-source components, appears to have been used in several document-based attacks January through April of this year.
https://blog.talosintelligence.com/2019/06/frankenstein-campaign.html

Several American universities, foundations and retirement plans have invested in two Chinese facial recognition companies that the Chinese government is now using to surveil its citizens.
https://www.buzzfeednews.com/article/ryanmac/us-money-funding-facial-recognition-sensetime-megvii?%3Fbftw=world

The U.S. State Department is now requesting all visa applicants provide their social media account handles.
https://www.nytimes.com/2019/06/02/us/us-visa-application-social-media.html

Google is rolling out a series of new policies aimed to eliminate malicious plugins from the extensions store of its Chrome browser.
https://www.wired.com/story/google-chrome-extensions-security-changes/

MOST PREVALENT MALWARE FILES May 30 – June 6, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 144e4b5a6e99d9e89dae2ac2907c313d253878e13db86c6f5c50dae6e17a015a
MD5: 5e3b592b8e093f92ae9f6cfc93b22c58
VirusTotal: scan analysis
Typical Filename: pupdate.exe
Claimed Product: Internet Explorer
Detection Name: W32.144E4B5A6E-95.SBX.TG

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: scan analysis
Typical Filename: wup.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 22

@RISK: The Consensus Security Vulnerability Alert
May 30, 2019 – Vol. 19, Num. 22
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES May 23 -30, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Another zero-day vulnerability exposed in Internet Explorer
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Vulnerability could allow JavaScript to be injected into Internet Explorer 11
Description: Researchers uncovered another Microsoft zero-day vulnerability. One of the critical bugs could allow an attacker to inject a DLL into Internet Explorer 11. After the injection, the exploit opens a filepicker and an HTML page that contains JavaScript that executes in a lower security context. There is also a zero-day privilege escalation vulnerability in Windows Error Reporting.
Reference: https://www.bleepingcomputer.com/news/microsoft/poc-exploits-released-for-two-more-windows-vulnerabilities/
Snort SIDs: 50183, 50184

Title: Winnti malware now appears on Linux
Description: A new variant of the Winnti malware has been spotted in the wild being exploited on Linux machines. The malware acts as a backdoor for attackers. There are two different files – a main backdoor and a library that can hide the malware’s activity. Winnti’s primary role is to handle communications and deploy other modules directly from the command and control (C2) server.
Reference: https://www.scmagazine.com/home/security-news/malware/googles-chronicle-security-team-discovered-a-linux-version-of-the-winnti-malware-was-used-in-the-2015-hack-of-a-vietnamese-gaming-company/
Snort SIDs: 50164 – 50167

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Title insurance company First American Financial Corp. leaked hundreds of millions of documents related to mortgage deals dating back to 2003.
https://krebsonsecurity.com/2019/05/first-american-financial-corp-leaked-hundreds-of-millions-of-title-insurance-records/

Hackers claim to have stolen the personal data of millions of Australian graphic design startup Canva’s users.
https://www.zdnet.com/article/australian-tech-unicorn-canva-suffers-security-breach/

An estimated one million devices are still vulnerable to the wormable vulnerability that people are calling “BlueKeep,” which Microsoft disclosed earlier this month.
https://threatpost.com/one-million-devices-open-to-wormable-microsoft-bluekeep-flaw/145113/

Snapchat pushed back on a report that some of its employees used privileged access to spy on some users.
https://www.infosecurity-magazine.com/news/snapchat-claims-of-employees-1/

The U.S. charged WikiLeaks founder Julian Assange with 17 criminal charges for soliciting, receiving and publishing national secrets.
https://www.buzzfeednews.com/article/zoetillman/julian-assange-wikileaks-new-charges-us

A phony, malicious app on the Google Play store that steals users’ cryptocurrencies was downloaded more than 1,000 times before being removed recently.
https://techcrunch.com/2019/05/23/cryptocurrency-stealing-android-app/

Several lawmakers are upset that a former NSA hacking tool is behind several cyberattacks against American cities, most recently Baltimore. However, many researchers say it is on end-users to patch their machines and protect them from these kinds of vulnerabilities.
https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/05/28/the-cybersecurity-202-security-pros-divided-over-nsa-s-responsibility-for-baltimore-hack/5cec79771ad2e52231e8e80f/

MOST PREVALENT MALWARE FILES May 23 – 30, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: f08f4374674a8993ddaf89dcaf216bc6952d211763b8489366b0835f0eda1950
MD5: b9a5e492a6c4dd618613b1a2a9c6a4fb
VirusTotal: scan analysis
Typical Filename: maf-task.zip
Claimed Product: N/A
Detection Name: PUA.Osx.Adware.Gt32supportgeeks::221862.in02

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: scan analysis
Typical Filename: wup.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

Wildcard SSL