@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 01

@RISK: The Consensus Security Vulnerability Alert
January 03, 2019 – Vol. 19, Num. 01
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES December 27, 2018 – January 3, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Adobe schedules patches for Acrobat, Reader
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Adobe alerts customers of incoming patches for Acrobat, Reader
Description: Adobe planned to release security updates for Acrobat and Reader on Jan. 3, according to an advisory on Dec. 27. All of the vulnerabilities are considered important.
Reference: https://helpx.adobe.com/security/products/acrobat/apsb19-02.html
Snort SIDs: 48709 – 48712, 48703 – 48706

Title: Attackers leverage Brexit talks to deliver malware
Description: Security researchers believe attackers could leverage negotiations between the U.K. and European Union to deliver phishing emails. In one recent campaign, attackers pretended to be the Polish government to deliver the Zekapab malware via malicious emails. As the deadline for the two sides to reach an agreement approaches, these kinds of attacks could spike.
Reference: https://www.itpro.co.uk/security/32560/spike-in-brexit-themed-phishing-attacks-expected-once-withdrawal-agreement-is
Snort SIDs: 48732

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

A national cyberattack that hit U.S. newspaper publishers this week slowed down many of their printing schedules.
https://www.theguardian.com/technology/2018/dec/30/cyber-attack-disrupts-printing-of-major-us-newspapers

The U.S. says it is investigating a nationwide CenturyLink internet outage that led to the failure of some 911 services.
https://www.apnews.com/1454add5707d41118930e49ae5752f11

Hackers stole 10 years worth of personal data from a San Diego school district through a phishing campaign.
https://www.zdnet.com/article/hacker-steals-10-years-worth-of-data-from-san-diego-school-district/

Twitter says it fixed a bug that could allow attackers to post unauthorized tweets to some accounts though the original discoverers say that’s not the case.
https://gizmodo.com/twitter-hackers-hijacked-new-accounts-after-company-cla-1831369315

U.S. President Donald Trump is reportedly considering new executive orders that would ban American companies from using Huawei and ZTE products.
https://www.reuters.com/article/us-usa-china-huawei-tech-exclusive/exclusive-white-house-mulls-new-year-executive-order-to-bar-huawei-zte-purchases-idUSKCN1OQ09P

Apple scrambled to remove a fake Amazon app that claimed to help users set up their Alexa systems that rose up the app store’s charts.
https://9to5mac.com/2018/12/27/fake-amazon-alexa-app-psa/

MOST PREVALENT MALWARE FILES December 27, 2018 – January 3, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: virus analysis
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: virus analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 709a7dd743ca6a688ee0afc9a67a04c73c4f6fb6559cde2bafadbb5af58f043b
MD5: 59a06d7e48fd3d80fa2dc1cb859b45cc
VirusTotal: virus analysis
Typical Filename: helperamc
Claimed Product: Advanced Mac Cleaner
Detection Name: OSX.709A7DD743.agent.tht.Talos

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: virus analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
VirusTotal: virus analysis
Typical Filename: eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.GenericKD:WNCryLdrA.21lx.1201

@RISK: The Consensus Security Vulnerability Alert: Vol. 18, Num. 52

@RISK: The Consensus Security Vulnerability Alert
December 27, 2018 – Vol. 18, Num. 52
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES December 20 – 27, 2018
=========================================================
TOP VULNERABILITY THIS WEEK: Microsoft releases out-of-band update for Internet Explorer
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Microsoft releases out-of-band patch for Internet Explorer
Description: Microsoft released an out-of-band (OOB) patch on Wednesday related to a vulnerability in the scripting engine of Internet Explorer. This particular vulnerability is believed to be actively exploited in the wild and should be patched immediately.
Reference: https://blog.talosintelligence.com/2018/12/MS-OOB-IE-Scripting-Engine-Vuln.html
Snort SIDs: 48699 – 48702

Title: Privilege escalation vulnerability in Cisco Adaptive Security Appliance software
Description: Cisco disclosed a privilege escalation vulnerability in Cisco Adaptive Security Appliance software that could allow an attacker to perform privileged actions by using the web management interface. The vulnerability lies in the way the software improperly validates user privileges when using the web management interface.
Reference: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181219-asa-privesc
Snort SIDs: 48644

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

NASA reveals hackers breached one of their servers containing employees’ personal information earlier this year.
https://www.cnet.com/news/nasa-reveals-data-breach-in-internal-memo/

Amazon inadvertently sent more than 1,700 voice recordings of random people to a man in Germany after the submitted a GDPR request to the company.
https://threatpost.com/amazon-1700-alexa-voice-recordings/140201/

Caribou Coffee says 256 of its stores were targeted in a cyberattack for months in an effort to steal customers’ credit card information.
http://www.startribune.com/caribou-coffee-notifies-customers-of-data-breach/503268372/

The U.S. charged two Chinese hackers with data theft in 12 different countries.
https://www.washingtonpost.com/world/national-security/us-and-more-than-a-dozen-allies-to-condemn-china-for-economic-espionage/2018/12/20/cdfd0338-0455-11e9-b5df-5d3874f1ac36_story.html

The U.S. imposed another round of sanctions on Russia for meddling in the 2016 presidential election.
https://www.reuters.com/article/us-usa-russia-sanctions-treasury/us-imposes-fresh-russia-related-sanctions-treasury-idUSKCN1OI27F

MOST PREVALENT MALWARE FILES December 20 – 27, 2018
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 709a7dd743ca6a688ee0afc9a67a04c73c4f6fb6559cde2bafadbb5af58f043b
MD5: 59a06d7e48fd3d80fa2dc1cb859b45cc
VirusTotal: scan analysis
Typical Filename: helperamc
Claimed Product: Advanced Mac Cleaner
Detection Name: OSX.709A7DD743.agent.tht.Talos

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: c5cbcbada7c462cf89255f54fdbe955e2ad1149128bfe3fdd1db4dfe234fec8e
MD5: d2317379a712d38942db74c6b38aba6f
VirusTotal: scan analysis
Typical Filename: correctiron.exe
Claimed Product: Musthow
Detection Name: W32.Auto:c5cbcb.in03.Talos

@RISK: The Consensus Security Vulnerability Alert: Vol. 18, Num. 51

@RISK: The Consensus Security Vulnerability Alert
December 20, 2018 – Vol. 18, Num. 51
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES December 13 – 20, 2018
=========================================================
TOP VULNERABILITY THIS WEEK: WordPress patches severe security vulnerabilities in latest update
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: WordPress 5.0.1 fixes several security bugs
Description: WordPress released its latest update, which fixes a number of security vulnerabilities that are considered serious. The most serious flaw allowed the content management system’s “user activation screen” to be indexed by Google, which could lead to some users’ login information to become publicly visible. WordPress also warned users about unauthorized file deletion bug and unauthorized post creation bugs.
Reference: https://threatpost.com/wordpress-5-0-patched-to-fix-serious-bugs/139948/
Snort SIDs: 48573

Title: Adobe discloses 86 vulnerabilities in Reader, Acrobat
Description: Coverage continues to come in for the slew of bugs that Adobe patched in its monthly security update. The latest release covers 86 vulnerabilities in Adobe Reader and Acrobat DC. The bugs include two buffer overflow errors, five out-of-bounds write vulnerabilities and 23 use-after-free vulnerabilities, among others.
Reference: https://latesthackingnews.com/2018/12/15/adobe-december-patch-tuesday-fixed-38-critical-vulnerabilities-in-adobe-reader-and-acrobat-dc/
Snort SIDs: 48622 – 48630, 48636, 48637

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Smartphone apps are collecting more users’ location data than they let on, and often sell that information to advertisers and even hedge funds.
https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html

Facebook disclosed a bug that allowed app developers to view users’ photos that they uploaded to Facebook but never shared on their timeline.
https://techcrunch.com/2018/12/14/facebook-photo-bug/

Credit reporting agency Experian mistakenly exposed customer data in its training manuals, documents that have since been taken down.
https://motherboard.vice.com/en_us/article/zmdg7e/experian-exposes-customer-data-training-manuals-credit-score

Attackers from the Iranian APT group Charming Kitten attempted to break into the emails of several high-profile U.S. Treasury Department officials, as well as individuals in charge of enforcing nuclear sanctions on Iran.
https://apnews.com/7f4d814ebf0642b4b381fd9ce01345f7

Android’s facial recognition technology on its smartphones can be tricked by a 3-D printed head.
https://www.forbes.com/sites/thomasbrewster/2018/12/13/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head/#12d7fe361330

Former U.S. Secretary of State John Kerry confirmed that Russia was behind a cyberattack on the State Department in 2014.
https://www.npr.org/templates/transcript/transcript.php?storyId=644830886

MOST PREVALENT MALWARE FILES December 13 – 20, 2018
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: fc62d76945faed86fc11454c8ae1ecc3e8cbb449b8466c7f5aaa9bf45af9730c
MD5: 1f4ab214b36d80c07898cf1a9efe7d6e
VirusTotal: scan analysis
Typical Filename: MSVSBP20.DLL
Claimed Product: Microsoft® Win
Detection Name: W32.FC62D76945-100.SBX.TG

SHA 256: 709a7dd743ca6a688ee0afc9a67a04c73c4f6fb6559cde2bafadbb5af58f043b
MD5: 59a06d7e48fd3d80fa2dc1cb859b45cc
VirusTotal: scan analysis
Typical Filename: helperamc
Claimed Product: Advanced Mac Cleaner
Detection Name: OSX.709A7DD743.agent.tht.Talos

SHA 256: e856c759e2dd2e637aaebbfc0eeea4a7f8e7c7a02967b4db2e88dc8914b5b296
MD5: c76517dc654e6852eae9f2f42a630470
VirusTotal: scan analysis
Typical Filename: maftask.zip
Claimed Product: N/A
Detection Name: OSX.E856C759E2.agent.tht.Talos

SHA 256: e5f1609df4f67e0e23f3b3409f265722692e5e15a6349bf1157d36b79c5acf9d
MD5: c9636e35954360b7b1375ee615ba6c24
VirusTotal: scan analysis
Typical Filename: 3dfx32v2.dll
Claimed Product: Voodoo2® DirectX for Windows® 95
Detection Name: W32.Auto:e5f160.in03.Talos

Wildcard SSL