NATIONAL KE-CIRT/CC CYBERSECURITY UPDATES - 6th January 2020 - National KE ...
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Summary Impact Metric Against Count of Events
Headlines
Critical High Medium Informative
Regional Highlights 0 0 0 1
Top Stories 0 0 0 2
System 0 2 0 2
vulnerabilities
Malware 0 3 0 0
DDoS/Botnets 0 1 0 0
Spam & phishing 0 2 0 0
Web Security 0 2 0 0
Updates & alerts 1 3 2 0Source 1: Standard Digital ( https://www.standardmedia.co.ke/ )
Regional https://www.standardmedia.co.ke/business/article/2001355350/google-denies-xiaomi-access-
Highlights over-security-bug
Impact value: Informative
Google bars Chinese firm Xiaomi over security bug. Google has revoked a Chinese tech giant’s
access rights after a user was able to view the feed from a stranger’s security cameras on his
device.Source 1: The Washington Post ( https://www.washingtonpost.com/ )
https://www.washingtonpost.com/technology/2020/01/03/cyber-attack-should-be-expected-us-
strike-iranian-leader-sparks-fears-major-digital-disruption/
Impact value: Informative
‘A cyberattack should be expected’: U.S. strike on Iranian leader sparks fears of major digital
disruption. US Government fears a new wave of cyber attacks from Iran as retaliation for the
airstrike that killed Maj. Gen. Qassim Suleimani at the Baghdad airport in Iraq.
Top Stories
Source 2: Yahoo News ( https://sg.news.yahoo.com/ )
https://sg.news.yahoo.com/chinese-scientists-develop-portable-quantum-
144357951.html?guccounter=1&guce_referrer=aHR0cHM6Ly9jeXdhcmUuY29tL2N5YmVyLXNlY3
VyaXR5LW5ld3MtYXJ0aWNsZXM_cD0y&guce_referrer_sig=AQAAABYH6ijo_Qewne2jP3Idxov-
xYmeo3QiS76QZtCh7oxCBagXVvqzX4Iz9cEkelQMwSaBiaFHSmubVoTGbMmKHHY5GnNDaUbkevu
g6gkWfHiaWWUYFIIF9XOfgkFjbGw4RRzNAuO4A-dHuZBe-d0q5TtTpO8htLsg_Wcke7Hu5XZ5
Impact value: Informative
Portable quantum satellite communication device. Chinese scientists have developed a quantum
satellite ground station that is not only capable of sending ultra-secure messages anywhere in
the world but also fits inside a family car.Source 1: Health IT Security ( https://healthitsecurity.com/ )
Impact value: High
https://healthitsecurity.com/news/new-mexico-hospital-finds-malware-infection-on-digital-
imaging-server
New Mexico Hospital Finds Malware Infection on Digital Imaging Server. The healthcare data of
500 patients of Roosevelt General Hospital was exposed due to a malware infection. The
potentially compromised data included the patient’s name, contact information, Social Security
number, date of birth, driver’s license, medical data, gender, and health insurance detail. Upon
discovery, the officials had removed the malware and rebuilt the server, while recovering all
impacted patient data.
Source 2: Tech Crunch ( https://techcrunch.com/ )
Impact value: High
System
https://techcrunch.com/2020/01/02/travelex-malware/
vulnerabilities Travelex suspends services after malware attack. London-based currency exchange Travelex has
been forced to go offline and suspend some services following a malware attack launched on
New Year’s eve. It is not known what form of malware has impacted the firm. The incident has
also affected some of its clients like Tesco Bank.
Source 3: Security Affairs ( https://securityaffairs.co/ )
Impact value: Informative
https://securityaffairs.co/wordpress/95913/hacking/d-link-routers-flaws.html
Remote Command Execution and Information disclosure flaws affect dozens of D-Link routers.
Experts have disclosed exploits for remote command execution and information disclosure
vulnerabilities affecting many D-Link routers. The RCE flaw is tracked as CVE-2019-17621 and
resides in the code used to manage UPnP requests. The vulnerability could be exploited by an
unauthenticated attacker to take control of vulnerable devices. D-Link has issued firmware
updates to address the vulnerabilities.Source 4: Talos Intelligence ( https://blog.talosintelligence.com/ )
Impact value: Informative
System https://blog.talosintelligence.com/2020/01/opencv-buffer-overflow-jan-2020.html
Vulnerability Spotlight: Two buffer overflow vulnerabilities in OpenCV. Two buffer overflow
vulnerabilities
vulnerabilities have been discovered in the OpenCV libraries. An attacker could potentially
exploit these bugs to cause heap corruptions and potentially code execution. A patch to address
these issues has been released by the OpenCV.Source 1: Security Affairs ( https://securityaffairs.co/ )
https://securityaffairs.co/wordpress/96017/malware/sodinokibi-ransomware-attack.html
Impact value: High
California IT service provider Synoptek pays ransom after Sodinokibi attack. Synoptek, A
California-based IT service provider decided to pay the ransom to decrypt its files after being
infected with the Sodinokibi ransomware.
Source 2: Fortinet ( https://www.fortinet.com/ )
https://www.fortinet.com/blog/threat-research/death-ransom-new-strain-ransomware.html
Impact value: High
The Curious Case of DeathRansom: Part I. Extensive research has revealed that DeathRansom
Malware ransomware is controlled by attackers that are associated with the spread of other malware
families such as Vidar Stealer, AzoRult, Eviral, 1ms0rry, and Supreme miner. It is found that
these attackers use Russian email service and Russian domain zone “.ru”. The ransomware
scans and encrypts files on local and network drives.
Source 3: Malwarebytes Labs ( https://blog.malwarebytes.com/ )
https://blog.malwarebytes.com/threat-analysis/2019/12/new-evasion-techniques-found-in-
web-skimmers/
Impact value: High
New evasion techniques found in web skimmers. Cybercriminals have found new evasion
techniques to prevent their web skimmers from being detected in online retail shops. This
includes the use of Steganography and WebSocket communication protocol. This makes it
difficult for web crawlers and scanners to detect the malicious JavaScript code injected into
the sites.Source 1: CYWARE ( https://cyware.com/news/ )
https://cyware.com/news/bluehero-botnet-found-scanning-the-internet-to-infect-systems-
with-xmrig-miner-and-gh0st-rat-cfc3d7d9
Impact value: High
BlueHero botnet found scanning the internet to infect systems with XMRig miner and Gh0st
DDoS/Botnets RAT. BlueHero botnet derives its name from the domain bluehero[.]in found in its binary. The
botnet leverages a variety of web exploits to intrude into unpatched web servers. It also
contains several other exploits to spread across the network. To initiate the infection process,
the botnet actively scans for IP addresses with ports 80 and 3389. It then uses Mimikatz to
dump passwords from infected hosts into a Results.txt file.
Source 1: CYWARE ( https://cyware.com/news/ )
Impact value: High
https://cyware.com/news/cybercriminals-adopt-steganography-based-credit-card-skimmer-to-
Spam & steal-payment-card-details-93b72efd
Phishing Cybercriminals Adopt Steganography-based Credit Card Skimmer to Steal Payment Card Details.
Threat actors are particularly using WebSockets to provide a more covert way to exchange data
\\\\\\\\\
than typical HTTP request-responses. When the malicious JavaScript code runs in the browser,
it triggers a client handshake request. Once this is established, a series of bidirectional
messages are exchanged between the victim’s browser and malicious host. These messages
also include the credit card skimming code.Impact value: High
Spam & https://cyware.com/news/scammers-made-nearly-405-million-from-military-personnel-and-
Phishing veterans-since-2012-686eeee1
Scammers Made Nearly $405 Million From\\\\\\\\\
Military Personnel and Veterans Since 2012. Nearly 1
million military personnel and veterans have been duped of $405 million in different scams
since 2012, according to a new report analyzed by the Federal Trade Commission (FTC) and
Better Business Bureau.
Source 1: CNN ( https://edition.cnn.com/ )
https://edition.cnn.com/2020/01/04/politics/dhs-hack-website-trump-trnd/index.html
Impact value: High
DHS monitoring apparent hack of government library program website. A group of alleged
Iranian hackers claims to have breached the website of a US government agency, Federal
Web Security Depository Library Program, on Saturday after the killing of Qasem Soleimani.
Source 2: Security Affairs ( https://securityaffairs.co/ )
https://securityaffairs.co/wordpress/95879/cyber-crime/star-wars-saga-cyber-attacks.html
Impact value: High
Crooks use Star Wars saga as bait in Phishing and malware attacks. Crooks are exploiting the
popularity of the Star War saga to lure users into downloading malware. In order to make this
happen, cybercriminals have flooded social networks and the internet with rogue websites and
files offering previews of the ‘The Rise of Skywalker’ movie and free steams. Kaspersky experts
have discovered over 30 fake and infected streaming sites advertised on social networking
pages.Source 1: US-CERT - Security Bulletin Mailing List ( http://www.us-cert.gov/cas/bulletins/ )
https://www.us-cert.gov/ncas/bulletins/sb19-364
Vulnerability Summary for the Week of December 23, 2019. Recorded by National Institute of Standards and
Technology and National Vulnerability.
Source 2: Oracle Security Bulletins ( http://www.oracle.com/technetwork/topics/security/alerts-
086861.html )
https://www.oracle.com/security-alerts/cpuoct2019.html
Oracle Critical Patch Update Advisory - October 2019; advised action to run available security updates.
https://www.oracle.com/security-alerts/alert-cve-2019-2729.html
Bulletins Oracle Security Alert Advisory - CVE-2019-2729. Decentralization vulnerability in Oracle WebLogic Server
exploitable without authentication requirements; advised action to run security updates.
https://www.oracle.com/security-alerts/bulletinoct2019.html
Oracle Solaris Third Party Bulletin - October 2019; advised action to apply necessary patches.
https://www.oracle.com/security-alerts/linuxbulletinoct2019.html
Oracle Linux Bulletin - October 2019; advised action to apply necessary Oracle Linux Bulletin fixes.
https://www.oracle.com/security-alerts/public-vuln-to-advisory-mapping.html
Map of CVE to Advisory/Alert; advised action to apply the critical patch update for protection against known
vulnerabilities.
https://www.oracle.com/security-alerts/ovmbulletinoct2019.html
Oracle VM Server for x86 Bulletin - October 2019; advised action to apply necessary Oracle VM Server for x86
Bulletin fixes.Source 1: Cisco Security Advisories &
Alerts(http://tools.cisco.com/security/center/publicationListing.x )
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
auth-bypass
Impact value: Critical
Cisco Data Center Network Manager Authentication Bypass Vulnerabilities. Due to multiple
vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM), a
remote attacker could bypass authentication and execute arbitrary actions with administrative
privileges on an affected device.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-
inject
Updates &
Alerts Impact value: High
Cisco Data Center Network Manager SQL Injection Vulnerabilities. Due to multiple vulnerabilities in
the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM), a remote attacker
could execute arbitrary SQL commands on an affected device.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
path-trav
Impact value: High
Cisco Data Center Network Manager Path Traversal Vulnerabilities. Due to multiple vulnerabilities in
the REST and SOAP API endpoints and the Application Framework feature of Cisco Data Center
Network Manager (DCNM), a remote attacker could conduct directory traversal attacks on an affected
device.https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
comm-inject
Impact value: High
Cisco Data Center Network Manager Command Injection Vulnerabilities. Due to multiple
vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM), a
remote attacker with administrative privileges on the DCNM application could inject arbitrary
commands on the underlying operating system (OS).
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-xml-
ext-entity
Updates &
Impact value: Medium
Alerts
Cisco Data Center Network Manager XML External Entity Read Access Vulnerability. Due to improper
handling of XML External Entity (XXE) entries when parsing certain XML files in the SOAP API, a
remote attacker could gain read access to information that is stored on an affected system.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
unauth-access
Impact value: Medium
Cisco Data Center Network Manager JBoss EAP Unauthorized Access Vulnerability. Due to an incorrect
configuration of the authentication settings on the JBoss Enterprise Application Platform (JBoss EAP),
remote attacker could gain unauthorized access to the JBoss EAP.www.ke-cirt.go.ke
You can also read