NATIONAL KE-CIRT/CC CYBERSECURITY UPDATES - 6th January 2020 - National KE ...

Page created by Melvin Curry
 
CONTINUE READING
NATIONAL KE-CIRT/CC CYBERSECURITY UPDATES - 6th January 2020 - National KE ...
NATIONAL KE-CIRT/CC CYBERSECURITY UPDATES
             6th January 2020
NATIONAL KE-CIRT/CC CYBERSECURITY UPDATES - 6th January 2020 - National KE ...
Summary               Impact Metric Against Count of Events
Headlines
                      Critical   High    Medium        Informative
Regional Highlights       0         0         0               1
Top Stories               0         0         0               2
System                    0         2         0               2
vulnerabilities
Malware                   0         3         0               0
DDoS/Botnets              0         1         0               0
Spam & phishing           0         2         0               0
Web Security              0         2         0               0
Updates & alerts          1         3         2               0
NATIONAL KE-CIRT/CC CYBERSECURITY UPDATES - 6th January 2020 - National KE ...
Source 1: Standard Digital ( https://www.standardmedia.co.ke/ )
Regional     https://www.standardmedia.co.ke/business/article/2001355350/google-denies-xiaomi-access-
Highlights   over-security-bug
             Impact value: Informative
             Google bars Chinese firm Xiaomi over security bug. Google has revoked a Chinese tech giant’s
             access rights after a user was able to view the feed from a stranger’s security cameras on his
             device.
Source 1: The Washington Post ( https://www.washingtonpost.com/ )
              https://www.washingtonpost.com/technology/2020/01/03/cyber-attack-should-be-expected-us-
              strike-iranian-leader-sparks-fears-major-digital-disruption/
              Impact value: Informative
              ‘A cyberattack should be expected’: U.S. strike on Iranian leader sparks fears of major digital
              disruption. US Government fears a new wave of cyber attacks from Iran as retaliation for the
              airstrike that killed Maj. Gen. Qassim Suleimani at the Baghdad airport in Iraq.
Top Stories
              Source 2: Yahoo News ( https://sg.news.yahoo.com/ )
              https://sg.news.yahoo.com/chinese-scientists-develop-portable-quantum-
              144357951.html?guccounter=1&guce_referrer=aHR0cHM6Ly9jeXdhcmUuY29tL2N5YmVyLXNlY3
              VyaXR5LW5ld3MtYXJ0aWNsZXM_cD0y&guce_referrer_sig=AQAAABYH6ijo_Qewne2jP3Idxov-
              xYmeo3QiS76QZtCh7oxCBagXVvqzX4Iz9cEkelQMwSaBiaFHSmubVoTGbMmKHHY5GnNDaUbkevu
              g6gkWfHiaWWUYFIIF9XOfgkFjbGw4RRzNAuO4A-dHuZBe-d0q5TtTpO8htLsg_Wcke7Hu5XZ5
              Impact value: Informative
              Portable quantum satellite communication device. Chinese scientists have developed a quantum
              satellite ground station that is not only capable of sending ultra-secure messages anywhere in
              the world but also fits inside a family car.
Source 1: Health IT Security ( https://healthitsecurity.com/ )
                  Impact value: High
                  https://healthitsecurity.com/news/new-mexico-hospital-finds-malware-infection-on-digital-
                  imaging-server
                  New Mexico Hospital Finds Malware Infection on Digital Imaging Server. The healthcare data of
                  500 patients of Roosevelt General Hospital was exposed due to a malware infection. The
                  potentially compromised data included the patient’s name, contact information, Social Security
                  number, date of birth, driver’s license, medical data, gender, and health insurance detail. Upon
                  discovery, the officials had removed the malware and rebuilt the server, while recovering all
                  impacted patient data.
                  Source 2: Tech Crunch ( https://techcrunch.com/ )
                  Impact value: High
   System
                  https://techcrunch.com/2020/01/02/travelex-malware/
vulnerabilities   Travelex suspends services after malware attack. London-based currency exchange Travelex has
                  been forced to go offline and suspend some services following a malware attack launched on
                  New Year’s eve. It is not known what form of malware has impacted the firm. The incident has
                  also affected some of its clients like Tesco Bank.
                  Source 3: Security Affairs ( https://securityaffairs.co/ )
                  Impact value: Informative
                  https://securityaffairs.co/wordpress/95913/hacking/d-link-routers-flaws.html
                  Remote Command Execution and Information disclosure flaws affect dozens of D-Link routers.
                  Experts have disclosed exploits for remote command execution and information disclosure
                  vulnerabilities affecting many D-Link routers. The RCE flaw is tracked as CVE-2019-17621 and
                  resides in the code used to manage UPnP requests. The vulnerability could be exploited by an
                  unauthenticated attacker to take control of vulnerable devices. D-Link has issued firmware
                  updates to address the vulnerabilities.
Source 4: Talos Intelligence ( https://blog.talosintelligence.com/ )
                  Impact value: Informative
   System         https://blog.talosintelligence.com/2020/01/opencv-buffer-overflow-jan-2020.html
                  Vulnerability Spotlight: Two buffer overflow vulnerabilities in OpenCV. Two buffer overflow
vulnerabilities
                  vulnerabilities have been discovered in the OpenCV libraries. An attacker could potentially
                  exploit these bugs to cause heap corruptions and potentially code execution. A patch to address
                  these issues has been released by the OpenCV.
Source 1: Security Affairs ( https://securityaffairs.co/ )
          https://securityaffairs.co/wordpress/96017/malware/sodinokibi-ransomware-attack.html
          Impact value: High
          California IT service provider Synoptek pays ransom after Sodinokibi attack. Synoptek, A
          California-based IT service provider decided to pay the ransom to decrypt its files after being
          infected with the Sodinokibi ransomware.

          Source 2: Fortinet ( https://www.fortinet.com/ )
          https://www.fortinet.com/blog/threat-research/death-ransom-new-strain-ransomware.html
          Impact value: High
          The Curious Case of DeathRansom: Part I. Extensive research has revealed that DeathRansom
Malware   ransomware is controlled by attackers that are associated with the spread of other malware
          families such as Vidar Stealer, AzoRult, Eviral, 1ms0rry, and Supreme miner. It is found that
          these attackers use Russian email service and Russian domain zone “.ru”. The ransomware
          scans and encrypts files on local and network drives.

          Source 3: Malwarebytes Labs ( https://blog.malwarebytes.com/ )
          https://blog.malwarebytes.com/threat-analysis/2019/12/new-evasion-techniques-found-in-
          web-skimmers/
          Impact value: High
          New evasion techniques found in web skimmers. Cybercriminals have found new evasion
          techniques to prevent their web skimmers from being detected in online retail shops. This
          includes the use of Steganography and WebSocket communication protocol. This makes it
          difficult for web crawlers and scanners to detect the malicious JavaScript code injected into
          the sites.
Source 1: CYWARE ( https://cyware.com/news/ )
                 https://cyware.com/news/bluehero-botnet-found-scanning-the-internet-to-infect-systems-
                 with-xmrig-miner-and-gh0st-rat-cfc3d7d9
                 Impact value: High
                 BlueHero botnet found scanning the internet to infect systems with XMRig miner and Gh0st
DDoS/Botnets     RAT. BlueHero botnet derives its name from the domain bluehero[.]in found in its binary. The
                 botnet leverages a variety of web exploits to intrude into unpatched web servers. It also
                 contains several other exploits to spread across the network. To initiate the infection process,
                 the botnet actively scans for IP addresses with ports 80 and 3389. It then uses Mimikatz to
                 dump passwords from infected hosts into a Results.txt file.

               Source 1: CYWARE ( https://cyware.com/news/ )
               Impact value: High
               https://cyware.com/news/cybercriminals-adopt-steganography-based-credit-card-skimmer-to-
 Spam &        steal-payment-card-details-93b72efd
 Phishing      Cybercriminals Adopt Steganography-based Credit Card Skimmer to Steal Payment Card Details.
               Threat actors are particularly using WebSockets to provide a more covert way to exchange data
                                                        \\\\\\\\\
               than typical HTTP request-responses. When the malicious JavaScript code runs in the browser,
               it triggers a client handshake request. Once this is established, a series of bidirectional
               messages are exchanged between the victim’s browser and malicious host. These messages
               also include the credit card skimming code.
Impact value: High
  Spam &       https://cyware.com/news/scammers-made-nearly-405-million-from-military-personnel-and-
  Phishing     veterans-since-2012-686eeee1
               Scammers Made Nearly $405 Million From\\\\\\\\\
                                                        Military Personnel and Veterans Since 2012. Nearly 1
               million military personnel and veterans have been duped of $405 million in different scams
               since 2012, according to a new report analyzed by the Federal Trade Commission (FTC) and
               Better Business Bureau.

                Source 1: CNN ( https://edition.cnn.com/ )
                https://edition.cnn.com/2020/01/04/politics/dhs-hack-website-trump-trnd/index.html
                Impact value: High
                DHS monitoring apparent hack of government library program website. A group of alleged
                Iranian hackers claims to have breached the website of a US government agency, Federal
Web Security    Depository Library Program, on Saturday after the killing of Qasem Soleimani.
                Source 2: Security Affairs ( https://securityaffairs.co/ )
                https://securityaffairs.co/wordpress/95879/cyber-crime/star-wars-saga-cyber-attacks.html
                Impact value: High
                Crooks use Star Wars saga as bait in Phishing and malware attacks. Crooks are exploiting the
                popularity of the Star War saga to lure users into downloading malware. In order to make this
                happen, cybercriminals have flooded social networks and the internet with rogue websites and
                files offering previews of the ‘The Rise of Skywalker’ movie and free steams. Kaspersky experts
                have discovered over 30 fake and infected streaming sites advertised on social networking
                pages.
Source 1: US-CERT - Security Bulletin Mailing List ( http://www.us-cert.gov/cas/bulletins/ )
            https://www.us-cert.gov/ncas/bulletins/sb19-364
            Vulnerability Summary for the Week of December 23, 2019. Recorded by National Institute of Standards and
            Technology and National Vulnerability.

            Source 2: Oracle Security Bulletins ( http://www.oracle.com/technetwork/topics/security/alerts-
            086861.html )

            https://www.oracle.com/security-alerts/cpuoct2019.html
            Oracle Critical Patch Update Advisory - October 2019; advised action to run available security updates.

            https://www.oracle.com/security-alerts/alert-cve-2019-2729.html
Bulletins   Oracle Security Alert Advisory - CVE-2019-2729. Decentralization vulnerability in Oracle WebLogic Server
            exploitable without authentication requirements; advised action to run security updates.

            https://www.oracle.com/security-alerts/bulletinoct2019.html
            Oracle Solaris Third Party Bulletin - October 2019; advised action to apply necessary patches.

            https://www.oracle.com/security-alerts/linuxbulletinoct2019.html
            Oracle Linux Bulletin - October 2019; advised action to apply necessary Oracle Linux Bulletin fixes.

            https://www.oracle.com/security-alerts/public-vuln-to-advisory-mapping.html
            Map of CVE to Advisory/Alert; advised action to apply the critical patch update for protection against known
            vulnerabilities.

            https://www.oracle.com/security-alerts/ovmbulletinoct2019.html
            Oracle VM Server for x86 Bulletin - October 2019; advised action to apply necessary Oracle VM Server for x86
            Bulletin fixes.
Source 1: Cisco Security Advisories &
            Alerts(http://tools.cisco.com/security/center/publicationListing.x )
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
            auth-bypass
            Impact value: Critical
            Cisco Data Center Network Manager Authentication Bypass Vulnerabilities. Due to multiple
            vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM), a
            remote attacker could bypass authentication and execute arbitrary actions with administrative
            privileges on an affected device.
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-sql-
            inject
Updates &
  Alerts    Impact value: High
            Cisco Data Center Network Manager SQL Injection Vulnerabilities. Due to multiple vulnerabilities in
            the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM), a remote attacker
            could execute arbitrary SQL commands on an affected device.
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
            path-trav
            Impact value: High
            Cisco Data Center Network Manager Path Traversal Vulnerabilities. Due to multiple vulnerabilities in
            the REST and SOAP API endpoints and the Application Framework feature of Cisco Data Center
            Network Manager (DCNM), a remote attacker could conduct directory traversal attacks on an affected
            device.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
            comm-inject
            Impact value: High
            Cisco Data Center Network Manager Command Injection Vulnerabilities. Due to multiple
            vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM), a
            remote attacker with administrative privileges on the DCNM application could inject arbitrary
            commands on the underlying operating system (OS).
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-xml-
            ext-entity
Updates &
            Impact value: Medium
  Alerts
            Cisco Data Center Network Manager XML External Entity Read Access Vulnerability. Due to improper
            handling of XML External Entity (XXE) entries when parsing certain XML files in the SOAP API, a
            remote attacker could gain read access to information that is stored on an affected system.
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-
            unauth-access
            Impact value: Medium
            Cisco Data Center Network Manager JBoss EAP Unauthorized Access Vulnerability. Due to an incorrect
            configuration of the authentication settings on the JBoss Enterprise Application Platform (JBoss EAP),
            remote attacker could gain unauthorized access to the JBoss EAP.
www.ke-cirt.go.ke
You can also read