Thursday, September 9, 2021

Threat Source newsletter (Sept. 9, 2021)

Newsletter compiled by Jon Munshaw.

Good afternoon, Talos readers.  

The biggest security news this week is no doubt another Microsoft zero-day. On the heels of PrintNightmare and multiple Exchange Server vulnerabilities comes a code execution vulnerability in MSHTML, the rendering engine in Internet Explorer. 

We have new Snort rules out today that protect users against the exploitation of this vulnerability, which could allow an attacker to take complete control of a victim machine.


Upcoming Talos public engagements

Speaker: Chris DiSalle
Date: Sept. 9
Location: Virtual
Description: Chris DiSalle from Talos Incident Response will join the Technado podcast to share the ins and outs of the IR industry. Chris will talk to host Don Pezet about how he got started in incident response, horror stories he's seen in the field, and much more. 

Chats, Cheats, and Cracks: Abuse of Collaboration Platforms in Malware Campaigns at BSides Charlotte
Speaker: Edmund Brumaghin
Date: Sept. 25
Location: Virtual
Description: Join Edmund Brumaghin from Talos Outreach where he'll be discussing malware campaigns targeting collaboration apps such as Discord and Slack. Following up on Talos' blog post from earlier this year, the presentation will dive into campaigns we've spotted in the wild and discuss how users can stay safe while using these apps. 

Speaker: Vitor Ventura
Date: Oct. 7 - 8
Location: Virtual
Description: Android malware has become prevalent across the landscape. In this workshop, Vitor Ventura will show you reverse engineering techniques for Android malware. This workshop is designed to provide the participants with different approaches to malware analysis so they can perform their own analysis without the use of automated tools. When everything else fails, we need to know what's under the hood. This workshop will cover malware unpacking, string deobfuscation, command and control protocol identification and feature identification.

Cybersecurity week in review

  • The White House released new guidelines this week pointing federal agencies toward a new zero-trust approach to cybersecurity. The documents form a roadmap for agencies to put the appropriate architecture and policies in place to reach a zero-trust model by 2024.
  • Germany formally protested to Russia regarding a series of cyber attacks and disinformation campaigns ahead of the country's upcoming parliamentary elections. German officials charged a hacking group known as Ghostwriter of trying to steal federal and state lawmakers' personal information via phishing campaigns.
  • Ireland's national health care system is still recovering months after a ransomware attack. Some patients still cannot access the online scheduling system, and others have seen their plan-of-care interrupted.
  • The U.S. government warned consumers of a series of scams and phishing campaigns centered around Hurricane Ida. States in the Southeast and Northeast U.S. are still recovering from major flooding and high winds from the storm, leading many people to look for financial assistance and insurance payouts.
  • Banks and post offices in New Zealand briefly went offline this week as they dealt with a cyber attack. Officials stated they believed the outages were the result of a distributed denial-of-service attack.
  • Howard University in Washington, D.C. had to cancel classes Tuesday after a ransomware attack over Labor Day weekend. While in-person classes resumed Wednesday, as of Thursday morning, hybrid and online classes were still suspended. 
  • Security researchers have already found ways to spoof virtual vaccine passports on apps and websites. However, these apps have been slow to provide updates.
  • Attackers are increasingly targeting the food supply chain, launching multiple ransomware attacks against the industry this year. A notice from the FBI stated that the sector's increased use of automation increased the number of potential weak points that attackers could exploit.

Notable recent security issues

Description: U.S. Cyber Command warned American organizations prior to Labor Day weekend that a vulnerability in Atlassian Confluence was under active exploitation. The popular project management software disclosed the vulnerability in August as CVE-2021-26084, which could allow an attacker to remotely execute arbitrary code. Although a patch had been available for about a week, the Cyber Command warning reminded users to patch immediately, advising them to not wait until after the holiday to update. Atlassian described the issue as “an OGNL injection vulnerability” in the Atlassian Confluence Server and Confluence Data Center products, both of which are vulnerable to unauthenticated remote attackers. CVE-2021-26084 has a severity rating of 9.8 out of a possible 10. 
Snort SIDs: 58093, 58094 

Description: Cisco patched a critical vulnerability in its Cisco Enterprise Network Function Virtualization Infrastructure Software (NFVIS) last week that could allow an attacker to gain admin privileges on an affected system. The U.S. Cybersecurity and Infrastructure Security Agency followed up with a warning to all users to patch immediately. Cisco stated in its security advisory that there is no workaround to protect against exploitation of the vulnerability outside of downloading the latest patch. "This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and login as an administrator to the affected device," the advisory reads. 
Snort SIDs: 58097 - 58099 

Most prevalent malware files this week

MD5: 9a4b7b0849a274f6f7ac13c7577daad8 
Typical Filename: ww31.exe 
Claimed Product: N/A 
Detection Name: W32.GenericKD:Attribute.24ch.1201

MD5: 830ffb393ba8cca073a1c0b66af78de5 
Typical Filename: smbscanlocal0902.exe 
Claimed Product: N/A 
Detection Name: MS17010::mURLin::W32.Auto:6c62b768d8.in03.Talos 

MD5: 8193b63313019b614d5be721c538486b 
Typical Filename: SAService.exe 
Claimed Product: SAService 
Detection Name: PUA.Win.Dropper.Segurazo::95.sbx.tg 

MD5: 0a13d106fa3997a0c911edd5aa0e147a 
Typical Filename: mg20201223-1.exe 
Claimed Product: N/A 
Detection Name: RanumBot::mURLin::W32.5E46ECFFCF.in12.Talos 

MD5: de0d35c8d3f065ec997878b31a0cf365 
Typical Filename: Quote request.exe 
Claimed Product: N/A 
Detection Name: W32.A10ACC2458-95.SBX.TG  

Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here and Talos Takes here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.