InfoSec News 20200930

  • Publicado: Qua, 30/09/2020 - 10:19

Top News


  • FBI, CISA warn of disinformation campaigns about hacked voting systems

"“During the 2020 election season, foreign actors and cybercriminals are spreading false and inconsistent information through various online platforms in an attempt to manipulate public opinion, sow discord, discredit the electoral process, and undermine confidence in U.S. democratic institutions,” reads the public service announcement (PSA) issued by the agencies."

Link

TLP1 : Green

  • UHS Shuts Down Systems in U.S. Hospitals Following Cyberattack

"On Monday, some of the company’s employees took to Reddit to share information on a cyberattack that forced the shutdown of computers at UHS facilities nationwide. The hospital networks were shut down as well, but phone lines appear to have continued to operate throughout the incident."

Link

TLP1 : Green

  • VMware CEO Pat Gelsinger’s five biggest statements at VMworld 2020

"At VMworld 2020 today, VMware CEO Pat Gelsinger made some bullish statements and predictions around how 5G will “displace."

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • State-Sponsored Hacking Groups Increasingly Use Cloud & Open Source Infrastructure

"Microsoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing."

Link

TLP1 : Green

  • Bitcoin Exchange Owner Convicted for Role in Web Auction Fraud Scheme

"A federal jury convicted the owner of a bitcoin exchange for his role in a multi-million dollar scheme involving online auction fraud."

Link

TLP1 : Green

  • Police Scotland to Establish Center of Excellence to Tackle Cybercrime

"Police Scotland is to establish a “center of excellence” for cybercrime with specialist staff deployed to help combat online offences including child sexual abuse, fraud and the sharing of indecent images."

Link

TLP1 : Green

  • China-Linked 'BlackTech' Hackers Start Targeting U.S.

"The China-linked BlackTech cyber-spies have adopted new malicious tools in recent attacks, and they have started targeting the United States, Symantec security researchers revealed on Tuesday."

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • Cybersecurity lessons learned from data breaches and brand trust matters

"Your brand is a valuable asset, but it’s also a great attack vector. Threat actors exploit the public’s trust of your brand when they phish under your name or when they counterfeit your products."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Vulnerability of FreeRDP: integer overflow via Rdpegfx Channel

"An attacker can trigger an integer overflow via Rdpegfx Channel of FreeRDP, in order to trigger a denial of service, and possibly to run code."

Link

TLP1 : Green

  • Vulnerability in Wireless Router Chipsets Prompts Advisory

"Synopsys has issued an advisory warning of authentication bypass vulnerabilities in multiple wireless router chipsets built into devices manufactured by Qualcomm, MediaTek, and Realtek. "

Link

TLP1 : Green

  • CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.

"A flaw was found in the Linux kernels implementation of biovec usage."

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • NewsBites Drilldown for the Week Ending 18 September 2020

"This week’s Drilldown will focus on one item (included below) from NewsBites Issue 74, detailing the results of an active and deep assessment by the U.S. Department of the Interior Office."

Link

TLP1 : Green

  • The Shared Irresponsibility Model in the Cloud Is Putting You at Risk

"In the on-premises world, IT staff know they are responsible for the infrastructure on which applications are deployed. There are typically established procedures and policies for maintaining security compliance, risk, and breach detection. Perhaps more importantly, there is also typically a clear line of accountability about who is responsible for the operations, configuration, and security of a given system."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • New FinSpy Spyware Variants Identified, Dissected

"Human rights organization Amnesty International has identified new macOS and Linux-targeting variants of the infamous FinFisher-made spyware family FinSpy."

Link

TLP1 : Green

  • Answer these questions to find out how safe your social media profiles are

"Unless you’re a hermit who lives under a rock, you probably use social media in some form or the other. You’re not alone; recent statistics reveal that you’re among 3.5 billion social media users worldwide. And it’s a rapidly increasing number that already constitutes half the world’s population."

Link

TLP1 : Green

  • No Trespassing In The Cloud

"Some self-appointed security researchers believe in their own minds that they have the legal right to poke around the property of another organization to see if they can find security mistakes."

Link

TLP1 : Green

  • IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications

"Introduction: IoT Manufacturers Favor Convenience over Security Because IoT security is still an afterthought."

Link

TLP1 : Green

  • Negotiating with Ransomware Gangs

"For now, it seems that paying ransomware, while obviously risky and empowering/encouraging ransomware attackers, can perhaps be comported so as not to break any laws (like anti-terrorist laws, FCPA, conspiracy and others) ­ and even if payment is arguably unlawful, seems unlikely to be prosecuted."

Link

TLP1 : Green

  • PwnXSS : Vulnerability XSS Scanner Exploit

"PwnXSS is a powerful XSS scanner made in python 3.7."

Link

TLP1 : Green

  • PSMDATP : PowerShell Module For Managing Microsoft Defender Advanced Threat Protection

"This module is a collection of easy-to-use cmdlets and functions designed to make it easy to interface with the Microsoft Defender Advanced Threat Protection API."

Link

TLP1 : Green

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp