@RISK: The Consensus Security Vulnerability Alert: Vol. 18, Num. 52

@RISK: The Consensus Security Vulnerability Alert
December 27, 2018 – Vol. 18, Num. 52
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES December 20 – 27, 2018
=========================================================
TOP VULNERABILITY THIS WEEK: Microsoft releases out-of-band update for Internet Explorer
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Microsoft releases out-of-band patch for Internet Explorer
Description: Microsoft released an out-of-band (OOB) patch on Wednesday related to a vulnerability in the scripting engine of Internet Explorer. This particular vulnerability is believed to be actively exploited in the wild and should be patched immediately.
Reference: https://blog.talosintelligence.com/2018/12/MS-OOB-IE-Scripting-Engine-Vuln.html
Snort SIDs: 48699 – 48702

Title: Privilege escalation vulnerability in Cisco Adaptive Security Appliance software
Description: Cisco disclosed a privilege escalation vulnerability in Cisco Adaptive Security Appliance software that could allow an attacker to perform privileged actions by using the web management interface. The vulnerability lies in the way the software improperly validates user privileges when using the web management interface.
Reference: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181219-asa-privesc
Snort SIDs: 48644

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

NASA reveals hackers breached one of their servers containing employees’ personal information earlier this year.
https://www.cnet.com/news/nasa-reveals-data-breach-in-internal-memo/

Amazon inadvertently sent more than 1,700 voice recordings of random people to a man in Germany after the submitted a GDPR request to the company.
https://threatpost.com/amazon-1700-alexa-voice-recordings/140201/

Caribou Coffee says 256 of its stores were targeted in a cyberattack for months in an effort to steal customers’ credit card information.
http://www.startribune.com/caribou-coffee-notifies-customers-of-data-breach/503268372/

The U.S. charged two Chinese hackers with data theft in 12 different countries.
https://www.washingtonpost.com/world/national-security/us-and-more-than-a-dozen-allies-to-condemn-china-for-economic-espionage/2018/12/20/cdfd0338-0455-11e9-b5df-5d3874f1ac36_story.html

The U.S. imposed another round of sanctions on Russia for meddling in the 2016 presidential election.
https://www.reuters.com/article/us-usa-russia-sanctions-treasury/us-imposes-fresh-russia-related-sanctions-treasury-idUSKCN1OI27F

MOST PREVALENT MALWARE FILES December 20 – 27, 2018
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 709a7dd743ca6a688ee0afc9a67a04c73c4f6fb6559cde2bafadbb5af58f043b
MD5: 59a06d7e48fd3d80fa2dc1cb859b45cc
VirusTotal: scan analysis
Typical Filename: helperamc
Claimed Product: Advanced Mac Cleaner
Detection Name: OSX.709A7DD743.agent.tht.Talos

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: c5cbcbada7c462cf89255f54fdbe955e2ad1149128bfe3fdd1db4dfe234fec8e
MD5: d2317379a712d38942db74c6b38aba6f
VirusTotal: scan analysis
Typical Filename: correctiron.exe
Claimed Product: Musthow
Detection Name: W32.Auto:c5cbcb.in03.Talos

@RISK: The Consensus Security Vulnerability Alert: Vol. 18, Num. 51

@RISK: The Consensus Security Vulnerability Alert
December 20, 2018 – Vol. 18, Num. 51
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES December 13 – 20, 2018
=========================================================
TOP VULNERABILITY THIS WEEK: WordPress patches severe security vulnerabilities in latest update
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: WordPress 5.0.1 fixes several security bugs
Description: WordPress released its latest update, which fixes a number of security vulnerabilities that are considered serious. The most serious flaw allowed the content management system’s “user activation screen” to be indexed by Google, which could lead to some users’ login information to become publicly visible. WordPress also warned users about unauthorized file deletion bug and unauthorized post creation bugs.
Reference: https://threatpost.com/wordpress-5-0-patched-to-fix-serious-bugs/139948/
Snort SIDs: 48573

Title: Adobe discloses 86 vulnerabilities in Reader, Acrobat
Description: Coverage continues to come in for the slew of bugs that Adobe patched in its monthly security update. The latest release covers 86 vulnerabilities in Adobe Reader and Acrobat DC. The bugs include two buffer overflow errors, five out-of-bounds write vulnerabilities and 23 use-after-free vulnerabilities, among others.
Reference: https://latesthackingnews.com/2018/12/15/adobe-december-patch-tuesday-fixed-38-critical-vulnerabilities-in-adobe-reader-and-acrobat-dc/
Snort SIDs: 48622 – 48630, 48636, 48637

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Smartphone apps are collecting more users’ location data than they let on, and often sell that information to advertisers and even hedge funds.
https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html

Facebook disclosed a bug that allowed app developers to view users’ photos that they uploaded to Facebook but never shared on their timeline.
https://techcrunch.com/2018/12/14/facebook-photo-bug/

Credit reporting agency Experian mistakenly exposed customer data in its training manuals, documents that have since been taken down.
https://motherboard.vice.com/en_us/article/zmdg7e/experian-exposes-customer-data-training-manuals-credit-score

Attackers from the Iranian APT group Charming Kitten attempted to break into the emails of several high-profile U.S. Treasury Department officials, as well as individuals in charge of enforcing nuclear sanctions on Iran.
https://apnews.com/7f4d814ebf0642b4b381fd9ce01345f7

Android’s facial recognition technology on its smartphones can be tricked by a 3-D printed head.
https://www.forbes.com/sites/thomasbrewster/2018/12/13/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head/#12d7fe361330

Former U.S. Secretary of State John Kerry confirmed that Russia was behind a cyberattack on the State Department in 2014.
https://www.npr.org/templates/transcript/transcript.php?storyId=644830886

MOST PREVALENT MALWARE FILES December 13 – 20, 2018
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: fc62d76945faed86fc11454c8ae1ecc3e8cbb449b8466c7f5aaa9bf45af9730c
MD5: 1f4ab214b36d80c07898cf1a9efe7d6e
VirusTotal: scan analysis
Typical Filename: MSVSBP20.DLL
Claimed Product: Microsoft® Win
Detection Name: W32.FC62D76945-100.SBX.TG

SHA 256: 709a7dd743ca6a688ee0afc9a67a04c73c4f6fb6559cde2bafadbb5af58f043b
MD5: 59a06d7e48fd3d80fa2dc1cb859b45cc
VirusTotal: scan analysis
Typical Filename: helperamc
Claimed Product: Advanced Mac Cleaner
Detection Name: OSX.709A7DD743.agent.tht.Talos

SHA 256: e856c759e2dd2e637aaebbfc0eeea4a7f8e7c7a02967b4db2e88dc8914b5b296
MD5: c76517dc654e6852eae9f2f42a630470
VirusTotal: scan analysis
Typical Filename: maftask.zip
Claimed Product: N/A
Detection Name: OSX.E856C759E2.agent.tht.Talos

SHA 256: e5f1609df4f67e0e23f3b3409f265722692e5e15a6349bf1157d36b79c5acf9d
MD5: c9636e35954360b7b1375ee615ba6c24
VirusTotal: scan analysis
Typical Filename: 3dfx32v2.dll
Claimed Product: Voodoo2® DirectX for Windows® 95
Detection Name: W32.Auto:e5f160.in03.Talos

@RISK: The Consensus Security Vulnerability Alert: Vol. 18, Num. 50

@RISK: The Consensus Security Vulnerability Alert
December 13, 2018 – Vol. 18, Num. 50
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES December 6 – 13, 2018
=========================================================
TOP VULNERABILITY THIS WEEK: Microsoft patches 38 vulnerabilities
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Microsoft discloses 38 bugs as part of Patch Tuesday
Description: Microsoft released its monthly security update, disclosing a variety of vulnerabilities in several of its products. This month’s security update covers 38 vulnerabilities, nine of which are rated critical and 29 that are considered important. The advisories cover bugs in the Chakra scripting engine, several Microsoft Office products and the Microsoft Internet Explorer web browser.
Reference: https://blog.talosintelligence.com/2018/12/microsoft-patch-tuesday-december-2018.html
Snort SIDs: 45142, 45143, 48509, 48510, 48513 – 48520, 48531 – 48534, 48559, 48562

Title: Adobe fixes security flaws in Acrobat, Reader
Description: Adobe released security updates for Adobe Acrobat and Reader on Windows and MacOS. In all, the company released patches covering 88 vulnerabilities. There are two critical bugs that an attacker could exploit in order to execute code in the context of the current user.
Reference: https://helpx.adobe.com/security/products/acrobat/apsb18-41.html
Snort SIDs: 48293, 48294

Title: New spam campaign delivers CARROTBAT to South Korea
Description: Researchers discovered a new dropper known as CARROTBAT that’s being spread in South Korea through spam emails. The dropper can deliver additional decoy documents and secondary payloads, such as remote access trojans, to its victims. The malware allows attackers to drop and open an embedded document in one of 11 different file formats.
Reference: https://researchcenter.paloaltonetworks.com/2018/11/unit42-the-fractured-block-campaign-carrotbat-malware-used-to-deliver-malware-targeting-southeast-asia/
Snort SIDs: 48475, 48476, 48479, 48480

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Researchers at ESET discovered an Android trojan that can steal money from users’ PayPal accounts even if they have two-factor authentication enabled.
https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/

Google is speeding up the shutdown of its Google+ social media platform after it discovered a bug that revealed users’ private information to software developers.
https://www.cnn.com/2018/12/10/tech/google-plus-bug/index.html

It is easier than users realize for attackers to steal and read their messages on encrypted messaging applications.
https://blog.talosintelligence.com/2018/12/secureim.html

The MuddyWater group has resurfaced, this time using a new variant of the Powermud backdoor, which has been linked to a public GitHub repository.
https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group

A new Congressional report states that the massive data breach at credit reporting agency Equifax was entirely preventable.
https://www.marketwatch.com/story/equifax-breach-was-entirely-preventable-congressional-report-says-2018-12-10

A self-funded study from Super Micro did not uncover any secret microchips that could be used to spy on hardware, an accusation that originates from a massive Bloomberg report earlier this year.
https://www.cnbc.com/2018/12/11/supermicro-investigator-found-no-evidence-of-chinese-spy-chips.html

Mozilla released Firefox 64, which includes fixes for several critical memory safety bugs.
https://www.mozilla.org/en-US/security/advisories/mfsa2018-29/

MOST PREVALENT MALWARE FILES December 6 – 13, 2018
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
VirusTotal: scan analysis
Typical Filename: blue.exe
Claimed Product: N/A
Detection Name: W32.GenericKD:WNCryLdrA.21lx.1201

SHA 256: 15ffbb8d382cd2ff7b0bd4c87a7c0bffd1541c2fe86865af445123bc0b770d13
MD5: c24315b0585b852110977dacafe6c8c1
VirusTotal: scan analysis
Typical Filename: star.exe
Claimed Product: N/A
Detection Name: W32.DoublePulsar:Malwaregen.21ip.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: 18042540b39d543e9e648e5d0b059d2e8c74889bb9353674be59c94da265f393
MD5: 1a5a7532854ab45ac74b1c657fe47941
VirusTotal: scan analysis
Typical Filename: helperamc.zip
Claimed Product: Advanced Mac Cleaner
Detection Name: W32.18042540B3-95.SBX.TG

Wildcard SSL