@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 48

@RISK: The Consensus Security Vulnerability Alert
November 28, 2019 – Vol. 19, Num. 48
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES November 21 – 28, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Old Apache Solr vulnerability raises eyebrows with new POC
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Severity of Apache Solr vulnerability rises after new code emerges
Description: A months-old vulnerability in Apache Solr was recently reclassified as being more serious than initially thought. It was initially believed that this bug would only allow an adversary to access monitoring data on any site utilizing Solr. However, new proof-of-concept code shows it could allow an attacker to remotely execute code on a Solr server. This bug could be exploited by any adversary who has network access to a Solr server and Java Management Extensions. Windows users are reportedly not affected.
Reference: https://securityintelligence.com/news/exploit-code-escalates-apache-solr-vulnerability-to-high-risk-status/
Snort SIDs: 52324, 52325 (By John Levy)

Title: Command injection bug in popular, affordable wireless router
Description: Cisco Talos recently discovered a command injection vulnerability in the Tenda AC9 router. The Tenda AC9 is one of the most popular and affordable dual-band gigabit WiFi routers available online, especially on Amazon. A command injection vulnerability exists in the `/goform/WanParameterSetting` resource. A locally authenticated attacker can execute arbitrary commands to post parameters to execute commands on the router. The attacker can get reverse shell running as root using this command injection.
Reference: https://blog.talosintelligence.com/2019/11/vulnerability-spotlight-tenda-ac9-command-nov-2019.html
Snort SIDs: 50295, 50296 (By Amit Raut)

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

The lights used to help guide airplanes to the runway at airports were exposed to the open internet at several airports across the U.S.
https://www.vice.com/en_us/article/7x5nkg/airplane-warning-lights-hacked

American security experts are starting to worry about a new wave of state-sponsored adversaries from countries like Vietnam and Qatar, a pivot from the usual cyber powers like Russia and China.
https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/11/26/the-cybersecurity-202-u-s-officials-fret-about-hacking-by-a-new-generation-of-nations/5ddc808588e0fa652bbbda37/

The FBI sent a warning to auto manufacturers, warning that adversaries are targeting sensitive data.
https://www.bleepingcomputer.com/news/security/fbi-warns-of-cyber-attacks-targeting-us-automotive-industry/

Jeanette Manfra, one of the longest-tenured officials in U.S. cyber policy, is leaving the public sector for a private job, leaving a massive hole at the Cybersecurity and Infrastructure Security Agency.
https://techcrunch.com/2019/11/21/jeanette-manfra/

Manfra’s departure is just the latest loss for cyber security leadership in Washington. An exodus of election officials have experts worried about the security of the 2020 elections.
https://www.npr.org/2019/11/26/782680291/as-2020-approaches-some-experienced-election-officials-head-to-the-exits

California’s Department of Motor Vehicles makes roughly $50 million a year selling citizens’ drivers license and personal information.
https://www.vice.com/en_us/article/evjekz/the-california-dmv-is-making-dollar50m-a-year-selling-drivers-personal-information

Adversaries are hijacking Docker systems that still have their API endpoints exposed to the internet.
https://www.zdnet.com/article/a-hacking-group-is-hijacking-docker-systems-with-exposed-api-endpoints/

Twitter added new two-factor authentication features, allowing users to register for the extra security step without having to provide their phone number to the social media site.
https://www.theverge.com/2019/11/22/20977436/twitter-2fa-phone-number-authentication-app-security-key

MOST PREVALENT MALWARE FILES November 21 – 28, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc
MD5: c5608e40f6f47ad84e2985804957c342
VirusTotal: scan analysis
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Service
Detection Name: PUA:2144FlashPlayer-tpd

SHA 256: a97e5396d7dcd103138747ad09486671321fb75e01a70b26c908e7e0b727fad1
MD5: ef048c07855b3ef98bd991c413bc73b1
VirusTotal: scan analysis
Typical Filename: xme64-501.exe
Claimed Product: N/A
Detection Name: PUA.Win.Dropper.Razy::tpd

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: c29da492e7e7decebff09ee531f01fc3c3de45e805947093ac0aa7c113b592dc
MD5: b77c0c1ed4cff895bf862cf46b601c84
VirusTotal: scan analysis
Typical Filename: opCS.gif
Claimed Product: N/A
Detection Name: W32.C29DA492E7-100.SBX.TG

SHA 256: 4dac88a67bc3f755c0ef3ceea5515a3e3310820978ef249d1813c9982dc6aadf
MD5: 718d579ea6ea48f95225cc9c794f9703
VirusTotal: scan analysis
Typical Filename: opext.gif
Claimed Product: N/A
Detection Name: W32.4DAC88A67B-100.SBX.TG

@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 47

@RISK: The Consensus Security Vulnerability Alert
November 21, 2019 – Vol. 19, Num. 47
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES November 14 – 21, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Attackers user custom droppers to install Agent Tesla
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: New, custom dropper delivers variety of information-stealing malware
Description: A wave of adversaries which are dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019 using custom droppers. These droppers inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers. The injection techniques are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware.
Reference: https://blog.talosintelligence.com/2019/11/custom-dropper-hide-and-seek.html
Snort SIDs: 52246

Title: Denial-of-service vulnerability in some Intel graphics drivers
Description: Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by supplying a malformed pixel shader if the graphics driver is operating inside a VMware guest operating system. This type of attack can be triggered from VMware guest usermode to cause a denial-of-service attack due to an out-of-bounds read in the driver.
Reference: https://blog.talosintelligence.com/2019/11/vuln-spotlight-intel-DLL-driver-DoS-Nov-2019.html
Snort SIDs: 50295, 50296

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

An on-demand transcription service is under fire for letting all of its freelance contractors access a database where all the recordings are held.
https://onezero.medium.com/rev-a-transcription-service-used-by-police-and-journalists-leaves-customer-data-out-in-the-open-81fff9f16669

The U.S. Department of Justice charged two men with stealing SIM cards as part of a scheme to steal thousands of dollars’ worth of cryptocurrency.
https://www.cyberscoop.com/alleged-sim-swappers-charged-550000-cryptocurrency-scam/

The new checkra1n iOS jailbreak is now out in the wild, leaving a number of privacy and security questions up for debate among researchers and users.
https://arstechnica.com/information-technology/2019/11/what-the-newly-released-checkra1n-jailbreak-means-for-for-idevice-security/

US Democratic presidential candidate Amy Klobuchar urged voting machine vendors to not dismiss amateur security researchers and create a fixed timeline to patch known bugs.
https://www.cyberscoop.com/klobuchar-voting-vendors-election-security/

Google and Samsung recently patched a vulnerability in some photo apps that could allow an attacker to take over a device’s camera, but other Android makers’ devices are still at risk.
https://arstechnica.com/information-technology/2019/11/google-samsung-fix-android-spying-flaw-other-makers-may-still-be-vulnerable/

Ten companies formed a new coalition against stalkerware, launching a website to help victims and vowing to stop of the spread of this type of software.
https://www.vice.com/en_us/article/ywa7xv/coalition-against-stalkware-launches-eff-kaspersky

Andrew Yang, a US Democratic presidential candidate, released his proposal for what amounts to a “digital bill of rights” that includes taxing digital ads and launching a new federal agency to regulate social networks’ algorithms.
https://www.theverge.com/2019/11/14/20964834/andrew-yang-digital-ads-tax-elizabeth-warren-antitrust-tech-facebook-google

Louisiana’s state government was hit with a ransomware attack this week, bringing down an internal network and disrupting some public websites. However, the state says it is not paying out the ransom.
https://www.theadvocate.com/baton_rouge/news/politics/article_f1fe1cdc-0a2f-11ea-a0ac-dfef52b2b2af.html

MOST PREVALENT MALWARE FILES November 14 – 21, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: virus analysis
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: virus analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
VirusTotal: virus analysis
Typical Filename: Eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: virus analysis
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc
MD5: c5608e40f6f47ad84e2985804957c342
VirusTotal: virus analysis
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Service
Detection Name: PUA:2144FlashPlayer-tpd

@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 46

@RISK: The Consensus Security Vulnerability Alert
November 14, 2019 – Vol. 19, Num. 46
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES November 7 – 14, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Microsoft disclosed 75 vulnerabilities as part of Patch Tuesday
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Microsoft disclosed 13 critical bugs as part of monthly security update
Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of which are considered “critical,” with the rest being deemed “important.” This month’s security update covers security issues in a variety of Microsoft services and software, including the Scripting Engine, the Windows Hyper-V hypervisor, and Win32. Cisco Talos discovered one of these vulnerabilities, CVE-2019-1448 –a remote code execution vulnerability in Microsoft Excel.
Reference: https://blog.talosintelligence.com/2019/11/microsoft-patch-tuesday-nov-2019.html
Snort SIDs: 46548, 46549, 52205 – 52209, 52212, 52213, 52216, 52217 – 52225, 52228 – 52234, 52239, 52240

Title: LEADTOOLS toolkit contains several vulnerabilities, including remote code execution
Description: Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging toolkits. LEADTOOLS is a collection of toolkits designed to perform a variety of functions aimed at integrating documents, multimedia and imaging technologies into applications. All of the software is produced by LEAD Technologies Inc. LEADTOOLS offers prebuilt and portable libraries with an SDK for most platforms (Windows, Linux, Android, etc.), that are all geared toward building applications for medical systems. Various pieces of LEADTOOLS contain vulnerabilities that could be exploited by malicious actors to carry out a number of actions, including denial-of-service conditions and the execution of code remotely.
Reference: https://blog.talosintelligence.com/2019/11/vulnerability-spotlight-code-execution.html
Snort SIDs: 50824 – 50827, 51930-51938, 51447, 51448

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Google’s ambitious cyber security company Chronicle is reportedly in major trouble, with many employees starting to leave and too much oversight from its new parent company.
https://www.engadget.com/2019/11/09/google-chronicle-trouble/

Microsoft says it will expand protections awarded to consumers under California’s new privacy law to everyone across the U.S.
https://www.theverge.com/2019/11/11/20960113/microsoft-ccpa-privacy-law-california-congress-regulation

A fishing equipment store based in Vermont mistakenly left many of its internal passwords on Pastebin.com earlier this year.
https://krebsonsecurity.com/2019/11/retailer-orvis-com-leaked-hundreds-of-internal-passwords-on-pastebin/

A group of attackers are using political motifs and images of American politicians to infect users with a range of malware, including screenlockers and ransomware — with mixed success.
https://blog.talosintelligence.com/2019/11/political-malware.html

Adobe patched three critical vulnerabilities in its monthly security update, including two memory corruption bugs in Adobe Media Encoder.
https://threatpost.com/adobe-critical-bugs-illustrator-media-encoder/150114/

Intel’s Cascade Lake line of CPUs is affected by the Zombieload v2 vulnerability discovered earlier this year, though the company released a patch this week.
https://www.zdnet.com/article/intels-cascade-lake-cpus-impacted-by-new-zombieload-v2-attack/

Google has acquired the health care information on millions of Americans that they will reportedly attempt to monetize, despite the individuals not knowing of the partnership between Google and Ascension.
https://www.wsj.com/articles/google-s-secret-project-nightingale-gathers-personal-health-data-on-millions-of-americans-11573496790?shareToken=st98ed7303aedb45d281bc0bda02eb90b4

Britain’s Labour political party was the target of two back-to-back distributed denial-of-service attacks this week in what the party called a “sophisticated and large-scale” attempt to disrupt their operations.
https://www.theguardian.com/politics/2019/nov/12/labour-reveals-large-scale-cyber-attack-on-digital-platforms

MOST PREVALENT MALWARE FILES November 7 – 14, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: virus analysiss
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: virus analysis
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 6b01db091507022acfd121cc5d1f6ff0db8103f46a1940a6779dc36cca090854
MD5: 74f4e22e5be90d152521125eaf4da635
VirusTotal: virus analysis
Typical Filename: jsonMerge.exe
Claimed Product: ITSPlatform
Detection Name: W32.GenericKD:Attribute.22lk.1201

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
MD5: db69eaaea4d49703f161c81e6fdd036f
VirusTotal: virus analysis
Typical Filename: xme32-2141-gcc.exe
Claimed Product: N/A
Detection Name: W32.46B241E3D3-95.SBX.TG

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
VirusTotal: virus analysis
Typical Filename: Eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

Wildcard SSL