@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 20

@RISK: The Consensus Security Vulnerability Alert
May 16, 2019 – Vol. 19, Num. 20
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES May 9 -16, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Microsoft releases monthly security update
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Microsoft patches 79 vulnerabilities, 22 critical
Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 79 vulnerabilities, 22 of which are rated “critical,” 55 that are considered “important” and one “moderate.” This release also includes two critical advisories: one covering Microsoft Live accounts and another addressing updates to Adobe Flash Player. This month’s security update covers security issues in a variety of Microsoft’s products, including the Scripting Engine, the Microsoft Edge web browser and GDI+.
Reference: https://blog.talosintelligence.com/2019/05/MS-Patch-Tuesday-May-2019.html
Snort SIDs: 50068 – 50091, 50115 – 50119, 50120 – 50122

Title: Adobe fixes critical bugs in Flash Player, Acrobat Reader
Description: Adobe disclosed 87 vulnerabilities in a variety of its products as part of its monthly security update. The majority of the bugs exist in Adobe Acrobat and Acrobat Reader. There are also critical arbitrary code execution vulnerabilities in Adobe Flash Player and Reader.
Reference: https://threatpost.com/adobe-flash-acrobat-reader-flaws/144716/
Snort SIDs: 48293, 48294, 49189, 49190, 49684, 49685

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

WhatsApp is urging users to update the app as soon as possible after it was reported attackers could install malware on a mobile device just by calling the phone through WhatsApp.
https://www.wired.com/story/whatsapp-hack-phone-call-voip-buffer-overflow/

Photo storage app Ever unknowingly uploaded users’ photos to their servers to improve the company’s facial recognition technology, which it sold to other firms.
https://www.nbcnews.com/tech/security/millions-people-uploaded-photos-ever-app-then-company-used-them-n1003371

Baltimore’s city government continues to recover from a ransomware attack. A week later, all of the city’s emails, phones and computers are still offline.
https://www.wbaltv.com/article/baltimore-government-is-still-recovering-from-ransomware-attack/27457696

The U.S. Department of Justice charged six people with stealing $2.4 million worth of cryptocurrency over several months in a SIM card hijacking campaign.
https://www.cyberscoop.com/hackers-allegedly-stole-2-4-million-cryptocurrency-six-month-sim-hijacking-spree/

A new bill in Congress would require all U.S. lawmakers to undergo annual cybersecurity and IT training.
https://www.infosecurity-magazine.com/news/lawmakers-propose-cyber-training-1/

A bug in Twitter’s iOS app mistakenly shared users’ location data with a yet-to-be-named third party.
https://techcrunch.com/2019/05/13/twitter-bug-disclosed-some-users-location-data-to-an-unnamed-partner/

MOST PREVALENT MALWARE FILES May 9 – 16, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: e4cef790c953b769c08472ace6d6f3321851fb701882ebcb76a78a413ed85505
MD5: 2c5d83f7abe17e9ccdd6dcc0622a22aa
VirusTotal: scan analysis
Typical Filename: $RECYCLE.BIN .scr
Claimed Product: N/A
Detection Name: Win.Worm.Sality::1201

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 2c8cb61f622f8c4c4babc19ebf9fad759d9913c4ca47ad393448c48bad08d71a
MD5: 3a61797cff12598b31443d5bce21e470
VirusTotal: scan analysis
Typical Filename: WcInstaller.exe
Claimed Product: Web Companion Installer
Detection Name: W32.2C8CB61F62-95.SBX.TG

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: scan analysis
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201

@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 19

@RISK: The Consensus Security Vulnerability Alert
May 9, 2019 – Vol. 19, Num. 19
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES May 2 – 9, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Attackers continue to exploit Oracle WebLogic vulnerabilities, now dropping ransomware
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Attacks using WebLogic bugs expand, evolve
Description: Attackers continue to spread malware by exploiting a critical vulnerability in Oracle WebLogic. The bug, identified as CVE-2019-2725, was disclosed and patched last week. However, as users have been slow to update, attackers are still able to exploit this vulnerability to deliver ransomware, specifically Gandcrab and XMRig
Reference: https://threatpost.com/oracle-weblogic-exploit-gandcrab-xmrig/144419/
Snort SIDs: 50014 – 50025

Title: Cisco discloses 41 bugs, one of them critical
Description: Cisco released a security update for several of its products, including one critical bug in the SSH key management for the Nexus 9000 series Application Centric Infrastructure (ACI) mode switch software. An attacker could exploit this vulnerability by connecting to a machine via SSH, which could allow them to connect to the system with the same privileges as a root user.
Reference: https://www.sdxcentral.com/articles/news/cisco-issues-largest-single-day-security-vulnerabilities-in-at-least-12-months/2019/05/
Snort SIDs: 49992 – 49996, 50006, 50007

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

A new report states Chinese intelligence agencies may have stolen an NSA hacking tool several years ago while the U.S. was attacking their systems, and eventually leaked those tools to the Shadow Brokers APT.
https://www.engadget.com/2019/05/07/symantec-buckeye-wannacry/

Mozilla says it will start banning add-ons for the Firefox web browser that contain obfuscated code in an effort to cut down on the number of malicious extensions.
https://www.helpnetsecurity.com/2019/05/03/firefox-add-ons-obfuscated-code/

IDF bombed an alleged Hamas hacking base after the organization allegedly launched a cyber attack against Israeli targets.
https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/

The Magecart malware is being used in yet another attack, this time targeting 201 online college bookstores.
https://www.infosecurity-magazine.com/news/magecart-steals-data-201-campus-1-1/

In March, a “cyber event” disrupted operations at a utility company in the Western US, but did not cause blackouts.
https://www.eenews.net/stories/1060254751

Baltimore’s city government was hit with a ransomware attack, temporarily disabling all non-emergency services’ systems.
https://www.baltimoresun.com/news/maryland/politics/bs-md-ci-it-outage-20190507-story.html

MOST PREVALENT MALWARE FILES May 2 – 9, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: scan analysis
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 9d48f382ec11bd9b35488a2c2b878e5401c2be43f00bcbae30d1619e6e2bf0c1
MD5: dd46d0260a6cdf5625d468398bae1f60
VirusTotal: scan analysis
Typical Filename: N/A
Claimed Product: N/A
Detection Name: Win.Dropper.Undefined::tpd

@RISK: The Consensus Security Vulnerability Alert: Vol. 19, Num. 18

@RISK: The Consensus Security Vulnerability Alert
May 2, 2019 – Vol. 19, Num. 18
=========================================================
CONTENTS:

NOTABLE RECENT SECURITY ISSUES
INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES April 25 – May 2, 2019
=========================================================
TOP VULNERABILITY THIS WEEK: Attackers exploiting Oracle vulnerability in the wild
=========================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

Title: Oracle vulnerability opens users to remote code execution attacks
Description: Oracle released an out-of-band pouch for WebLogic servers that could allow an attacker to carry out remote code execution attacks. Security researchers discovered the bug being exploited earlier this month by attackers in the wild. Oracle assigned the bug CVE-2019-2725 and gave it a CVSS score of 9.8/10, highlighting how serious the issue is. WebLogix server owners are urged to update as soon as possible.
Reference: https://www.zdnet.com/article/new-oracle-weblogic-zero-day-discovered-in-the-wild/
Snort SIDs: 49942, 49943

Title: JasperLoader targets Europe with Gootkit banking trojan
Description: A loader known as “JasperLoader” has been increasingly active over the past few months and is currently being distributed via malicious spam campaigns primarily targeting central European countries, with a particular focus on Germany and Italy. JasperLoader employs a multi-stage infection process that features several obfuscation techniques that make analysis more difficult. It appears that this loader was designed with resiliency and flexibility in mind, as evidenced in later stages of the infection process.
Reference: https://blog.talosintelligence.com/2019/04/jasperloader-targets-italy.html
Snort SIDs: 49914, 49915

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

Docker says an attacker breached one of its Hub databases and could have stolen sensitive information from nearly 190,000 accounts.
https://motherboard.vice.com/en_us/article/7xgbzb/docker-hub-breach-hackers-stole-private-keys-tokens

Norwegian aluminum producer Norsk Hydro said a ransomware attack earlier this year cost the company the equivalent of $52 million in the first quarter.
https://www.reuters.com/article/norsk-hydro-outlook/update-1-norsk-hydro-expects-cyber-attack-costs-of-nearly-52-mln-in-q1-idUSL5N22C12R

Apple removed several parental control apps from its app store due to what the company called “highly invasive” mobile device management software.
https://www.securityweek.com/apple-claims-parental-control-apps-removed-due-use-mdm

A recent study found that the vast majority of U.S. presidential candidates’ campaigns for the 2020 election are open to an email-based attack.
https://finance.yahoo.com/news/most-2020-u-presidential-campaigns-120000599.html

An unguarded Microsoft-hosted database contains sensitive information on nearly 80 million U.S. households — and it’s unclear who owns it.
https://www.engadget.com/2019/04/29/database-exposes-80-million-us-households/

Facebook agreed to take part in a study of how social media influences American elections, opening up its internal data to independent researchers.
https://www.niemanlab.org/2019/04/here-are-the-social-media-and-democracy-research-projects-facebook-is-giving-data-to/

Messaging company Slack warned it could be the target of large-scale cyber attacks ahead of its IPO filing.
https://securityboulevard.com/2019/04/slack-to-investors-we-might-be-the-target-of-organized-crime-nation-sponsored-hackers/

MOST PREVALENT MALWARE FILES April 25 – May 2, 2019
COMPILED BY TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
VirusTotal: scan analysis
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
VirusTotal: scan analysis
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
VirusTotal: scan analysis
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
VirusTotal: scan analysis
Typical Filename: 799b30f47060ca05d80ece53866e01cc.vir
Claimed Product: N/A
Detection Name: W32.Generic:Gen.21ij.1201

SHA 256: d05a8eaf45675b2e0cd6224723ededa92c8bb9515ec801b8b11ad770e9e1e7ed
MD5: 6372f770cddb40efefc57136930f4eb7
VirusTotal: scan analysis
Typical Filename: maftask.zip
Claimed Product: N/A
Detection Name: PUA.Osx.Adware.Gt32supportgeeks::tpd

Wildcard SSL