Newsletters: @RISK

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.





SANS NewsBites
@Risk: Security Alert
OUCH! Security Awareness
Case Leads DFIR Digest
Industrial Control Systems
Industrials & Infrastructure


@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked, and other valuable data

A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

November 29, 2018

=============================================================

     @RISK: The Consensus Security Vulnerability Alert

                   November 29, 2018 -  Vol. 18, Num. 48


Providing a reliable, weekly summary of newly discovered attack vectors,

vulnerabilities with active exploits, and explanations of how recent

attacks worked


Archived issues may be found at http://www.sans.org/newsletters/at-risk


=============================================================


CONTENTS:

NOTABLE RECENT SECURITY ISSUES

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE

MOST PREVALENT MALWARE FILES Nov. 22 - 29

============================================================


TOP VULNERABILITY THIS WEEK: DNSpionage targets Middle Eastern governments


******************** Sponsored By Pulse Secure ********************


See why automated discovery and access to IoT is essential to attain complete network visibility with SANS Dave Shackleford & Pulse Secure. Register: http://www.sans.org/info/208740


============================================================

TRAINING UPDATE


-- SANS OnDemand and vLive Training

Get the ALL NEW 11" iPad Pro, or a Microsoft Surface Pro, or Take $350 Off with OnDemand and vLive Training. Offer ends December 5.

https://www.sans.org/online-security-training/specials/


-- Cyber Defense Initiative 2018 | Washington, DC | December 11-18 | https://www.sans.org/event/cyber-defense-initiative-2018


-- SANS Security East 2019 | New Orleans, LA | February 2-9 | https://www.sans.org/event/security-east-2019


-- SANS Amsterdam January 2019 | January 14-19 | https://www.sans.org/event/amsterdam-jan-2019


-- Cyber Threat Intelligence Summit & Training | Arlington, VA | January 21-28 | https://www.sans.org/event/cyber-threat-intelligence-summit-2019


-- SANS Las Vegas 2019 | January 28-February 2 | https://www.sans.org/event/las-vegas-2019


-- SANS London February 2019 | February 11-16 | https://www.sans.org/event/london-february-2019


-- SANS Secure Japan 2019 | Tokyo, Japan | February 18-March 2 | https://www.sans.org/event/secure-japan-2019


-- Open-Source Intelligence Summit & Training | Alexandria, VA | February 25-March 3 | https://www.sans.org/event/osint-summit-2019


-- SANS Secure Singapore 2019 | March 11-23 | https://www.sans.org/event/secure-singapore-2019


-- Can't travel? SANS offers online instruction for maximum flexibility

-- Live Daytime training with Simulcast  https://www.sans.org/simulcast

-- Evening training 2x per week for 6 weeks with vLive | https://www.sans.org/vlive

-- Anywhere, Anytime access for 4 months with OnDemand format | https://www.sans.org/ondemand/


-- Single Course Training

SANS Mentor |  https://www.sans.org/mentor/about

Community SANS | https://www.sans.org/community/


-- View the full SANScourse catalogand Cyber Security Skills Roadmap

https://www.sans.org/courses

https://www.sans.org/cyber-security-skills-roadmap


********************** Sponsored Links: ********************


1) Why choose between EPP or EDR when you can have both? Discover Next Generation Endpoint Security with Cisco Systems. Register: http://www.sans.org/info/208745



2) Join SANS Alissa Torres and DomainTools as they reveal the technical realities of ICS attack protocols such as Modbus and DNP3. Register: http://www.sans.org/info/208750



3) SANS is bringing the best hands-on, immersion-style information and software security training to SANS Reno Tahoe 2019 (Feb 25-March 2)! Choose from one of six skills-based courses. Learn more, http://www.sans.org/info/208755.


============================================================


NOTABLE RECENT SECURITY ISSUES

SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP



Title: New malware, DNS redirect campaign goes after Middle East

Description: Cisco Talos discovered two new campaigns targeting the Middle East originating from the same actor. A malware, known as DNSpionage, is spreading via malicious Microsoft Office documents. So far, government agencies in Lebanon and the United Arab Emirates have been hit, along with a Lebanese airline company.

Reference: https://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.html

Snort SIDs: 48444, 48445


Title: New Olympic Destroyer variant spotted in wild

Description: A new variant of the Olympic Destroyer malware has been active over the past month with new IOCs and samples that indicate the actor behind the campaign is evolving. The malware now contains a dropper that features anti-analysis measures and delayed execution.

Reference: https://research.checkpoint.com/new-strain-of-olympic-destroyer-droppers/

Snort SIDs: 48435, 48436


Title: Zebrocy malware deployed to targets in Central Asia

Description: The Sednit APT is rolling out two new components of the Zebrocy malware, targeting countries in Central Asia and Eastern Europe. Zebrocy is a set of downloaders, droppers and backdoors. The newer components exfiltrate gathered information by using protocols related to mail services, such as POP3 and SMTP.

Reference: https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/

Snort SIDs: 48431, 48432


============================================================


INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY



The Australian prime minister is pushing for parliament to pass a controversial encryption bill before the end of the calendar year.

https://www.zdnet.com/article/australian-pm-insists-on-encryption-busting-bill-being-passed-in-next-sitting-fortnight/


A popular CPAP machine was actually monitoring users' sleep habits and transmitting the data to insurance companies.

https://www.propublica.org/article/you-snooze-you-lose-insurers-make-the-old-adage-literally-true


Brazil's Federation of Industries of the State of Sao Paulo exposed about 180 million records of individuals in an unprotected Elasticsearch database.

https://blog.hackenproof.com/industry-news/brazilian-personal-data-exposure/


Dropbox discovered a vulnerability in MacOS that affected all Mac users, a bug that was patched within a month of the disclosure.

https://blogs.dropbox.com/tech/2018/11/offensive-testing-to-make-dropbox-and-the-world-a-safer-place/


The U.S. Postal Service's Informed Visibility API contained a flaw that allowed visitors to their website to view the account details for more than 60 million other users.

https://krebsonsecurity.com/2018/11/usps-site-exposed-data-on-60-million-users/


=========================================================


RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE

COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM


This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.



ID:     CVE-2018-10933  

Title:     libssh Authentication Bypass Vulnerability

Vendor: libssh

Description: A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

CVSS v2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)


ID:     CVE-2018-11776  

Title:     Apache Struts 2 Namespace Remote Code Execution Vulnerability (S2-057)

Vendor: Apache Software Foundation

Description: Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when using results with no namespace and in same time, its upper action(s) have no or wildcard namespace. Same possibility when using url tag which doesn't have value and action set and in same time, its upper action(s) have no or wildcard namespace.

CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


ID:     CVE-2018-2628

Title:     Oracle Weblogic Deserialization Remote Code Execution Vulnerability

Vendor: Oracle

Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.

CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)


ID:     CVE-2018-8174

Title:     Windows VBScript Engine Remote Code Execution Vulnerability

Vendor: Microsoft

Description: The VBScript engine contains a remote code execution vulnerability due to how it handles objects in memory. An attacker could execute arbitrary code in the context of the current user.

CVSS v2 Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)


ID:     CVE-2018-7600

Title:     Drupal Core Remote Code Execution Vulnerability (SA-CORE-2018-002)

Vendor: Drupal

Description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


ID:     CVE-2018-0886

Title:     Microsoft Credential Security Support Provider Remote Code Execution Vulnerability

Vendor: Microsoft

Description: The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".

CVSS v2 Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)


ID:     CVE-2018-4878

Title:     Adobe Flash Player Remote Code Execution Vulnerability (APSA18-01)

Vendor: Adobe

Description: A critical vulnerability exists in Adobe Flash Player 28.0.0.137 and earlier versions. Successful exploitation could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild and is being used in targeted attacks.

CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


ID:     CVE-2017-12636

Title:     Apache CouchDB Remote Code Execution Vulnerability

Vendor: Apache Software Foundation

Description: CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.

CVSS v2 Base Score: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)


=========================================================


MOST PREVALENT MALWARE FILES Nov. 22 - 29:

COMPILED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP


SHA 256: 90cfabf6f24fd6298a1f11e7de6a101406b952642f303cce54ae58f35ff546aa

MD5: 0d83a645018d9c2cd6ad9d00ff721636

VirusTotal: https://www.virustotal.com/#/file/90cfabf6f24fd6298a1f11e7de6a101406b952642f303cce54ae58f35ff546aa/details

Typical Filename: QuickMapsAndDirections-7160824.exe

Claimed Product: IEInstaller

Detection Name: PUA.Win.Trojan.Springtech::100.sbx.vioc


SHA 256: 187d3fdce705e9e898be4a85b2193d0631bde275bf86c9a0dd510945a9131849

MD5:         b21422c2cbf71010e386770b74060aec

VirusTotal: https://www.virustotal.com/#/file/187d3fdce705e9e898be4a85b2193d0631bde275bf86c9a0dd510945a9131849/details

Typical Filename: pvz_2231500572.exe"; filename*=UTF-8''pvz_2231500572.exe

Claimed Product: Fekaputu

Detection Name: W32.187D3FDCE7-95.SBX.VIOC


SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3

MD5: 47b97de62ae8b2b927542aa5d7f3c858

VirusTotal: https://www.virustotal.com/#/file/3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3/details

Typical Filename: qmreportupload

Claimed Product: qmreportupload

Detection Name: Win.Trojan.Generic::in10.talos


SHA 256: 15ffbb8d382cd2ff7b0bd4c87a7c0bffd1541c2fe86865af445123bc0b770d13

MD5: c24315b0585b852110977dacafe6c8c1

VirusTotal: https://www.virustotal.com/#/file/15ffbb8d382cd2ff7b0bd4c87a7c0bffd1541c2fe86865af445123bc0b770d13/details

Typical Filename: spoolsv.exe

Claimed Product: N/A

Detection Name: W32.DoublePulsar:Malwaregen.21ip.1201


SHA 256: 935eddc164a994a88c372909593908c2bac327af0f29826f9d8d46da860f54a5

MD5: 178e27373fc6c417f2b56e67617c2ba9

VirusTotal: https://www.virustotal.com/#/file/935eddc164a994a88c372909593908c2bac327af0f29826f9d8d46da860f54a5/details

Typical Filename: cpnprt2.DLL

Claimed Product: Coupon Format Type 1

Detection Name: PUA.Win.Adware.Coupons::1201


=============================================================


(c) 2018.  All rights reserved.  The information contained in this

newsletter, including any external links, is provided "AS IS," with no

express or implied warranty, for informational purposes only.


Please feel free to share this with interested parties via email, but

no posting is allowed on web sites. For a free subscription, (and for

free posters) or to update a current subscription, visit

https://www.sans.org/account


SANS Institute, 8120 Woodmont Ave., Suite 310, Bethesda, MD 20814-2743