Virus Type: Ransomware

It has been reported that a new MacOS ransomware, named "ThiefQuest
ransomware" or "EvilQuest ransomware" is spreading since June 2020. This
ransomware not only encrypts the files on the system but also installs a
keylogger, remote shell and steals cryptocurrency wallet-related files from
infected hosts. Even after ransom has been paid by the victim, the attacker
continue to have access to the computer and can exfiltrate files and
keystrokes. So, the attackers can carry on spying the victims. 

Infection mechanism: 

This ransomware is distributed via legitimate applications on torrent
websites such as Little Snitch, Ableton, and Mixed in Key. After launching
the installer, ThiefQuest starts encrypting files appending a BEBABEDD
marker at the end. Ransomware will encrypt any files with the following
file extensions of size less than 800 KB: .pdf, .doc, .jpg, .txt, .pages,
.pem, .cer, .crt, .php, .py, .h, .m, .hpp, .cpp, .cs, .pl, .p, .p3, .html,
.webarchive, .zip, .xsl, .xslx, .docx, .ppt, .pptx, .keynote, .js,
.sqlite3, .wallet, .dat


When encryption is completed, it creates a text file named READ_ME_NOW.txt
with the ransom instructions.



Also, the message in Fig.3 does not contain any email address to contact
the hackers for decryptor after the ransom has been paid. This makes it
impossible for attackers to identify victims who have paid ransomware. This
leads to suspicion that ransomware may be used for spying and other
malicious activity. 

ThiefQuest downloads Python scripts disguised as GIFs and then run them. If
a file matches the search criteria, it will base64 encode the file contents
and send it to C&C server. These files include text files, images, Word
documents, SSL certificates, code-signing certificates, source code,
projects, backups, spreadsheets, presentations, databases, and
cryptocurrency wallets. 

Indicators of compromise: 

Websites:

hxxp://andrewka6[d0t]pythonanywhere[d0t]com/ret[d0t]txt
hxxp://167[d0t]71[d0t]237[d0t]219
File locations:

/var/root/.aespot
~/.aespot
~/Library/LaunchAgents/com.apple.abtpd.plist
~/Library/PrivateSync/com.abtpd.questd
~/Library/LaunchDaemons/com.apple.abtpd.plist
~/Library/PrivateSync/com.abtpd.questd
Hashes:

06974e23a3bf303f75c754156f36f57b960f0df79a38407dfdef9a1c55bf8bff
d18daea336889f5d7c8bd16a4d6358ddb315766fa21751db7d41f0839081aee2
c5a77de3f55cacc3dc412e2325637ca7a2c36b1f4d75324be8833465fd1383d3
Countermeasures and Best practices for prevention:

Users are advised to disable their RDP if not in use, if required, it
should be placed behind the firewall and users are to bind with proper
policies while using the RDP.
All operating systems and applications should be kept updated on a regular
basis. Virtual patching can be considered for protecting legacy systems and
networks. This measure hinders cybercriminals from gaining easy access to
any system through vulnerabilities in outdated applications and software.
Avoid applying updates / patches available in any unofficial channel.
Restrict execution of Power shell /WSCRIPT in an enterprise environment.
Ensure installation and use of the latest version of PowerShell, with
enhanced logging enabled. Script block logging and transcription enabled.
Send the associated logs to a centralized log repository for monitoring and
analysis.
ml
Establish a Sender Policy Framework (SPF) for your domain, which is an
email validation system designed to prevent spam by detecting email
spoofing by which most of the ransomware samples successfully reaches the
corporate email boxes.
Application whitelisting/Strict implementation of Software Restriction
Policies (SRP) to block binaries running from %APPDATA% and %TEMP% paths.
Ransomware sample drops and executes generally from these locations.
Don't open attachments in unsolicited e-mails, even if they come from
people in your contact list, and never click on a URL contained in an
unsolicited e-mail, even if the link seems benign. In cases of genuine URLs
close out the e-mail and go to the organization's website directly
through browser.
Block the attachments of file types,
exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf
Consider encrypting the confidential data as the ransomware generally
targets common file types.
Perform regular backups of all critical information to limit the impact of
data or system loss and to help expedite the recovery process. Ideally,
this data should be kept on a separate device, and backups should be stored
offline.
Network segmentation and segregation into security zones - help protect
sensitive information and critical services. Separate administrative
network from business processes with physical controls and Virtual Local
Area Networks.
Install ad blockers to combat exploit kits such as Fallout that are
distributed via malicious advertising.
References

ile-stealing-mac-wiper-in-disguise/
- -macos-users/
mware-victims/
ware-spyware-and-data-theft-into-one/

Severity Rating: MEDIUM

Software Affected

Cisco Webex Meetings releases prior to Release 40.6.0
Cisco Webex Meetings Server releases prior to Release 4.0 MR3
Overview

A vulnerability has been reported in web pages of Cisco Webex Meetings and
Cisco Webex Meetings Server which could allow an unauthenticated, remote
attacker to conduct HTML Injection.

Description

A vulnerability exists in certain web pages of Cisco Webex Meetings and
Cisco Webex Meetings Server due to improper checks on parameter values
within affected pages. An attacker could exploit this vulnerability by
persuading a user to follow a specially crafted link. 

Successful exploitation of this vulnerability could allow the remote
attacker to alter the contents of a web page or conduct client-side
attacks.

Solution

Apply appropriate security updates as mentioned in 
- -sa-webex-html-BJ4Y9tX


Vendor Information

CISCO
- -sa-webex-html-BJ4Y9tX

References

CISCO
- -sa-webex-html-BJ4Y9tX

CVE Name
CVE-2020-3345

Severity Rating: HIGH

Software Affected

Microsoft Edge (Chromium-based) versions prior to 84.0.522.40
Overview

A vulnerability has been reported in Microsoft Edge (Chromium-based) which
could allow a remote attacker to gain elevated privileges on a targeted
system.

Description

1. Elevation of Privilege Vulnerability ( CVE-2020-1341   ) 

This vulnerability exists in Microsoft Edge (Chromium-based) due to the
flaw that allows DLL files to download without prompting additional
warning. An attacker could exploit this vulnerability by dropping DLL
files.
Successful exploitation of this vulnerability could allow the attacker to
gain elevated privileges on the targeted system.

Solution

Apply appropriate updates as mentioned in Microsoft Security Guidance 


Vendor Information

Microsoft
- -1341

References

Microsoft
- -1341

Borns Tech and Windows World

CVE Name
CVE-2020-1341

Multiple Vulnerabilities in Apple Safari 

Severity Rating: High

Software Affected

Apple Safari version prior to 13.1.2.
Overview

Multiple vulnerabilities have been reported in Apple Safari which could be
exploited by a remote attacker to execute arbitrary code, perform cross
site scripting attacks or cause URL Unicode encoding on a targeted system.

Description

These vulnerabilities exist in Apple Safari due to various issues such as
improper input validation, improper access restrictions, improper state
management and improper memory handling. A remote attacker could exploit
these vulnerabilities by persuading a user to visit a specially crafted
website. 

Successful exploitation of these vulnerabilities could allow the attacker
execute arbitrary code, perform cross site scripting attacks or cause URL
Unicode encoding on a targeted system.



Solution

Apply appropriate software updates as mentioned in the   Apple Security
Updates.

Vendor Information

Apple

References

Apple

CVE Name
CVE-2019-9912
CVE-2019-9903
CVE-2019-9911
CVE-2019-9894
CVE-2019-9915
CVE-2019-9925
CVE-2019-9893
CVE-2019-9895
CVE-2019-9910
CVE-2019-9916
CVE-2019-9862

Remote Code Execution Vulnerability in Microsoft Windows GDI+

Severity Rating: High
Software Affected
·         Windows 10 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 1607 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 1709 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 1803 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 1809 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 1903 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 1909 for 32-bit Systems and x64-based Systems

·         Windows 10 Version 2004 for 32-bit Systems and x64-based Systems

·         Windows 7 for Windows 8.1 for 32-bit systems and x64-based
systems

·         Windows 10 Version 1709 for ARM64-based Systems

·         Windows 10 Version 1803 for ARM64-based Systems

·         Windows 10 Version 1809 for ARM64-based Systems

·         Windows 10 Version 1903 for ARM64-based Systems

·         Windows 10 Version 1909 for ARM64-based Systems

·         Windows 10 Version 2004 for ARM64-based Systems

·         Windows 7 for 32-bit Systems Service Pack 1 and x64-based
Systems Service Pack 1

·         Windows Server 2008 R2 for x64-based Systems Service Pack 1

·         Windows RT 8.1

·         Windows Server 2012

·         Windows Server 2012 R2

·         Windows Server 2016

·         Windows Server 2019

·         Windows Server 2008 for 32-bit Systems Service Pack 2 and
x64-based Systems Service Pack2

·         Windows Server 2008 R2 for x64-based Systems Service Pack 1
(Server Core installation)

·         Windows Server 2008 for 32-bit Systems Service Pack 2and
x64-based Systems Service Pack 2 (Server Core installation)

·         Windows Server 2012 (Server Core installation)

·         Windows Server 2012 R2 (Server Core installation)

·         Windows Server 2016 (Server Core installation)

·         Windows Server 2019 (Server Core installation)

·         Windows Server, version 1903 (Server Core installation)

·         Windows Server, version 1909 (Server Core installation)

·         Windows Server, version 2004 (Server Core installation)

Overview
A vulnerability has been reported in Microsoft Windows Graphics Device
Interface (GDI) which could allow an attacker to conduct remote code
execution on the targeted system.

Description
This vulnerability exists in Microsoft Windows Graphics Device Interface
(GDI) due to an error while handling objects in memory. A remote attacker
could exploit this vulnerability by opening a specially crafted file or
visit a malicious website, trigger memory corruption and execute arbitrary
code on the targeted system.

Successful exploitation of this vulnerability could allow an attacker to
conduct remote code execution on the targeted system.

Solution
Apply appropriate patches as mentioned in Microsoft Security Guidance


Vendor Information

Microsoft

- -1435

References
Microsoft

- -1435

CVE Name
CVE-2020-1435

Remote Code Execution Vulnerability in Microsoft DirectWrite API

Severity Rating: High

Software Affected

·         Windows 7 for 32-bit Systems SP1, x64-based Systems SP1

·         Windows RT 8.1

·         Windows 8.1 for 32-bit systems, x64-based Systems SP1

·         Windows 10 for 32-bit Systems, x64-based Systems

·         Windows 10 Version 1607 for 32-bit Systems, x64-based Systems

·         Windows 10 Version 1709 for 32-bit Systems, x64-based Systems
and ARM64-based Systems

·         Windows 10 Version 1803 for 32-bit Systems, x64-based Systems
and ARM64-based Systems

·         Windows 10 Version 1809 for 32-bit Systems, x64-based Systems
and ARM64-based Systems

·         Windows 10 Version 1909 for 32-bit Systems, x64-based Systems
and ARM64-based Systems

·         Windows 10 Version 1903 for 32-bit Systems, x64-based Systems
and ARM64-based Systems

·         Windows 10 Version 2004 for 32-bit Systems, x64-based Systems
and ARM64-based Systems

·         Windows Server 2008 for 32-bit Systems SP2 (Server Core
installation)

·         Windows Server 2008 for x64-based Systems SP2 (Server Core
installation)

·         Windows Server 2008 R2 for x64-based Systems SP1 (Server Core
installation)

·         Windows Server 2008 for 32-bit Systems SP2, x64-based Systems
SP2

·         Windows Server 2008 R2 for x64-based Systems SP1

·         Windows Server 2012

·         Windows Server 2012 R2

·         Windows Server 2012 (Server Core installation)

·         Windows Server 2012 R2 (Server Core installation)

·         Windows Server 2016

·         Windows Server 2016 (Server Core installation)

·         Windows Server 2019

·         Windows Server 2019 (Server Core installation)

·         Windows Server, version 1909 (Server Core installation)

·         Windows Server, version 1903 (Server Core installation)

·         Windows Server, version 2004 (Server Core installation)

·         Microsoft Office 2016 for Mac

·         Microsoft Office 2019 for Mac


Overview

A vulnerability has been reported in DirectWrite API of Microsoft which
could allow a remote attacker to execute arbitrary code on a targeted
system.

Description

This vulnerability exists in DirectWrite API due to improper handling of
objects in memory. A remote attacker could exploit this vulnerability by
convincing a user to open a specially crafted document or visit a crafted
malicious webpage.

Successful exploitation of this vulnerability could allow the attacker to
execute arbitrary code on the targeted system which can lead to complete
compromise of the system.

Solution

Apply appropriate patches as mentioned in Microsoft Security Guidance


Vendor Information

Microsoft

- -1409

References

CyberSecurityHelp


CVE Name

CVE-2020-1409

End of Life of Adobe Flash Player

Severity Rating: Medium

Systems Affected:

·         GitLab Enterprise Edition 11.3 and later

·         GitLab Community Edition 11.3 and later

Overview

An Information Disclosure vulnerability have been reported in GitLab
Enterprise Edition and GitLab Community Edition which can be exploited by a
remote attacker to gain access to sensitive information.

Description

Information Disclosure Vulnerability (CVE-2020-15525)

This vulnerability exists in the Maven package upload endpoint due to
incorrect access control. An attacker could use it to override restrictions
in the access control. Successful exploitation of this vulnerability could
result in the disclosure of contents of the /tmp directory by the affected
software.

Solution

Update to the latest versions of Gitlab Community Edition and Gitlab
Enterprise Edition as given in the Gitlab Security Release:
ab-13-1-3-released/

Vendor Information

Gitlab

ab-13-1-3-released/

References

Gitlab

ab-13-1-3-released/

NVD


CVEs

CVE-2020-15525

Remote Code Execution Vulnerability in Windows Remote Desktop Client

Severity Rating: High

Software Affected:               

Windows 10 for 32-bit & x64-based Systems
Windows 10 Version 1607 for 32-bit & x64-based Systems
Windows 10 Version 1709 for 32-bit,x64-based & ARM64-based Systems
Windows 10 Version 1803 for 32-bit,x64-based & ARM64-based Systems
Windows 10 Version 1809 for 32-bit,x64-based & ARM64-based Systems
Windows 10 Version 1903 for 32-bit,x64-based & ARM64-based Systems
Windows 10 Version 1909 for 32-bit,x64-based & ARM64-based Systems
Windows 10 Version 2004 for 32-bit,x64-based & ARM64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for x64-based Systems SP1 & Server Core installation
Windows Server 2012 & Server Core installation
Windows Server 2012 R2 & Server Core installation
Windows Server 2016 & Server Core installation
Windows Server 2019 & Server Core installation
Windows Server, version 1903 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Overview:
A remote code execution vulnerability has been reported in Microsoft
Windows Remote Desktop Client which could allow an attacker to execute
arbitrary code on the targeted system.



Description
This vulnerability exists in Windows Remote Desktop Client due to improper
handling the connection requests by the affected Windows Remote Desktop
Client. A remote attacker could exploit this vulnerability by compromising
a legitimate server, hosting malicious code on it, and convincing the user
to connect to the malicious server.

Successful exploitation of this vulnerability could execute arbitrary code
on the targeted system.



Solution

Apply appropriate patches as mentioned in Microsoft Security Bulletin:


Vendor Information

Microsoft


References:

Microsoft


- -1374



CVE Name
CVE-2020-1374

Remote code execution vulnerabilities in Microsoft Windows Address Book and
Windows DNS Server 

Severity Rating: HIGH
Systems Affected 
•Windows 10 for 32-bit Systems
•Windows 10 for x64-based Systems
•Windows 10 Version 1607 for 32-bit Systems
•Windows 10 Version 1607 for x64-based Systems
•Windows 10 Version 1709 for 32-bit Systems
•Windows 10 Version 1709 for ARM64-based Systems
•Windows 10 Version 1709 for x64-based Systems
•Windows 10 Version 1803 for 32-bit Systems
•Windows 10 Version 1803 for ARM64-based Systems
•Windows 10 Version 1803 for x64-based Systems
•Windows 10 Version 1809 for 32-bit Systems
•Windows 10 Version 1809 for ARM64-based Systems
•Windows 10 Version 1809 for x64-based Systems
•Windows 10 Version 1903 for 32-bit Systems
•Windows 10 Version 1903 for ARM64-based Systems
•Windows 10 Version 1903 for x64-based Systems
•Windows 10 Version 1909 for 32-bit Systems
•Windows 10 Version 1909 for ARM64-based Systems
•Windows 10 Version 1909 for x64-based Systems
•Windows 10 Version 2004 for 32-bit Systems
•Windows 10 Version 2004 for ARM64-based Systems
•Windows 10 Version 2004 for x64-based Systems
•Windows 7 for 32-bit Systems Service Pack 1
•Windows 7 for x64-based Systems Service Pack 1
•Windows 8.1 for 32-bit systems
•Windows 8.1 for x64-based systems
•Windows RT 8.1
•Windows Server 2008 for 32-bit Systems Service Pack 2
•Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation)
•Windows Server 2008 for x64-based Systems Service Pack 2
•Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation)
•Windows Server 2008 R2 for x64-based Systems Service Pack 1
•Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server
Core installation)
•Windows Server 2012
•Windows Server 2012 (Server Core installation)
•Windows Server 2012 R2
•Windows Server 2012 R2 (Server Core installation)
•Windows Server 2016
•Windows Server 2016 (Server Core installation)
•Windows Server 2019
•Windows Server 2019 (Server Core installation)
•Windows Server, version 1903 (Server Core installation)
•Windows Server, version 1909 (Server Core installation)
•Windows Server, version 2004 (Server Core installation)
Overview 
Multiple vulnerabilities have been reported in Microsoft Windows which
could allow a remote attacker to execute code on a victim system. 
Description
1. Windows Address Book Remote Code Execution Vulnerability ( CVE-2020-1410
  ) 

This vulnerability exists due to improper processing of vcard files by
Windows Address Book (WAB). To exploit the vulnerability an attacker could
send a malicious vcard that a victim opens using Windows Address Book
(WAB).
Successful exploitation of this vulnerability could allow a remote attacker
to execute arbitrary code on the victim system. 

2. Windows DNS Server Remote Code Execution Vulnerability ( CVE-2020-1350  

This vulnerability exists due to improper handling of requests by Windows
Domain Name System servers. An attacker can exploit this vulnerability by
sending malicious requests to Windows DNS server.
Successful exploitation of this vulnerability could allow an
unauthenticated attacker to execute arbitrary code in the context of the
local user. 
Solution
Apply appropriate patches and updates as mentioned in Microsoft Security
Guidance

Vendor Information
Microsoft
References
Microsoft
- -1410
- -1350
CVE Name
CVE-2020-1410
CVE-2020-1350

Remote Code Execution Vulnerability in Microsoft .NET Framework, SharePoint
Server and Visual Studio 

Severity Rating: HIGH
Software Affected 
•Microsoft SharePoint Server 2010 SP2
•Microsoft SharePoint Enterprise Server 2013 SP1
•Microsoft SharePoint Enterprise Server 2016
•Microsoft SharePoint Server 2019
•Microsoft Visual Studio 2017 version 15.0to 15.9
•Microsoft Visual Studio 2019 version 16.0 to 16.6
•.NET Core versions 2.1 and 3.1
•Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6,
4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8
•Windows 7 for 32-bit Systems SP1 and x64-based Systems SP1
•Windows 8.1 for 32-bit systems and x64-based Systems SP1
•Windows RT 8.1
•Windows Server 2008 R2 for x64-based Systems SP1
•Windows Server 2012
•Windows Server 2012 R2
•Windows Server 2016
•Windows Server 2019
•Windows 10 for 32-bit Systems and x64-based Systems
•Windows 10 Version 1607 for 32-bit Systems and x64-based Systems
•Windows 10 Version 1709 for 32-bit Systems, x64-based Systems,
ARM64-based Systems
•Windows 10 Version 1803 for 32-bit Systems, x64-based Systems,
ARM64-based Systems
•Windows 10 Version 1809 for 32-bit Systems, x64-based Systems,
ARM64-based Systems
•Windows 10 Version 1903 for 32-bit Systems, x64-based Systems,
ARM64-based Systems
•Windows 10 Version 1909 for 32-bit Systems, x64-based Systems,
ARM64-based Systems
•Windows 10 Version 2004 for 32-bit Systems, x64-based Systems,
ARM64-based Systems
•Windows Server 2008 for 32-bit Systems SP2 and x64-based Systems SP2
•Windows Server 2008 R2 for x64-based Systems SP1 (Server Core
installation)
•Windows Server 2012 (Server Core installation)
•Windows Server 2012 R2 (Server Core installation)
•Windows Server 2016 (Server Core installation)
•Windows Server 2019 (Server Core installation)
•Windows Server, version 1803 (Server Core Installation)
•Windows Server, version 1909 (Server Core installation)
•Windows Server, version 1903 (Server Core installation)
•Windows Server, version 2004 (Server Core installation)
Overview 
A vulnerability has been reported in Microsoft .NET Framework, SharePoint
Server and Visual Studio which could allow a remote attacker to execute
arbitrary code on a targeted system. 
Description
This vulnerability exists in .NET Framework, Microsoft SharePoint and
Visual Studio due to the failure of the software to check the source markup
of XML file input. A remote attacker could exploit this vulnerability by
uploading a specially crafted document to an affected server. 

Successful exploitation of this vulnerability could allow the attacker to
execute arbitrary code on the targeted system in the context of the process
responsible for deserialization of the XML content. 
Solution
Apply appropriate patches as mentioned in Microsoft Security Guidance 

Vendor Information
Microsoft
- -1147
References
CyberSecurityHelp
Red Hat Bugzilla
CVE Name
CVE-2020-1147

Remote Code Execution Vulnerability in Hyper-V RemoteFX vGPU

Severity Rating: HIGH
Software Affected 
•Windows Server 2008 R2 for x64-based Systems Service Pack 1  
•Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server
Core installation)
•Windows Server 2012     
•Windows Server 2012 (Server Core installation)    
•Windows Server 2012 R2     
•Windows Server 2012 R2 (Server Core installation)    
•Windows Server 2016    
•Windows Server 2016 (Server Core installation)
Overview 
A vulnerability has been reported in Hyper-V RemoteFX vGPU which could
allow an attacker to conduct remote code execution on the targeted system. 
Description
This vulnerability exists in Hyper-V RemoteFX vGPU due to an error while
validating input from an authenticated user on a guest operating system. A
remote attacker could exploit this vulnerability by running a specially
crafted application, attacking certain third-party video drivers running on
Hyper-V host. 

Successful exploitation of this vulnerability could allow an attacker to
conduct remote code execution on the targeted system. 
Solution
•There is no patch to fix this vulnerability. RemoteFX vGPU has been
deprecated in Windows Server 2019 and users are advised to use Discrete
Device Assignment (DDA) instead of RemoteFX vGPU.
Vendor Information
Microsoft
- -1032
- -1036
- -1040
- -1041
- -1042
- -1043
References
Microsoft
- -1032
- -1036
- -1040
- -1041
- -1042
- -1043
CVE Name
CVE-2020-1032
CVE-2020-1036
CVE-2020-1040
CVE-2020-1041
CVE-2020-1042
CVE-2020-1043

Critical Vulnerability in SAP NetWeaver AS Java

Severity Rating: HIGH

Software Affected 

SAP applications running on top of SAP NetWeaver AS Java 7.3 and any newer
versions (up to SAP NetWeaver 7.5).

Potentially vulnerable SAP business solutions include any SAP Java-based
solutions such as (but not limited to):

·         SAP Enterprise Resource Planning, SAP Product Lifecycle
Management,
·         SAP Customer Relationship Management,
·         SAP Supply Chain Management,
·         SAP Supplier Relationship Management,
·         SAP NetWeaver Business Warehouse,
·         SAP Business Intelligence,

·         SAP NetWeaver Mobile Infrastructure,

·         SAP Enterprise Portal,

·         SAP Process Orchestration/Process Integration),

·         SAP Solution Manager,

·         SAP NetWeaver Development Infrastructure,

·         SAP Central Process Scheduling,

·         SAP NetWeaver Composition Environment, and

·         SAP Landscape Manager.



Overview

A critical vulnerability has been reported in SAP NetWeaver AS Java product
which could allow an unauthenticated attacker to take control of trusted
SAP applications.

Description

This vulnerability exists due to lack of authentication in a web component
of the SAP NetWeaver AS for Java allowing for several high-privileged
activities on the SAP system. An unauthenticated remote attacker can
exploit this vulnerability through an HTTP interface, which is typically
exposed to end users and, in many cases, exposed to the internet.

Successful exploitation of this vulnerability could allow a remote
unauthenticated attacker to obtain unrestricted access to SAP systems
through the creation of high-privileged users, cause execution of arbitrary
operating system commands with the privileges of the SAP service user
account, obtain unrestricted access to the SAP database and is able to
perform application maintenance activities, such as shutting down federated
SAP applications.

Solution

Apply appropriate patches and updates as mentioned in SAP Security Patch.
Vendor Information

SAP

References

CISA, US-CERT

ONAPSIS

CVE Name
CVE-2020-6287

Remote Code Execution Vulnerability in VB Script Engine

Severity Rating: High

Software Affected:               

Internet Explorer 9
Internet Explorer 11
Overview:
A remote code execution vulnerability has been reported in VB Script Engine
which could allow an attacker to execute arbitrary code on the targeted
system.

Description
This exists in Microsoft VB Script Engine due to improper handling the
objects in memory by the affected VB Script engine. A remote attacker could
exploit this vulnerability by convincing a user to open a specially crafted
document or by convincing a user to visit a malicious web application.

Successful exploitation of this vulnerability could execute arbitrary code
in the context of the current user on the targeted system.

Solution

Apply appropriate patches as mentioned in Microsoft Security Bulletin:

Vendor Information

Microsoft


References:

Microsoft
- -1403

CVE Name
CVE-2020-1403

Current Activity 

Credit Card Skimmer Targets Microsoft ASP.NET Sites

It has been reported that Credit card skimming through various e-commerce
sites are spreading worldwide. Attackers are typically targeting e-commerce
sites because of their wide presence, popularity and the environment LAMP
(Linux, Apache, MySQL, and PHP). Recently, attackers targeted sites, which
were hosted on Microsoft's IIS server running with the ASP.NET web
application framework.

It is reported that Sports organizations, health, e-commerce websites etc.
are mostly affected by this attack and identified running with ASP.NET
version 4.0.30319, which is no longer officially supported by Microsoft and
may contains multiple known/unknown vulnerabilities.

In this attack, attackers remotely appended and obfuscated malicious code
into one of their legitimate JavaScript libraries or injected full skimming
code directly into the compromised JavaScript library. Skimmer designed to
exfiltrate the credit card numbers as well as passwords.

IOC:

Regex to find ASP.NET skimmer injections:

(jquery\w+\|\|undefined;jquery\w+={1,5}undefined&&)|(!window\.jqv\w+&&\(jqv
\w+=function\(a\)\{return)

Skimmer hosting site:

idpcdn-cloud[.]com
joblly[.]com
hixrq[.]net
cdn-xhr[.]com
rackxhr[.]com
thxrq[.]com
hivnd[.]net
31[.]220[.]60[.]108
Best practices:

Use latest version of ASP.NET web framework, IIS Web server and Database
Server.
Apply appropriate updates/patches on the OS and Application software as and
when available through OEM.
Restrict/Deny all access by default and only allow absolutely necessary
accesses.
Conduct complete security audit of web application, web server, database
server periodically and after every major configuration change and plug
vulnerabilities found.
Apply Security Information and Event Management (SIEM) and/or Database
Activity Monitoring (DAM) solutions.
Search all the websites hosted on the web server or sharing the same DB
server for the malicious webshells or any other artefact.
Periodically check the web server directories for any malicious/unknown web
shell files and remove as and when noticed.
References:

argets-asp-net-sites/

Multiple vulnerabilities in Microsoft products


Systems Affected


Microsoft Windows

Microsoft Office

ESU (Extended Security Updates)

Developer Tools

Browser

System Center

Open Source Software

 

Overview


Multiple vulnerabilities haven reported in various Microsoft products,

which could be exploited by an attacker to perform Denial of Service (DoS),

spoofing, cross site scripting (XSS) attacks, elevate privileges, obtain

access to sensitive information or executing arbitrary code on the target

system.



Description

Multiple vulnerabilities haven reported in various Microsoft products:

Kindly visit www.cert-in.org.in

Solution

Apply appropriate security updates as mentioned in


https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail

/2020-Jul  


References


https://support.microsoft.com/en-in/help/20200714/security-update-deploymen

t-information-july-14-2020


https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2020-patch-t

uesday-123-vulnerabilities-18-critical/


Virus Alert 

WastedLocker Ransomware

It has been reported that a new ransomware, named as "WastedLocker" is
spreading. The attack is mainly focused on U.S. located organizations of
various industries including manufacturing, media, IT, healthcare and many
more. The ransomware attack is attributed to infamous cybercriminal outfit
"Evil Corp" that was earlier linked to some other dreadful
cyber-attacks also.

Infection Mechanism:

The infection mechanism starts with a malicious JavaScript-based framework
known as "SocGholish" delivered in a zipped file to the victim while
visiting a compromised legitimate website. As reported, at least 150
compromised websites have been discovered. The zipped file contains
malicious JavaScript, masquerading as browser update. Another JavaScript
profiles the computer using various commands like whoami, net user, and net
group and PowerShell is used to download additional scripts.

The next pivotal stage in this attack is to download and execute a loader
from a domain being used to deliver Cobalt Strike threat emulation
software. The loader also contains .NET injector. The injected payload,
known as Cobalt Strike Beacon, can be used to inject other processes and
along with several other tools it can steal credentials, escalate
privileges, and move across the network. Attackers also search all computer
objects in Active Directory database to locate Windows servers and hosts.
Cobalt Strike is also used for credential dumping using "ProcDump".

Before deploying ransomware, attackers disable Windows Defender across
victim's entire network using PowerShell scripts and legitimate tools.
When all the payloads are deployed successfully, Windows Defender is
disabled and services across the organization are stopped, Windows
Sysinternals tool "PsExec" is used to launch WastedLocker ransomware
itself that encrypts the victim's data and deletes Windows shadow volumes
to wipe backups and file snapshots to make recovery impossible.

The threat actors behind this attack are highly experienced and this attack
on victim's network if unidentified and not addressed, can cause
substantial damage.

IOC:

IP Address:
185.189.151.38
185.162.235.167
185.82.127.38
195.123.227.225
38.135.104.189
88.119.175.104
91.219.237.36
91.236.116.63

Domain:

sodality[d0t]mandmsolicitorscom
advokat-hodonin[d0t]info/gate[d0t]php
penaz[d0t]info/gate[d0t]php
lgrarcosbann[d0t]club/index[d0t]php
cofeedback[d0t]com
consultane[d0t]com
feedbackgive[d0t]com
msoftwares[d0t]info
mwebsoft[d0t]com
net-giftshop[d0t]info
rostraffic[d0t]com
traffichi[d0t]com
typiconsult[d0t]com
websitesbuilder[d0t]info
backup[d0t]awarfaregaming[d0t]com
click[d0t]clickanalytics208[d0t]com
connect[d0t]clevelandskin[d0t]com
connect[d0t]clevelandskin[d0t]net
connect[d0t]clevelandskin[d0t]org
cushion[d0t]aiimss[d0t]com
link[d0t]easycounter210[d0t]com
rocket2[d0t]new10k[d0t]com
track[d0t]positiverefreshment[d0t]org

Hashes:

Kindly visit the URL:

stedlocker-ransomware-us
Countermeasures and Best practices for prevention:

Maintain appropriate Firewall policies to block malicious traffic entering
the system/network. Enable a personal firewall on workstation.
Keep updated Antivirus/Antimalware software to detect any threat before it
infects the system/network. Always scan the external drives/removable
devices before use. Leverage anti-phishing solutions that help protect
credentials and against malicious file downloads.
It is also important to keep web filtering tools updated.
Block the IP addresses of known malicious sites to prevent devices from
being able to access them. Activate intelligent website blacklisting to
block known bad websites.
Use limited privilege user on the computer or allow administrative access
to systems with special administrative accounts for administrators.
Block websites hosting JavaScript miners both at the gateway and the
endpoints.
Keep software and OS up-to-date so that attackers may not take advantages
of or exploit known vulnerabilities.
Change default login credentials as they are readily available with
attackers.
Avoid downloading files from untrusted websites.
Go beyond intrusion detection to protect servers with runtime memory
protection
for critical applications and server workloads, ensuring a defense against
actors who already have a grip on your server.
Disable Autorun and Autoplay policies.
Consider using application whitelists to prevent unknown executables from
launching autonomously.
Delete the system changes made by the malware such as files created/
registry entries /services etc.
Monitor traffic generated from client machines to the domains and IP
address mentioned in Installation section.
Disable unnecessary services on agency workstations and servers.
References:

stedlocker-ransomware-us
ed-in-wastedlocker-ransomware-attacks/
ant-developed-by-the-evil-corp-group/

Severity Rating:  High

Systems Affected           
Zoom's Windows client version prior to version 5.1.3 (28656.0709)

Overview
A vulnerability has been reported in the Zoom video conferencing
application running on Windows 7 and earlier Windows versions which could
allow a remote attacker to execute arbitrary code on the targeted system.

Description
This vulnerability exists in the Zoom video conferencing application
running on Windows 7 and earlier versions of Windows. A remote attacker
could exploit this vulnerability by enticing the user to execute a
specially crafted file.

Successful exploitation of this vulnerability could allow the attacker to
execute arbitrary code on the target system.

Solution
Apply appropriate security updates as mentioned in the following link:

Vendor:
Zoom

References
Zoom

OPatch Blog

Threatpost

The Hacker News

Severity rating: Medium

Software affected

Red Hat Enterprise Linux Server - AUS 7.2 x86_64
Red Hat Enterprise Linux Server - AUS 7.3 x86_64
Red Hat Enterprise Linux Server - TUS 7.3 x86_64
Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for
SAP Solutions 7.3 ppc64le
Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.3
x86_64
Overview

Multiple vulnerabilities have been reported in Red Hat Kernel which could
allow an attacker to gain escalated privileges or cause denial of service
conditions.

Description

1.  Denial of Service Vulnerability (CVE-2020-12888)

This vulnerability exists in VFIO PCI driver due to mishandling attempts to
access disabled memory space. An attacker could exploit this vulnerability
by accessing the read/write devices MMIO address space when it is disabled.

Successful exploitation of this vulnerability could crash the system or
cause a denial of service conditions on the targeted system.

2. Buffer Overflow Vulnerability (CVE-2020-12653)

This vulnerability exists in drivers/net/wireless/marvell/mwifiex/scan.c
due to an incorrect memcpy and buffer overflow in
mwifiex_cmd_append_vsie_tlv function. 

Successful exploitation of this vulnerability could allow a local attacker
to gain privileges or cause a denial of service conditions on the targeted
system.

3. Heap-based Buffer Overflow Vulnerability (CVE-2020-12654)

This vulnerability exists in drivers/net/wireless/marvell/mwifiex/wmm.c due
to heap-based buffer overflow in mwifiex_ret_wmm_get_status function.

Successful exploitation of this vulnerability could allow the attacker to
cause threat to data integrity and system availability.

Solution

Apply appropriate updates as mentioned in the vendor advisory

Vendor Information

Redhat

References

Redhat




CVE Name

CVE-2020-12888

CVE-2020-12653

CVE-2020-12654


Severity Rating: MEDIUM

Software Affected

ART/Agent  8.1.5
ART/Agent  8.1.5.1
ART/Agent  8.1.5.2
ART/Agent  8.1.5.3
ART/Agent  8.1.5.4
ART/Agent  8.1.5.5
ART/Agent  8.1.5.6
ART/Agent  8.1.6
ART/Agent  8.1.6.1
ART/Agent  8.1.6.2
ART/Agent  8.1.6.3
ART/Agent  8.1.6.4


Overview

A Vulnerability has been reported in IBM WebSphere Application Server which
could allow an attacker to obtain sensitive information leading to further
attacks.

Description
This vulnerability exists in IBM WebSphere Application Server- Liberty
which is used by IBM License Key Server Administration & Reporting Tool
(ART) and Administration Agent due to an error while checking parameters. A
remote attacker could exploit this vulnerability to obtain sensitive
information.

Successful exploitation of this vulnerability could lead to spoofing
attacks on the targeted system.

Solution

Apply appropriate patches as mentioned in the below link:

Vendor Information

IBM

Description

Smart devices are the everyday items that connect into a common network
that can be independently and remotely controlled. This can include both
'hi-tech' items (smart speakers, fitness trackers and security cameras),
and also standard household items (fridges, light bulbs and doorbells).
These devices can be controlled from smart phone or through a mobile touch
screen device.

These devices are usually connected to the internet using Wi-Fi. It gives a
live camera feed, receive alerts and gives record footage. As technology
development continues to expand, home automation helps us to manage all of
home devices from one place, flexibility for new devices and appliances,
maximizing home security, remote control of home functions, increased
energy efficiency etc.

At the same time, appliances and devices that connect to the internet and
to each other on your home network, becomes an increased risk of becoming
the target of cybercriminals. If your home network isn't secure, each new
gadget represents a potential access point for hackers. These hackers can
steal and misuse your personal information and even take control of those
smart cameras or microphones to spy on you.

Existing vulnerabilities, poor configuration, and the use of default
passwords are among the factors that can aid a hacker in compromising at
least one device in a smart home system. Once a single device is
compromised, hackers can take a number of actions depending upon on the
capabilities and functions of the device.

Beginning from the front door, for example, there can be a smart lock. If
compromised, the smart lock can give hackers control over who comes in or
out of the house.

Or a smart speaker, serves as the conduit for voice-initiated home
automation commands. If compromised, it can allow hackers to issue voice
commands of their own.

Devices like smart robot vacuum cleaners, which have some mobility around
the house, can provide hackers information about the home's layout, which
in turn, can be used by the hackers in planning further activities and
movements.

Portable and wearable smart devices add another layer of complexity to IoT
security concerns, as these devices traverse both enterprise and home
environments. Devices, such as smartwatches are typically brought by users
to the office, and then brought back home at the end of the day. A malware
infection picked up in one environment, can spread to the other if the
"bring your own device" (BYOD) policies in place are weak or if
adequate security measures are not taken to prevent such a threat.

Best Practices for Securing Smart Devices

·        Setting up device: Before buying a new device for your home,
consider doing some research on it. Understand what kind of features and
details are included and pick devices that have clearly considered quality
and security as main features. For setting up a specific device, refer to
the manufacturer's documentation.

·        Use a strongest possible encryption method for Wi-Fi.

·        Set up a Separate Wi-Fi Network for IoT Devices: By creating a
separate network dedicated to your IoT devices, you can safeguard your main
network against IoT threats. Visitors, friends and relatives can log into a
separate network that doesn't tie into your IoT devices. As placing IoT
devices on a different network keeps them detached, if hackers do manage to
get through, they can't access any of your more important devices.

·        Change the default username and password: Cybercriminal uses
these well-known passwords to access the camera remotely and view live
video or images of our home. Avoid common words or passwords that are easy
to guess, such as "password" or "123456."  Instead, use unique,
complex passwords made up of letters, numbers, and symbols for Wi-Fi
networks and device accounts. You may also consider a password manager to
up your security game.

·        Disable the unwanted features. Many IoT devices give you the
ability to control them from anywhere on the planet. But if you only use
them on your home's Wi-Fi connection, disable remote access. Smart
speakers often have Bluetooth connectivity in addition to Wi-Fi. Turn it
off, if you are not using it.

·        Setting up Router: Many routers use technologies called UPnP and
port forwarding to allow devices to find other devices within your network.
Cyber criminals can exploit these technologies to potentially access
devices on your network, such as smart cameras. Disable the UPnP and port
forwarding on the router to prevent cyber-criminal access. Don't stick
with your router's default name, which is usually its make and model.

·        Managing account: Two-factor Authentication provides a way of
double checking and makes much harder for criminals to access online
accounts, even if they know the password.

·        Keep your software up to date: Installing software updates help
keep devices secure. Updates to many IoT devices may not happen
automatically. Hence, do a manual check every few months, and if you find
any pending firmware updates, install them right away. If available, enable
the option to install automatic updates.

·        Protect your smartphone: Most home smart technology and security
systems can be controlled by an app on your mobile phone, so protecting
your smartphone is crucial. Be sure you have your smartphone
password-protected so that if your phone is lost or stolen, no one will be
able to access your home smart tech or security system apps.

·        Audit the IoT devices already on your home network.

·        Watch out for outages: Ensure that a hardware outage does not
result in an unsecure state for the device.

·        Perform a factory reset when malicious control/access of a device
in your home.

·        Perform factory reset before selling the device: If you decide to
sell or give away one of your smart electronics, follow the
manufacturer's instructions to remove all of your data. Otherwise, the
next person who gets their hands on it may automatically access all of your
information or communicate with other devices on your network.

References



rt-home-devices/


in-Your-Smart-Home.aspx

Severity rating:  High

Software affected

F5 BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link
Controller, PEM) versions:

·         15.x versions 15.1.0 and 15.0.0

·         14.x versions from 14.1.0 to 14.1.2

·         13.x versions from 13.1.0 to 13.1.3

·         12.x versions from 12.1.0 to 12.1.5

Overview

A vulnerability has been reported in F5 BIG-IP products which could allow
an attacker to perform cross-site scripting attack on a targeted system.

Description

This vulnerability exists in multiple BIG-IP products due to a flaw in
undisclosed pages of Traffic Management User Interface (TMUI), also
referred to as the Configuration utility. 
Successful exploitation of this vulnerability could allow the attacker to
run JavaScript in the context of the currently logged-in user. In case the
user has administrative privileges with access to the Advanced Shell
(bash), the attacker can completely compromise the targeted system.

Solution

Update to the fixed versions as mentioned in the F5 advisory

Vendor Information

F5 Networks


References

Tenable


CVE Name

CVE-2020-5903

Severity Rating: HIGH

Software Affected

·         VMware Fusion 11.x versions prior to 11.5.5

·         VMware Remote Console for Mac versions prior to 11.2.0

·         Horizon Client for Mac versions prior to 5.4.3

Overview

A vulnerability has been reported in multiple VMware products which could
allow an attacker to gain elevated privileges on a targeted system.

Description

This vulnerability exists in affected products due to improper XPC Client
validation.

Successful exploitation of this vulnerability could allow an attacker with
normal user privileges to gain  root privileges on the targeted system.

Solution

Apply appropriate updates as mentioned in VMware Security Advisory:


Vendor Information

VMware


References

Securezoo

rability-cve-2020-3974/

CVE Name

CVE-2020-3974

Severity Rating: Critical

Software Affected
●      Google Android versions 8.0,8.1,9,10

Overview

Multiple vulnerabilities have been reported in Google Android which could
allow a remote attacker to gain elevated privileges, obtain sensitive
information, execute remote code and cause Denial of service condition on
the targeted system.

Description

These vulnerabilities exist in Framework, Media framework, System, Broadcom
components, Kernel Components, Media Tek components, Qualcomm components,
Qualcomm closed-source components of Google Android. A remote attacker
could exploit these vulnerabilities by hosting a specially crafted file
designed to exploit the vulnerabilities.

Successful exploitation of these vulnerabilities could allow an attacker to
gain elevated privileges, disclose sensitive information, execute remote
and cause Denial of Service condition on the targeted system.

Solution

Apply appropriate fix as mentioned in Google Android Security Advisory

Vendor Information
Android

References
Android

CVE Name
CVE-2018-20669
CVE-2019-10580
CVE-2019-14123
CVE-2019-14124
CVE-2019-14130
CVE-2019-18282
CVE-2019-20636
CVE-2019-9501
CVE-2019-9502
CVE-2020-0107
CVE-2020-0122
CVE-2020-0224
CVE-2020-0225
CVE-2020-0226
CVE-2020-0227
CVE-2020-0228
CVE-2020-0230
CVE-2020-0231
CVE-2020-3688
CVE-2020-3698
CVE-2020-3699
CVE-2020-3700
CVE-2020-3701
CVE-2020-9589



Description

Smart devices are the everyday items that connect into a common network
that can be independently and remotely controlled. This can include both
'hi-tech' items (smart speakers, fitness trackers and security cameras),
and also standard household items (fridges, light bulbs and doorbells).
These devices can be controlled from smart phone or through a mobile touch
screen device.

These devices are usually connected to the internet using Wi-Fi. It gives a
live camera feed, receive alerts and gives record footage. As technology
development continues to expand, home automation helps us to manage all of
home devices from one place, flexibility for new devices and appliances,
maximizing home security, remote control of home functions, increased
energy efficiency etc.

At the same time, appliances and devices that connect to the internet and
to each other on your home network, becomes an increased risk of becoming
the target of cybercriminals. If your home network isn't secure, each new
gadget represents a potential access point for hackers. These hackers can
steal and misuse your personal information and even take control of those
smart cameras or microphones to spy on you.

Existing vulnerabilities, poor configuration, and the use of default
passwords are among the factors that can aid a hacker in compromising at
least one device in a smart home system. Once a single device is
compromised, hackers can take a number of actions depending upon on the
capabilities and functions of the device.

Beginning from the front door, for example, there can be a smart lock. If
compromised, the smart lock can give hackers control over who comes in or
out of the house.

Or a smart speaker, serves as the conduit for voice-initiated home
automation commands. If compromised, it can allow hackers to issue voice
commands of their own.

Devices like smart robot vacuum cleaners, which have some mobility around
the house, can provide hackers information about the home's layout, which
in turn, can be used by the hackers in planning further activities and
movements.

Portable and wearable smart devices add another layer of complexity to IoT
security concerns, as these devices traverse both enterprise and home
environments. Devices, such as smartwatches are typically brought by users
to the office, and then brought back home at the end of the day. A malware
infection picked up in one environment, can spread to the other if the
"bring your own device" (BYOD) policies in place are weak or if
adequate security measures are not taken to prevent such a threat.

Best Practices for Securing Smart Devices

·        Setting up device: Before buying a new device for your home,
consider doing some research on it. Understand what kind of features and
details are included and pick devices that have clearly considered quality
and security as main features. For setting up a specific device, refer to
the manufacturer's documentation.

·        Use a strongest possible encryption method for Wi-Fi.

·        Set up a Separate Wi-Fi Network for IoT Devices: By creating a
separate network dedicated to your IoT devices, you can safeguard your main
network against IoT threats. Visitors, friends and relatives can log into a
separate network that doesn't tie into your IoT devices. As placing IoT
devices on a different network keeps them detached, if hackers do manage to
get through, they can't access any of your more important devices.

·        Change the default username and password: Cybercriminal uses
these well-known passwords to access the camera remotely and view live
video or images of our home. Avoid common words or passwords that are easy
to guess, such as "password" or "123456."  Instead, use unique,
complex passwords made up of letters, numbers, and symbols for Wi-Fi
networks and device accounts. You may also consider a password manager to
up your security game.

·        Disable the unwanted features. Many IoT devices give you the
ability to control them from anywhere on the planet. But if you only use
them on your home's Wi-Fi connection, disable remote access. Smart
speakers often have Bluetooth connectivity in addition to Wi-Fi. Turn it
off, if you are not using it.

·        Setting up Router: Many routers use technologies called UPnP and
port forwarding to allow devices to find other devices within your network.
Cyber criminals can exploit these technologies to potentially access
devices on your network, such as smart cameras. Disable the UPnP and port
forwarding on the router to prevent cyber-criminal access. Don't stick
with your router's default name, which is usually its make and model.

·        Managing account: Two-factor Authentication provides a way of
double checking and makes much harder for criminals to access online
accounts, even if they know the password.

·        Keep your software up to date: Installing software updates help
keep devices secure. Updates to many IoT devices may not happen
automatically. Hence, do a manual check every few months, and if you find
any pending firmware updates, install them right away. If available, enable
the option to install automatic updates.

·        Protect your smartphone: Most home smart technology and security
systems can be controlled by an app on your mobile phone, so protecting
your smartphone is crucial. Be sure you have your smartphone
password-protected so that if your phone is lost or stolen, no one will be
able to access your home smart tech or security system apps.

·        Audit the IoT devices already on your home network.

·        Watch out for outages: Ensure that a hardware outage does not
result in an unsecure state for the device.

·        Perform a factory reset when malicious control/access of a device
in your home.

·        Perform factory reset before selling the device: If you decide to
sell or give away one of your smart electronics, follow the
manufacturer's instructions to remove all of your data. Otherwise, the
next person who gets their hands on it may automatically access all of your
information or communicate with other devices on your network.

References



rt-home-devices/


in-Your-Smart-Home.aspx

Virus Type: crypto-jacking Malware

It has been reported that a new self-propagating malware, dubbed "Lucifer",
targeting Windows systems with crypto-jacking and DDoS attacks is
spreading. The latest variant of this malware was discovered recently
related to exploitation of vulnerability in Laravel Framework
(CVE-2019-9081) that can be leveraged for remote code execution (RCE)
attacks. Reports indicate that this malware utilizes an exhaustive list of
unpatched critical vulnerabilities. While the patches of all critical and
highly severe vulnerabilities are available but the systems affected by
Lucifer malware have not been applied upon with those patches.

The vulnerabilities exploited by Lucifer includes affect Rejetto HTTP File
Server (CVE-2014-6287), Oracle Weblogic (CVE-2017-10271), ThinkPHP RCE
(CVE-2018-20062), Apache Struts (CVE-2017-9791), Laravel framework
CVE-2019-9081), and Microsoft Windows (CVE-2017-0144, CVE-2017-0145, and
CVE-2017-8464) and some others depending on which version of the malware is
in role.

After exploiting the flaws, connection to C2 server is established for
arbitrary command execution including performing DDoS attack, transferring
stolen data etc. Another command allows the malware to drop XMRig miner, a
program used to secretly mine Monero (XMR) cryptocurrency. Lucifer also
receives command from C2 server to keep the operator informed about the
status of Monero crypto currency miner.


The malware scans open TCP ports 135(RPC) and 1433(MSSQL) and if found
open, it launches brute-force attack to obtain access. In addition to this,
the malware leverages exploitation for self- propagation. If SMB protocol
is open, Lucifer executes several backdoors including the EternalBlue,
EternalRomance, and DoublePulsar exploits to establish persistence. It also
tampers registry to schedule itself as a task at startup.


The malware utilizes "certutil utility" in the payload for self-
propagation and targets Windows hosts on both the internet and intranet.
With its updated features, Lucifer also checks for the presence of
sandboxes or VMs to escape from detection and if anyone of those is found
it enters "infinite loop" which stops operations.

Lucifer can be summarized as a new hybrid of crypto-jacking and DDoS
malware variant exploiting unpatched critical vulnerabilities for malicious
activity on Windows hosts.

Till date, two different versions of Lucifer malware are observed which
indicates that malware is evolving in threat potential and sophistication.

IOC:
Lucifer version 1:
Malware Hosting Site:

180[.]126[.]161[.]27
210[.]112[.]41[.]71

C2:
122[.]112[.]179[.]189:15888 (version 1)
Created Files:

C:\\ProgramData\\spread.txt
C:\\ProgramData\\index.html
C:\\ProgramData\\spreadXfghij.exe
C:\\ProgramData\\SMB.exe
C:\\ProgramData\\svchostlong.exe
C:\\ProgramData\\X86.dll
C:\\ProgramData\\X64.dll
%TEMP%\\<4-random-lower-case-characters>.exe
Lucifer version 2:

Malware Hosting Site

121[.]206[.]143[.]140
C2:

qf2020[.]top:19370
Note: For complete set of IOCs please refer the URL:

id-malware/
Countermeasures and Best practices for prevention:

Keep software and OS up-to-date so that attackers may not take advantages
of or exploit known vulnerabilities.
Keep updated Antivirus/Antimalware software to detect any threat before it
infects the system/network. Always scan the external drives/removable
devices before use. Leverage anti-phishing solutions that help protect
credentials and against malicious file downloads.
It is also important to keep web filtering tools updated.
Change default login credentials as they are readily available with
attackers.
Use limited privilege user on the computer or allow administrative access
to systems with special administrative accounts for administrators.
Avoid downloading files from untrusted websites.
Network administrators should continuously monitor systems and guide their
employees to recognize any above-normal sustained CPU loading activity on
computer workstations, mobile devices, and network servers. Network
activity should continuously be monitored for any unusual activity.
Maintain appropriate Firewall policies to block malicious traffic entering
the system/network. Enable a personal firewall on workstation.
Block the IP addresses of known malicious sites to prevent devices from
being able to access them. Activate intelligent website blacklisting to
block known bad websites.
Block websites hosting JavaScript miners both at the gateway and the
endpoints.
Maintain browser extensions as some attackers are using malicious browser
extensions or poisoning legitimate extensions to execute cryptomining
scripts.
Go beyond intrusion detection to protect servers with runtime memory
protection
for critical applications and server workloads, ensuring a defense against
actors who already have a grip on your server.
Disable Autorun and Autoplay policies.
Consider using application whitelists to prevent unknown executables from
launching autonomously.
Delete the system changes made by the malware such as files created/
registry entries /services etc.
Monitor traffic generated from client machines to the domains and IP
address mentioned in Installation section.
Disable unnecessary services on agency workstations and servers.
References

id-malware/
tems/156883/
- -vulnerabilities-on-your-windows-pc/

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top