NewsBone.com - Barebones News
Tech - Linux/BSD - Apache - Security - Hardware - Gaming - Autos - World - Entertainment - About
+ Janes/IHS ~ CurrentActivityCERT ~ CERT ~ WiredSecurity +

MDA, Lockheed Martin seek ‘final transition' of LRDR
The Pentagon's Missile Defense Agency (MDA) and its industry counterparts at Lockheed Martin are preparing for the ‘final transition' of the long-awaited Long Range...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

US Coast Guard Airbus MH-65s retire from Arctic mission
The last US Coast Guard (USCG) Airbus MH-65 Dolphin in Alaska retired from Air Station Kodiak on 23 April, ending the type's 36-year employment in the service's Alaska...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

HMS Diamond shoots down Houthi missile in Red Sea
The UK Royal Navy's (RN's) Daring (Type 45)-class destroyer HMS Diamond (D 34) has successfully engaged an anti-ship ballistic missile (ASBM) launched by Yemen-based...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Rafale enters Croatian service
Croatia has inducted into service the Dassault Rafale combat aircraft it recently received from France.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

UK explores new radar and IR tech to enhance SDA
The UK's Defence Science and Technology Laboratory (Dstl) is conducting three technology demonstrator programmes to explore the utility of novel space domain awareness...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Italy to enhance SSA with new ground-based sensors
The Italian National Armaments Directorate (NAD) is procuring three ground-based sensors to enhance the country's space situational awareness (SSA), Janes learnt at the...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Update: BAE Systems outlines Type 26 frigate progress amid steelworker shortage
BAE Systems Naval Ships in Glasgow is outsourcing steel work and introducing a new automated panel line as part of efforts to mitigate the impact of a steelworker...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Airbus flies RACER high-speed helicopter
Airbus Helicopters has flown its Rapid and Cost-Efficient Rotorcraft (RACER) concept for the first time, the company announced on 25 April.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

QinetiQ demonstrates jet-to-jet MUM-T for first time in the UK
QinetiQ has for the first time in the UK demonstrated manned-unmanned teaming (MUM-T) between jet aircraft.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Netherlands, Poland approved for AARGM-ER SEAD/DEAD missiles
The US government has approved the sale of the Northrop Grumman AGM-88G Advanced Anti-Radiation Guided Missile – Extended Range (AARGM-ER) to the Netherlands and Poland.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Initial flight trials demonstrate Excalibur FTA ‘fit for purpose‘, says Leonardo
Initial flight trials of the 757 airframe that is to be converted to the Excalibur Flight Test Aircraft (FTA) project to de-risk the Tempest future fighter have shown it...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

UAE inaugurates GlobalEye early warning aircraft
The Ministry of Defence (MoD) of the United Arab Emirates (UAE) announced on 24 April that a reception ceremony for an early warning aircraft had been held at Al-Dhafra...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

India's GalaxEye developing satellite with multiple sensors for Earth observation
Bangalore-based GalaxEye Space is developing a satellite that can carry multiple sensors for Earth observation to support the requirements of the Indian Armed Forces.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Special Report: Australia to accentuate maritime capabilities amid China's coercion
The Australian government has released two more policy documents that outline its defence development intentions over the next few years. The two documents – National...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Vietnam issues diplomatic note to Malaysia after South China Sea collision
Hanoi has issued a diplomatic note to Putrajaya after a Malaysia Maritime Enforcement Agency (MMEA) vessel collided into a Vietnamese fishing boat in disputed waters of...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Brazilian Army seeks 12 UH-60M Black Hawk helicopters
The Brazilian Army is to acquire 12 Sikorsky UH-60M Black Hawk utility helicopters to replace its eight HM-3 Cougar and four HM-2 Black Hawk helicopters, said Army...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Brazil to update A-29 Super Tucano aircraft fleet
Embraer Defense and Security is to carry out the mid-life upgrade (MLU) of 68 of the EMB 314 (locally designated A-29) Super Tucano training and light attack aircraft of...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Brazil to buy additional VBMT-LSR Guaicurus 44 vehicles
The Manufacturing Directorate of the Brazilian Army plans to acquire up to 420 new Iveco Defence Vehicles (IDV) Light Multirole Vehicles (LMVs).
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Spain upgrades and acquires more NASAMS systems
The Spanish government has announced the EUR410 million (USD438 million) modernisation and acquisition of additional National Advanced Surface-to-Air Missile Systems...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Iraqi Army Aviation Command identifies itself as CH-5 UAV operator
Iraqi Army Aviation Command (IAAC) has confirmed it has ordered, if not already received, Chinese-made CH-5 unmanned aerial vehicles (UAVs).
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

General Atomics tests podded guns on Mojave UAV
General Atomics Aeronautical Systems, Inc (GA-ASI) has tested a podded gun on its Mojave short take-off and landing (STOL) unmanned aerial vehicle (UAV), the company...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Lockheed Martin secures contract to deliver JABMS to Australia
Lockheed Martin has secured a contract worth AUD500 million (USD323 million) from the Australian Department of Defence (DoD) to build a Joint Air Battle Management...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

New aerial vehicle seen on Chinese H-6 bomber
A Chinese Xi'an Aircraft Company (XAC) H-6MW bomber has been photographed in flight while carrying a new type of air-launched vehicle.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Vietnam outlines intent to procure K9 howitzer
Vietnam's Ministry of Defence (MoD) has indicated that it is planning to procure the K9 self-propelled howitzer (SPH) – developed and produced by South Korea's Hanwha...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Austal completes sea trials for Australia's autonomous patrol boat project
Australian shipbuilder Austal has completed the sea acceptance trials phase for the country's Patrol Boat Autonomy Trial (PBAT), the company announced on 23 April.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

NewsBone.com
Suggest a feed to syndicate here, or check out what I'm doing over at freshtao.
~Created Sat Apr 27 19:15:01 2024

CISA Releases Four Industrial Control Systems Advisories
CISA released four Industrial Control Systems (ICS) Advisories on October 9, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. 

ICSA-25-282-01 Hitachi Energy Asset Suite ICSA-25-282-02 Rockwell Automation Lifecycle Services with Cisco ICSA-25-282-03 Rockwell Automation Stratix
  • ICSA-25-128-03 Mitsubishi Electric Multiple FA Products (Update A) 
  • CISA encourages users and administrators to review newly released ICS Advisories for technical details and mitigations. 

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds One Known Exploited Vulnerability to Catalog
    CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-43798 Grafana Path Traversal Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds One Known Exploited Vulnerability to Catalog
    CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-27915 Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Two Industrial Control Systems Advisories
    CISA released two Industrial Control Systems (ICS) advisories on October 7, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-280-01 Delta Electronics DIAScreen ICSA-25-226-31 Rockwell Automation 1756-EN4TR, 1756-EN4TRXT (Update B) CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds Seven Known Exploited Vulnerabilities to Catalog
    CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2010-3765 Mozilla Multiple Products Remote Code Execution Vulnerability CVE-2010-3962 Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability CVE-2011-3402 Microsoft Windows Remote Code Execution Vulnerability

  • CVE-2013-3918 Microsoft Windows Out-of-Bounds Write Vulnerability
  • CVE-2021-22555 Linux Kernel Heap Out-of-Bounds Write Vulnerability
  • CVE-2021-43226 Microsoft Windows Privilege Escalation Vulnerability
  • CVE-2025-61882 Oracle E-Business Suite Unspecified Vulnerability 
  • These types of vulnerabilities are frequent attack vector for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Two Industrial Control Systems Advisories
    CISA released two Industrial Control Systems (ICS) advisories on October 2, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-275-01 Raise3D Pro2 Series 3D Printers ICSA-25-275-02 Hitachi Energy MSM Product CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds Five Known Exploited Vulnerabilities to Catalog
    CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2014-6278 GNU Bash OS Command Injection Vulnerability CVE-2015-7755 Juniper ScreenOS Improper Authentication Vulnerability CVE-2017-1000353 Jenkins Remote Code Execution Vulnerability

  • CVE-2025-4008 Smartbedded Meteobridge Command Injection Vulnerability
  • CVE-2025-21043 Samsung Mobile Devices Out-of-Bounds Write Vulnerability
  • These types of vulnerabilities are frequent attack vector for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Ten Industrial Control Systems Advisories
    CISA released ten Industrial Control Systems (ICS) advisories on September 30, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-273-01 MegaSys Enterprises Telenium Online Web Application ICSA-25-273-02 Festo SBRD-Q/SBOC-Q/SBOI-Q ICSA-25-273-03 Festo CPX-CEC-C1 and CPX-CMXX

  • ICSA-25-273-04 Festo Controller CECC-S,-LK,-D Family Firmware
  • ICSA-25-273-05 OpenPLC_V3
  • ICSA-25-273-06 National Instruments Circuit Design Suite
  • ICSA-25-273-07 LG Innotek Camera Multiple Models
  • ICSA-25-063-02 Keysight Ixia Vision Product Family (Update A)
  • ICSA-22-298-02 HEIDENHAIN Controller TNC (Update A)
  • ICSA-25-226-26 Rockwell Automation FLEX 5000 I/O (Update A)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds Five Known Exploited Vulnerabilities to Catalog
    CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-21311 Adminer Server-Side Request Forgery Vulnerability CVE-2025-20352 Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability CVE-2025-10035 Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability

  • CVE-2025-59689 Libraesva Email Security Gateway Command Injection Vulnerability
  • CVE-2025-32463 Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability
  • These types of vulnerabilities are frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA and UK NCSC Release Joint Guidance for Securing OT Systems
    CISA, in collaboration with the Federal Bureau of Investigation, the United Kingdom’s National Cyber Security Centre, and other international partners has released new joint cybersecurity guidance: Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture. Building on the recent Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators, this guidance explains how organizations can leverage data sources, such as asset inventories and manufacturer-provided resources like software bill of materials to establish and maintain an accurate, up-to-date view of their OT systems. A definitive OT record enables organizations to conduct more comprehensive risk assessments, prioritize critical and exposed systems, and implement appropriate security controls. The guidance also addresses managing third-party risks, securing OT information, and designing effective architectural controls.

    Key recommendations include: Collaborating Across Teams: Foster coordination between OT and IT teams; Aligning with Standards: Follow international standards such as IEC 62443 and ISO/IEC 27001.

    Organizations are encouraged to use this guidance to strengthen their OT security posture and reduce risks. For additional details, review the full guidance: Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Strengthens Commitment to SLTT Governments
    The Cybersecurity and Infrastructure Security Agency (CISA) announced that it has transitioned to a new model to better equip state, local, tribal, and territorial (SLTT) governments to strengthen shared responsibility nationwide. CISA is supporting our SLTT partners with access to grant funding, no-cost tools, and cybersecurity expertise to be resilient and lead at the local level.  CISA’s cooperative agreement with the Center for Internet Security (CIS) will reach its planned end on September 30, 2025. This transition reflects CISA’s mission to strengthen accountability, maximize impact, and empower SLTT partners to defend today and secure tomorrow. Support for SLTTs includes: Access to Grant Funding from the Department of Homeland Security (DHS), available through CISA in coordination with the Federal Emergency Management Agency (FEMA). This funding is provided via the State and Local Cybersecurity Grant Program (SLCGP) and the Tribal Cybersecurity Grant Program (TCGP). No-cost services and tools such as Cyber Hygiene scanning and vulnerability management Cybersecurity Performance Goals and the Cyber Security Evaluation Tool to prioritize and measure progress

  • Regional Cybersecurity Advisors and Cybersecurity Coordinators delivering hands-on, local and virtual expertise
  • Professional services including vulnerability assessments and incident response coordination
  • Bi-monthly SLTT Security Operations Center calls providing timely cyber defense updates
  • This initiative reinforces CISA’s role as the nation’s leading cyber defense agency, protecting critical infrastructure, enabling secure communications, and empowering partners on the front lines of America’s cybersecurity.

    For more information about CISA’s Cybersecurity Services for SLTT partners, visit:  CISA Cybersecurity Resources for State, Local, Tribal, and Territorial
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases One Industrial Control Systems Advisory
    CISA released one Industrial Control Systems (ICS) advisory on September 25, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-268-01 Dingtian DT-R002 CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
    Today, CISA issued Emergency Directive ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices to address vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Cisco Firepower devices. CISA has added vulnerabilities CVE-2025-20333 and CVE-2025-20362 to the Known Exploited Vulnerabilities Catalog.  The Emergency Directive requires federal agencies to identify, analyze, and mitigate potential compromises immediately. Agencies must: Identify all instances of Cisco ASA and Cisco Firepower devices in operation (all versions). Collect and transmit memory files to CISA for forensic analysis by 11:59 p.m. EST Sept. 26.  For detailed guidance, including additional actions tailored to each agency’s status, refer to the full Emergency Directive ED 25-03.

    The following associated resources are available to assist agencies.  Supplemental Direction ED 25-03: Core Dump and Hunt Instructions

  • Eviction Strategies Tool with a Cisco ASA Compromise template to assemble a comprehensive eviction plan with distinct countermeasures for containment and eviction which can be tailored to individual network owners’ specific needs.
  • Known Exploited Vulnerabilities Catalog
  • Cisco Security Advisories:

    Although ED 25-03 and the associated supplemental guidance are directed to federal agencies, CISA urges all public and private sector organizations to review the Emergency Directive and associated resources and take steps to mitigate these vulnerabilities.
    Alerts ~Created Fri Oct 10 06:24:14 2025

  • Widespread Supply Chain Compromise Impacting npm Ecosystem
    CISA is releasing this Alert to provide guidance in response to a widespread software supply chain compromise involving the world’s largest JavaScript registry, npmjs.com. A self-replicating worm—publicly known as “Shai-Hulud”—has compromised over 500 packages.[i] After gaining initial access, the malicious cyber actor deployed malware that scanned the environment for sensitive credentials. The cyber actor then targeted GitHub Personal Access Tokens (PATs) and application programming interface (API) keys for cloud services, including Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure.[ii] The malware then: Exfiltrated the harvested credentials to an endpoint controlled by the actor. Uploaded the credentials to a public repository named Shai-Hulud via the GitHub/user/repos API. Leveraged an automated process to rapidly spread by authenticating to the npm registry as the compromised developer, injecting code into other packages, and publishing compromised versions to the registry.[iii]

    CISA urges organizations to implement the following recommendations to detect and remediate this compromise:

  • Conduct a dependency review of all software leveraging the npm package ecosystem.
    • Check for package-lock.json or yarn.lock files to identify affected packages, including those nested in dependency trees.
    • Search for cached versions of affected dependencies in artifact repositories and dependency management tools.
    • Pin npm package dependency versions to known safe releases produced prior to Sept. 16, 2025.
    • Immediately rotate all developer credentials.
    • Mandate phishing-resistant multifactor authentication (MFA) on all developer accounts, especially for critical platforms like GitHub and npm.
    • Monitor for anomalous network behavior.
      • Block outbound connections to webhook.site domains.
      • Monitor firewall logs for connections to suspicious domains.
    • Harden GitHub security by removing unnecessary GitHub Apps and OAuth applications, and auditing repository webhooks and secrets.
    • Enable branch protection rules, GitHub Secret Scanning alerts, and Dependabot security updates.

    See the following resources for additional guidance on this compromise:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.


     


    [i] Ashish Kurmi, “Shai-Hulud: Self Replicating Work Compromises 500+ NPM Packages,” StepSecurity, (September 15, 2025), https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised
    Kush Pandya, Peter van der Zee, and Olivia Brown, “Updated and Ongoing Supply Chain Attack Targets CrowdStrike npm Packages,” Socket, (September 16, 2025), https://socket.dev/blog/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages.

    [ii] Palo Alto Networks Unit 42, “‘Shai-Hulud’ Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 19),” Unit 42, Palo Alto Networks, (September 17, 2025), https://unit42.paloaltonetworks.com/npm-supply-chain-attack/.

    [iii] Palo Alto Networks Unit 42, “Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 19).”


    Alerts ~Created Fri Oct 10 06:24:14 2025

  • CISA Releases Advisory on Lessons Learned from an Incident Response Engagement
    Today, CISA released a cybersecurity advisory detailing lessons learned from an incident response engagement following the detection of potential malicious activity identified through security alerts generated by the agency’s endpoint detection and response tool.  This advisory, CISA Shares Lessons Learned from an Incident Response Engagement, highlights takeaways that illuminate the urgent need for timely patching, comprehensive incident response planning, and proactive threat monitoring to mitigate risks from similar vulnerabilities. The advisory also outlines the tactics, techniques, and procedures (TTPs) employed by cyber threat actors, including exploitation of GeoServer Vulnerability CVE-2024-36401 for initial access. By understanding these TTPs, organizations can enhance their defenses against similar threats.

    CISA recommends organizations take the following actions: Prioritize Patch Management: Expedite patching of critical vulnerabilities, particularly those listed in CISA’s Known Exploited Vulnerabilities catalog, with a focus on public-facing systems. Strengthen Incident Response Plans: Regularly update, test, and maintain incident response plans, ensuring they include procedures for engaging third-party responders and deploying security tools without delay. Enhance Threat Monitoring: Implement centralized, out-of-band logging and ensure security operations centers continuously monitor and investigate abnormal network activity to detect and respond to malicious activity effectively.

    CISA urges organizations to apply these lessons learned to bolster their security posture, improve preparedness, and reduce the risk of future compromises. For additional details, review the full cybersecurity advisory.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds One Known Exploited Vulnerability to Catalog
    CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-10585 Google Chromium V8 Type Confusion Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Six Industrial Control Systems Advisories
    CISA released six Industrial Control Systems (ICS) advisories on September 23, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-266-01 AutomationDirect CLICK PLUS ICSA-25-266-02 Mitsubishi Electric MELSEC-Q Series CPU Module ICSA-25-266-03 Schneider Electric SESU

  • ICSA-25-266-04 Viessmann Vitogate 300
  • ICSA-25-023-02 Hitachi Energy RTU500 Series Product (Update A)
  • ICSA-25-093-01 Hitachi Energy RTU500 Series (Update B)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    SonicWall Releases Advisory for Customers after Security Incident
    SonicWall released a security advisory to assist their customers with protecting systems impacted by the MySonicWall cloud backup file incident. SonicWall’s investigation found that a malicious actor performed a series of brute force techniques against their MySonicWall.com web portal to gain access to a subset of customers’ preference files stored in their cloud backups. While credentials within the files were encrypted, the files also included information that actors can use to gain access to customers’ SonicWall Firewall devices.  CISA recommends all SonicWall customers follow guidance in the advisory,[1] which includes logging into their customer account to verify whether their device is at risk. Customers with at-risk devices should implement the advisory’s containment and remediation guidance immediately.   


    [1] Sonicwall.com, MySonicWall Cloud Backup File Incident, accessed September 22, 2025, https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330.


    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Nine Industrial Control Systems Advisories
    CISA released nine Industrial Control Systems (ICS) advisories on September 18, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-261-01 Westermo Network Technologies WeOS 5 ICSA-25-261-02 Westermo Network Technologies WeOS 5 ICSA-25-261-03 Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit

  • ICSA-25-261-04 Hitachi Energy Asset Suite
  • ICSA-25-261-05 Hitachi Energy Service Suite
  • ICSA-25-261-06 Cognex In-Sight Explorer and In-Sight Camera Firmware
  • ICSA-25-261-07 Dover Fueling Solutions ProGauge MagLink LX4 Devices
  • ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update C)
  • ICSA-24-030-02 Mitsubishi Electric FA Engineering Software Products (Update D)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Malware Analysis Report on Malicious Listener Targeting Ivanti Endpoint Manager Mobile Systems
    Today, CISA released a Malware Analysis Report detailing the functionality of two sets of malware obtained from an organization compromised by cyber threat actors exploiting CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (Ivanti EPMM).   The Malware Analysis Report, Malicious Listener for Ivanti EPMM Systems, provides guidance to help organizations detect and mitigate these threats, including indicators of compromise and YARA and SIGMA rules. Mitigations include highlighting the need to upgrade Ivanti EPMM systems to the latest version and to treat mobile device management systems as high-value assets with strengthened monitoring and restrictions.  For more information, visit https://www.cisa.gov/news-events/analysis-reports/ar25-261a.  
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Eight Industrial Control Systems Advisories
    CISA released eight Industrial Control Systems (ICS) advisories on September 16, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-259-01 Schneider Electric Altivar Products, ATVdPAC Module, ILC992 InterLink Converter ICSA-25-259-02 Hitachi Energy RTU500 Series ICSA-25-259-03 Siemens SIMATIC NET CP, SINEMA, and SCALANCE

  • ICSA-25-259-04 Siemens RUGGEDCOM, SINEC NMS, and SINEMA
  • ICSA-25-259-05 Siemens OpenSSL Vulnerability in Industrial Products
  • ICSA-25-259-06 Siemens Multiple Industrial Products
  • ICSA-25-259-07 Delta Electronics DIALink
  • ICSA-25-140-07 Schneider Electric Galaxy VS, Galaxy VL, Galaxy VXL (Update A)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds One Known Exploited Vulnerability to Catalog
    CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-5086 Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Eleven Industrial Control Systems Advisories
    CISA released eleven Industrial Control Systems (ICS) advisories on September 11, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-254-01 Siemens SIMOTION Tools ICSA-25-254-02 Siemens SIMATIC Virtualization as a Service (SIVaaS) ICSA-25-254-03 Siemens SINAMICS Drives

  • ICSA-25-254-04 Siemens SINEC OS
  • ICSA-25-254-05 Siemens Apogee PXC and Talon TC Devices
  • ICSA-25-254-06 Siemens Industrial Edge Management OS (IEM-OS)
  • ICSA-25-254-07 Siemens User Management Component (UMC)
  • ICSA-25-254-08 Schneider Electric EcoStruxure
  • ICSA-25-254-09 Schneider Electric Modicon M340, BMXNOE0100, and BMXNOE0110
  • ICSA-25-254-10 Daikin Security Gateway
  • ICSA-25-035-06 Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H (Update A)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Fourteen Industrial Control Systems Advisories
    CISA released fourteen Industrial Control Systems (ICS) advisories on September 9, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-252-01 Rockwell Automation ThinManager ICSA-25-252-02 ABB Cylon Aspect BMS/BAS ICSA-25-252-03 Rockwell Automation Stratix IOS

  • ICSA-25-252-04 Rockwell Automation FactoryTalk Optix
  • ICSA-25-252-05 Rockwell Automation FactoryTalk Activation Manager
  • ICSA-25-252-06 Rockwell Automation CompactLogix® 5480
  • ICSA-25-252-07 Rockwell Automation ControlLogix 5580
  • ICSA-25-252-08 Rockwell Automation Analytics LogixAI
  • ICSA-25-252-09 Rockwell Automation 1783-NATR
  • ICSA-24-296-01 Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update A)
  • ICSA-25-058-01 Schneider Electric Communication Modules for Modicon M580 and Quantum controllers (Update B)
  • ICSA-25-219-07 EG4 Electronics EG4 Inverters (Update B)
  • ICSA-25-233-01 Mitsubishi Electric Corporation MELSEC iQ-F Series CPU Module (Update A)
  • ICSA-25-226-31 Rockwell Automation 1756-ENT2R, 1756-EN4TR, 1756-EN4TRXT (Update A)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Five Industrial Control Systems Advisories
    CISA released five Industrial Control Systems (ICS) advisories on September 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-247-01 Honeywell OneWireless Wireless Device Manager (WDM) ICSA-25-217-01 Mitsubishi Electric Iconics Digital Solutions Multiple Products (Update A) ICSA-25-105-07 Delta Electronics COMMGR (Update A)

  • ICSA-25-205-03 Honeywell Experion PKS (Update A)
  • ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update B)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds Three Known Exploited Vulnerabilities to Catalog
    CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-38352 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability CVE-2025-48543 Android Runtime Unspecified Vulnerability CVE-2025-53690 Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds Two Known Exploited Vulnerabilities to Catalog
    CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2023-50224 TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability CVE-2025-9377 TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA, NSA, and Global Partners Release a Shared Vision of Software Bill of Materials (SBOM) Guidance
    CISA, in collaboration with NSA and 19 international partners, released joint guidance outlining A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity. This marks a significant step forward in strengthening software supply chain transparency and security worldwide. An SBOM is a formal record detailing the components and supply chain relationships used in building software. SBOMs act as a software “ingredients list” providing organizations with essential visibility into software dependencies, enabling them to identify components, assess risks, and take proactive measures to mitigate vulnerabilities. The guidance highlights the benefits of SBOM adoption for software producers, purchasers, operators, and national security organizations. Key advantages include reducing risks, improving vulnerability management, and enhancing overall software security practices.

    By promoting transparency, aligning technical approaches, and leveraging automation, SBOM adoption strengthens the resilience of the global software ecosystem. This guidance urges organizations worldwide to integrate SBOM practices into their security frameworks to collaboratively address supply chain risks and enhance cybersecurity resilience.

    For more information on SBOM, visit: https://www.cisa.gov/sbom.

    For leadership statements from co-authoring organizations, visit: Statements of Support on A Shared Vision of SBOM for Cybersecurity.


    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Adds Two Known Exploited Vulnerabilities to Catalog
    CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2020-24363 TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability CVE-2025-55177 Meta Platforms WhatsApp Incorrect Authorization Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

    Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    CISA Releases Four Industrial Control Systems Advisories
    CISA released four Industrial Control Systems (ICS) advisories on September 2, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-245-01 Delta Electronics EIP Builder ICSA-25-245-02 Fuji Electric FRENIC-Loader 4 ICSA-25-245-03 SunPower PVS6

  • ICSA-25-182-06 Hitachi Energy Relion 670/650 and SAM600-IO Series (Update A)
  • CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
    Alerts ~Created Fri Oct 10 06:24:14 2025

    TA14-300A: Phishing Campaign Linked with “Dyre” Banking Malware
    Original release date: October 27, 2014 | Last revised: October 28, 2014

    Systems Affected

    Microsoft Windows

    Overview

    Since mid-October 2014, a phishing campaign has targeted a wide variety of recipients while employing the Dyre/Dyreza banking malware. Elements of this phishing campaign vary from target to target including senders, attachments, exploits, themes, and payload(s).[1][2] Although this campaign uses various tactics, the actor’s intent is to entice recipients into opening attachments and downloading malware.

    Description

    The Dyre banking malware specifically targets sensitive user account credentials. The malware has the ability to capture user login information and send the captured data to malicious actors.[3] Phishing emails used in this campaign often contain a weaponized PDF attachment which attempts to exploit vulnerabilities found in unpatched versions of Adobe Reader.[4][5] After successful exploitation, a user's system will download Dyre banking malware. All of the major anti-virus vendors have successfully detected this malware prior to the release of this alert.[6]

    Please note, the below listing of indicators does not represent all characteristics and indicators for this campaign.

    Phishing Email Characteristics:

    • Subject: "Unpaid invoic" (Spelling errors in the subject line are a characteristic of this campaign)
    • Attachment: Invoice621785.pdf

    System Level Indicators (upon successful exploitation):

    • Copies itself under C:\Windows\[RandomName].exe
    • Created a Service named "Google Update Service" by setting the following registry keys:
      • HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\ImagePath: "C:\WINDOWS\pfdOSwYjERDHrdV.exe"
      • HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\DisplayName: "Google Update Service"[7]

    Impact

    A system infected with Dyre banking malware will attempt to harvest credentials for online services, including banking services.

    Solution

    Users and administrators are recommended to take the following preventive measures to protect their computer networks from phishing campaigns:

    US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams.

    You can report phishing to us by sending email to phishing-report@us-cert.gov.

    References

    Revision History

    • October 27, 2014: Initial Release
    • October 28, 2014: Added Reference 7 in Description Section

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-295A: Crypto Ransomware
    Original release date: October 22, 2014 | Last revised: October 24, 2014

    Systems Affected

    Microsoft Windows

    Overview

    Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response Centre (CCIRC) analysis in coordination with the United States Department of Homeland Security (DHS) to provide further information about crypto ransomware, specifically to:

    • Present its main characteristics, explain the prevalence of ransomware, and the proliferation of crypto ransomware variants; and
    • Provide prevention and mitigation information.

    Description

    WHAT IS RANSOMWARE?

    Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware, which has now been observed for several years, attempts to extort money from victims by displaying an on-screen alert. These alerts often state that their computer has been locked or that all of their files have been encrypted, and demand that a ransom is paid to restore access. This ransom is typically in the range of $100–$300 dollars, and is sometimes demanded in virtual currency, such as Bitcoin.

    Ransomware is typically spread through phishing emails that contain malicious attachments and drive-by downloading. Drive-by downloading occurs when a user unknowingly visits an infected website and malware is downloaded and installed without their knowledge. Crypto ransomware, a variant that encrypts files, is typically spread through similar methods, and has been spread through Web-based instant messaging applications.

    WHY IS IT SO EFFECTIVE?

    The authors of ransomware instill fear and panic into their victims, causing them to click on a link or pay a ransom, and inevitably become infected with additional malware, including messages similar to those below:

    • “Your computer has been infected with a virus. Click here to resolve the issue.”
    • “Your computer was used to visit websites with illegal content. To unlock your computer, you must pay a $100 fine.”
    • “All files on your computer have been encrypted. You must pay this ransom within 72 hours to regain access to your data.”

    PROLIFERATION OF VARIANTS

    In 2012, Symantec, using data from a command and control (C2) server of 5,700 computers compromised in one day, estimated that approximately 2.9 percent of those compromised users paid the ransom. With an average ransom of $200, this meant malicious actors profited $33,600 per day, or $394,400 per month, from a single C2 server. These rough estimates demonstrate how profitable ransomware can be for malicious actors.

    This financial success has likely led to a proliferation of ransomware variants. In 2013, more destructive and lucrative ransomware variants were introduced including Xorist, CryptorBit, and CryptoLocker. Some variants encrypt not just the files on the infected device but also the contents of shared or networked drives. These variants are considered destructive because they encrypt user’s and organization’s files, and render them useless until criminals receive a ransom.

    Additional variants observed in 2014 included CryptoDefense and Cryptowall, which are also considered destructive. Reports indicate that CryptoDefense and Cryptowall share the same code, and that only the name of malware itself is different. Similar to CryptoLocker, these variants also encrypt files on the local computer, shared network files, and removable media.

    LINKS TO OTHER TYPES OF MALWARE

    Systems infected with ransomware are also often infected with other malware. In the case of CryptoLocker, a user typically becomes infected by opening a malicious attachment from an email. This malicious attachment contains Upatre, a downloader, which infects the user with GameOver Zeus. GameOver Zeus is a variant of the Zeus Trojan that steals banking information and is also used to steal other types of data. Once a system is infected with GameOver Zeus, Upatre will also download CryptoLocker. Finally, CryptoLocker encrypts files on the infected system, and requests that a ransom be paid.

    The close ties between ransomware and other types of malware were demonstrated through the recent botnet disruption operation against GameOver Zeus, which also proved effective against CryptoLocker. In June 2014, an international law enforcement operation successfully weakened the infrastructure of both GameOver Zeus and CryptoLocker.

    Impact

    Ransomware doesn’t only target home users; businesses can also become infected with ransomware, which can have negative consequences, including:

    • Temporary or permanent loss of sensitive or proprietary information;
    • Disruption to regular operations;
    • Financial losses incurred to restore systems and files; and
    • Potential harm to an organization’s reputation.

    Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed.

    Solution

    Infections can be devastating to an individual or organization, and recovery can be a difficult process that may require the services of a reputable data recovery specialist.

    US-CERT and CCIRC recommend users and administrators take the following preventive measures to protect their computer networks from ransomware infection:

    • Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
    • Maintain up-to-date anti-virus software.
    • Keep your operating system and software up-to-date with the latest patches.
    • Do not follow unsolicited web links in email. Refer to the Security Tip Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
    • Use caution when opening email attachments. For information on safely handling email attachments, see Recognizing and Avoiding Email Scams.
    • Follow safe practices when browsing the web. See Good Security Habits and Safeguarding Your Data for additional details.

    Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report instances of fraud to the FBI at the Internet Crime Complaint Center or contact the CCIRC .

    References

    Revision History

    • October 22, 2014: Initial Release
    • October 24, 2014: Minor edit to the reference section

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-290A: SSL 3.0 Protocol Vulnerability and POODLE Attack
    Original release date: October 17, 2014 | Last revised: October 20, 2014

    Systems Affected

    All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.

    Overview

    US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. The POODLE attack demonstrates how an attacker can exploit this vulnerability to decrypt and extract information from inside an encrypted transaction.

    Description

    The SSL 3.0 vulnerability stems from the way blocks of data are encrypted under a specific type of encryption algorithm within the SSL protocol. The POODLE attack takes advantage of the protocol version negotiation feature built into SSL/TLS to force the use of SSL 3.0 and then leverages this new vulnerability to decrypt select content within the SSL session. The decryption is done byte by byte and will generate a large number of connections between the client and server.

    While SSL 3.0 is an old encryption standard and has generally been replaced by Transport Layer Security (TLS) (which is not vulnerable in this way), most SSL/TLS implementations remain backwards compatible with SSL 3.0 to interoperate with legacy systems in the interest of a smooth user experience. Even if a client and server both support a version of TLS the SSL/TLS protocol suite allows for protocol version negotiation (being referred to as the “downgrade dance” in other reporting). The POODLE attack leverages the fact that when a secure connection attempt fails, servers will fall back to older protocols such as SSL 3.0. An attacker who can trigger a connection failure can then force the use of SSL 3.0 and attempt the new attack. [1]

    Two other conditions must be met to successfully execute the POODLE attack: 1) the attacker must be able to control portions of the client side of the SSL connection (varying the length of the input) and 2) the attacker must have visibility of the resulting ciphertext. The most common way to achieve these conditions would be to act as Man-in-the-Middle (MITM), requiring a whole separate form of attack to establish that level of access.

    These conditions make successful exploitation somewhat difficult. Environments that are already at above-average risk for MITM attacks (such as public WiFi) remove some of those challenges.

    Impact

    The POODLE attack can be used against any system or application that supports SSL 3.0 with CBC mode ciphers. This affects most current browsers and websites, but also includes any software that either references a vulnerable SSL/TLS library (e.g. OpenSSL) or implements the SSL/TLS protocol suite itself. By exploiting this vulnerability in a likely web-based scenario, an attacker can gain access to sensitive data passed within the encrypted web session, such as passwords, cookies and other authentication tokens that can then be used to gain more complete access to a website (impersonating that user, accessing database content, etc.).

    Solution

    There is currently no fix for the vulnerability SSL 3.0 itself, as the issue is fundamental to the protocol; however, disabling SSL 3.0 support in system/application configurations is the most viable solution currently available.

    Some of the same researchers that discovered the vulnerability also developed a fix for one of the prerequisite conditions; TLS_FALLBACK_SCSV is a protocol extension that prevents MITM attackers from being able to force a protocol downgrade. OpenSSL has added support for TLS_FALLBACK_SCSV to their latest versions and recommend the following upgrades: [2]

    • OpenSSL 1.0.1 users should upgrade to 1.0.1j.
    • OpenSSL 1.0.0 users should upgrade to 1.0.0o.
    • OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

    Both clients and servers need to support TLS_FALLBACK_SCSV to prevent downgrade attacks.

    Other SSL 3.0 implementations are most likely also affected by POODLE. Contact your vendor for details. Additional vendor information may be available in the National Vulnerability Database (NVD) entry for CVE-2014-3566 [3] or in CERT Vulnerability Note VU#577193. [4]

    References

    Revision History

    • October 17, 2014 Initial Release
    • October 20, 2014 Added CERT Vulnerability Note VU#577193 to the Solution section

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-268A: GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)
    Original release date: September 25, 2014 | Last revised: September 30, 2014

    Systems Affected

    • GNU Bash through 4.3.
    • Linux and Mac OS X systems, on which Bash is part of the base operating system.
    • Any BSD or UNIX system on which GNU Bash has been installed as an add-on.
    • Any UNIX-like operating system on which the /bin/sh interface is implemented as GNU Bash.

    Overview

    A critical vulnerability has been reported in the GNU Bourne-Again Shell (Bash), the common command-line shell used in many Linux/UNIX operating systems and Apple’s Mac OS X. The flaw could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system [1]. The United States Department of Homeland Security (DHS) is releasing this Technical Alert to provide further information about the GNU Bash vulnerability.

    Description

    GNU Bash versions 1.14 through 4.3 contain a flaw that processes commands placed after function definitions in the added environment variable, allowing remote attackers to execute arbitrary code via a crafted environment which enables network-based exploitation. [2, 3]

    Critical instances where the vulnerability may be exposed include: [4, 5]

    • Apache HTTP Server using mod_cgi or mod_cgid scripts either written in bash, or spawn GNU Bash subshells, or on any system where the /bin/sh interface is implemented using GNU Bash.
    • Override or Bypass ForceCommand feature in OpenSSH sshd and limited protection for some Git and Subversion deployments used to restrict shells and allows arbitrary command execution capabilities. This data path is vulnerable on systems where the /bin/sh interface is implemented using GNU Bash.
    • Allow arbitrary commands to run on a DHCP client machine.

    Impact

    This vulnerability is classified by industry standards as “High” impact with CVSS Impact Subscore 10 and “Low” on complexity, which means it takes little skill to perform. This flaw allows attackers who can provide specially crafted environment variables containing arbitrary commands to execute on vulnerable systems. It is especially dangerous because of the prevalent use of the Bash shell and its ability to be called by an application in numerous ways.

    Solution

    Initial solutions for Shellshock do not completely resolve the vulnerability. It is advised to install existing patches and pay attention for updated patches to address CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and CVE-2014-6278. Red Hat has provided a support article [6] with updated information.

    Many UNIX-like operating systems, including Linux distributions and Apple Mac OS X include Bash and are likely to be affected. Contact your vendor for updated information. A list of vendors can be found in CERT Vulnerability Note VU#252743 [7].

    US-CERT recommends system administrators review the vendor patches and the NIST Vulnerability Summaries for CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278 to mitigate damage caused by the exploit.

    References

    Revision History

    • September 25, 2014 - Initial Release
    • September 26, 2014 - Minor Revisions
    • September 30, 2014 - Update to include additional CVE information

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-212A: Backoff Point-of-Sale Malware
    Original release date: July 31, 2014 | Last revised: August 27, 2014

    Systems Affected

    Point-of-Sale Systems

     

    Overview

    This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and Analysis Center (FS-ISAC), and Trustwave Spiderlabs, a trusted partner under contract with the USSS.  The purpose of this release is to provide relevant and actionable technical indicators for network defense against the PoS malware dubbed "Backoff" which has been discovered exploiting businesses' administrator accounts remotely and exfiltrating consumer payment data.

    Over the past year, the Secret Service has responded to network intrusions at numerous businesses throughout the United States that have been impacted by the “Backoff” malware. Seven PoS system providers/vendors have confirmed that they have had multiple clients affected. Reporting continues on additional compromised locations, involving private sector entities of all sizes, and the Secret Service currently estimates that over 1,000 U.S. businesses are affected.

    Recent investigations revealed that malicious actors are using publicly available tools to locate businesses that use remote desktop applications. Remote desktop solutions like Microsoft's Remote Desktop [1], Apple Remote Desktop [2], Chrome Remote Desktop [3], Splashtop 2 [4], and LogMeIn [5] offer the convenience and efficiency of connecting to a computer from a remote location. Once these applications are located, the suspects attempted to brute force the login feature of the remote desktop solution. After gaining access to what was often administrator or privileged access accounts, the suspects were then able to deploy the point-of-sale (PoS) malware and subsequently exfiltrate consumer payment data via an encrypted POST request.

    Organizations that believe they have been impacted should contact their local Secret Service field office and may contact the NCCIC for additional information.

    Description

    “Backoff” is a family of PoS malware and has been discovered recently. The malware family has been witnessed on at least three separate forensic investigations. Researchers have identified three primary variants to the “Backoff” malware including 1.4, 1.55 (“backoff”, “goo”, “MAY”, “net”), and 1.56 (“LAST”).

    These variations have been seen as far back as October 2013 and continue to operate as of July 2014. In total, the malware typically consists of the following four capabilities. An exception is the earliest witnessed variant (1.4) which does not include keylogging functionality. Additionally, 1.55 ‘net’ removed the explorer.exe injection component:

    • Scraping memory for track data
    • Logging keystrokes
    • Command & control (C2) communication
    • Injecting malicious stub into explorer.exe

    The malicious stub that is injected into explorer.exe is responsible for persistence in the event the malicious executable crashes or is forcefully stopped. The malware is responsible for scraping memory from running processes on the victim machine and searching for track data. Keylogging functionality is also present in most recent variants of “Backoff”. Additionally, the malware has a C2 component that is responsible for uploading discovered data, updating the malware, downloading/executing further malware, and uninstalling the malware.

    Variants

    Based on compiled timestamps and versioning information witnessed in the C2 HTTP POST requests, “Backoff” variants were analyzed over a seven month period. The five variants witnessed in the “Backoff” malware family have notable modifications, to include:

    1.55 “backoff”

    • Added Local.dat temporary storage for discovered track data
    • Added keylogging functionality
    • Added “gr” POST parameter to include variant name
    • Added ability to exfiltrate keylog data
    • Supports multiple exfiltration domains
    • Changed install path
    • Changed User-Agent

    1.55 “goo”

    • Attempts to remove prior version of malware
    • Uses 8.8.8.8 as resolver

    1.55 “MAY”

    • No significant updates other than changes to the URI and version name

    1.55 “net”

    • Removed the explorer.exe injection component

    1.56 “LAST”

    • Re-added the explorer.exe injection component
    • Support for multiple domain/URI/port configurations
    • Modified code responsible for creating exfiltration thread(s)
    • Added persistence techniques

    Command & Control Communication

    All C2 communication for “Backoff” takes place via HTTP POST requests. A number of POST parameters are included when this malware makes a request to the C&C server.

    • op : Static value of ‘1’
    • id : randomly generated 7 character string
    • ui : Victim username/hostname
    • wv : Version of Microsoft Windows
    • gr (Not seen in version 1.4) : Malware-specific identifier
    • bv : Malware version
    • data (optional) : Base64-encoded/RC4-encrypted data

    The ‘id’ parameter is stored in the following location, to ensure it is consistent across requests:

    • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    If this key doesn’t exist, the string will be generated and stored. Data is encrypted using RC4 prior to being encoded with Base64. The password for RC4 is generated from the ‘id’ parameter, a static string of ‘jhgtsd7fjmytkr’, and the ‘ui’ parameter. These values are concatenated together and then hashed using the MD5 algorithm to form the RC4 password. In the above example, the RC4 password would be ‘56E15A1B3CB7116CAB0268AC8A2CD943 (The MD5 hash of ‘vxeyHkSjhgtsd7fjmytkrJosh @ PC123456).

    File Indicators:

    The following is a list of the Indicators of Compromise (IOCs) that should be added to the network security to search to see if these indicators are on their network.

    1.4

    Packed MD5: 927AE15DBF549BD60EDCDEAFB49B829E

    Unpacked MD5: 6A0E49C5E332DF3AF78823CA4A655AE8

    Install Path: %APPDATA%\AdobeFlashPlayer\mswinsvc.exe

    Mutexes:

    uhYtntr56uisGst

    uyhnJmkuTgD

    Files Written:

    %APPDATA%\mskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\AdobeFlashPlayer\mswinsvc.exe

    Static String (POST Request): zXqW9JdWLM4urgjRkX

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent: Mozilla/4.0

    URI(s): /aircanada/dark.php

    1.55 “backoff”

    Packed MD5: F5B4786C28CCF43E569CB21A6122A97E

    Unpacked MD5: CA4D58C61D463F35576C58F25916F258

    Install Path: %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    Mutexes:

    Undsa8301nskal

    uyhnJmkuTgD

    Files Written:

    %APPDATA%\mskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    %APPDATA%\AdobeFlashPlayer\Local.dat

    %APPDATA%\AdobeFlashPlayer\Log.txt

    Static String (POST Request): ihasd3jasdhkas

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0

    URI(s): /aero2/fly.php

    1.55 “goo”

    Pa  cked MD5: 17E1173F6FC7E920405F8DBDE8C9ECAC

    Unpacked MD5: D397D2CC9DE41FB5B5D897D1E665C549

    Install Path: %APPDATA%\OracleJava\javaw.exe

    Mutexes:

    nUndsa8301nskal

    nuyhnJmkuTgD

    Files Written:

    %APPDATA%\nsskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\OracleJava\javaw.exe

    %APPDATA%\OracleJava\Local.dat

    %APPDATA%\OracleJava\Log.txt

    Static String (POST Request): jhgtsd7fjmytkr

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent:

    URI(s): /windows/updcheck.php

    1.55 “MAY”

    Packed MD5: 21E61EB9F5C1E1226F9D69CBFD1BF61B

    Unpacked MD5: CA608E7996DED0E5009DB6CC54E08749

    Install Path: %APPDATA%\OracleJava\javaw.exe

    Mutexes:

    nUndsa8301nskal

    nuyhnJmkuTgD

    Files Written:

    %APPDATA%\nsskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\OracleJava\javaw.exe

    %APPDATA%\OracleJava\Local.dat

    %APPDATA%\OracleJava\Log.txt

    Static String (POST Request): jhgtsd7fjmytkr

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent:

    URI(s): /windowsxp/updcheck.php

    1.55 “net”

    Packed MD5: 0607CE9793EEA0A42819957528D92B02

    Unpacked MD5: 5C1474EA275A05A2668B823D055858D9

    Install Path: %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    Mutexes:

    nUndsa8301nskal

    Files Written:

    %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    %APPDATA%\AdobeFlashPlayer\Local.dat

    %APPDATA%\AdobeFlashPlayer\Log.txt

    Static String (POST Request): ihasd3jasdhkas9

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent:

    URI(s): /windowsxp/updcheck.php

    1.56 “LAST”

    Packed MD5: 12C9C0BC18FDF98189457A9D112EEBFC

    Unpacked MD5: 205947B57D41145B857DE18E43EFB794

    Install Path: %APPDATA%\OracleJava\javaw.exe

    Mutexes:

    nUndsa8301nskal

    nuyhnJmkuTgD

    Files Written:

    %APPDATA%\nsskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\OracleJava\javaw.exe

    %APPDATA%\OracleJava\Local.dat

    %APPDATA%\OracleJava\Log.txt

    Static String (POST Request): jhgtsd7fjmytkr

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    HKLM\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    HKCU\SOFTWARE\\Microsoft\Active Setup\Installed Components\{B3DB0D62-B481-4929-888B-49F426C1A136}\StubPath

    HKLM\SOFTWARE\\Microsoft\Active Setup\Installed Components\{B3DB0D62-B481-4929-888B-49F426C1A136}\StubPath

    User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0

    URI(s):  /windebug/updcheck.php

    Impact

    The impact of a compromised PoS system can affect both the businesses and consumer by exposing customer data such as names, mailing addresses, credit/debit card numbers, phone numbers, and e-mail addresses to criminal elements. These breaches can impact a business’ brand and reputation, while consumers’ information can be used to make fraudulent purchases or risk compromise of bank accounts. It is critical to safeguard your corporate networks and web servers to prevent any unnecessary exposure to compromise or to mitigate any damage that could be occurring now.

    Solution

    At the time this advisory is released, the variants of the “Backoff’ malware family are largely undetected by anti-virus (AV) vendors. However, shortly following the publication of this technical analysis, AV companies will quickly begin detecting the existing variants. It’s important to maintain up‐to‐date AV signatures and engines as new threats such as this are continually being added to your AV solution. Pending AV detection of the malware variants, network defenders can apply indicators of compromise (IOC) to a variety of prevention and detection strategies.[6],[7],[8] IOCs can be found above.

    The forensic investigations of compromises of retail IT/payment networks indicate that the network compromises allowed the introduction of memory scraping malware to the payment terminals. Information security professionals recommend a defense in depth approach to mitigating risk to retail payment systems. While some of the risk mitigation recommendations are general in nature, the following strategies provide an approach to minimize the possibility of an attack and mitigate the risk of data compromise:

    Remote Desktop Access

    • Configure the account lockout settings to lock a user account after a period of time or a specified number of failed login attempts. This prevents unlimited unauthorized attempts to login whether from an unauthorized user or via automated attack types like brute force.[9]
    • Limit the number of users and workstation who can log in using Remote Desktop.
    • Use firewalls (both software and hardware where available) to restrict access to remote desktop listening ports (default is TCP 3389).[10]
    • Change the default Remote Desktop listening port.
    • Define complex password parameters. Configuring an expiration time and password length and complexity can decrease the amount of time in which a successful attack can occur.[11]
    • Require two-factor authentication (2FA) for remote desktop access.[12]
    • Install a Remote Desktop Gateway to restrict access.[13]
    • Add an extra layer of authentication and encryption by tunneling your Remote Desktop through IPSec, SSH or SSL.[14],[15]
    • Require 2FA when accessing payment processing networks. Even if a virtual private network is used, it is important that 2FA is implemented to help mitigate keylogger or credential dumping attacks.
    • Limit administrative privileges for users and applications.
    • Periodically review systems (local and domain controllers) for unknown and dormant users.

    Network Security

    • Review firewall configurations and ensure that only allowed ports, services and Internet protocol (IP) addresses are communicating with your network. This is especially critical for outbound (e.g., egress) firewall rules in which compromised entities allow ports to communicate to any IP address on the Internet. Hackers leverage this configuration to exfiltrate data to their IP addresses.
    • Segregate payment processing networks from other networks.
    • Apply access control lists (ACLs) on the router configuration to limit unauthorized traffic to payment processing networks.
    • Create strict ACLs segmenting public-facing systems and back-end database systems that house payment card data.
    • Implement data leakage prevention/detection tools to detect and help prevent data exfiltration.
    • Implement tools to detect anomalous network traffic and anomalous behavior by legitimate users (compromised credentials).

    Cash Register and PoS Security

    • Implement hardware-based point-to-point encryption. It is recommended that EMV-enabled PIN entry devices or other credit-only accepting devices have Secure Reading and Exchange of Data (SRED) capabilities. SRED-approved devices can be found at the Payment Card Industry Security Standards website.
    • Install Payment Application Data Security Standard-compliant payment applications.
    • Deploy the latest version of an operating system and ensure it is up to date with security patches, anti-virus software, file integrity monitoring and a host-based intrusion-detection system.
    • Assign a strong password to security solutions to prevent application modification. Use two-factor authentication (2FA) where feasible.
    • Perform a binary or checksum comparison to ensure unauthorized files are not installed.
    • Ensure any automatic updates from third parties are validated. This means performing a checksum comparison on the updates prior to deploying them on PoS systems. It is recommended that merchants work with their PoS vendors to obtain signatures and hash values to perform this checksum validation.
    • Disable unnecessary ports and services, null sessions, default users and guests.
    • Enable logging of events and make sure there is a process to monitor logs on a daily basis.
    • Implement least privileges and ACLs on users and applications on the system.

    References

    Revision History

    • July, 31 2014 - Initial Release
    • August 18, 2014 - Minor revision to remote desktop solutions list
    • August 22, 2014 - Changes to the Overview section
    • August 26, 2014 - Minor revision to remote desktop solutions list

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-150A: GameOver Zeus P2P Malware
    Original release date: June 02, 2014 | Last revised: August 18, 2014

    Systems Affected

    • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
    • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012

    Overview

    GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), is releasing this Technical Alert to provide further information about the GameOver Zeus botnet.

    Description

    GOZ, which is often propagated through spam and phishing messages, is primarily used by cybercriminals to harvest banking information, such as login credentials, from a victim’s computer. [2] Infected systems can also be used to engage in other malicious activities, such as sending spam or participating in distributed denial-of-service (DDoS) attacks. 

    Prior variants of the Zeus malware utilized a centralized command and control (C2) botnet infrastructure to execute commands. Centralized C2 servers are routinely tracked and blocked by the security community. [1] GOZ, however, utilizes a P2P network of infected hosts to communicate and distribute data, and employs encryption to evade detection. These peers act as a massive proxy network that is used to propagate binary updates, distribute configuration files, and to send stolen data. [3] Without a single point of failure, the resiliency of GOZ’s P2P infrastructure makes takedown efforts more difficult. [1]

    Impact

    A system infected with GOZ may be employed to send spam, participate in DDoS attacks, and harvest users' credentials for online services, including banking services.

    Solution

    Users are recommended to take the following actions to remediate GOZ infections:

    • Use and maintain anti-virus software - Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
    • Change your passwords - Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
    • Keep your operating system and application software up-to-date - Install software patches so that attackers can't take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
    • Use anti-malware tools - Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of GOZ from your system.

    F-Secure       

    http://www.f-secure.com/en/web/home_global/online-scanner (Windows Vista, 7 and 8)

    http://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142 (Windows XP)

    Heimdal

    http://goz.heimdalsecurity.com/ (Microsoft Windows XP, Vista, 7, 8 and 8.1)   

    McAfee

    www.mcafee.com/stinger (Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7 and 8)

    Microsoft

    http://www.microsoft.com/security/scanner/en-us/default.aspx (Windows 8.1, Windows 8, Windows 7, Windows Vista, and Windows XP) 

    Sophos

    http://www.sophos.com/VirusRemoval (Windows XP (SP2) and above) 

    Symantec

    http://www.symantec.com/connect/blogs/international-takedown-wounds-gameover-zeus-cybercrime-network (Windows XP, Windows Vista and Windows 7)

    Trend Micro

    http://www.trendmicro.com/threatdetector (Windows XP, Windows Vista, Windows 7, Windows 8/8.1, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2)

    FireEye and Fox-IT

    www.decryptcryptolocker.com FireEye and Fox-IT have created a web portal claiming to restore/decrypt files of CryptoLocker victims. US-CERT has performed no evaluation of this claim, but is providing a link to enable individuals to make their own determination of suitability for their needs. At present, US-CERT is not aware of any other product that claims similar functionality.

    The above are examples only and do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.

     

    References

    Revision History

    • Initial Publication - June 2, 2014
    • Added McAfee - June 6, 2014
    • Added FireEye and Fox-IT web portal to Solutions section - August 15, 2014

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
    Original release date: April 08, 2014

    Systems Affected

    • OpenSSL 1.0.1 through 1.0.1f
    • OpenSSL 1.0.2-beta

    Overview

    A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension.

    Description

    OpenSSL versions 1.0.1 through 1.0.1f contain a flaw in its implementation of the TLS/DTLS heartbeat functionality. This flaw allows an attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time. Note that an attacker can repeatedly leverage the vulnerability to retrieve as many 64k chunks of memory as are necessary to retrieve the intended secrets. The sensitive information that may be retrieved using this vulnerability include:

    • Primary key material (secret keys)
    • Secondary key material (user names and passwords used by vulnerable services)
    • Protected content (sensitive data used by vulnerable services)
    • Collateral (memory addresses and content that can be leveraged to bypass exploit mitigations)

    Exploit code is publicly available for this vulnerability. Additional details may be found in CERT/CC Vulnerability Note VU#720951.

    Impact

    This flaw allows a remote attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time.

    Solution

    OpenSSL 1.0.1g has been released to address this vulnerability. Any keys generated with a vulnerable version of OpenSSL should be considered compromised and regenerated and deployed after the patch has been applied.

    US-CERT recommends system administrators consider implementing Perfect Forward Secrecy to mitigate the damage that may be caused by future private key disclosures.

    References

    Revision History

    • Initial Publication

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-069A: Microsoft Ending Support for Windows XP and Office 2003
    Original release date: March 10, 2014 | Last revised: June 18, 2014

    Systems Affected

    • Microsoft Windows XP with Service Pack 3 (SP3) Operating System
    • Microsoft Office 2003 Products

    Overview

    Microsoft is ending support for the Windows XP operating system and Office 2003 product line on April 8, 2014. [1] After this date, these products will no longer receive:

    • Security patches which help protect PCs from harmful viruses, spyware, and other malicious software
    • Assisted technical support from Microsoft
    • Software and content updates

    Description

    All software products have a lifecycle. End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. [2] As of February 2014, nearly 30 percent of Internet-connected PCs still run Windows XP. [3]

    Microsoft will send “End of Support” notifications to users of Windows XP who have elected to receive updates via Windows Update. Users in organizations using Windows Server Update Services (WSUS), System Center Configuration manager, or Windows Intune will not receive the notification. [4]

    Impact

    Computer systems running unsupported software are exposed to an elevated risk to cybersecurity dangers, such as malicious attacks or electronic data loss.

    Users may also encounter problems with software and hardware compatibility since new software applications and hardware devices may not be built for Windows XP or Office 2003.

    Organizations that are governed by regulatory obligations may find they are no longer able to satisfy compliance requirements. [4]

    Solution

    Computers operating Windows XP with SP3 or running Office 2003 products will continue to work after support ends. However, using unsupported software may increase the risk of viruses and other security threats.

    Users have the option to upgrade to a currently supported operating system or office productivity suite. The Microsoft “End of Support” pages for Windows XP and Office 2003 offer additional details.

    There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows XP or Office 2003 to a currently supported operating system or office productivity suite. US-CERT does not endorse or support any particular product or vendor.

    Users who choose to continue using Windows XP after the end of support may mitigate some risks by using a web browser other than Internet Explorer. The Windows XP versions of some alternative browsers will continue to receive support temporarily. Users should consult the support pages of their chosen alternative browser for more details.

    References

    Revision History

    • March 10, 2014 - Initial Release
    • June 18, 2014 - A spelling correction was made.

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-017A: UDP-based Amplification Attacks
    Original release date: January 17, 2014 | Last revised: March 07, 2014

    Systems Affected

    Certain UDP protocols have been identified as potential attack vectors:

    • DNS
    • NTP
    • SNMPv2
    • NetBIOS
    • SSDP
    • CharGEN
    • QOTD
    • BitTorrent
    • Kad
    • Quake Network Protocol
    • Steam Protocol

    Overview

    A Distributed Reflective Denial of Service (DRDoS) attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible UDP servers, as well as bandwidth amplification factors, to overwhelm a victim system with UDP traffic.

    Description

    UDP, by design, is a connection-less protocol that does not validate source IP addresses.  Unless the application-layer protocol uses countermeasures such as session initiation, it is very easy to forge the IP packet datagram to include an arbitrary source IP address [7].  When many UDP packets have their source IP address forged to a single address, the server responds to that victim, creating a reflected Denial of Service (DoS) Attack.

    Recently, certain UDP protocols have been found to have particular responses to certain commands that are much larger than the initial request.  Where before, attackers were limited linearly by the number of packets directly sent to the target to conduct a DoS attack, now a single packet can generate tens or hundreds of times the bandwidth in its response.  This is called an amplification attack, and when combined with a reflective DoS attack on a large scale it makes it relatively easy to conduct DDoS attacks.  

    To measure the potential effect of an amplification attack, we use a metric called the bandwidth amplification factor (BAF).  BAF can be calculated as the number of UDP payload bytes that an amplifier sends to answer a request, compared to the number of UDP payload bytes of the request [9] [10].

    The list of known protocols, and their associated bandwidth amplification factors, is listed below.  US-CERT would like to offer thanks to Christian Rossow for providing this information to us.  For more information on bandwith amplificatication factors, please see Christian's blog and associated research paper.

    ProtocolBandwidth Amplification FactorVulnerable Command
    DNS28 to 54see: TA13-088A [1]
    NTP556.9see: TA14-013A [2]
    SNMPv26.3GetBulk request
    NetBIOS3.8Name resolution
    SSDP30.8SEARCH request
    CharGEN358.8Character generation request
    QOTD140.3Quote request
    BitTorrent3.8File search
    Kad16.3Peer list exchange
    Quake Network Protocol63.9Server info exchange
    Steam Protocol5.5Server info exchange

     

    Impact

    Attackers can utilize the bandwidth and relative trust of large servers that provide the above UDP protocols to flood victims with unwanted traffic, a DDoS attack.

    Solution

    DETECTION

    Detection of DRDoS attacks is not easy, due to their use of large, trusted servers that provide UDP services.  As a victim, traditional DoS mitigation techniques may apply.

    As a network operator of one of these exploitable services, look for abnormally large responses to a particular IP address.  This may indicate that an attacker is using your service to conduct a DRDoS attack.

    MITIGATION

    Source IP Verification

    Because the UDP requests being sent by the attacker-controlled clients must have a source IP address spoofed to appear as the victim’s IP, the first step to reducing the effectiveness of UDP amplification is for Internet Service Providers to reject any UDP traffic with spoofed addresses. The Network Working Group of the Internet Engineering Task Force (IETF) released Best Current Practice 38 document in May 2000 and Best Current Practice 84 in March 2004 that describes how an Internet Service Provider can filter network traffic on their network to reject packets with source addresses not reachable via the actual packet’s path [3][4].  The changes recommended in these documents would cause a routing device to evaluate whether it is possible to reach the source IP address of the packet via the interface that transmitted the packet. If it is not possible, then the packet most likely has a spoofed source IP address. This configuration change would substantially reduce the potential for most popular types of DDoS attacks. As such, we highly recommend to all network operators to perform network ingress filtering if possible.  Note that it will not explicitly protect a UDP service provider from being exploited in a DRDoS (all network providers must use ingress filtering in order to completely eliminate the threat).

    To verify your network has implemented ingress filtering, download the open source tools from the Spoofer Project [5].

    Traffic Shaping

    Limiting responses to UDP requests is another potential mitigation to this issue.  This may require testing to discover the optimal limit that does not interfere with legitimate traffic.  The IETF released Request for Comment 2475 and Request for Comment 3260 that describes some methods to shape and control traffic [6] [8].  Most network devices today provide these functions in their software. 

    References

    Revision History

    • February 09, 2014 - Initial Release
    • March 07, 2014 - Updated page to include research links

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-013A: NTP Amplification Attacks Using CVE-2013-5211
    Original release date: January 13, 2014 | Last revised: February 05, 2014

    Systems Affected

    NTP servers

    Overview

    A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to overwhelm a victim system with UDP traffic.

    Description

    The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the “monlist” command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim’s address.

    Impact

    The attack relies on the exploitation of the 'monlist' feature of NTP, as described in CVE-2013-5211, which is enabled by default on older NTP-capable devices. This command causes a list of the last 600 IP addresses which connected to the NTP server to be sent to the victim. Due to the spoofed source address, when the NTP server sends the response it is sent instead to the victim. Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim. Additionally, because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks. The solution is to disable “monlist” within the NTP server or to upgrade to the latest version of NTP (4.2.7) which disables the “monlist” functionality.

    Solution

    Detection

    On a UNIX-platform, the command “ntpdc” will query existing NTP servers for monitoring data. If the system is vulnerable to exploitation, it will respond to the “monlist” command in interactive mode. By default, most modern UNIX and Linux distributions allow this command to be used from localhost, but not from a remote host. To test for monlist support, execute the following command at the command line:

    /usr/sbin/ntpdc <remote server>

    monlist

    Additionally, the “ntp-monlist” script is available for NMap, which will automatically display the results of the monlist command. If the system does not support the monitor query, and is therefore not vulnerable to this attack type, NMap will return an error type 4 (No Data Available) or no reply at all.

     

    Recommended Course of Action

    As all versions of ntpd prior to 4.2.7 are vulnerable by default, the simplest recommended course of action is to upgrade all versions of ntpd that are publically accessible to at least 4.2.7. However, in cases where it is not possible to upgrade the version of the service, it is possible to disable the monitor functionality in earlier versions of the software.

    To disable “monlist” functionality on a public-facing NTP server that cannot be updated to 4.2.7, add the “noquery” directive to the “restrict default” line in the system’s ntp.conf, as shown below:

    restrict default kod nomodify notrap nopeer noquery

    restrict -6 default kod nomodify notrap nopeer noquery

    References

    Revision History

    • January 13, 2014 - Initial Release

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits
    With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses that could bring the max total reward for iPhone exploits to $5 million.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    North Korean Scammers Are Doing Architectural Design Now
    New research shows that North Koreans appear to be trying to trick US companies into hiring them to develop architectural designs using fake profiles, rsums, and Social Security numbers.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Apple Took Down These ICE-Tracking Apps. The Developers Aren't Giving Up
    “We are going to do everything in our power to fight this,” says ICEBlock developer Joshua Aaron after Apple removed his app from the App Store.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Vibe Coding Is the New Open Source—in the Worst Way Possible
    As developers increasingly lean on AI-generated code to build out their software—as they have with open source in the past—they risk introducing critical security failures along the way.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure
    Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    ICE Wants to Build Out a 24/7 Social Media Surveillance Team
    Documents show that ICE plans to hire dozens of contractors to scan X, Facebook, TikTok, and other platforms to target people for deportation.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Google’s Latest AI Ransomware Defense Only Goes So Far
    Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    How to Use Passkeys With Google Password Manager (2025)
    Google can create and manage passkeys from your browser, but the process is more involved than it suggests.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    How to Use a Password Manager to Share Your Logins After You Die (2025)
    Your logins will live on after you pass on. Make sure they end up in the right hands.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say
    A team of researchers found that, by not encrypting the data broadcast by Tile tags, users could be vulnerable to having their location information exposed to malicious actors.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    How a Travel YouTuber Captured Nepal’s Revolution for the World
    Harry Jackson went into Kathmandu as a tourist. He ended up being one of the main international sources of news on Nepal’s Gen Z protests.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead
    Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers
    Companies are going to great lengths to protect the infrastructure that provides the backbone of the world’s digital services—by burying their data deep underground.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification
    By inflating numbers and narrowing definitions, Heritage promotes a false link between transgender identity and violence in its push for the FBI to create a new terrorism category.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    ‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say
    The agency says it found a network of some 300 servers and 100,000 SIM cards—enough to knock out cell service in the NYC area. Experts say it mirrors facilities typically used for cybercrime.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    DHS Has Been Collecting US Citizens’ DNA for Years
    Newly released data shows Customs and Border Protection funneled the DNA of nearly 2,000 US citizens—some as young as 14—into an FBI crime database, raising alarms about oversight and legality.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    How to Use 1Password's Travel Mode at the Border (2025)
    Travel Mode not only hides your most sensitive data—it acts as if that data never existed in the first place.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
    The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    A Dangerous Worm Is Eating Its Way Through Software Packages
    Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    These Are the 15 New York Officials ICE and NYPD Arrested in Manhattan
    More than a dozen elected officials were arrested in or around 26 Federal Plaza in New York City, where ICE detains people in what courts have ruled are unsanitary conditions.
    Security Latest ~Created Fri Oct 10 06:33:15 2025

    + Janes/IHS ~ CurrentActivityCERT ~ CERT ~ WiredSecurity +
    Tech - Linux/BSD - Apache - Security - Hardware - Gaming - Autos - World - Entertainment - About
    Powered by mod_perl Powered by Pure Perl Valid XHTML
    Friday, 10-Oct-2025 07:39:07 EDT you asked for http://newsbone.com/security/index.shtml from 216.73.216.163:20907