Microsoft patch, powerfull malware and zero-days

Macrosoft, as usual, closed one problem - two new ones appeared. In this weekly digest there are many mentions of using the latest vulnerabilities in attacks. It shows the impact of vulnerability managment process and what happens if you don't do it.

  • Vulnerabilities: Default Microsoft patch, too critical vulnerabilities in VPN soft and etc.;
  • Tools: Mainly for pentests;
  • News: The famous Lemon Duck, APTs and new FIFA 21;
  • Research: OSCD sprint and malware detections.

Feedback -> here


Microsoft update

Fixed 87 vulnerabilities, of which 12 are critical. Among the critical ones are issues in the graphical components of Windows, Outlook, SharePoint, etc., which allow a hacker to execute remote code execution (RCE).

  • RCE vulnerability CVE-2020-16947 in Microsoft Outlook. To exploit it, you need to force the victim to open a specially configured file in Outlook.
  • CVE-2020-16938 Incorrect processing of objects in memory by the Windows kernel, allowing an attacker to obtain information that could later be used to compromise the system. The most dangerous thing is that the vulnerability allows a hacker to gain access to NTLM password hashes stored in the SAM registry (which by default is not visible even to the administrator). Depending on the received credentials, it becomes possible to run the code from these accounts.
  • CVE-2020-16898 dubbed Bad Neighbor, is a remote code execution vulnerability in Windows TCP / IP that can also cause denial of service and blue screen of death (BSOD). A remote unauthorized user can exploit the vulnerability by sending malicious ICMPv6 Router Advertisement packets to a vulnerable Windows PC.

All new updates are highly recommended!


SonicWall VPN patched a vulnerability that could potentially lead to Remote Code Execution (RCE) and subsequent network compromise. On October 12, the manufacturer released a patch to close the vulnerability.

If the exploit CVE-2020-5135 is created, this vulnerability could become one of the main points of compromise for corporate networks.

Several vulnerabilities in the official Bluetooth protocol stack in the Linux kernel:

  • CVE-2020-12351;
  • CVE-2020-12352;
  • CVE-2020-24490.

The vulnerabilities are called BleedingTooth and can be used to run arbitrary code or access confidential information. The most dangerous issue is the heap-based mismatch of the used data types CVE-2020-12351, affecting Linux kernel version 4.8 and later.


Fixed a vulnerability in NetBSD caused by the lack of buffer bounds checking when processing jumbo frames in drivers for network adapters connected via USB. The problem leads to copying of a part of the packet outside the buffer allocated in the mbuf cluster, which can potentially be used to execute the attacker's code at the kernel level by sending certain frames from the local network. The fix was made to block the vulnerability on August 28, but the details of the issue are only now disclosed. The issue affects the atu, ax, axen, otus, run and ure drivers.


It would have been necessary to specify this tool in the previous monthly review, but now it will be ok. GHunt is an OSINT tool to extract a lot of informations of someone’s Google Account email.

Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover, or login page.

Fast exploitation tool for Mikrotik RouterOS.

If you try to learn a little bit more about crypto, either because you want to know how the attacks work or just because you want to do safe code, you end up diving really fast into the math behind the algorithms, and for a lot of people this is a NO.


Security researchers from Cisco Talos have warned of a sharp increase in the activity of the Lemon Duck botnet for mining the Monero cryptocurrency. The functionality of this botnet is truly amazing in its diversity!

Lemon Duck has at least 12 independent infection vectors, which is much more than most malicious programs. Features range from Server Message Block (SMB) and Remote Desktop Protocol (RDP) password booting and sending exploits to exploitation of BlueKeep vulnerability (CVE-2019-0708) in RDP on Windows computers, vulnerabilities in Redis and YARN Hadoop on Linux systems.

APT groups carried out a series of attacks on government networks in the United States, exploiting vulnerabilities in VPN and Windows. This was reported by the FBI and the CISA in a joint warning. The attacks targeted federal, local, and territorial government networks, as well as critical US infrastructure.

During the attacks, criminals exploit two vulnerabilities - CVE-2018-13379 and CVE-2020-1472. The first issue is found in the Fortinet FortiOS Secure Socket Layer (SSL) VPN server, which is designed to be used as a secure gateway to access corporate networks from remote locations. The vulnerability allows attackers to download malicious files to unprotected systems and take control of Fortinet VPN servers.

The second vulnerability, known as Zerologon, is related to the use of an insecure encryption algorithm in the Netlogon authentication mechanism. Zerologon allows to simulate any computer on the network while authenticating to a domain controller, disable Netlogon security features, and change the password in the domain controller's Active Directory database.

Attackers combine these vulnerabilities to take control of Fortinet servers and then hack internal networks using Zerologon.

The release of FIFA 21 not only delighted football fans, but also provided cybercriminals with new ways to make money. Security researcher Christopher Boyd of Malwarebytes Labs talks about the different ways in which fraudsters use the in-game capabilities of FIFA 21 to cash in on gullible users.

Fraudsters create fake "coin generators" and "rewards" and send them using fraudulent advertisements, social media posts and direct messages in order to steal users' personal information. The information collected can include name, address, login credentials, and more.


OSCD: Sprint #2 Main - Simulation (via Atomic Red Team project ), Detection (via Sigma project) & Response (via TheHive) - Open international cybersecurity specialist initiative aiming to solve common problems, share knowledge, and improve general security posture via sprints.

Don't copy and paste from web pages into shells - a lesson:

Wild IoT 0day exploitation:

DNS changer malware: how to detect it and protect yourself:

Feedback -> here