If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......
7.5CVSS
7.2AI Score
0.001EPSS
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......
7.5CVSS
7.2AI Score
0.001EPSS
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5......
7.3AI Score
0.001EPSS
Encryption 101: How to break encryption
Continuing on in our Encryption 101 series, where we gave a malware analyst's primer on encryption and demonstrated encryption techniques using ShiOne ransomware, we now look at what it takes to break an encryption. In order for something as powerful as encryption to break, there needs to be some.....
6.9AI Score
Ninja Shell - Port Knocking Technique With AES256-GCM
Raw socket shell with AES256-GCM, using Port Knocking technique( https://en.wikipedia.org/wiki/Port_knocking ) using specific tcp flags ,FIN,URG and PSH. Raw socket ? Raw mode is basically there to allow you to bypass some of the way that your computer handles TCP/IP. Rather than going through the....
7.3AI Score
Bot Roundup: Avalanche, Kronos, NanoCore
It's been a busy few weeks in cybercrime news, justifying updates to a couple of cases we've been following closely at KrebsOnSecurity. In Ukraine, the alleged ringleader of the Avalanche malware spam botnet was arrested after eluding authorities in the wake of a global cybercrime crackdown there.....
6.7AI Score
[SECURITY] Fedora 26 Update: ldns-1.7.0-4.fc26
ldns is a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. We also define a higher level API which allows a programmer to (for instance) create or sign...
9.8CVSS
2.3AI Score
0.004EPSS
All versions of the Medtronic 2090 Carelink Programmer are affected by a directory traversal vulnerability where the product's software deployment network could allow an attacker to read files on the...
5.5AI Score
0.0004EPSS
All versions of the Medtronic 2090 Carelink Programmer are affected by a per-product username and password that is stored in a recoverable format which could allow an attacker with physical access to a 2090 Programmer to obtain per-product credentials to the software deployment...
5.1AI Score
0.001EPSS
Updated apache-commons-email packages fix security vulnerability
Apache Commons-Email, from version 1.0 to 1.4 inclusive, does not properly validate bounce addresses. If a user of Commons-Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details...
7.5CVSS
2.4AI Score
0.001EPSS
Alleged Spam Kingpin ‘Severa’ Extradited to US
Peter Yuryevich Levashov, a 37-year-old Russian computer programmer thought to be one of the world's most notorious spam kingpins, has been extradited to the United States to face federal hacking and spamming charges. Levashov, in an undated photo. Levashov, who allegedly went by the hacker names.....
6.8AI Score
Remote Code Execution on the Smiths Medical Medfusion 4000
Remote Code Execution on the Smiths Medical Medfusion 4000 In which we detail the process of vulnerability research on a life critical embedded system: a medical infusion pump. Table of Contents Remote Code Execution on the Smiths Medical Medfusion 4000 Table of Contents Summary Introduction Why...
9.5AI Score
0.327EPSS
Apple Preps ChaiOS iMessage Bug Fix for Next Week
UPDATE The so-called ChaiOS message bug identified this week in Apple iOS devices will receive a fix with the rollout of the update for iOS 11.2.5, expected next week. The update will address a flaw software developer Abraham Masri publicly identified in a tweet earlier this week, according to...
-0.3AI Score
Alleged creator of Fruitfly indicted for 13 years of spying
Way back at the start of last year, we took a look at something called Fruitfly, a Mac backdoor using old code that had been around for a long time and could (deep breath) upload files to computers, record images and video, snoop around in victims' information, take screenshots, and also log...
6.9AI Score
macOS Malware Creator Charged With Spying on Thousands of PCs Over 13 Years
The U.S. Justice Department unsealed 16-count indictment charges on Wednesday against a computer programmer from Ohio who is accused of creating and installing spyware on thousands of computers for more than 13 years. According to the indictment, 28-year-old Phillip R. Durachinsky is the alleged...
7.2AI Score
Western Digital WDMyCloud 2.30.165 Multiple Vulnerabilities
WDMyCloud versions 2.30.165 and below suffer from file upload, hard coded backdoor, command injection, cross site request forgery, denial of service, and information disclosure...
0.2AI Score
7.1AI Score
WDMyCloud 2.30.165 CSRF / File Upload / Code Execution / Backdoor / DoS
Released Date: 2018-01-04 Last Modified: 2017-06-11 Company Info: Western Digital Version Info: Vulnerable * MyCloud <= 2.30.165 * MyCloudMirror <= 2.30.165 * My Cloud Gen 2 * My Cloud PR2100 * My Cloud PR4100 * My Cloud EX2 Ultra * My Cloud EX2 * My Cloud EX4 * My Cloud...
9.1AI Score
0.2AI Score
7.4AI Score
aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript
by Ivan Fratric, Thomas Dullien, James Forshaw and Steven Vittitoe Intro Many widely-deployed technologies, viewed through 20/20 hindsight, seem like an odd or unnecessarily risky idea. Engineering decisions in IT are often made with imperfect information and under time pressure, and some oddities....
8AI Score
Three Hackers Plead Guilty to Creating IoT-based Mirai DDoS Botnet
The U.S. federal officials have arrested three hackers who have pleaded guilty to computer-crimes charges for creating and distributing Mirai botnet that crippled some of the world's biggest and most popular websites by launching the massive DDoS attacks last year. According to the federal court...
7.1AI Score
Open-Xchange: SSRF in VCARD photo upload functionality
FYI - Tested on local installation of App Suite 7.8.4 REV 14, CentOS 7.4, x64 Hello, I believe I may have found another SSRF re-direct vulnerability which again will allow port scanning of the App Suite server and the internal network, this is similar to my earlier report: #293847 The endpoint is.....
-0.2AI Score
[SECURITY] Fedora 27 Update: ldns-1.7.0-9.fc27
ldns is a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. We also define a higher level API which allows a programmer to (for instance) create or sign...
2.3AI Score
PHPUnit: Remote code execution
Background PHPUnit is a programmer-oriented testing framework for PHP. It is an instance of the xUnit architecture for unit testing frameworks. Description When PHPUnit is installed in a production environment via composer and these modules are in a web accessible directory, the eval-stdin.php...
9.8CVSS
4.1AI Score
0.975EPSS
Oracle Issues Emergency Patches for ‘JoltandBleed’ Vulnerabilities
Oracle pushed out an emergency update for vulnerabilities affecting several of its products that rely on its proprietary Jolt protocol. The bugs were discovered by researchers at ERPScan who named the series of five vulnerabilities JoltandBleed. The vulnerabilities are severe, with two of the bugs....
1.3AI Score
0.01EPSS
BadRabbit: a closer look at the new version of Petya/NotPetya
Petya/NotPetya (aka EternalPetya), made headlines in June, due to it's massive attack on Ukraine. Today, we noted an outbreak of a similar-looking malware, called BadRabbit, probably prepared by the same authors. Just like the previous edition, BadRabbit has an infector allowing for lateral...
7AI Score
Boston Scientific ZOOM LATITUDE PRM Vulnerabilities
OVERVIEW Researchers Jonathan Butts and Billy Rios of Whitescope have identified two vulnerabilities in Boston Scientific’s ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) – Model 3120. Boston Scientific has provided compensating controls to reduce the risk of exploitation. AFFECTED PRODUCTS The...
4.6CVSS
5.2AI Score
0.001EPSS
Magniber ransomware: exclusively for South Koreans
The Magnitude exploit kit has been pretty consistent over the last few months, dropping the same payload—namely, the Cerber ransomware—and targeting a few select countries in Asia. Strangely, Magnitude EK disappeared in late September, and for a while we wondered whether this was yet another...
7AI Score
Spanish Court Agrees to Extradite Russian Spam King to the United States
Spain's National Court ruled on Tuesday to extradite a 36-year-old Russian computer programmer, accused by American authorities of malicious hacking offences, to the United States, according to a court document. Peter Yuryevich Levashov, also known as Peter Severa, was arrested in April this...
6.5AI Score
Z/OS (MVS) Command Shell, Bind TCP
Provide JCL which creates a bind shell This implementation does not include ebcdic character translation, so a client with translation capabilities is required. MSF handles this...
7.3AI Score
6.3AI Score
Internet Bug Bounty: Format string implementation vulnerability, resulting in code execution
In a security audit to the sprintf implementation in perl (version 5.24.1) I found a major security vulnerability, here are the full details. Timeline: ====== * 6th of May, 2017 - disclosure to the PERL security mailing list * 8th of May, 2017 - vulnerability confirmed by PERL's security group,...
7.7AI Score
CentOS 7 : log4j (CESA-2017:2423)
An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from...
9.8CVSS
9.4AI Score
0.874EPSS
CentOS Errata and Security Advisory CESA-2017:2423 Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP...
9.8CVSS
9.3AI Score
0.874EPSS
Back to Basics: Worm Defense in the Ransomware Age
This post was authored by Edmund Brumaghin "Those who cannot remember the past are condemned to repeat it." - George SantayanaThe PrequelIn March 2017, Microsoft released a security update for various versions of Windows, which addressed a remote code execution vulnerability affecting a protocol...
7.7AI Score
Inside the Kronos malware – part 2
In the previous part of the Kronos analysis, we took a look at the installation process of Kronos and explained the technical details of the tricks that this malware uses in order to remain more stealthy. Now we will move on to look at the malicious actions that Kronos can perform. Analyzed...
7.1AI Score
Insider Attack on Lottery Software
Eddie Tipton, a programmer for the Multi-State Lottery Association, secretly installed software that allowed him to predict jackpots. What's surprising to me is how many lotteries don't use real random number generators. What happened to picking golf balls out of wind-blown steel cages on...
7AI Score
Inside the Kronos malware – part 1
Recently, a researcher nicknamed MalwareTech famous from stopping the WannaCry ransomware got arrested for his alleged contribution to creating the Kronos banking malware. We are still not having a clear picture whether the allegations are true or not - but let's have a look at Kronos itself....
7.2AI Score
Blowing the Whistle on Bad Attribution
The New York Times this week published a fascinating story about a young programmer in Ukraine who'd turned himself in to the local police. The Times says the man did so after one of his software tools was identified by the U.S. government as part of the arsenal used by Russian hackers suspected...
6.8AI Score
Oracle Linux 7 : log4j (ELSA-2017-2423)
From Red Hat Security Advisory 2017:2423 : An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating,.....
9.8CVSS
9.4AI Score
0.874EPSS
RHEL 7 : log4j (RHSA-2017:2423)
An update for log4j is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from...
9.8CVSS
9.4AI Score
0.874EPSS
August 9, 2017 – Morning Cyber Coffee Headlines – “Jesse Owens” Edition
Good morning! Sit with Carbon Black this morning over a cup of coffee (or tea) and browse a few industry headlines to get the day started. We’ve got just enough information below to get you through that first cup…enjoy! August 9, 2017 - Headlines Take Down: Hackers Looking to Shut Down Factories...
7.3AI Score
9.8CVSS
9.8AI Score
0.874EPSS
(RHSA-2017:2423) Important: log4j security update
Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a...
9.3AI Score
0.874EPSS
TrickBot comes with new tricks – attacking Outlook and browsing data
Last year we reported about a new modular malware using a network protocol similar to Dyreza - you can read about it here. The malware was not very stealthy and some parts were looking to be under development, but we noticed its potential and capability to be easily extended. Indeed, authors of...
7AI Score
Creator of NanoCore RAT Pleads Guilty to Aiding CyberCriminals
A programmer who was arrested in March this year—not because he hacked someone, but because he created and distributed a remote access software that helped cyber criminals—has finally pleaded guilty. Taylor Huddleston, 26, of Hot Springs, Arkansas, pleaded guilty on Tuesday to federal charges of...
6.6AI Score
Bye, bye Petya! Decryptor for old versions released.
Following the outbreak of the Petya-based malware in Ukraine, the author of the original version, Janus, decided to release his master key, probably closing the project. You can read the full story here. Based on the released key, we prepared a decryptor that is capable of unlocking all the...
6.6AI Score
Book Review: Twitter and Tear Gas, by Zeynep Tufekci
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes from the successful revolutions in Tunisia (2010-11), Egypt (2011), and Ukraine (2013). The second is that it has made them more...
7AI Score
Keeping up with the Petyas: Demystifying the malware family
Last June 27, there was a huge outbreak of a Petya-esque malware with WannaCry-style infector in the Ukraine. Since there is still confusion about how exactly this malware is linked to the original Petya, we have prepared this small guide on the background of the Petya family. The origin of Petya.....
6.7AI Score