We just did too but we want to be sure that we don't have any specific UTF characters or alike.

No worries. We already reported the phishing URL to the hosting company for take-down. Thanks for the report.

"There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation."

cve.circl.lu/cve/CVE-2020-1184 …

"Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease."

cve.circl.lu/cve/CVE-2020-8816 …

"IBM Security Identity Governance and Intelligence 5.2.6 could allow an unauthorized user to obtain sensitive information through user enumeration."

cve.circl.lu/cve/CVE-2020-4244 …

"A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability."

cve.circl.lu/cve/CVE-2020-8605 …

"Improper Access Control in the Kiosk Mode functionality of Bosch Recording Station allows a local unauthenticated attacker to escape from the Kiosk Mode and access the underlying operating system."

cve.circl.lu/cve/CVE-2020-6774 …

Check Point researchers believe they have identified the individual behind the VandaTheGod hacktivist campaigns
research.checkpoint.com/2020/v …pic.twitter.com/GiVBnwaZdq

With the new misp-opendata software, MISP datasets can be automatically extracted and published on @EU_opendata @OpenDataLU portals automatically.
github.com/MISP/misp-opendata … This work is part of the @VARIoT_project and co-funded by @inea_eu .twitter.com/qF3gcwupOO

There are a lot of ongoing phishing targeting various self-hosted mail services in Luxembourg and Europe. Please be careful and don't forget to submit any suspicious url to
circl.lu/urlabuse/  .twitter.com/gLpzS6OPVi

DFIR Training Materials by @circl_lu : Edition May 2020 computer forensic training are published. "Post-mortem Digital Forensics", "File System Forensics and Data Recovery" and "Windows-, Memory- and File Forensics".

circl.lu/services/forensic-tra … .twitter.com/y3707L3aX2

Malspam hitting mailboxes in Germany , distributing ->

GuLoader payload:

bazaar.abuse.ch/sample/98c39c4 …

AZORult payload URL:

urlhaus.abuse.ch/url/366085/ 

AZORult C2:

http://infosales.duckdns\.org/index.phppic.twitter.com/AC8wbTgMNV

deploying an old VirtualBox and a Windows XP image (totalling more than 400 MB), then mounting the drives to encrypt the files on the host from the VM. This is *really* dirty... and pretty smart when you think about AV evasion.

Are you collecting 4624 events from your endpoints? Look for unexpected type 10 (Remote Interactive, i.e. RDP or terminal services) logins. And look for unexplained 4720 (account created) too.
twitter.com/campuscodi/status/ …

.@SANSInstitute Whitepaper:
QUIC & The Dead: Which of the Most Common IDS/IPS Tools Can Best Identify QUIC Traffic?

sans.org/reading-room/whitepap … [PDF]pic.twitter.com/PoeeXKL4tA

Thanks to Nils @0x3c7 and @Secureworks for the contribution. MISP threat-actor galaxy is updated, published on the website, available in core MISP and all tools using the MISP project galaxies.

twitter.com/0x3c7/status/12638 …pic.twitter.com/zfP3DV6Pi0

"An exploitable authentication bypass vulnerability exists in the ESPON Web Control functionality of Epson EB-1470Ui MAIN: 98009273ESWWV107 MAIN2: 8X7325WWV303"

cve.circl.lu/cve/CVE-2020-6091 …

Show more
OpenCloud Luxembourg Mastodon instance

A Mastodon instance for Luxembourg and beyond.