Show more

to @Europol we’re aware of a email claiming to represent @UNODC “ Department” & originating from info[@]anticarder[.]org

There is no such department and we encourage recipients to contact local if necessary or delete. .twitter.com/up7JRk2M8b

MISP project maintains an exhaustive list of threat actors with metadata, relationships and synonyms. The format is machine-parsable and all is open source under CC-0/2-clause BSD license. Feel free to reuse and/or contribute.

github.com/MISP/misp-galaxy/bl … -
misp-project.org/galaxy.html#_ …pic.twitter.com/lEVgeLgU2o

"There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it."

cve.circl.lu/cve/CVE-2019-1486 …

Happy New Year! Thanks to all the 400+ contributors who contributed to the MISP project to improve information sharing and threat intelligence. Thanks to all the users and supporters who helped during 2019.

misp-project.org/contributors/ pic.twitter.com/JvOe16WMeg

"Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when the device retrieves updates scripts from the internet."

cve.circl.lu/cve/CVE-2019-3984 …

Happy New Year! Be the year of the improved offline backups, increased contextual information sharing, boosted raw logging support for and supporting teams to acquire new detection/defense capabilities.pic.twitter.com/2Twx64strr

"The HTTP Authentication library before 2019-12-27 for Nim has weak password hashing because the default algorithm for libsodium's crypto_pwhash_str is not used."

cve.circl.lu/cve/CVE-2019-2013 …

2019-12-28: Loader -> '1079' Core Bot
Cert: [LIT-DAN UKIS UAB]
Crypter
CryptStringToBinaryA -> malloc -> window (hide)-> memcpy -> resource -> VirtualAllocExNuma -> Crypto Key Decrypt
Same '1079'

twitter.com/VK_Intel/status/12 …
h/t @malwrhunterteampic.twitter.com/Ow9ZZIktEr

We have released a set of ethics guidelines in order to develop more practical advice and support the community. We welcome the feedback and discussion of ethical scenarios from other security teams by Jan 31, 2020.
first.org/global/sigs/ethics/e …

"An issue was discovered on Alcatel-Lucent OmniVista 4760 devices. A remote unauthenticated attacker can chain a directory traversal (which helps to bypass authentication) with an insecure file upload to achieve Remote Code Execution as SYSTEM."

cve.circl.lu/cve/CVE-2019-2004 …

Unsure yet what this comeback/evolution, after 2 years missing, of Zloader/Terdot.A is about...but this is one of the emerging trend in december 2019. cc/thx @tildedennis @threatinsightpic.twitter.com/eujIGHYDC1

"D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product."

cve.circl.lu/cve/CVE-2019-1632 …

"Ubuntu whoopsie integer overflow vulnerability (CVE-2019-11484)" and the full "Chaining accidental features of Ubuntu’s crash reporter to get LPE"
securitylab.github.com/researc …

securitylab.github.com/researc … - thanks to @kevin_backhouse for the work and the super informative blog posts.

"The malware scan function in BullGuard Premium Protection 20.0.371.8 has a TOCTOU issue that enables a symbolic link attack, allowing privileged files to be deleted."

cve.circl.lu/cve/CVE-2019-2000 …

Don't forget to update your PyMISP library to the latest version especially to fix the issue introduced in the new MISP feed generator.
github.com/MISP/PyMISP/  Thanks to @rafi0t for the hard work and refactoring on the Python library to interact with the MISP API.

Illustration of some ServHelper distribution for the past year (TL;DR: it's more than one actor)pic.twitter.com/XZGGAZ5rYy

I would love to see more of the energy currently dedicated to this debate directed to a constructive effort like this. Sigma is underrated. Projects like @MISPProject provide easy means to share sigma/yara/snort sigs alongside contextual information
twitter.com/shotgunner101/stat …

"Stack-based overflow vulnerability in the logMess function in Open TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via a long TFTP error packet"

cve.circl.lu/cve/CVE-2019-1256 …

Show more
OpenCloud Luxembourg Mastodon instance

A Mastodon instance for Luxembourg and beyond.