mfeilner, to opensource German
@mfeilner@mastodon.cloud avatar

... Wow. Four weeks to notice, only hours to fix and a day(?) to deploy. , , , , : You Rock! We Rock! Dont tell that to or the like, they will cry.

AAKL, to Cybersecurity
@AAKL@noc.social avatar

deleted_by_author

  • Loading...
  • PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar
    knitcode, to Cybersecurity

    Folks -- keep in mind that most threat intel reporting containing domains is NOT designed for blocking. I have received enough questions about the recent OSINT reporting on Ivanti that it's worth a comment. Mandiant reports -- while great and in-depth -- include established companies and dynamic DNS services. Domains on the CyberReason list include things that aren't even domains but somehow have been elevated in VirusTotal and elsewhere to DNS status, e.g. request.data. It takes a lot of work to validate domains to protect networks while ensuring their performance. I don't recommend grabbing every ioc list and shoving it into your DNS or any firewall, regardless of the reputation of the source. These companies are offering IR data not blocking ioc lists.

    0x58, to Cybersecurity

    📨 Latest issue of my curated and list of resources for week /2024 is out! It includes the following and much more:

    ➝ 🔓 Support Portal Exposed Customer Device Info
    ➝ 🔓 🇹🇭 Major in Exposes Personal Data of 20 Million Elderly Citizens
    ➝ 🔓 🇫🇷 Millions at risk of fraud after massive health data hack in
    ➝ 🔓 🇺🇸 employee inadvertently leaks data of 63 thousand colleagues
    ➝ 🔓 🖥️ Hacked: Revokes Passwords, Certificates in Response
    ➝ 🔓 🇺🇸 says caused $49 million in expenses
    ➝ 💸 📈 Payments Exceed $1 Billion in 2023, Hitting Record High After 2022 Decline
    ➝ 🇺🇸 💰 US offers $10 million for tips on ransomware leadership
    ➝ 🇨🇳 🇺🇸 -backed Volt Typhoon hackers have lurked inside US for ‘at least five years’
    ➝ 🇨🇳 🇳🇱 Chinese Hackers Exploited Flaw to Breach Dutch Network
    ➝ 🇮🇷 🇮🇱 accelerates cyber ops against from chaotic start
    ➝ 🇧🇾 🇺🇸 Belarusian National Linked to BTC-e Faces 25 Years for $4 Billion Money Laundering
    ➝ 🇭🇰 💸 worker pays out $25 million after video call with ‘chief financial officer’
    ➝ 🇺🇦 is Creating a ‘Cyber Diplomat’ Post
    ➝ 🇩🇰 orders schools to stop sending student data to
    ➝ 🇪🇺 ⚖️ proposes criminalizing AI-generated child sexual abuse and deepfakes
    ➝ 🇳🇱 💰 Fined 10 Million Euros by Dutch Data Regulator
    ➝ 🇺🇸 🛂 US to Roll Out Visa Restrictions on People Who Misuse to Target Journalists, Activists
    ➝ 🦠 💬 Raspberry Robin Upgrades with Spread and New Exploits
    ➝ 🦠 🍎 New Backdoor Linked to Prominent Ransomware Groups
    🦠 🪥 Surprising 3 Million Hacked Story Goes Viral—Is It True?
    ➝ 🇨🇦 🐬 declares public enemy No. 1 in car-theft crackdown
    ➝ 🩹 : Patch new Connect Secure auth bypass bug immediately
    ➝ 🐛 📍 Security flaw in a popular smart helmet allowed silent location tracking
    ➝ 🩹 Critical Patches Released for New Flaws in , , Products
    ➝ 🐛 🐧 Critical Boot Loader in Shim Impacts Nearly All Distros
    ➝ 🐛 ✈️ App Vulnerability Introduced Aircraft Safety Risk
    ➝ 🩹 Patches High-Severity Bugs in QTS, Qsync Central

    --

    📚 This week's recommended reading is: "x86 Software Reverse-Engineering, Cracking, and Counter-Measure" by Stephanie Domas & Christopher Domas

    --

    Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

    https://infosec-mashup.santolaria.net/p/infosec-mashup-week-062024

    governa, to Citrix
    @governa@fosstodon.org avatar
    elfy, to random German
    @elfy@chaos.social avatar

    Ich glaube es braucht angesichts der aktuellen Fuckups mit und eine Tranche dieser legendären Sticker. Zu finden unter https://github.com/SFTtech/sticker/tree/master/sicher

    Falls wer welche druckt; ich beteilige mich gerne finanziell, damit endlich die Software, die uns als sicher und allheilige Securitymaßnahme verkauft wird, mithilfe der Aufkleber wirklich wieder sicher ist.

    byteborg,
    @byteborg@chaos.social avatar

    @elfy
    Würde mich finanziell an einem Druckauftrag beteiligen.
    Ggf. ein Premium/Enterprise Remix davon wäre auch noch eine Idee...


    floyd, to random
    @floyd@chaos.social avatar

    The case of old software put together with some glue code is what we often see, because we try to unpack commercial software and RE. When we looked at the last (well-known) EDR we immediately got a call from the 90ies, they wanted their vulnerabilities back. But this happens everywhere. My favorit is still that online banking system we found critical vulns and reported and got fixed… except for no other bank we found on Shodan.

    fthy, to infosec German

    The new Ivanti CVE-2024-22024 is already exploited since today 10am CET. Check your Ivanti Pulse outgoing connections in your dns, firewall, proxy etc logs.

    malware_traffic, to random
    simontsui, to random

    Ivanti has a blog update and security advisory for a newly discovered Ivanti Connect Secure XML external entity (XXE) vulnerability CVE-2024-22024 (8.3 high). "We have no evidence of this vulnerability being exploited in the wild"
    🔗 Blog: https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways-282024
    Advisory: https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US

    AAKL, to Cybersecurity
    @AAKL@noc.social avatar
    0x58, to random

    So, we've been talking about giving sh!t to recently (and rightfully).. Can we talk about ? Like every other week they release security patches....

    ericfreyss, to random French
    @ericfreyss@mastodon.social avatar

    Je vous recommande l'écoute du podcast de cette semaine

    https://www.nolimitsecu.fr/vulnerabilites-dans-ivanti-connect-secure-et-policy-secure-gateways/

    "Vulnérabilités dans Connect Secure et Policy Secure Gateways"

    martinsteiger, to random German
    @martinsteiger@chaos.social avatar

    Die Universität Zürich hat übrigens erst gerade auf Ivanti-VPN-Infrastruktur gewechselt:

    https://www.csoonline.com/article/1303522/us-government-agencies-ordered-to-take-ivanti-vpn-product-offline.html

    YourAnonRiots, to random Japanese
    @YourAnonRiots@mstdn.social avatar

    A recently disclosed SSRF (CVE-2024-21893) in Connect Secure and Policy Secure products is now under mass exploitation.

    https://thehackernews.com/2024/02/recently-disclosed-ssrf-flaw-in-ivanti.html

    Patch now to protect your organization from system takeover.

    thezdi, to random

    CVE-2023-46263: The Trend Research Team takes a look at a recently patched Avalanche bug that allows an authenticated attacker to execute code in the context of SYSTEM. They include source code analysis and detection guidance. Check the details at https://www.zerodayinitiative.com/blog/2024/2/5/cve-2023-46263-ivanti-avalanche-arbitrary-file-upload-vulnerability

    itnewsbot, to security
    @itnewsbot@schleuss.online avatar

    As if two Ivanti vulnerabilities under explot wasn’t bad enough, now there are 3 - Enlarge (credit: Getty Images)

    Mass exploitation began over th... - https://arstechnica.com/?p=2001230 #vulnerabilities #exploitation #security #biz#ivanti #vpns

    governa, to random
    @governa@fosstodon.org avatar

    More mass exploits hit the same buggy devices ⚠️

    https://www.theregister.com/2024/02/05/ivanti_zero_day/

    hrbrmstr, to random
    @hrbrmstr@mastodon.social avatar
    rfwaveio, to Cybersecurity
    @rfwaveio@mstdn.ca avatar

    Ivanti is warning of two vulnerabilities in Connect Secure, Policy Secure and ZTA gateways, with one under active exploitation. The first flaw is tracked as CVE-2024-21893, and can allow an attacker to bypass authentication and access restricted resources. The second flaw is tracked as CVE-2024-21888, and can allow an attacker to escalate privileges to an administrator. Administrators are advised to patch ASAP.

    https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-zero-day-exploited-in-attacks/

    simontsui, to random

    Volexity recently disclosed details related to exploitation of Ivanti Connect Secure VPN, revealing how the attacker chained two zero-day vulnerabilities to achieve remote code execution. When investigating the source of compromise, Volexity employed memory forensics, analyzing a memory sample collected from a suspected compromised VPN device, which allowed Volexity to zero in on the source of the compromise. "The lesson for analysts is to independently verify the integrity and trustworthiness of high-value targets using memory forensics, rather than only relying on tools that run on a potentially compromised device."
    🔗 https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/

    cyberpanda, to Citrix German

    This meme is proper bang on relatable, innit?

    Time for a bit of a laugh! 🫣🤣

    decio, to infosec French

    oh ... :blobfacepalm:​ :blobcatfacepalm:​ 🤦‍♂️​ ""
    ⬇️​
    "yes you read it right - trying to reproduce this weeks Ivanti CVEs has led us into further 0days on a fully patched Ivanti SSLVPN device

    We’ll report; but our 90 day policy will restrict any further sharing"
    👇​
    🐦​🔗​https://twitter.com/watchtowrcyber/status/1753366975609475472

    Pour rappel leur recherche sur les précédentes
    ⬇️​
    https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887/

    decio,

    :eyes_happy:​ :eyes_squint:​

    𝗖𝗩𝗘-𝟮𝟬𝟮𝟰-𝟮𝟮𝟬𝟮𝟰 👀​ :blobeyes:​ :blobcateyes:​ :dragon_eyes:​

    decio,

    ⬇️​
    "We have received criticism for our decision to tweet about the existence of a vulnerability - citing claims of 'unactionability'. Our view is very simple - given we could find these 0days so trivially and the clear APT attention that Ivanti appliances have received, we felt it is not unreasonable to expect another APT to find said vulnerability in the near-future and start using it to once again compromise organisations. We maintain this view."
    ⬇️​
    "At this point we had to pause… did a basic XXE payload - that we could copy off an OSCP course - actually work?

    Quickly we confirmed that this wasn’t present in older versions but had been introduced into the latest version of Ivanti Connect-Secure. Yes, you’re reading it right, they’ve messed up once again with their remediation and introduced an even higher impact bug."
    👇​
    "Ivanti Connect Secure CVE-2024-22024 - Are We Now Part Of Ivanti?"
    👇​
    https://labs.watchtowr.com/are-we-now-part-of-ivanti/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • InstantRegret
  • DreamBathrooms
  • ethstaker
  • magazineikmin
  • thenastyranch
  • ngwrru68w68
  • Youngstown
  • slotface
  • modclub
  • love
  • kavyap
  • everett
  • cubers
  • anitta
  • mdbf
  • khanakhh
  • tacticalgear
  • osvaldo12
  • rosin
  • tester
  • GTA5RPClips
  • cisconetworking
  • Durango
  • normalnudes
  • provamag3
  • Leos
  • JUstTest
  • All magazines