Year: 2019

APT34 Event Analysis Report

November 9, 2019

1 Overview

On April 18, 2019 a hacker/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram channel. The organization also posted screenshots of the tool’s backend panels, where victim data had been collected. Early in the middle of March 2019, this hacker/hacker organization had released and sold this toolkit on the Internet. Interestingly, the CEO of a security company in Kuwait took to Twitter to stress in particular the authenticity of this post. (more…)

Information Security in the Workplace- Phishing email-v

November 8, 2019

With the advancement of IT-based transformation and the rapid development of IT, various network technologies have seen more extensive and profound applications, along with which come a multitude of cyber security issues. Come to find out what information security issues you should beware of in the workplace. (more…)

IP Reputation Report-11032019

November 7, 2019

  1. Top 10 countries in attack counts:

(more…)

Cybersecurity Insights-3

November 6, 2019

Overall Cybersecurity Situation

3.1 Attack Type Distribution

Based on attack type13, DDoS contained the largest proportion of malicious IP addresses; more than half were involved in DDoS attacks. Other types of attacks that malicious IP addresses participated in included botnets, scanning, and spam. (more…)

Kibana Remote Code Execution Vulnerability (CVE-2019-7609) Threat Alert

November 5, 2019

Vulnerability Description

In February 2019, an official announcement was made that Kibana had a remote code execution vulnerability. The Kibana version prior to 5.6.15 and 6.6.1 had a functional flaw in the Timelion visualization tool, which allowed an attacker to use Kibana to execute arbitrary code on the server. Currently PoC has been announced; Ussers are recommended to conduct self-examination and protection in a timely manner. (more…)

Cisco Aironet Access Points Unauthorized Access Vulnerability Threat Alert

November 4, 2019

Overview

On October 17, local time, Cisco issued a security notice claiming that an unauthorized access vulnerability to Aironet Access Points (APs) was fixed. The vulnerability stems from the fact that no specific URL is filtered. An attacker can obtain the access rights of the device by constructing a malicious URL and sending it to the affected AP to trigger the vulnerability. The attacker can then modify multiple configuration data of the AP and cause a denial of service attack.
(more…)

Weblogic High Risk Vulnerability Threat Alert

November 1, 2019

Overview

Recently, Oracle fixed two high-risk vulnerabilities in Weblogic (CVE-2019-2890 and CVE-2019-2891)  in its October critical patch update.

References:

https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

(more…)

IP Reputation Report-10272019

October 31, 2019

  1. Top 10 countries in attack counts:

  • The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at October 27, 2019.

(more…)

Cybersecurity Insights-2

October 30, 2019

Key Findings

Finding 1

The interval between disclosure of a vulnerability and successful exploitation of this vulnerability was shortened to hours, posing the greatest challenge to traditional security operations. (more…)

Php-fpm Remote Code Execution Vulnerability (CVE-2019-11043) Threat Alert

phpfpm

October 29, 2019

Overview

Recently, security researchers have published a vulnerability in php-fpm (CVE-2019-11043) that could lead to remote code execution in certain Nginx configurations.

The vulnerability exists in the file sapi/fpm/fpm/fpm_main.c (https://github.com/php/php-src/blob/master/sapi/fpm/fpm/fpm_main.c#L1140), which assumes the prefix of env_path_info Equal to the path of the php script, but in fact the code does not check if this assumption is met, and the lack of this check will invalidate the pointer in the “path_info” variable. In some Nginx configurations, an attacker can use a line break (encoded at %0a) to destroy the regexp in the `fastcgi_split_path_info` directive, which can cause a null PATH_INFO, which triggers the vulnerability. (more…)

Search

Subscribe to the NSFOCUS Blog