Martijn Lammerts
My own digital place with a little of everything

New GnatSpy Mobile Malware Family Discovered

18 December 2017

Earlier this year researchers first disclosed a targeted attack campaign targeting various sectors in the Middle East. This threat actor was called Two-tailed Scorpion/APT-C-23. Later on, a mobile component called VAMP was found, with a new variant (dubbed FrozenCell) discovered in October.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

New GnatSpy Mobile Malware Family Discovered

Continue reading...

Dissecting PRILEX and CUTLET MAKER ATM Malware Families

14 December 2017

For a while now, Trend Micro has focused its efforts on covering ATM malware, especially new families that come up with features that stealthily target banking customers. In this blog post, we're going to cover two that have recently come to our attention: Prilex and Cutlet Maker. Each of them is interesting in their own right, but for different reasons.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Dissecting PRILEX and CUTLET MAKER ATM Malware Families

Continue reading...

December Patch Tuesday: Yearender Includes Updates for MMPE Vulnerabilities

13 December 2017

It was a relatively low-key year-ender for Microsoft’s Patch Tuesday, as the company’s monthly release of updates was relatively light in terms of noteworthy vulnerabilities. With that said, there were still a few notable vulnerabilities that were addressed.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

December Patch Tuesday: Yearender Includes Updates for MMPE Vulnerabilities

Continue reading...

Untangling the Patchwork Cyberespionage Group

11 December 2017

Patchwork (also known as Dropping Elephant) is a cyberespionage group known for targeting diplomatic and government agencies that has since added businesses to their list of targets. Patchwork’s moniker is from its notoriety for rehashing off-the-rack tools and malware for its own campaigns. The attack vectors they use may not be groundbreaking—what with other groups exploiting zero-days or adjusting their tactics—but the group's repertoire of infection vectors and payloads makes them a credible threat.

We trailed Patchwork’s activities over the course of its campaigns in 2017. The diversity of their methods is notable—from the social engineering hooks, attack chains, and backdoors they deployed. They’ve also joined the Dynamic Data Exchange (DDE) and Windows Script Component (SCT) abuse bandwagons and started exploiting recently reported vulnerabilities. These imply they’re at least keeping an eye on other threats and security flaws that they can repurpose for their own ends. Also of note are its attempts to be more cautious and efficient in their operations.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Untangling the Patchwork Cyberespionage Group

Continue reading...

CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy Systems

7 December 2017

Despite being nearly a decade old, and years past its peak, DOWNAD, also known as CONFICKER, has not gone away. 9 years to the month after its first discovery, we take a look at the numbers to see where DOWNAD is today, and why it is still one of the world’s most prevalent malware.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy Systems

Continue reading...

New Mirai Attack Attempts Detected in South America and North African Countries

1 December 2017

A few days after a campaign in Argentina, there was a spike of activity from Mirai in a series of attack attempts in South American and North African countries.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

New Mirai Attack Attempts Detected in South America and North African Countries

Continue reading...

systemd Vulnerability Leads to Denial of Service on Linux

23 November 2017

Many Linux distributions are at risk due to a recently disclosed flaw in systemd: a flaw in its DNS resolver could cause a denial-of-service attack on vulnerable systems. The vulnerability is exploited by having the vulnerable system send a DNS query to a DNS server controlled by the attackers. The DNS server would then return a specially crafted query, causing systemd to enter an infinite loop that pins the system’s CPU usage to 100%. This vulnerability was assigned CVE-2017-15908.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

systemd Vulnerability Leads to Denial of Service on Linux

Continue reading...

Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability

22 November 2017

Intel recently released a security advisory detailing several security flaws in its Management Engine (ME). The advisory provides critical ME, Trusted Execution Technology (TXT), and Server Platform Services (SPS) firmware updates for versions 8.X-11.X covering multiple CVE IDs, with CVSS scores between 6.7 and 8.2.

But there is also another notable vulnerability that can pose a bigger risk especially to corporate computers and networks: CVE-2017-5689, a privilege escalation flaw. While there are certain factors and/or triggers for this vulnerability, it can provide attackers administration access and enable them to remotely reset or power off the vulnerable system if exploited successfully. This security issue was divulged in the research, "Silent Bob is Silent." Compared to the recently identified ME vulnerabilities, CVE-2017-5689 was assigned a CVSSv3 score of 9.8.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability

Continue reading...