Daily NCSC-FI news followup 2020-06-03

Critical SAP ASE Flaws Allow Complete Control of Databases

threatpost.com/critical-sap-ase-flaws-complete-control-databases/156239/ If exploited, the most severe flaws could give unprivileged users complete control of databases and in some cases even underlying operating systems – The most severe vulnerability, CVE-2020-6248, has a CVSS score of 9.1 out of 10. See also:

wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222. And also:


Vulnerability Spotlight: Two vulnerabilities in Zoom could lead to code execution

blog.talosintelligence.com/2020/06/vuln-spotlight-zoom-code-execution-june-2020.html An exploitable path traversal vulnerability exists in the Zoom Client version 4.6.10 processes messages including animated GIFs. In order to trigger this vulnerability, an attacker needs to send a specially crafted message to a target user or a group. See also:

talosintelligence.com/vulnerability_reports/TALOS-2020-1055. And also:


Large-scale attack tries to steal configuration files from WordPress sites

www.zdnet.com/article/large-scale-attack-tries-to-steal-configuration-files-from-wordpress-sites/ Hackers have launched a massive campaign against WordPress websites over the past weekend, attacking old vulnerabilities in unpatched plugins to download configuration files from WordPress sites. Campaign accounted for 75% of all attempted exploits of plugin and theme vulnerabilities across the WordPress ecosystem

Ransomware gang says it breached one of NASA’s IT contractors

www.zdnet.com/article/ransomware-gang-says-it-breached-one-of-nasas-it-contractors/ DopplePaymer ransomware gang claims to have breached DMI, a major US IT and cybersecurity provider, and one of NASA IT contractors. In a blog post published today, the DopplePaymer ransomware gang said it successfully breached the network of Digital Management Inc. (DMI), a Maryland-based company that provides managed IT and cyber-security services on demand.

European Cyber Security Challenge 2020 – Event Date Change

www.enisa.europa.eu/news/enisa-news/european-cyber-security-challenge-2020-dates-changed The ECSC Steering Committee together with the Austrian national planners and the support of the European Agency for Cybersecurity decided to change the dates of the European Cyber Security Challenge 2020 Finals, scheduled to take place in Vienna this November. More information: europeancybersecuritychallenge.eu/

Pidä varasi: Lidl-huijaus kerää suomalaisten yhteystietoja

www.is.fi/digitoday/tietoturva/art-2000006528702.html Facebookissa näytetään suomalaisille Lidlin nimissä tehtyä huijausta, jonka varjolla ihmisiltä kalastellaan yhteystietoja.

You might be interested in …

Daily NCSC-FI news followup 2020-06-25

As organizations get back to business, cyber criminals look for new angles to exploit blog.checkpoint.com/2020/06/25/as-organizations-get-back-to-business-cyber-criminals-look-for-new-angles-to-exploit/ Criminals are using COVID-19 training for employees as phishing bait. Non coronavirus-related headline news (including Black Lives Matter) being used in phishing scams. Weekly cyber-attacks increase 18% compared to May average. However, Covid-19 related cyber-attacks down 24% compared to May. […]

Read More

Daily NCSC-FI news followup 2020-11-16

Verkkorikolliset yrittävät nyt kiristää varastetulla datalla tuplasti Yhä useampi raportoi, ettei tietoja ole palautettu lunnaiden maksun jälkeen www.kauppalehti.fi/uutiset/verkkorikolliset-yrittavat-nyt-kiristaa-varastetulla-datalla-tuplasti-yha-useampi-raportoi-ettei-tietoja-ole-palautettu-lunnaiden-maksun-jalkeen/5d70090b-104d-4950-a751-0… Esimerkiksi Revil-kiristysohjelmaa käyttäneet hakkerit olivat lähestyneet uhreja uudelleen viikkoja sen jälkeen, kun lunnaat oli vastaanotettu. Kun uhri saa lunnaat maksettuaan salausavaimen, sitä ei voida häneltä ottaa pois. Varastettujen tietojen avulla rikolliset sen sijaan voivat palata toiseen maksuun […]

Read More

Daily NCSC-FI news followup 2020-07-31

Tutorial of ARM Stack Overflow Exploit against SETUID Root Program www.fortinet.com/blog/threat-research/tutorial-arm-stack-overflow-exploit-against-setuid-root-program In part I of this blog series, Tutorial of ARM Stack Overflow Exploit Defeating ASLR with ret2plt, I presented how to exploit a classic buffer overflow vulnerability when ASLR is enabled. That target program calls the function gets() to read a line from stdin. […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.