Threat Advisory

Malware Advisory - Alert: APT 10 Targeting UK Organizations

APT10 (also known as Stone Panda, MenuPass and Red Apollo) is a threat actor known to have been active since at least 2009. Recently APT10 has compromised many global MSPs. The activity is global, but there is a significant UK impact. Industry information indicates that the exploitation methods vary depending on the location targeted. While the impact of the actor’s intrusions may not be immediately evident, the loss of intellectual property and associated financial cost in the case of successful data theft can be considerable. A successful compromise may also result in significant penalties under GDPR, as APT10 have been observed in multiple cases exfiltration large volumes of personal data. And the organization itself is not at risk in isolation: infections can and do spread rapidly onward to infect its customers and/or supply chain.

Malware Advisory - Shamoon Malware

Shamoon, the rarely seen but destructive malware that was used to wipe Saudi Aramco's servers in 2012, may be back in play, according to Chronicle, Alphabet's cybersecurity arm. Shamoon, an information-stealing malware that also includes a destructive module, renders infected systems useless by overwriting the Master Boot Record (MBR), the partition tables, and most of the files with random data. Once overwritten, the data are not recoverable. There are only three known times Shamoon variants have been used in the wild with the Saudi incident the most famous. The Shamoon disk-wiping malware has received a major upgrade and now features a ransomware module, along with support for both 32-bit and 64-bit architectures according to researchers. Shamoon, also known as Disttrack, first spotted in 2012, is one of today's most notorious malware families, even if one of the rarest.

Bad Rabbit Ransomeware [CVE-2017-0145]

Vulnerability Overview:

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.

Details:

"Broadpwn" Bug Affects Millions of Android and iOS Devices- Advisory [CVE-2017-9417]

Vulnerability Overview:

Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue.

Details:

Broadpwn bug is actually a heap overflow on Broadcom Wi-Fi chips which is triggered, when a device receives a WME (Quality-of-Service) information element with a malformed length from a connected network. The exploitation does not require any user interaction. A victim needs to connect his/her device to attacker wi-fi signal.

WannaCry Ransomware – Advisory [CVE-2017-0144]

Vulnerability Overview:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. 
 
Details:

Windows SAM and LSAD Downgrade Vulnerability (Badlock) Advisory [CVE-2016-0128]

Vulnerability Overview:

The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka ÔÇ£Windows SAM and LSAD Downgrade VulnerabilityÔÇØ or ÔÇ£BADLOCKÔÇØ.

Details:

Drown Attack [CVE-2016-0800]

Vulnerability Overview:

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

Details:

Subscribe to RSS - Threat Advisory