Talos Threat Source is a regular intelligence update from Cisco Talos, highlighting the biggest threats each week and other security news.
VMware Releases Security Advisories for Various Critical Vulnerabilities in vCenter, Workstation, and more
Description: Over 90% of malware makes use of the Domain Name System. While many organizations implement strict security protections as it pertains to web traffic, email, etc., they typically have less stringent controls in place to protect against DNS-based threats. Attackers have recognized this fact and are using the DNS for data exfiltration, establishing bi-directional command & control channels, and obtaining bulletproof domain hosting. In this presentation we will discuss creative ways that cyber criminals abuse the DNS along with countermeasures defenders can use to help protect their networks.
Subject: Talos is no stranger to APT attacks. During recent research, we observed how APT actors are evolving and how the reconnaissance phase is changing to protect their valuable 0-day exploit or malware frameworks. During the presentation, we will not speak about a specific malware actor but we will use various different cases to illustrate how the reconnaissance phase is becoming more important and more complex. This talk will mainly focus on the usage of malicious documents (Microsoft Office and Hangul Word Processor) and watering hole attacks designed to establish if the target is the intended one. We will mention campaigns against political or military organizations targeting USA, Europa and Asia.
Subject: The Internet of Things creates many new opportunities for our personal and professional lives. It also creates new opportunities for criminals to make illicit gain, and for the disaffected to wreak havoc. Recognising that IoT systems will inevitably have vulnerabilities, and will be attacked allows organisations to design systems to be resilient from the beginning rather than to repeat past mistakes and attempt to bolt on security at a later date. In this session, by referring to a simple IoT architecture, we will discuss examples of how attackers have previously attacked systems, and show how good practices can be applied to protect systems.
Subject: Invented by an insane criminal in 1989, ransomware has evolved into a major illicit activity. For the criminal, ransomware presents many advantages over trying to make money from selling stolen data, but also presents a number of challenges. In this presentation, I will start by presenting Talos (our activities, organisation and telemetry). Then, I will present how ransomware has developed over the past 28 years, the techniques used by current malware variants and how criminals seek to overcome the difficulties that they face. And finally, and how we can expect ransomware to develop in the near future.
Description: Cisco's Talos Group specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers continuously evolve their techniques. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In this talk/webinar, we will perform deep analysis of recent threats Talos has observed over the past quarter and see how Talos leverages large datasets to deliver product improvements and mitigation strategies.
Description: VMware has releases two security advisories addressing eight vulnerabilities across vCenter Server, Unified Access Gateway, Horizon View, and Workstation. The first advisory details CVE-2017-5641, a remote code execution flaw in vCenter Server manifesting via BlazeDS. The second advisory addresses a vulnerability in Unified Access Gateway and Horizon View that could allow an attacker to execute code on the security gateway. The second advisory also addresses various flaws in Cortado ThinPrint that could allow a guest to execute code or perform a denial of service attack on the host operating system. VMware has released software updates that address these vulnerabilities.
Description: The Shadow Brokers have released a new bunch of information detailing various tools and exploits that target Windows-based hosts. Preliminary analysis of the exploits by members of the information security community suggested that some of the exploits released were zero-day vulnerabilities. However, Microsoft has published a blog post stating that most of the exploits were previously patched or were unable to be reproduced on currently supported platforms.
CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler
https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html
FDA Demands St. Jude Take Action on Medical Device Security
https://threatpost.com/fda-demands-st-jude-take-action-on-medical-device-security/124972/
Hajime worm battles Mirai for control of the Internet of Things
https://www.symantec.com/connect/blogs/hajime-worm-battles-mirai-control-internet-things
Golang SSH Security
https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/
A Remote Attack on the Bosch Drivelog Connector Dongle
https://argus-sec.com/remote-attack-bosch-drivelog-connector-dongle/
Hack in the Box - Amsterdam 2017: Slides and Materials
http://conference.hitb.org/hitbsecconf2017ams/materials/
Detection Name: W32.Auto:f21d822e8f.in05.Talos
SHA 256: ae7327f36a659d01a85d4071a4570458ec03a05a6ce7d2f6d092fb46aff3e739
Detection Name: W32.AE7327F36A-95.SBX.TG
SHA 256: c19fd401e01738676c11c84c5c3d4c0d33761d2bdd5babbb499696b6a24c10e4
Detection Name: W32.Ransom:Gen.20fl.1201
SHA 256: 061cbc0bd6409cb7e385f1a67a8b169a211fb96aff3f7ec15087ef0a2b8ccdd3
Detection Name: Application:ADWARE-tpd
SHA 256: 412a91348fc21d9c00168fa10d77918e9b60c4ec9dfc104b196f8b6efa609425