Talos ThreatSource is a regular intelligence update from Cisco Talos, highlighting the biggest threats each week and other security news.
Arbitrary Command Execution Vulnerabilities in Git, Subversion, and Mercurial Fixed
Synopsis: Buzzwords are the bane of the infosec community. Whether it’s “cyber” or “APT”, these terms are often used as nothing more than a way to generate clicks or by marketing teams to push more blinky lights to customers. “Fileless malware” is the latest example of this. Attacks leveraging malware that have been dubbed “fileless malware attacks” have been generating significant media coverage recently leading many to wonder what impact these attacks may have on their organizations or whether they are adequately protected against them. In many cases these attacks are not truly fileless and result in various artifacts being written to targeted systems. In this presentation we will provide a brief history of in-memory malware as well as walk through some specific examples of malware that makes use of this approach to infecting systems. We will also cover why most malware is not actually “fileless”, along with specific examples of threats that make use of interesting persistence mechanisms that do not resemble what many have grown accustomed to seeing from malware.
Synopsis: What happens when the biggest players in a market just get up and quit? That's exactly what has happened to the exploit kit landscape over the last year. Now that Angler, Neutrino, and Nuclear are gone, we're left to pick up the pieces. What's been created is a vacuum with Rig, Sundown, and others jockeying for position, but none have taken the lead. We've observed adversaries changing kits frequently and gates switching from one kit to the next. Just like any other threat, adversaries are going to evolve and change. Oddly the kits don't appear to have evolved much, but looks can be deceiving. Previously unreleased details on several high profile exploit kits will be disclosed. This talk will discuss the state of exploit kits today. There will also be a section related to how exploit kits will evolve in the future and the impacts it may potentially have on the threat landscape overall.
Description: A remotely exploitable arbitrary command execution vulnerability has been identified and fixed in Git, Subversion, and Mercurial. This vulnerability (which has been assigned CVE-2017-1000117 for Git, CVE-2017-9800 for Subversion, and CVE-2017-1000116 for Mercurial) manifests due to the source code management system mishandling "ssh://..." URLs such that if a hostname begins with a dash "-", it could "cause the 'ssh' command to instead (mis)treat it as an option." This vulnerability has been addressed for Git, Subversion, and Mercurial respectively and users should update their SCM installations.
Beware of Security by Press Release
ShadowPad in corporate networks - Popular server management software hit in supply chain attack
Windows Search Bug Worth Watching, and Squashing
Botched Firmware Update Bricks Hundreds of Smart Door Locks
ElmersGlue ransomware can be unlocked without paying
Moving Beyond EMET II – Windows Defender Exploit Guard