mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#firewall

7 Beiträge7 Beteiligte0 Beiträge heute

🚨 Surge in Attacks Leveraging CNVD Exploits: A Warning Sign for Global Defenders

On the 15th of May, the CrowdSec Network recorded a sharp uptick in exploitation attempts targeting three exploits that are tracked exclusively in the Chinese National Vulnerability Database (CNVD):
♦️ CNVD-2019-19299
♦️ CNVD-2022-42853
♦️ CNVD-2021-30167

ℹ️ Key findings:

While the #CrowdSec Network’s visibility beyond the Great #Firewall is constrained, we can still observe the campaign and what else these attackers are looking for.

🔹 The spike, visible in the chart, reveals coordinated scanning behavior that likely signals a broader exploitation campaign currently in motion.
🔹 Here’s the Twist: The same attacker clusters are also seen deploying vulnerabilities commonly cataloged in the NVD, targeting global software.
🔹 This mix of CNVD and CVE-based tactics suggests one thing: Attackers aren’t limiting themselves by geography, so why should defenders?
🔹 As software supply chains become increasingly globalized, relying exclusively on U.S.-centric vulnerability databases such as the NVD creates dangerous blind spots. Threat actors clearly understand this, and they are actively exploiting those gaps.

🔎 Trend analysis:

🔹 May 15th: CrowdSec detects a surge in scans exploiting CNVD-2019-19299, CNVD-2022-42853, and CNVD-2021-30167. Most targeted software is used in mainland China, but activity comes from global IP ranges.
🔹 Ongoing: Attacker infrastructure also launches probes for high-profile CVEs in Apache, Atlassian, and Jenkins, showing no regional constraint in their tooling.
🔹 Common TTPs: Remote code execution (RCE), abuse of default credentials, and mass scanning via compromised VPS infrastructure.

✅ How to protect your systems:

Thanks to CrowdSec’s global network of decentralized agents, this trend was caught early. CrowdSec users are already benefiting from real-time protection via up-to-date blocklists and mitigation rules. Want to stay protected against CNVD and CVE threats alike?

🔹 Investigate: Check your software supply chain and note any pieces that might have their exploits tracked outside the NVD system, for example, you can take a closer look at the EUVD recently launched by @enisa_eu
🔹 Preemptive blocking: Deploy the CrowdSec WAF for automated mitigation with 100+ virtual patches and geo-aware rules: youtube.com/watch?v=LyNfr4QWiqw

Linux systems unable to reach out to internet behind pfsense while Windows work fine.

I am trying to set up my #homelab for #forensics and I have encountered a very weird issue. I am running an internal pfsense #firewall for my environment. On this firewall there are 3 interfaces: WAN and two Isolated Labs.

On the "WAN" interface, both #linux and windows systems are able to access the internet without any problems.

But on the other two lans - named Infrastructure and Lab - the Linux systems are not able to connect to the internet after booting, while the systems are able to communicate with each other. In order to get them working I need to go the respective interface and make any change there and save the page, practically refreshing the settings on the interface. After this all currently online linux systems on that interface are working as expected and connectivity is restored. As you can imagine this is a huge pain, especially when I am testing things and I need to turn on various systems at different times. If i put the systems on the WAN interface they face no issue at all, so what could be the solution here for fixing connectivity for linux systems on the other interfaces?

edit: it issue is both on pfsense 2.7.2 and 2.8.0

@homelab
@pfSense

#dfir#proxmox#pfsense

Was ist #iptables-persistent?

Und wie unterscheidet es sich von #UFW? (Iptables Teil 1)

Wer mit der #Linux-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW?

Die integrierte #Firewall #iptables ist auf den meisten GNU/#Linux-Systemen verfügbar und bietet eine leistungsfähige Möglichkeit, Netzwerkzugriffe zu kontrollieren.

gnulinux.ch/was-ist-iptables-p

GNU/Linux.chWas ist iptables-persistent? Und wie unterscheidet es sich von UFW? (Iptables Teil 1)Wer mit der Linux-Firewall iptables arbeitet, trifft früher oder später auf das Paket iptables-persistent. Was ist das genau – und worin unterscheidet es sich von der einfacheren Alternative UFW?
#Wochenbericht KW23:

- Mo: Vorbereitung Laptop per #OpenVPN für #Homeoffice. #Update einer #Zeiterfassung. #Mailstore neu an #M365 angebunden
- Di: Aufbau einer #USV und Datenmigration von #Synology auf #TrueNAS. Installation einer Testumgebung mit #WindowsServer
- Mi: Beratung rund um #Webserver, die am besten in einer #DMZ landen sollten, so wie #Netzwerksegmentierung im allgemeinen. #Firewall Regeln dürfen dabei nicht vergessen werden. Einsatz der Testumgegung von Dienstag. Aufbau neuer PC und Datenübernahme
- Do: Fehlersuche #SIP Trunks. Neuen #Unifi Acces Point eingebunden
- Fr: Aufwendige #EMail Migration von All-Inkl zu Strato mit wunderbare Migrationsassistent. Backup mit #offlineimap

#Highlight: Erste Updates von #OPNsense #Firewalls durch das neue #Personal. Prima!