mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#incidentresponse

2 Beiträge2 Beteiligte0 Beiträge heute

Hey everyone! It's been a pretty packed 24 hours in the cyber world, with critical zero-day exploits, major breaches, new malware tactics, and some significant policy shifts from the UK government. Let's dive in:

SharePoint Zero-Days Under Active Exploitation by China-Linked APTs ⚠️
- Microsoft SharePoint on-premise servers are under active attack via a chain of zero-day vulnerabilities (CVE-2025-53770, CVE-2025-53771), allowing unauthenticated Remote Code Execution (RCE) and spoofing.
- Microsoft attributes exploitation to China-linked nation-state groups Linen Typhoon (APT27), Violet Typhoon (APT31), and Storm-2603, who are deploying web shells and stealing MachineKeys for persistence.
- Emergency patches have been released for SharePoint Server Subscription Edition, 2019, and 2016, but organisations with internet-exposed on-premise servers should assume compromise and rotate ASP.NET machine keys and restart IIS.

🤖 Bleeping Computer | bleepingcomputer.com/news/micr
🤖 Bleeping Computer | bleepingcomputer.com/news/micr
🤫 CyberScoop | cyberscoop.com/microsoft-share
🕵🏼 The Register | go.theregister.com/feed/www.th

Cisco ISE RCE Flaws Actively Exploited 🛡️
- Cisco warns of active exploitation of three maximum-severity (CVSS 10.0) unauthenticated Remote Code Execution (RCE) vulnerabilities in Cisco Identity Services Engine (ISE): CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337.
- These flaws allow attackers to execute arbitrary commands as root or upload and execute malicious files without authentication.
- Immediate patching to ISE 3.3 Patch 7 or ISE 3.4 Patch 2 is critical, as there are no workarounds.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Recent Cyber Attacks and Breaches 🚨
- Dell confirmed a breach of its "Solution Center" demo environment, stating that the exfiltrated 1.3 TB of data by WorldLeaks (Hunters International rebrand) was "primarily synthetic (fake) data" or non-sensitive.
- Hungarian police arrested a 23-year-old suspect, "Hano," for a prolonged series of DDoS attacks against independent media outlets in Hungary and the Vienna-based International Press Institute (IPI) since April 2023.
- AMEOS Group, a major Central European healthcare network, disclosed a security breach where external actors gained unauthorised access to IT systems, potentially exposing patient, employee, and partner data, leading to a full IT system shutdown.
- A Silicon Valley engineer, Chenguang Gong, pleaded guilty to stealing thousands of trade secrets, including sensitive US missile technology and radiation-hardened camera designs, from his employers, with links to Chinese "talent programs."

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/hungary-arrest
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

New Malware and Ransomware Tactics 👾
- CISA and FBI issued a joint warning about escalating Interlock ransomware activity, which targets businesses and critical infrastructure, particularly healthcare, using unusual initial access methods like drive-by downloads from compromised sites and fake browser updates.
- Russian cybersecurity researchers disrupted NyashTeam, a Russian-speaking group operating a malware-as-a-service scheme (DCRat, WebRat) since 2022, by dismantling over 110 domains and removing associated Telegram channels and instructional videos.
- A new variant of the Coyote banking trojan is abusing Microsoft's UI Automation (UIA) framework to identify banking and cryptocurrency exchange sites, a technique that evades Endpoint Detection and Response (EDR) and marks the first real-world case of UIA abuse for data theft.
- Arch Linux removed three malicious packages ("librewolf-fix-bin", "firefox-patch-bin", "zen-browser-patched-bin") from its Arch User Repository (AUR) that were installing the CHAOS Remote Access Trojan (RAT), highlighting the risks of community-maintained repositories.

🗞️ The Record | therecord.media/russia-hacker-
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/fbi-vigilance-

UK Government's Ransomware Policy Shift 🇬🇧
- The UK government is proposing a ban on ransomware payments by public sector organisations and critical national infrastructure (CNI) to disrupt the criminal business model and make these entities less attractive targets.
- New measures, part of the Cyber Resilience Bill, will also mandate reporting of all ransomware incidents to law enforcement and require private businesses to notify the government before making any ransom payments.
- While aiming to improve visibility and resilience, concerns remain about the effectiveness of a payment ban on opportunistic attackers and whether law enforcement will have sufficient resources to utilise the increased intelligence.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/mandatory-repo
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤫 CyberScoop | cyberscoop.com/uk-ransomware-p

New Wi-Fi Tracking Raises Privacy Concerns 🔒
- Researchers in Italy have developed "WhoFi," a technique that creates a unique biometric identifier for individuals based on how their bodies interfere with Wi-Fi signals (Channel State Information - CSI).
- This method allows for re-identification and tracking of people across different Wi-Fi networks with high accuracy (up to 95.5%), even if they are not carrying a device.
- The research raises significant privacy concerns, as it enables pervasive surveillance without traditional visual or device-based tracking.

🕵🏼 The Register | go.theregister.com/feed/www.th

CISA CyberSentry Program Funding Lapses 📉
- Funding for CISA's CyberSentry Program, a critical public-private partnership that monitors US critical infrastructure (IT/OT) for nation-state threats, expired on Sunday.
- This lapse has forced Lawrence Livermore National Laboratory to stop monitoring networks, creating a significant gap in visibility into potential cyberattacks on essential services.
- The incident highlights ongoing instability and funding challenges within CISA and the broader federal government, impacting vital cybersecurity initiatives.

🕵🏼 The Register | go.theregister.com/feed/www.th

Open Source Security: Eyeballs and Trust 👀
- An opinion piece highlights that while open source software benefits from "many eyes" for security, this doesn't come for free; trust is built through clear communication and defensive coding.
- Automated scanners can misidentify benign, low-level system utilities as malware, as demonstrated by John Hammond's analysis of the "Talon" Windows de-bloater.
- Developers of open source tools that perform system-wide modifications should provide thorough documentation and and comments to clarify their intent and avoid triggering suspicion.

🕵🏼 The Register | go.theregister.com/feed/www.th

Windows Server Update Issues ⚙️
- Microsoft has acknowledged a known issue where the July 8th Windows Server 2019 security update (KB5062557) causes the Cluster service to repeatedly stop and restart.
- This bug can prevent nodes from rejoining clusters, lead to virtual machine restarts, and trigger Event ID 7031 errors, especially on systems with BitLocker enabled on Cluster Shared Volumes (CSV) drives.
- While a mitigation is available, Microsoft has not yet rolled it out publicly and is advising affected organisations to contact business support for assistance.

🤖 Bleeping Computer | bleepingcomputer.com/news/micr

A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.

From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed.

They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?

This attack wasn’t subtle. But it worked because basic controls were missing.

We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.

📌pentestpartners.com/security-b

A major cybersecurity legal case is moving forward. ✈️ Delta Air Lines proceeding with its $550M+ lawsuit against CrowdStrike over the July 2024 outage that canceled 7,000 flights and impacted 1.3M passengers.

⚖️ The court allowed claims of:
🧠 Gross negligence
💻 Computer trespass
🕵️‍♂️ Limited fraud

📉 Delta claims the update could have been caught with a simple test. CrowdStrike is pushing back, saying damages should be limited under Georgia law. This case may redefine how courts view software vendor liability, especially for updates in critical infrastructure.

💬 Should companies expect higher legal accountability for third-party software failures?

#CyberSecurity #Delta #CrowdStrike #LegalTech #IncidentResponse

reuters.com/sustainability/boa

Valuable insights from Eireann Leverett, security researcher and advisor to FIRST, featured in CSO on conducting effective post-incident reviews!

The article explores how organizations can strengthen cybersecurity defenses through structured post-incident analysis, moving beyond mitigation to meaningful learning and improvement.

Key recommendations:

🔍 Document incidents as they evolve, not just as they end
📊 Capture context behind decision-making processes during incidents
⚡Focus on structural learning over individual blame

Thank you Bob Violino and CSO for showcasing how thoughtful incident analysis drives continuous security improvement.

Read more: go.first.org/ISkJp

CSO OnlineHow to conduct an effective post-incident reviewMitigation and remediation aren’t the endpoints of incident response. Having a structured process to analyze and learn from a cybersecurity incident once it has been resolved is paramount to improving security operations.

In August 2020, @SchizoDuckie and I published what was to become the first of a series of articles or posts called "No Need to Hack When It's Leaking."

In today's installment, I bring you "No Need to Hack When It's Leaking: Brandt Kettwick Defense Edition." It chronicles efforts by @JayeLTee, @masek, and I to alert a Minnesota law firm to lock down their exposed files, some of which were quite sensitive.

Read the post and see how even the state's Bureau of Criminal Apprehension had trouble getting this law firm to respond appropriately.

databreaches.net/2025/07/04/no

Great thanks to the Minnesota Bureau of Criminal Apprehension for their help on this one, and to @TonyYarusso and @bkoehn for their efforts.

Falschangaben beim Abschluss einer Cyber-Versicherung

Cyber-Versicherungen schützen Unternehmen vor Cyber-Angriffen und Straftaten wie Datenverlust und Hackerangriffen. Im Schadensfall kann sich die Versicherung aber weigern, den Vorfall zu regulieren, wenn sich die vor Vertragsabschluss durchgeführte Risikoanalyse als fehlerhaft erweist. Insofern ist(...)
dr-datenschutz.de/falschangabe

#Cyber-Attacke #IncidentResponse #Schadsoftware #Versicherung

Dr. DatenschutzFalschangaben beim Abschluss einer Cyber-Versicherung
Mehr von Dr. Datenschutz
Antwortete im Thread

@masek @JayeLTee For the life of me, I cannot understand why this got kicked over to the anti-rackets branch, but thank you for what you managed to accomplish.

I will post an update to this leak on my blog sometime this week, but in the interim:

Any patients of the Bolton Walk-In Clinic should consider filing a complaint with the provincial Privacy Commission and requesting an investigation into the clinic's failure to comply with medical privacy laws such as PHIPA. IMO, the IPC should also be asked to require the clinic to notify every patient whose unencrypted information was exposed.

Additional details about earlier efforts by @JayeLTee and I to get this leak secured can be found in my post at databreaches.net/2024/12/03/bo

Announcing the DFIR Labs Digital Forensics Challenge - Enterprise Edition! This isn't another textbook simulation. We're giving your team exclusive access to a brand-new, unreleased case from a real incident.

🗓️ When: August 30, 2025 (14:00 – 18:00 UTC)
🛠️ Choose your SIEM: Azure Log Analytics, Elastic, or Splunk.
🕵️ Your Squad: Form a team of 2-3 analysts.
🏆 The Glory: Solve the case, claim bragging rights, and win prizes for the top team!

Spaces are limited. Assemble your elite team and register now to secure your spot!

Register Here: dfirlabs.thedfirreport.com/dfi

dfirlabs.thedfirreport.comDFIR Labs - Digital Forensics Challenge - Enterprise Edition