CIS is excited to sponsor and attend InfoSec World 2022 at Disney’s Coronado Springs Resort in Lake Buena Vista, Florida.
Daily Archives: September 12, 2022
High Severity Vulnerabilities Found in HP Enterprise Devices
The flaws affect HP EliteBook devices and have CVSS scores between 7.5 and 8.2
Oxeye Discovers Several High Severity IDOR Vulnerabilities in Harbor
The flaws were discovered despite Harbor having implemented RBAC on most HTTP endpoints
New Linux Cryptomining Malware
It’s pretty nasty:
The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the malware to “mutate” its code to avoid detection. Shikitega alters its code each time it runs through one of several decoding loops that AT&T said each deliver multiple attacks, beginning with an ELF file that’s just 370 bytes.
Shikitega also downloads Mettle, a Metasploit interpreter that gives the attacker the ability to control attached webcams and includes a sniffer, multiple reverse shells, process control, shell command execution and additional abilities to control the affected system.
[…]
The final stage also establishes persistence, which Shikitega does by downloading and executing five shell scripts that configure a pair of cron jobs for the current user and a pair for the root user using crontab, which it can also install if not available.
Shikitega also uses cloud hosting solutions to store parts of its payload, which it further uses to obfuscate itself by contacting via IP address instead of domain name. “Without [a] domain name, it’s difficult to provide a complete list of indicators for detections since they are volatile and they will be used for legitimate purposes in a short period of time,” AT&T said.
Bottom line: Shikitega is a nasty piece of code. AT&T recommends Linux endpoint and IoT device managers keep security patches installed, keep EDR software up to date and make regular backups of essential systems.
Another article.
Slashdot thread.
libconfuse-3.3-7.fc35
FEDORA-2022-9b67d67195
Packages in this update:
libconfuse-3.3-7.fc35
Update description:
Patch for CVE-2022-40320
libconfuse-3.3-7.el9
FEDORA-EPEL-2022-30932b0236
Packages in this update:
libconfuse-3.3-7.el9
Update description:
Patch for CVE-2022-40320
libconfuse-3.3-7.fc37
FEDORA-2022-645dc53ee2
Packages in this update:
libconfuse-3.3-7.fc37
Update description:
Patch for CVE-2022-40320
libconfuse-3.3-7.el8
FEDORA-EPEL-2022-cd091ab1b1
Packages in this update:
libconfuse-3.3-7.el8
Update description:
Patch for CVE-2022-40320
libconfuse-3.3-7.fc36
FEDORA-2022-de992c68d0
Packages in this update:
libconfuse-3.3-7.fc36
Update description:
Patch for CVE-2022-40320
rubygem-rack-2.2.4-1.el9
FEDORA-EPEL-2022-0d0a29e337
Packages in this update:
rubygem-rack-2.2.4-1.el9
Update description:
Update to Rack 2.2.4