fluent-bit-3.0.4-1.fc40

Read Time:6 Second

FEDORA-2024-07db6333b0

Packages in this update:

fluent-bit-3.0.4-1.fc40

Update description:

Update to 3.0.4

Read More

USN-6864-3: Linux kernel (GKE) vulnerabilities

Read Time:23 Second

It was discovered that the Intel Data Streaming and Intel Analytics
Accelerator drivers in the Linux kernel allowed direct access to the
devices for unprivileged users and virtual machines. A local attacker could
use this to cause a denial of service. (CVE-2024-21823)

A security issue was discovered in the Linux kernel.
An attacker could possibly use it to compromise the system.
This update corrects flaws in the following subsystem:
– Netfilter;
(CVE-2024-26924)

Read More

USN-6894-1: Apport vulnerabilities

Read Time:1 Minute, 23 Second

Muqing Liu and neoni discovered that Apport incorrectly handled detecting
if an executable was replaced after a crash. A local attacker could
possibly use this issue to execute arbitrary code as the root user.
(CVE-2021-3899)

Gerrit Venema discovered that Apport incorrectly handled connections to
Apport sockets inside containers. A local attacker could possibly use this
issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)

Gerrit Venema discovered that Apport incorrectly handled user settings
files. A local attacker could possibly use this issue to cause Apport to
consume resources, leading to a denial of service. (CVE-2022-28652)

Gerrit Venema discovered that Apport did not limit the amount of logging
from D-Bus connections. A local attacker could possibly use this issue to
fill up the Apport log file, leading to a denial of service.
(CVE-2022-28654)

Gerrit Venema discovered that Apport did not filter D-Bus connection
strings. A local attacker could possibly use this issue to cause Apport to
make arbitrary network connections. (CVE-2022-28655)

Gerrit Venema discovered that Apport did not limit the amount of memory
being consumed during D-Bus connections. A local attacker could possibly
use this issue to cause Apport to consume memory, leading to a denial of
service. (CVE-2022-28656)

Gerrit Venema discovered that Apport did not disable the python crash
handler before chrooting into a container. A local attacker could possibly
use this issue to execute arbitrary code. (CVE-2022-28657)

Gerrit Venema discovered that Apport incorrectly handled filename argument
whitespace. A local attacker could possibly use this issue to spoof
arguments to the Apport daemon. (CVE-2022-28658)

Read More

ClickFix Deception: A Social Engineering Tactic to Deploy Malware

Read Time:7 Minute, 16 Second

Yashvi Shah and Vignesh Dhatchanamoorthy

McAfee Labs has discovered a highly unusual method of malware delivery, referred to by researchers as the “Clickfix” infection chain. The attack chain begins with users being lured to visit seemingly legitimate but compromised websites. Upon visiting, victims are redirected to domains hosting fake popup windows that instruct them to paste a script into a PowerShell terminal.

The “ClickFix” infection chain represents a sophisticated form of social engineering, leveraging the appearance of authenticity to manipulate users into executing malicious scripts. These compromised websites are often carefully crafted to look genuine, increasing the likelihood of user compliance. Once the script is pasted and executed in the PowerShell terminal, it allows the malware to infiltrate the victim’s system, potentially leading to data theft, system compromise, or further propagation of the malware.

We have observed malware families such as Lumma Stealer and DarkGate leveraging this technique. Here is the heatmap showing the distribution of users affected by the “Clickfix” technique:

Figure 1:Prevalence for the last three months

Darkgate ingesting via “ClickFix”

DarkGate is a sophisticated malware known for its ability to steal sensitive information, provide remote access, and establish persistent backdoors in compromised systems. It employs advanced evasion tactics and can spread within networks, making it a significant cybersecurity threat.
McAfee Labs obtained a phishing email from the spamtrap, having an HTML attachment.

Figure 2: Email with Attachment

The HTML file masquerades as a Word document, displaying an error prompt to deceive users. This tactic is used to trick users into taking actions that could lead to the download and execution of malicious software.

Figure 3: Displays extension problem issue

As shown, the sample displays a message stating, “The ‘Word Online’ extension is NOT installed in your browser. To view the document offline, click the ‘How to fix’ button.”

Before clicking on this button, let’s examine the underlying code. Upon examining the code, it was discovered that there were several base64-encoded content blocks present. Of particular significance was one found within the <Title> tag, which played a crucial role in this scenario.

Figure 4: HTML contains Base64-encoded content in the title tag

Decoding this we get,

Figure 5: After decoding the code

The decoded command demands PowerShell to carry out malicious activities on a system. It starts by downloading an HTA (HTML Application) file from the URL https://www.rockcreekdds.com/wp-content/1[.]hta and saves it locally as C:userspublicIx.hta.

The script then executes this HTA file using the start-process command, which initiates harmful actions on the system. Additionally, the script includes a command (Set-Clipboard -Value ‘ ‘) to clear the contents of the clipboard. After completing its tasks, the script terminates the PowerShell session with exit.

Upon further inspection of the HTML page, we found a javascript at the end of the code.

Figure 6: Decoding function snippet

This JavaScript snippet decodes and displays a payload, manages modal interactions for user feedback, and provides functionality for copying content to the clipboard upon user action.

In a nutshell, clicking on the “How to fix” button triggers the execution of JavaScript code that copies the PowerShell script directly onto the clipboard. This script, as previously discussed, includes commands to download and execute an HTA file from a remote server.

Let’s delve into it practically:

Figure 7: Clipboard contains malicious command

The attackers’ additional instruction to press Windows+R (which opens the Run dialog) and then press CTRL+V (which pastes the contents from the clipboard) suggests a social engineering tactic to further convince the user to execute the PowerShell script. This sequence of actions is intended to initiate the downloaded script (likely stored in the clipboard) without the user fully understanding its potentially malicious nature.

Once the user does this, the HTA file gets downloaded.

Figure 8: HTA code snippet

The above file attempts to connect to the marked domain and execute a PowerShell file from this malicious source. Given below is the malicious script that is stored remotely and executed.

Figure 9: Powershell code snippet

As this PowerShell script is executed implicitly without any user interaction, a folder is created in the C drive where an AutoIt executable and script are dropped and executed automatically.

Figure 10: Downloaded zip contains AutoIT script

Following this, DarkGate begins its malicious activity and starts communicating with its command and control (C2) server.

A similar Clickfix social engineering technique was found to be dropping Lumma Stealer.

Lumma Stealer ingesting via “ClickFix”

McAfee Labs discovered a website displaying an error message indicating that the browser is encountering issues displaying the webpage. The site provides steps to fix the problem, which are designed to deceive users into executing malicious actions.

Figure 11: Showing error on accessing the webpage

It directs the target user to perform the following steps:

Click on the “Copy Fix” button.
Right-click on the Windows icon.
Open Windows PowerShell (Admin).
Right-click within the open terminal window.
Wait for the update to complete.

Let’s analyze the code that gets copied when clicking the “Copy Fix” button.

Figure 12: Base64-encoded content

As we can see, the code includes base64-encoded content. Decoding this content, we get the following script:

Figure 13: After decoding the Base64 content

This PowerShell script flushes the DNS cache and then decodes a base64-encoded command to fetch and execute a script from a remote URL https://weoleycastletaxis.co.uk/chao/baby/cow[.]html, masquerading the request with a specific User-Agent header. The fetched script is then executed, and the screen is cleared to hide the actions. Subsequently, it decodes another base64 string to execute a command that sets the clipboard content to a space character. The script is likely designed for malicious purposes, such as downloading and executing remote code covertly while attempting to hide its activity from the user.

Upon execution, the following process tree flashes:

Figure 14: Process Tree

As we know it is downloading the malware from the given URL, a new folder is created in a Temp folder and a zip is downloaded:

Figure 15: Network activity

The malware is unzipped and dropped in the same folder:

Figure 16: Dropped files

The malware starts communicating with its C2 server as soon as it gets dropped in the targeted system.

Conclusion:

In conclusion, the Clickfix social engineering technique showcases a highly effective and technical method for malware deployment. By embedding base64-encoded scripts within seemingly legitimate error prompts, attackers deceive users into performing a series of actions that result in the execution of malicious PowerShell commands. These commands typically download and execute payloads, such as HTA files, from remote servers, subsequently deploying malware like DarkGate and Lumma Stealer.

Once the malware is active on the system, it begins its malicious activities, including stealing users’ personal data and sending it to its command and control (C2) server. The script execution often includes steps to evade detection and maintain persistence, such as clearing clipboard contents and running processes in minimized windows. By disguising error messages and providing seemingly helpful instructions, attackers manipulate users into unknowingly executing harmful scripts that download and run various kinds of malware.

Mitigations:

At McAfee Labs, we are committed to helping organizations protect themselves against sophisticated cyber threats, such as the Clickfix social engineering technique. Here are our recommended mitigations and remediations:

Conduct regular training sessions to educate users about social engineering tactics and phishing schemes.
Install and maintain updated antivirus and anti-malware software on all endpoints.
Implement robust email filtering to block phishing emails and malicious attachments.
Use web filtering solutions to prevent access to known malicious websites.
Deploy firewalls and intrusion detection/prevention systems (IDS/IPS) to monitor and block malicious network traffic.
Use network segmentation to limit the spread of malware within the organization.
Enforce the principle of least privilege (PoLP) to minimize user access to only necessary resources.
Implement security policies to monitor and restrict clipboard usage, especially in sensitive environments.
Implement multi-factor authentication (MFA) for accessing sensitive systems and data.
Ensure all operating systems, software, and applications are kept up to date with the latest security patches.
Continuously monitor and analyze system and network logs for signs of compromise.
Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.
Regularly back up important data and store backups securely to ensure data recovery in case of a ransomware attack or data breach.

Indicators of Compromise (IoCs)

File
SHA256

DarkGate

Email
c5545d28faee14ed94d650bda28124743e2d7dacdefc8bf4ec5fc76f61756df3

Html
0db16db812cb9a43d5946911501ee8c0f1e3249fb6a5e45ae11cef0dddbe4889

HTA
5c204217d48f2565990dfdf2269c26113bd14c204484d8f466fb873312da80cf

PS
e9ad648589aa3e15ce61c6a3be4fc98429581be738792ed17a713b4980c9a4a2

ZIP
8c382d51459b91b7f74b23fbad7dd2e8c818961561603c8f6614edc9bb1637d1

AutoIT script
7d8a4aa184eb350f4be8706afb0d7527fca40c4667ab0491217b9e1e9d0f9c81

Lumma Stealer

URL
tuchinehd[.]com

PS
07594ba29d456e140a171cba12d8d9a2db8405755b81da063a425b1a8b50d073

ZIP
6608aeae3695b739311a47c63358d0f9dbe5710bd0073042629f8d9c1df905a8

EXE
e60d911f2ef120ed782449f1136c23ddf0c1c81f7479c5ce31ed6dcea6f6adf9

 

The post ClickFix Deception: A Social Engineering Tactic to Deploy Malware appeared first on McAfee Blog.

Read More

USN-6893-1: Linux kernel vulnerabilities

Read Time:3 Minute, 54 Second

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– Accessibility subsystem;
– Android drivers;
– Drivers core;
– Bluetooth drivers;
– Clock framework and drivers;
– Data acquisition framework and drivers;
– Cryptographic API;
– Buffer Sharing and Synchronization framework;
– GPU drivers;
– On-Chip Interconnect management framework;
– IOMMU subsystem;
– Multiple devices driver;
– Media drivers;
– VMware VMCI Driver;
– Network drivers;
– Microsoft Azure Network Adapter (MANA) driver;
– Device tree and open firmware driver;
– Chrome hardware platform drivers;
– i.MX PM domains;
– TI SCI PM domains driver;
– S/390 drivers;
– SCSI drivers;
– SPI subsystem;
– Thermal drivers;
– TTY drivers;
– USB subsystem;
– Framebuffer layer;
– BTRFS file system;
– Network file system server daemon;
– NILFS2 file system;
– File systems infrastructure;
– Pstore file system;
– SMB network file system;
– BPF subsystem;
– Bluetooth subsystem;
– Netfilter;
– io_uring subsystem;
– Core kernel;
– Extra boot config (XBC);
– Memory management;
– Amateur Radio drivers;
– B.A.T.M.A.N. meshing protocol;
– Ethernet bridge;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Multipath TCP;
– NFC subsystem;
– RDS protocol;
– Network traffic control;
– SMC sockets;
– Sun RPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
(CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008,
CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946,
CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942,
CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934,
CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976,
CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929,
CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986,
CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965,
CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892,
CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865,
CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027,
CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875,
CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903,
CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025,
CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864,
CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968,
CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019,
CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916,
CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002,
CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011,
CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910,
CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010,
CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894,
CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007,
CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960,
CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001,
CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979,
CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926,
CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920,
CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911,
CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982,
CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919,
CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914,
CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939,
CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811,
CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945,
CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921,
CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893,
CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954,
CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014,
CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927,
CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017,
CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869,
CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974)

Read More

USN-6885-2: Apache HTTP Server regression

Read Time:1 Minute, 24 Second

USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security
fixes introduced a regression when proxying requests to a HTTP/2 server.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Marc Stern discovered that the Apache HTTP Server incorrectly handled
serving WebSocket protocol upgrades over HTTP/2 connections. A remote
attacker could possibly use this issue to cause the server to crash,
resulting in a denial of service. (CVE-2024-36387)

Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly sent certain request URLs with incorrect encodings to backends.
A remote attacker could possibly use this issue to bypass authentication.
(CVE-2024-38473)

Orange Tsai discovered that the Apache HTTP Server mod_rewrite module
incorrectly handled certain substitutions. A remote attacker could possibly
use this issue to execute scripts in directories not directly reachable
by any URL, or cause a denial of service. Some environments may require
using the new UnsafeAllow3F flag to handle unsafe substitutions.
(CVE-2024-38474, CVE-2024-38475, CVE-2024-39573)

Orange Tsai discovered that the Apache HTTP Server incorrectly handled
certain response headers. A remote attacker could possibly use this issue
to obtain sensitive information, execute local scripts, or perform SSRF
attacks. (CVE-2024-38476)

Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain requests. A remote attacker could possibly use
this issue to cause the server to crash, resulting in a denial of service.
(CVE-2024-38477)

It was discovered that the Apache HTTP Server incorrectly handled certain
handlers configured via AddType. A remote attacker could possibly use this
issue to obtain source code. (CVE-2024-39884)

Read More