<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Publications and Presentations on CIRCL</title>
    <link>https://new.circl.lu/pub/</link>
    <description>Recent content in Publications and Presentations on CIRCL</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="https://new.circl.lu/pub/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Account Hijacking</title>
      <link>https://new.circl.lu/pub/dfak/AccountHijacking/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/AccountHijacking/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-HIJACKING.png&#34; alt=&#34;Digital First Aid Kit - Account Hijacking&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;&#xA;&lt;h2 id=&#34;account-hijacking&#34;&gt;Account Hijacking&lt;/h2&gt;&#xA;&lt;p&gt;Are you having a problem accessing an email, social media or web account? Does an account show activity that you do not recognize? There are many things you can do to mitigate this problem.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CIRCL - AI Strategy</title>
      <link>https://new.circl.lu/pub/ai-strategy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/ai-strategy/</guid>
      <description>&lt;h2 id=&#34;ai-strategy&#34;&gt;AI Strategy&lt;/h2&gt;&#xA;&lt;h2 id=&#34;vision--mission&#34;&gt;Vision &amp;amp; Mission&lt;/h2&gt;&#xA;&lt;p&gt;Our vision is to enhance the capabilities of our Computer Security Incident Response Team (CSIRT) by strategically integrating Artificial Intelligence. AI is not a replacement for human analysts but a powerful tool to augment their expertise.&lt;/p&gt;&#xA;&lt;p&gt;Our mission is to leverage AI to process, analyze, and extract value from data sources that are currently underutilized, thereby improving our operational outcomes in threat intelligence and incident response. Additionally to automate repetitive and easily reproducible existing processes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CIRCL - Coordinated Vulnerability Disclosure (CVD) Policy</title>
      <link>https://new.circl.lu/pub/coordinated-vulnerability-disclosure/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/coordinated-vulnerability-disclosure/</guid>
      <description>&lt;h2 id=&#34;circl---coordinated-vulnerability-disclosure-cvd-policy&#34;&gt;CIRCL - Coordinated Vulnerability Disclosure (CVD) Policy&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL, in its role as a Computer Security Incident Response Team (CSIRT) under the NIS 2 Directive, receives reports concerning vulnerabilities in ICT products, ICT services, or processes, or discovers such vulnerabilities through its own activities. This Coordinated Vulnerability Disclosure (CVD) policy outlines the structured process CIRCL follows, acting as a trusted intermediary to facilitate interaction between the reporting entity/individual and the manufacturer or provider of the affected ICT product or service (&amp;rsquo;the entity concerned&amp;rsquo;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>CIRCL - Virtual Summer School (VSS) 2025</title>
      <link>https://new.circl.lu/pub/vss-2025/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/vss-2025/</guid>
      <description>&lt;h2 id=&#34;circl---virtual-summer-school-vss-2025&#34;&gt;CIRCL - Virtual Summer School (VSS) 2025&lt;/h2&gt;&#xA;&lt;p&gt;From &lt;strong&gt;7 July to 18 July 2025&lt;/strong&gt;, CIRCL will host a two-week online training event featuring hands-on sessions on various tools developed and maintained by CIRCL, as well as training in digital forensics and incident response (DFIR) techniques.&lt;/p&gt;&#xA;&lt;p&gt;All time slots are in &lt;strong&gt;local Luxembourg time&lt;/strong&gt;. The sessions are open to everyone: just connect using the provided Zoom link.&lt;/p&gt;&#xA;&lt;p&gt;The sessions will be recorded, and if the recording quality is sufficient, they will be published afterward.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection</title>
      <link>https://new.circl.lu/pub/taxonomy/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/taxonomy/</guid>
      <description>&lt;h2 id=&#34;taxonomy---schemes-of-classification-in-incident-response-and-detection&#34;&gt;Taxonomy - Schemes of Classification in Incident Response and Detection&lt;/h2&gt;&#xA;&lt;p&gt;A key success factor, while performing incident response, is to share a common understanding of the security incident. A common definition can be achieved by a shared vocabulary as described below.&lt;/p&gt;&#xA;&lt;h2 id=&#34;incident-classification&#34;&gt;Incident Classification&lt;/h2&gt;&#xA;&lt;p&gt;Incident classification is the classification of the method(s) used by an attacker through unauthorized access, destruction, disclosure, modification of data, and/or denial of service (&lt;a href=&#34;https://www.enisa.europa.eu/activities/risk-management/current-risk/risk-management-inventory/glossary#G51&#34;&gt;ref:ENISA&lt;/a&gt;).  An incident can cover one or more types of incident classification as described below.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DDoS Mitigation</title>
      <link>https://new.circl.lu/pub/dfak/DDoSMitigation/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/DDoSMitigation/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-DDOS.png&#34; alt=&#34;Digital First Aid Kit - DDoS Mitigation&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;&#xA;&lt;h2 id=&#34;ddos-mitigation&#34;&gt;DDoS Mitigation&lt;/h2&gt;&#xA;&lt;p&gt;A threat faced by many independent journalists, news sites and bloggers is having their voices muted because their website is down or defaced. In many cases, this maybe an innocent and frustrating problem, but on occasion, it may be due to a &amp;lsquo;denial of service&amp;rsquo; attack or a website takeover. This section of the Digital First Aid Kit will walk you through some basic steps to diagnose potential problems. If your site is under a denial of service attack, some immediate options for next steps are suggested.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Devices Lost? Stolen? Seized?</title>
      <link>https://new.circl.lu/pub/dfak/DevicesSeized/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/DevicesSeized/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-LOST.png&#34; alt=&#34;Digital First Aid Kit - Devices Lost? Stolen? Seized?&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;&#xA;&lt;h2 id=&#34;devices-seized-lost-stolen&#34;&gt;Devices Seized? Lost? Stolen?&lt;/h2&gt;&#xA;&lt;p&gt;Is your device lost? Has it been stolen or seized by a third party? In any of these incidences it is very important to get a clear picture of what happened, what kinds of data and accounts may be vulnerable as a result and what steps must be taken to prevent the leaking and misuse of your information, contacts and accounts.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Geräte verloren? Gestohlen? Beschlagnahmt</title>
      <link>https://new.circl.lu/pub/dfak/de/DevicesSeized/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/de/DevicesSeized/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-LOST.png&#34; alt=&#34;Digital First Aid Kit - Geräte verloren? Gestohlen? Beschlagnahmt&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;2-geräte-verloren-gestohlen-beschlagnahmt&#34;&gt;&lt;strong&gt;2. Geräte verloren? Gestohlen? Beschlagnahmt&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;h2 id=&#34;der-digitale-erste-hilfe-kasten&#34;&gt;&lt;strong&gt;Der Digitale Erste-Hilfe-Kasten&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Der Digitale Erste-Hilfe-Kasten ist ein Hilfsmittel, dass sich an Menschen richtet, die den häufigsten Arten der digitalen Bedrohung ausgesetzt sind. Der Erste-Hilfe-Kasten bietet eine Reihe von Werkeugen zur Selbstdiagnose für Bürger, Menschenrechtsaktivisten, Blogger, Aktivisten und Journalisten, die selbst Ziel von Angriffen werden, sowie Leitlinien für digitale Notfallhelfer, um einen bedrohten Nutzer zu unterstützen.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Glossary</title>
      <link>https://new.circl.lu/pub/dfak/Glossary/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/Glossary/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-GLOSSARY.png&#34; alt=&#34;Digital First Aid Kit - Glossary&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;&#xA;&lt;h2 id=&#34;glossary&#34;&gt;Glossary&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;em&gt;DDoS / Distributed Denial of Service Attack&lt;/em&gt;:   A &amp;lsquo;Denial of Service&amp;rsquo; attack is where a malicious user (or users) crowd out legitimate users of a service such as a website or a chat server.  Sometimes it’s one &amp;lsquo;attacker&amp;rsquo; trying to do this to your site, which doesn’t usually cause much of a problem - unless you pay for bandwidth. More common is the &amp;lsquo;Distributed&amp;rsquo; Denial of Service (DDoS), where an attacker uses thousands of machines under his control to targets a site.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;DNS Record&lt;/em&gt;: The DNS record is like the master contact list of phone book of the internet. All website servers are identified by a series of numbers and/or coded letters (the IP Address) - Google.com is 74.125.228.69, for example. By changing this record, you can give out a different IP Address for a website, i.e. a new hosting provider’s address or a proxy for your original website.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Domain Name&lt;/em&gt;: The human-readable name of your website - Google.com, for example.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;End-to-end encryption&lt;/em&gt;: means that messages or files leave your device encrypted and remain encrypted until they reach the rights address (a specific user).&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Hibernate&lt;/em&gt;: A process by which the computer will attempt to use the least amount of energy while providing the ability to boot up quickly. Like the sleep state, the system shuts down the display, hard drives and remotely connected devices, but will continue providing enough power to the computer to start quickly. It does this by writing the content of the memory to a file on the disk. On some computers the hibernate state can lower the security of the system. See also: &lt;em&gt;Sleep&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;IM&lt;/em&gt;: Instant Messaging. Examples of Instant Messaging are services like Google Chat and Facebook Chat, or any service using the XMPP (Jabber) method.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Nameserver&lt;/em&gt;: When a browser wants to find a website it will first contact a name server. This tells the browser to connect the domain name (Google.com) to it’s internet address / IP Address (74.125.228.69) via it’s DNS Record (above). By changing the DNS record at a name server, you can &amp;lsquo;point&amp;rsquo; the browser to a different server.&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Technically speaking the browser still checks with /etc/hosts before going to DNS, that&amp;rsquo;s how one can block access to FB on their computer by routing facebook.com to another IP address. It is also useful for accessing some websites blocked through DNS blocks.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Sleep&lt;/em&gt;: The operating system shuts down the display, hard drives and remotely connected devices off but will continue providing enough power to the computer to start quickly. Unlike the Hibernate state, the content of the memory is not written to disk.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;SSL&lt;/em&gt;: See explanation Transport Layer Encryption or Wikipedia&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;SRV or Service record&lt;/em&gt;: A Service record or SRV record is the record in the Domain Name System that defines the location, (the hostname and port number) of servers for specified services.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Threat modeling&lt;/em&gt;: a way to make a assessment of the threats you are facing, the origin from the threat and the assets you are trying to protect. The threat can vary depending on your location, what you do and who you are working with.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Transport Layer Encryption&lt;/em&gt;: are cryptographic protocols (Transport Layer Security  (TLS) and Secure Sockets Layer (SSL) designed to provide secure communication channels over the Internet.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Vetting&lt;/em&gt;: is the process of performing a background check on an individual or an organization before engaging into a financial, service or other type of relationship with them.&lt;/li&gt;&#xA;&lt;li&gt;&lt;em&gt;Website host&lt;/em&gt;: The server where your website and its files/databases are stored.&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://securityinabox.org/en/glossary&#34;&gt;See also&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;about-the-digital-first-aid-kit&#34;&gt;About The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit is a collaborative effort of EFF, Global Voices, Hivos &amp;amp; the Digital Defenders Partnership, Front Line Defenders, Internews, Freedom House, Access, Qurium, CIRCL, IWPR, Open Technology Fund and individual security experts who are working in the field of digital security and rapid response. It is a work in progress and if there are things that need to be added, comments or questions regarding any of the sections please go to &lt;a href=&#34;https://github.com/RaReNet/DFAK&#34;&gt;Github&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IXPs Operational Security</title>
      <link>https://new.circl.lu/pub/ixps-operational-security/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/ixps-operational-security/</guid>
      <description>&lt;h2 id=&#34;operational-security-of-internet-exchange-points-ixps&#34;&gt;Operational Security of Internet Exchange Points (IXPs)&lt;/h2&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Internet Exchange Points (IXPs) are important elements for the overall Internet operational infrastructure. They are the fundament, allowing shortest path routing, network latency limitation and flexible peering in regional areas. An IXP includes a significant number of network components which interact with users who have different levels of trust. Ensuring an adequate operational security allows the IXP to provide stable, efficient and secure services to their users.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Konto-Diebstahl</title>
      <link>https://new.circl.lu/pub/dfak/de/AccountHijacking/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/de/AccountHijacking/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-HIJACKING.png&#34; alt=&#34;Digital First Aid Kit - Account Hijacking&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;1-konto-diebstahl&#34;&gt;&lt;strong&gt;1. Konto-Diebstahl&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;h2 id=&#34;der-digitale-erste-hilfe-kasten&#34;&gt;&lt;strong&gt;Der Digitale Erste-Hilfe-Kasten&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Der Digitale Erste-Hilfe-Kasten ist ein Hilfsmittel, dass sich an Menschen richtet, die den häufigsten Arten der digitalen Bedrohung ausgesetzt sind. Der Erste-Hilfe-Kasten bietet eine Reihe von Werkeugen zur Selbstdiagnose für Bürger, Menschenrechtsaktivisten, Blogger, Aktivisten und Journalisten, die selbst Ziel von Angriffen werden, sowie Leitlinien für digitale Notfallhelfer, um einen bedrohten Nutzer zu unterstützen.&lt;/p&gt;&#xA;&lt;h2 id=&#34;konto-diebstahl&#34;&gt;&lt;strong&gt;Konto-Diebstahl&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;p&gt;Sie wollen auf Ihre E-Mails, soziale Netzwerke oder einen ihrer anderen Online-Dienste zugreifen, haben aber Probleme beim Anmelden? Möglicherweise gibt es auf einem Ihrer Online-Konten seltsame Aktivitäten, die Sie so nicht nachvollziehen können? Der Verdacht auf einen &lt;strong&gt;Konto-Diebstahl&lt;/strong&gt; liegt nahe. Keine Panik, denn es gibt Möglichkeiten, um diesen Problemen zu begegnen.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learning from the Recent Windows/Falcon Sensor Outage - Causes and Potential Improvement Strategies in Linux with Open Source</title>
      <link>https://new.circl.lu/pub/learning-from-falcon-sensor-outage/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/learning-from-falcon-sensor-outage/</guid>
      <description>&lt;h2 id=&#34;learning-from-the-recent-windowsfalcon-sensor-outage-causes-and-potential-improvement-strategies-in-linux-using-open-source-solutions&#34;&gt;Learning from the Recent Windows/Falcon Sensor Outage: Causes and Potential Improvement Strategies in Linux Using Open Source Solutions&lt;/h2&gt;&#xA;&lt;p&gt;At the time of writing, most people have probably heard about the massive &lt;a href=&#34;https://new.circl.lu/pub/tr-87/&#34;&gt;Windows outage caused by a faulty kernel driver in &lt;strong&gt;Falcon Sensor&lt;/strong&gt;&lt;/a&gt;, a CrowdStrike software. On &lt;strong&gt;Friday, July 19, 2024&lt;/strong&gt;, a software configuration update designed to target newly observed malicious artifacts used in cyberattacks prevented several million Windows machines to boot. How can a configuration file crash an OS? Because the real issue is not the configuration file itself, but the kernel driver using it. Let&amp;rsquo;s take a quick, non-technical tour of the potential reasons behind this situation, how it is addressed in the Linux kernel, and what you &lt;strong&gt;as users or customers&lt;/strong&gt; can do to avoid such issues.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Malware</title>
      <link>https://new.circl.lu/pub/dfak/Malware/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/Malware/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-MALWARE.png&#34; alt=&#34;Digital First Aid Kit - Malware&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;&#xA;&lt;h2 id=&#34;malware&#34;&gt;Malware&lt;/h2&gt;&#xA;&lt;p&gt;&amp;lsquo;Malware&amp;rsquo; is malicious software that facilitates an unauthorized takeover of your device by another user, government or third party to perform surveillance functions such as recording keystrokes, stealing passwords, taking screenshots, recording audio, video and more. While most malware is designed for and utilized by criminals, state-sponsored actors have increasingly adopted malware as a tool for surveillance, espionage and sabotage. Malware is used to gain control of devices. It exploits access to the device to send out spam, seize banking, email or social media credentials, shut down websites and collect vital information from journalists, human rights defenders, NGOs, activists and bloggers. If you suspect a malware infection on your device here are some things you can do:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Responsible Vulnerability Disclosure</title>
      <link>https://new.circl.lu/pub/responsible-vulnerability-disclosure/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/responsible-vulnerability-disclosure/</guid>
      <description>&lt;h2 id=&#34;responsible-vulnerability-disclosure&#34;&gt;Responsible Vulnerability Disclosure&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL, with its role as a CERT, receives reports about new vulnerabilities in software and hardware products or discovers them itself. The process of responsible vulnerability disclosure is described in the document to ensure an adequate collaboration with the vendors and/or the reporters. The two main objectives of the procedure are to get the vulnerability corrected and to ensure a safe notification to the users or customers at the end of the overall process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure Communication</title>
      <link>https://new.circl.lu/pub/dfak/SecureCommunication/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/dfak/SecureCommunication/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/dfak/LOGO-SECURE-COM.png&#34; alt=&#34;Digital First Aid Kit - Secure Communication&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;&#xA;&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;&#xA;&lt;h2 id=&#34;secure-communication&#34;&gt;Secure Communication&lt;/h2&gt;&#xA;&lt;p&gt;This section will provide you with guidance on ways to establish secure communication when reaching out for help when confronted with a potential digital attack. As a general rule, it is important to understand that most &amp;rsquo;normal&amp;rsquo; communications tools are not very secure against eavesdropping. Mobile and landline phone communication is not encrypted and can be listened to by governments, law enforcement agencies, or other parties with the necessary technical equipment. Sending unencrypted communication is like sending a postcard, anyone who has access to the postcard can read the message. Sending encrypted communication is like placing the postcard inside a safe and then sending the safe, which only you and those you trust know the combination to and are able to open and read the message.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Summer hackathon - Open Source Security Hackathon - Improving and integrating CERT/CSIRT tools</title>
      <link>https://new.circl.lu/pub/summer-hackathon/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/summer-hackathon/</guid>
      <description>&lt;h2 id=&#34;summer-hackathon---open-source-security-hackathon---improving-and-integrating-certcsirt-tools&#34;&gt;Summer hackathon - Open Source Security Hackathon - Improving and integrating CERT/CSIRT tools&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL organises the fourth Open Source Security Software Hackathon on August 7-9 2018.&lt;/p&gt;&#xA;&lt;p&gt;This 3-days Hackathon is dedicated to Free/Open Source Software in the field of cybersecurity. The aim is to gather various developer groups to collaborate on challenging programming problems in the field of cybersecurity: from information sharing, network/system forensic, data mining challenges, network/computer exploitation or defense. The objective of the Open Source Security Software Hackathon is also to improve the interoperability and exchange between the different security tools. We would like to focus (but not limit) to applicability on the CERT/CSIRT community.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-05 - SSL/TLS Security of Servers in Luxembourg (August 2011)</title>
      <link>https://new.circl.lu/pub/tr-05/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-05/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;The SSL/TLS cryptographhic protocols are used to ensure confidentiality, integrity and authentication of data communications, for instance between a customer and a company during a transaction in a web shop on the Internet. Without the invention and dominant usage of SSL/TLS, confidential communication like money transfers and online shopping wouldn&amp;rsquo;t be possible today. Correct implementation and configuration of SSL/TLS are therefore vital for establishing a trustful relation between online businesses and their customers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-06 - DigiNotar incident and general SSL/TLS security consequences (September 2011)</title>
      <link>https://new.circl.lu/pub/tr-06/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-06/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;It appears that recently an attacker or a group of attackers gained access to the certificate management infrastructure of the Dutch Certificate Authority (CA) &amp;lsquo;DigiNotar&amp;rsquo;. The attacker issued several &lt;a href=&#34;https://blog.torproject.org/files/rogue-certs-2011-09-04.csv&#34;&gt;certificates for high profile sites&lt;/a&gt;. These certificates can be used to intercept information on communication paths that are usually trusted for their integrity and authenticity. It is highly advised to install all available browser and operating system updates and to remove the compromised DigiNotar CA certificate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-07 - HOWTO find SMTP headers in common Email clients</title>
      <link>https://new.circl.lu/pub/tr-07/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-07/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Next to the user visible part of the mail body, emails also contain a header part,&#xA;normally not visible to the user. The body mainly consists of the message itself&#xA;while the header contains meta informations, most of which was added by the servers&#xA;that handled the email.&lt;/p&gt;&#xA;&lt;p&gt;For attackers it is easy to modify information, which is visible to the user,&#xA;like for example the &amp;ldquo;From&amp;rdquo; field, to send spoofed emails. Email is therefore not reliable.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-08 - CIRCL automatic launch object detection for Mac OS X</title>
      <link>https://new.circl.lu/pub/tr-08/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-08/</guid>
      <description>&lt;h2 id=&#34;abstract&#34;&gt;Abstract&lt;/h2&gt;&#xA;&lt;p&gt;Current Mac OS X malware often persists and automatically starts by using the built-in launch system &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;. This tool makes use of Automatic Folder Actions &lt;sup id=&#34;fnref:2&#34;&gt;&lt;a href=&#34;#fn:2&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;2&lt;/a&gt;&lt;/sup&gt; in order to create a very basic but effective way of monitoring the addition of new launch objects to standard locations. In case a new object is placed in one of the monitored directories, a pop-up informs the user about the change, who then has in turn to decide if the change was legitimate or not.&#xA;The new version is also monitoring locations where plug-ins are installed, for instance for common Internet browsers. The list of locations is displayed below.&#xA;Besides displaying added files, this tool can also set up a log file where changes are recorded.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-09 - Malware Discovery and potential Removal (Windows 7)</title>
      <link>https://new.circl.lu/pub/tr-09/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-09/</guid>
      <description>&lt;h2 id=&#34;what-is-malware--ransomware&#34;&gt;What is Malware / Ransomware&lt;/h2&gt;&#xA;&lt;p&gt;Malware is any kind of malicious unwanted software which may prevent your PC from working properly.&#xA;Ransomware is malicious software which deny access to your PC. The intruder likes to force you to pay some ransom to get back access again.&lt;/p&gt;&#xA;&lt;h2 id=&#34;goal-of-the-paper&#34;&gt;Goal of the paper&lt;/h2&gt;&#xA;&lt;p&gt;Depending on the Malware your computer is infected with, this paper could help you to get access back to your PC again.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-10 - Red October / Sputnik malware</title>
      <link>https://new.circl.lu/pub/tr-10/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-10/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations. As a cover, different office file formats have been used to transport the loader of the malware, using different exploits to drop the malicious content. After several stages of unpacking, the malware is running persistently on the computer and only when it successfully probes internet connectivity, it decrypts a separate file and starts to behave maliciously: it connects to a Command and Control server, awaiting new commands or downloading and executing specific malware modules.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-11 - Security Flaws in Universal Plug and Play (UPnP) - Disable UPnP</title>
      <link>https://new.circl.lu/pub/tr-11/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-11/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;UPnP (Universal Plug and Play) is a network protocol that allows to discover network services and also is able to (re-) configure network equipment in order&#xA;to seamlessly make network devices work together. When turned on, this network protocol is accessible on UDP port 1900. This port must  not be accessible from the internet (unless one has good reason to do so). According to the research of Rapid 7 &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;, the service is widely turned on on Internet facing devices and therefore accessible from the Internet. At most, home Internet routers are concerned.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-12 - Analysis of a PlugX malware variant used for targeted attacks</title>
      <link>https://new.circl.lu/pub/tr-12/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-12/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;This report is the analysis of a Remote Access Tool (RAT) which is usually named PlugX (also known as Gulpix, Korplug). This malware is often used in targeted attacks against private organizations, governments, political organization and even some individuals. This PlugX variant is interesting on several aspects like the use of a perfectly valid signed binary in order to perform its attack. It also features mechanisms in order to defeat protection like Windows UAC (User Account Control). The purpose of the analysis is to improve the detection at the potential victims site but review the security measures in place within other organization to limit the impact of such targeted attack.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-13 - Malware analysis report of a Backdoor. Snifula variant</title>
      <link>https://new.circl.lu/pub/tr-13/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-13/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Trojan horses and particularly information stealing malware are a prevalent risk in information security. According to Symantec, Snifula is a family of information stealing trojan horses known since 2006 and the developers enhanced it over the years up to&#xA;the current version (see report for a history). The actual version is - like its predecessors - not spread very widely, but has some unusual and underestimated capabilities that go farther than stealing passwords or files from an infected computer. A&#xA;main ability of the malware is the X.509 certificate on file-system stealing functionality, which is in its maliciousness beyond the usual information stealing scenarios and generally only considered being a theoretical attack in most organizations. This report&#xA;shows that the threat is real and being used in targeted attacks - and that the attackers can reach this goal by using documented Windows functions only.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-14 - Analysis of a stage 3 Miniduke malware sample</title>
      <link>https://new.circl.lu/pub/tr-14/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-14/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;In the scope of targeted attacks with a malware labeled as Miniduke by Kaspersky Labs, CIRCL&#xA;was interested in the way the malware’s later stages work and what kind of interesting information&#xA;they reveal (e.g. techniques, style, IOCs). No public analysis was found except the mention in&#xA;Kaspersky’s report of a custom backdoor, so CIRCL took one of the known samples and started&#xA;this analysis.&lt;/p&gt;&#xA;&lt;h2 id=&#34;report&#34;&gt;Report&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://new.circl.lu/assets/files/tr-14/circl-analysisreport-miniduke-stage3-public.pdf&#34;&gt;Analysis of a stage 3 Miniduke malware sample&lt;/a&gt; (version 1.2, July 3 2014)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;recommendation&#34;&gt;Recommendation&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;CIRCL recommends private organizations or any potential targets to verify the Indicator of Compromise (IOCs) during the year 2012 contained in the report to detect any potential infection. CIRCL can be contacted in case of detection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-15 - Hand of Thief/Hanthie Linux Malware - Detection and Remediation</title>
      <link>https://new.circl.lu/pub/tr-15/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-15/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;A recent Linux malware targeting Linux desktop users &lt;a href=&#34;https://blogs.rsa.com/thieves-reaching-for-linux-hand-of-thief-trojan-targets-linux-inth3wild/&#34;&gt;has been seen&lt;/a&gt; in some forums.&#xA;The malware is called &amp;ldquo;Hand of Thief&amp;rdquo; or Hanthie. Usually Linux malware tends to compromise Linux server installations and not desktop users. But in the case of Hanthie, it&amp;rsquo;s different, the malware is targeting Linux desktop installations. The core functionalities of the malware are form and cookie grabbing in Firefox, Chrome and Chromium. There is a backdoor functionality to access the PC via a reverse shell or via a SOCKS connection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-16 - HoneyBot Services - Client Data Collection</title>
      <link>https://new.circl.lu/pub/tr-16/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-16/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://new.circl.lu/assets/images/logos/honeybot.png&#34; alt=&#34;CIRCL Honeybot logo&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;CIRCL HoneyBot services consist of the distributed operation and exploitation of CIRCL&#xA;HoneyBots. These services are part of a research project with the aim to improve security on&#xA;Internet. A CIRCL HoneyBot is a low-interaction honeypot running on an embedded device,&#xA;that is deployed in the premises of CIRCL partners. The HoneyBot listens to unused IP&#xA;addresses specified by the partner. The HoneyBot sensor located in an unused network&#xA;space of the partner (from one IP address to multiple IP addresses). The unused network space&#xA;has no production network traffic and the traffic reaching such network space can be called background noise.&#xA;This background noise contains malicious opportunistic attacks along with other traffic like backscatter traffic due&#xA;to DDoS or misconfigurations. The CIRCL HoneyBot project is now part of the &lt;a href=&#34;https://www.d4-project.org/&#34;&gt;D4 project&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-17 - Java.Tomdep - Information, Detection and Recommendation</title>
      <link>https://new.circl.lu/pub/tr-17/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-17/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Java.Tomdep is a network worm copying itself between Apache Tomcat servers. When successful, it opens a backdoor connection to several Command and Control (C&amp;amp;C) servers.&#xA;The reasons for CIRCL to address this threat in a technical report are the following:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;High number of Apache Tomcat installations in Luxembourg&lt;/li&gt;&#xA;&lt;li&gt;Simple and successful propagation process&lt;/li&gt;&#xA;&lt;li&gt;Installation of a back door which allows full access to the compromised server&lt;/li&gt;&#xA;&lt;li&gt;Imaginable follow-up scenarios (malware spreading to visitors, DDoS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;background-information&#34;&gt;Background Information&lt;/h2&gt;&#xA;&lt;p&gt;The malicious software, when installed on a Tomcat server, start scanning the network for other Tomcat servers and tries to log in with a number of weak username-password combinations. If it is successful, it copies itself to the targeted server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-18 - PBX and VoIP Security - Recommendations</title>
      <link>https://new.circl.lu/pub/tr-18/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-18/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Private Branch Exchange (PBX), Voice over IP (VoIP) servers and clients are nowadays core communication components within small and large organizations. A PBX is a complete information systems integrating communication facilities including access to public switched/routed networks.&lt;/p&gt;&#xA;&lt;p&gt;The security of PBX and VoIP elements is a key element to limit abuse and especially the theft of services. In the past years, PBX attacks are quite regular due to lack of security. The attacks especially allow the attackers to make toll fraud. The victims are directly impacted in their phone bills from such fraud. The losses regarding such vulnerabilities are not to be underestimated and can represent an important threat to the financial operation of an organisation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-19 - UDP Protocols Security - Recommendations To Avoid or Limit DDoS reflection / amplification</title>
      <link>https://new.circl.lu/pub/tr-19/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-19/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;DDoS (Distributed Denial-of-Service) attacks are used to render computer or information systems inaccessible. Attackers can abuse different network protocols in order&#xA;to achieve their goals. In the past years, TCP protocol was regularly used to conduct Denial-of-Service attacks, but abuse of UDP protocols recently increased. UDP protocols&#xA;provide many advantages for the attackers, e.g. IP address spoofing or stateless-connectivity. Some open (e.g. public NTP) services and inadvertently (e.g. SIP or Chargen) unfiltered services relying on UDP protocols are still widely open on the Internet and consequently accessible to potential abuse. In this document, recommendations are proposed to system and network administrators in order to minimize the risks associated with open services relying on UDP protocols.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-20 - Port evolution, a software to find the shady IP profiles in Netflow</title>
      <link>https://new.circl.lu/pub/tr-20/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-20/</guid>
      <description>&lt;h2 id=&#34;scope&#34;&gt;Scope&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.ietf.org/rfc/rfc3954.txt&#34;&gt;Netflow records&lt;/a&gt;&#xA;are frequently used for accounting purposes in large Networks.&#xA;Most router are capable of exporting Netflow data. In CIRCL&amp;rsquo;s Netflow research&#xA;program we collaborate with partners having large networks willing&#xA;to exploit Netflow data for monitoring their infrastructures regarding&#xA;information security incidents. The following objectives are addressed:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;strong&gt;Validate Received Information&lt;/strong&gt;  Incident response teams or abuse&#xA;handling teams receive information about incidents such as&#xA;compromised hosts in their networks. Incident related information is sometimes&#xA;volatile and quickly outdated. Therefore, it is essential to quickly&#xA;validate received information. Netflow data can be used to validate this&#xA;kind of information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-21 - OpenSSL Heartbeat Critical Vulnerability</title>
      <link>https://new.circl.lu/pub/tr-21/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-21/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;OpenSSL software is vulnerable to memory leakage to the connected client or server. In other words, anyone can remotely retrieve sensitive information (e.g. secret keys, passwords, confidential document) from the memory of the remote servers without leaving traces. This is a critical vulnerability and you must patch your OpenSSL software as soon as possible.&lt;/p&gt;&#xA;&lt;p&gt;OpenSSL version 1.0.1 and 1.0.2-beta releases are affected by this vulnerability including 1.0.1f and 1.0.2-beta1. Prior version are not vulnerable to this vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-22 - Recommendations for Readiness to Handle Computer Security Incidents</title>
      <link>https://new.circl.lu/pub/tr-22/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-22/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;The objective of this document is to provide a set of practical procedures to enhance incident response team&#xA;and ensure readiness in case of computer and cybersecurity incidents. The document includes the practical aspects on how to perform minimal response actions like gathering evidences from system or network in order to support LIRT (local incident response team) or public/private CERT supporting organizations in incident handling.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;This document contains technical details about gathering evidences that might be updated at a regular interval. Check the &lt;a href=&#34;#revision&#34;&gt;revision of the document&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-23 Analysis - NetWiredRC malware</title>
      <link>https://new.circl.lu/pub/tr-23/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-23/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL analyzed a malware sample which was only sporadically&#xA;detected by just a handful antivirus engines, based on heuristic detection. CIRCL analyzed the entire command structure&#xA;of the malware and was able to attribute this specific malware to the malware NetWiredRC. The malware is a feature-rich&#xA;Remote Access Tool, and compared to the identified predecessors, this specific version even implements more features.&lt;/p&gt;&#xA;&lt;h2 id=&#34;pre-analysis&#34;&gt;Pre-Analysis&lt;/h2&gt;&#xA;&lt;h2 id=&#34;sample-a&#34;&gt;Sample A&lt;/h2&gt;&#xA;&lt;h3 id=&#34;hashes&#34;&gt;Hashes:&lt;/h3&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th style=&#34;text-align: left&#34;&gt;Type of Hash&lt;/th&gt;&#xA;          &lt;th style=&#34;text-align: left&#34;&gt;Hash&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;MD5&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;37e922093d8a837b250e72cc87a664cd&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;SHA1&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;c4d06a2fc80bffbc6a64f92f95ffee02f92c6bb9&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;SHA-256&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;3946d499d81e8506b8291dc0bd13475397bbcd7cb6e2c7ea504c079c92b99f62&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;{: rules=&amp;ldquo;groups&amp;rdquo;}&lt;/td&gt;&#xA;          &lt;td&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h3 id=&#34;virustotal-results-for-sample-a&#34;&gt;VirusTotal results for sample A&lt;/h3&gt;&#xA;&lt;table&gt;&#xA;  &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;th style=&#34;text-align: left&#34;&gt;Engine&lt;/th&gt;&#xA;          &lt;th style=&#34;text-align: center&#34;&gt;Result&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/thead&gt;&#xA;  &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;McAfee&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;Artemis!37E922093D8A&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;TrendMicro-HouseCall&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;TROJ_GEN.F47V0407&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;Comodo&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;TrojWare.Win32.Amtar.JEI&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;McAfee-GW-Edition&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;Artemis!37E922093D8A&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;ESET-NOD32&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;Win32/Spy.Agent.NYU&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;Ikarus&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;Backdoor:Signed.Agent&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;AVG&lt;/td&gt;&#xA;          &lt;td style=&#34;text-align: center&#34;&gt;BackDoor.Agent.AWYR&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;=====&lt;/td&gt;&#xA;          &lt;td&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;Scanned: 2014-04-07 - 49 scans - 7 detections&lt;/td&gt;&#xA;          &lt;td&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;      &lt;tr&gt;&#xA;          &lt;td style=&#34;text-align: left&#34;&gt;{: rules=&amp;ldquo;groups&amp;rdquo;}&lt;/td&gt;&#xA;          &lt;td&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;  &lt;/tbody&gt;&#xA;&lt;/table&gt;&#xA;&lt;h3 id=&#34;signature-check-for-sample-a&#34;&gt;Signature check for sample A&lt;/h3&gt;&#xA;&lt;p&gt;| Verified | Signed |&#xA;| Signers  | Avira Operations GmbH &amp;amp; Co. KG |&#xA;|&#x9;   | VeriSign Class 3 Code Signing 2010 CA |&#xA;|&#x9;   | VeriSign Class 3 Public Primary Certification Authority - G5 |&#xA;| Signing date | 10:52 AM 6/25/2012 |&#xA;| Publisher | Avira Operations GmbH &amp;amp; Co. KG |&#xA;| Description | Avira Notification Tool |&#xA;| Product | Avira Free Antivirus |&#xA;| Version | 12.3.0.34 |&#xA;| File version | 12.3.0.34 |&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-24 Analysis - Destory RAT family</title>
      <link>https://new.circl.lu/pub/tr-24/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-24/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL analyzed a malware sample which was only sporadically detected by just a handful antivirus engines, based on heuristic detection. CIRCL analyzed the entire command structure&#xA;of the malware and was able to attribute this specific malware to the Destory RAT family. The malware is a feature-rich Remote Access Tool.&lt;/p&gt;&#xA;&lt;p&gt;The malware is used by a specific group of attackers specialized in industrial espionage starting from 2007 (&lt;a href=&#34;http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf&#34;&gt;Command Five&lt;/a&gt;). CIRCL published this report about Destory RAT family due to the regular confusion with the &lt;a href=&#34;https://new.circl.lu/pub/tr-12/&#34;&gt;PlugX malware family&lt;/a&gt;. PlugX and Destory RAT malware are technically different for their respective initialization phase, utilized obfuscation techniques and other parts that will be outlined in this document, showing that both families are initially coming from the same malware writers, following the same internal and network communication protocols and using the same code for the vast majority of the code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos</title>
      <link>https://new.circl.lu/pub/tr-25/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-25/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;During the last weeks, various samples of &lt;em&gt;Uroburos&lt;/em&gt; (also named &lt;em&gt;Urob&lt;/em&gt;, &lt;em&gt;Turla&lt;/em&gt;, &lt;em&gt;Sengoku&lt;/em&gt;, &lt;em&gt;Snark&lt;/em&gt; and &lt;em&gt;Pfinet&lt;/em&gt;) were analyzed and reports have been published &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&#34;fnref:2&#34;&gt;&lt;a href=&#34;#fn:2&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&#34;fnref:3&#34;&gt;&lt;a href=&#34;#fn:3&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;sup id=&#34;fnref:4&#34;&gt;&lt;a href=&#34;#fn:4&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;4&lt;/a&gt;&lt;/sup&gt;, also analyses about a suspected predecessor, &lt;em&gt;Agent.btz&lt;/em&gt;, are public &lt;sup id=&#34;fnref:5&#34;&gt;&lt;a href=&#34;#fn:5&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;5&lt;/a&gt;&lt;/sup&gt;.&#xA;CIRCL analyzed an older version of &lt;em&gt;Turla&lt;/em&gt;, known as a representative of the &lt;em&gt;Pfinet&lt;/em&gt; malware family. The objective of this analysis is to gather additional &lt;em&gt;Indicators of Compromise&lt;/em&gt; or behaviors in order to improve detection and to discover additional insights into the malware. This document is not considered a final release but a work-in-progress document.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-26 Security Recommendations for Web Content Management Systems and Web Servers</title>
      <link>https://new.circl.lu/pub/tr-26/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-26/</guid>
      <description>&lt;h2 id=&#34;recommendations-for-web-content-management-system---cms&#34;&gt;Recommendations for Web Content Management System - CMS&lt;/h2&gt;&#xA;&lt;p&gt;Web content management systems (CMS) are regularly used to maintain website content. But as they offer a lot of flexibility to the authors, they also offer a huge opportunity to attackers like modifying content in order to host malicious content and infect users with malware who navigate to these websites.&lt;/p&gt;&#xA;&lt;h2 id=&#34;extensions-and-plugins-in-cms&#34;&gt;Extensions and Plugins in CMS&lt;/h2&gt;&#xA;&lt;p&gt;A major source of vulnerabilities are the extensions and plugins of Web Content Management Systems. Even though the core CMS part can be vulnerable, the vulnerabilities in plugins are accounted for more than &lt;a href=&#34;http://www.h-online.com/open/news/item/CMSs-mostly-vulnerable-through-addons-says-German-security-agency-1894431.html&#34;&gt;80% of the CMS vulnerabilities&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169</title>
      <link>https://new.circl.lu/pub/tr-27/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-27/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;A critical vulnerability has been discovered in GNU Bash by abusing specially crafted environment variables which allows local and remote code execution.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-to-test-if-your-bash-is-vulnerable&#34;&gt;How to test if your bash is vulnerable&lt;/h2&gt;&#xA;&lt;p&gt;In a shell, execute the following, which is testing the system wide GNU Bash binary to test if you are vulnerable to &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2014-6271&#34;&gt;CVE-2014-6271&lt;/a&gt;:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;env x=&amp;#39;() { :;}; echo vulnerable&amp;#39; bash -c &amp;#34;echo test&amp;#34;&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;To test if you are vulnerable to &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2014-7169&#34;&gt;CVE-2014-7169&lt;/a&gt;:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;cd /tmp; rm -f /tmp/echo; env &amp;#39;x=() { (a)=&amp;gt;\&amp;#39; bash -c &amp;#34;echo date&amp;#34;; cat /tmp/echo&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If the date is not printed, you are not vulnerable to &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2014-7169&#34;&gt;CVE-2014-7169&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566</title>
      <link>https://new.circl.lu/pub/tr-28/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-28/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the &lt;a href=&#34;https://www.openssl.org/~bodo/ssl-poodle.pdf&#34;&gt;&amp;ldquo;POODLE&amp;rdquo;&lt;/a&gt; issue. POODLE stands for &amp;ldquo;Padding Oracle On Downgraded Legacy Encryption&amp;rdquo;.&lt;/p&gt;&#xA;&lt;p&gt;A recently discovered vulnerability shows that SSLv3 should not be used. The usage must be considered insecure. The majority of clients support recent versions of TLS. As there is no update available, &lt;strong&gt;the main recommendation is to completely disable SSLv3 support on your TLS/SSL servers and clients. Installations should only rely on recent versions of TLS&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-29 - NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities</title>
      <link>https://new.circl.lu/pub/tr-29/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-29/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;NTP, the Network Time Protocol, is a standardized protocol providing ways to synchronize time on various operating systems. The Unix implementation called ntpd is vulnerable to multiple critical vulnerabilities. The NTP daemon (ntpd) is included in various operating systems and embedded systems. One of the vulnerabilities (&lt;a href=&#34;https://cve.circl.lu/cve/CVE-2014-9295&#34;&gt;CVE-2014-9295&lt;/a&gt;) is a remote code execution vulnerability allowing unauthenticated attackers to execute code with the privilege level of the NTP daemon (ntpd). If you are running an NTP server, you should upgrade as soon as possible especially if the Autokey Authentication feature is enabled.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-30 - Acquisition Support Tools for Local Incident Response Teams (LIRT)</title>
      <link>https://new.circl.lu/pub/tr-30/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-30/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;In addition to &lt;a href=&#34;https://new.circl.lu/pub/tr-22&#34;&gt;CIRCL TR-22 - Recommendations for Readiness to Handle Computer Security Incidents&lt;/a&gt;, TR-30 provides a list of evidence acquisition support tools which can be used by Local Incident Response Teams (LIRT). The tools can be used in order to gather forensic evidences from Microsoft Windows systems including memory, registry or other evidences.&lt;/p&gt;&#xA;&lt;p&gt;We recommend to acquire evidences on the running systems, especially memory and registry evidences. In case of encrypted disks or hardware RAIDs, we recommend to do live disk acquisition before the shutdown of the system. If the system is not encrypted, we recommend an off-line disk acquisition, if possible with a write-blocker device. In order to test if a disk is encrypted, the EDD tool mentioned below can help you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-31 - GHOST / CVE-2015-0235 - glibc vulnerability - gethostbyname() (associated function calls)</title>
      <link>https://new.circl.lu/pub/tr-31/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-31/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-0235&#34;&gt;GHOST&lt;/a&gt; / &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-0235&#34;&gt;CVE-2015-0235&lt;/a&gt; is a &amp;lsquo;buffer overflow&amp;rsquo; vulnerability affecting the gethostbyname() function calls in the glibc library. An attacker could exploit this vulnerability to execute code on a remote host by supplying an invalid DNS response.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;p&gt;If your glibc library is equal or below version 2.17, you are probably vulnerable to &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-0235&#34;&gt;CVE-2015-0235&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://access.redhat.com/articles/1332213&#34;&gt;RedHat - GHOST: glibc vulnerability (CVE-2015-0235)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0235.html&#34;&gt;Ubuntu - CVE-2015-0235&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://security-tracker.debian.org/tracker/CVE-2015-0235&#34;&gt;Debian Security Tracker - CVE-2015-0235&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;non-vulnerable-systems&#34;&gt;Non-vulnerable systems&lt;/h2&gt;&#xA;&lt;p&gt;If your glibc library is equal or above version 2.18, you are not vulnerable to &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-0235&#34;&gt;CVE-2015-0235&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-32 - key-value store and NoSQL security recommendations</title>
      <link>https://new.circl.lu/pub/tr-32/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-32/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;em&gt;Key-value&lt;/em&gt; &lt;em&gt;stores&lt;/em&gt;, &lt;em&gt;caches&lt;/em&gt; or &lt;em&gt;NoSQL&lt;/em&gt; &lt;em&gt;databases&lt;/em&gt; became an important piece of software in today&amp;rsquo;s internet and web services. In contrast to conventional DB sytems, the security model of &lt;em&gt;NoSQL&lt;/em&gt; &lt;em&gt;data&lt;/em&gt; &lt;em&gt;stores&lt;/em&gt; is often very limited due to their inherent nature to be used within internal trusted networks. Strong attention should be given to the configuration of key-value stores especially regarding their access from the Internet.&lt;/p&gt;&#xA;&lt;h2 id=&#34;general-recommendations&#34;&gt;General recommendations&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Avoid listening and binding on all available network interfaces. If your key-value store is used on a single system, it is recommended to bind on localhost network interface.&lt;/li&gt;&#xA;&lt;li&gt;If your key-value store is exposed to the Internet, TCP ports used by the key-value store need to be firewalled or packet-filtered.&lt;/li&gt;&#xA;&lt;li&gt;If your key-value store supports authentication, access-control or encryption features, it is recommended to enable those.&lt;/li&gt;&#xA;&lt;li&gt;If your key-value store supports disactivation of commands, limit the available set of commands to those which are required (e.g. if your application only needs read-only cache access, limit to read-only commands).&lt;/li&gt;&#xA;&lt;li&gt;Don&amp;rsquo;t forget that key-value stores can be vulnerable to injection, too (just like SQL).&lt;/li&gt;&#xA;&lt;li&gt;Logs access requests including failed authentications or authorizations to your key-value store.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;specific-key-value-store-recommendations&#34;&gt;Specific key-value store recommendations&lt;/h2&gt;&#xA;&lt;h2 id=&#34;redis&#34;&gt;Redis&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://redis.io/topics/security&#34;&gt;Redis Security&lt;/a&gt; provides a good start to secure your Redis servers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-33 Analysis - CTB-Locker / Critroni</title>
      <link>https://new.circl.lu/pub/tr-33/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-33/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;In times of data stealing malware, making direct profit - straight from the wallet of the victim to the pocket of the attacker - is not the usual case. &lt;em&gt;Scareware&lt;/em&gt; and &lt;em&gt;ransomware&lt;/em&gt; are a few exceptions. While &lt;em&gt;scareware&lt;/em&gt; usually just pretends to harm the user&amp;rsquo;s computer, &lt;em&gt;ransomware&lt;/em&gt; takes the user&amp;rsquo;s files as hostiles by encrypting them and requests a ransom to be paid to decrypt the files. While the first implementations of &lt;em&gt;ransomware&lt;/em&gt; lacked a correct implementation of the encryption process, the latest incarnation known as &lt;em&gt;CTB-Locker&lt;/em&gt;/&lt;em&gt;Critroni&lt;/em&gt; has overcome this limitation. And comes with several new features as well.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-34 How to view and extract raw messages in common email clients</title>
      <link>https://new.circl.lu/pub/tr-34/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-34/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Next to the user visible part of the mail, emails also contain a header part and a body part, normally not visible to the user. The body mainly consists of the message itself while the header contains meta informations, most of which was added by the servers that handled the email. &lt;a href=&#34;https://new.circl.lu/pub/tr-07/&#34;&gt;CIRCL TR-07 already explains how to extract the headers part&lt;/a&gt; from the most popular email clients.&lt;/p&gt;&#xA;&lt;p&gt;This document describes the process on how to extract the full email (including headers, body and attachment parts). The information can be used to analyze fully the email (are there any malicious files? or suspicious files attached the mails? are there any URLs?). The extracted raw messages can be reported &lt;a href=&#34;https://new.circl.lu/report/&#34;&gt;send to a CERT like CIRCL&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-35 What ressources do you need to setup a CERT Team</title>
      <link>https://new.circl.lu/pub/tr-35/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-35/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Setting up a new CERT team will require you to gather some ressources in order to start working in good conditions.&lt;/p&gt;&#xA;&lt;h1 id=&#34;human-ressources&#34;&gt;Human ressources&lt;/h1&gt;&#xA;&lt;p&gt;This is probably the most important part: you need a team of people able to work together because you will have to investgate in cases that will requires a vast amount of competencies that cannot be covered by one single person.&lt;/p&gt;&#xA;&lt;h1 id=&#34;hardware&#34;&gt;Hardware&lt;/h1&gt;&#xA;&lt;h2 id=&#34;infrastructure&#34;&gt;Infrastructure&lt;/h2&gt;&#xA;&lt;p&gt;It is always better to have your own infrastructure, which means some powerfull servers with a lot of RAM and fast disks for the investigations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-36 Example setup of WordPress with static export</title>
      <link>https://new.circl.lu/pub/tr-36/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-36/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL warns very often about security issues in Content Management Systems (e.g. Wordpress, Joomla, Typo3, Drupal) or their plug-ins &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;.&#xA;To minimize the risk, the best practice is to always keep track of the installed plug-ins, uninstall unnecessary components and keep the plug-ins and main software components up-to-date.&#xA;Unfortunately Content Management Systems are sometimes vulnerable to 0-day exploits for which by definition no protection is available. Also, sometimes plug-ins are no longer maintained,&#xA;or the administrators are just busy with other important tasks so that they cannot react to new known threats in a timely manner.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation</title>
      <link>https://new.circl.lu/pub/tr-37/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-37/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;VENOM / &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-3456&#34;&gt;CVE-2015-3456&lt;/a&gt; is a kind of &amp;lsquo;buffer overflow&amp;rsquo; vulnerability in the &lt;a href=&#34;https://www.qemu.org/&#34;&gt;QEMU&lt;/a&gt; Floppy Disk Controller (FDC) emulation. This vulnerability affects a variety of software products relying on QEMU itself or the Floppy Disk Controller emulation part only. Even if floppy disk emulation is not available, the vulnerability can be triggered.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;p&gt;Vulnerable systems to &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-3456&#34;&gt;CVE-2015-3456&lt;/a&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c&#34;&gt;QEMU&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://xenbits.xen.org/xsa/advisory-133.html&#34;&gt;Xen Project&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://access.redhat.com/articles/1444903&#34;&gt;Red Hat&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://support.citrix.com/article/CTX201078&#34;&gt;Citrix&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.fireeye.com/content/dam/fireeye-www/support/pdfs/fireeye-venom-vulnerability.pdf&#34;&gt;FireEye&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://blog.linode.com/2015/05/13/venom-cve-2015-3456-vulnerability-and-linode/&#34;&gt;Linode&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://community.rackspace.com/general/f/53/t/5187&#34;&gt;Rackspace&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.ubuntu.com/usn/usn-2608-1/&#34;&gt;Ubuntu&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://security-tracker.debian.org/tracker/CVE-2015-3456&#34;&gt;Debian&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.suse.com/support/kb/doc.php?id=7016497&#34;&gt;Suse&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.digitalocean.com/company/blog/update-on-CVE-2015-3456/&#34;&gt;DigitalOcean&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://support.f5.com/kb/en-us/solutions/public/16000/600/sol16620.html&#34;&gt;f5&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;A maintenance release of the Oracle VirtualBox 4.3.28 should be released soon to fix &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-3456&#34;&gt;CVE-2015-3456&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-39 - CIRCL-SOPs Standard Operational Procedures</title>
      <link>https://new.circl.lu/pub/tr-39/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-39/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;The Computer Incident Response Center Luxembourg (CIRCL) is the CERT for the private sector, communes and non-governmental entities in Luxembourg.&lt;/p&gt;&#xA;&lt;p&gt;CIRCL provides useful tools and services like MISP&lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;, DMA&lt;sup id=&#34;fnref:2&#34;&gt;&lt;a href=&#34;#fn:2&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;2&lt;/a&gt;&lt;/sup&gt;, Passive DNS&lt;sup id=&#34;fnref:3&#34;&gt;&lt;a href=&#34;#fn:3&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;3&lt;/a&gt;&lt;/sup&gt;, Passive SSL&lt;sup id=&#34;fnref:4&#34;&gt;&lt;a href=&#34;#fn:4&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;4&lt;/a&gt;&lt;/sup&gt; and URL Abuse&lt;sup id=&#34;fnref:5&#34;&gt;&lt;a href=&#34;#fn:5&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;5&lt;/a&gt;&lt;/sup&gt; which could be used free of charge by its constituency and the CERT/CSIRT community. All services except URL Abuse need registration to obtain login credentials.&lt;/p&gt;&#xA;&lt;p&gt;The CIRCL-SOPs aims to show how to work with the provided services in case of a suspicion or an attack. This procedures are intended for security teams and CERTs/CSIRTs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-40 - Allaple worm activity in 2015 and long-term persistence of worm (malware) in Local Area Networks</title>
      <link>https://new.circl.lu/pub/tr-40/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-40/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.f-secure.com/v-descs/allaple_a.shtml&#34;&gt;Allaple worm family&lt;/a&gt; has been discovered in late 2006. The Allaple worm is a polymorphic malware designed to spread&#xA;over Local Area Network and Internet. The &lt;a href=&#34;https://nakedsecurity.sophos.com/2010/03/12/allaple-worm-author-sentenced-jail/&#34;&gt;worm was designed by a dissatisfied customer of an insurance company&lt;/a&gt; in order to DDoS some websites in Estonia. &lt;a href=&#34;https://isc.sans.edu/diary/Allaple+worm+/2451&#34;&gt;CERT-FI described in 2007&lt;/a&gt; how to detect and identify Allaple variants on the network via ICMP packets generated by the malware. By analyzing &lt;a href=&#34;https://www.terena.org/publications/tnc2014-proceedings/12-cynthia-wagner-Darkspace.pdf&#34;&gt;blackhole data close to RFC1918 networks&lt;/a&gt; , CIRCL discovered a significant persistence of this worm family in Local Area Networks.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS</title>
      <link>https://new.circl.lu/pub/tr-42/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-42/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Two critical vulnerabilities were discovered in Juniper equipment (from ScreenOS 6.3.0r17 through 6.3.0r20). The vulnerability &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-7755&#34;&gt;CVE-2015-7755&lt;/a&gt; allows unauthorized access to the remote administration of the devices without prior knowledge, beside the username. The attacker can take full control of the devices. The vulnerability &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-7756&#34;&gt;CVE-2015-7756&lt;/a&gt; allows passive attackers to monitor VPN encrypted traffic and decrypt all the traffic without prior knowledge of the key materials.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Juniper devices using ScreenOS 6.3.0r17 (April 2014) through 6.3.0r20 (December 2015) for &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-7755&#34;&gt;CVE-2015-7755&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;Juniper devices using ScreenOS 6.2.0r15 (September 2012) through 6.3.0r20 (December 2015) for &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2015-7756&#34;&gt;CVE-2015-7756&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;non-vulnerable-systems&#34;&gt;Non-vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Other juniper products not relying on ScreenOS&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;details-on-the-vulnerability&#34;&gt;Details on the Vulnerability&lt;/h2&gt;&#xA;&lt;p&gt;Both security issues were discovered by Juniper during an internal code review. The initial publication was on 17th December 2015.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-43 - Installing MPSS 3.6.1 to use a Intel Xeon Phi Coprocessor on Ubuntu Trusty 14.04 LTS</title>
      <link>https://new.circl.lu/pub/tr-43/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-43/</guid>
      <description>&lt;p&gt;The &amp;ldquo;Intel Manycore Platform Software Stack&amp;rdquo; is a series of Intel software components&#xA;to run the Intel Xeon Phi Coprocessor. The Intel Xeon Phi is a coprocessor computer architecture&#xA;for high-performance computing.&lt;/p&gt;&#xA;&lt;p&gt;Most of the documentations available on the Internet is made for RedHat based systems, this&#xA;document aims to help someone willing to configure MPSS on Ubuntu Trusty 14.04 LTS.&lt;/p&gt;&#xA;&lt;p&gt;The code base provided by Intel is pretty huge and not all of it has been installed, only the modules required&#xA;to connect to the system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-44 - Information security - laws and specific rulings in the Grand Duchy of Luxembourg</title>
      <link>https://new.circl.lu/pub/tr-44/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-44/</guid>
      <description>&lt;h2 id=&#34;introduction-en&#34;&gt;Introduction (EN)&lt;/h2&gt;&#xA;&lt;p&gt;Information security is covered by many different laws and specific rulings in the Grand Duchy of Luxembourg. As within many countries, because of the complexity of the topic, these texts are hardly accessible among a single chapter.&#xA;Penal Code was modified several times in order to adapt to the behavioral reality of a population using, for the better or the worst, the Internet and related communication technologies.&lt;/p&gt;&#xA;&lt;p&gt;Following is a brief description, including a title, reference of the articles, domain of application, example and endured sanctions of many of Luxembourg law’s that most commonly apply to all users of the Internet. This brief summary is intended to acquaint you with the major applicable text of laws and not to offer a detailed exposition. It is to be consider as an incomplete work in progress, which will be further edited as the legal framework related to the Internet and electronic communications evolve.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-45 - Data recovery techniques</title>
      <link>https://new.circl.lu/pub/tr-45/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-45/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;In case of data loss, it is good practice to restore a tested backup. Sometimes, such a functioning backup is not available. This document intends to collect alternative ways to at least partially restore lost data from the source disk.&lt;/p&gt;&#xA;&lt;p&gt;Disclaimer: In case data is lost or damaged it is highly recommended to work on a copy of the data and not on the original disk. Please see our document about acquisition first (&lt;a href=&#34;https://new.circl.lu/pub/tr-30/&#34;&gt;TR-30&lt;/a&gt;).&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-46 - Information Leaks Affecting Luxembourg and Recommendations</title>
      <link>https://new.circl.lu/pub/tr-46/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-46/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Information leak: the publication (or trusted announcement of possession) of stolen or otherwise acquired digital information like user profiles, credentials or other digital assets.&lt;/p&gt;&#xA;&lt;p&gt;Information leaks have happened many times in the recent past. Sometimes, the number of affected people is quite small like in the leak of a customer database of a small web shop, where we probably would try to contact the few affected individuals or their employer&amp;rsquo;s IT department. But most of the time we face leaks that contain several million people&amp;rsquo;s private information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-47 - Recommendations regarding Abuse handling for ISPs and registrars</title>
      <link>https://new.circl.lu/pub/tr-47/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-47/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;To address security issues, for instance the notification  to the technical&#xA;administrators, registrants and hosting providers about a compromised&#xA;web site, it is essential to be able to identify the correct contact&#xA;information. These can usually be retrieved from the respective WHOIS database&#xA;of the Regional Internet registry (RIR), the domain name registry&amp;rsquo;s database or&#xA;a Referral Whois (RWhois).&lt;/p&gt;&#xA;&lt;p&gt;These lookups can be automated in order to be used with automatic abuse&#xA;notifications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-48 - Cyber-Threats Indicators Sharing, security-related actionable information and future of Personal Data Protection framework in the EU - MISP and GDPR</title>
      <link>https://new.circl.lu/pub/tr-48/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-48/</guid>
      <description>&lt;h2 id=&#34;abstract&#34;&gt;Abstract&lt;/h2&gt;&#xA;&lt;p&gt;This article exposes how cyber-threats indicators sharing platforms, such as the &lt;a href=&#34;https://new.circl.lu/services/misp-malware-information-sharing-platform/&#34;&gt;Malware Information Sharing and Threat Sharing Platform (MISP)&lt;/a&gt;, can help all actors involved in information security and data protection within Europe in fulfilling their obligations under the future General Data Protection Regulation (GDPR) to apply in the European Union (EU). Although such kind of platform could be used in order to share personal data, the reason why such data is exchanged should be perceived as being within the legitimate interest of data controllers and the interest of the individuals whose data is being shared, therefore in line with the requirements of the GDPR.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share</title>
      <link>https://new.circl.lu/pub/tr-49/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-49/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;A critical remote code execution vulnerability was found in Samba. An authenticated Samba client (with write access) can execute arbitrary code with elevated privileges (usually root). &lt;a href=&#34;https://cve.circl.lu/cve/CVE-2017-7494&#34;&gt;CVE-2017-7494&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Samba (version 3.5.0 and onwards)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Samba is included, by default, in many integrated devices or operating system distributions like&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://download.asustor.com/download/docs/releasenotes/RN_ADM_2.7.3.RHQ3.pdf&#34;&gt;asustor&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://security-tracker.debian.org/tracker/CVE-2017-7494&#34;&gt;Debian DLA-951-1 DSA-3860-1&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Eurostor NAS&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://bugs.freenas.org/issues/24162&#34;&gt;FreeNAS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://kb.netgear.com/000038779/Security-Advisory-for-CVE-2017-7494-Samba-Remote-Code-Execution&#34;&gt;Netgear&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://access.redhat.com/security/cve/CVE-2017-7494&#34;&gt;RedHat&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.suse.com/security/cve/CVE-2017-7494/&#34;&gt;SUSE&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.synology.com/en-global/support/security/Important_Information_Regarding_Samba_Vulnerability_CVE_2017_7494&#34;&gt;Synology&lt;/a&gt; NAS&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://forum.qnap.com/viewtopic.php?f=5&amp;amp;t=132991&#34;&gt;QNAP&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7494.html&#34;&gt;Ubuntu&lt;/a&gt; - &lt;a href=&#34;https://www.ubuntu.com/usn/usn-3296-2/&#34;&gt;USN-3296-2: Samba vulnerability&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;non-vulnerable-systems&#34;&gt;Non-vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Systems running Samba (below version 3.5.0) are not vulnerable to this specific vulnerability. Nevertheless, if you run such an outdated version, we strongly recommend to update to the latest version.&lt;/li&gt;&#xA;&lt;li&gt;CIFS implementation not relying on Samba code base like Microsoft Windows are not vulnerable to this specific vulnerability.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;details-on-the-vulnerability&#34;&gt;Details on the Vulnerability&lt;/h2&gt;&#xA;&lt;p&gt;The vulnerability is located in rpc_server/srv_pipe.c where pipe names can include &amp;ldquo;/&amp;rdquo; values inside. smb_probe_module() (line 484) is used to load a pipename containing a library previously uploaded to the writeable share. The issue lies on the ability to load shared backend modules in Samba using smb_probe_module().&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse</title>
      <link>https://new.circl.lu/pub/tr-50/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-50/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;All modern Wi-Fi networks are protected by Wi-Fi Protected Access II (WPA2). The Wi-Fi standard contains a weakness that could be exploited to read previously assumed to be encrypted traffic, or to modify or inject traffic. As the problem is not bound to specific implementations, the problem can be assumed to be present in any product or device.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;p&gt;Due to the nature of this problem, the vulnerability might exist in all Wi-Fi implementations. &lt;a href=&#34;https://www.kb.cert.org/vuls/byvendor?searchview&amp;amp;Query=FIELD+Reference=228519&amp;amp;SearchOrder=4&#34;&gt;CERT.org&lt;/a&gt; maintains an extensive list of affected products.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-51 - How to react to fraudulent acts of third party invoicing or requesting funds without showing any purchase order</title>
      <link>https://new.circl.lu/pub/tr-51/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-51/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;There are many deliberate fraudulent acts occurring frequently in Luxembourg as means of securing unfair or unlawful gains, of which fake bills and advertising scams are unfortunately common. CIRCL is often contacted by victims of such scams, and would like to issue a clear warning related to such frauds as false billing, fake invoicing or related fake advertising.&lt;/p&gt;&#xA;&lt;p&gt;This TR document describes the nature of the scams and provides hints on how to react.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-52 - Forensic Analysis of an HID Attack</title>
      <link>https://new.circl.lu/pub/tr-52/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-52/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;If a malicious hardware device which probably looks like an usual USB key is plugged into the USB port of a PC but then act like a keyboard, we are talking about Human Interface Device (HID) Attacks. This attacks are known since many years but recently gain popularity.&lt;/p&gt;&#xA;&lt;p&gt;A reasons for the increasing popularity of the attacks might be the availability of cheap hardware which can be used for the attacks. Also the hardware has become more reliable and easier to handle over time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-53 - Statement about WHOIS and GDPR</title>
      <link>https://new.circl.lu/pub/tr-53/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-53/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL is the CERT/CSIRT (Computer Emergency Response Team/Computer Security Incident Response Team) for the private sector, communes and non-governmental entities in Luxembourg.&lt;/p&gt;&#xA;&lt;p&gt;In this context, one of the tasks of CIRCL is to protect the citizens, companies and all other types of organizations, within, but not limited to Luxembourg from malware, phishing and other digital threats.&lt;/p&gt;&#xA;&lt;p&gt;In order to achieve this with maximum effect, CIRCL tries to make the malicious content inaccessible, while informing the responsible people about the compromised infrastructure at the same time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-54 - Sextortion scam emails - I know your password</title>
      <link>https://new.circl.lu/pub/tr-54/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-54/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;During the past few days, we have received an increasing number of reports about scam attempts.&lt;/p&gt;&#xA;&lt;p&gt;Usually the malicious emails involved in the scam start with sentences such as &lt;strong&gt;I know that XYZ is your password&lt;/strong&gt;, with the scary part being that &lt;strong&gt;XYZ&lt;/strong&gt; is in fact a real password of the targeted user.&lt;/p&gt;&#xA;&lt;p&gt;In one example, as displayed below, the attacker explains that they compromised the victim&amp;rsquo;s PC by infecting it with a remote access malware. They also state that they have activated the webcam of the PC and recorded a video clip of the victim.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-55 - SquashFu - an alternate Open Source Backup solution, resilient to Crypto Ransomware attacks</title>
      <link>https://new.circl.lu/pub/tr-55/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-55/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;One of CIRCLs tasks is to protect the citizens, companies and all other types of organizations, within, but not limited to Luxembourg from malware, phishing and other digital threats.&#xA;During the last years, one specific threat was - from an attacker&amp;rsquo;s perspective - very successful. At the same time it turned out to be devastating (unrecoverable loss of information) or at least expensive and problematic for the victims.&#xA;We are talking about the rise and success of Crypto Ransomware, which we covered in other articles already:&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-56 - HTTP Strict Transport Security</title>
      <link>https://new.circl.lu/pub/tr-56/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-56/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;For good reasons, regulations and privacy good practices require the usage of an encryption layer between end-user browsers and web servers the user is performing a transaction with (e.g. online shop purchase, online banking transaction). This encryption layer is commonly recognized by the &amp;lsquo;https://&amp;rsquo; prefix of a URL, along with the lock symbol in the address bar of the browser. It represents an implementation of X.509 based SSL/TLS encryption, which is an extension to the HTTP protocol the world wide web is based on. Basically all end-systems and servers are technically capable of understanding this protocol.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-567d30 - CIRCL Unveils Festive Nostalgic Initiatives - Gopher Protocol and Bulletin Board System Revival</title>
      <link>https://new.circl.lu/pub/tr-567d30/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-567d30/</guid>
      <description>&lt;p&gt;In the spirit of holiday cheer and a nod to computing&amp;rsquo;s early days, CIRCL, the CERT for the private sector of Luxembourg, is delighted to unwrap two nostalgic gifts for tech enthusiasts. We are proud to announce the activation of our website in the venerable Gopher protocol, offering users a festive journey into the roots of the digital era at &lt;a href=&#34;gopher://gopher.circl.lu&#34;&gt;gopher://gopher.circl.lu&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;But the holiday surprises don&amp;rsquo;t end there! In celebration of the season, CIRCL has introduced a Bulletin Board System (BBS) at bbs.circl.lu. Running on TCP ports 23, 64 (40 column PETSCII), and 128 (80 column PETSCII), this holiday-themed BBS is a nod to a bygone era when digital communities thrived on the simplicity of text-based interactions. Users can experience this festive blast from the past with modern terminal programs or, for those with a holiday spirit for retro hardware, on slightly older computers like Amiga 500 or even the classic C64.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-57 - Ransomware - Effects and precautions</title>
      <link>https://new.circl.lu/pub/tr-57/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-57/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;Ransomware, in this context specifically Cryptoransomware, is a term for a malware type that blocks access to data on resources of the victim unless a ransom is paid.&#xA;Cryptoransomware is not a new phenomena. The first Cryptoransomware was released in 1989 (&amp;lsquo;AIDS Trojan&amp;rsquo;), however the technique to make the data inaccessible was different to today&amp;rsquo;s cryptographic approaches. In addition, no anonymous payment system was available at that time. To deal with this, money was requested to be sent to a postbox in Panama. Carrying out such attacks for profit wasn&amp;rsquo;t lucrative due to the associated risks.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation</title>
      <link>https://new.circl.lu/pub/tr-58/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-58/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;A critical remote code execution vulnerability was found in SMBv3 protocol, affecting servers and client machines serving an SMB share.&#xA;An unauthenticated SMV client can execute arbitrary code with elevated privileges, which could allow an attacker to take full control over the attacked system.&#xA;This vulnerability has the potential for a wormable attack, meaning that the vulnerability could be exploited automatically from vulnerable system to vulnerable system.&#xA;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0796&#34;&gt;CVE-2020-0796&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;p&gt;Currently by Microsoft confirmed vulnerable systems as in &lt;a href=&#34;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005&#34;&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv200005&lt;/a&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-59 - Remote Work - In times of a crisis</title>
      <link>https://new.circl.lu/pub/tr-59/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-59/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;In a crisis situation as we experience it since March 2020, remote work (aka telework, telecommute, tele work, distance work and sometimes &amp;ldquo;home office&amp;rdquo;) is often the best or sole option to keep an organization operational.&lt;/p&gt;&#xA;&lt;p&gt;Cybercriminals are well aware of this situation and will try to attack employees and the organizations.&lt;/p&gt;&#xA;&lt;p&gt;Many very good articles have been released addressing the security of the companies and home workers on a strategical, organizational and technical level.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-60 - Phishing - Effects and precautions</title>
      <link>https://new.circl.lu/pub/tr-60/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-60/</guid>
      <description>&lt;h2 id=&#34;how-do-you-define-phishing-what-type-of-phishing-exist&#34;&gt;How do you define Phishing? What type of phishing exist?&lt;/h2&gt;&#xA;&lt;p&gt;Phishing is defined as an attempt to obtain sensitive information (like access credentials, financial information or credit card details) by establishing a trust relationship with the potential victim. The act of phishing is a social engineering attack and doesn’t require any technical exploitation of vulnerabilities. Instead it focuses on the human and their weaknesses, like inattentiveness, misinterpretation or mislead judgment caused by the influence of the attacker’s correspondence.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-61 - Critical vulnerabilities in Microsoft Exchange</title>
      <link>https://new.circl.lu/pub/tr-61/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-61/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Several critical vulnerabilities in Microsoft Exchange have been discovered. The vulnerabilities are actively being exploited.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-26412&#34;&gt;CVE-2021-26412&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-26854&#34;&gt;CVE-2021-26854&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-26855&#34;&gt;CVE-2021-26855&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-26857&#34;&gt;CVE-2021-26857&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-26858&#34;&gt;CVE-2021-26858&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-27065&#34;&gt;CVE-2021-27065&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-27078&#34;&gt;CVE-2021-27078&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:&lt;em&gt;:&lt;/em&gt;:&lt;em&gt;:&lt;/em&gt;:&lt;em&gt;:&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:&lt;em&gt;:&lt;/em&gt;:&lt;em&gt;:&lt;/em&gt;:&lt;em&gt;:&lt;/em&gt;&lt;/li&gt;&#xA;&lt;li&gt;cpe:2.3:a:microsoft:exchange_server:2010:sp3:&lt;em&gt;:&lt;/em&gt;:&lt;em&gt;:&lt;/em&gt;:&lt;em&gt;:&lt;/em&gt; (CVE-2021-26857)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;fixing-and-mitigation&#34;&gt;Fixing and mitigation&lt;/h2&gt;&#xA;&lt;p&gt;For organisations having vulnerable Microsoft Exchange servers, we recommend the following:&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-62 - Leak of Facebook Data from 533 Million Users</title>
      <link>https://new.circl.lu/pub/tr-62/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-62/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;On Saturday 3rd April 2021, a leak of Facebook records (533 million users) became publicly accessible on a leak-market forum. The leak contains information such as mobile phone numbers, Facebook ID,&#xA;first names, last names, location and additional information such as date of birth or work place. There are 188201 entries for Luxembourg. Facebook mentioned that the vulnerability used to&#xA;extract the information was reported and fixed in 2019.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-63 - Vulnerabilities and Exploitation of Pulse Connect Secure</title>
      <link>https://new.circl.lu/pub/tr-63/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-63/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Multiple organisations in various countries were compromised using Ivanti Pulse Connect Secure products. The threat-actor(s)&#xA;used different old and new vulnerabilities to gain access to publicly facing Pulse Connect Secure devices. The vulnerabilities&#xA;exploited are the following:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2019-11510&#34;&gt;CVE-2019-11510&lt;/a&gt; - In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability.&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2020-8260&#34;&gt;CVE-2020-8260&lt;/a&gt; - A vulnerability in the Pulse Connect Secure &amp;lt; 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2020-8243&#34;&gt;CVE-2020-8243&lt;/a&gt; - A vulnerability in the Pulse Connect Secure &amp;lt; 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.&lt;/li&gt;&#xA;&lt;li&gt;new (and unpublished) &lt;a href=&#34;https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/&#34;&gt;CVE-2021-22893&lt;/a&gt; - SA44784 - 2021-04: Out-of-Cycle Advisory: Pulse Connect Secure RCE Vulnerability. Vulnerability in Pulse Connect Secure allows a remote unauthenticated attacker to execute arbitrary code via unspecified vectors.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;recommendation&#34;&gt;Recommendation&lt;/h2&gt;&#xA;&lt;p&gt;The vendor states on their website &lt;code&gt;The solution for these vulnerabilities (CVE-2021-22893) is to upgrade the Pulse Connect Secure server software version to the 9.1R.11.4 We will update the advisory once the timelines are available.&lt;/code&gt;. The new updated software is not published yet. But there is a &lt;a href=&#34;https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/&#34;&gt;workaround XML file&lt;/a&gt; to disable the vulnerable features such as &amp;ldquo;Windows File Share Browser&amp;rdquo; and &amp;ldquo;Pulse Secure Collaboration&amp;rdquo;. Reboot is required after the application of the workaround.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-64 - Exploited Exchange Servers - Mails with links to malware from known/valid senders</title>
      <link>https://new.circl.lu/pub/tr-64/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-64/</guid>
      <description>&lt;h2 id=&#34;what-have-we-observed&#34;&gt;What have we observed?&lt;/h2&gt;&#xA;&lt;p&gt;Several organizations received complaints about the fact that their email accounts are sending spam, phishing and infected emails to their partner organizations.&#xA;The emails are usually replies to ongoing email threads, where an attacker pastes a greeting sentence and URLs above the original mail content.&lt;/p&gt;&#xA;&lt;p&gt;Attackers/adversaries do that to improve the social acceptance rate of their malspam. Indeed this strategy seems to be very successful.&lt;/p&gt;&#xA;&lt;p&gt;Here a sample in English: (URLs are disarmed)&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-65 - Vulnerabilities and Exploitation of Log4j (Remote code injection in Log4j)</title>
      <link>https://new.circl.lu/pub/tr-65/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-65/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://github.com/advisories/GHSA-jfh8-c2jp-5v3q&#34;&gt;CVE-2021-44228&lt;/a&gt; vulnerability enables remote code injection on systems running Log4j. The attacker has to trigger a log entry generation containing a JNDI request. The vulnerability can be exploited without authentication. The exploit needs to be processed by Log4j. Impacted Log4j versions are: 2.0 to 2.15.0. The fix was partial for version 2.15.0 as additional vulnerabilities such as &lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-45046&#34;&gt;CVE-2021-45046&lt;/a&gt; were published in 2.16.0. Later version 2.17.0 was published fixing an additional vulnerability &lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-45105&#34;&gt;CVE-2021-45105&lt;/a&gt;. Then version 2.17.1 was published fixing an additional vulnerability &lt;a href=&#34;https://cvepremium.circl.lu/cve/CVE-2021-44832&#34;&gt;CVE-2021-44832&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-66 - Webservers with mod_status like debug modules publicly available leak information</title>
      <link>https://new.circl.lu/pub/tr-66/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-66/</guid>
      <description>&lt;h2 id=&#34;what-have-we-observed&#34;&gt;What have we observed?&lt;/h2&gt;&#xA;&lt;p&gt;Badly configured web servers expose server-side status pages for debug and performance monitoring purposes. Those status pages include client requests, including the partial or full GET request.&#xA;With badly designed web services, this will leak information that can be used by the attacker, to either gain access to the web service or gather valuable information about the back-end infrastructure.&lt;/p&gt;&#xA;&lt;p&gt;An example can be found on the &lt;a href=&#34;http://status.localhost.lu&#34;&gt;following link&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-67 - local privilege escalation vulnerability in polkit&#39;s pkexec utility.</title>
      <link>https://new.circl.lu/pub/tr-67/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-67/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;A vulnerability &lt;a href=&#34;https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt&#34;&gt;CVE-2021-4034&lt;/a&gt; was discovered in the the tool pkexec (part of &lt;code&gt;polkit&lt;/code&gt;) included in many&#xA;Linux distributions such as Ubuntu and Redhat in a package called PolicyKit. The CVSS s3 Base Score is 7.8.&lt;/p&gt;&#xA;&lt;p&gt;The attack complexity is very low and enables privilege escalation resulting&#xA;in root access on the operating system. The vulnerability&#xA;can even be exploited by users not being sudoers.&lt;/p&gt;&#xA;&lt;p&gt;All versions before 0.105 (included) of Polkit (formerly PolicyKit).&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-68 - Best practices in times of tense geopolitical situations</title>
      <link>https://new.circl.lu/pub/tr-68/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-68/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Geopolitical conflicts can be the effect of complex political situations. Tragically, they might result in wars or warlike operations.  The situation can even get more complicated when surrounding countries, allies and partners threaten with consequences and sanctions.  In the digital world, and keeping the above dynamic in mind, it is not unusual to see an increased activity when it comes to cyber attacks towards other countries&amp;rsquo; government infrastructure, prominent targets or simply whatever looks like low hanging fruit.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-69 - How to choose an ICT supplier from a security perspective</title>
      <link>https://new.circl.lu/pub/tr-69/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-69/</guid>
      <description>&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;p&gt;In the past we saw some IT suppliers not taking appropriate care on their customers IT security. So we decide to release a document which can help mall and medium-sized enterprises (SMEs) to evaluate the IT security services of their suppliers.&lt;/p&gt;&#xA;&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;According to the European Commission, small and medium-sized enterprises (SMEs) represent 99% of all businesses in the EU [1].&lt;/p&gt;&#xA;&lt;p&gt;SMEs often do not has resources to setup and maintain their IT infrastructure internally and on their own. The alternative to outsource this activities to ICT suppliers became a very popular and legit alternative. At least to the point where the ICT suppliers take their job serious especially with the point of view on IT security aspects.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-70 - Vulnerabilities in Microsoft Exchange CVE-2022-41040 - CVE-2022-41082</title>
      <link>https://new.circl.lu/pub/tr-70/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-70/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;Two vulnerabilities were reported and affect Microsoft Exchange Server (on-premise).&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41040&#34;&gt;CVE-2022-41040&lt;/a&gt; - Microsoft Exchange Server Elevation of Privilege Vulnerability&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41082&#34;&gt;CVE-2022-41082&lt;/a&gt; - Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Microsoft Exchange 2013 &lt;code&gt;cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Microsoft Exchange 2016 &lt;code&gt;cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Microsoft Exchange 2019 &lt;code&gt;cpe:2.3:a:microsoft:exchange_server:2019:*:*:*:*:*:*:*&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;scope-of-the-problem&#34;&gt;Scope of the problem&lt;/h2&gt;&#xA;&lt;p&gt;The vulnerability, when exploited, allows an attacker to remotely control the Exchange Server.&#xA;While the vulnerability can only be exploited by authenticated users, it must be understood that any email user credentials will probably qualify as an authenticated user. Attackers that possess lists of phished credentials can benefit from it for their criminal purposes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-71 - FortiOS - heap-based buffer overflow in sslvpnd (exploited) - FortiOS SSL-VPN - CVE-2022-42475</title>
      <link>https://new.circl.lu/pub/tr-71/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-71/</guid>
      <description>&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;&#xA;&lt;p&gt;A heap-based buffer overflow vulnerability in FortiOS SSL-VPN may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;FortiGuard Labs PSIRT &lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-22-398&#34;&gt;Advisories&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems&#34;&gt;Vulnerable systems&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;FortiOS version 7.2.0 through 7.2.2&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 7.0.0 through 7.0.8&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 6.4.0 through 6.4.10&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 6.2.0 through 6.2.11&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 6.0.0 through 6.0.15&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 5.6.0 through 5.6.14&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 5.4.0 through 5.4.13&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 5.2.0 through 5.2.15&lt;/li&gt;&#xA;&lt;li&gt;FortiOS version 5.0.0 through 5.0.14&lt;/li&gt;&#xA;&lt;li&gt;FortiOS-6K7K version 7.0.0 through 7.0.7&lt;/li&gt;&#xA;&lt;li&gt;FortiOS-6K7K version 6.4.0 through 6.4.9&lt;/li&gt;&#xA;&lt;li&gt;FortiOS-6K7K version 6.2.0 through 6.2.11&lt;/li&gt;&#xA;&lt;li&gt;FortiOS-6K7K version 6.0.0 through 6.0.14&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;scope-of-the-problem&#34;&gt;Scope of the problem&lt;/h2&gt;&#xA;&lt;p&gt;The vulnerability is exploited for some time (the exact date of the beginning of exploitation is unknown). If you have a FortiOS device with the SSL-VPN publicly accessible, you should consider a standard incident response procedure (even if you have auto-update activated).&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-72 - Vulnerable Microsoft Exchange server metrics leading to alarming situation</title>
      <link>https://new.circl.lu/pub/tr-72/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-72/</guid>
      <description>&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;&#xA;&lt;p&gt;Many Microsoft Exchange Servers are left unmaintained, when it comes to patching them with the latest security updates.&#xA;This introduces an enormous risk for the companies using those servers.&lt;/p&gt;&#xA;&lt;p&gt;The main risks are:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;a potential compromise of the server&lt;/li&gt;&#xA;&lt;li&gt;accessing of private, confidential and/or business related data by third parties&lt;/li&gt;&#xA;&lt;li&gt;unwanted modification or deletion of data&lt;/li&gt;&#xA;&lt;li&gt;exfiltration of data&lt;/li&gt;&#xA;&lt;li&gt;lateral movement and infection of other parts of the infrastructure&lt;/li&gt;&#xA;&lt;li&gt;financial loss through blackmailing&lt;/li&gt;&#xA;&lt;li&gt;productivity and financial loss by re-installing the infrastructure&lt;/li&gt;&#xA;&lt;li&gt;reputation loss&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Unfortunately, it is not uncommon to end up with a compromised Exchange server. We have seen countless cases in the last years.&#xA;Vulnerabilities in Exchange are quite frequent and most of the time they have a high CVSS. Remote Code Execution Vulnerabilities are patched every few months.&#xA;If these vulnerabilites are not patched by the updates of Microsoft or otherwise mitigated, there is a severe risk of the server being rapidly compromised.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-73 - Ransomware FAQ</title>
      <link>https://new.circl.lu/pub/tr-73/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-73/</guid>
      <description>&lt;h2 id=&#34;ransomware---definition&#34;&gt;Ransomware - Definition&lt;/h2&gt;&#xA;&lt;p&gt;A crypto ransomware is a type of malware that - when successfully executed - enumerates all (locally and remotely) accessible files and uses a strong cryptographic algorithm in order to encrypt the files the malware is configured to process. When the malware is implementing the cryptographic part correctly, it is practically impossible to decrypt the affected files without possessing the right key. From the victim&amp;rsquo;s point of view, the content of the files is lost. It can only be recovered by purchasing the key from the criminals or, if available, by restoring the files from a functioning backup which wasn&amp;rsquo;t accessible during the enumeration and encryption phase. In some cases, attackers may be able to gain full access to the infrastructure and destroy the backups from the backup server, making the recovery impossible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-74 - A heap-based buffer overflow vulnerability [CWE-122] in FortiOS - CVE-2023-27997</title>
      <link>https://new.circl.lu/pub/tr-74/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-74/</guid>
      <description>&lt;p&gt;A heap-based buffer overflow vulnerability (CWE-122) has been identified in FortiOS and FortiProxy SSL-VPN. This vulnerability allows a remote attacker to execute arbitrary code and commands by sending specially crafted requests.&lt;/p&gt;&#xA;&lt;h2 id=&#34;workaround&#34;&gt;Workaround&lt;/h2&gt;&#xA;&lt;p&gt;To mitigate the risk, it is recommended to disable SSL-VPN on the FortiOS device.&lt;/p&gt;&#xA;&lt;h2 id=&#34;recommendations&#34;&gt;Recommendations&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;For FortiOS equipment users: Check if the currently running version is the latest one. If not, apply &lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-23-097&#34;&gt;the available upgrades&lt;/a&gt; or implement the provided workaround.&lt;/li&gt;&#xA;&lt;li&gt;If you rely on a service provider for security updates: Request information about the installed version and the most recent version available. If there is a discrepancy, insist on performing the upgrade.&lt;/li&gt;&#xA;&lt;li&gt;If suspicious activity is detected in the logs indicating a compromised FortiOS device, initiate an incident response procedure. Patching alone is not sufficient if you don&amp;rsquo;t review logs and evidences.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;notifications&#34;&gt;Notifications&lt;/h2&gt;&#xA;&lt;p&gt;CIRCL (Computer Incident Response Center Luxembourg) has sent notifications to ISPs and known contact points when publicly exposed vulnerable devices were discovered. If you would like to directly share your IP resources for notifying the appropriate contact point, please reach out to us.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-75 - Unauthenticated remote code execution vulnerability in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) - CVE-2023-3519</title>
      <link>https://new.circl.lu/pub/tr-75/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-75/</guid>
      <description>&lt;p&gt;CVE-2023-3519 is a remote code execution (RCE) vulnerability that could allow an unauthenticated threat actor to execute arbitrary code on a vulnerable server. According to &lt;a href=&#34;https://www.helpnetsecurity.com/2023/07/19/cve-2023-3519/&#34;&gt;Helpnetsecurity&lt;/a&gt;, at this time there is no public PoC, but the vulnerability has been observed being exploited in the wild.&lt;/p&gt;&#xA;&lt;h2 id=&#34;affected-products&#34;&gt;Affected Products&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.13&lt;/li&gt;&#xA;&lt;li&gt;NetScaler ADC and NetScaler Gateway 13.0 before 13.0-91.13&lt;/li&gt;&#xA;&lt;li&gt;NetScaler ADC 13.1-FIPS before 13.1-37.159&lt;/li&gt;&#xA;&lt;li&gt;NetScaler ADC 12.1-FIPS before 12.1-55.297&lt;/li&gt;&#xA;&lt;li&gt;NetScaler ADC 12.1-NDcPP before 12.1-55.297&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;remediation&#34;&gt;Remediation&lt;/h2&gt;&#xA;&lt;p&gt;Patches have been released to address this vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-76 - Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS</title>
      <link>https://new.circl.lu/pub/tr-76/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-76/</guid>
      <description>&lt;p&gt;Microsoft researchers focusing on industrial control system found a significant number of vulnerabilities in CODESYS V3 software development kit which is used&#xA;in multiple industrial devices such as programmable logic controllers (PLC).&lt;/p&gt;&#xA;&lt;h2 id=&#34;affected-products&#34;&gt;Affected Products&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;all versions of CODESYS V3 prior to version 3.5.19.0&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;All variants of the following CODESYS V3 products in all versions prior V3.5.19.0 containing at least one of the&#xA;components CmpApp, CmpAppBP, CmpAppForce, CmpFiletransfer or CmpTraceMgr are affected, regardless&#xA;of the CPU type or operating system:&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-77 - Spear phishing and voice call scams targeting corporate executives and their accounting department</title>
      <link>https://new.circl.lu/pub/tr-77/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-77/</guid>
      <description>&lt;p&gt;This is an on-going voice call scam campaign which is targeting large companies and SMEs, and more specifically the financial/accounting departments of these companies. This scam has been on the rise in Luxembourg over the past days (late August 2023).&lt;/p&gt;&#xA;&lt;h2 id=&#34;sample-case&#34;&gt;Sample Case&lt;/h2&gt;&#xA;&lt;p&gt;Below, you will find a sample phone call in English but can be also in French:&lt;/p&gt;&#xA;&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;My name is &amp;#39;Maître Guérin&amp;#39;. I am a lawyer from KPMG. I like to inform you about a pending invoice.&#xA;&#xA;The president will send you an email to confirm the importance and confidentiality of the situation.&#xA;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Than usually short time later the victim will receive a fake email like this impersonating the president/executive and spoofing a CSSF (or other regulator) with a similar email address.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-78 - CVE-2023-46805 (Authentication Bypass) &amp; CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways &#43; CVE-2024-21888 &#43; CVE-2024-21893</title>
      <link>https://new.circl.lu/pub/tr-78/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-78/</guid>
      <description>&lt;p&gt;Ivanti has issued a security patch to rectify two significant vulnerabilities in all supported versions (9.x and 22.x) of Connect Secure and Policy Secure gateways. These include an authentication bypass issue (CVE-2023-46805) and a command injection flaw (CVE-2024-21887). If exploited, these vulnerabilities could enable a cyber threat actor to seize control of the impacted system. In addition to the two previous vulnerabilities, CVE-2024-21888 and CVE-2024-21893 are affecting Ivanti Connect Secure and Ivanti Policy Secure. CVE-2024-21888 is a privilege escalation vulnerability in web component allows a user to elevate privileges to that of an administrator. CVE-2024-21893 is a server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-79 - AnyDesk Incident and Potential Associated Supply Chain Attack</title>
      <link>https://new.circl.lu/pub/tr-79/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-79/</guid>
      <description>&lt;p&gt;An &lt;a href=&#34;https://anydesk.com/en/public-statement&#34;&gt;incident occurred at AnyDesk&lt;/a&gt; (reported on February 2, 2024), which appears to have been first detected on January 24, 2024, as indicated by the revocation of a certificate.&lt;/p&gt;&#xA;&lt;p&gt;While AnyDesk Software GmbH has not confirmed any compromise of their software package signing materials or any impact on end-user services, several &lt;a href=&#34;https://twitter.com/TriggerMeHappy/status/1753718692108554517&#34;&gt;security researchers have been actively investigating&lt;/a&gt; the potential use of AnyDesk&amp;rsquo;s key materials in malware signing.&lt;/p&gt;&#xA;&lt;h2 id=&#34;recommendations&#34;&gt;Recommendations&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Review the software installed from AnyDesk Software GmbH, paying particular attention to the associated usage or audit trails of the service.&lt;/li&gt;&#xA;&lt;li&gt;Execute the YARA rules mentioned below.&lt;/li&gt;&#xA;&lt;li&gt;Follow the latest advice from AnyDesk Software GmbH, including updating their software to the newest version.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems-in-luxembourg&#34;&gt;Vulnerable systems in Luxembourg&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;There are users of the AnyDesk software in Luxembourg, but we are not aware of any exploitation or incidents related to this matter.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;detection-and-incident-response&#34;&gt;Detection and Incident Response&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;YARA rules to detect Potential detection: AnyDesk certificate used, AnyDesk certificate used, but unrelated PE info and malicious AnyDesk .NET &lt;a href=&#34;https://stairwell.com/resources/proactive-response-anydesk-any-breach/&#34;&gt;available at stairwell&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;YARA rules to detect compromised signing certificate of AnyDesk &lt;a href=&#34;https://github.com/Neo23x0/signature-base/blob/master/yara/gen_anydesk_compromised_cert_feb23.yar&#34;&gt;signature-base/yara&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Compromised vendor &lt;a href=&#34;https://anydesk.com/en/public-statement&#34;&gt;AnyDesk Incident Response 2-2-2024&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Reporter &lt;a href=&#34;https://stairwell.com/resources/proactive-response-anydesk-any-breach/&#34;&gt;Proactive response: AnyDesk, any breach&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;classification-of-this-document&#34;&gt;Classification of this document&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://new.circl.lu/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt; information may be distributed without restriction, subject to copyright controls.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-80 - Targeted SMS and fake phone center call targeting financial/banking services</title>
      <link>https://new.circl.lu/pub/tr-80/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-80/</guid>
      <description>&lt;h2 id=&#34;recent-phishing-scheme-combines-sms-alerts-and-fraudulent-call-center-tactics&#34;&gt;Recent Phishing Scheme Combines SMS Alerts and Fraudulent Call Center Tactics&lt;/h2&gt;&#xA;&lt;p&gt;A newly identified phishing scam has emerged, employing SMS alerts that issue a fraud warning. These messages direct victims to a phone number located within the same country. Callers are greeted by what appears to be an official service, dubiously named &amp;lsquo;Centre Monétique Interbancaire de la Lutte Contre la Fraude&amp;rsquo; or, in English, &amp;lsquo;Electronic Payment Center for the Fight Against Fraud.&amp;rsquo; The initial telephone system recording is designed to sound professional, creating a facade of legitimacy. Following this recording, callers are connected to a supposed operator. This individual then requests various details typically required for blocking a card. However, in reality, the attacker exploits this information for fraudulent purposes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-81 - Critical FortiOS vulnerabilities in sslvpnd and fgfmd</title>
      <link>https://new.circl.lu/pub/tr-81/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-81/</guid>
      <description>&lt;p&gt;Two critical vulnerabilities in FortiOS:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;A out-of-bounds write vulnerability [CWE-787] in FortiOS allows a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests. FG-IR-24-015 - CVE-2024-21762&lt;/li&gt;&#xA;&lt;li&gt;A use of externally-controlled format string vulnerability [CWE-134] in FortiOS fgfmd daemon allows a remote unauthentified attacker to execute arbitrary code or commands via specially crafted requests. FG-IR-24-029 - CVE-2024-23113&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;recommendations&#34;&gt;Recommendations&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Check the &lt;a href=&#34;https://docs.fortinet.com/upgrade-tool&#34;&gt;Fortinet upgrade tool&lt;/a&gt; to determine which version to install.&lt;/li&gt;&#xA;&lt;li&gt;If you are using SSL VPN in FortiOS, Fortinet recommends disabling the SSL VPN as a workaround.&lt;/li&gt;&#xA;&lt;li&gt;CIRCL advises initiating an incident response procedure, reviewing all logs, and especially scrutinizing any potential access from the VPN to other internal infrastructure.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;vulnerable-systems-in-luxembourg-and-exploitation&#34;&gt;Vulnerable systems in Luxembourg and Exploitation&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;The number of exposed devices running FortiOS within the IPv4 ranges of Luxembourg exceeds 650. These devices vary widely in their versions. We strongly recommend that any users or organizations using FortiOS review their current inventory, test the version, and assess their actual exposure.&lt;/li&gt;&#xA;&lt;li&gt;Fortinet/FortiGuard Labs has confirmed the exploitation of CVE-2024-21762/FG-IR-24-015.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;detection-and-incident-response&#34;&gt;Detection and Incident Response&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;As of now, there are no detection rules available for these two vulnerabilities.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Vendor &lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-24-015&#34;&gt;FortiOS - Out-of-bound Write in sslvpnd&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;Vendor &lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-24-029&#34;&gt;FortiOS - Format String Bug in fgfmd&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;classification-of-this-document&#34;&gt;Classification of this document&lt;/h2&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://new.circl.lu/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt; information may be distributed without restriction, subject to copyright controls.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-82 - backdoor discovered in xz-utils - CVE-2024-3094</title>
      <link>https://new.circl.lu/pub/tr-82/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-82/</guid>
      <description>&lt;p&gt;On March 29th, 2024, a backdoor (CVE-2024-3094) was discovered in xz-utils by &lt;a href=&#34;https://www.openwall.com/lists/oss-security/2024/03/29/4&#34;&gt;Andres Freund&lt;/a&gt; while debugging some performance issue on an sshd daemin. The xz-utils package is commonly used for compressing release tarballs, software packages, kernel images, initramfs images and many others. The xz-utils include the liblzma library used by various software including sshd which is one of the known technique to abuse the backdoor.&lt;/p&gt;&#xA;&lt;h2 id=&#34;detection&#34;&gt;Detection&lt;/h2&gt;&#xA;&lt;p&gt;We recommend reviewing the dynamic linking of the sshd daemon (as it&amp;rsquo;s one of the known ways to use the backdoor) to ensure there is no link to liblzma. You can do this by using the command  &lt;code&gt;ldd &amp;quot;$(command -v sshd)&amp;quot;&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-83 - Linux Boot Hardening HOWTO</title>
      <link>https://new.circl.lu/pub/tr-83/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-83/</guid>
      <description>&lt;h2 id=&#34;linux-boot-hardening&#34;&gt;Linux Boot Hardening&lt;/h2&gt;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;Having an encrypted disk to store your root file system and other files is good to protect your data from being read or tampered with &lt;strong&gt;offline&lt;/strong&gt;. The way many Linux installations are made is by leaving a &lt;strong&gt;boot partition&lt;/strong&gt; &lt;code&gt;/boot&lt;/code&gt; un-encrypted and thus modifiable. So what prevents someone to tamper with your kernel or your boot loader &amp;hellip; nothing, if secure boot is not implemented.  Loading a malicious boot loader or kernel would completely break the security of your setup, as all your encrypted data would finally become accessible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-84 - PAN-OS (Palo Alto Networks) OS Command Injection Vulnerability in GlobalProtect Gateway - CVE-2024-3400</title>
      <link>https://new.circl.lu/pub/tr-84/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-84/</guid>
      <description>&lt;p&gt;A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. All other versions of PAN-OS are also not impacted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-85 - Three vulnerabilities in Cisco ASA software/appliance and FTD software being exploited</title>
      <link>https://new.circl.lu/pub/tr-85/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-85/</guid>
      <description>&lt;p&gt;Three vulnerabilities (&lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2024-20359&#34;&gt;CVE-2024-20359&lt;/a&gt;, &lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2024-20358&#34;&gt;CVE-2024-20358&lt;/a&gt;, and &lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2024-20353&#34;&gt;CVE-2024-20353&lt;/a&gt;) in Cisco ASA (Adaptive Security Appliance) software/appliance and FTD (Firepower Threat Defense) software have been discovered and published by Cisco as being actively exploited.&lt;/p&gt;&#xA;&lt;h2 id=&#34;fixes&#34;&gt;Fixes&lt;/h2&gt;&#xA;&lt;p&gt;Cisco provides software updates known as SSU (Security Software Update). We strongly recommend users update to the latest version and conduct further investigations as suggested below for signs of compromise.&lt;/p&gt;&#xA;&lt;h2 id=&#34;detection-and-investigative-assessment&#34;&gt;Detection and investigative assessment&lt;/h2&gt;&#xA;&lt;p&gt;We strongly recommend users of Cisco ASA equipment follow the &lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/resources/forensic_guides/asa_forensic_investigation.html&#34;&gt;Cisco ASA Forensic Investigation Procedures for First Responders&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-86 - Check Point VPN Information Disclosure (CVE-2024-24919) - Actively Exploited</title>
      <link>https://new.circl.lu/pub/tr-86/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-86/</guid>
      <description>&lt;p&gt;A critical information disclosure vulnerability (CVE-2024-24919) exists in Check Point VPN. Successful exploitation of this vulnerability allows a remote attacker to obtain sensitive information, including key materials, user credentials, and configuration files from the operating system.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-version-and-products&#34;&gt;Vulnerable Version And Products&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40.&lt;/li&gt;&#xA;&lt;li&gt;Check Point Spark versions R81.10, R80.20.&lt;/li&gt;&#xA;&lt;li&gt;CloudGuard Network&lt;/li&gt;&#xA;&lt;li&gt;Quantum Maestro&lt;/li&gt;&#xA;&lt;li&gt;Quantum Scalable Chassis&lt;/li&gt;&#xA;&lt;li&gt;Quantum Security Gateways&lt;/li&gt;&#xA;&lt;li&gt;Quantum Spark Appliances&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;fixes&#34;&gt;Fixes&lt;/h2&gt;&#xA;&lt;p&gt;Check point published &lt;a href=&#34;https://support.checkpoint.com/results/sk/sk182336&#34;&gt;Preventative Hotfix for CVE-2024-24919 - Quantum Gateway Information Disclosure&lt;/a&gt; which includes the details about the hotfix to prevent the exploitation of the vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-87 - CrowdStrike Agent causing BSOD loop on Windows - Faulty Update on Falcon Sensor</title>
      <link>https://new.circl.lu/pub/tr-87/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-87/</guid>
      <description>&lt;p&gt;CrowdStrike Agent causing BSOD loop on Windows - Faulty Update on Falcon Sensor.&lt;/p&gt;&#xA;&lt;h2 id=&#34;vulnerable-version-and-products&#34;&gt;Vulnerable Version And Products&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Latest version of CrowdStrike Falcon Agent on Windows&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;fixes-and-workaround&#34;&gt;Fixes and workaround&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Boot Windows into Safe Mode or the Windows Recovery Environment&lt;/li&gt;&#xA;&lt;li&gt;Navigate to the C:\Windows\System32\drivers\CrowdStrike directory&lt;/li&gt;&#xA;&lt;li&gt;Locate the file matching &lt;code&gt;C-00000291*.sys&lt;/code&gt;, and delete it.&lt;/li&gt;&#xA;&lt;li&gt;Boot the host normally.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;We received reports that only the Windows Recovery Environment mode works, as the driver still seems to be loaded in safe mode.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-88 - Motivation, procedure and rationale for leaked credential notifications</title>
      <link>https://new.circl.lu/pub/tr-88/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-88/</guid>
      <description>&lt;h2 id=&#34;motivation-procedure-and-rationale-for-leaked-credential-notifications&#34;&gt;Motivation, Procedure, and Rationale for Leaked Credential Notifications&lt;/h2&gt;&#xA;&lt;h3 id=&#34;summary&#34;&gt;Summary&lt;/h3&gt;&#xA;&lt;p&gt;In today’s digital landscape, protecting user data is essential for every organization.&#xA;When public data leaks expose customer credentials, it is critical to respond promptly to mitigate risks.&#xA;This document outlines why CIRCL sends notifications about such leaks and explains the procedure we expect organizations to follow.&#xA;The goal is to safeguard both the organization&amp;rsquo;s infrastructure and its customers, while ensuring compliance with legal requirements and maintaining trust.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-89 - Guidelines for Notifying CSIRT/CERT of Red Teaming and Penetration Testing Exercises - Enhancing Detection and Coordination</title>
      <link>https://new.circl.lu/pub/tr-89/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-89/</guid>
      <description>&lt;h2 id=&#34;objective&#34;&gt;Objective&lt;/h2&gt;&#xA;&lt;p&gt;This document outlines recommended practices for notifying Computer Security Incident Response Teams (CSIRT) and Computer Emergency Response Teams (CERT) when organizations plan to conduct red teaming, penetration testing, or other cybersecurity exercises. It highlights the importance of communication, coordination, and technical readiness to detect and differentiate simulated attacks from real threats.&lt;/p&gt;&#xA;&lt;h2 id=&#34;who&#34;&gt;Who&lt;/h2&gt;&#xA;&lt;p&gt;The guidelines are applicable to organizations (in Luxembourg or abroad) performing security exercises that involve simulated attacks on production or critical infrastructure, especially those that could trigger alerts in national or sectoral CSIRTs and CERTs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-90 - Vulnerability identified as CVE-2023-34990, affecting Fortinet FortiWLM</title>
      <link>https://new.circl.lu/pub/tr-90/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-90/</guid>
      <description>&lt;p&gt;A relative path traversal vulnerability has been discovered in Fortinet FortiWLM versions 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4. This vulnerability allows an attacker to execute unauthorized code or commands by sending specially crafted web requests.&lt;/p&gt;&#xA;&lt;h2 id=&#34;affected-products&#34;&gt;Affected Products&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Vendor:&lt;/strong&gt; Fortinet&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Product:&lt;/strong&gt; FortiWLM&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Versions:&lt;/strong&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;8.6.0 through 8.6.5 (inclusive)&lt;/li&gt;&#xA;&lt;li&gt;8.5.0 through 8.5.4 (inclusive)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;vulnerability-class&#34;&gt;Vulnerability Class&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;CWE-23:&lt;/strong&gt; Relative Path Traversal&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;CWE-94:&lt;/strong&gt; Improper Control of Generation of Code (&amp;lsquo;Code Injection&amp;rsquo;)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;impact&#34;&gt;Impact&lt;/h2&gt;&#xA;&lt;p&gt;Successful exploitation of this vulnerability could lead to the execution of arbitrary code or commands on the affected system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-91 - Vulnerability identified as CVE-2024-0012, affecting Palo Alto Networks PAN-OS software</title>
      <link>https://new.circl.lu/pub/tr-91/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-91/</guid>
      <description>&lt;p&gt;An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges. This allows the attacker to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like &lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2024-9474&#34;&gt;CVE-2024-9474&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;The risk is greatly reduced if access to the management web interface is restricted to trusted internal IP addresses, adhering to &lt;a href=&#34;https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431&#34;&gt;best practice deployment guidelines&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-92 - Unused Domain Names and the Risks of Missing DNS SPF Records</title>
      <link>https://new.circl.lu/pub/tr-92/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-92/</guid>
      <description>&lt;h2 id=&#34;executive-summary&#34;&gt;Executive Summary&lt;/h2&gt;&#xA;&lt;p&gt;Many organizations maintain a broad portfolio of domain names, acquired for branding, strategic planning, or defensive purposes. However, a significant portion of these domains often remains unused or lacks proper DNS configurations, leaving them vulnerable to exploitation. One particularly critical oversight is the absence of DNS SPF (Sender Policy Framework) TXT records, which are essential to controlling the sources from which emails for a domain can be legitimately sent. This document highlights the risks associated with improperly configured domains and provides actionable recommendations to mitigate such vulnerabilities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-94 - Ongoing Phishing Campaigns Targeting Microsoft 365 Tenants Lacking Multi-Factor Authentication</title>
      <link>https://new.circl.lu/pub/tr-94/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-94/</guid>
      <description>&lt;h2 id=&#34;executive-summary&#34;&gt;Executive Summary&lt;/h2&gt;&#xA;&lt;p&gt;This report details ongoing phishing campaigns specifically targeting organisations utilizing Microsoft 365, with a primary focus on Office 365 tenants where Multi-Factor Authentication (MFA) is not enforced. Attackers leverage sophisticated social engineering tactics and convincing phishing pages to harvest user credentials. Successful compromise of accounts without MFA allows attackers immediate access, leading to potential data exfiltration, business email compromise (BEC), internal spear-phishing, and deployment of further malicious payloads. This report outlines the attack methodology, observed indicators, potential impact, and critical mitigation strategies, emphasizing the urgent need for MFA deployment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-95 - Critical vulnerability - Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. CVE-2025-53770 - CVE-2025-53771</title>
      <link>https://new.circl.lu/pub/tr-95/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-95/</guid>
      <description>&lt;p&gt;Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation. For more details about &lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2025-53770&#34;&gt;CVE-2025-53770&lt;/a&gt; and &lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2025-53771&#34;&gt;CVE-2025-53771&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-96 - Multiple Vulnerabilities in F5 Devices and Products - Impact and Mitigation</title>
      <link>https://new.circl.lu/pub/tr-96/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-96/</guid>
      <description>&lt;p&gt;A &lt;a href=&#34;https://my.f5.com/manage/s/article/K000154696&#34;&gt;nation-state actor has breached F5&amp;rsquo;s systems&lt;/a&gt; and stolen proprietary files, including portions of the BIG-IP source code and vulnerability details. This access gives the attacker a significant advantage, enabling them to discover new flaws and develop targeted exploits for F5 devices and software.&lt;/p&gt;&#xA;&lt;p&gt;This TR applies to a wide range of F5 products, including BIG-IP iSeries and rSeries hardware, as well as BIG-IP (TMOS), Virtual Edition (VE), BIG-IP Next, and BIG-IQ software.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-97 - Supply Chain Compromise Propagating Through the npm Ecosystem (Shai-Hulud)</title>
      <link>https://new.circl.lu/pub/tr-97/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-97/</guid>
      <description>&lt;p&gt;The incident involves a self-replicating worm, publicly referred to as “Shai-Hulud”, which has infected more than 500 npm packages, with an even broader impact in a second wave (Shai-Hulud 2.0) that delivered a different payload.&lt;/p&gt;&#xA;&lt;p&gt;After gaining initial access, the malicious threat actor deployed malware designed to scan affected environments for sensitive credentials and exfiltrate these. The second version included a destructive payload capable of deleting the user’s home directory.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TR-98 - Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 &amp; CVE-2026-1340) - Active Exploitation</title>
      <link>https://new.circl.lu/pub/tr-98/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/tr-98/</guid>
      <description>&lt;p&gt;Ivanti has released security updates for Endpoint Manager Mobile (EPMM) addressing two critical-severity vulnerabilities.&lt;/p&gt;&#xA;&lt;p&gt;Successful exploitation allows unauthenticated remote code execution. Active exploitation has been confirmed in the wild, both worldwide and in Luxembourg.&lt;/p&gt;&#xA;&lt;p&gt;CIRCL strongly recommends immediately initiating a full incident response procedure for all Ivanti EPMM instances, including compromise assessment and log review.&lt;/p&gt;&#xA;&lt;p&gt;As EPMM is a mobile endpoint management solution, a compromise of the EPMM server can result in severe impact, including full control over managed devices, lateral movements and access to sensitive data.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Traffic Light Protocol (TLP) version 2 - Classification and Sharing of Sensitive Information</title>
      <link>https://new.circl.lu/pub/traffic-light-protocol/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/traffic-light-protocol/</guid>
      <description>&lt;h2 id=&#34;traffic-light-protocol---tlpv2&#34;&gt;Traffic Light Protocol - TLPv2&lt;/h2&gt;&#xA;&lt;p&gt;The Traffic Light Protocol - or short: TLP - was designed with the objective to create a favorable classification scheme for sharing sensitive information while keeping the control over its distribution at the same time.&lt;/p&gt;&#xA;&lt;p&gt;Community: Under TLP, a community is a group who share common goals, practices, and informal trust relationships. A community can be as broad as all cybersecurity practitioners in a country (or in a sector or region) or MISP community.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Understanding and Responding to Distributed Denial-of-Service Attacks</title>
      <link>https://new.circl.lu/pub/responding-to-ddos-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://new.circl.lu/pub/responding-to-ddos-attacks/</guid>
      <description>&lt;p&gt;Denial-of-service (DoS) attacks aim to overwhelm a specific application or website, draining the system&amp;rsquo;s resources and making it unavailable to legitimate users. There are several types of DoS attacks:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;Network Resource Overload&lt;/strong&gt;: This involves exhausting all available network capacities of the target, either through:&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Direct attacks like exploiting server weaknesses or flooding servers with excessive requests.&lt;/li&gt;&#xA;&lt;li&gt;Reflection amplification attacks, where the attacker uses a third-party server to redirect a large amount of traffic to the target, using spoofed IP addresses.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Protocol Resource Overload&lt;/strong&gt;: Targets the session or connection capacities of the system.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;Application Resource Overload&lt;/strong&gt;: Focuses on using up the target&amp;rsquo;s computing or storage capabilities.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;A DDoS attack isn&amp;rsquo;t solely about overwhelming volume; it can also target specific aspects of a network or application to exhaust resources. Such attacks may focus on exploiting vulnerabilities in protocols or applications, causing disruption without necessarily generating high traffic volumes.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
