REMOTE CODE EXECUTION HAS BEEN THE MOST DANGEROUS ABUSED EXPLOITED ATTACK THIS MONTH
Microsoft released critical security updates for Windows and Visual Studio Two remote code execution (RCE) bugs in the Windows Codecs library and Visual Studio Code added to another critical in Windows TCP/IP totalling 87 vulnerabilities patched this month.
ZD
Microsoft addressed over 112 CVEs in its November release, including a zero-day vulnerability in Windows kernel that was exploited in the wild as part of a targeted attack.
MS
Trickbot has infected over a million computing devices around the world since late 2016. While the exact identity of the operators is unknown, research suggests they serve both nation-states and criminal networks for a variety of objectives. A global network of security partners took action to takedown and remediate victims will be supported by internet service providers (ISPs) and computer emergency readiness teams (CERTs) around the world.
MS
Discord desktop app vulnerability chain triggered remote code execution attacks first security issue was found in Electron, the software framework used by the Discord desktop app. While the desktop app is not open source, the JavaScript code utilized by Electron -- an open source project for creating cross-platform apps able to harness JavaScript, HTML, and CSS -- was saved locally and could be extracted and examined.
ZD
800,000 SonicWall VPNs vulnerable to new remote code execution bug. Listed as CVE-2020-5135 an attacker can exploit it if the component is exposed on the WAN (public internet) interface, as long as they're aware of the device's IP address. An update available to patch this vulnerability!
AFFECTED PRODUCT(S)
SonicOS 6.5.4.6-79n and earlier
SonicOS 6.5.1.11-4n and earlier
SonicOS 6.0.5.3-93o and earlier
SonicOSv 6.5.4.4-44v-21-794 and earlier
SonicOS 7.0.0.0-1
SW
A new fileless attack technique that abuses the Microsoft Windows Error Reporting (WER) service is the work of a hacking group that is yet to be identified. A lure phishing document found by the team was packaged in a .ZIP file. Titled, "Compensation manual.doc," the file claims to contain information relating to worker compensation rights, when opened, is able to trigger a malicious macro. The macro uses a custom version of the CactusTorch VBA module to spring a fileless attack, made possible through shellcode.
MBL
SAP Security Patch Day saw the release of 15 Security Notes. There were 6 updates to previously released Patch Day Security Notes.
SAP
55 New Security Flaws in Apple Software and Services 29 high, 13 medium and 2 low severity vulnerabilities could allow an attacker to fully compromise both customer & employee applications, launch a worm capable of automatically taking over a victim's iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.
Securing election infrastructure from new and evolving threats is a vital national interest that requires a whole-of-society approach. This library provides State and local governments, election officials, campaigns, the vendor community, and voters with voluntary tools to secure election-related assets, facilities, networks and systems from cyber and physical risks.
HLS
CISA released Real / Fake—a graphic novel that communicates the dangers and risks associated with dis- and misinformation campaigns. The plot shows how threat actors capitalize on political and social issues (especially around election cycles) to plant doubt in the minds of targeted audiences and steer their opinion.
Download/share the Real Fake graphic novel and transcript.
#Protect2020
SW
Three packages plutov-slack-client, nodetest199, nodetest1010 have been removed from the npm portal for containing malicious code. the packages 1569, 1570, 1571 were found opening shells on Linux and Windows systems, Any computers that have installed or running these should be considered fully compromised and take necessary actions.
Starting with U.S. presidential elections in 2020, Microsoft's new program is global to engage around the world with other democratic countries in protecting their institutions and processes in the years to come. In partnership with governments and our industry colleagues, to put cybersecurity expertise to work for the defense of democracy. working with all stakeholders in democratic countries globally to:
Protect campaigns from hacking.
Increase political advertising transparency online.
Explore technological solutions.
Defend against disinformation campaigns.
MS
Chrome Zero day is under Active Attacks – Update to 86.0.4240.111 immediately to patch several security high-severity issues, that has been exploited in the wild by attackers to hijack targeted computers. Tracked as CVE-2020-15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open source software development library for rendering fonts that comes packaged with Chrome.
GC