<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Cisco Talos Blog]]></title><description><![CDATA[Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.]]></description><link>https://blog.talosintelligence.com/</link><image><url>https://blog.talosintelligence.com/favicon.png</url><title>Cisco Talos Blog</title><link>https://blog.talosintelligence.com/</link></image><generator>Ghost 5.106</generator><lastBuildDate>Thu, 16 Jan 2025 21:05:48 GMT</lastBuildDate><atom:link href="https://blog.talosintelligence.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Find the helpers]]></title><description><![CDATA[Bill discusses how to find 'the helpers' and the importance of knowledge sharing. Plus, there's a lot to talk about in our latest vulnerability roundup.]]></description><link>https://blog.talosintelligence.com/find-the-helpers/</link><guid isPermaLink="false">6788ee3567975a0001db38ba</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[William Largent]]></dc:creator><pubDate>Thu, 16 Jan 2025 19:15:38 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-2.jpg" alt="Find the helpers"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>&#x201C;When I was a boy and I would see scary things in the news, my mother would say to me, &#x2018;Look for the helpers. You will always find people who are helping.&#x2019;&#x201D;&#xA0;</p><p>&#xA0;&#x2015; Fred Rogers&#xA0;</p><p>There&#x2019;s no world where following Mr. Roger&#x2019;s advice is wrong. With the wildfires raging in Greater Los Angeles now more than ever I am very aware of the need to look for the helpers. I get it, I see the news and it&#x2019;s overwhelming and terrifying. So Gentle Reader I&#x2019;m asking that instead of just finding the helpers &#x2013; be the helper. &#xA0;<br>&#xA0;<br>I&#x2019;d like everyone to take a moment and think about what you can do to be a helper &#x2013; not just with the catastrophic fires and the incredible destruction but in your own world. In your home life and in your work life.&#xA0;Nothing is more intrinsic to information security than the sharing of knowledge and information. It&#x2019;s how we all got the roles that we are in now. The older I get the more joy I find in sharing anything and everything that I know. I&#x2019;m proud to be a mentor in Cisco&#x2019;s <a href="https://blogs.cisco.com/tag/women-in-cybersecurity" rel="noreferrer noopener"><u>Women in Cybersecurity</u></a> and outside of work I&#x2019;ve started volunteering to teach English as a second language &#x2013; and cannot tell you how rewarding both are. There are so many incredible non-profits that you can give your time and money. Do both. There are so many infosec groups that are in need of your time, your invaluable experience, and mentorship. Be the helper. Find a local group, find an internal team within your organization, and if you can&#x2019;t find one &#x2013; create one.  &#xA0;<br>&#xA0;<br>Be the helper. &#xA0;</p><p>Let&#x2019;s use this terrible event as a driver to push us all to do more to be the helpers. After all, what would Mr. Rogers do? &#xA0;</p><h2 id="the-one-big-thing">The one big thing&#xA0;</h2><p>Cisco Talos discovered forty-four vulnerabilities, and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.&#xA0; &#xA0;</p><p>&#xA0;The Wavlink AC3000 wireless router is one of the most popular gigabit routers in the US, in part due to both its potential speed capabilities and low price point. Talos is releasing these advisories in accordance with Cisco&#x2019;s third-party vulnerability&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p><br>An attacker can send a specially crafted set of network packets over WAN to gain root access to the router via the wcrtrl service and static login credentials. With the <a href="https://blog.talosintelligence.com/state-sponsored-campaigns-target-global-network-infrastructure/" rel="noreferrer noopener"><u>ongoing&#xA0;state-sponsored attacks on infrastructure</u></a> this is critical to a secure environment. &#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>&#xA0;<br>Cisco Talos has released several Snort rules and ClamAV signatures to detect and defend against the exploitation of these vulnerabilities. &#xA0;</p><h1 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h1><p>Hackers are exploiting a new Fortinet firewall bug to breach company networks. (<a href="https://techcrunch.com/2025/01/14/hackers-are-exploiting-a-new-fortinet-firewall-bug-to-breach-company-networks/" rel="noreferrer noopener"><u>TechCrunch</u></a>)&#xA0;</p><p>CISA is urging federal agencies to patch a command injection flaw tracked as CVE-2024-12686, otherwise known as BT24-11, and has added it to the Known Exploited Vulnerabilities (KEV) Catalog. The medium-severity security bug was found as a part of BeyondTrust&apos;s Remote Support SaaS Service security investigation, which was launched after a major data breach at the US Treasury Department. (<a href="https://www.darkreading.com/vulnerabilities-threats/cisa-warns-of-second-vuln-found-in-beyondtrust-breach-investigation" rel="noreferrer noopener"><u>DarkReading</u></a>) &#xA0;</p><p>Microsoft rings in 2025 with record security update. Microsoft has issued patches for an unprecedented 159 CVEs, including eight zero-days, three of which attackers are already exploiting. (<a href="https://www.darkreading.com/application-security/microsoft-january-2025-record-security-update" rel="noreferrer noopener"><u>DarkReading</u></a>) &#xA0;</p><h1 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t get enough Talos?&#xA0;</h1><ul><li><a href="https://blog.talosintelligence.com/slew-of-wavlink-vulnerabilities/" rel="noreferrer noopener"><u>Slew of Wavlink Vulnerabilities</u></a> &#xA0;</li><li><a href="https://blog.talosintelligence.com/the-evolution-and-abuse-of-proxy-networks/" rel="noreferrer noopener"><u>Evolution and Abuse of Proxy Networks</u></a>&#xA0;</li><li><a href="https://blog.talosintelligence.com/january-patch-tuesday-release/" rel="noreferrer noopener"><u>Patch Tuesday was a big one</u></a>&#xA0;</li></ul><figure class="kg-card kg-embed-card kg-card-hascaption"><iframe style="border-radius: 12px" width="100%" height="152" title="Spotify Embed: Exploring vulnerable Windows drivers" frameborder="0" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy" src="https://open.spotify.com/embed/episode/0J9skqjq8lB8Rop836O9Mc?si=1BjCE4WOS8GelaAI8zRsIw&amp;utm_source=oembed"></iframe><figcaption><p><span style="white-space: pre-wrap;">Our latest Talos Takes podcast sees Hazel sits down with Vanja Svajcer to discuss new research on vulnerable drivers.</span></p></figcaption></figure><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h2><p><a href="https://www.ciscolive.com/emea.html" rel="noreferrer noopener"><u>Cisco Live EMEA</u></a>&#x202F;(February 9-14, 2025)&#x202F; &#xA0;<br>Amsterdam, Netherlands&#xA0;</p><h2 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;&#xA0;</h2><p>&#xA0;SHA 256:7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5&#xA0; &#xA0;</p><p>MD5: ff1b6bb151cf9f671c929a4cbdb64d86&#xA0; &#xA0;</p><p>&#xA0;&#xA0;</p><p>VirusTotal : <a href="https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5&#xA0;" rel="noreferrer">https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5&#xA0;</a></p><p>Typical Filename: endpoint.query&#xA0; &#xA0;</p><p>Claimed Product: Endpoint-Collector&#xA0; &#xA0;</p><p>Detection Name: W32.File.MalParent&#xA0; &#xA0;</p><p>&#xA0;&#xA0;</p><p>&#xA0;&#xA0;</p><p>SHA 256:9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507&#xA0;</p><p>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;</p><p>&#xA0;VirusTotal: <a href="https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507&#xA0;" rel="noreferrer">https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507&#xA0;</a></p><p>Typical Filename: VID001.exe&#xA0;</p><p>Detection Name: Simple_Custom_Detection&#xA0;</p><p>&#xA0;&#xA0;</p><p>SHA 256: 47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca &#xA0;</p><p>MD5: 71fea034b422e4a17ebb06022532fdde &#xA0;</p><p>VirusTotal: <a href="https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;" rel="noreferrer">https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;</a></p><p>Typical Filename: VID001.exe&#xA0;</p><p>Claimed Product: N/A&#xA0; &#xA0;</p><p>Detection Name: Coinminer:MBT.26mw.in14.Talos&#xA0;</p><p>&#xA0;&#xA0;</p><p>SHA 256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91&#xA0; &#xA0;</p><p>MD5: 7bdbd180c081fa63ca94f9c22c457376 &#xA0;</p><p>&#xA0;&#xA0;</p><p>VirusTotal: <a href="https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91/details%C2%A0&#xA0;" rel="noreferrer">https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91/details%C2%A0&#xA0;</a></p><p>Typical Filename: c0dwjdi6a.dll &#xA0;</p><p>Claimed Product: N/A&#xA0; &#xA0;</p><p>Detection Name: Trojan.GenericKD.33515991&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Slew of WavLink vulnerabilities]]></title><description><![CDATA[<p><em>Lilith &gt;_&gt; of Cisco Talos discovered these vulnerabilities.</em>&#xA0;</p><p>Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.&#xA0;&#xA0;</p><p>The Wavlink AC3000 wireless router is one of the</p>]]></description><link>https://blog.talosintelligence.com/slew-of-wavlink-vulnerabilities/</link><guid isPermaLink="false">673382f22a7d6c0001e8e5ca</guid><category><![CDATA[Vulnerability Roundup]]></category><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Wed, 15 Jan 2025 13:00:27 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/11/vuln-roundup.webp" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/11/vuln-roundup.webp" alt="Slew of WavLink vulnerabilities"><p><em>Lilith &gt;_&gt; of Cisco Talos discovered these vulnerabilities.</em>&#xA0;</p><p>Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.&#xA0;&#xA0;</p><p>The Wavlink AC3000 wireless router is one of the most popular gigabit routers in the US, in part due to both its potential speed capabilities and low price point.&#xA0;</p><p>Talos is releasing these advisories in accordance with <a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html" rel="noreferrer noopener"><u>Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>. Wavlink has declined to release a patch for these vulnerabilities.&#xA0;&#xA0;</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from <a href="https://snort.org/" rel="noreferrer noopener"><u>Snort.org</u></a>, and our latest Vulnerability Advisories are always posted on <a href="https://talosintelligence.com/vulnerability_reports" rel="noreferrer noopener"><u>Talos Intelligence&#x2019;s website</u></a>.&#xA0;&#xA0;&#xA0;</p><h2 id="static-login-vulnerability">Static login vulnerability&#xA0;</h2><p>An attacker can send a specially crafted set of network packets over WAN to gain root access to the router via the wcrtrl service and static login credentials.&#xA0;&#xA0;</p><p>Static Login&#xA0;</p><ul><li><a href="https://0.0.0.34/" rel="noreferrer noopener"><u>TALOS-2024-2034</u></a> (CVE-2024-39754): Static login&#xA0;</li></ul><h2 id="ten-cgi-vulnerabilities">Ten .cgi vulnerabilities&#xA0;</h2><p>An unauthenticated HTTP request can trigger the following types of vulnerabilities:&#xA0;</p><p>touchlist_sync.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1999" rel="noreferrer noopener"><u>TALOS-2024-1999</u></a> (CVE-2022-2488): Arbitrary code execution&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2000" rel="noreferrer noopener"><u>TALOS-2024-2000</u></a> (CVE-2024-34166): Command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2046" rel="noreferrer noopener"><u>TALOS-2024-2046</u></a> (CVE-2024-36258): Buffer overflow&#xA0;&#xA0;</li></ul><p>Login.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2017" rel="noreferrer noopener"><u>TALOS-2024-2017</u></a> (CVE-2024-39363): Persistent XXS&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2018" rel="noreferrer noopener"><u>TALOS-2024-2018</u></a> (CVE-2024-39759-CVE-2024-39761): Command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2019" rel="noreferrer noopener"><u>TALOS-2024-2019</u></a> (CVE-2024-36290): Buffer overflow&#xA0;&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2036" rel="noreferrer noopener"><u>TALOS-2024-2036</u></a> (CVE-2024-39608): Unauthenticated firmware upload&#xA0;&#xA0;</li></ul><p>internet.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2020" rel="noreferrer noopener"><u>TALOS-2024-2020</u></a> (CVE-2024-39762-CVE-2024-39765): Command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2021" rel="noreferrer noopener"><u>TALOS-2024-2021</u></a> (CVE-2024-39288): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2022" rel="noreferrer noopener"><u>TALOS-2024-2022</u></a> (CVE-2024-39768-CVE-2024-39770): Buffer overflow&#xA0;&#xA0;</li></ul><p>firewall.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2023" rel="noreferrer noopener"><u>TALOS-2024-2023</u></a> (CVE-2024-39367): Command injection&#xA0;&#xA0;</li></ul><p>adm.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2024" rel="noreferrer noopener"><u>TALOS-2024-2024</u></a> (CVE-2024-39756): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2025" rel="noreferrer noopener"><u>TALOS-2024-2025</u></a> (CVE-2024-37184): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2026" rel="noreferrer noopener"><u>TALOS-2024-2026</u></a> (CVE-2024-39294): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2027" rel="noreferrer noopener"><u>TALOS-2024-2027</u></a> (CVE-2024-39358): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2028" rel="noreferrer noopener"><u>TALOS-2024-2028</u></a> (CVE-2024-21797): Command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2029" rel="noreferrer noopener"><u>TALOS-2024-2029</u></a> (CVE-2024-37357): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2030" rel="noreferrer noopener"><u>TALOS-2024-2030</u></a> (CVE-2024-39774): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2031" rel="noreferrer noopener"><u>TALOS-2024-2031</u></a> (CVE-2024-39370): Arbitrary code execution&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2032" rel="noreferrer noopener"><u>TALOS-2024-2032</u></a> (CVE-2024-37186): OS command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2033" rel="noreferrer noopener"><u>TALOS-2024-2033</u></a> (CVE-2024-39781-CVE-2024-39783): OS Command injection&#xA0;</li></ul><p>wireless.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2039" rel="noreferrer noopener"><u>TALOS-2024-2039</u></a> (CVE-2024-39357): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2040" rel="noreferrer noopener"><u>TALOS-2024-2040</u></a> (CVE-2024-39359): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2041" rel="noreferrer noopener"><u>TALOS-2024-2041</u></a> (CVE-2024-36493): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2042" rel="noreferrer noopener"><u>TALOS-2024-2042</u></a> (CVE-2024-39603): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2043" rel="noreferrer noopener"><u>TALOS-2024-2043</u></a> (CVE-2024-39757): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2044" rel="noreferrer noopener"><u>TALOS-2024-2044</u></a> (CVE-2024-34544): Command injection&#xA0;</li></ul><p>usbip.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2045" rel="noreferrer noopener"><u>TALOS-2024-2045</u></a> (CVE-2024-36272): Buffer overflow&#xA0;</li></ul><p>qos.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2047" rel="noreferrer noopener"><u>TALOS-2024-2047</u></a> (CVE-2024-36295): Command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2048" rel="noreferrer noopener"><u>TALOS-2024-2048</u></a> (CVE-2024-39299): Buffer overflow&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2049" rel="noreferrer noopener"><u>TALOS-2024-2049</u></a> (CVE-2024-39801-CVE-2024-39803): Buffer overflow&#xA0;</li></ul><p>openvpn.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2050" rel="noreferrer noopener"><u>TALOS-2024-2050</u></a> (CVE-2024-39798-CVE-2024-39800): Configuration control&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2051" rel="noreferrer noopener"><u>TALOS-2024-2051</u></a> (CVE-2024-38666): Configuration control&#xA0;</li></ul><p>nas.cgi&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2052" rel="noreferrer noopener"><u>TALOS-2024-2052</u></a> (CVE-2024-39602): Configuration control&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2053" rel="noreferrer noopener"><u>TALOS-2024-2053</u></a> (CVE-2024-39793-CVE-2024-39795): Configuration control&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2054" rel="noreferrer noopener"><u>TALOS-2024-2054</u></a> (CVE-2024-39360): Command injection&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2055" rel="noreferrer noopener"><u>TALOS-2024-2055</u></a> (CVE-2024-39280): Configuration control&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2056" rel="noreferrer noopener"><u>TALOS-2024-2056</u></a> (CVE-2024-39788-CVE-2024-39790): Configuration control&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2057" rel="noreferrer noopener"><u>TALOS-2024-2057</u></a> (CVE-2024-39786-CVE-2024-39787): Directory traversal&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2058" rel="noreferrer noopener"><u>TALOS-2024-2058</u></a> (CVE-2024-39784-CVE-2024-39785): Command injection&#xA0;</li></ul><h2 id="three-sh-vulnerabilities">Three .sh vulnerabilities&#xA0;</h2><p>Attackers can send specially crafted HTTP requests. A man-in-the-middle attack can trigger the fw_check.sh and update_filter_url.sh vulnerabilities.&#xA0;</p><p>testsave.sh&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2035" rel="noreferrer noopener"><u>TALOS-2024-2035</u></a> (CVE-2024-39773): Firmware update&#xA0;</li></ul><p>fw_check.sh&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2037" rel="noreferrer noopener"><u>TALOS-2024-2037</u></a> (CVE-2024-39273): Firmware upload&#xA0;&#xA0;</li></ul><p>update_filter_url.sh&#xA0;</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2038" rel="noreferrer noopener"><u>TALOS-2024-2038</u></a> (CVE-2024-39604): Argument injection&#xA0;</li></ul><p>&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Microsoft Patch Tuesday for January 2025 — Snort rules and prominent vulnerabilities]]></title><description><![CDATA[Microsoft has released its monthly security update for January of 2025 which includes 159 vulnerabilities, including 10 that Microsoft marked as “critical.” The remaining vulnerabilities listed are classified as “important.” ]]></description><link>https://blog.talosintelligence.com/january-patch-tuesday-release/</link><guid isPermaLink="false">6786ad47fa2aae000130ed38</guid><category><![CDATA[Patch Tuesday]]></category><dc:creator><![CDATA[Edmund Brumaghin]]></dc:creator><pubDate>Tue, 14 Jan 2025 21:15:12 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/11_41_27.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/11_41_27.jpg" alt="Microsoft Patch Tuesday for January 2025 &#x2014; Snort rules and prominent vulnerabilities"><p>Microsoft has released its monthly security update for January of 2025 which includes 159 vulnerabilities, including 12 that Microsoft marked as &#x201C;critical.&#x201D; The remaining vulnerabilities listed are classified as &#x201C;important.&#x201D;&#xA0;&#xA0;</p><p>One notable critically rated vulnerability that has been patched this month is <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309" rel="noreferrer noopener"><u>CVE-2025-21309</u></a>, which is a remote code execution vulnerability affecting Windows Remote Desktop Services. Exploitation of this vulnerability could lead to arbitrary code execution on systems where the Remote Desktop Gateway role has been enabled. This vulnerability has been assigned a CVSS 3.1 score of 8.1 and is considered &#x201C;more likely to be exploited&#x201D; by Microsoft.&#xA0;</p><p>Another notable remote code execution vulnerability in Window Object Linking and Embedding (OLE) was also patched this month. This vulnerability, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298" rel="noreferrer noopener"><u>CVE-2025-21298</u></a>, is a critical remotely exploitable vulnerability that can be triggered by sending a malicious email to a victim running a vulnerable version of Microsoft Outlook. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on vulnerable systems and can be triggered when the victim previews the malicious email. This vulnerability has been assigned a CVSS 3.1 score of 9.8. Microsoft recommends disabling RTF as mitigation for this vulnerability.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294" rel="noreferrer noopener"><u>CVE-2025-21294</u></a> is a critical vulnerability in Microsoft Digest Authentication that affects multiple versions of Windows and Windows Server. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on vulnerable systems. To exploit this vulnerability, an attacker would need to win a race condition.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295" rel="noreferrer noopener"><u>CVE-2025-21295</u></a> is a critical remote code execution vulnerability in SPNEGO Extended Negotiation (NEGOEX) Security Mechanism. This vulnerability could allow an attacker to execute arbitrary code on vulnerable systems and does not require user interaction for successful exploitation. &#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296" rel="noreferrer noopener"><u>CVE-2025-21296</u></a> is a critical remote code execution vulnerability in BranchCache. This vulnerability could allow an attacker to execute arbitrary code on vulnerable systems. Microsoft assesses that an attacker would need to be on the same network to successfully exploit this vulnerability. &#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297" rel="noreferrer noopener"><u>CVE-2025-21297</u></a> is another critical remote code execution vulnerability in Windows Remote Desktop Services. Microsoft has assessed that this vulnerability is &#x201C;less likely to be exploited&#x201D; and that it would require an attacker to win a race condition for exploitation to be successful. This vulnerability affects multiple versions of Windows Server. &#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298" rel="noreferrer">CVE-2025-21298</a> is a critical remote code execution vulnerability in Windows Object Linking and Embedding (OLE). It could allow an attacker to execute arbitrary code on vulnerable systems. Microsoft recommends disabling RTF as a mitigation for this vulnerability. </p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307" rel="noreferrer noopener"><u>CVE-2025-21307</u></a> is a critical remote code execution vulnerability in Windows Reliable Multicast Transport Driver (RMCAST). This vulnerability, if successfully exploited, could enable an unauthenticated attacker to execute arbitrary code by sending a specially crafted packet to vulnerable systems.  &#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311" rel="noreferrer noopener"><u>CVE-2025-21311</u></a> is a critical privilege escalation vulnerability in NTLMv1. This vulnerability can be exploited remotely and could allow an attacker to increase their level of access to vulnerable systems. Microsoft recommends disabling the use of NTLMv1 as a mitigation for this vulnerability.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21362" rel="noreferrer noopener"><u>CVE-2025-21362</u></a> - is a critical remote code execution vulnerability in Microsoft Excel. This vulnerability could allow an attacker to execute arbitrary code on vulnerable systems. This vulnerability can also be triggered via the preview pane. &#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380" rel="noreferrer noopener"><u>CVE-2025-21380</u></a> is a critical information disclosure vulnerability affecting Azure Marketplace SaaS Resources. According to Microsoft this vulnerability, which could enable an attacker to disclose information, has been mitigated.  &#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385" rel="noreferrer noopener"><u>CVE-2025-21385</u></a> is a critical information disclosure vulnerability affecting Microsoft Purview. This vulnerability is due to a Server-Side Request Forgery (SSRF) vulnerability that Microsoft reports has been mitigated.&#xA0;</p><p>Talos would also like to highlight the following important vulnerabilities that Microsoft considers to be &#x201C;more likely&#x201D; to be exploited:&#xA0;&#xA0;&#xA0;</p><ul><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189" rel="noreferrer noopener"><u>CVE-2025-21189</u></a> - MapUrlToZone Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210" rel="noreferrer noopener"><u>CVE-2025-21210</u></a> - Windows BitLocker Information Disclosure Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219" rel="noreferrer noopener"><u>CVE-2025-21219</u></a> - MapUrlToZone Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268" rel="noreferrer noopener"><u>CVE-2025-21268</u></a> - MapUrlToZone Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269" rel="noreferrer noopener"><u>CVE-2025-21269</u></a> - MapUrlToZone Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292" rel="noreferrer noopener"><u>CVE-2025-21292</u></a> - Windows Search Service Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299" rel="noreferrer noopener"><u>CVE-2025-21299</u></a> - Windows Kerberos Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314" rel="noreferrer noopener"><u>CVE-2025-21314</u></a> - Windows SmartScreen Spoofing Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315" rel="noreferrer noopener"><u>CVE-2025-21315</u></a> - Microsoft Brokering File System Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328" rel="noreferrer noopener"><u>CVE-2025-21328</u></a> - MapUrlToZone Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329" rel="noreferrer noopener"><u>CVE-2025-21329</u></a> - MapUrlToZone Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21354" rel="noreferrer noopener"><u>CVE-2025-21354</u></a> - Microsoft Excel Remote Code Execution Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21364" rel="noreferrer noopener"><u>CVE-2025-21364</u></a> - Microsoft Excel Security Feature Bypass Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21365" rel="noreferrer noopener"><u>CVE-2025-21365</u></a> - Microsoft Word Remote Code Execution Vulnerability&#xA0;</li></ul><p>A complete list of all the other vulnerabilities Microsoft disclosed this month is available on its&#xA0;<a href="https://msrc.microsoft.com/update-guide/" rel="noreferrer noopener"><u>update page</u></a>.</p><p>In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on&#xA0;<a href="https://snort.org/" rel="noreferrer noopener"><u>Snort.org</u></a>.&#xA0;&#xA0;</p><p>The rules included in this release that protect against the exploitation of many of these vulnerabilities are 64432 &#x2013; 64436, 64444 - 64457. There are also these Snort 3 rules: 301113, 301114, 301117 - 301123.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Do we still have to keep doing it like this?]]></title><description><![CDATA[Hazel gets inspired by watching Wendy Nather’s recent keynote, and explores ways to challenge security assumptions.]]></description><link>https://blog.talosintelligence.com/do-we-still-have-to-keep-doing-it-like-this/</link><guid isPermaLink="false">677e5bf689915000016d5d1f</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Hazel Burton]]></dc:creator><pubDate>Thu, 09 Jan 2025 19:15:53 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-3.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-3.jpg" alt="Do we still have to keep doing it like this?"><p>Welcome to the first edition of the Threat Source newsletter for 2025.&#x202F;&#xA0;</p><p>Upon returning to work this week from my Lindt chocolate reindeer coma, my first task was to write this newsletter. As I stared at a blank template hoping for inspiration to suddenly strike, I did what any security professional should do at the start (and indeed any) time of year. I listened to Wendy Nather.&#xA0;</p><p>Legendary Security Hall of Famer Wendy recently gave the keynote at BSides NYC and the video has&#xA0;<a href="https://www.youtube.com/watch?v=CyWCaxe7yi0&amp;feature=youtu.be" rel="noreferrer noopener">just landed.</a>&#xA0;The theme? &#x201C;When do we get to play in easy mode?&#x201D; I.e why is security still so hard?&#xA0;</p><p>Wendy showed a list of the InfoSec Research Council&#x2019;s &#x201C;Hard Problems&#x201D; list of 2005. Any of these sound familiar?&#xA0;</p><ul><li>Global scale identity management&#xA0;</li><li>Insider threat&#xA0;</li><li>Availability of time critical systems&#xA0;</li><li>Building scalable secure systems&#xA0;</li><li>Attack attribution and situational understanding&#xA0;</li><li>Information provenance&#xA0;</li><li>Security with privacy&#xA0;</li><li>Enterprise level security metrics&#xA0;</li></ul><p>If the toughest challenges we face in 2025 are also the same challenges we were dealing with twenty years ago, what hope is there?&#xA0;</p><p>If anything, security is harder today than it was then, due to all the added complexity. Wendy also pointed out the larger ripple effect of breaches today due to supply chains, stolen credentials up for sale, and shared infrastructure.&#xA0;</p><p>Jeez, Hazel, way to start 2025 on a massive downer.&#xA0;</p><p>However, something we can perhaps do more of this year is to go a bit easier on ourselves. If something you&#x2019;ve been trying for a while isn&#x2019;t working and is only leading to deeper frustrations, is it possible to come at it a different way?&#xA0;</p><p>One of Wendy&#x2019;s recommendations on how to do just that uses the example of user awareness training. As she said in her keynote, it&#x2019;s easy to get someone to click on a link (sorry to any bad guys reading this, but you&#x2019;re not exactly carrying out rocket surgery with your phishing campaigns).&#xA0;</p><p>Getting 1000 people NOT to click on a link is infinitely harder. Wendy even said that she once worked in an organization where the people who attended cybersecurity awareness training were even MORE likely to click on malicious links. The theory being that these people really wanted to help the security team, and were more than happy to respond to emails asking them to test the strength of their passwords.&#xA0;</p><p>And that&#x2019;s where social engineering, defender style, can come in. &quot;People are your greatest asset, if you treat them that way.&quot;&#xA0;</p><p>I&apos;m seeing a lot of &quot;how to thrive in 2025!&quot; posts right now. For anyone who isn&apos;t ready for that, or tired of it all, I just want to say, I&apos;m right there with you. But if you&apos;re also feeling like it&apos;s &quot;new year, same problems&quot;&#xA0; perhaps there&apos;s one thing that you can pick this year which has the potential to change that story.</p><p><a href="https://www.youtube.com/watch?v=CyWCaxe7yi0&amp;feature=youtu.be" rel="noreferrer noopener">Wendy&#x2019;s keynote</a>&#xA0;contains a bunch of insights for defenders on how to go about picking something to change or improve, from knowledge sharing, to hiring, to addressing complexity. I&#x2019;m also looking forward to reading the upcoming National Academy of Science&#x2019;s report on Cyber Hard Problems, of which Wendy is on the committee for.&#xA0;</p><p>I&apos;d thoroughly recommend checking out the full keynote, if only to see Wendy&#xA0;<a href="https://www.youtube.com/watch?v=CyWCaxe7yi0&amp;feature=youtu.be" rel="noreferrer noopener">yielding a hammer in a moderately threatening manner.</a></p><h2 id="the-one-big-thing">The one big thing</h2><p>Attacks in which malicious actors are deliberately installing known vulnerable drivers, only to exploit them later, is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD).&#xA0;&#xA0;&#xA0;</p><p>Cisco Talos recently <a href="https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/" rel="noreferrer noopener"><u>published our research</u></a> into the real-world application of the BYOVD technique. We identified three major payloads used, as well as recent activity linked to ransomware groups.&#xA0;</p><h3 id="why-do-i-care">&#x202F;Why do I care?&#x202F;&#xA0;</h3><p>With the wide availability of tools exploiting vulnerable drivers, exploitation has moved from the domain of advanced threat actors into the domain of commodity threats - primarily ransomware. Malicious actors use corrupted drivers to perform a myriad of actions that help them achieve their goals, such as escalating privileges, deploying unsigned malicious code, or even terminating EDR tools.&#xA0;</p><h3 id="so-now-what">So now what?&#x202F;&#xA0;</h3><p>There are a few things we can do to mitigate the risks and detect potential campaigns using BYOVD technique.&#x202F;This could include enforcement of Extended Validation (EV) and Windows Hardware Quality Labs (WHQL) certified drivers, preventing risks associated with legacy drivers. If the blocking of all legacy drivers is not possible, employing the Windows Defender Application Control (Windows Security) drivers blocklist is recommended way to prevent the execution of known vulnerable drivers.&#x202F;Read more in the <a href="https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/" rel="noreferrer noopener"><u>Talos blog.</u></a>&#xA0;</p><h2 id="top-security-headlines-of-the-week">Top security headlines of the week&#x202F;&#xA0;&#xA0;</h2><ul><li>CISA says there is &#x2018;no indication&#x2019; of a wider government hack beyond the treasury, following the disclosure that the department had been the target of a &#x201C;major incident&#x201D; in December. <a href="https://techcrunch.com/2025/01/06/cisa-says-no-indication-of-wider-government-hack-beyond-treasury/" rel="noreferrer noopener"><u>TechCrunch</u></a>&#xA0;</li><li>FireScam Android spyware campaign fakes the Telegram Premium app and delivers information-stealing malware. Researchers say this is a prime example of the rising threat of adversaries leveraging everyday applications. <a href="https://www.darkreading.com/cyberattacks-data-breaches/firescam-android-spyware-campaign-significant-threat-worldwide" rel="noreferrer noopener"><u>Dark Reading</u></a>.&#xA0;</li><li>Meduza stealer analysis: A closer look at its techniques and attack vector. <a href="https://www.splunk.com/en_us/blog/security/meduza-stealer-analysis.html" rel="noreferrer noopener"><u>Splunk Threat Research</u></a>&#xA0;</li></ul><h2 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t get enough Talos?&#x202F;&#xA0;</h2><ul><li>Talos Takes is now in video format! Catch up on <a href="https://www.youtube.com/watch?v=n2P9hhmyaAM&amp;t=8s" rel="noreferrer noopener"><u>the latest discussion,</u></a> all about the major shifts and changes in ransomware since the very first iteration over 35 years ago.&#xA0;</li></ul><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/n2P9hhmyaAM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="It&apos;s the 35th anniversary of ransomware - let&apos;s talk about the major shifts and changes"></iframe></figure><ul><li>The evolution and abuse of proxy networks &#x2013; <a href="https://blog.talosintelligence.com/the-evolution-and-abuse-of-proxy-networks/" rel="noreferrer noopener"><u>check out this piece of research</u></a> by Nick Biasini and Vitor Ventura.&#xA0;</li></ul><h2 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#x202F;&#xA0;&#x202F;&#x202F;&#xA0;</h2><p><a href="https://www.ciscolive.com/emea.html" rel="noreferrer noopener">Cisco Live EMEA</a>&#x202F;(February 9-14, 2025)&#x202F;&#xA0;</p><p>Amsterdam, Netherlands&#x202F;&#xA0;</p><h2 id="most-prevalent-malware-files-of-the-week">Most prevalent malware files of the week</h2><p><strong>SHA 256:</strong><br>9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507<br><strong>MD5:</strong> 2915b3f8b703eb744fc54c81f4a9c67f</p><p><strong>VirusTotal: </strong><a href="https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507">https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</a><br><strong>Typical Filename:</strong> VID001.exe<br><strong>Detection Name:</strong> Simple_Custom_Detection</p><p></p><p><strong>SHA 256:</strong><br>7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5&#xA0;&#xA0;<br><strong>MD5:</strong>&#xA0;ff1b6bb151cf9f671c929a4cbdb64d86&#xA0;&#xA0;</p><p><strong>VirusTotal : </strong><a href="https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5">https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5</a><br><strong>Typical Filename:</strong>&#xA0;endpoint.query&#xA0;&#xA0;<br><strong>Claimed Product:</strong>&#xA0;Endpoint-Collector&#xA0;&#xA0;<br><strong>Detection Name:</strong>&#xA0;W32.File.MalParent&#xA0;&#xA0;</p><p></p><p><strong>SHA 256:</strong>&#xA0;a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91&#xA0;&#xA0;<br><strong>MD5</strong>: 7bdbd180c081fa63ca94f9c22c457376&#xA0;</p><p><strong>VirusTotal: </strong><a href="https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91/details%C2%A0">https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91/details%C2%A0</a><br><strong>Typical Filename:</strong>&#xA0;c0dwjdi6a.dll&#xA0;<br><strong>Claimed Product:</strong>&#xA0;N/A&#xA0;&#xA0;<br><strong>Detection Name:&#xA0;</strong>Trojan.GenericKD.33515991&#xA0;</p><p><strong>SHA 256:</strong>47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;<br><strong>MD5</strong>: 71fea034b422e4a17ebb06022532fdde&#xA0;</p><p><strong>VirusTotal: </strong>&#xA0;<a href="https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca" rel="nofollow noopener">https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca</a><br><strong>Typical Filename:</strong>&#xA0;VID001.exe<br><strong>Claimed Product:</strong>&#xA0;N/A&#xA0;&#xA0;<br><strong>Detection Name:&#xA0;</strong>Coinminer:MBT.26mw.in14.Talos</p><p><strong>SHA256:</strong>873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f&#xA0;<br><strong>MD5:</strong>&#xA0;d86808f6e519b5ce79b83b99dfb9294d&#xA0;&#xA0;</p><p><strong>VirusTotal:</strong> <a href="https://www.virustotal.com/gui/file/873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f">https://www.virustotal.com/gui/file/873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f</a>&#xA0;<br><strong>Typical Filename:</strong>&#xA0;n/a&#xA0;<br><strong>Claimed Product:</strong>&#xA0;n/a&#xA0;&#xA0;<br><strong>Detection Name:</strong>&#xA0;Win32.Trojan-Stealer.Petef.FPSKK8&#xA0;&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Welcome to the party, pal!]]></title><description><![CDATA[In the last newsletter of the year, Thorsten recalls his tech-savvy gift to his family and how we can all incorporate cybersecurity protections this holiday season. ]]></description><link>https://blog.talosintelligence.com/welcome-to-the-party-pal-2/</link><guid isPermaLink="false">676089dfeabd160001b4ebeb</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Thorsten Rosendahl]]></dc:creator><pubDate>Thu, 19 Dec 2024 19:02:13 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-4.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-4.jpg" alt="Welcome to the party, pal!"><p> Welcome to the final Threat Source newsletter of 2024.&#xA0;</p><p>Watching &quot;Die Hard&quot; during the Christmas season has become a widely recognized tradition for many, despite ongoing debates about its classification as a Christmas movie. I know it isn&apos;t everyone&apos;s cup of tea. Whether you like the movie or not, let me share a story about what didn&apos;t quite go as planned in my family last year.&#xA0;&#xA0;</p><p>When&#xA0; some celebrities had their social media accounts compromised, I saw it as the perfect opportunity to introduce my family to the world of multi-factor authentication (MFA) for their online accounts. Our home IT setup is diverse&#x2014; With Linux, Macs, Windows; Androids, iOS, we needed something cross-platform. Also, we needed a user-friendly solution as we have both standard users and IT experts (never underestimate your users). From my professional standpoint, I decided to go &#x201C;all in&#x201D; with hardware tokens - they work cross platform and &quot;survive&quot; one or the other OS installs from scratch. Providing two for each person was mandatory in case one got lost, which had happened to me already. So it wasn&apos;t a cheap exercise. In my defense, this was before the side-channel attack <a href="https://ninjalab.io/EUCLEAK/" rel="noreferrer noopener"><u>EUCLEAK</u></a> was discovered, which has since <a href="https://www.heise.de/en/news/EUCLEAK-More-products-vulnerable-to-cloning-attack-10079927.html" rel="noreferrer noopener"><u>expanded</u></a> to affect more products as noted in the first release.&#xA0;</p><p>In the spirit of John McClane : &#x201C;Now I know what a TV dinner feels like.&#x201D;&#xA0;</p><p>The kids found the gift &quot;boring&quot; and almost a year later, the adoption rate is still only 30%. Fortunately, my wife had the foresight to prepare real presents for the family, saving Christmas Eve from being a &quot;bad guys win&quot; scenario. (Only <s>John</s> Thor can drive somebody that crazy.)&#xA0;</p><p>I share this anecdote not to discourage you, but to help you avoid making the same mistake and risking your celebrations. Unless everyone gathered around the Christmas tree is an infosec professional, it might not be the time to go &quot;Yippee-ki-yay Mr Falcon&quot; with tech gifts.&#xA0;&#xA0;</p><p>However, spending time with loved ones is a great opportunity to discuss the trends and importance of cybersecurity. We&apos;ve been highlighting compromised credentials for a long time, as seen in our previous posts <a href="https://blog.talosintelligence.com/talos-ir-quarterly-report-q4-2023/" rel="noreferrer noopener"><u>[here]</u></a>, <a href="https://blog.talosintelligence.com/talos-ir-quarterly-trends-q1-2024/" rel="noreferrer noopener"><u>[here]</u></a>, <a href="https://blog.talosintelligence.com/ir-trends-ransomware-on-the-rise-q2-2024/" rel="noreferrer noopener"><u>[here]</u></a> and <a href="https://blog.talosintelligence.com/incident-response-trends-q3-2024/" rel="noreferrer noopener"><u>[here]</u></a>. For the fourth consecutive time in over a year, the most observed means of gaining initial access was the use of valid accounts, making it clear identity-based attacks are becoming more prevalent, and wont be gone anytime soon.&#xA0;</p><p>&#xA0;Advocate for the use of a password managers&#x2014;there are paid versions with family plans on one end, and excellent open-source alternatives on the other. Avoid storing credentials in browsers, as they can be extracted by <a href="https://blog.talosintelligence.com/new-pxa-stealer/" rel="noreferrer noopener"><u>info-stealers</u></a>. Consider using passkeys where possible. According to the <a href="https://fidoalliance.org/wp-content/uploads/2024/05/World-Password-Day-2024-Report-FIDO-Alliance.pdf" rel="noreferrer noopener"><u>fido alliance</u></a>, more than 20% of the world&apos;s top 100 websites support passkeys already. If passkeys are not yet enabled for one of your services? Any MFA is better than none. Even using &quot;just&quot; TOTP in a software container is a significant improvement over just a password.&#xA0;</p><p>But it&apos;s not just about enabling MFA. As Martin wrote last week, we need to close the gap by communicating and understanding the the threat landscape. When it comes to stolen credentials, share resources like https://haveibeenpwned.com/ or https://sec.hpi.de/ilc/?lang=en with your loved ones so they can check if their email has been part of a breach.&#xA0;&#xA0;&#xA0;</p><p>If you decide not to bother your friends &amp; famliy (though I strongly believe <a href="https://www.cbssports.com/soccer/news/kylian-mbappe-social-media-apparently-hacked-madrid-stars-account-makes-posts-taking-aim-at-lionel-messi/" rel="noreferrer noopener"><u>Mbappe</u></a>, <a href="https://x.com/zachxbt/status/1818245914580120015" rel="noreferrer noopener"><u>Sweeny and Odenkirk</u></a> would have preferred a more secure account) with Account/Password Hygiene, there are some more work related recommendations in Hazel&#x2019;s &#x201C;<a href="https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/" rel="noreferrer noopener"><u>How are attackers trying to bypass MFA</u></a>&#x201D;&#xA0;</p><p>Whichever is your idea of Christmas, then, like Argyle said, &quot;I gotta be here for New Year&apos;s!&quot;&#xA0;&#xA0;</p><p>We look forward to seeing you in 2025!&#xA0;&#xA0;&#xA0;</p><h2 id="the-one-big-thing">The one big thing</h2><p>At the time of writing, our Vulnerability Research Team Disclosed 207 Vulnerabilities, and had another 93 reported to the respective Vendor in 2024.&#xA0; Di you know&#xA0; Talos has a team which investigates <a href="https://talosintelligence.com/vulnerability_info" rel="noreferrer noopener"><u>software and operating system vulnerabilities</u></a> in order to discover them before malicious threat actors do? Every day, they try to find vulnerabilities that have not yet been discovered, and then work to provide a fix for those before a zero-day threat could ever be executed.&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>We see threat actors exploiting known vulnerabilities constantly. Sometimes those CVEs are Years old.&#xA0;&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Maybe you want to check for some CVEs or conduct a network security assessments.&#xA0;<br>You can our team&#x2019;s <a href="https://talosintelligence.com/vulnerability_reports/" rel="noreferrer noopener"><u>reports</u></a>,<a href="https://blog.talosintelligence.com/category/vulnerability-roundup/" rel="noreferrer noopener"><u>roundups</u></a>,<a href="https://blog.talosintelligence.com/category/vulnerability-spotlight/" rel="noreferrer noopener"><u>spotlights</u></a> and <a href="https://blog.talosintelligence.com/category/vulnerability-deep-dive/" rel="noreferrer noopener"><u>deep dives</u></a> on our blog.&#xA0;</p><h1 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h1><p>&#xA0;<a href="https://www.blackhat.com/eu-24/briefings/schedule/index.html" rel="noreferrer noopener"><u>Blackhat Europe 2024</u></a> took place Dec 9-12 in London, UK. Loaded with a lot of interesting Sessions, my favorites are &#x201C;<a href="https://www.blackhat.com/eu-24/briefings/schedule/index.html#vulnerabilities-in-the-esim-download-protocol-42505" rel="noreferrer noopener"><u>Vulnerabilities in the eSIM download protocol</u></a>&#x201D; and &#x201C;<a href="https://www.blackhat.com/eu-24/briefings/schedule/index.html#over-the-air-compromise-of-modern-volkswagen-group-vehicles-42466" rel="noreferrer noopener"><u>Over the Air: Compromise of Modern Volkswagen Group Vehicles</u></a>&#x201D; both showing how far an attack surface can possibly extend.&#xA0;&#xA0;</p><p>Germany&apos;s Federal Office for Information Security (BSI) says it blocked communication between appr. 30.000 Android IoT Devices which were sold with BadBox malware preinstalled, and their command and control (C2) infrastructure by sinkholing DNS queries (<a href="https://www.bleepingcomputer.com/news/security/germany-blocks-badbox-malware-loaded-on-30-000-android-devices/" rel="noreferrer noopener"><u>Bleeping Computer</u></a>)&#xA0;&#xA0;</p><p>Law enforcement agencies worldwide disrupted a holiday tradition for cybercriminals: launching Distributed Denial-of-Service (DDoS) attacks. Booter and stresser websites were taken down, administrators were arrested and over 300 users were identified for planned operational activities. (<a href="https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks" rel="noreferrer noopener"><u>Europool</u></a>)&#xA0;</p><p>The Willow chip is not capable of breaking modern cryptography,&#x201D; Google&#x2019;s director of quantum tells <a href="https://www.theverge.com/2024/12/12/24319879/google-willow-cant-break-rsa-cryptography" rel="noreferrer noopener"><u>The Verge</u></a><u>.</u></p><h1 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t get enough Talos?&#xA0;</h1><ul><li><a href="https://blog.talosintelligence.com/the-evolution-and-abuse-of-proxy-networks/" rel="noreferrer noopener"><u>The evolution and abuse of proxy networks</u></a>&#xA0;</li><li><a href="https://blog.talosintelligence.com/december-patch-tuesday-release/" rel="noreferrer noopener"><u>Microsoft Patch Tuesday for December 2024 contains four critical vulnerabilities</u></a>&#xA0;</li></ul><h1 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h1><p>&#xA0;&#xA0;<a href="https://www.ciscolive.com/emea.html" rel="noreferrer noopener"><u>Cisco Live EMEA</u></a>&#x202F;(February 9-14, 2025)&#xA0;</p><p>Amsterdam, Netherlands&#xA0;</p><h1 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;&#xA0;</h1><p><strong>SHA256:</strong>873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f&#xA0;<br><strong>MD5:</strong> d86808f6e519b5ce79b83b99dfb9294d&#xA0;&#xA0;<br><strong>VirusTotal:</strong><br>https://www.virustotal.com/gui/file/873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f&#xA0;<br><strong>Typical Filename:</strong> n/a&#xA0;<br><strong>Claimed Product:</strong> n/a&#xA0;&#xA0;<br><strong>Detection Name:</strong> Win32.Trojan-Stealer.Petef.FPSKK8&#xA0;&#xA0;</p><p><strong>SHA256:</strong>9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507&#xA0;<br><strong>MD5:</strong> 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;&#xA0;<br><strong>VirusTotal:</strong><br>https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507&#xA0;&#xA0;<br><strong>Typical Filename:</strong> VID001.exe&#xA0;&#xA0;<br><strong>Claimed Product:</strong> n/a&#xA0;&#xA0;<br><strong>Detection Name:</strong> Win.Worm.Bitmin-9847045-0&#xA0;</p><p>&#xA0;<strong>SHA 256:</strong><br>7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5&#xA0;&#xA0;<br><strong>MD5:</strong> ff1b6bb151cf9f671c929a4cbdb64d86&#xA0;&#xA0;<br><strong>VirusTotal: </strong>https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5&#xA0;<br><strong>Typical Filename:</strong> endpoint.query&#xA0;&#xA0;<br><strong>Claimed Product:</strong> Endpoint-Collector&#xA0;&#xA0;<br><strong>Detection Name:</strong> W32.File.MalParent&#xA0;&#xA0;</p><p>&#xA0;<strong>SHA256:</strong>47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;<br><strong>MD5:</strong> 71fea034b422e4a17ebb06022532fdde&#xA0;<br><strong>VirusTotal: </strong>https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;<br><strong>Typical Filename:</strong> VID001.exe&#xA0;<br><strong>Claimed Product:</strong> n/a&#xA0;&#xA0;<br><strong>Detection Name:</strong> Coinminer:MBT.26mw.in14.Talos&#xA0;</p><p>&#xA0;<strong>SHA 256: </strong>a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91&#xA0;&#xA0;<br><strong>MD5:</strong><br>7bdbd180c081fa63ca94f9c22c457376&#xA0;&#xA0;<br><strong>VirusTotal:</strong> https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91&#xA0;<br><strong>Typical Filename:</strong> IMG001.exe&#xA0;&#xA0;<br><strong>Claimed Product:</strong> N/A&#xA0;&#xA0;&#xA0;<br><strong>Detection Name:</strong> Trojan/Win32.CoinMiner.R174018&#xA0;</p><p>&#xA0;</p><p>&#xA0;</p><p></p><p>&#xA0;</p><p>&#xA0;</p><p></p>]]></content:encoded></item><item><title><![CDATA[Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found]]></title><description><![CDATA[<p>Cisco Talos&#x2019; Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader, and two use-after-free vulnerabilities in Foxit Reader.&#xA0;&#xA0;</p><p>These vulnerabilities exist in Adobe Acrobat Reader and Foxit Reader, two of the most popular and feature-rich PDF readers on the market.&#xA0;</p><p>The vulnerabilities</p>]]></description><link>https://blog.talosintelligence.com/acrobat-out-of-bounds-and-foxit-use-after-free-pdf-reader-vulnerabilities-found/</link><guid isPermaLink="false">675c9b70eabd160001b4ebb6</guid><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Thu, 19 Dec 2024 18:53:59 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/12/vuln-roundup-1.webp" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/12/vuln-roundup-1.webp" alt="Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found"><p>Cisco Talos&#x2019; Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader, and two use-after-free vulnerabilities in Foxit Reader.&#xA0;&#xA0;</p><p>These vulnerabilities exist in Adobe Acrobat Reader and Foxit Reader, two of the most popular and feature-rich PDF readers on the market.&#xA0;</p><p>The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to <a href="https://sec.cloudapps.cisco.com/security/center/resources/vendor_vulnerability_policy.html" rel="noreferrer noopener"><u>Cisco&#x2019;s third-party vulnerability disclosure policy</u></a>.&#xA0;Adobe&apos;s patched this in version <a href="https://cisco-talos-blog.ghost.io/ghost/#/editor/post/675c9b70eabd160001b4ebb6" rel="noreferrer">24.005.20320</a>, and Foxit&apos;s patch appears in PDF Editor version <a href="https://cisco-talos-blog.ghost.io/ghost/#/editor/post/675c9b70eabd160001b4ebb6" rel="noreferrer">12.1.9/11.2.12</a>.</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from <a href="https://snort.org/" rel="noreferrer noopener"><u>Snort.org</u></a>, and our latest Vulnerability Advisories are always posted on <a href="https://talosintelligence.com/vulnerability_reports" rel="noreferrer noopener"><u>Talos Intelligence&#x2019;s website</u></a>.&#xA0;&#xA0;</p><h2 id="out-of-bounds-read-adobe-acrobat-reader-vulnerabilities">Out-of-bounds read Adobe Acrobat Reader Vulnerabilities&#xA0;</h2><p><em>Discovered by &#xA0;KPC. </em>&#xA0;</p><p>Specially crafted font files embedded into a PDF can trigger out-of-bounds memory reads in <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2076" rel="noreferrer noopener"><u>TALOS-2024-2076</u></a> (CVE-2024-49534), <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2070" rel="noreferrer noopener"><u>TALOS-2024-2070</u></a> (CVE-2024-49533), and <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2064" rel="noreferrer noopener"><u>TALOS-2024-2064</u></a> (CVE-2024-49532), which could lead to the disclosure of sensitive information and further exploitation. An attacker must trick the user into opening a malicious file to trigger these vulnerabilities.&#xA0;</p><h2 id="foxit-object-use-after-free-vulnerabilities">Foxit object use-after-free vulnerabilities&#xA0;</h2><p><em>Discovered by KPC.</em>&#xA0;</p><p>Two use-after-free vulnerabilities exist in the way Foxit Reader handles certain objects. <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2093" rel="noreferrer noopener"><u>TALOS-2024-2093</u></a> (CVE-2024-49576) and <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-2094" rel="noreferrer noopener"><u>TALOS-2024-2094</u></a> (CVE-2024-47810) can be triggered by malicious JavaScript code in a PDF file. An attack needs to either trick a user into opening the malicious file, or the user must navigate to a maliciously crafted website while the Foxit browser extension is enabled. This vulnerability can lead to memory corruption and result in arbitrary code execution.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Exploring vulnerable Windows drivers]]></title><description><![CDATA[This post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos’ series of posts about  malicious Windows drivers. ]]></description><link>https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/</link><guid isPermaLink="false">6762dfd989915000016d5c9e</guid><category><![CDATA[Threats]]></category><category><![CDATA[vulnerability]]></category><category><![CDATA[drivers]]></category><dc:creator><![CDATA[Vanja Svajcer]]></dc:creator><pubDate>Thu, 19 Dec 2024 11:04:41 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/12/GenericCiscoTalos-Header-1.webp" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/12/GenericCiscoTalos-Header-1.webp" alt="Exploring vulnerable Windows drivers"><p>This post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos&#x2019; series of posts about &#xA0;<a href="https://malicious%20windows%20drivers./" rel="noreferrer noopener"><u>malicious Windows drivers.</u></a> Some of this research was presented at the <a href="https://aavar.org/cybersecurity-conference/" rel="noreferrer noopener"><u>AVAR conference</u></a> in Chennai at the beginning of December 2024.&#xA0;</p><p>We would like to send a special thanks to <a href="https://connormcgarr.github.io/" rel="noreferrer noopener"><u>Connor McGarr</u></a>, <a href="https://www.linkedin.com/in/russell-sanford-759b3561/" rel="noreferrer noopener"><u>Russell Sanford</u></a>, <a href="https://www.linkedin.com/in/ryan-warns-7a8415b3/" rel="noreferrer noopener"><u>Ryan Warns</u></a>, <a href="https://www.linkedin.com/in/tharrison0/" rel="noreferrer noopener"><u>Tim Harrison</u></a> and <a href="https://www.welivesecurity.com/en/our-experts/michal-poslusny/" rel="noreferrer noopener"><u>Michal Poslu&#x161;n&#xFD;</u></a> for their previous work on analyzing vulnerabilities in drivers. &#xA0;</p><p>During our research into vulnerable Windows drivers, we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerable drivers only to later exploit them is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD).&#xA0;</p><h1 id="how-are-threat-actors-using-byovd">How are threat actors using BYOVD?&#xA0;</h1><p>Malicious actors use these drivers to perform a myriad of actions that help them achieve their goals. In our research, we identified three major payloads used, which we describe below. &#xA0;Along with these payloads, we also identified recent activity linked to ransomware groups, which demonstrates real-world cases of malicious actors exploiting vulnerable Windows drivers to achieve their objectives.&#xA0;</p><h2 id="vulnerable-drivers-and-common-payloads">Vulnerable drivers and common payloads&#xA0;</h2><h3 id="local-escalation-of-privileges-admin-to-kernelsystem">Local escalation of privileges (admin to kernel/system)&#xA0;</h3><p>One of the most common payloads, when we consider vulnerable drivers with arbitrary kernel memory write vulnerabilities, is escalating the privileges of a malicious process. The access privileges for any process are stored in the primary access token structure, which is contained at an undocumented offset in the _EPROCESS structure, the kernel mode structure used to maintain information about each individual process by the Windows kernel. Vergilius Project contains the documentation and offsets of almost all undocumented Windows structures, including <a href="https://_eprocess/" rel="noreferrer noopener"><u>_EPROCESS</u></a>, and can be used as a reference, equally by offensive researchers and defenders. &#xA0; &#xA0;</p><p>A common strategy for escalating privileges of an unprivileged process is to find the _EPROCESS structure of a higher privileged process in kernel memory and replace the access token of the unprivileged process with the access token of the privileged process, which is relatively simple if a vulnerable drivers can be used for reading and writing kernel memory space.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-fdf49e55-a18d-497c-8eab-4bf1e3941fc7.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1436" height="460" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-fdf49e55-a18d-497c-8eab-4bf1e3941fc7.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-fdf49e55-a18d-497c-8eab-4bf1e3941fc7.png 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-fdf49e55-a18d-497c-8eab-4bf1e3941fc7.png 1436w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">_EPROCESS structure contains Windows Process Primary access token (credit: Windows Internals 7</em></i><i><sup style="white-space: pre-wrap;"><em class="italic">th</em></sup></i><i><em class="italic" style="white-space: pre-wrap;"> edition)</em></i></figcaption></figure><p>For example, a privilege escalation may be done by following the steps below:&#xA0;</p><ol><li>Find one _EPROCESS structure/object&#xA0;</li><li>For example, load ntoskernel.exe in user mode and calculate RVA to PsInitialSystemProcess, which points to the System process (id: 0x04) _EPROCESS structure when ntoskernel.exe is loaded in memory during the boot process.&#xA0;</li><li>Use NtQuerySystemInformation((SYSTEM_INFORMATION_CLASS) 11, ModuleInfo, 1024 * 1024, NULL))) // 11 = SystemModuleInformation to find ntoskernel VA &#x2013; use the vuln driver to read the offset, add the RVA to find the _EPROCESS structure in kernel memory.&#xA0;</li><li>Read the token from the known offset using the vulnerable driver read or memory copy functionality.&#xA0;</li><li>Parse _EPROCESS to find the &#xA0;ActiveProcess links member that points to a linked list of other _EPROCESSES and iterate until the low privilege process is found.&#xA0;</li><li>Overwrite the unprivileged process access token with the one previously saved from the SYSTEM process, using a vulnerable driver kernel memory write functionality.&#xA0;&#xA0;</li></ol><h3 id="loading-of-unsigned-kernel-code">Loading of unsigned kernel code&#xA0;</h3><p>Arbitrary kernel memory write vulnerabilities in drivers can be used to deploy unsigned malicious code into the kernel memory space, either in the shellcode format or a format of the unsigned malicious driver. There are several open-source unsigned device drivers loading utilities. In one instance, <a href="https://github.com/estimated1337/lenovo_mapper" rel="noreferrer noopener"><u>Lenovo Mapper</u></a> was used as a base to develop a game cheat utility &#x201C;sexy_girl_addy.exe&#x201D;, which was uploaded to VirusTotal in May 2024. The utility used the code in Lenovo Mapper to load a driver which seems to attempt to disable the TPM-based license check in the game Valorant. &#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-1243c5d7-3c6e-4501-a899-113301888421.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="771" height="610" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-1243c5d7-3c6e-4501-a899-113301888421.png 600w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-1243c5d7-3c6e-4501-a899-113301888421.png 771w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Lenovo Mapper code is used to deploy an unsigned cheat driver using the previously mentioned arbitrary memory write vulnerability CVE-2022-3699</em></i></figcaption></figure><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-6da63766-bd24-4414-b0ea-c68ff9485025.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="746" height="463" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-6da63766-bd24-4414-b0ea-c68ff9485025.png 600w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-6da63766-bd24-4414-b0ea-c68ff9485025.png 746w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">TPM driver functionality was disabled to prevent Valorant license check by the cheat</em></i></figcaption></figure><h3 id="bypass-edr-software-or-game-anti-cheat-software">Bypass EDR software or game anti cheat software&#xA0;</h3><p>To showcase an example of malware exploiting vulnerable drivers to terminate EDR tools, we chose a Gh0stRAT campaign from September 2024. The dropper drops an executable &#x201C;nthandlecallback.exe&#x201D;, a vulnerable Dell binary utilities driver &#x201C;dbutil_2_3.sys&#x201D;, and a ZIP file with the name &#x201C;tree.exe&#x201D;. The ZIP contains an executable file &#x201C;EDR.exe&#x201D;, a DLL file &#x201C;irrlicht.dll&#x201D; and an encrypted file &#x201C;server.log&#x201D;. &#x201C;EDR.exe&#x201D; is a variant of the open-source tool <a href="https://github.com/myzxcg/RealBlindingEDR" rel="noreferrer noopener"><u>RealBlindingEDR</u></a> used to disable EDR programs by exploiting arbitrary memory write vulnerability in Dell&#x2019;s binary utility driver while the first executable loads the DLL, which decrypts the final Gh0stRAT payload from the encrypted file. &#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-c26ae78d-720c-434a-8047-007ee0893de0.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1600" height="970" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-c26ae78d-720c-434a-8047-007ee0893de0.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-c26ae78d-720c-434a-8047-007ee0893de0.png 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-c26ae78d-720c-434a-8047-007ee0893de0.png 1600w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">In September 2024, a Gh0stRAT campaign used RealBlindingEDR to disable EDR drivers</em></i></figcaption></figure><p>RealBlindingEDR is just one of many open-source tools developed for the purpose of disabling endpoint security software, and they are used by both threat actors and in red team-based exercises.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-04069ca3-7712-4b91-84be-f16c87808585.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1600" height="472" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-04069ca3-7712-4b91-84be-f16c87808585.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-04069ca3-7712-4b91-84be-f16c87808585.png 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-04069ca3-7712-4b91-84be-f16c87808585.png 1600w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Dbutil_2_3.sys is one of the drivers supported for disabling EDR tools by RealBlindingEDR</em></i></figcaption></figure><h3 id="miscellaneous-other-payloads">Miscellaneous other payloads&#xA0;</h3><p>Vulnerable drivers, mostly in the category of drivers with insufficient access controls, have been used in some advanced attacks. For example, in the Shamoon campaign, a RawDisk driver from Eldos was used to overwrite hard drives, while in February 2022, <a href="https://blog.talosintelligence.com/threat-advisory-hermeticwiper/" rel="noreferrer noopener"><u>HermeticWiper</u></a> used a proxy physical disk writing driver from&#xA0;&#x201C;EaseUS Partition Master&#x201D; driver&#xA0;partition manager &#x201C;empntdrv.sys&#x201D; for overwriting drives. HermeticWiper contained four embedded resources, which are compressed copies of drivers used by the wiper, depending on the Windows version and the default word memory size for the operating system.&#xA0;</p><p>&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-cfa3f9ca-f542-4299-9758-cebb7eb82335.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1243" height="476" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-cfa3f9ca-f542-4299-9758-cebb7eb82335.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-cfa3f9ca-f542-4299-9758-cebb7eb82335.png 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-cfa3f9ca-f542-4299-9758-cebb7eb82335.png 1243w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Different versions of &#x201C;EaseUS Partition Master&#x201D; partition manager driver are embedded as resources into HermeticWiper code</em></i></figcaption></figure><p>&#xA0;</p><h2 id="ransomware-examples-of-malicious-actors-use-of-byod">Ransomware examples of malicious actors&apos; use of BYOD&#xA0;</h2><p>With the wide availability of EDR bypassing tools exploiting vulnerable drivers, it is not a surprise that the exploitation moved from the domain of advanced threat actors into the domain of commodity threats, primarily ransomware. We document here some of the known ransomware groups employing the BYOVD technique. &#xA0;</p><h3 id="januarykasseika">January - Kasseika&#xA0;&#xA0;</h3><p>In January 2024, Kasseika ransomware operators abused a vulnerable driver, &#x201C;<a href="https://www.bleepingcomputer.com/news/security/kasseika-ransomware-uses-antivirus-driver-to-kill-other-antiviruses/" rel="noreferrer noopener"><u>viragt64.sys&#x201D;</u></a>, which is part of the legitimate VirIT antivirus software, to disable a pre-determined list of 991 processes related to security tools and system utilities. The ransomware-as-a-service (RaaS) operation has been active since 2023 and uses double extortion techniques but does not operate a data leak site. In recent attacks, the ransomware first executes a script to load various tools, such as a malicious executable named &#x201C;Martini.exe&#x201D; and the vulnerable driver that is renamed &#x201C;<a href="https://www.bleepingcomputer.com/news/security/kasseika-ransomware-uses-antivirus-driver-to-kill-other-antiviruses/" rel="noreferrer noopener"><u>Martini.sys</u></a>&#x201D;. Next, Kasseika will create and start a new service whereby the driver is loaded into the malicious executable. &#xA0;&#xA0;</p><p>The executable starts scanning the environment for the hard-coded list of processes and, if detected, a control code is sent to the driver enabling it to terminate processes. &#xA0;</p><h3 id="march-%E2%80%93-akira">March &#x2013; Akira&#xA0;&#xA0;</h3><p>In March 2024, Akira has been observed abusing the legitimate, signed Zemana anti-malware kernel driver &#x201C;<a href="https://www.bleepingcomputer.com/news/security/terminator-antivirus-killer-is-a-vulnerable-windows-driver-in-disguise/" rel="noreferrer noopener"><u>zamguard64.sys</u></a>&#x201D; via PowerTool to disable EDR at the kernel level. The exploitation of the Zemana zamguard driver was a main component of the popular Terminator EDR killer tool listed for sale on illicit marketplaces beginning May 2023. &#xA0;</p><h3 id="july-%E2%80%93-qilin">July &#x2013; Qilin&#xA0;&#xA0;&#xA0;</h3><p>In July 2024, the Qilin ransomware group, another group operating under a Raas model, was observed using a new malware dubbed &#x201C;<a href="https://trustedsec.com/blog/technical-analysis-killer-ultra-malware-targeting-edr-products-in-ransomware-attacks" rel="noreferrer noopener"><u>Killer Ultra</u></a>&#x201D; within an attack. Killer Ultra has a plethora of capabilities, including the ability to terminate security tools with a BYOVD technique, abusing a known arbitrary process termination vulnerability impacting Zemana Anti-Keylogger driver &#x201C;	&#x201D;, tracked as CVE-2024-1853. The vulnerability enables attackers with the ability to terminate processes. Upon execution, Killer Ultra unpacks the vulnerable driver and creates a new service to looks for and disable a list of security tools. &#xA0;&#xA0;&#xA0;</p><h3 id="july-%E2%80%93-blackbyte">July &#x2013; BlackByte&#xA0;&#xA0;</h3><p>Talos recently observed and documented developments in recent BlackByte attacks in July 2024 leveraging BYOVD to facilitate host encryption. The newer encryptor variant was observed <a href="https://blog.talosintelligence.com/blackbyte-blends-tried-and-true-tradecraft-with-newly-disclosed-vulnerabilities-to-support-ongoing-attacks/" rel="noreferrer noopener"><u>dropping four vulnerable drivers</u></a> as part of BlackByte&#x2019;s usual BYOVD attack chain, which is an increase from the two or three drivers described in previous reports.These drivers consisted of <a href="https://www.loldrivers.io/drivers/e32bc3da-4db1-4858-a62c-6fbe4db6afbd/" rel="noreferrer noopener"><u>RtCore64.sys</u></a>, a driver originally used by MSI Afterburner a system overclocking utility, <a href="https://www.loldrivers.io/drivers/a4eabc75-edf6-4b74-9a24-6a26187adabf/" rel="noreferrer noopener"><u>DBUtil_2_3.sys</u></a>, a driver that is part of the Dell Client firmware update utility, <a href="https://www.loldrivers.io/drivers/e5f12b82-8d07-474e-9587-8c7b3714d60c/" rel="noreferrer noopener"><u>zamguard64.sys</u></a>, a part of the previously mentioned Zemana Anti-Malware (ZAM) application exploited by other threat actors, and <a href="https://www.loldrivers.io/drivers/2bea1bca-753c-4f09-bc9f-566ab0193f4a/" rel="noreferrer noopener"><u>gdrv.sys</u></a>, a component of is the GIGABYTE tools software package for GIGABYTE motherboards.&#xA0;</p><p>These four drivers were renamed and dropped by the encryptor binary in all BlackByte attacks investigated by Cisco Talos Incident Response (Talos IR), each with a similar naming convention. The nomenclature for the vulnerable drivers consisted of eight random alphanumeric characters followed by an underscore and an iterating number value. &#xA0;</p><h3 id="augustransomhub">August - RansomHub&#xA0;&#xA0;</h3><p>In August 2024, RansomHub ransomware actors were observed using a new malware known as EDRKillShifter to disable security tools prior to executing the ransomware binary. The EDRKillShifter can act as a loader for a vulnerable legitimate driver that, once exploited, can facilitate persistent defense evasion. Recent exploits used by the adversary are related to POCs found on Github leveraging <a href="https://github.com/keowu/BadRentdrv2" rel="noreferrer noopener"><u>RentDrv2</u></a>, while the other exploited a driver called <a href="https://github.com/BlackSnufkin/BYOVD/tree/main/TfSysMon-Killer" rel="noreferrer noopener"><u>ThreatFireMonitor.</u></a> The adversary initiated the process by launching the password-protected <a href="https://symantec-enterprise-blogs.security.com/threat-intelligence/ransomhub-knight-ransomware" rel="noreferrer noopener"><u>EDRKillShifter</u></a> binary, which decrypts and executes an embedded resource in memory, unpacking and executing a payload to exploit the target vulnerable legitimate driver to escalate privileges and disable active EDR processes. &#xA0;</p><p>The malware then created and started a new service for the driver, loading it into the system. Finally, it continuously scanned for and terminated processes that match a hardcoded list of targets, for persistent defense evasion even on reboot. &#xA0;</p><p>The adoption of the BYOVD technique by RansomHub and Qilin may be linked to members of the financially motivated threat group <a href="https://thehackernews.com/2024/07/scattered-spider-adopts-ransomhub-and.html" rel="noreferrer noopener"><u>Scattered Spider</u></a> joining forces with these ransomware groups. &#xA0;The new partnership was identified and disclosed in public reporting in July 2024, but it is possible the relationship was already well established before then. Scattered Spider members are known for <a href="https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic/" rel="noreferrer noopener"><u>employing BYOVD tactics</u></a> since at least December 2022. &#xA0;</p><figure class="kg-card kg-image-card"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-6140891b-a17d-46c8-84f4-dfdfd7a310db.jpeg" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1600" height="817" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-6140891b-a17d-46c8-84f4-dfdfd7a310db.jpeg 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-6140891b-a17d-46c8-84f4-dfdfd7a310db.jpeg 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-6140891b-a17d-46c8-84f4-dfdfd7a310db.jpeg 1600w" sizes="(min-width: 720px) 720px"></figure><p>&#xA0;</p><h1 id="windows-drivers-and-vulnerabilities">Windows drivers and vulnerabilities&#xA0;</h1><h3 id="creating-malicious-windows-drivers-is-increasingly-difficult">Creating malicious Windows drivers is increasingly difficult&#xA0;</h3><p>Creating a new malicious Windows kernel driver is becoming increasingly difficult. New Windows drivers must be signed with a valid extended validation (EV) certificate by the developer, pass the Microsoft Hardware Lab Kit (HLK) compatibility tests, and be signed by the Microsoft Dev Portal. &#xA0;</p><p>However, this complex process, introduced for any newly created Windows kernel or user mode driver, does not apply to existing drivers, which means that legacy drivers signed with valid certificates will still be loaded into the Windows kernel space. &#xA0;</p><p>Installing and exploiting existing legacy vulnerable drivers may be one of the very few ways to make changes to kernel data structures or execute code in kernel, as drivers have the same permissions as any other Windows kernel component.&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-86a67a5b-c4cf-4118-ab46-2fcf59751ed0.jpeg" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1173" height="1600" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-86a67a5b-c4cf-4118-ab46-2fcf59751ed0.jpeg 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-86a67a5b-c4cf-4118-ab46-2fcf59751ed0.jpeg 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-86a67a5b-c4cf-4118-ab46-2fcf59751ed0.jpeg 1173w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Exploiting vulnerability in a legacy driver is the same as exploiting any kernel vulnerability</em></i></figcaption></figure><p>Microsoft introduced a blocklist of known vulnerable drivers to tackle this issue. At the beginning, the list was included into the Windows Defender Application Control feature and was superseded by the Windows Security application in newer Windows versions. &#xA0;</p><p>Although the vulnerable drivers block list is turned on by default in systems running the Windows 11 2022 update or with systems with hardware virtualization code integrity (HVCI) turned on, there are still many systems which can be attacked by deploying a vulnerable driver or any newly discovered vulnerable driver that is not already on the blocklist. &#xA0;&#xA0;</p><h2 id="common-classes-of-vulnerabilities-in-byovd-drivers">Common classes of vulnerabilities in BYOVD drivers&#xA0;</h2><p>While investigating vulnerable Windows kernel drivers commonly used by threat actors for BYOVD campaigns, we identified three classes of vulnerabilities that are typically exploited: arbitrary MSR writes, arbitrary kernel memory writes, and insufficient access controls to driver&#x2019;s functionality. This classification is not strict, and one driver can belong to multiple classes of vulnerabilities. &#xA0;</p><h3 id="arbitrary-msr-readwrite-vulnerabilities">Arbitrary MSR read/write vulnerabilities&#xA0;</h3><p>To consider this class of vulnerabilities, we first need to introduce CPU model specific registers (MSRs). MSRs are additional CPU registers that are used by the CPU and the operating system for various purposes, including regulation of caching mechanism, regulation of fan speed, or transition from user mode into kernel mode. The MSRs can be addressed by their specific number, and some of them also have human readable names. &#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-3c6171a5-eaa8-44e9-a7f2-f2b6a65cdec5.jpeg" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1495" height="1600" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-3c6171a5-eaa8-44e9-a7f2-f2b6a65cdec5.jpeg 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-3c6171a5-eaa8-44e9-a7f2-f2b6a65cdec5.jpeg 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-3c6171a5-eaa8-44e9-a7f2-f2b6a65cdec5.jpeg 1495w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">A specific MSR is key for making transition from user to kernel modes after calling a win32 API function</em></i></figcaption></figure><p>&#xA0;As a reminder, the transition from kernel to user mode happens in the lowest user mode DLL layer, usually &#x201C;ntdll.dll&#x201D;, when a system call number is placed into register rax and the syscall or the &#x201C;int 0x2e&#x201D; instruction is executed. During the transition, the syscall instruction updates the Instruction Pointer (RIP) and sets it to the address of the system call handler in the kernel as well as the Stack Pointer (RSP) to point to a stack in kernel space.&#xA0;</p><p>The first function to run is &#x201C;KiSystemCall64&#x201D;, and a question one can ask is how do Windows know where to start the execution in kernel mode? The answer lies in a MSR specifically used during user to kernel mode transition. For 64-bit Windows systems, it is the IA32_LSTAR (MSR 0xC0000082), which contains the address of the kernel-mode entry point for the syscall instruction, typically the KiSystemCall64 function.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-783a6c93-6ef0-4c49-8ba9-6cef75dda49b.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="588" height="237"><figcaption><i><em class="italic" style="white-space: pre-wrap;">MSR 0xc0000082 contains the address of the first instruction to execute in kernel mode</em></i></figcaption></figure><p>By having the ability to write content into arbitrary MSRs, attackers may be able to replace the pointer to KiSystemCall64 with the pointer to a malicious function that can run code in the kernel context. &#xA0;</p><p>As an example of a driver vulnerable to arbitrary MSR modifications, we chose WinRing0 driver, which is commonly used by XMRig cryptocurrency mining software to disable some processor features such as caching, to increase the performance of the miner. WinRing0 is also included in many open and closed source programs. Unfortunately, the driver is also exposed to an arbitrary MSR write vulnerability which can lead to kernel mode code execution in versions of Windows prior to Windows 8 or to <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1116" rel="noreferrer noopener"><u>escalation of privileges</u></a> in later Windows versions. This method is mitigated in the latest Windows versions with the latest exploit mitigations, such as Virtualization Based Security (which will be discussed later in the post), which is enabled by default. &#xA0;&#xA0;&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-2622e0d5-e33e-4274-8ef5-e09789714609.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="1244" height="912" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-2622e0d5-e33e-4274-8ef5-e09789714609.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/12/data-src-image-2622e0d5-e33e-4274-8ef5-e09789714609.png 1000w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-2622e0d5-e33e-4274-8ef5-e09789714609.png 1244w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">WinRing0 driver is vulnerable to an arbitrary MSR write vulnerability</em></i></figcaption></figure><h3 id="arbitrary-kernel-physical-memory-readwrite-vulnerabilities">Arbitrary kernel physical memory read/write vulnerabilities&#xA0;</h3><p>The second class of vulnerabilities in frequently used BYOVD drivers is the arbitrary kernel memory write class. Here, a driver functionality to write arbitrary memory is used as a write primitive to deploy shellcode into kernel memory or change important kernel data structures to achieve escalation of privileges for a malicious user mode process.&#xA0;&#xA0;</p><p>A significant number of drivers with this class of vulnerability exists, and most of them are well documented. Readers are referred to the <a href="https://www.loldrivers.io/" rel="noreferrer noopener"><u>loldrivers</u></a> project to find examples of vulnerable drivers allowing kernel memory write. &#xA0;</p><p>Any driver that uses one of the following kernel functions for may be regarded as a candidate for this class of vulnerabilities, although further analysis is almost always required to conclude that a user buffer and the target address can be supplied to the driver through a user-accessible device I/O control code (IOCTL):&#xA0;</p>
<!--kg-card-begin: html-->
<pre>Access to Physical Memory&#xA0;
MmMapIOSpace()&#xA0;
ZwMapViewOfSection()
  
PCI Config Space Access&#xA0;
HalSetBusDataByOffset()&#xA0;
HalGetBusDataByOffset()
  
Memory Copying Operations&#xA0;
memcpy()&#xA0;
memmove()&#xA0;
<br>
</pre>
<!--kg-card-end: html-->
<p>A good example of this vulnerability group is CVE-2022-3699, a vulnerability in a Lenovo driver that allows arbitrary memory reading and writing. &#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-f9cc3add-0d57-4a16-99e4-fa239b87eedf.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="555" height="558"><figcaption><i><em class="italic" style="white-space: pre-wrap;">CVE-2022-3699 - memory write via exposed MmMapIoSpace function in a Lenovo driver</em></i></figcaption></figure><p>&#xA0;</p><h3 id="misusing-existing-functionality-in-windows-drivers-with-insufficient-access-controls">Misusing existing functionality in Windows drivers with insufficient access controls&#xA0;</h3><p>The third and the last class of vulnerabilities used by threat actors in attacks using BYOVD drivers is misusing existing driver functionality caused by insufficient access controls.&#xA0;&#xA0;</p><p>INF files are files used during a driver&#x2019;s installation, and among other things, they also contain permissions for the driver, specified using the SDDL language. <a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/driversecurity/windows-security-model" rel="noreferrer noopener"><u>The Security Descriptor Definition Language</u></a> (SDDL) is a domain specific language that allows components to generate access control lists (ACLs) using a string format. It is utilized in both user-mode and kernel-mode programming. The diagram below illustrates how SDDL strings are structured for device objects.&#xA0;</p><p>The access value specifies the type of access allowed. The SID value specifies a security identifier that determines to whom the access value applies (for example, a user or group). For example, string &#x201C;D:P(A;;GA;;;SY)(A;;GR;;;WD)&#x201D; allows the system (SY) access to everything and allows everyone else (WD) only read access. &#xA0;</p><p>&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-36788191-02d8-4465-bdda-d466ae5c16a5.gif" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="526" height="182"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Security Descriptor Definition Language string format manages access permissions to driver objects</em></i></figcaption></figure><p>Programming Windows kernel drivers has a steep learning curve and, as a consequence, many drivers contain code that is copied from templates and example drivers, including their SDDL access permissions. When a driver is created, it is likely that its access permissions will be inadequate and will allow unprivileged users access to functionality that should otherwise be available to users with higher privilege levels. &#xA0;</p><p>A good example of a vulnerable driver with insufficient permissions would be an old version of an antimalware software driver &#x201C;viragt64.sys&#x201D; (VirIT Agent System) developed by TG Soft, which exposes the functionality of terminating a process from the kernel mode to users with lower levels of privileges. This driver is used by ransomware threat actors such as <a href="https://www.trendmicro.com/en_gb/research/24/a/kasseika-ransomware-deploys-byovd-attacks-abuses-psexec-and-expl.html" rel="noreferrer noopener"><u>Kasseika</u></a> to terminate other antimalware and EDR products. &#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-0c27c4f0-1548-464f-b22a-188349ee3b09.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="636" height="235" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-0c27c4f0-1548-464f-b22a-188349ee3b09.png 600w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-0c27c4f0-1548-464f-b22a-188349ee3b09.png 636w"><figcaption><i><em class="italic" style="white-space: pre-wrap;">The device IOCTL control code 0x82730030 is used to terminate an arbitrary process from the kernel mode</em></i></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-bb3ffe0f-4166-48db-ad13-308af5be6aca.png" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="667" height="304" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/12/data-src-image-bb3ffe0f-4166-48db-ad13-308af5be6aca.png 600w, https://blog.talosintelligence.com/content/images/2024/12/data-src-image-bb3ffe0f-4166-48db-ad13-308af5be6aca.png 667w"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Viragt64.sys used ZwTerminateProcess to terminate arbitrary process, which can be misused by threat actors due to insufficient access permissions</em></i></figcaption></figure><p>In addition to documenting different classes of vulnerabilities in frequently used BYOVD drivers, we also investigated the most common payloads delivered by threats and potentially unwanted applications after exploiting vulnerable drivers and classified them into several groups including local escalation privileges, loading of unsigned code and bypassing EDR functionality. &#xA0;&#xA0;</p><h2 id="modern-windows-mitigations-and-vulnerable-drivers">Modern Windows mitigations and vulnerable drivers&#xA0;</h2><p>Loading malicious code into kernel memory is one of the most powerful payloads attackers can use. This approach was frequently employed in the early days of Windows, prior to Windows Vista, when there were no requirements to sign drivers. The ability to load unsigned code into kernel mode was an incentive for the creation of several Windows kernel rootkits, such as Sinowal or TDL4, designed to hide the presence of malicious payloads from defenders by modifying kernel programs and data structures. &#xA0;</p><p>To respond to those threats and kernel exploitation in general, Microsoft introduced kernel patch protection (KPP), better known as Patch Guard, in x64 versions of Windows XP SP3. This was followed by the requirement for drivers to be signed in x64 Windows Vista. &#xA0;</p><p>The introduction of the mitigations into the Windows kernel sparked a race between threat actors and Microsoft. Attackers quickly responded to newly introduced mitigations by showing how digital signature enforcement can be turned off in a race with the Patch Guard, and Microsoft responded with more mitigations. Over time, the exploitation of Windows kernels became increasingly challenging. &#xA0; Next, we will briefly describe only four significant anti-exploitation features implemented with Windows 10 and 11. &#xA0;</p><h3 id="virtualization-based-security-vbs">Virtualization-Based Security (VBS)&#xA0;</h3><p>Virtual Trust Levels (VTLs) are a key concept within <a href="https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs" rel="noreferrer noopener"><u>Virtualization-Based Security (VBS)</u></a>, designed to enhance system security by creating isolated execution environments. VTLs leverage hardware virtualization to separate and protect sensitive processes from potentially less secure code running in the main operating system.&#xA0;</p><p>VTLs are essentially different security levels or &quot;worlds&quot; within the same physical machine, each providing a different level of trust. The main goal of VTLs is to isolate trusted operations and data from the rest of the system to prevent tampering. In Windows, there are two main VTL levels.&#xA0;&#xA0;</p><p>&#x2022;	VTL0: This is the standard trust level, where the traditional operating system and all user-mode and kernel-mode applications run.&#xA0;&#xA0;</p><p>&#x2022;	VTL1: This is a higher trust level used to execute sensitive security functions and store critical data. It is isolated from VTL0, meaning that operations in VTL0 cannot directly access or modify the code and data in VTL1. VTL1 is used to store sensitive information like encryption keys, password hashes, and security tokens (credentials guard).&#xA0;&#xA0;</p><p>&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/12/data-src-image-deafd43e-9554-4140-8583-e829ca367cdf.jpeg" class="kg-image" alt="Exploring vulnerable Windows drivers" loading="lazy" width="400" height="382"><figcaption><i><em class="italic" style="white-space: pre-wrap;">High level architecture of Virtualization-based security concepts, credit: Windows Internals 7</em></i><i><sup style="white-space: pre-wrap;"><em class="italic">th</em></sup></i><i><em class="italic" style="white-space: pre-wrap;"> edition, part 1</em></i></figcaption></figure><p>&#xA0;By running different parts of the kernel in different trust levels, effectively different virtual machines, Windows can use <a href="https://en.wikipedia.org/wiki/Second_Level_Address_Translation" rel="noreferrer noopener"><u>Second Level Address Translation</u></a> (SLAT) to create different access permissions for memory pages depending on the source of access.&#xA0;&#xA0;</p><p>Essentially, in a process similar to shadowing page tables, VBS enforces exclusive write or execute page access permission. In other words, if a code from VTL0 attempts to change its own page table permissions from writable to executable this will be detected by the VTL1 and the data in the page still won&#x2019;t be able to execute.&#xA0;&#xA0;</p><p>This mechanism is one of the key features of another important mitigation, Hypervisor-Protected Code Integrity (HVCI).&#xA0;</p><h3 id="hypervisor-protected-code-integrity-hvci">Hypervisor-Protected Code Integrity (HVCI)&#xA0;</h3><p>When <a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/bringup/device-guard-and-credential-guard" rel="noreferrer noopener"><u>Hypervisor-protected Code Integrity (HVCI)</u></a> is enabled on a Windows system, it enforces control over memory page permissions to mitigate executable code injection. HVCI is designed so that only verified and trusted code is executed in kernel mode, and it applies policies to manage how memory pages can be used and modified.&#xA0;</p><p>One of the important features enforced by HVCI (and supported by modern CPUs) is the prevention of pages being simultaneously writable and executable. This policy is known as Write XOR Execute (W^X), which prevents memory pages from being both writable and executable at the same time.&#xA0;&#xA0;</p><p>HVCI prevents direct execution of code from pages that were recently writable, unless specific security checks are passed. Before any code can execute from a page that has had its permissions altered, it must pass a code integrity check, ensuring it is signed by a trusted certificate. If the code does not meet these integrity requirements, execution will be blocked. HVCI attempts to ensure that any code running in kernel mode is signed with a valid certificate.&#xA0;&#xA0;</p><h3 id="kernel-control-flow-guard-kcfg">Kernel Control Flow Guard (kCFG)&#xA0;</h3><p>Kernel Control Flow Guard (kCFG) is a security feature in Windows designed to protect the operating system&apos;s kernel from certain types of attacks that attempt to manipulate the control flow of kernel-mode code. It builds on the principles of Control Flow Guard (CFG), used to secure user-mode applications.&#xA0;</p><p>kCFG aims to prevent exploits that involve redirecting the control flow of kernel code to unintended or malicious locations which should prevent exploits that hijack the control flow by overwriting function pointers and other data used for indirect code execution.&#xA0;&#xA0;</p><p>During the compilation of the Windows kernel, kCFG instruments the code to create valid address bitmap and any indirect call must finish at a target known at compile time. If the call is directed outside know target the system will cause a security check failure.&#xA0;&#xA0;&#xA0;</p><h3 id="kernel-shadow-stack">Kernel shadow stack&#xA0;</h3><p>The primary purpose of the Windows kernel shadow stack is to ensure that the return addresses on the call stack cannot be tampered with, specifically to mitigate exploitation using Return Oriented Programming (ROP).&#xA0;</p><p>The shadow stack maintains a separate, copy of return addresses parallel to the regular call stack. When a function call occurs, the return address is pushed onto both the regular stack and the shadow stack. Upon function return, the system verifies the return address against the shadow stack to ensure it has not been altered. The shadow stack in Windows is hardware assisted for better performance through Intel Control-Flow Enforcement Technology (CET) and AMD Shadow Stacks.&#xA0;&#xA0;</p><h1 id="conclusion">Conclusion&#xA0;</h1><p>In recent years, Windows platform security has improved to effectively prevent deployment of newly developed malicious drivers. However, kernel mode threats of vulnerable legacy drivers remain a concern. Luckily there are a few things we can do to mitigate the risks and detect potential campaigns using BYOVD technique.&#xA0;</p><p>This could include enforcement of Extended Validation (EV) and Windows Hardware Quality Labs (WHQL) certified drivers, preventing risks associated with legacy drivers. If the blocking of all legacy drivers is not possible, employing the Windows Defender Application Control (Windows Security) drivers blocklist is recommended way to prevent the execution of known vulnerable drivers.&#xA0;</p><p>Apart from the above, for threat detection and response, it recommended to develop a capability to monitor driver load events, such as those recorded by <a href="https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon" rel="noreferrer noopener"><u>Sysmon&#x2019;s event ID 6</u></a>.&#xA0;&#xA0;</p><p>In summary, while Windows security has improved, maintaining vigilance against kernel mode threats requires adoption of best practices and monitoring techniques to protect against known and unknown driver vulnerabilities.&#xA0;&#xA0;</p><h1 id="references-and-further-reading">References and further reading&#xA0;</h1><h4 id="posts-and-papers"><em>Posts and papers&#xA0;</em></h4><ol><li><a href="https://blog.talosintelligence.com/exploring-malicious-windows-drivers-part-1-introduction-to-the-kernel-and-drivers/" rel="noreferrer noopener"><u>Exploring Malicious Drivers Part 1</u></a> - Cisco Talos&#xA0;</li><li><a href="https://blog.talosintelligence.com/exploring-malicious-windows-drivers-part-2/" rel="noreferrer noopener"><u>Exploring Malicious Drivers Part 2</u></a> - Cisco Talos&#xA0;</li><li><a href="https://www.crowdstrike.com/en-us/blog/state-of-exploit-development-part-1/" rel="noreferrer noopener"><u>The Current State of Exploit Development, Part 1</u></a> &#x2013; Connor McGarr, Crowdstrike&#xA0;</li><li><a href="https://www.crowdstrike.com/en-us/blog/state-of-exploit-development-part-2/" rel="noreferrer noopener"><u>The Current State of Exploit Development, Part 2</u></a> &#x2013; Connor McGarr, Crowdstrike&#xA0;</li><li><a href="https://connormcgarr.github.io/hvci/" rel="noreferrer noopener"><u>No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG</u></a> &#x2013; Connor McGarr&#xA0;</li><li><a href="https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/" rel="noreferrer noopener"><u>Signed kernel drivers &#x2013; Unguarded gateway to Windows&#x2019; core</u></a> &#x2013; Michal Poslu&#x161;n&#xFD;, ESET&#xA0;</li><li><a href="https://documents.trendmicro.com/assets/white_papers/wp-an-in-depth-look-at-windows-kernel-threats.pdf" rel="noreferrer noopener"><u>An In-Depth Look At Windows Kernel Threats</u></a> - TrendMicro&#xA0;</li><li><a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/driversecurity/windows-security-model" rel="noreferrer noopener"><u>Windows security model for driver developers</u></a> - Microsoft&#xA0;</li><li><a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/install/kernel-mode-code-signing-policy--windows-vista-and-later-" rel="noreferrer noopener"><u>Driver Signing Policy</u></a> &#x2013; Microsoft&#xA0;&#xA0;</li><li><a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/dashboard/code-signing-reqs" rel="noreferrer noopener"><u>Driver code signing requirements</u></a> &#x2013; Microsoft&#xA0;</li></ol><h4 id="videos"><em>Videos&#xA0;</em></h4><ol><li><a href="https://www.youtube.com/live/nauAlHXrkIk" rel="noreferrer noopener"><u>A Look at Modern Windows Kernel Exploitation/Hacking</u></a> - Off By One Security podcast with Connor McGarr&#xA0;</li><li><a href="https://youtu.be/vz15OqiYYXo" rel="noreferrer noopener"><u>Windows Internals</u></a> - By Alex Sotirov&#xA0;</li><li><a href="https://youtu.be/BBJgKuXzfwc" rel="noreferrer noopener"><u>Kernel Mode Threats and Practical Defenses</u></a> &#x2013; Joe Desimone, Gabriel Landau, Endgame (now Elastic)&#xA0;</li><li><a href="https://vimeo.com/335216903" rel="noreferrer noopener"><u>Device Driver Debauchery and MSR Madness</u></a> - Ryan Warns, Timothy Harrison - INFILTRATE 2019&#xA0;&#xA0;</li><li><a href="https://youtu.be/OBreVsVK-L8" rel="noreferrer noopener"><u>No Code Execution? No Problem!</u></a>&#xA0; - Connor McGarr&#xA0;</li><li><a href="https://www.youtube.com/watch?v=tzWq5iUiKKg" rel="noreferrer noopener"><u>Get Off the Kernel if You Can&apos;t Drive</u></a> - Jesse Michael, DEF CON 27 Conference&#xA0;&#xA0;</li></ol><h4 id="books"><em>Books&#xA0;</em></h4><ol><li>Windows Internals 7<sup>th</sup> Edition - Pavel Yosifovich, Alex Ionescu, Mark E. Russinovich, David A. Solomon, Published by Microsoft Press&#xA0;</li><li>Windows NT Device Driver Development &#x2013; Peter G. Viscarola &amp; W. Anthony Mason, Published by New Riders Publishing&#xA0;</li><li>Windows Kernel Programming &#x2013; Pavel Yosifovich, Published by Pavel Yosifovich&#xA0;</li></ol>]]></content:encoded></item><item><title><![CDATA[Something to Read When You Are On Call and Everyone Else is at the Office Party]]></title><description><![CDATA[Its mid-December, if you’re on-call or working to defend networks, this newsletter is for you. Martin discusses the widening gap between threat and defences as well as the growing problem of home devices being recruited to act as proxy servers for criminals.]]></description><link>https://blog.talosintelligence.com/something-to-read-when-you-are-on-call-and-everyone-else-is-at-the-office-party/</link><guid isPermaLink="false">6759811d225be800018640f7</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Martin Lee]]></dc:creator><pubDate>Thu, 12 Dec 2024 19:05:33 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-5.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-5.jpg" alt="Something to Read When You Are On Call and Everyone Else is at the Office Party"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>The new head of the UK&#x2019;s National Cyber Security Centre, Richard Horne, recently&#xA0;<a href="https://www.ncsc.gov.uk/speech/ncsc-annual-review-launch-2024-ceo-dr-richard-horne" rel="nofollow noopener">remarked</a>&#xA0;that there is a &#x201C;<em>clearly widening gap between, on the one hand, the threat and our exposure to it and, on the other, the defences that are in place to protect us.</em>&#x201D;</p><p>To those of us working in cyber security, the threat is evident. We spend our lives following the actions of threat actors and analysing their new attacks. Our thoughts and actions are rooted in how the threat landscape is evolving. Unfortunately, this is not necessarily the case for those who decide budget allocations.</p><p>Nobody wants to suffer a breach, but often security teams are frustrated by competing budget items and the difficulties of explaining complex mitigations to people who may have different priorities and interests.</p><p>If keeping informed is one half of the solution to closing the gap, the other is in recognising that we are all human. We&#x2019;re all trying to do the best that we can with the information that we have available to us. What may be perceived as irrational behaviour to one observer, may be the most obvious course of action to another with a different point of view.</p><p>Constantly explaining how threat actors are changing and how attacks are evolving is vital to ensure that organisations can maintain a good security posture. Talking about cyber security to different audiences, using the language and metaphors with which they are familiar are all part of the solution in defeating cyber attacks.</p><p>If we are to move to a world free from cyber insecurity we must close the gap between threat and defense. This will take communication and understanding, both to communicate the threat, but also to understand the constraints that decision makers work under. Yet, we also need to express and recognise the effort and sometimes heroic acts of effort that cyber security teams undertake to keep businesses running and free from breaches. </p><p>This is all the more true during the holiday period, when many engineers and analysts are monitoring systems or on-call, keeping the systems running and the lights on, so that others can enjoy the festivities. If this is you, then know that we&#x2019;re thinking of you.</p><h1 id="the-one-big-thing">The one big thing&#xA0;</h1><p>Hiding the origin and destination of network traffic is vital for the bad guys to cover their tracks and obfuscate their actions. A malicious connection that originates from the same IP space as legitimate employees&#x2019; connections is less likely to catch the attention of security teams than one from a distant country. Similarly, exfiltrating data in small chunks to many in-country residential IP addresses is less likely to raise alarms than exfiltrating to a single address.</p><p>Cybercriminals are increasingly compromising consumer and IoT devices to build vast networks of proxy systems, enabling them to mask their activities and route malicious traffic through a global pool of hijacked IP addresses.</p><h3 id="why-do-i-care">Why do I care?</h3><p>Routing malicious traffic through otherwise unsuspicious networks makes identification and attribution of attacks difficult. Owners and operators of compromised systems recruited to act as proxies suffer from reduced performance and the theft of network and CPU resources from their systems.</p><h3 id="so-now-what">So now what?</h3><p>Firstly, ensure that patches are applied, and default or easy to guess credentials are changed to avoid becoming part of the problem. Apply zero-trust principles to authenticate users via MFA in the context of the time and date of the access; importantly verify that the connecting device confirms to policy and is authorised to connect to corporate systems. For full details on how to respond to this threat see the <a href="https://blog.talosintelligence.com/the-evolution-and-abuse-of-proxy-networks"><u>blog post</u></a>.</p><h1 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h1><h3 id="presidential-elections-in-romania-hit-by-cyber-campaign">Presidential Elections in Romania hit by Cyber Campaign</h3><p>The first round of the presidential election in Romania has been annulled by the country&#x2019;s constitutional court following claims of a foreign influence campaign to sway the vote, and cyber-attacks targeting electoral data.</p><p>(BBC News&#xA0;<a href="https://www.bbc.com/news/articles/cn4x2epppego" rel="nofollow noopener">1</a>&#xA0;&amp;&#xA0;<a href="https://www.bbc.com/news/articles/cgq18w507dko" rel="nofollow noopener">2</a>)</p><p>&#xA0;</p><h3 id="secure-criminal-chat-system-%E2%80%9Cmatrix%E2%80%9D-disrupted-by-law-enforcement">Secure Criminal Chat System &#x201C;Matrix&#x201D; Disrupted by Law Enforcement</h3><p>The Matrix secure communication systems which offered encrypted messaging for criminals has been taken down by law enforcement authorities with millions of messages secured for investigation. This take down follows similar success against other criminal messaging systems such as EncroChat, Sky ECC and Ghost.</p><p>(<a href="https://www.theregister.com/2024/12/04/eurocop_crack_matrix/" rel="noreferrer">The Register</a>)</p><p>&#xA0;</p><h3 id="wanted-russian-suspected-ransomware-actor-arrested">Wanted Russian Suspected Ransomware Actor Arrested</h3><p>Authorities in Russia have arrested Mikhail Matveev, an individual wanted in the US in connection with alleged participation in LockBit, Hive and Babuk ransomware attacks.&#xA0;The broader significance of this arrest in Russia is unclear, although it does indicate that tolerance of the actions cyber criminals located within Russia does have limits.</p><p>(<a href="https://www.securityweek.com/russian-hacker-with-10-million-bounty-on-his-head-reportedly-arrested/" rel="nofollow noopener">SecurityWeek</a>)</p><p>&#xA0;</p><h1 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t get enough Talos?&#xA0;</h1><figure class="kg-card kg-embed-card"><iframe style="border-radius: 12px" width="100%" height="152" title="Spotify Embed: Misadventures, Rabbit Holes, and Turkey Lurkey Goes to the Movies" frameborder="0" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy" src="https://open.spotify.com/embed/episode/3Mnq8AGfjC9qFLeZnGbFAE?si=b_TcLfCvTmqM104v1E7UWg&amp;utm_source=oembed"></iframe></figure><figure class="kg-card kg-embed-card"><iframe style="border-radius: 12px" width="100%" height="152" title="Spotify Embed: It&apos;s the 35th anniversary of ransomware - let&apos;s talk about the major shifts and changes" frameborder="0" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy" src="https://open.spotify.com/embed/episode/6u3XG2RxoZ9RUvxc5UQonl?si=TOhK_z0YRmucUTiIXRKe_g&amp;utm_source=oembed"></iframe></figure><h1 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos</h1><p><a href="https://www.ciscolive.com/emea.html" rel="nofollow noopener">Cisco Live EMEA</a>&#xA0;(February 9-14, 2025)</p><p>Amsterdam, Netherlands</p><p></p><h1 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;&#xA0;</h1><h2 id="sha2569f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507">SHA256:9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</h2><p>MD5: 2915b3f8b703eb744fc54c81f4a9c67f&#xA0;</p><p>VirusTotal:&#xA0;<a href="https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507" rel="nofollow noopener">https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507</a></p><p>Typical Filename: VID001.exe&#xA0;</p><p>Claimed Product: n/a&#xA0;</p><p>Detection Name: Win.Worm.Bitmin-9847045-0</p><p>&#xA0;</p><h2 id="sha2563294df8e416f72225ab1ccf0ed0390134604bc747d60c36fbb8270f96732e341">SHA256:3294df8e416f72225ab1ccf0ed0390134604bc747d60c36fbb8270f96732e341</h2><p>MD5: b6bc3353a164b35f5b815fc1c429eaab</p><p>VirusTotal:</p><p><a href="https://www.virustotal.com/gui/file/3294df8e416f72225ab1ccf0ed0390134604bc747d60c36fbb8270f96732e341" rel="nofollow noopener">https://www.virustotal.com/gui/file/3294df8e416f72225ab1ccf0ed0390134604bc747d60c36fbb8270f96732e341</a></p><p>Typical Filename: b6bc3353a164b35f5b815fc1c429eaab.msi</p><p>Claimed Product: n/a&#xA0;</p><p>Detection Name: Simple_Custom_Detection</p><p>&#xA0;</p><h2 id="sha25647ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca">SHA256:47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca</h2><p>MD5: 71fea034b422e4a17ebb06022532fdde</p><p>VirusTotal:&#xA0;<a href="https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca" rel="nofollow noopener">https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca</a></p><p>Typical Filename: VID001.exe</p><p>Claimed Product: n/a&#xA0;</p><p>Detection Name: Coinminer:MBT.26mw.in14.Talos</p><p>&#xA0;</p><h2 id="sha256a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91">SHA256:a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</h2><p>MD5: 7bdbd180c081fa63ca94f9c22c457376</p><p>VirusTotal:&#xA0;<a href="https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91" rel="nofollow noopener">https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91</a></p><p>Typical Filename: img001.exe</p><p>Claimed Product: n/a&#xA0;</p><p>Detection Name: Win.Trojan.Miner-9835871-0</p><p>&#xA0;</p><h2 id="sha2563a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66">SHA256:3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66&#xA0;&#xA0;&#xA0;</h2><p>MD5: 8b84d61bf3ffec822e2daf4a3665308c&#xA0;&#xA0;&#xA0;</p><p>VirusTotal:&#xA0;<a href="https://www.virustotal.com/gui/file/3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66/" rel="nofollow noopener">https://www.virustotal.com/gui/file/3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66/</a></p><p>Typical Filename: RemComSvc.exe&#xA0;&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;&#xA0;</p><p>Detection Name:&#xA0;W32.3A2EA65FAE-95.SBX.TG</p>]]></content:encoded></item><item><title><![CDATA[The evolution and abuse of proxy networks]]></title><description><![CDATA[Proxy and anonymization networks have been dominating the headlines, this piece discusses its origins and evolution on the threat landscape with specific focus on state sponsored abuse.]]></description><link>https://blog.talosintelligence.com/the-evolution-and-abuse-of-proxy-networks/</link><guid isPermaLink="false">67586c01225be8000186409c</guid><category><![CDATA[On The Radar]]></category><category><![CDATA[Landing Page Top Story]]></category><category><![CDATA[Top Story]]></category><dc:creator><![CDATA[Nick Biasini]]></dc:creator><pubDate>Thu, 12 Dec 2024 11:00:08 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/12/Talos_on_the_radar.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/12/Talos_on_the_radar.png" alt="The evolution and abuse of proxy networks"><p>As long as we&apos;ve had the internet, users have tried to obfuscate how and what they are connecting to. In some cases, this is to work around restrictions put in place by governments or a desire to access content that is not otherwise available in a given region.</p><p>This is why technologies like VPNs and The Onion Router (TOR) become popular: They allow users to easily access content without exposing their IP address or location. These technologies are intended to protect users and information and have done a good job of doing so. However, adversaries have taken notice and are using proxy networks for malicious activities.</p><h2 id="proxy-chain-services">Proxy Chain Services</h2><p>It is important to distinguish the different proxy chain services, as there are legitimate reasons for some of them to exist. From a privacy/defender point-of-view, they can be split into the following groups:</p><ul><li><strong>VPN and TOR:</strong> These services provide the user anonymity, but the defender can, for the most part, determine that it&apos;s receiving requests from these networks. As such, there is no expectation that the origin of the connection is the exact same as the user&#x2019;s physical location. The user has no control of the path or exit node location.&#xA0;</li><li><strong>Commercial residential services:</strong> These provide anonymity to users, while at the same time allowing them to choose the exit point. These services do not provide any clues to the defender about the nature of the connection.&#xA0;</li><li><strong>Malicious proxy services:</strong> Threat actors use these networks to hide their location and choose their exit node. These are set up to be used by malicious operators from multiple sources. They can take two shapes: The nodes are installed on leased servers from different providers in different regions, or their nodes can be compromised edge devices that bounce connections in chains.</li></ul><p>The first group has a clear legitimate use case, and the second has been advertised as a means to measure marketing engagement. However, threat actors can also use them without the bandwidth owner understanding what is at risk. The third case is clear: The networks are built to be rented for distributed denial-of-service (DDoS) attacks or access to be sold so other actors can anonymize their activities.</p><h2 id="history">History</h2><p>Leveraging proxy networks for malicious purposes was something we first stumbled on with our research into <a href="https://blog.talosintelligence.com/proxyware-abuse/"><u>Honeygain</u></a>. This was one of the first times we saw technologies like proxyware being abused maliciously.&#xA0;</p><p>Proxyware is a type of technology that uses agents installed by users to act as proxies for other users. The users installing these agents are typically compensated for adding their node to the proxy network. Criminals stumbled upon this quickly and began to weaponize and monetize it, allowing them to benefit from the anonymity these technologies provide since it traces back to a random computer in a random location. At the time, the focus was purely criminal in nature, but state-sponsored groups have been leveraging TOR and VPNs for decades to launch their attacks, typically dropping out of a VPN near the target.</p><p>State-sponsored groups also realize that TOR and VPNs have limitations and could potentially expose their operations, so they needed something more opaque and less traceable. Enter <a href="https://blog.talosintelligence.com/vpnfilter/"><u>VPNFilter</u></a>.</p><p>VPNFilter was the first large-scale proxy network leveraged by state-sponsored actors, in this case Russia. This completely changed how proxy networks were operated and would set the tradecraft for state-sponsored proxy networks for the next several years. The most unique aspect of VPNFilter was the targeting: small office and home office (SOHO) routers.&#xA0;</p><p>The network was made up of SOHO routers that were being compromised with malicious firmware providing a variety of capabilities, including interception and proxy capabilities.&#xA0;</p><p>This was also a fairly significant botnet, consisting of some 500,000 devices that created a massive network from which to launch attacks without repercussions. Fortunately, we worked with affected vendors, and they resolved many of the issues that were being exploited, both vulnerability and otherwise.&#xA0;</p><p>This wasn&apos;t the last time we saw Russian-aligned actors leveraging these types of botnets. A few years later, <a href="https://blog.talosintelligence.com/threat-advisory-cyclops-blink/"><u>Cyclops Blink</u></a> was uncovered. Another Russian actor controlled a proxy network that again primarily consisted of consumer devices.&#xA0;</p><p>The targeting of consumer devices for this type of activity has become the focus of state-sponsored groups&#x2019; foray into this space. They also make excellent targets, since many users leave default configurations in place and rarely think to update their devices. Fortunately, post-VPNFilter, many vendors have switched to automatic updates, allowing for more frequent patching. This has resulted in state-sponsored groups widening their targeting.&#xA0;</p><p>Today, we see not just SOHO routers, but also NAS and a variety of IoT devices being targeted and added to these networks. This problem has just gotten worse in the past several years.</p><h2 id="state-of-the-art">State of the Art</h2><p>As recently as <a href="https://www.justice.gov/opa/pr/court-authorized-operation-disrupts-worldwide-botnet-used-peoples-republic-china-state"><u>September, the FBI took down a botnet associated with Chinese hacking activities</u></a>. This was just the latest in a spate of attacks originating from proxy networks. This activity has been largely associated with <a href="https://beerswithtalos.talosintelligence.com/2033817/episodes/14552585-the-reverberations-of-volt-typhoon"><u>Volt Typhoon</u></a> by the U.S. Government, with a broader attribution of China-linked activities in the recent FBI takedown.</p><p>Currently, there are several proxy-based networks, with a focus on SOHO devices (e.g., routers, NAS, etc.) and a variety of IoT components (e.g., security cameras) being compromised and added to a botnet that, in some ways, mirrors <a href="https://blog.talosintelligence.com/the-internet-of-vulnerable-things/"><u>Mirai botnet</u></a> activities.&#xA0;</p><p>The basic operating model for these botnets is that they are peer-to-peer, meaning there is no discernable routing. This model provides a sophisticated network of devices to obfuscate the true origin of an attack, and in many circumstances, allows the attacker to appear in close proximity to the victim, including coming from geographically adjacent residential networks.&#xA0;</p><p>The attacks originating from these networks have been tied to espionage and the targeting of critical infrastructure in the U.S. and globally. Most countries are concerned with this escalation, and it has the attention of the majority of vendors in this space.&#xA0;</p><p>These networks have also grown with staggering efficiency, with new nodes being added constantly as other nodes fall off and need to be compromised again. Based on reporting, the majority of these infections are using N-Day vulnerabilities or weak credentials to gain access, something we&apos;ve seen repeatedly out of botnets like Mirai for the last decade. The major difference is that Mirai is used to conduct DDoS attacks, and the new iterations are being used to launch state-sponsored attacks with anonymity.</p><h2 id="network-resiliency-coalition">Network Resiliency Coalition</h2><p>The repeated use of N-Day vulnerabilities and weak credentials ties into the work that Cisco has been doing for some time related to old and outdated networking equipment and the risks they introduce. The <a href="https://www.centerforcybersecuritypolicy.org/insights-and-research/new-network-resilience-coalition-launches-to-address-threats-to-outdated-network-infrastructure-on-a-global-scale"><u>Network Resiliency Coalition</u></a> is one of the projects aimed at trying to resolve this difficult problem. Anonymization networks&apos; reliance on networking equipment, specifically exploiting known vulnerabilities, adds more weight to the importance of this effort. By working with industry peers, <a href="https://blogs.cisco.com/security/network-resilience-accelerating-efforts-to-protect-critical-infrastructure"><u>Cisco is trying to help remove</u></a> many of the systems that are being abused in these attacks by working with vendors to ensure proper patching is provided to mitigate these known vulnerabilities, in a timely manner.&#xA0;&#xA0;</p><p>More projects like this that encompass the IoT industry and the non-edge SOHO appliances like NAS devices would also have a contribution to the fight against anonymization networks. This combined with better credential management, most notably ensuring that default credentials are complex and unique, could make a huge impact on how successful these networks are in continuing to grow. Vendors are working to try and resolve some of these weaknesses, but it also is paramount for defenders to take note.</p><h2 id="impact-on-defenders">Impact on Defenders</h2><p>This continued focus by state-sponsored groups to leverage these networks presents problems for defenders. Attacks from these groups are likely to be coming from residential networks, potentially even from residential networks in the same cities and countries as your organization operates, making identification and attribution increasingly difficult.&#xA0;</p><p>Organizations need to realize that attacks can come from anywhere, even the same IP space that your employees connect to their VPNs, so plan accordingly.&#xA0;</p><p>This is further complicated by the increased focus by state-sponsored groups on the use of legitimate credentials. If you have a connection coming from the same IP space as your employees, using legitimate credentials organizations have little hope to stop it. This is where the increased focus on identity comes into play &#x2014; organizations need to start taking additional steps to be able to distinguish between the illegitimate and legitimate use of credentials, and that ties back to behavior.&#xA0;</p><p>Increasingly, organizations should be looking at users&#x2019; behavior when it comes to connections.</p><ul><li>Are they using their typical device type? (e.g., Windows desktop/MacOS laptop)</li><li>Are they logging on during their typical hours? (e.g., 9-5 M-F)</li><li>Are there other managed devices in proximity?</li><li>Are they using their managed device?</li></ul><p>This last point is a critical one. For organizations particularly concerned with credential abuse, managed device access restriction may be the best option.&#xA0;</p><p>This ensures that only managed devices can connect to corporate VPNs through technologies like certificates.&#xA0;</p><p>The downside to this approach is that it&apos;s expensive, and for many organizations not practical, but for those with the budgets and the concern, it&apos;s a needed escalation beyond just multi-factor authentication (MFA).&#xA0;</p><p>You may have noticed we haven&#x2019;t mentioned MFA until now. But that&#x2019;s because in 2024, it&apos;s assumed you&apos;ve already rolled out MFA for medium to large enterprises. It is no longer an optional security feature.&#xA0;</p><p>Defenders need to adjust for the state-sponsored threats they will be facing in 2024 and beyond. This means adding more identity capabilities in the near term and looking at additional security protections like managed device-only access in the future.</p>]]></content:encoded></item><item><title><![CDATA[Microsoft Patch Tuesday for December 2024 contains four critical vulnerabilities]]></title><description><![CDATA[The Patch Tuesday for December of 2024 includes 72 vulnerabilities, including four that Microsoft marked as “critical.” The remaining vulnerabilities listed are classified as “important.” ]]></description><link>https://blog.talosintelligence.com/december-patch-tuesday-release/</link><guid isPermaLink="false">67589bca225be800018640b6</guid><category><![CDATA[Patch Tuesday]]></category><dc:creator><![CDATA[Cisco Talos]]></dc:creator><pubDate>Tue, 10 Dec 2024 20:52:29 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/12/patch-tuesday.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/12/patch-tuesday.png" alt="Microsoft Patch Tuesday for December 2024 contains four critical vulnerabilities"><p>The Patch Tuesday for December of 2024 includes 72 vulnerabilities, including four that Microsoft marked as &#x201C;critical.&#x201D; The remaining vulnerabilities listed are classified as &#x201C;important.&#x201D;&#xA0;</p><p>Microsoft assessed that exploitation of the four &#x201C;critical&#x201D; vulnerabilities is &#x201C;less likely.&#x201D;&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49112" rel="noreferrer">CVE-2024-49112</a> is the most serious of this bunch, with a CVSS severity score of 9.8 out of 10. An attacker could exploit this vulnerability in Windows Lightweight Directory Access Protocol (LDAP) calls to execute arbitrary code within the context of the LDAP service. Additionally, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49124" rel="noreferrer">CVE-2024-49124</a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49127" rel="noreferrer">CVE-2024-49127</a> permit an unauthenticated attacker to send a specially crafted request to a vulnerable LDAP server, potentially executing the attacker&apos;s code if they succeed in a &quot;race condition.&quot; Although the above vulnerabilities are marked as &quot;critical&quot; and with high CVSS,&#xA0;Microsoft has determined that exploitation is &quot;less likely.&quot;&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49126" rel="noreferrer">CVE-2024-49126</a> - Windows Local Security Authority Subsystem Service (LSASS) remote code execution vulnerability. An attacker with no privileges could target the server accounts and execute malicious code on the server&apos;s account through a network call. Despite being considered &#x201C;critical&#x201D;, the successful exploitation of this vulnerability requires an attacker to win a &#x201C;race condition&#x201D; which complexity is high, Microsoft has determined that exploitation is &quot;less likely.&quot;&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49105" rel="noreferrer">CVE-2024-49105</a>&#xA0;is a &quot;critical&quot; remote code execution vulnerability in a remote desktop client. Microsoft has assessed exploitation of this vulnerability as &quot;less likely&quot;. An authenticated attacker could exploit by triggering remote code execution on the server via a remote desktop connection using Microsoft Management Console (MMC). It has not been detected in the wild.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49117" rel="noreferrer">CVE-2024-49117</a> is a remote code execution vulnerability in Windows Hyper-V. Although marked as &quot;critical,&quot; Microsoft has determined that exploitation is &quot;less likely.&quot; The exploit needs an authenticated attacker and locally on a guest VM to send specially crafted file operation requests on the VM to hardware resources on the VM and trigger remote code execution on the host server. Microsoft has not detected active exploitation of this vulnerability in the wild.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49106">CVE-2024-49106</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49108">CVE-2024-49108</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49115">CVE-2024-49115</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49119">CVE-2024-49119</a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49120">CVE-2024-49120</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49123">CVE-2024-49123</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49132">CVE-2024-49132</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49116">CVE-2024-49116</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49128">CVE-2024-49128</a> are remote code execution vulnerabilities in Windows Remote Desktop Gateway (RD Gateway) Service. An attacker could exploit this by connecting to a system with the Remote Desktop Gateway role, triggering the &#x201C;race condition&#x201D; to create a &#x201C;use-after-free&#x201D; scenario, and then leveraging the execute arbitrary code. Although marked as &quot;critical,&quot; Microsoft has determined that exploitations are &quot;less likely&quot; and the attack complexity considered &#x201C;high.&#x201D; Microsoft has not detected active exploitation of these vulnerabilities in the wild.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49122">CVE-2024-49122</a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49118">CVE-2024-49118</a> are remote code execution vulnerabilities in Microsoft Message Queuing (MSMQ) which is a queue manager in Microsoft Windows system. An attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server and win the &#x201C;race condition&#x201D; that is able to exploit on the server side which also means the attack complexity is &#x201C;high&#x201D;. While considered &#x201C;critical&#x201D; those were determined that exploitation is &#x201C;less likely&#x201D; and not been detected in the wild.&#xA0;</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49138">CVE-2024-49138</a> is an elevation of privilege vulnerability in Windows Common Log File System Driver, and while it only has a 7.8 out of 10 CVSS score, it has been actively exploited in the wild.&#xA0;</p><p>Cisco Talos would also like to highlight several vulnerabilities that are only rated as &#x201C;important,&#x201D; but Microsoft lists as &#x201C;more likely&#x201D; to be exploited:&#xA0;&#xA0;</p><ul><li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49070">CVE-2024-49070</a> - Microsoft SharePoint Remote Code Execution Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49093">CVE-2024-49093</a> - Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49088">CVE-2024-49088</a> and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49090">CVE-2024-49090</a> - Windows Common Log File System Driver Elevation of Privilege Vulnerability&#xA0;</li><li><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49114">CVE-2024-49114</a> - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability&#xA0;</li></ul><p>A complete list of all the other vulnerabilities Microsoft disclosed this month is available on its <a href="https://msrc.microsoft.com/update-guide/" rel="noreferrer noopener">update page</a>. In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on <a href="http://snort.org/" rel="noreferrer noopener">Snort.org</a>.&#xA0;</p><p>The rules included in this release that protect against the exploitation of many of these vulnerabilities are&#xA0;64308, 64309, 64310, 64311, 64313, 64314, 63874, 63875, 64312, 64306, 64307. There are also these Snort 3 rules 301085, 301086, 301087, 300987, 64312, 301084&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[MC LR Router and GoCast unpatched vulnerabilities]]></title><description><![CDATA[<p>Cisco Talos&apos; Vulnerability Research team recently discovered two vulnerabilities in MC Technologies LR Router and three vulnerabilities in the GoCast service.&#xA0;</p><p>These vulnerabilities have not been patched at time of this posting.&#xA0;</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule</p>]]></description><link>https://blog.talosintelligence.com/mc-lr-router-and-gocast-zero-day-vulnerabilities-2/</link><guid isPermaLink="false">6751da0199242e0001dbc6b5</guid><category><![CDATA[Vulnerability Roundup]]></category><dc:creator><![CDATA[Kri Dontje]]></dc:creator><pubDate>Mon, 09 Dec 2024 19:30:14 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/12/vuln-roundup.webp" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/12/vuln-roundup.webp" alt="MC LR Router and GoCast unpatched vulnerabilities"><p>Cisco Talos&apos; Vulnerability Research team recently discovered two vulnerabilities in MC Technologies LR Router and three vulnerabilities in the GoCast service.&#xA0;</p><p>These vulnerabilities have not been patched at time of this posting.&#xA0;</p><p>For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from <a href="https://snort.org/" rel="noreferrer noopener"><u>Snort.org</u></a>, and our latest Vulnerability Advisories are always posted on <a href="https://talosintelligence.com/vulnerability_reports" rel="noreferrer noopener"><u>Talos Intelligence&#x2019;s website</u></a>.&#xA0;&#xA0;</p><h2 id="mc-technologies-os-command-injection-vulnerabilities"><strong>MC Technologies OS command injection vulnerabilities</strong>&#xA0;</h2><p><em>Discovered by Matt Wiseman of Cisco Talos.</em>&#xA0;</p><p>The MC-LR Router from MC Technologies supports IPsec and OpenVPN implementations, firewall capabilities, remote management via HTTP and SNMP, and configurable alerting via SMS and email, with two-port and four-port variants, includes models that support transparent serial-to-TCP translations and 1-in/1-out digital I/O.&#xA0;</p><p>Talos recently published two advisories detailing OS command injection vulnerabilities discovered in the MC-LR Router from MC Technologies. <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953" rel="noreferrer noopener"><u>TALOS-2024-1953</u></a> covers three vulnerabilities (CVE-2024-28025 through CVE-2024-28027), which are reachable through the I/O configuration functionality of the web interface. <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954" rel="noreferrer noopener"><u>TALOS-2024-1954</u></a> covers one vulnerability (CVE-2024-21786) in the importation of uploaded configuration files. All vulnerabilities may be triggered with an authenticated HTTP request.&#xA0;</p><h2 id="gocast-authentication-and-os-command-injection-vulnerabilities"><strong>GoCast authentication and OS command injection vulnerabilities</strong>&#xA0;</h2><p><em>Discovered by Edwin Molenaar and Matt Street of Cisco Meraki.</em>&#xA0;</p><p>The GoCast tool provides BGP routing for advertisements from a host; it is commonly used for anycast-based load balancing for infrastructure service instances available in geographically diverse regions.&#xA0;&#xA0;</p><p>The GoCast HTTP API allows the registration and deregistration of apps without requiring authentication, shown in <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1962" rel="noreferrer noopener"><u>TALOS-2024-1962</u></a> (CVE-2024-21855). The lack of authentication can be used to exploit <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960" rel="noreferrer noopener"><u>TALOS-2024-1960</u></a> (CVE-2024-28892) and <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1961" rel="noreferrer noopener"><u>TALOS-2024-1961</u></a> (CVE-2024-29224), leading to OS command injection and arbitrary command execution.&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight]]></title><description><![CDATA[Ever wonder what an extroverted strategy security nerd does? Wonder no longer! This week, Joe pontificates on his journey at Talos, and then is inspired by the people he gets to meet and help. ]]></description><link>https://blog.talosintelligence.com/the-adventures-of-an-extroverted-cyber-nerd-and-the-people-talos-helps-to-fight-the-good-fight/</link><guid isPermaLink="false">67508805a6eba900018a2a65</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[Joe Marshall]]></dc:creator><pubDate>Thu, 05 Dec 2024 19:02:19 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-6.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-6.jpg" alt="The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>I am unbelievably lucky to do the work that I do. My title is technically &#x2018;Senior Security Strategist&#x2019;. It&#x2019;s a very fancy title, but basically: I get to research threats with my colleagues and friends to keep people safe here at Talos. I also get to travel and talk to our customers and communities about that work and how we fight that good fight. This has taken me to some interesting places - from Ukraine to California and lots of places in between. Not bad for a guy from a small town in Alabama.&#xA0;&#xA0;</p><p>This gig isn&#x2019;t for everyone. You must have some extroverted tendencies, and as the youth would say, some &#x2018;rizz&#x2019;. It&#x2019;s not enough to talk about something like, say, ransomware. You need to be able to explain it in high technical detail if needed and then explain it to a board of C-levels and speak the language of business they understand. And you need to do it in an engaging way to keep your audiences bought in. It&#x2019;s a unique blend of security practitioner expertise and the ability to communicate that to audiences, some technical, some not.&#xA0;&#xA0;</p><p>If you&#x2019;re thinking this also requires some kind of social media influencer level of Hemsworth caliber good looks and hyper charisma, have no fear. I&#x2019;m about as much a security influencer as Chris Farley was a Beverly Hills ninja. I am just a security nerd who likes to talk. Like I said - I&apos;m very lucky.&#xA0;&#xA0;</p><p>Sometimes this gig takes you to very unexpected places. A couple of weeks ago I found myself at the <a href="https://www.fordfoundation.org/" rel="noreferrer noopener"><u>Ford Foundation Center for Social Justice</u></a>. I was there to attend and support the <a href="https://www.ngoisac.org/" rel="noreferrer noopener"><u>NGO-ISAC</u></a> annual summit. The NGO-ISAC &#x2018;is a non-profit organization improving the cybersecurity of US-based nonprofits.&#x2019; They do amazing work supporting cyber security for non-governmental organizations that help protect and promote civil society. We&#x2019;re also fortunate at Talos to be a partner with them and donate time and resources to support their mission of helping the helpers.&#xA0;&#xA0;</p><p>We are proud to be partners and volunteer our time with NGO-ISAC and it&#x2019;s members. If you ever want to be truly humbled, spend time with an NGO and learn about what they do. The energy and heart those people have is incredible and will inspire you. They help feed the hungry, cloth the homeless, protect refugees, promote democracies, and generally help take care of some of the most vulnerable people and institutions our society relies upon. They also traditionally struggle with cybersecurity - security investments and practitioner expertise can be difficult to obtain when your budgets are built upon donations to support your mission. They are the embodiment of fighting the good fight, and we at Talos will always have the time to help them help others.&#xA0;&#xA0;</p><p>While I was there, we debuted a custom NGO version of Backdoors &amp; Breaches I helped co-develop with the NGO-ISAC. It was a real hit, and we ran demo games that resonated very well with the audiences. Helping teach cybersecurity to NGOs is fantastic. If we can help them stay secure, there&#x2019;s so many others who will be helped by it. Also, keep your eyes peeled for a blog post in January about how we designed and created a custom expansion for Backdoors &amp; Breaches.&#xA0;&#xA0;</p><p>Also, the Ford Foundation? Amazing building. It&#x2019;s in the heart of NYC and is an island of pure serenity. They have an indoor atrium/park that is next level. They pipe in some absolute jazz bangers throughout the entire building that, mixed with the decor, exudes a class I&apos;ve rarely encountered in my travels. If I could make a blanket out of that entire vibe and wrap myself up in it, I&apos;d do it.&#xA0;&#xA0;</p><h1 id="the-one-big-thing">The one big thing&#xA0;</h1><p><a href="https://blog.talosintelligence.com/malicious_qr_codes/" rel="noreferrer noopener"><u>QR Codes, am I right?</u></a> Sometimes you can scan one with your phone and maybe win a free cheeseburger, sometimes it can take you to a fake O365 phishing site. The tricky bit with QR codes in e-mails is how easily they can avoid spam filters. My man Jaeson Schultz did some great research on attacks, prevalence, and detection of QR codes in e-mail messages. The parts on AI-generated QR imagery are fantastic &#x2013; be careful what you scan!&#xA0;</p><h3 id="why-do-i-care">Why do I care?&#xA0;</h3><p>E-mail phishing and evading defenses are a tried and tested tactic with attackers. QR codes are another method of attack, and because they can be difficult to defang/detect, defenders have to work extra hard to understand those threats and stop them.&#xA0;&#xA0;</p><h3 id="so-now-what">So now what?&#xA0;</h3><p>Exercise serious caution when scanning a QR code. If possible, detonate those suspicious QR code e-mails in a sandbox, like <a href="https://www.cisco.com/c/en/us/products/security/threat-grid/index.html" rel="noreferrer noopener"><u>Threat Grid</u></a>.&#xA0;</p><p></p><h1 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h1><p>At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks could disrupt businesses, industry, and the lives of millions of citizens. (<a href="https://www.darkreading.com/vulnerabilities-threats/leaky-cybersecurity-holes-water-systems-risk" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p>The NSA updated its mobile devices security best practices report. Reboot those phones at least once a week friends.&#xA0; (<a href="https://www.zdnet.com/article/why-you-should-power-off-your-phone-once-a-week-according-to-the-nsa/" rel="noreferrer noopener"><u>ZDNet</u></a>)&#xA0;</p><p>The United States and other Western nations released guidance Tuesday designed to evict the China-linked group in the wake of the high-profile hack. (<a href="https://cyberscoop.com/u-s-government-says-salt-typhoon-is-still-in-telecom-networks/" rel="noreferrer noopener"><u>CyberScoop</u></a>)&#xA0;</p><p></p><h1 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t get enough Talos?&#xA0;</h1><ul><li><a href="https://blog.talosintelligence.com/new-pxa-stealer/" rel="noreferrer noopener"><u>New PXA Stealer targets government and education sectors for sensitive information</u></a>&#xA0;</li><li><a href="https://youtu.be/KnE9GSpVzJY" rel="noreferrer noopener"><u>The TTP Episode 7</u></a>: Explore this year&apos;s Macro-ATT&amp;CK findings&#xA0;&#xA0;</li><li>Beers with Talos is back (kind of) with a special &#x201C;B Team&#x201D; episode: <a href="https://www.buzzsprout.com/2033817/episodes/16220155" rel="noreferrer noopener"><u>Misadventures, Rabbit Holes, and Turkey Lurkey Goes to the Movies</u></a>&#xA0;</li></ul><p></p><h1 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h1><h3 id="avar-dec-4-6"><a href="https://aavar.org/cybersecurity-conference/" rel="noreferrer noopener"><u>AVAR</u></a>&#x202F;(Dec. 4-6) &#x202F;&#xA0;</h3><p><em>Chennai, India</em>&#x202F;&#xA0;<br></p><p>Vanja Svancer and Chetan Raghuprasad from Cisco Talos will both present, Vanja will be discussing Exploring Vulnerable Windows Drivers, while Chetan presents Sweet and Spicy Recipes for Government Agencies by SneakyChef.&#x202F;&#x202F;&#xA0;</p><p></p><p></p><h1 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;&#xA0;</h1><p></p><h3 id="sha-256-0e2263d4f239a5c39960ffa6b6b688faa7fc3075e130fe0d4599d5b95ef20647">SHA 256: 0e2263d4f239a5c39960ffa6b6b688faa7fc3075e130fe0d4599d5b95ef20647&#xA0;</h3><p>MD5: bbcf7a68f4164a9f5f5cb2d9f30d9790&#xA0;</p><p>VirusTotal: https://www.virustotal.com/gui/file/0e2263d4f239a5c39960ffa6b6b688faa7fc3075e130fe0d4599d5b95ef20647/details&#xA0;</p><p>Typical Filename: cwjhtmbwgyomzrhbo.exe&#xA0;</p><p>Claimed Product: n/a&#xA0;</p><p>Detection Name: Win.Dropper.Scar::1201&#xA0;&#xA0;</p><h3 id="sha-256-47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca">SHA 256: 47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;</h3><p>MD5: 71fea034b422e4a17ebb06022532fdde&#xA0;</p><p>VirusTotal: https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507/detection&#xA0;</p><p>Typical Filename: VID001.exe&#xA0;</p><p>Claimed Product: n/a&#xA0;</p><p>Detection Name: Coinminer:MBT.26mw.in14.Talos&#xA0;</p><h3 id="sha-256-47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca-1">SHA 256: 47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca &#xA0;&#xA0;</h3><p>MD5: 200206279107f4a2bb1832e3fcd7d64c&#xA0;&#xA0;</p><p>VirusTotal: https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca/details%C2%A0&#xA0;</p><p>Typical Filename: lsgkozfm.bat&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;</p><p>Detection Name: Win.Dropper.Scar::tpd&#xA0;&#xA0;&#xA0;&#xA0;</p><h3 id="sha-256-47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca-2">SHA 256: 47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca&#xA0;&#xA0;&#xA0;</h3><p>MD5: 71fea034b422e4a17ebb06022532fdde&#xA0;&#xA0;&#xA0;</p><p>VirusTotal: https://www.virustotal.com/gui/file/bea312ccbc8a912d4322b45ea64d69bb3add4d818fd1eb7723260b11d76a138a/details&#xA0;</p><p>Typical Filename: VID001.exe&#xA0;&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;&#xA0;</p><p>Detection Name: RF.Talos.80&#xA0;&#xA0;&#xA0;</p><h3 id="sha-256-3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66">SHA 256: 3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66&#xA0;&#xA0;&#xA0;</h3><p>MD5: 8b84d61bf3ffec822e2daf4a3665308c&#xA0;&#xA0;&#xA0;</p><p>VirusTotal: https://www.virustotal.com/gui/file/3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66/details%C2%A0&#xA0;</p><p>Typical Filename: RemComSvc.exe&#xA0;&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;&#xA0;</p><p>Detection Name: W32.3A2EA65FAE-95.SBX.TG&#xA0;&#xA0;&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform]]></title><description><![CDATA[<p>By Philippe Laulheret</p><p>ClipSP (clipsp.sys) is a Windows driver used to implement client licensing and system policies on Windows 10 and 11 systems.</p><p>Cisco Talos researchers have discovered eight vulnerabilities related to clipsp.sys ranging from signature bypass to elevation of privileges and sandbox escape:</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1964"><u>TALOS-2024-1964</u></a> (CVE-2024-38184)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1965"><u>TALOS-2024-1965</u></a> (CVE-2024-38185)</li></ul>]]></description><link>https://blog.talosintelligence.com/finding-vulnerabilities-in-clipsp-the-driver-at-the-core-of-windows-client-license-platform/</link><guid isPermaLink="false">673b8bc02a7d6c0001e8e661</guid><category><![CDATA[Vulnerability Deep Dive]]></category><dc:creator><![CDATA[Philippe Laulheret]]></dc:creator><pubDate>Mon, 25 Nov 2024 13:00:46 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/11/VulnDeepDive.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2024/11/VulnDeepDive.jpg" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform"><p>By Philippe Laulheret</p><p>ClipSP (clipsp.sys) is a Windows driver used to implement client licensing and system policies on Windows 10 and 11 systems.</p><p>Cisco Talos researchers have discovered eight vulnerabilities related to clipsp.sys ranging from signature bypass to elevation of privileges and sandbox escape:</p><ul><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1964"><u>TALOS-2024-1964</u></a> (CVE-2024-38184)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1965"><u>TALOS-2024-1965</u></a> (CVE-2024-38185)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1966"><u>TALOS-2024-1966</u></a> (CVE-2024-38186)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1968"><u>TALOS-2024-1968</u></a> (CVE-2024-38062)&#xA0;</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1969"><u>TALOS-2024-1969</u></a> (CVE-2024-38187)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1970"><u>TALOS-2024-1970</u></a> (CVE-2024-38062)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1971"><u>TALOS-2024-1971</u></a> (CVE-2024-38062)</li><li><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1988"><u>TALOS-2024-1988</u></a> (CVE-2024-38062)</li></ul><p>This research project was also presented at both HITCON and Hexacon. A recording of the latter&#x2019;s presentation is embedded at the end of this article.</p><h2 id="what-is-clipsp"><strong>What is ClipSp?</strong></h2><p>ClipSp is a first-party driver on Microsoft Windows 10 and 11 that is responsible for implementing licensing features and system policies, and as such it is one of the main components of the Client Licensing Platform (CLiP). Little is known about this driver; while most Microsoft drivers and DLLs have publicly available debug symbols, in the case of ClipSp, those were removed from Microsoft&apos;s symbol server. Debug symbols provide function names and other related debug information that can be leveraged by security researchers to infer the intent behind the many functions of a binary; their absence hinders that. Surprisingly, the driver is also obfuscated, a very rare occurrence in Microsoft binaries, likely to deter reverse engineering even further. Limited public research exists, much of which either<a href="https://github.com/KiFilterFiberContext/windows-software-policy"> <u>predates</u></a> our findings or<a href="https://massgrave.dev/blog/keyhole"> was <u>released</u></a> in response to our reports. The latter research also shares<a href="https://massgrave.dev/blog/keyhole#giving-season"> <u>symbols</u></a> from an older version of ClipSp, which could be a useful springboard for anyone wanting to research this driver. The most interesting aspect of this software involves implementing features related to licensing Windows applications from the Windows App store and activation services for Windows itself.</p><p>&#xA0;</p><h2 id="deobfuscation"><strong>Deobfuscation</strong></h2><p>The driver is obfuscated with Warbird, which is Microsoft&#x2019;s proprietary obfuscator. Luckily, past<a href="https://github.com/KiFilterFiberContext/windows-software-policy/blob/master/clipsp-unpack.py"> <u>research</u></a> comes in handy, and we can adapt to suit our needs. The plan to deobfuscate the driver is to leverage the binary emulation framework <a href="https://github.com/qilingframework/qiling"><u>Qiling</u></a>, to emulate the part of the driver responsible for deobfuscating the obfuscated sections, and dump the executable memory range to import it into our favorite reversing tool.</p><p>During normal operation, the obfuscation appears as follows:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXenEX2YKLHXedvaDKcaCjKexROQkPacab06CJE2Xrjn_VcZiZLoh03r1KD7ghoVbk83rXU7vNqFmflYQ7N05GklWZYn5ErXc7qhveiLjviYb3oJWamQOd_C0KbiuLqFmWdNb9azIn_7N-kqQqMVZrXh_UU6?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="312"></figure><p>We can see that a decrypt function is called twice with different parameters, followed by a call to the actual function being deobfuscated and, finally, two calls to re-obfuscate the relevant section.</p><p>Using Ida Python, we can track all the references to the decrypt functions (there are actually two distinct functions), and recover their arguments by looking at the instructions that precede the function call where the RCX and RDX registers are being assigned. Per calling conventions, these two registers are the first and second arguments of the function. Then, we can feed this information to our modified Qiling script to emulate the decryption functions and dump the whole deobfuscated binary. Once the driver is deobfuscated, we can start reversing it to understand how Windows communicates with the driver, understand various business logic elements, and look for vulnerabilities.</p><h2 id="driver-communication"><strong>Driver communication</strong></h2><p>Usually, drivers either register a device that can be reached from userland or export the functions that are meant to be used by other drivers. In the ClipSp case, things behave slightly differently. The driver exports a &#x201C;ClipSpInitialize&#x201D; function that takes a pointer to an array of callback functions that get populated by ClipSp, to then be used by the calling driver to invoke ClipSp functionalities. Grepping for &#x201C;ClipSpInitialize&#x201D; throughout the System32 folder shows that the best candidate for using ClipSp is &#x201C;ntoskrnl.exe&#x201D;, followed by a handful of filesystem drivers that use a limited amount of ClipSp functions. For the rest of this report, we will focus on how &#x201C;ntoskrnl&#x201D; interacts with ClipSp.</p><p>Analyzing the cross-references within the Windows&#x2019; kernel to ClipSp functions, it becomes clear that, to interact with them, a call to &#x201C;NtQuerySystemInformation&#x201D; with the SystemPolicy class is required. Other binaries in the CLiP ecosystem will issue these system calls, while also providing a remote procedure call (RPC) interface to decouple other software from the undocumented API. However, nothing stops us from interacting with the &#x201C;NtQuerySystemIformation&#x201D; endpoint directly, which becomes a handy trick to bypass some of the additional checks that are enforced by the intended RPC client library.</p><h3 id="obfuscated-structures"><strong>Obfuscated structures</strong></h3><p>Unfortunately for us, looking at how a legitimate binary interacts with the SystemPolicy class, we can see the following (from&#xA0; wlidsvc!DeviceLicenseFunctions::SignHashWithDeviceKey):</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfxltj3MPOOa3sWxjguLAUwtIBcxJJPVEIpG9bWcE2q2hB5Xr1xUBa1Y93usDiMPSzGmpfwq-3VrcZvEdGl3Y3qe4B7vqXOQ3IxLJ0C0-ZcX1ZdCfoos6FCMDtgdStRNZN3VVPTHBpdk4kdDHtC_uQqLIhl?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="385"></figure><p>This is another layer of obfuscation that encapsulates the data passed over to the API. The idea here is that a network of binary transformations (also known as a Feistel cipher) is used to encrypt the data with the various operations inline in the code (as seen above). Part of the API call will provide the list of operations that were used, and the kernel will call them directly with the appropriate parameters to decrypt the data. As such, the easier approach to dealing with this is to simply rip out both the encryption code and the associated parameters and re-use them in our own invocation of the API. Copying and pasting the decompiler&#x2019;s output into Visual Studio is a little tedious but usually works fine. Before returning from the syscall, the resulting data is obfuscated in a similar fashion, and, once again, ripping out the data from a working implementation is the most straightforward way to deal with it. Overall, the data format looks as such:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdB-vI7WGrUmnTxJ6H16nldhF5iveBEda26ZczkmVCAjZ_VJKW5m5QlUvvY5OUukur7TM1TAj-tkKjoT4LoR0JmAwnKq_1CKfYjxJqEEEXkj2lGMgt-lSrEiizW1pwBSrBhQHLgxCwKJELuhwnd2xGIk5s?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="604"></figure><p>The inner payload (left) is an array of size-value entries that contain the command number that needs to be executed, followed by the Warbird material used to encrypt the reply from the kernel, and finally command-specific data that depends on which ClipSp function is being invoked.</p><p>This data is then encapsulated into a structure that mostly specifies the number of entries there are in the provided array and the whole thing then gets encrypted. The remaining Warbird data in the righ-most part of the diagram is to instruct the kernel how to decrypt the provided data.</p><p>Here&#x2019;s our best guess at the various available commands:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdNyc2BjBwlAmLcwIEpxIhSKxfysoHDYPJrxT_NXNCFKLbO4IRdPnYkUSc4o1X8WXBRDRO7uyn79NvfeD5kW9kDR5YL3VFfqCGs8x9yXvzTt_rvBYptVtdxnqDSckOPL5ChFOOa9MSBR0-16BgFcdCp-2_Y?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="137"></figure><p>&#xA0;</p><p>Most of them call into ClipSp, but a few (especially in the &lt;100 range) may be solely handled by the Windows kernel.</p><h3 id="sandbox-considerations"><strong>Sandbox considerations</strong></h3><p>Microsoft provides a<a href="https://github.com/microsoft/SandboxSecurityTools/tree/main/LaunchAppContainer"> <u>tool</u></a> to test if a piece of code can be run within a low-privilege context called a Less Privileged Application Container (LPAC) sandbox. Using this with our proof of concept, we can confirm that ClipSp&#x2019;s APIs are actually reachable from an LPAC context. This is particularly interesting as these application containers are usually used to sandbox high-risk targets, such as parsers and browser rendering processes. As such, any elevation of privilege vulnerabilities we could find would likely double as sandbox escapes as well.</p><p>&#xA0;</p><h2 id="processing-licenses"><strong>Processing licenses</strong></h2><p>Throughout the reversing process, we observed that the license files handled by ClipSp were quite interesting. They are usually obtained silently from Microsoft when interacting with UWP applications (both coming from the App Store and those installed by default, such as Notepad). They can also be used for other purposes, such as Windows activation, hardware binding, and generally providing cryptographic material for various applications.</p><p>At first, license files appear to be opaque blobs of data that are installed via the &#x201C;SpUpdateLicense&#x201D; command. This can be invoked following the process described above with the command &#x201C;_id = 100&#x201D;. Existing licenses are stored in the Windows registry at the following location:</p><p>HKLN\SYSTEM\CurrentControlSet\Control\{7746D80F-97E0-4E26-9543-26B41FC22F79}</p><p>Only the SYSTEM user can access this registry key. From an elevated prompt, the following command can open regedit as SYSTEM:</p><p>PsExec64.exe -s -i regedit</p><p>The format for these licenses is mostly undocumented, but looking at how they are being parsed is pretty informative. These licenses are in a tag-length-value (TLV) format, where the list of authorized tags is contained in an array of tuples of the form (tag, internal_index) hardcoded inside ClipSp. Upon parsing, a pointer to each valid TLV entry is stored in an array at the location indicated by the internal_index:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdafI_ImdvfLmTVxNsz6GjMRLYkjTZm0MBYqNTzX-HPwenXLXqrbWNdB6aIvEiD2dWPtVM4ueqIxDCYkudC8FYKtKay6L2o1RJXq24cc1zCD-57K5gH6HBCPLKG_oPna6htUgNq4EN6Fu3B8mDZH4jQm08?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="199"></figure><h3 id="signature-bypass-talos-2024-1964"><strong>Signature bypass (</strong><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1964"><u>TALOS-2024-1964</u></a><strong>)</strong></h3><p>Licenses are signed by various signing authorities whose public keys are hardcoded in ClipSp. Verification code looks as such:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdl2JnUWk88KQRvif3fhTr9nRotLA_A3Uh7a3hAGxzb3K5j4Tu4gjlJTdRrbRDMBq0SguTK9RtzPrFL9JQlgzcKHNf-MO00VCXwsHEcdOL91Ex7Q2qh6wt6q-MRgZV4w6PKDW3g1L7b9u5bFM-ZRujTqd5H?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="357"></figure><p>The &#x201C;entry_of_type_24&#x201D; value is a pointer saved during the parsing of the license and points to its signature. The difference between &#x201C;entry_of_type_24&#x201D; and &#x201C;License_data&#x201D; is pointer arithmetic used to count the number of bytes from the beginning of the license blob up to its signature.&#xA0;</p><p>During the parsing, this looks as such:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdM3XCzL8A0EqSabBsdb6dBQkN6c6UQaB0p_TMyTXZdwg6tQCctFJCZCdJSNYlM753GI01FHd9znJOEIM8c3v93Cb44TxrtE1wtSwHuR_Ma9vxTAV5z4Xj5_jAIJAb4r1ud6bTHee7n9TAWcjT0dQGUINs0?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="347"></figure><p>If the internal index associated with the entry&#x2019;s tag is 24, then the processing loop is temporarily exited. A pointer to the signature is saved, and if more data remains, the license processing is resumed.</p><p>We can see that this approach is flawed: If there is data after the license&#x2019;s signature, it will still be parsed but not checked against the signature, effectively enabling an attacker to bypass the signature check of any license as long as they can get one that is already signed with the proper signing authority.</p><h3 id="out-of-bound-read-vulnerabilities-talos-2024-1965talos-2024-1968-talos-2024-1969-talos-2024-1970-talos-2024-1971-talos-2024-1988"><strong>Out-of-bound read vulnerabilities (</strong><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1965"><u>TALOS-2024-1965</u></a>,<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1968"><u>TALOS-2024-1968</u></a>, <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1969"><u>TALOS-2024-1969</u></a>, <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1970"><u>TALOS-2024-1970</u></a>, <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1971"><u>TALOS-2024-1971</u></a>, <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1988"><u>TALOS-2024-1988</u></a><strong>)</strong></h3><p>We can cross reference where the license structure and its array of pointers to the TLV data is being used, and what we find is many wrapper functions that return either the length/size of a given entry or the data associated with it. In most cases, this is done in a secure fashion, but there are a few entries that make assumptions on the size of the data provided in the license blob, which leads to a handful of out-of-bound read vulnerabilities. An example of such vulnerabilities can be seen in the following screenshots:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcvA3YXInXTMzPGPWZkTW8hapSrSkUA9Ct6Sk8r_KdrIX2bfKhnDQsvH7_l8wW2-PG4443vvcJNmkAgXSq7eTg5-QI6hqHaAOP8zUYz9OIDV0neN2xYNIXH4M883cpcITlWiiTbDGZJoxhNnQeAJIczj8F4?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="205"></figure><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdfWw0Mli4jN9XtDv93IsyHTt9SQN77bmhT4fuKxG1E7ipe_Kovdts0Z0_9rjFlfq0BDA1qBhhoQ2EQ17cHfkpz7jOeIXLFZ5h3PB1roFBU8kSfgktOR9euROQ6WLMDVVuB_wrZB5lw5nuzeY8dnk2YumUM?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="219"></figure><p>These two functions retrieve either the size of the DeviceID field or its content. However, if the data is formatted in such a way that line 11 is reached (i.e., no entry of type 5 in the license provided) then the <strong>data </strong>field of entry 18 is used to provide both size and value by dereferencing its pointer, without checking if enough data was provided for that. For instance, if we append a DeviceID entry (type 18) at the end of a valid license blob, but make it so its data field is only one byte long, then the &#x201C;get_DeviceIDSize&#x201D; function will read one byte out of bound, as it is expecting two bytes of data. Furthermore, any function that calls &#x201C;get_DeviceID&#x201D; will receive a pointer that is pointing one byte past the end of the license file and will likely act on wrong information from the &#x201C;get_DeviceIDSize&#x201D; function for further out of bound (OOB)-read problems.</p><h3 id="turning-an-oob-read-into-an-oob-write-talos-2024-1966"><strong>Turning an OOB-read into an OOB-write (</strong><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1966"><u>TALOS-2024-1966</u></a><strong>)</strong></h3><p>If we look specifically at the case described above where the DeviceIdSize field can be read out of bound, this creates a particularly interesting situation where the expected size of the DeviceID object can change throughout its lifetime if the data immediately adjacent in memory changes in a meaningful way. The first byte of data after the license blob will also be read as the leading byte of the (unsigned short) value defining the size of the DeviceID. Looking at how these two functions are used in ClipSp, we can see that during the installation of a hardware license, the following happens:</p><figure class="kg-card kg-image-card"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcXgVb-ewE3eT2MqC7-3R9W3ijlvxJCZYTa3R9eLmnZXOWX2VDxD4UKtJekhcIRwTMeqAu4JZsdf9fO7BTkJboLSSfTGdBuQq-YDlq7deIZsfaOa_Rk0NBGB0zGqtNpQyStoHiF7pb2KBXfHuqHPPv-9esY?key=fxEy1OcE6M5HCWwt6qTH9A" class="kg-image" alt="Finding vulnerabilities in ClipSp, the driver at the core of Windows&#x2019; Client License Platform" loading="lazy" width="624" height="205"></figure><p>We can see multiple calls to the &#x201C;get_DeviceIDSize&#x201D; function, with one providing the size field to a memory allocation routine, while another call is used as a parameter to a &#x201C;memcpy&#x201D;. If the size field changes in between the two calls, this may lead to an out-of-bounds write vulnerability.&#xA0;&#xA0;</p><p>Exploiting a vulnerability like this is far from trivial, as one would have to win a race condition between the two fetches while being able to shape the PagedPool heap in such a way that there&#x2019;s meaningful data located right after the malicious license blob.</p><h2 id="conclusion"><strong>Conclusion</strong></h2><p>As we have just seen, obfuscated code can hide low hanging fruit, trivial memory corruptions, and simple logic bugs. In the case of ClipSp, this issue is even more serious, as this attack vector may lead to sandbox escapes and potentially significant impact to the compromised user.</p><p>As such, this is a reminder for security researchers on the value of taking the less traveled path, even if it begins with a bramble of Feistel functions. And for the software engineers and project managers who decide to leverage obfuscation for their projects, this is also a stark reminder that this approach may hinder normal bug finding processes that would detect trivial bugs early on.</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/9t0Xt40RZEc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen title="HEXACON2024 - What the hell is Windows&apos;s CLIP Service by Philippe Laulheret"></iframe></figure>]]></content:encoded></item><item><title><![CDATA[Bidirectional communication via polyrhythms and shuffles: Without Jon the beat must go on]]></title><description><![CDATA[The Threat Source Newsletter is back! William Largent discusses bidirectional communication in the SOC, and highlights new Talos research including the discovery of PXA Stealers.]]></description><link>https://blog.talosintelligence.com/bidirectional-communication-via-polyrhythms-and-shuffles-without-jon-the-beat-must-go-on/</link><guid isPermaLink="false">673d04e3215a910001ed4255</guid><category><![CDATA[Threat Source newsletter]]></category><dc:creator><![CDATA[William Largent]]></dc:creator><pubDate>Thu, 21 Nov 2024 19:02:55 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-7.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.talosintelligence.com/content/images/2025/01/threat-source-newsletter-7.jpg" alt="Bidirectional communication via polyrhythms and shuffles: Without Jon the beat must go on"><p>Welcome to this week&#x2019;s edition of the Threat Source newsletter.&#xA0;</p><p>Bidirectional communication is foundational to a well-built team regardless of environment. It&#x2019;s critical in information security to be able to drive a conversation up the ladder and down and not lose the critical elements. One of the most difficult challenges that cyber security teams face is making sure that everyone that is in a decision-making space is aware of the highly technical challenges that the evolving threat landscape dictates. Navigating the challenges that come in continually evolving the team and it&#x2019;s tools to defend is often a much greater challenge. I&#x2019;m going to help you with those conversations. In both directions. By talking about drumming. I know, I don&#x2019;t have the pro wrestling takes that Jon came to the table with, so you&#x2019;re going to have to run with me Constant Reader.&#xA0;&#xA0;</p><p>I&#x2019;m going to choose drumming to outline an easy way to identify some complex issues and talk about them in both directions and drumming is a little easier to identify for non-musicians and FAR less contentious than a spicy guitar opinion. Ok, so let&#x2019;s start with a simple concept. &#xA0;<br>&#xA0;<br>Sounds difficult. Is difficult. &#xA0;<br>Sounds difficult. Is easy.&#xA0;<br>Sounds easy. Is difficult.&#xA0; &#xA0;<br>Sounds easy. Is easy. &#xA0;<br>&#xA0;<br>Sounds difficult. Is difficult. This one is easy &#x2013; Tomas Haake from Meshuggah playing Bleed is a perfect example. Polyrhythms, stamina, speed, interdependence, and complexity. This sounds difficult. It is difficult. Only the criminally insane attempt to learn how to play this song.&#xA0;&#xA0;</p><p>Sounds easy. Is easy. Take Phil Rudd and pick any AC/DC song from Back in Black. The perfect example of sounds easy, is easy. Perfectly in the pocket.&#xA0;&#xA0;</p><p>Sounds easy. Is difficult. This one is harder and will cause someone to wellackshully and I assure you I do not care. I&#x2019;m going to give two examples, Jeff Porcaro of Toto playing Rosanna and Vinnie Colaiuta playing Seven Days with Sting. Both of these songs are immensely easy to listen to and don&#x2019;t seem like there&#x2019;s anything challenging going on. Until you try to play along, then you cry and examine all the choices you&#x2019;ve made in life.&#xA0;&#xA0;</p><p>Sounds difficult. Is easy. This is going to be a sticky situation, but I&#x2019;d say that you could throw on anything by Travis Barker and Dave Lombardo. Bring it haters. I&#x2019;m not saying that they are bad drummers &#x2013; simply that what they do sounds more difficult than it is.&#xA0;&#xA0;</p><p>Ok William, but how does this help me at all?&#xA0;&#xA0;</p><p>When you have information security meetings with people in your organization take a second as you look at the agenda, and your conversation in specific, and think about the groupings above and determine what kind of drumming you are hearing. Depending on your environment and team the topics will fall naturally into these categories &#x2013; it can be patch and vulnerability management,&#xA0; EOL devices that need to be replaced, endpoint detection and response, deciding what traffic is actionable and defining that in your SIEM, forensic analysis, threat hunting, event response, the conversations are as malleable as the threat landscape.&#xA0;&#xA0;</p><p>It&#x2019;s easy to isolate the things in your environment that are very difficult to defend AND take a skilled defender and complex tooling to defend. Those conversations flow with either junior analysts or C-Level executives. This is the &#x201C;Sounds difficult. Is difficult.&#x201D; type of conversation. Ditto the &#x201C;Sounds easy. Is easy.&#x201D; conversations are easy to have in either direction. The most difficult topics to convey fall into the &#x201C;Sounds difficult. Is easy.&#x201D; or &#x201C;Sounds easy. Is difficult.&#x201D; In my experience these conversations are usually much easier to deliver in one direction and much more difficult in the other. Jazz guys enjoy the nuance of Colaiuta and can&#x2019;t wrap their minds around Lombardo while metalheads love him and don&#x2019;t want to be bothered by ghost notes. By taking a moment to dissect your topic and determine where you are going to run into the &#x201C;Sounds difficult. Is easy.&#x201D; or the&#xA0;&#x201C;Sounds easy. Is difficult.&#x201D; situation it will allow you to prepare for those more challenging conversations so that you can craft a narrative to best capture the nuance that might be lost in a highly technical conversation with a C-Level exec, or the motivation for waiting for the next financial quarter for new tooling that the analysts really need.&#xA0;&#xA0;</p><p>I&#x2019;m not going to lie - you can prepare this way and things can still fall on deaf ears, they can still underestimate the lift required because people are fallible but if you prepare just a bit and know your audience you can drag your C-Level into a discussion on polyrhythm and pull your junior analyst up with a little Vinnie Colaiuta and make them all feel like Phil Rudd.&#xA0;&#xA0;&#xA0;</p><h2 id="the-one-big-thing">The one big thing&#xA0;</h2><p>Cisco Talos discovered a new information stealing campaign operated by a Vietnamese-speaking threat actor targeting government and education entities in Europe and Asia. <a href="https://blog.talosintelligence.com/new-pxa-stealer/" rel="noreferrer">PXA Stealer</a> targets victims&#x2019; sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software. PXA Stealer also has the capability to decrypt the victim&#x2019;s browser master password and uses it to steal the stored credentials of various online accounts.&#xA0;</p><h2 id="why-do-i-care">Why do I care?&#xA0;</h2><p>Harvested credentials can allow attackers direct access to your environment without the need to exploit vulnerabilities or face any of your defensive architecture &#x2013; they can just log in. <a href="https://blog.talosintelligence.com/incident-response-trends-q3-2024/" rel="noreferrer">Cisco Talos Incident Response</a> has observed an increasing number of engagements where this is the case.&#xA0;&#xA0;</p><h2 id="so-now-what">So now what?&#xA0;</h2><p>Cisco Talos has released <a href="https://blog.talosintelligence.com/new-pxa-stealer/" rel="noreferrer">several Snort rules and ClamAV signatures</a> to detect and defend against PXA Stealer.&#xA0;&#xA0;&#xA0;</p><h1 id="top-security-headlines-of-the-week">Top security headlines of the week&#xA0;</h1><p>Attackers are continuing to upload hundreds of malicious packages to the open-source node package manager (NPM) repository in an attempt to infect the devices of developers that rely on these libraries. (<a href="https://arstechnica.com/security/2024/11/javascript-developers-targeted-by-hundreds-of-malicious-code-libraries/" rel="noreferrer noopener"><u>Ars Tecnica</u></a>)&#xA0;</p><p>Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that it&apos;s director Jen Easterly will step down from her position on President-elect Donald Trump&apos;s Inauguration Day. (<a href="https://www.darkreading.com/vulnerabilities-threats/jen-easterly-cisa-director-resign-inauguration-day" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;</p><p>Palo Alto Networks has released a patch to fix a critical vulnerability in some instances of its firewall management interfaces. PAN observed threat activity exploiting an unauthenticated remote command execution vulnerability against firewall management interfaces. (<a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-patches-two-firewall-zero-days-used-in-attacks/" rel="noreferrer noopener"><u>Bleeping Computer,</u></a>&#xA0; <a href="https://www.darkreading.com/cyberattacks-data-breaches/palo-alto-networks-patches-critical-zero-day-bug-firewalls" rel="noreferrer noopener"><u>Dark Reading</u></a>)&#xA0;&#xA0;&#xA0;</p><h1 id="can%E2%80%99t-get-enough-talos">Can&#x2019;t get enough Talos?&#xA0;</h1><ul><li><a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" rel="noreferrer noopener"><u>Unwrapping the emerging Interlock ransomware attack</u></a>&#xA0;</li><li><a href="https://talostakes.talosintelligence.com/2018149/episodes/16091012-unwrapping-the-emerging-interlock-ransomware-attack" rel="noreferrer noopener"><u>Talos Takes on Interlock</u></a>&#xA0;</li><li><a href="https://blog.talosintelligence.com/november-patch-tuesday-release/" rel="noreferrer noopener"><u>November Patch Tuesday release contains three critical remote code execution vulnerabilities</u></a>&#xA0;</li><li><a href="https://talostakes.talosintelligence.com/2018149/episodes/16010726-it-s-taplunk-talos-and-splunk-threat-researchers-meet-to-put-the-security-world-to-rights" rel="noreferrer noopener"><u>It&apos;s Taplunk! Talos and Splunk threat researchers meet to put the security world to rights</u></a>&#xA0;</li></ul><h1 id="upcoming-events-where-you-can-find-talos">Upcoming events where you can find Talos&#xA0;</h1><p>&#xA0;<a href="https://cybercon.ro/conference-agenda/" rel="noreferrer noopener"><u>CyberCon Romania</u></a> (Nov 21-22) &#xA0;<br>Bucharest, Romania&#xA0;<br>&#xA0;<br>Martin Lee from Cisco Talos will speak on a panel discussion Maintaining Resilience for a Secure Cyber Infrastructure.&#xA0;&#xA0;</p><p><a href="https://miseccon.misec.us/schedule/" rel="noreferrer noopener"><u>misecCON</u></a> (Nov. 22) &#xA0;<br>Lansing, Michigan&#xA0;</p><p>Terryn Valikodath from Cisco Talos Incident Response will explore the core of DFIR, where digital forensics becomes detective work and incident response turns into firefighting.&#xA0;</p><p><a href="https://aavar.org/cybersecurity-conference/" rel="noreferrer noopener"><u>AVAR</u></a> (Dec 4-6) &#xA0;<br>Chennai, India&#xA0;<br>&#xA0;<br>Vanja Svancer and Chetan Raghuprasad from Cisco Talos will both present, Vanja will be discussing Exploring Vulnerable Windows Drivers, while Chetan presents Sweet and Spicy Recipes for Government Agencies by SneakyChef.&#xA0;&#xA0;</p><p>&#xA0;</p><h1 id="most-prevalent-malware-files-from-talos-telemetry-over-the-past-week">Most prevalent malware files from Talos telemetry over the past week&#xA0;&#xA0;</h1><p>&#xA0;</p><p>SHA 256: <a href="https://www.virustotal.com/gui/file/c20fbc33680d745ec5ff7022c282a6fe969c6e6c7d77b7cfac34e6c19367cf9a/details%C2%A0" rel="noreferrer noopener"><u>c20fbc33680d745ec5ff7022c282a6fe969c6e6c7d77b7cfac34e6c19367cf9a</u></a>&#xA0;&#xA0;</p><p>MD5: 3bc6d86fc4b3262137d8d33713ed6082&#xA0;&#xA0;</p><p>Typical Filename: 8c556f0a.dll&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;</p><p>Detection Name: Gen:Variant.Lazy.605353&#xA0;&#xA0;</p><p>&#xA0;SHA 256: <a href="https://www.virustotal.com/gui/file/bea312ccbc8a912d4322b45ea64d69bb3add4d818fd1eb7723260b11d76a138a/details" rel="noreferrer noopener"><u>bea312ccbc8a912d4322b45ea64d69bb3add4d818fd1eb7723260b11d76a138a</u></a>&#xA0;</p><p>MD5: 200206279107f4a2bb1832e3fcd7d64c&#xA0;</p><p>Typical Filename: lsgkozfm.bat&#xA0;</p><p>Claimed Product: N/A&#xA0;</p><p>Detection Name: Win.Dropper.Scar::tpd&#xA0;&#xA0;&#xA0;</p><p>SHA 256: <a href="https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca/details%C2%A0" rel="noreferrer noopener"><u>47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca</u></a>&#xA0;&#xA0;</p><p>MD5: 71fea034b422e4a17ebb06022532fdde&#xA0;&#xA0;</p><p>Typical Filename: VID001.exe&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;</p><p>Detection Name: RF.Talos.80&#xA0;&#xA0;</p><p>SHA 256: <a href="https://virustotal.com/gui/file/3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66/details%C2%A0" rel="noreferrer noopener"><u>3a2ea65faefdc64d83dd4c06ef617d6ac683f781c093008c8996277732d9bd66</u></a>&#xA0;&#xA0;</p><p>MD5: 8b84d61bf3ffec822e2daf4a3665308c&#xA0;&#xA0;</p><p>Typical Filename: RemComSvc.exe&#xA0;&#xA0;</p><p>Claimed Product: N/A&#xA0;&#xA0;</p><p>Detection Name: W32.3A2EA65FAE-95.SBX.TG&#xA0;&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Malicious QR Codes: How big of a problem is it, really?]]></title><description><![CDATA[QR codes are disproportionately effective at bypassing most anti-spam filters. Talos discovered two effective methods for defanging malicious QR codes, a necessary step to make them safe for consumption.]]></description><link>https://blog.talosintelligence.com/malicious_qr_codes/</link><guid isPermaLink="false">673ce3e7215a910001ed421f</guid><category><![CDATA[On The Radar]]></category><dc:creator><![CDATA[Jaeson Schultz]]></dc:creator><pubDate>Wed, 20 Nov 2024 11:00:33 GMT</pubDate><media:content url="https://blog.talosintelligence.com/content/images/2024/11/Talos_on_the_radar.jpg" medium="image"/><content:encoded><![CDATA[<ul><li>QR codes are disproportionately effective at bypassing most anti-spam filters, as most filters are not designed to recognize that a QR code is present in an image and decode the QR code. According to Cisco Talos&#x2019; data, roughly 60% of all email containing a QR code is spam.&#xA0;&#xA0;</li><li>Talos discovered two effective methods for defanging malicious QR codes, a necessary step to make them safe for consumption. Users could obscure the data modules, the black and white squares within the QR code that represent the encoded data. Alternatively, users could remove one or more of the position detection patterns &#x2014; large square boxes located in corners of the QR code used to initially identify the code&apos;s orientation and position.&#xA0;</li><li>Further complicating detection, both by users and anti-spam filters, Talos found QR code images that are &#x201C;QR code art.&#x201D; These images blend the data points of a QR code seamlessly into an artistic image so the result does not appear to be a QR code at all.&#xA0;</li></ul><img src="https://blog.talosintelligence.com/content/images/2024/11/Talos_on_the_radar.jpg" alt="Malicious QR Codes: How big of a problem is it, really?"><p>Prior to 1994, most code scanning technology utilized one-dimensional barcodes. These one-dimensional barcodes consist of a series of parallel black lines of varying width and spacing. We are all familiar with these codes, like the type you might find on the back of a cereal box from the grocery store. However, as the use of barcodes increased, their limitations became problematic, especially considering that a one-dimensional barcode can only hold up to 80 alphanumeric characters of information. To eliminate this limitation, a company named Denso Wave created the very first &#x201C;Quick Response&#x201C; codes (QR codes).&#xA0;</p><p>QR codes are a two-dimensional matrix bar code that can encode just over 7,000 numeric characters, or up to approximately 4,300 alphanumeric characters. While they can represent almost any data, most frequently we encounter QR codes that are used to encode URLs.&#xA0;</p><h1 id="quantifying-the-qr-code-problem">Quantifying the QR code problem&#xA0;</h1><p>Talos extracts QR codes from images inside email messages and attached PDF files for analysis. QR codes in email messages make up between .01% and .2% of all email worldwide. This equates to roughly one out of every 500 email messages. However, because QR codes are disproportionately effective at bypassing anti-spam filters, a significant number find their way into users&#x2019; email inboxes, skewing users&#x2019; perception of the overall problem.&#xA0;&#xA0;</p><p>Also, of course, not all email messages with a QR code inside are spam or malicious. Many email users send QR codes as part of their email signature, or you may also find legitimate emails containing QR codes used as signups for events, and so on. However, according to Talos&#x2019; data, <strong>roughly 60% of all email containing a QR code is spam</strong>.&#xA0;&#xA0;&#xA0;</p><p>Truly malicious QR codes can be found in a much smaller number of messages. These emails contain links to phishing pages, etc. The most common malicious QR codes tend to be multifactor authentication (MFA) requests used for phishing user credentials.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/11/Screenshot-2024-11-05-at-14.39.07.png" class="kg-image" alt="Malicious QR Codes: How big of a problem is it, really?" loading="lazy" width="2000" height="830" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/11/Screenshot-2024-11-05-at-14.39.07.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/11/Screenshot-2024-11-05-at-14.39.07.png 1000w, https://blog.talosintelligence.com/content/images/size/w1600/2024/11/Screenshot-2024-11-05-at-14.39.07.png 1600w, https://blog.talosintelligence.com/content/images/2024/11/Screenshot-2024-11-05-at-14.39.07.png 2174w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">An example MFA phishing email utilizing a QR code.</span></figcaption></figure><p>One of the problems that defenders may encounter when dealing with users&#x2019; scanning of QR codes received via email, assuming the user&#x2019;s device is not connected to the corporate wi-fi, is that subsequent traffic between the victim and the attacker will traverse the cellular network, largely outside the purview of corporate security devices. This can complicate defense, because few/no alerts from security devices will notify security teams that this has occurred.&#xA0;</p><h1 id="why-are-malicious-qr-codes-hard-to-detect">Why are malicious QR codes hard to detect?&#xA0;</h1><p>Because QR codes are displayed in images, it can be difficult for anti-spam systems to identify problematic codes. Identifying and filtering these messages requires the anti-spam system to recognize that a QR code is present in an image, decode the QR code, then analyze the link (or other data) present in the decoded data. As spammers are always looking for innovative ways to bypass spam filters, using QR codes has been a valuable technique for spammers to accomplish this.&#xA0;</p><p>As anti-spam systems improve their capability to detect malicious QR codes in images, enterprising attackers have instead decided to craft their QR codes using Unicode characters. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/11/DHL-QR-unicode.png" class="kg-image" alt="Malicious QR Codes: How big of a problem is it, really?" loading="lazy" width="1366" height="1474" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/11/DHL-QR-unicode.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/11/DHL-QR-unicode.png 1000w, https://blog.talosintelligence.com/content/images/2024/11/DHL-QR-unicode.png 1366w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">An email containing a QR code constructed from Unicode characters (defanged).</em></i></figcaption></figure><p>The graphical parts of the image are contained within a PDF file. The PDF metadata indicates it was created from HTML using the tool wkhtmltopdf. Converting the PDF back into HTML shows the Unicode that is being used to construct the QR code.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/11/Screenshot-2024-11-01-at-11.26.41.png" class="kg-image" alt="Malicious QR Codes: How big of a problem is it, really?" loading="lazy" width="2000" height="803" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/11/Screenshot-2024-11-01-at-11.26.41.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/11/Screenshot-2024-11-01-at-11.26.41.png 1000w, https://blog.talosintelligence.com/content/images/size/w1600/2024/11/Screenshot-2024-11-01-at-11.26.41.png 1600w, https://blog.talosintelligence.com/content/images/size/w2400/2024/11/Screenshot-2024-11-01-at-11.26.41.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">HTML used to construct a malicious QR Code from Unicode characters.</em></i></figcaption></figure><h1 id="defanging-qr-codes">Defanging QR codes&#xA0;</h1><p>When sharing malicious URLs, it is common to change the protocol from &#x201C;http&#x201D; to &#x201C;hxxp&#x201D;, and/or to add brackets (&#x201C;[]&#x201D;) around one of the dots in the URL. This makes it so browsers and other applications do not render the link as an active URL, ensuring that users do not inadvertently click on the malicious URL. This is a process known as &#x201C;defanging.&#x201D; Unfortunately, while defanging URLs is commonplace, many people do not defang malicious QR codes. For example, below is a <a href="https://www.bbc.com/news/articles/clynnkrgj24o" rel="noreferrer noopener"><u>news article from BBC</u></a> about criminals who put QR code stickers on parking meters in an attempt to harvest payment credentials from unsuspecting victims.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/11/BBC-qr-code.png" class="kg-image" alt="Malicious QR Codes: How big of a problem is it, really?" loading="lazy" width="2000" height="1383" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/11/BBC-qr-code.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/11/BBC-qr-code.png 1000w, https://blog.talosintelligence.com/content/images/size/w1600/2024/11/BBC-qr-code.png 1600w, https://blog.talosintelligence.com/content/images/size/w2400/2024/11/BBC-qr-code.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">A news article from BBC containing a working QR code (this has been defanged by Talos).</em></i></figcaption></figure><p>The problem is that these QR codes can still be scanned, taking visitors to whatever malicious link that the QR code encoded. <strong>To make malicious QR codes safe for consumption, they should be defanged.</strong>&#xA0;</p><p>There are a couple of different ways to do this. One way is to obscure the data modules, the black and white squares within the QR code that represent the encoded data. This is where the data that the QR code represents is located. However, based on Talos&#x2019; own research, a far easier way to defang a QR code is to remove one or more of the position detection patterns (a.k.a. finder patterns). These are the large square boxes located in three of the four corners of the QR code, which are used by the QR code scanner to initially identify the code&apos;s orientation and position. Removing the position detection patterns renders a QR code unscannable by virtually all scanners. Additional details on how this is achieved, will be covered later in the blog.&#xA0;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/11/Screenshot-2024-11-20-at-09.56.43.png" class="kg-image" alt="Malicious QR Codes: How big of a problem is it, really?" loading="lazy" width="1900" height="936" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/11/Screenshot-2024-11-20-at-09.56.43.png 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/11/Screenshot-2024-11-20-at-09.56.43.png 1000w, https://blog.talosintelligence.com/content/images/size/w1600/2024/11/Screenshot-2024-11-20-at-09.56.43.png 1600w, https://blog.talosintelligence.com/content/images/2024/11/Screenshot-2024-11-20-at-09.56.43.png 1900w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">A normal QR code on the left vs. a defanged QR code on the right.</span></figcaption></figure><h1 id="be-careful-what-you-scan">Be careful what you scan!&#xA0;</h1><p>For years, security professionals have encouraged users <strong>not </strong>to click on unfamiliar or suspicious URLs. These URLs could potentially lead to phishing pages, malware or other harmful sites. However, many users do not exercise the same care when scanning an unknown QR code as they do when clicking on a suspicious link. To be clear, scanning an unknown/suspicious QR code is equivalent to clicking on a suspicious URL.&#xA0;</p><p>To complicate the situation even more, there are QR code images that are &#x201C;QR code art.&#x201D; These images blend the data points of a QR code seamlessly into an artistic image so the result does not appear to be a QR code at all. The potential danger with QR code art images is that a user could conceivably be tricked into scanning a QR code art image with their camera, and then inadvertently navigate to the linked content without realizing it. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.talosintelligence.com/content/images/2024/11/engine-parts-3.gif" class="kg-image" alt="Malicious QR Codes: How big of a problem is it, really?" loading="lazy" width="1024" height="1024" srcset="https://blog.talosintelligence.com/content/images/size/w600/2024/11/engine-parts-3.gif 600w, https://blog.talosintelligence.com/content/images/size/w1000/2024/11/engine-parts-3.gif 1000w, https://blog.talosintelligence.com/content/images/2024/11/engine-parts-3.gif 1024w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">QR code art images.</span></figcaption></figure><h1 id="how-to-protect-yourself-from-malicious-qr-codes">How to protect yourself from malicious QR codes&#xA0;</h1><p>QR codes have become ubiquitous, appearing in email, on restaurant menus, at public events, on retail packaging, in museums, and even public parks and trails. The perfect defense is to avoid scanning any QR codes; however, it can be difficult to avoid scanning these entirely, so users must exercise caution. Scanning a QR code is essentially the same as clicking on an unknown hyperlink, but without the ability to see the full URL beforehand.&#xA0;</p><p>There are several QR code decoders <a href="https://zxing.org/w/decode.jspx" rel="noreferrer noopener"><u>freely available online</u></a>. Typically, if you can save a screenshot of the QR code, you can upload this image to one of these decoders, and the QR code decoder will tell you what data was encoded inside the QR code. This will allow you to more closely inspect the link. You can also choose to navigate to that URL using an application like <a href="https://www.cisco.com/c/en/us/products/security/threat-grid/index.html" rel="noreferrer noopener"><u>Cisco Secure Malware Analytics (Threat Grid).</u></a> This will allow you to view the content behind the URL from a safe place, without jeopardizing the security of your desktop or mobile device. Products such as <a href="https://www.cisco.com/site/us/en/products/security/secure-email/index.html" rel="noreferrer">Cisco Secure Email Threat Defense</a> can prevent emails containing malicious QR codes from ever reaching your inbox. As always, never enter your username and password into an unknown site. It is better to navigate directly to anywhere you wish to login, rather than clicking on a URL presented to you from an unknown third party.&#xA0;</p>]]></content:encoded></item></channel></rss>