View profile

今週の気になるセキュリティニュース - Issue #43

Weekly newsletter of Masafumi Negishi
Weekly newsletter of Masafumi Negishi
Chrome のソースツリーの中に、マルウェアを含むテスト用の Office ドキュメントが誤って混入。ユーザへの影響はなし。
We wanted to let you know that, between September 9th and November 18th, the Chromium source tree contained some test Office documents that included some unshielded malware. These samples were inadvertently committed to the repository without obfuscation in the process of testing the security feature to detect the presence of malware distributed through macros in Office documents. These test files were not included in any Chrome release.
GoDaddy の顧客向け WordPress ホスティング環境に不正アクセスがあり、最大 120万件の顧客情報などが漏洩
On November 17, 2021, we discovered unauthorized third-party access to our Managed WordPress hosting environment. Here is the background on what happened and the steps we took, and are taking, in response:
We identified suspicious activity in our Managed WordPress hosting environment and immediately began an investigation with the help of an IT forensics firm and contacted law enforcement. Using a compromised password, an unauthorized third party accessed the provisioning system in our legacy code base for Managed WordPress.
Apple はスパイウェア Pegasus を利用した Apple ユーザへの監視活動についてNSO Group を提訴
Apple today filed a lawsuit against NSO Group and its parent company to hold it accountable for the surveillance and targeting of Apple users. The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware. To prevent further abuse and harm to its users, Apple is also seeking a permanent injunction to ban NSO Group from using any Apple software, services, or devices.
新型コロナウイルス接触確認アプリ (COCOA) の v1.4.0 で起動直後に強制終了する不具合。v1.4.1 で修正。
インターポールおよび 22ヶ国の司法機関による共同作戦 HAECHI-II により、サイバー犯罪に関与した 1,000人以上の容疑者を逮捕
An operation coordinated by INTERPOL codenamed HAECHI-II saw police arrest more than 1,000 individuals and intercept a total of nearly USD 27 million of illicit funds, underlining the global threat of cyber-enabled financial crime.
Taking place over four months from June to September 2021, Operation HAECHI-II brought together specialized police units from 20 countries, as well as from Hong Kong and Macao, to target specific types of online fraud, such as romance scams, investment fraud and money laundering associated with illegal online gambling.
In total, the operation resulted in the arrest of 1,003 individuals and allowed investigators to close 1,660 cases. In addition 2,350 bank accounts linked to the illicit proceeds of online financial crime were blocked. More than 50 INTERPOL notices were published based on information relating to Operation HAECHI-II and 10 new criminal modus operandi were identified.
Google が Threat Horizons レポートを公開
Part of offering a secure cloud computing platform is providing cloud users with cybersecurity threat intelligence so they can better configure their environments and defenses in manners most specific to their needs. Google’s Cybersecurity Action Team is pleased to publish the first issue of Threat Horizons report. The report is based on threat intelligence observations from the Threat Analysis Group (TAG), Google Cloud Threat Intelligence for Chronicle, Trust and Safety, and other internal teams. It provides actionable intelligence that enables organizations to ensure their cloud environments are best protected against ever evolving threats. In this and future threat intelligence reports, Google will provide threat horizon scanning, trend tracking, and Early Warning announcements about emerging threats requiring immediate action.
英 Sky 社が顧客に提供するルータに DNS rebinding の脆弱性
Sky broadband had a significant security flaw in around 6 million of their customer routers that would allow remote compromise of home networks. When informed about it, they took nearly 18 months to fully fix the problem.
Microsoft が 11月の定例パッチで修正した Windows インストーラーの特権の昇格の脆弱性 (CVE-2021-41379) において、修正が不十分でバイパスできることをセキュリティ研究者が公表
Microsoft が 11月の定例パッチで修正した Microsoft Exchange Server のリモートでコードが実行される脆弱性 (CVE-2021-42321) の PoC コードが公開される
As many ppl requested,
Here is the PoC of CVE-2021-42321, Exchange Post-Auth RCE
This PoC just pop mspaint.exe on the target, can be use to recognize the signature pattern of a successful attack event
英 NCSC が年次レポート NCSC Annual Review 2021 を公開
WASForum の Hardening Project が主催する Hardening 2021 Active Fault が 11/17-20,27 日に開催
(コメント) 2012年 2月開催の Hardening Zero から数えて 19回目となる Hardening イベント。私も実行委員として参加しています。
Hardening Project
Hardening 2021 Active Fault

本競技会は11/19にフル・オンラインで開催。11/27の本日、Softening Day、振り返りです。
- 全チームからの取り組み発表
- 攻撃者Kuromame6と環境解説
- スコア発表と表彰
- 健闘を讃えつつ総括。


オープンソースの脆弱性スキャンツール Vuls の v0.19.0 がリリース。米 CISA が管理する脆弱性カタログ (Known Exploited Vulnerabilities) に対応
(コメント) ポッドキャスト聴いていただいていたとは超嬉しい。Vuls 応援してます!!
#vuls v0.19.0リリース!

#セキュリティのアレ 第109回」で @MasafumiNegishi さんが紹介していたアレです。podcast定期購読しててよかった〰
総務省が「電気通信事業におけるサイバー攻撃への適正な対処の在り方に関する研究会 第四次とりまとめ」を公表
 総務省は、巧妙化・複雑化するサイバー攻撃に対して、電気通信事業者が適切な対応を行うことが可能となるよう検討を行うことを目的として、「電気通信事業におけるサイバー攻撃への適正な対処の在り方に関する研究会」(座長:鎮目征樹 学習院大学法学部教授)を開催しています。
今般、本研究会において「電気通信事業におけるサイバー攻撃への適正な対処の在り方に関する研究会 第四次とりまとめ」が策定されましたので、これを公表します。また、本取りまとめに先立ち、「電気通信事業におけるサイバー攻撃への適正な対処の在り方に関する研究会 第四次とりまとめ(案)」についての意見募集を行いましたので、意見募集の結果を併せて公表します。
Did you enjoy this issue? Yes No
Weekly newsletter of Masafumi Negishi
Weekly newsletter of Masafumi Negishi

Security Researcher, IIJ-SECT, SANS Instructor in Japan, OWASP Japan Advisory Board, WASForum Hardening Project, 子供たちが安心して使える安全なネット社会を実現したいですね。

In order to unsubscribe, click here.
If you were forwarded this newsletter and you like it, you can subscribe here.
Created with Revue by Twitter.