SANS Live Training is Available In-Person OR Live Online! Explore Upcoming Events.

Newsletters: @RISK

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.

SANS NewsBites
@Risk: Security Alert
OUCH! Security Awareness
Case Leads DFIR Digest
Industrial Control Systems
Industrials & Infrastructure

@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked, and other valuable data

A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

April 18, 2013

@RISK: The Consensus Security Vulnerability Alert

Vol. 13, Num. 14

Providing a reliable, weekly summary of newly discovered attack vectors, vulnerabilities with active exploits, and explanations of how recent attacks worked.



MOST POPULAR MALWARE FILES 3/28/2013 - 4/4/2013

TOP VULNERABILITY THIS WEEK: A recently disclosed vulnerability in ISC BIND impacts a variety of Linux-based systems using glibc, which can be killed by feeding them a particularly complex regular expression. Server administrators should patch the vulnerability immediately, before exploitation in the wild - which is likely based on the ease of crafting an attack - begins in earnest.

***************** Sponsored By SANS ****************

Attend the SANS 20 Critical Security Control Briefing, Thursday, April 18, 2013 in Washington, DC at the JW Marriott. Tony Sager and John Pescatore will provide an overview of the 20 CSC, showcase the 20 CSC In Action, and also moderate a Vendor Panel. Event is free to Government attendees. For more information go to

To register for this event via simulcast, visit



- -- SANS Northern Virginia 2013 Reston, VA April 8-April 13, 2013
7 courses. Bonus evening presentations include Infosec Rock Star: How
to be a More Effective Security Professional; Pentesting Web Apps with
Python; and Practical, Efficient Unix Auditing: With Scripts.

- -- SANS Cyber Guardian 2013 Baltimore, MD April 15-April 20, 2013
9 courses. Bonus evening presentations include Windows Exploratory
Surgery with Process Hacker; Offensive Countermeasures, Active Defenses,
and Internet Tough Guys; and Tactical SecOps: A Guide to Precision
Security Operations.

- -- SANS Security West 2013 San Diego, CA May 7-May 16, 2013
32 courses. Bonus evening sessions include Gone in 60 Minutes; The
Ancient Art of Falconry; and You Can Panic Now. Host Protection is
(Mostly) Dead.

- -- SANSFIRE 2012 Washington, DCJune 14-22, 2013
41 courses. Bonus evening sessions include Avoiding Cyberterrorism
Threats Inside Hydraulic Power Generation Plants; and Automated Analysis
of Android Malware.

- -- Critical Security Controls International Summit London, UK April 26-May 2 2013
Including SEC566: Implementing and Auditing the 20 Critical Security
Controls led by Dr. Eric Cole.

- -- SANS Pen Test Berlin 2013 Berlin, Germany June 2-June 8, 2013
Europe's only specialist pen test training and networking event. Five
dedicated pen test training courses led by five SANS world-class

- -- Looking for training in your own community?

- -- Save on On-Demand training (30 full courses) - See samples at
Plus Seoul, Bangalore, Johannesburg, and Malaysia all in the next 90 days.
For a list of all upcoming events, on-line and live:

********************* Sponsored Links: *********************

1) Datacenter Virtualization from a Security Perspective, Wednesday, May
1, featuring Dave Shackleford

2) Take the New SANS Survey on the Critical Security Controls and enter
to win a new iPad!


Title: ISC BIND Regular Expression Denial of Service
Description: A trivially exploitable denial of service was announced in ISC BIND last week. The issue - which revolves around complex regular expressions, and which to date is not being exploited in mass campaigns on the Internet - actually stems from a glibc regular expression issue, and caused ISC to create their own regular expression validation functionality in the patch released for the bug (internal testing within the VRT has shown that expressions which crash BIND can crash Linux systems from the command line). Administrators should apply this patch immediately, before attackers begin targeting servers in the wild. Reference:
Snort SID: 26324
ClamAV: N/A

Title: North Korean MBR wiper targeted Linux, UNIX systems
Description: In addition to contributing to tensions between North and South Korea, the MBR wiper attacks that recently targeted high-profile systems in the South were interesting from a purely technical standpoint, in that they included generic payloads for Linux and UNIX systems. While attackers have recently begun spending more time targeting OS X and Android systems, Linux servers and other critical infrastructure targets have to date remained largely safe from mass malware attacks; this trojan could signal a reversal of that trend. Reference:
Snort SID: 26326
ClamAV: Win.Trojan.Agent-257543

Title: Telephony Denial of Service on emergency responders
Description: The United States federal government is warning emergency responders about a new telephony-based denial of service attack which is currently being used to attempt to extort blackmail money from agencies across the country. Non-emergency lines are being flooded with calls, to the point that responders are not able to receive inbound calls from the public they serve. Potentially impacted agencies are urged to immediately contact the FBI if an attack occurs. Reference:
Snort SID: N/A
ClamAV: N/A

Title: Mysterious attack targets Apache servers, drops exploit kits
Description: A campaign dubbed "Darkleech" has been quietly using unknown vectors - likely involving Cpanel, Plesk, or other Apache-based system administration tools - to drop exploit kits on tens of thousands of servers recently. The campaign - which can be tracked with the URLQuery link below - is slipping below the radar of many administrators, with a hidden iframe delivering the malicious content on unsuspecting users. As noted by the URLQuery site, these exploit kits can be reliably detected at the IDS level with the Sourcefire VRT's Exploit-Kit rules category (clicking any individual link will give a breakdown on events generated when fetching a live copy of the page). Reference:
Snort SID: EXPLOIT-KIT category (hundreds of rules)
ClamAV: N/A

Title: New malware uses Evernote server for C&C communications
Description: Researchers at Trend Micro last week discovered a piece of malware, dubbed "Vernot", which bases C&C communications around a request to a Chinese slice of the Evernote service. This novel method illustrates just how easy it is for creative attackers to obfuscate C&C channels, and how proper network defense revolves around monitoring any abnormal activity. Network administrators whose systems do not contact Evernote or Chinese systems as part of legitimate business are urged to block the URL highlighted in the Trend Micro report below.
Snort SID: 26328
ClamAV: Win.Trojan.Vernot


A peek inside the EgyPack web malware exploitation kit:

APKScan beta released:

Parsing binary file formats with PowerShell:

Introducing ThreatAgent Exfiltrate:

Dumpmon: a Twitter bot that monitors paste sites for interesting info:

vSkimmer botnet targets payment terminals:

Nerd programmer discovers this weird old trick for discovering heap addresses!

Known bad Tor exit nodes:

Jamming with WordPress sessions:


This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2012-5879
Title: McAfee Virtual Technician ActiveX Control Insecure Method
Vendor: McAfee
Description: An ActiveX control in McHealthCheck.dll in McAfee Virtual Technician (MVT) and ePO-MVT and earlier allows remote attackers to modify or create arbitrary files via a full pathname argument to the Save method.
CVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)

ID: CVE-2012-4711
Title: KingView Log File Parsing Buffer Overflow
Vendor: WellinTech
Description: Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2012-3001
Title: Mutiny Remote Command Execution
Vendor: Mutiny Technology
Description: Mutiny Standard before 4.5-1.12 allows remote attackers to execute arbitrary commands via the network-interface menu, related to a "command injection vulnerability."
CVSS v2 Base Score: 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

ID: CVE-2013-1288
Title: Microsoft Internet Explorer CTreeNode Use After Free Vulnerability (MS13-021)
Vendor: Microsoft
Description: Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability."
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

ID: CVE-2013-1493
Title: Oracle Java SE JVM 2D Subcomponent Remote Code Execution
Vulnerability (Oracle Security Alert for CVE-2013-1493)
Vendor: Oracle
Description: The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

MOST POPULAR MALWARE FILES 3/28/2013 - 4/4/2013:

SHA 256: 9ade68f592217900f364742f553b1b177ea2cce8d365e00560230db49e386fcf
MD5: 765197626e862524cd850a49baec7031
Typical Filename: jf_cf_frostovip.exe
Claimed Product: JF_CF_MiniZM
Claimed Publisher:

SHA 256: 636fec0f9f19f56f082ad5558aed5e6c323fb44e573e0f94d0d1a1eb3cea7041
MD5: 07fd6e250058a78bcf4d9fa65dee03ab
Typical Filename: jf_1hitcf.exe
Claimed Product: JF_CF_MiniZM
Claimed Publisher:

SHA 256: bcc6188203e7b42073209f9356aa15598f61151217eb25dbd869db0e5b99b0c9
MD5: efac97460bd2e8fad7f5118bc4020fdc
Typical Filename: D3D Damag CF v11.8.exe
Claimed Product: -
Claimed Publisher: -

SHA 256: a316c76591ec14102164ef345cd2bd61a8a455724cfcd1591b1fe1d50543ad25
MD5: 7a402a1cf3be24a2eb97e79973df91e7
Typical Filename: 9DF.exe
Claimed Product: -
Claimed Publisher: -

SHA 256: fe1e4987cd97c1198da240aa490e94c4def8db61b95815d1379220fd7bed603a
MD5: 595f95f3b1f54d51a179d60804184ceb
Typical Filename: jf_1hitcf.exe
Claimed Product: -
Claimed Publisher: -


(c) 2013. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only.

Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit