Kick off the New Year with SANS Security East 2017 in New Orleans (January 9-14)

Newsletters: @RISK

@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked, and other valuable data

A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

May 2, 2013

@RISK: The Consensus Security Vulnerability Alert

Vol. 13, Num. 18

Providing a reliable, weekly summary of newly discovered attack vectors, vulnerabilities with active exploits, and explanations of how recent attacks worked.



MOST POPULAR MALWARE FILES 3/5/2013 - 3/12/2013

TOP VULNERABILITY THIS WEEK: A new Linux worm is rapidly spreading in the wild, covertly dropping a new copy of the Apache binary on infected systems and using them to quietly inject the Blackhole exploit kit. Administrators are urged to carefully check their systems for signs of compromise to the Apache binary, and to secure CPanel installations tightly, or keep them off of the public Internet where possible.



- -- SANS Security West 2013 San Diego, CA May 7-May 16, 2013
32 courses. Bonus evening sessions include Gone in 60 Minutes; The
Ancient Art of Falconry; and You Can Panic Now. Host Protection is
(Mostly) Dead.

- -- SANSFIRE 2013 Washington, DC June 14-22, 2013
41 courses. Bonus evening sessions include Avoiding Cyberterrorism
Threats Inside Hydraulic Power Generation Plants; and Automated Analysis
of Android Malware.

- -- SANS Rocky Mountain 2013 Denver, CO July 14-20, 2013
10 courses. Bonus evening sessions include OODA - The Secret to
Effective Security in Any Environment; and APT: It is Not Time to Pray,
It is Time to Act.

- -- Critical Security Controls International Summit London, UK April 26-May 2 2013
Including SEC566: Implementing and Auditing the 20 Critical Security
Controls led by Dr. Eric Cole.

- -- SANS Pen Test Berlin 2013 Berlin, Germany June 2-June 8, 2013
Europe's only specialist pen test training and networking event. Five
dedicated pen test training courses led by five SANS world-class

- -- SANS London Summer 2013 London, UK July 9-July 16, 2013
5 courses.

- -- Looking for training in your own community?

- -- Save on On-Demand training (30 full courses) - See samples at
Plus Johannesburg, Malaysia, and Canberra all in the next 90 days.
For a list of all upcoming events, on-line and live:

********************** Sponsored Link: *********************

1) Having trouble managing your security information? Don't miss our new
Analyst webcast: Advanced Intelligence in Action-SANS review of McAfee's
Enterprise Security Manager by Dave Shackleford, Wednesday, May 22 at 1:00 PM EDT


Title: CDorked worm spreads through Linux servers, dropping Blackhole Description: A new virus specifically targeting Linux systems with CPanel installed, known as Linxu/CDorked, is currently making its way through the Internet, dropping Blackhole exploit kits on infected systems after replacing their copy of the local Apache server binary. System administrators are urged to patch their systems to current levels, and to disable remote access to CPanel except where strictly necessary.
Snort SID: 26527-26532
ClamAV: Linux/CDorked.A

Title: Multiple vulnerabilities in DLink IP cameras
Description: A slew of serious, remotely exploitable vulnerabilities were announced in DLink IP cameras this week, including default passwords and arbitrary command injection without authentication. Owners of these cameras are urged to immediately disable remote access to them wherever possible, and apply current firmware updates in all cases. Reference:
Snort SID: 1122, 26559
ClamAV: N/A

Title: WordPress brute force scanners spiking in the wild
Description: A rash of scanners brute-forcing their way into poorly secured WordPress installations has been detected in the wild within the last few weeks, rising to heretofore unseen levels of activity. Once inside, the scanners typically drop web shells disguised as GIF files, along with other malicious content such as exploit kits and the like. Administrators are urged to ensure the use of secure, non-default passwords for all WordPress installations. Reference:
Snort SID: 23114, 26557
ClamAV: N/A


Library of malware traffic patterns:

Introducing EMET v4 beta:

Google Glass rooted, then kernel source code released:

The Redkit malware gang has a message for Brian Krebs:

AP Twitter hack came after well-disguised spear phish:

CVE-2013-0640 samples listing:

Analysis of an evasive backdoor:

Don't sign that applet:


This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2013-2423
Title: Java Applet Reflection Type Confusion Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

ID: CVE-2013-1362
Title: Nagios Remote Plugin Executor Arbitrary Command Execution
Description: A remote exploitation of an input validation error vulnerability in versions prior to 2.14 of Nagios, as included in various vendors' operating system distributions, could allow attackers to execute arbitrary commands on the targeted host.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

ID: CVE-2013-0632
Title: Adobe ColdFusion APSB13-03 Remote Exploit
Vendor: Adobe
Description: Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-1080
Title: Novell ZENworks Configuration Management Remote Execution
Vendor: Novell
Description: The web server in Novell ZENworks Configuration Management (ZCM) 10.3 and 11.2 does not properly perform authentication for zenworks/jsp/index.jsp, which allows remote attackers to conduct directory traversal attacks, and consequently upload and execute arbitrary programs, via a request to TCP port 443.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-1493
Title: Oracle Java SE JVM 2D Subcomponent Remote Code Execution
Vulnerability (Oracle Security Alert for CVE-2013-1493)
Vendor: Oracle
Description: The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

MOST POPULAR MALWARE FILES 4/23/2013 - 4/30/2012

SHA 256: D14B66BD4C4C8F66A6EDF2820FD4162D09B326BEAF6A42014596571E81A1A503
MD5: 68b7f7a26b76805432e3d50009d2ab1f

Typical Filename: desgrx.exe
Claimed Product: desgrx.exe
Claimed Publisher: desgrx.exe

SHA 256: E83A61AE6CFED6861AFDFA73CA41B0000BFCFD4FF710B8C0067805024286CD07
MD5: 8bc3498a39fb2d290a8975fd5419eb55

Typical Filename: 8bc3498a39fb2d290a8975fd5419eb55
Claimed Product: 8bc3498a39fb2d290a8975fd5419eb55
Claimed Publisher: 8bc3498a39fb2d290a8975fd5419eb55

SHA 256: E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B
MD5: bf31a8d79f704f488e3dbcb6eea3b3e3

Typical Filename: klplmq.sys
Claimed Product: klplmq.sys
Claimed Publisher: klplmq.sys

SHA 256: AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615
MD5: 3291e1603715c47a23b60a8bf2ca73db

Typical Filename: 01.tmp
Claimed Product: 01.tmp
Claimed Publisher: 01.tmp

SHA 256: 02DB0F24CF8461FB903C65FAB7A1B5668BB6D912AFD8414D4AE872E97FCAD090
MD5: 64645e81435058738c137a67df84a5c5

Typical Filename: bitcoin-miner.exe
Claimed Product: Bitcoin Miner
Claimed Publisher: Ufasoft


(c) 2013. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only.

Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit