Internet Storm Center Spotlight


Title: Snake/Ekans malware adds new functionality to go after ICS

Description: The Snake ransomware (otherwise known as "Ekans") has added new capabilities aimed at going after industrial industries. Ekans first emerged in December, but now has a relationship with the MEGACORTEX ransomware that could allow it to spread quickly on ICS systems and even force some services to revert to manual operations. The malware's code now includes direct references to HMI processes and historian clients that are commonly linked to ICS.


Snort SIDs: 53106, 53107

Title: Carrotbat malware, Syscon backdoor team up to target federal government

Description: An American federal agency was targeted in late January with a series of phishing emails utilizing a variant of the Carrotbat malware and the Syscon backdoor. Attackers used six unique email attachments in the campaign, all relating to the ongoing strained relationship between the U.S. and North Korea. Security researchers say these attackers are still active, despite the majority of their activity taking places over the summer.


Snort SIDs: 53129 - 53145

Internet Storm Center Entries

A vulnerability in a mobile app used by Israeli Prime Minister Benjamin Netanyahu exposed the data of all 6.5 million voters in the country.

Several federal agencies teamed up last week to expose a massive hacking campaign by a state-sponsored North Korean actor.

Republicans in the Senate blocked three bills related to election security from being introduced to the full chamber.

Local government agencies in England had to resort to pen-and-paper operations after a ransomware attack.

U.S. officials continue to trade barbs with Chinese tech company Huawei, as American leadership teased that it would end intelligence-sharing relationships with any countries that use Huawei's 5G technology.

A popular WordPress plugin contains a vulnerability that could allow attackers to completely wipe more than 200,000 websites.

Security researchers are warning of a new espionage campaign by Iranian state-sponsored actors that's targeted global companies.

Amazon's Ring security service is considering changing its privacy settings after several negative stories around the company have emerged, as well as talks that Ring may share data with Facebook.

An unsigned piece of malware is targeting Linux system to eventually move onto WiFi adapters, USB hubs and laptop cameras.

Recent CVEs


This is a list of recent vulnerabilities for which exploits are

available. System administrators can use this list to help in

prioritization of their remediation activities. The Qualys Vulnerability

Research Team compiles this information based on various exploit

frameworks, exploit databases, exploit kits and monitoring of internet


ID: CVE-2020-0618

Title: Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability

Vendor: Microsoft

Description: A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests. An attacker who successfully exploited this vulnerability could execute code in the context of the Report Server service account. To exploit the vulnerability, an authenticated attacker would need to submit a specially crafted page request to an affected Reporting Services instance.

CVSS v2 Base Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)

ID: CVE-2020-0668

Title: Microsoft Windows Kernel Elevation of Privilege Vulnerability

Vendor: Microsoft

Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'

CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)

ID: CVE-2019-18683

Title: Linux kernel vulnerability in the V4L2 subsystem

Vendor: Multi-Vendor

Description: These vulnerabilities are caused by incorrect mutex locking in the vivid driver of the V4L2 subsystem (drivers/media/platform/vivid). This driver doesn't require any special hardware. It is shipped in Ubuntu, Debian, Arch Linux, SUSE Linux Enterprise, and openSUSE as a kernel module (CONFIG_VIDEO_VIVID=m).

CVSS v2 Base Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)

ID: CVE-2020-0601

Title: Microsoft Windows CryptoAPI Spoofing Vulnerability

Vendor: Microsoft

Description: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider.

A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.

CVSS v2 Base Score:5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

ID: CVE-2019-19781

Title: Citrix ADC And Citrix Gateway Arbitrary Code Execution Vulnerability

Vendor: Citrix

Description: A vulnerability has been identified in Citrix Application Delivery Controller (ADC) formerly known as NetScaler ADC and Citrix Gateway formerly known as NetScaler Gateway that, if exploited, could allow an unauthenticated attacker to perform arbitrary code execution. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application.

CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

ID: CVE-2020-0683

Title: Microsoft Windows Installer Elevation of Privilege Vulnerability

Vendor: Microsoft

Description: An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links. An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files.

CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2020-7247

Title: OpenBSD OpenSMTPD Arbitrary Commands Execution Vulnerability

Vendor: OpenBSD

Description: smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2019-11510

Title: Pulse Secure Arbitrary File Disclosure Vulnerability

Vendor: Pulse Secure

Description: Pulse Connect Secure is exposed to arbitrary file disclosure vulnerability. An attacker can exploit these issues to access arbitrary files in the context of the application, write arbitrary files, or can send a specially crafted URI to perform an arbitrary file reading vulnerability.

CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Prevalent Malware Files


SHA 256: 1460fd00cb6addf9806a341fee9c5ab0a793762d1d97dca05fa17467c8705af7

MD5: 88cbadec77cf90357f46a3629b6737e6


Typical Filename: FlashHelperServices.exe

Claimed Product: Flash Helper Services

Detection Name: PUA.Win.File.2144flashplayer::tpd

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5

MD5: 8c80dd97c37525927c1e549cb59bcbf3


Typical Filename: eternalblue-2.2.0.exe

Claimed Product: N/A

Detection Name:

SHA 256: 97d8ea6cee63296eaf0fa5d97a14898d7cec6fa49fee1bf77c015ca7117a2ba7

MD5: be52a2a3074a014b163096055df127a0


Typical Filename: xme64-553.exe

Claimed Product: N/A

Detection Name: Win.Trojan.Coinminer::tpd

SHA 256: 9e9d85d9e29d6a39f58f4db3617526b92a5200225d41d0ab679a90c0167321b4

MD5: d45699f36a79b9d4ef91f5db1980d27b


Typical Filename: profile-6.exe

Claimed Product: N/A

Detection Name: Win.Dropper.Zbot::222561.in02

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b

MD5: 799b30f47060ca05d80ece53866e01cc


Typical Filename: mf2016341595.exe

Claimed Product: N/A

Detection Name: W32.Generic:Gen.22fz.1201