SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP
Title: Microsoft disclosed more than 80 vulnerabilities as part of Patch Tuesday, including several in PTP tunneling
Description: Microsoft released its monthly security update Tuesday, disclosing 84 vulnerabilities across the company’s hardware and software line, including seven critical issues in Windows’ point-to-point tunneling protocol. September's security update features 11 critical vulnerabilities, with the remainder being “important.” One of the most notable vulnerabilities Microsoft fixed this month is CVE-2022-41038, a remote code execution issue in Microsoft SharePoint. There are several other SharePoint vulnerabilities included in this month’s Patch Tuesday, though this seems the most severe, as Microsoft continues it to be “more likely” to be exploited. An attacker must be authenticated to the target site with the correct permissions to use manage lists in SharePoint to exploit this vulnerability, and eventually gain the ability to execute remote code on the SharePoint server.
References: https://blog.talosintelligence.com/2022/10/microsoft-patch-tuesday-for-october.html
Snort SIDs: 60429, 60430 and 60627
Snort 3 SID: 300248
Title: Alchimist is new attack framework in Chinese for Mac, Linux and Windows
Description: Cisco Talos has discovered a new single-file command and control (C2) framework the authors call "Alchimist [sic]." Talos researchers found this C2 on a server that had a file listing active on the root directory along with a set of post-exploitation tools. Talos assesses with moderate-high confidence that this framework is being used in the wild. "Alchimist" is a 64-bit Linux executable written in GoLang and packed with assets including resources for the web interface and Insekt RAT payloads compiled for Windows and Linux. Insekt RAT, a new trojan Cisco Talos discovered, is Alchimist's beacon implant written in GoLang and has a variety of remote access capabilities that can be instrumented by the Alchimist C2 server. Alchimist C2 has a web interface written in Simplified Chinese and can generate a configured payload, establish remote sessions, deploy payload to the remote machines, capture screenshots, perform remote shellcode execution and run arbitrary commands.
References: https://blog.talosintelligence.com/2022/10/alchimist-offensive-framework.html
ClamAV signatures:
* Osx.Exploit.CVE_2021_4034-9951522-2
* Unix.Exploit.CVE_2021_4034-9951523-0
* Unix.Exploit.CVE_2021_4034-9951524-0
* Unix.Exploit.CVE_2021_4034-9951525-0
* Unix.Exploit.CVE_2021_4034-9951526-0
* Unix.Malware.Insekt-9955436-0
* Win.Malware.Insekt-9955440-0
* Unix.Malware.Alchimist-9955784-0
* Multios.Malware.Insekt-9961177-0
Snort SIDs: 58955 - 58956