SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Are typos still relevant as an indicator of phishing?
Published: 2023-10-16
Last Updated: 2023-10-16 07:17:38 UTC
by Jan Kopriva (Version: 1)
I was recently asked by a customer whether it still makes sense to cover “typos” as a potential indicator that an e-mail message may be malicious in the context of security awareness courses.
One might not expect typos to be relevant anymore, given the prevalence of automated language proofing solutions and the availability of modern LLMs, which threat actors may avail themselves of, coupled with advanced capabilities of modern security solutions used to automatically identify and filter out spam and malicious messages… Nevertheless, the truth is that although the aforementioned indicator may not be as useful as it once was, it may still point a recipient in the right direction.
One good example of why this is so was provided by a phishing campaign we saw last week, when several messages, which were trying to masquerade as e-mails from the WeTransfer service, were delivered to our ISC inbox ...
Read the full entry:
https://isc.sans.edu/diary/Are+typos+still+relevant+as+an+indicator+of+phishing/30316/
Changes to SMS Delivery and How it Effects MFA and Phishing
Published: 2023-10-17
Last Updated: 2023-10-17 14:02:19 UTC
by Johannes Ullrich (Version: 1)
Spam and phishing SMS messages (sometimes called "smishing") have been problematic in recent years. These messages often bypass security controls and are more challenging to identify as malicious by users. Moreover, they can be just simply annoying.
This post does apply to US telecom companies. Let me know how this is being dealt with in other countries.
Here is a simple "stupid" one I just received yesterday ...
But often, you will now see "smishing" that asks you to reply. For example, an attack I wrote about recently ...
Initially, I figured it might be required to reply to the message to "activate" the phishing page. This would certainly make analysis of these messages more difficult. But the phishing page was accessible even without replying. So there must be another reason for this.
My best guess is that these messages are asking for replies to fool anti-spam techniques put in place by carriers. Over the last few years, carriers in the US have implemented more and more anti-spam measures for SMS. This is partly driven by regulations that initially allowed carriers to filter messages, and now, more and more require them to implement filters. T-Mobile, for example, uses a detailed "code of conduct" to inform customers what T-Mobile considers appropriate behavior.
Red the full entry:
https://isc.sans.edu/diary/Changes+to+SMS+Delivery+and+How+it+Effects+MFA+and+Phishing/30320/
Hiding in Hex (2023.10.18)
https://isc.sans.edu/diary/Hiding+in+Hex/30322/
Domain Name Used as Password Captured by DShield Sensor (2023.10.15)
https://isc.sans.edu/diary/Domain+Name+Used+as+Password+Captured+by+DShield+Sensor/30312/
What's Normal: MAC Addresses (2023.10.13)
https://isc.sans.edu/diary/Whats+Normal+MAC+Addresses/30310/
CVE-2023-44487 HTTP/2 Rapid Reset AttackProduct: IETF HTTPCVSS Score: 0** KEV since 2023-10-10 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44487MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487NVD References: - https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487- https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event CVE-2023-4966 - NetScaler ADC and NetScaler Gateway configured as a Gateway or AAA virtual server may reveal sensitive information.Product: Citrix NetScaler Application Delivery ControllerCVSS Score: 7.5** KEV since 2023-10-18 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-4966NVD References: https://support.citrix.com/article/CTX579459CVE-2023-35349 - Microsoft Message Queuing Remote Code Execution VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35349MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35349CVE-2023-36434 - Windows IIS Server Elevation of Privilege VulnerabilityProduct: Microsoft Windows 10 1507CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36434MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434CVE-2023-38545 - Curl's heap based buffer in the SOCKS5 proxy handshake overflows when passing a host name longer than 255 bytes.Product: Vendor: curlProduct: curl CVSS Score: 0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-38545ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8698NVD References: https://curl.se/docs/CVE-2023-38545.htmlCVE-2023-43261 - An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.Product: Milesight UR5XCVSS Score: 0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43261ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8706CVE-2023-43625 - Simcenter Amesim (All versions < V2021.1) allows unauthenticated remote attackers to perform DLL injection and execute arbitrary code via a SOAP endpoint.Product: Siemens Simcenter AmesimCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43625NVD References: https://cert-portal.siemens.com/productcert/pdf/ssa-386812.pdfCVE-2023-41373 - The BIG-IP Configuration Utility has a directory traversal vulnerability that allows authenticated attackers to execute commands and potentially bypass security boundaries in Appliance mode.Product: F5 BIG-IP Access Policy ManagerCVSS Score: 9.9NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-41373NVD References: https://my.f5.com/manage/s/article/K000135689CVE-2023-30801 - qBittorrent client through 4.5.5 allows remote attackers to execute arbitrary commands via default credentials in the web user interface.Product: qbittorrent CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30801NVD References: - https://github.com/qbittorrent/qBittorrent/issues/18731- https://vulncheck.com/advisories/qbittorrent-default-credsCVE-2023-30803 - The Sangfor Next-Gen Application Firewall version NGAF8.0.17 allows remote and unauthenticated attackers to access administrative functionality through an authentication bypass vulnerability.Product: Sangfor Next-Gen Application FirewallCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30803NVD References: - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4- https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/- https://vulncheck.com/advisories/sangfor-ngaf-auth-bypassCVE-2023-30805 - Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection through mishandling of shell meta-characters in the "un" parameter, allowing remote and unauthenticated attackers to execute arbitrary commands via a crafted HTTP POST request to the /LogInOut.php endpoint.Product: Sangfor Next-Gen Application FirewallCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30805NVD References: - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4- https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/- https://vulncheck.com/advisories/sangfor-ngaf-username-rceCVE-2023-30806 - The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection via crafted HTTP POST request to the /cgi-bin/login.cgi endpoint, allowing remote unauthenticated attackers to execute arbitrary commands due to mishandling of shell meta-characters in the PHPSESSID cookie.Product: Sangfor Next-Gen Application FirewallCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30806NVD References: - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4- https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/- https://vulncheck.com/advisories/sangfor-ngaf…
Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31272NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765CVE-2023-32632 - Yifan YF325 v1.0_20221108 is vulnerable to command execution due to a flaw in the validate.so diag_ping_start functionality when processing a specially crafted network request. Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32632NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767CVE-2023-32645 - Yifan YF325 v1.0_20221108 is vulnerable to authentication bypass via a specially crafted network request in its httpd debug credentials functionality.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32645NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752CVE-2023-34346 - Yifan YF325 v1.0_20221108 is susceptible to a stack-based buffer overflow vulnerability in its httpd gwcfg.cgi get functionality, allowing for command execution through a specially crafted network packet.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34346NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764CVE-2023-34365 - Yifan YF325 v1.0_20221108 is vulnerable to a stack-based buffer overflow in libutils.so nvram_restore, which can be exploited by an attacker through a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34365NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763CVE-2023-34426 - Yifan YF325 v1.0_20221108 is vulnerable to a stack-based buffer overflow in its httpd manage_request function, allowing an attacker to exploit it by sending a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34426NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766CVE-2023-35055 - Yifan YF325 v1.0_20221108 is vulnerable to a buffer overflow in the next_page parameter of the gozila_cgi function, allowing remote attackers to execute arbitrary commands by sending a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35055NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761CVE-2023-35056 - Yifan YF325 v1.0_20221108 is vulnerable to a buffer overflow in its httpd next_page functionality, allowing command execution via a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35056NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761CVE-2023-35965 - Yifan YF325 v1.0_20221108 is prone to two heap-based buffer overflow vulnerabilities in its httpd manage_post functionality, that can be exploited by an attacker sending a specially crafted network request, leading to a heap buffer overflow due to an integer overflow.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35965NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787CVE-2023-35966 - Yifan YF325 v1.0_20221108 httpd manage_post functionality has two heap-based buffer overflow vulnerabilities that can be exploited by sending a specially crafted network request to trigger a heap buffer overflow, due to an integer overflow used as an argument for the realloc function.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35966NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787CVE-2023-35967 - Yifan YF325 v1.0_20221108 is vulnerable to two heap-based buffer overflow vulnerabilities in gwcfg_cgi_set_manage_post_data, allowing an attacker to trigger the flaws via a specially crafted network request, leading to a heap buffer overflow due to an integer overflow in the malloc function argument.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35967NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788CVE-2023-35968 - Yifan YF325 v1.0_20221108 is vulnerable to two heap-based buffer overflow vulnerabilities in the gwcfg_cgi_set_manage_post_data functionality, which can be triggered by a specially crafted network request causing a heap buffer overflow due to an integer overflow in the argument for the realloc function.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35968NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788CVE-2023-35646 - TBD in TBD has a stack buffer overflow vulnerability, enabling remote code execution without additional privileges or user interaction.Product: Google AndroidCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/deta…
Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34346NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764CVE-2023-34365 - Yifan YF325 v1.0_20221108 is vulnerable to a stack-based buffer overflow in libutils.so nvram_restore, which can be exploited by an attacker through a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34365NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763CVE-2023-34426 - Yifan YF325 v1.0_20221108 is vulnerable to a stack-based buffer overflow in its httpd manage_request function, allowing an attacker to exploit it by sending a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34426NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766CVE-2023-35055 - Yifan YF325 v1.0_20221108 is vulnerable to a buffer overflow in the next_page parameter of the gozila_cgi function, allowing remote attackers to execute arbitrary commands by sending a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35055NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761CVE-2023-35056 - Yifan YF325 v1.0_20221108 is vulnerable to a buffer overflow in its httpd next_page functionality, allowing command execution via a specially crafted network request.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35056NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761CVE-2023-35965 - Yifan YF325 v1.0_20221108 is prone to two heap-based buffer overflow vulnerabilities in its httpd manage_post functionality, that can be exploited by an attacker sending a specially crafted network request, leading to a heap buffer overflow due to an integer overflow.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35965NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787CVE-2023-35966 - Yifan YF325 v1.0_20221108 httpd manage_post functionality has two heap-based buffer overflow vulnerabilities that can be exploited by sending a specially crafted network request to trigger a heap buffer overflow, due to an integer overflow used as an argument for the realloc function.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35966NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787CVE-2023-35967 - Yifan YF325 v1.0_20221108 is vulnerable to two heap-based buffer overflow vulnerabilities in gwcfg_cgi_set_manage_post_data, allowing an attacker to trigger the flaws via a specially crafted network request, leading to a heap buffer overflow due to an integer overflow in the malloc function argument.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35967NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788CVE-2023-35968 - Yifan YF325 v1.0_20221108 is vulnerable to two heap-based buffer overflow vulnerabilities in the gwcfg_cgi_set_manage_post_data functionality, which can be triggered by a specially crafted network request causing a heap buffer overflow due to an integer overflow in the argument for the realloc function.Product: Yifanwireless YF325CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35968NVD References: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788CVE-2023-35646 - TBD in TBD has a stack buffer overflow vulnerability, enabling remote code execution without additional privileges or user interaction.Product: Google AndroidCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35646NVD References: https://source.android.com/security/bulletin/pixel/2023-10-01CVE-2023-35647 - ProtocolEmbmsGlobalCellIdAdapter in protocolembmsadapter.cpp allows for a possible out of bounds read, potentially enabling remote information disclosure and requiring baseband firmware compromise with no user interaction needed.Product: Google AndroidCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35647NVD References: https://source.android.com/security/bulletin/pixel/2023-10-01CVE-2023-35648 - ProtocolMiscLceIndAdapter in protocolmiscadapter.cpp allows remote information disclosure due to a missing bounds check in GetConfLevel().Product: Google AndroidCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35648NVD References: https://source.android.com/security/bulletin/pixel/2023-10-01CVE-2023-35662 - The vulnerable product experiences an out of bounds write caused by buffer overflow, leading to remote code execution without requiring additional privileges or user interaction.Product: Google AndroidCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35662NV…
*********** Sponsored By Corelight ***********[Webinar] Charting the New Frontier of Incident Response | As cyber threats grow in sophistication, traditional defenses are becoming increasingly inadequate. Hear what tech elite responders are using to defend their organizations from sophisticated adversary tactics and techniques in Corelight and Mandiant’s live panel on November 14.
SANS Research | Take the Operational Security Maturity Survey for a chance to win a $250 Amazon gift card! In this survey, we hope to better understand questions such as: Should compliance drive an organization's security strategy, or should the security strategy enable compliance? | Complete the survey:
Protecting the SDLC: Modernizing Secure Software Delivery with ASPM - Thu, October 19 at 1:00pm ET | During this upcoming webcast, we will discuss the ins and outs of ASPM and how it delivers holistic security and true value. | Register now:
Upcoming Webcast on Tue, October 24 at 1:00pm ET | Identify, Evaluate, and Prioritize Industrial Cyber Risk - Join this webcast with Dean Parsons as he evaluates PAS Cyber Integrity, a new offering from PAS Hexagon designed to harden OT assets against cyber-threats, identify critical endpoint vulnerabilities and risks, enable rapid recovery, and more. | Register now: