INTERNET STORM CENTER SPOTLIGHT
ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Apple Patches Everything. July 2024 Edition
Published: 2024-07-30
Last Updated: 2024-07-30 17:01:22 UTC
by Johannes Ullrich (Version: 1)
Yesterday, Apple released patches across all of its operating systems. A standalone patch for Safari was released to address WebKit problems in older macOS versions. Apple does not provide CVSS scores or severity ratings. The ratings below are based on my reading of the impact. However, the information isn’t always sufficient to accurately assign a rating.
One vulnerability, CVE-2024-23296, which can be used to bypass kernel protections via RTKit, is already being exploited. Apple patched this issue for newer operating systems in March, but it now releasing the patch for older macOS and iOS versions.
According to my count, these updates address 64 different vulnerabilities.
Read the full entry:
https://isc.sans.edu/diary/Apple+Patches+Everything+July+2024+Edition/31128/
CrowdStrike Outage Themed Maldoc
Published: 2024-07-29
Last Updated: 2024-07-29 00:03:44 UTC
by Didier Stevens (Version: 1)
I found a malicious Word document with VBA code using the CrowdStrike outage for social engineering purposes. It's an .ASD file (AutoRecover file). My tool oledump.py can analyze it ...
Before I dive into the VBA code, I want to highlight the metadata of this document: ...
Read the full entry:
https://isc.sans.edu/diary/CrowdStrike+Outage+Themed+Maldoc/31116/
XWorm Hidden With Process Hollowing
Published: 2024-07-25
Last Updated: 2024-07-25 07:21:58 UTC
by Xavier Mertens (Version: 1)
XWorm is not a brand-new malware family. It's a common RAT (Remote Access Tool) re-use regularly in new campaigns. Yesterday, I found a sample that behaves like a dropper and runs the malware using the Process Hollowing technique. The sample is called ... . It's a .Net executable that is, strangely, not obfuscated. It's possible to disassemble it with ilspycmd ...
Read the full entry:
https://isc.sans.edu/diary/XWorm+Hidden+With+Process+Hollowing/31112/