今週の気になるセキュリティニュース - Issue #149

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

KDDI の西日本エリアで、通信設備の故障により、音声・データ通信サービスに障害

(12/11) 【復旧】西日本エリアにて携帯電話サービスがご利用できない、またはご利用しづらい状況について(12月11日 午後12時45分時点)


ウクライナの大手通信事業者 Kyivstar でサイバー攻撃による通信障害

(12/13) CERT-UA experts are investigating a cyberattack against Kyivstar telecom operator’s network

(12/13) Hacker Group Linked to Russian Military Claims Credit for Cyberattack on Kyivstar | WIRED

(12/13) ウクライナの通信最大手に大規模サイバー攻撃 - CNN.co.jp

(12/14) Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica

(12/15) Kyivstar restores mobile internet across Ukraine, reactivates international roaming | VEON


Ledger Connect Kit が不正に置き換えられ、利用している複数の DApps に影響

(12/14) A letter from Ledger Chairman & CEO Pascal Gauthier Regarding Ledger Connect Kit Exploit | Ledger

(12/14) Ledger dApp supply chain attack steals $600K from crypto wallets

(12/15) Supply chain attack targeting Ledger crypto wallet leaves users hacked | TechCrunch


攻撃、脅威

CISA などが共同で、ロシアの攻撃者グループによる JetBrains TeamCity の脆弱性を悪用する攻撃活動に関する注意喚起

(12/13) Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally | CISA


Microsoft が不正に Microsoft アカウントの販売などを行っていた犯罪者グループ Storm-1152 のドメインを差し押さえ

(12/13) Disrupting the gateway services to cybercrime - Microsoft On the Issues

(12/13) CaaS Alert: Disrupting Storm-1152 | Arkose Labs


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 1 個の脆弱性を追加

(12/11) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2023-6448 Unitronics Vision PLC and HMI Insecure Default Password


ApplemacOS Monterey 12.7.2, macOS Ventura 13.6.3, macOS Sonoma 14.2, iOS 16.7.3 / iPadOS 16.7.3, iOS 17.2 / iPadOS 17.2, tvOS 17.2, watchOS 10.2, Safari 17.2 をリリース。すでに悪用が確認されている脆弱性の修正を含む。

(12/11) Apple security releases - Apple Support


Microsoft が 2023年 12月の月例パッチを公開

(12/12) 2023 年 12 月のセキュリティ更新プログラム (月例) | MSRC Blog | Microsoft Security Response Center

今月のセキュリティ更新プログラムで修正した脆弱性のうち、以下の脆弱性は更新プログラムが公開されるよりも前に悪用や脆弱性の詳細が一般へ公開されていることを確認しています。お客様においては、更新プログラムの適用を早急に行ってください。脆弱性の詳細は、各 CVE のページを参照してください。

  • CVE-2023-20588 AMD: CVE-2023-20588 AMD Speculative Leaks Security Notice

(12/12) Zero Day Initiative — The December 2023 Security Update Review


その他

「国立研究開発法人情報通信研究機構法の一部を改正する等の法律案」が国会で可決、成立

(12/11) 閣法 第212回国会 6 国立研究開発法人情報通信研究機構法の一部を改正する等の法律案

(コメント) 5年間の時限立法により実施されていた NOTICE の取組は来年度以降も継続することに

今週の気になるセキュリティニュース - Issue #148

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

アルプスアルパインの元従業員が営業秘密情報を不正に持ち出したとして、不正競争防止法違反の容疑で逮捕

(12/5) 退職した元従業員の逮捕について

(参考) 私物HDDを使用して営業秘密を不正に持ち出ししていた事案についてまとめてみた - piyolog


ドコモショップ店員が電子計算機使用詐欺などの疑いで逮捕

(12/5) 「dポイント」40万円分を不正取得か、元ドコモショップ店員の女を逮捕…客のスマホ預かり操作 : 読売新聞

 NTTドコモの「dポイント」を不正に取得したとして、元ドコモショップ店員の女が11月、北海道警に逮捕された。機種変更のために来店した客からスマートフォンを預かり、聞き出したパスワードを入力して操作。7月以降、40回にわたって計40万円分のポイントを自分のアカウントに送信していたとみられる。


攻撃、脅威

CISAAdobe ColdFusion の脆弱性 CVE-2023-26360 を悪用する攻撃活動に関する注意喚起

(12/5) CISA Releases Advisory on Threat Actors Exploiting CVE-2023-26360 Vulnerability in Adobe ColdFusion | CISA

(12/5) Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers | CISA

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing a Cybersecurity Advisory (CSA) in response to confirmed exploitation of CVE-2023-26360 by unidentified threat actors at a Federal Civilian Executive Branch (FCEB) agency. This vulnerability presents as an improper access control issue impacting Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier). CVE-2023-26360 also affects ColdFusion 2016 and ColdFusion 11 installations; however, they are no longer supported since they reached end of life. Exploitation of this CVE can result in arbitrary code execution. Following the FCEB agency’s investigation, analysis of network logs confirmed the compromise of at least two public-facing servers within the environment between June and July 2023.


CISA などが共同で、ロシアの攻撃者グループによる攻撃活動に関する注意喚起。また米英政府は攻撃者グループの 2人のロシア人を制裁対象に追加し、米司法省は 2人を起訴

(12/7) CISA and International Partners Release Advisory on Russia-based Threat Actor Group, Star Blizzard | CISA

(12/7) Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns | CISA

The Russia-based actor Star Blizzard (formerly known as SEABORGIUM, also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to successfully use spear-phishing attacks against targeted organizations and individuals in the UK, and other geographical areas of interest, for information-gathering activity.

(12/7) Office of Public Affairs | Two Russian Nationals Working with Russia’s Federal Security Service Charged with Global Computer Intrusion Campaign | United States Department of Justice

Indictment Alleges the So-Called “Callisto Group” Hacked Computers in the United States and Allied Countries, and Stole Information Used in Foreign Malign Influence Operations Designed to Influence the U.K.’s 2019 Elections

(12/7) United States and the United Kingdom Sanction Members of Russian State Intelligence-Sponsored Advanced Persistent Threat Group | U.S. Department of the Treasury

Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC), in coordination with the United Kingdom, designated two individuals associated with an advanced persistent threat (APT) group that is sponsored by the Russian Federal Security Service (FSB) and has targeted individuals and entities in the United States, United Kingdom, and other allied and partner countries.

(12/7) UK exposes attempted Russian cyber interference in politics and democratic processes - GOV.UK

(12/7) Russian FSB cyber actor Star Blizzard continues worldwide... - NCSC.GOV.UK

(12/7) Star Blizzard increases sophistication and evasion in ongoing attacks | Microsoft Security Blog


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 2+4+2 個の脆弱性を追加

(12/4) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

(12/5) CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA

(12/7) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA


FXC製無線LANルータ「AE1021PE」および「AE1021」に脆弱性。すでに悪用が確認されている

(12/6) JVNVU#92152057: FXC製無線LANルータ「AE1021PE」および「AE1021」におけるOSコマンドインジェクションの脆弱性

(12/6) AE1021/AE1021PEのファームウェア 2.0.10 公開のお知らせ

ファームウェアを2.0.10 にアップデート実施後、工場出荷リセット実施して、デフォルトパスワードを変更してください。

(12/6) Actively Exploited Vulnerability in FXC Routers: Fixed, Patches Available | Akamai

As part of the InfectedSlurs discovery, the SIRT uncovered a vulnerability in FXC AE1021 and AE1021PE outlet wall routers that are being actively exploited in the wild. This device is described as an outlet-based wireless LAN router for hotels and residential units. It is manufactured in Japan by FXC. This vulnerability has been assigned the CVE ID of CVE-2023-49897 with a CVSS v3 score of 8.0.


WordPressプラグインなど他の脆弱性と組み合わせることでリモートコード実行可能な脆弱性を修正

(12/6) WordPress 6.4.2 Maintenance & Security Release – WordPress News

A Remote Code Execution vulnerability that is not directly exploitable in core, however the security team feels that there is a potential for high severity when combined with some plugins, especially in multisite installs.

(12/6) PSA: Critical POP Chain Allowing Remote Code Execution Patched in WordPress 6.4.2

WordPress 6.4.2 was released today, on December 6, 2023. It includes a patch for a POP chain introduced in version 6.4 that, combined with a separate Object Injection vulnerability, could result in a Critical-Severity vulnerability allowing attackers to execute arbitrary PHP code on the site.

We urge all WordPress users to update to 6.4.2 immediately, as this issue could allow full site takeover if another vulnerability is present.


その他

Microsoft が2025年10月14日にサポートを終了する Windows 10 に関して、最長 3年間の延長サポート (Extended Security Updates) を有償で提供する計画を発表

(12/5) Plan for Windows 10 EOS with Windows 11, Windows 365, and ESU | Windows IT Pro Blog

While we strongly recommend moving to Windows 11, we understand there are circumstances that could prevent you from replacing Windows 10 devices before the EOS date. Therefore, Microsoft will offer Extended Security Updates.

Like the Windows 7 ESU program, your organization will be able to purchase a yearly subscription to security updates. The yearly commitment is renewable for three years. Devices enrolled in ESUs will receive monthly security updates to keep these Windows 10 PCs secure.


Meta が Messenger における E2EE のデフォルト有効化を開始すると発表

(12/6) Launching Default End-to-End Encryption on Messenger | Meta

We want to be open about the security technology we use and welcome the chance to engage with external cryptographers and security experts. That’s why we are also publishing two papers which outline our approach to cryptography, as well as how we encrypt your message history with Secure Storage. Because there are over a billion Messenger users, not everyone will get default end-to-end encryption right away. It will take a number of months to complete the global roll-out. When your chats are upgraded, you will be prompted to set up a recovery method, such as a PIN, so you can restore your messages if you lose, change or add a device.

(12/6) Building end-to-end security for Messenger - Engineering at Meta

Today, we’re announcing that we’ve begun to upgrade people’s personal conversations on Messenger to use E2EE by default. Our aim is to ensure that everyone’s personal messages on Messenger can only be accessed by the sender and the intended recipients, and that everyone can be sure the messages they receive are from an authentic sender.

(12/7) NCA response to Meta's rollout of end-to-end-encryption - National Crime Agency

(12/8) As Meta rolls out end-to-end encryption, police warn keeping children safe ‘no longer possible’

今週の気になるセキュリティニュース - Issue #147

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

欧米の複数の法執行機関の国際協力により、ウクライナランサムウェアグループを摘発

(11/28) International collaboration leads to dismantlement of ransomware group in Ukraine amidst ongoing war | Europol

In an unprecedented effort, law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations wreaking havoc across the world. The operation comes at a critical time, as the country grapples with the challenges of Russia’s military aggression against its territory.


財務省が、北朝鮮の Lazarus Group による資金洗浄に利用されているとして、暗号資産ミキシングサービス Sinbad への制裁を実施

(11/29) Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency | U.S. Department of the Treasury

oday, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Sinbad.io (Sinbad), a virtual currency mixer that serves as a key money-laundering tool of the OFAC-designated Lazarus Group, a state-sponsored cyber hacking group of the Democratic People’s Republic of Korea (DPRK). Sinbad has processed millions of dollars’ worth of virtual currency from Lazarus Group heists, including the Horizon Bridge and Axie Infinity heists. Sinbad is also used by cybercriminals to obfuscate transactions linked to malign activities such as sanctions evasion, drug trafficking, the purchase of child sexual abuse materials, and additional illicit sales on darknet marketplaces.

(11/29) Sinbad crypto mixer flagged by Elliptic sanctioned and seized


Okta のサポートシステムへの不正アクセスに関する続報

(11/29) October Customer Support Security Incident - Update and Recommended Actions | Okta Security

We have determined that the threat actor ran and downloaded a report that contained the names and email addresses of all Okta customer support system users. All Okta Workforce Identity Cloud (WIC) and Customer Identity Solution (CIS) customers are impacted except customers in our FedRamp High and DoD IL4 environments (these environments use a separate support system NOT accessed by the threat actor). The Auth0/CIC support case management system was also not impacted by this incident.


日米などが共同で、北朝鮮の団体・個人に対する制裁措置を実施

(11/30) Treasury Targets DPRK’s International Agents and Illicit Cyber Intrusion Group | U.S. Department of the Treasury

Today, in coordination with foreign partners, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned eight foreign-based Democratic People’s Republic of Korea’s (DPRK) agents that facilitate sanctions evasion, including revenue generation and missile-related technology procurement that support the DPRK’s weapons of mass destruction (WMD) programs. Additionally, OFAC sanctioned cyber espionage group Kimsuky for gathering intelligence to support the DPRK’s strategic objectives.

(12/1) 北朝鮮の核その他の大量破壊兵器及び弾道ミサイル関連計画その他の北朝鮮に関連する国際連合安全保障理事会決議により禁止された活動等に関与する者に対する資産凍結等の措置の対象者の追加について|外務省

 我が国は、令和5年11月21日に北朝鮮が我が国の上空を通過する形で、「衛星」打ち上げのために、弾道ミサイル技術を使用した発射を行ったこと等を踏まえ、北朝鮮をめぐる問題の解決を目指す国際平和のための国際的な努力に我が国として寄与するため、主要国が講じた措置の内容に沿い、閣議了解外国為替及び外国貿易法に基づく北朝鮮の核その他の大量破壊兵器及び弾道ミサイル関連計画その他の北朝鮮に関連する国際連合安全保障理事会決議により禁止された活動等に関与する者に対する資産凍結等の措置について」(令和5年12月1日付)を行い、これに基づき、外国為替及び外国貿易法による次の措置を実施することとした。


仙台市の職員が住民情報システムを不正に利用したとして懲戒処分

(12/1) 懲戒処分の公表について|仙台市

 市民局区政部において住民基本台帳事務を担当していた令和4年8月6日、業務とは関係ない私的な理由から、住民情報システムを用いて、知人女性の住所情報を不正に収集したもの。

 また、令和3年6月30日に、総務局人事課から、当該女性に対するつきまとい行為等に係る指導を受けていたにもかかわらず、不正に収集した住所情報を用いて、複数回にわたり当該女性宅付近を訪れたほか、令和5年3月12日に当該女性宅前で待ち伏せ行為を行ったもの。


攻撃、脅威

Elliptic と Corvus Insurance が共同で、Black Basta ランサムウェアに対する身代金の支払い状況を分析。2022年以降これまでに、少くとも $107M に相当する Bitcoin が支払われている。

(11/29) Black Basta ransomware victims have paid over $100 million

  • Joint research by Elliptic and Corvus Insurance has identified at least $107 million in Bitcoin ransom payments to the Black Basta ransomware group since early 2022.
  • Black Basta has infected over 329 victims, including Capita, ABB and Dish Network.
  • Analysis of blockchain transactions shows a clear link between Black Basta and the Conti Group - a Russian ransomware gang that ceased operations in 2022, around the time that Black Basta emerged.
  • Much of the laundered ransom payments can be traced onwards to Garantex, the sanctioned Russian crypto exchange.


CISA などが共同で、イランの攻撃者グループによる攻撃活動に関する注意喚起

(12/1) IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities | CISA

The IRGC is an Iranian military organization that the United States designated as a foreign terrorist organization in 2019. IRGC-affiliated cyber actors using the persona “CyberAv3ngers” are actively targeting and compromising Israeli-made Unitronics Vision Series programmable logic controllers (PLCs). These PLCs are commonly used in the Water and Wastewater Systems (WWS) Sector and are additionally used in other industries including, but not limited to, energy, food and beverage manufacturing, and healthcare. The PLCs may be rebranded and appear as different manufacturers and companies. In addition to the recent CISA Alert, the authoring agencies are releasing this joint CSA to share indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with IRGC cyber operations.

(11/28) Exploitation of Unitronics PLCs used in Water and Wastewater Systems | CISA

CISA is responding to active exploitation of Unitronics programmable logic controllers (PLCs) used in the Water and Wastewater Systems (WWS) Sector. Cyber threat actors are targeting PLCs associated with WWS facilities, including an identified Unitronics PLC, at a U.S. water facility. In response, the affected municipality’s water authority immediately took the system offline and switched to manual operations—there is no known risk to the municipality’s drinking water or water supply.


脆弱性

Arcserve UDP にリモートコード実行可能な脆弱性 CVE-2023-41998

(11/27) Arcserve Unified Data Protection Multiple Vulnerabilities - Research Advisory | Tenable®

An unauthenticated, remote attacker can execute code remotely via the downloadAndInstallPatch() routine within “com.ca.arcflash.rps.webservice.RPSService4CPMImpl.” This routine allows users to upload and execute arbitrary files.


GoogleChrome のゼロデイ脆弱性を修正

(11/28) Chrome Releases: Stable Channel Update for Desktop

Google is aware that an exploit for CVE-2023-6345 exists in the wild.


ownCloud の脆弱性 CVE-2023-49103 で悪用が確認される

(11/28) Hackers start exploiting critical ownCloud flaw, patch now

(11/29) CVE-2023-49103: ownCloud Critical Vulnerability Quickly Exploited in the Wild | GreyNoise Blog

(11/29) ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation | Ars Technica

(12/1) CVE-2023-49103: Critical Information Disclosure in ownCloud Graph API | Rapid7 Blog


ApplemacOS Sonoma 14.1.2, iOS 17.1.2 / iPadOS 17.1.2, Safari 17.1.2 をリリース。すでに悪用が確認されている脆弱性の修正を含む。

(11/30) Apple security releases - Apple Support


Zyxel の NAS 製品に複数の脆弱性

(11/30) Zyxel security advisory for authentication bypass and command injection vulnerabilities in NAS products | Zyxel Networks

Zyxel has released patches addressing an authentication bypass vulnerability and command injection vulnerabilities in NAS products. Users are advised to install them for optimal protection.


CISA が Known Exploited Vulnerabilities (KEV) カタログに 2 個の脆弱性を追加

(11/30) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA


その他

11/27 に B-Root の IP アドレスが変更

(11/28) b.root-servers.net(B-Root)のIPアドレス変更に伴う設定変更について

今週の気になるセキュリティニュース - Issue #146

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

ソフトバンクの固定電話サービスにおいて、11/18〜11/19 と 11/20 に通信設備の故障による障害

(11/20) 障害・メンテナンス情報 | インターネット・固定電話 | ソフトバンク


暗号資産取引所のバイナンスが、米政府当局と巨額の制裁金支払いで和解。CZ は有罪を認めて辞任。

(11/21) Binance Announcement: Reaching Resolution With U.S. Regulators | Binance Blog

(11/21) Office of Public Affairs | Binance and CEO Plead Guilty to Federal Charges in $4B Resolution | United States Department of Justice

(11/21) U.S. Treasury Announces Largest Settlements in History with World’s Largest Virtual Currency Exchange Binance for Violations of U.S. Anti-Money Laundering and Sanctions Laws | U.S. Department of the Treasury


JCOM のメッシュWi-Fi サービス利用者の情報が漏洩

(11/22) お客さまの個人情報漏えいに関するお知らせとお詫び|ニュースリリース | JCOM株式会社 | J:COM

メッシュWi-Fiの提供元である、米国Plume Design社の提携先のモバイルアプリのアクセスログサーバに対して、外部からの不正アクセスがあり、当社ならびにケーブルテレビ事業者様の一部のお客さまの個人情報が漏洩したもの。


東京都のパスポートセンターで、旅券発給の窓口業務に従事していた従業員が不正に情報を持ち出していた

(11/24) 旅券発給窓口における個人情報の不正持出し|東京都

警視庁の公表によると、本件は、株式会社エースシステム(令和2年度から4年度までの間、旅券課池袋分室の窓口業務を受託)が雇用し令和2年5月から令和5年3月にかけ業務に従事させていた容疑者(令和5年3月末で退職済み)が、業務中に知りえた個人情報を付せん紙に書き写す等して不正に持ち出したとのことです。

なお、今回持ち出された個人情報の更なる第三者への漏えいは確認されていません。


攻撃、脅威

CISA などが共同で、LockBit 3.0 の攻撃者による Citrix Bleed 脆弱性を悪用する攻撃活動に関する注意喚起

(11/21) #StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability | CISA


Akamai が 2つのゼロデイ脆弱性を悪用する Mirai 亜種の攻撃活動について報告

(11/21) InfectedSlurs Botnet Spreads Mirai via Zero-Days | Akamai


Palo Alto Networks が北朝鮮による攻撃キャンペーンについて報告

(11/21) Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors


Microsoft北朝鮮の攻撃者グループによるサプライチェーン攻撃について報告

(11/22) Diamond Sleet supply chain compromise distributes a modified CyberLink installer | Microsoft Security Blog

Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea-based threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink Corp., a software company that develops multimedia software products. This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads, decrypts, and loads a second-stage payload. The file, which was signed using a valid certificate issued to CyberLink Corp., is hosted on legitimate update infrastructure owned by CyberLink and includes checks to limit the time window for execution and evade detection by security products. Thus far, the malicious activity has impacted over 100 devices in multiple countries, including Japan, Taiwan, Canada, and the United States.


英NCSC と韓国 NIS が共同で、北朝鮮の攻撃者グループによるサプライチェーン攻撃に関する注意喚起

(11/23) ROK-UK Joint Cyber Security Advisory(DPRK actors conduct S/W supply chain attacks)

The National Intelligence Service (NIS) of the Republic of Korea (ROK) and the National Cyber Security Centre (NCSC) of the United Kingdom (UK) have identified Democratic People’s Republic of Korea (DPRK) state-linked cyber actors targeting software supply chain products, widely used by government organisations, financial institutions and defence industry companies globally.


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 1 個の脆弱性を追加

(11/21) CISA Adds One Known Exploited Vulnerability to Catalog | CISA


ownCloud に複数の脆弱性

(11/21) Disclosure of sensitive credentials and configuration in containerized deployments - ownCloud

(11/21) WebDAV Api Authentication Bypass using Pre-Signed URLs - ownCloud

(11/21) Subdomain Validation Bypass - ownCloud


その他

今週の気になるセキュリティニュース - Issue #145

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

暗号資産取引所 Poloniex から、不正アクセスにより 1億2,500万ドル相当の暗号資産が盗難

(11/10) Justin Sun offers 5% deal to $120M Poloniex crypto-robbers • The Register

(11/12) More than $100 million stolen from Poloniex crypto platform


JIPDEC からプライバシーマーク審査関連資料の漏えいについての続報

(11/13) 【お詫び】プライバシーマーク審査関連資料の漏えいについて(第2報)|一般財団法人 日本情報経済社会推進協会

当協会と審査業務に関する契約を締結していたプライバシーマーク審査員1名(以下、当該審査員)が、個人所有のパソコンにより審査業務を行った後、本来廃棄すべき審査関連資料を、審査業務委託契約及び当協会の規程に違反して外部記憶媒体等に保管していたところ、当該情報が外部に漏えいしたことが判明いたしました。本件についてデジタルフォレンジック※2調査等を行った結果、これまでにプライバシーマークを取得した事業者様のうち最大888社の審査関連資料と、審査員名簿(過去のものを含む)が漏えいしたおそれがあることを確認いたしました。なお、現時点において、審査関連資料及び審査員名簿の不正利用等は報告されておりません。


ドメインの失効により大学生協のシステムに障害

(11/14) [ニュース]【お詫び】本HPへのアクセス障害につきまして|大学生協事業連合

(11/14) [ニュース]【お詫び】メールの受信エラーにつきまして|大学生協事業連合

(参考) ドメイン名失効による大学生協のシステム障害についてまとめてみた - piyolog


CARDNET センターの障害により、約80万件のクレジットカード取引に影響

(11/15 更新) 11月11日 CARDNETセンターの障害について(11/15更新)


攻撃、脅威

フィッシング対策協議会が URL に特殊な IP アドレス表記を用いたフィッシングに関する注意喚起

(11/14) フィッシング対策協議会 Council of Anti-Phishing Japan | ニュース | 緊急情報 | URL に特殊な IP アドレス表記を用いたフィッシング (2023/11/14)


CISA などが共同で、Rhysida ランサムウェアに関する注意喚起

(11/15) CISA, FBI, and MS-ISAC Release Advisory on Rhysida Ransomware | CISA


CISA などが共同で、Scattered Spider による攻撃活動に関する注意喚起

(11/16) Scattered Spider | CISA


JPCERT/CC が日本の組織を狙う複数の標的型サイバー攻撃活動に関する注意喚起

(11/16) 日本の組織を標的にした外部からアクセス可能なIT資産を狙う複数の標的型サイバー攻撃活動に関する注意喚起


Google が Zimbra の脆弱性 CVE-2023-37580 を悪用する攻撃活動について報告

(11/16) Zimbra 0-day used to target international government organizations

In June 2023, Google’s Threat Analysis Group (TAG) discovered an in-the-wild 0-day exploit targeting Zimbra Collaboration, an email server many organizations use to host their email. Since discovering the 0-day, now patched as CVE-2023-37580, TAG has observed four different groups exploiting the same bug to steal email data, user credentials, and authentication tokens. Most of this activity occurred after the initial fix became public on Github. To ensure protection against these types of exploits, TAG urges users and organizations to keep software fully up-to-date and apply security updates as soon as they become available.


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 6+3+3 個の脆弱性を追加

(11/13) CISA Adds Six Known Exploited Vulnerabilities to Catalog | CISA

  • CVE-2023-47246 SysAid Server Path Traversal Vulnerability
  • CVE-2023-36844 Juniper Junos OS EX Series PHP External Variable Modification Vulnerability
  • CVE-2023-36845 Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability
  • CVE-2023-36846 Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
  • CVE-2023-36847 Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability
  • CVE-2023-36851 Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability

(11/14) CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA

(11/16) CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA


Microsoft が 2023年 11月の月例パッチを公開。すでに悪用が確認されている複数の脆弱性を含む。

(11/14) 2023 年 11 月のセキュリティ更新プログラム (月例) | MSRC Blog | Microsoft Security Response Center

今月のセキュリティ更新プログラムで修正した脆弱性のうち、以下の脆弱性は更新プログラムが公開されるよりも前に悪用や脆弱性の詳細が一般へ公開されていることを確認しています。お客様においては、更新プログラムの適用を早急に行ってください。脆弱性の詳細は、各 CVE のページを参照してください。

(11/14) Zero Day Initiative — The November 2023 Security Update Review


Google の研究者が Intel 製 CPU の新たな脆弱性 Reptar を発見 (CVE-2023-23583)

(11/15) Google researchers discover 'Reptar,’ a new CPU vulnerability | Google Cloud Blog

Today, we’re detailing the findings of Reptar (CVE-2023-23583), a new CPU vulnerability that impacts several Intel desktop, mobile, and server CPUs. Google’s Information Security Engineering team reported the vulnerability to Intel, who disclosed the vulnerability today. Thanks to the thoughtful collaboration between Google, Intel, and industry partners, mitigations have been rolled out, and Googlers and our customers are protected.

(11/15) Reptar

(11/14) INTEL-SA-00950

A potential security vulnerability in some Intel® Processors may allow escalation of privilege and/or information disclosure and/or denial of service via local access. Intel is releasing firmware updates to mitigate this potential vulnerability.


ファースト製 DVR 機器に複数の脆弱性

(11/16) JVNVU#99077347: ファースト製DVRにおける複数の脆弱性

(11/14 更新) 弊社DVRがサイバー攻撃の踏み台となる事案につきまして | 防犯カメラと福岡県の警備なら株式会社ファースト


その他

Google が新しい Titan Security Key を発売

(11/15) A new Titan Security Key is available in the Google Store

The two newly introduced models will replace our current USB-A and USB-C devices — and both will provide NFC capabilities for easy and fast connections with mobile devices. The new keys are also able to store more than 250 unique passkeys — enough storage for users to register them with all their favorite services supporting passkeys — which makes them best-in-class among FIDO2 security keys.


NTT セキュリティが「サイバーセキュリティレポート 2023.10」を公開

(11/15) サイバーセキュリティレポート 2023.10

今週の気になるセキュリティニュース - Issue #144

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

NTTネクシアの元社員が「nanacoお問合せセンター」の業務において、顧客の残高を私的に詐取していた

(11/2) 弊社元社員による不正行為の発生について|お知らせ|NTTネクシア


NTTデータ全国銀行データ通信システムの障害に関する報告

(11/6) 全国銀行データ通信システムの障害に関する取り組みについて | NTTデータ - NTT DATA


中国工商銀行 (ICBC) でランサムウェア感染被害

(11/10) ICBCFS | INDUSTRIAL & COMMERCIAL BANK OF CHINA FINANCIAL SERVICES

On November 8, 2023, U.S. Eastern Time (November 9, 2023, Beijing Time), ICBC Financial Services (FS) experienced a ransomware attack that resulted in disruption to certain FS systems. Immediately upon discovering the incident, ICBC FS disconnected and isolated impacted systems to contain the incident. ICBC FS has been conducting a thorough investigation and is progressing its recovery efforts with the support of its professional team of information security experts. ICBC FS has also reported this incident to law enforcement. We successfully cleared US Treasury trades executed Wednesday (11/08) and Repo financing trades done on Thursday (11/09).

ICBC FS's business and email systems operate independently of the Industrial and Commercial Bank of China Group. The systems of the ICBC Head Office and other domestic and overseas affiliated institutions were not affected by this incident, nor was the ICBC New York Branch.

(11/9) World’s largest commercial bank ICBC confirms ransomware attack

(11/9) Industrial and Commercial Bank of China dealing with LockBit ransomware attack

(11/10) 中国国営の中国工商銀行でサイバー被害 米国債取引に影響、金利上昇 - 日本経済新聞


攻撃、脅威

Google Cloud が 2023年第 3四半期の Threat Horizons Report を公開

(11/6) Q3 2023 Threat Horizons Report


脆弱性

CISA が Citrix Netscaler の脆弱性 (CVE-2023-6966, Citrix Bleed) に関するガイダンスを公開

(11/7) CISA Releases Guidance for Addressing Citrix NetScaler ADC and Gateway Vulnerability CVE-2023-4966, Citrix Bleed | CISA

(11/7) Guidance for Addressing Citrix NetScaler ADC and Gateway Vulnerability CVE-2023-4966, Citrix Bleed | CISA


CISA が Known Exploited Vulnerabilities (KEV) カタログに 1+1 個の脆弱性を追加

(11/7) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2023-22518 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability

(11/8) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2023-29552 Service Location Protocol (SLP) Denial-of-Service Vulnerability

(11/9) SLP Sliding Away With Reflection Amplification Thanks To CVE-2023-29552


SysAid にパストラバーサル脆弱性。すでに悪用を確認

(11/8) SysAid On-Prem Software CVE-2023-47246 Vulnerability - SysAid

(11/8) SysAid On-Prem Vulnerability Disclosure · Profero

(11/9) Microsoft: SysAid zero-day flaw exploited in Clop ransomware attacks

(11/9) SysAid Zero-Day Vulnerability Exploited By Lace Tempest | Rapid7 Blog

(11/10) Critical Vulnerability: SysAid CVE-2023-47246


その他

日米韓の 3ヶ国が「サイバー協議体」を新たに設置

(11/6) 한미일 3국 고위급 사이버 협의체 신설 합의

(11/6) US, South Korea, Japan to launch consultative group on North's cyber threats | Reuters

(11/6) 日米韓「サイバー協議体」新たに設置へ 北朝鮮の脅威に対抗 | NHK | サイバー攻撃


IPA が「サイバー情報共有イニシアティブ(J-CSIP) 運用状況 [2023年7月~9月]」を公開

(11/9) サイバー情報共有イニシアティブ(J-CSIP) 運用状況 [2023 年 7 月~9 月]


CISA などが共同で、ソフトウェアサプライチェーンのセキュリティに関するガイダンスを公開

(11/9) CISA, NSA, and Partners Release New Guidance on Securing the Software Supply Chain | CISA

Today, CISA, the National Security Agency (NSA), and partners released Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption. Developed through the Enduring Security Framework (ESF), this guidance provides software developers and suppliers with industry best practices and principles, including managing open source software and software bills of materials (SBOM), to maintain and provide awareness about the security of software.

今週の気になるセキュリティニュース - Issue #143

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

国立環境研究所でオンラインストレージサービス (Proself) への不正アクセスによる情報漏洩

(10/30) オンラインストレージサービスへの不正アクセス|2023年度|国立環境研究所

 国立環境研究所における本事案の経緯及び講じた措置は以下のとおりです。

  • 10月5日 Proselfへの不正アクセスの痕跡を発見。同日に対象サーバを運用停止。
  • 10月10日 調査により、脆弱性を悪用してアカウントの一覧やパスワードハッシュを窃取し、その情報をもとに不正ログインが行われ、一部のファイルへアクセスが行われたことが確認された。(同日、個人情報保護委員会に報告)。


カナダ政府が政府支給のモバイル端末における WeChat と Kaspersky 製品の利用を禁止

(10/30) Minister Anand announces a ban on the use of WeChat and Kaspersky suite of applications on government mobile devices - Canada.ca

(11/2) カナダ政府、公用端末での「WeChat」と「カスペルスキー」を使用禁止(中国、カナダ、ロシア) | ビジネス短信 ―ジェトロの海外ニュース - ジェトロ

(11/2) 中国、カナダによるWeChat禁止に反対、公平・公正・無差別のビジネス環境を要望(中国、カナダ) | ビジネス短信 ―ジェトロの海外ニュース - ジェトロ


Okta がサポートシステムへの不正アクセスに関する調査結果を報告

(11/3) Unauthorized Access to Okta's Support Case Management System: Root Cause and Remediation | Okta Security

On Thursday, October 19, Okta advised customers of a security incident. Having finalized our investigation, we can confirm that from September 28, 2023 to October 17, 2023, a threat actor gained unauthorized access to files inside Okta’s customer support system associated with 134 Okta customers, or less than 1% of Okta customers. Some of these files were HAR files that contained session tokens which could in turn be used for session hijacking attacks. The threat actor was able to use these session tokens to hijack the legitimate Okta sessions of 5 customers, 3 of whom have shared their own response to this event.

The unauthorized access to Okta’s customer support system leveraged a service account stored in the system itself. This service account was granted permissions to view and update customer support cases. During our investigation into suspicious use of this account, Okta Security identified that an employee had signed-in to their personal Google profile on the Chrome browser of their Okta-managed laptop. The username and password of the service account had been saved into the employee’s personal Google account. The most likely avenue for exposure of this credential is the compromise of the employee’s personal Google account or personal device.


攻撃、脅威

Coveware が 2023年第 3四半期のランサムウェアレポートを公開

(10/30) Scattered Ransomware Attribution Blurs Focus on IR Fundamentals

The proportion of ransomware victims that opted to pay in Q3 2023 jumped up slightly, from 34% in Q2 to 41% in Q3. We do not believe this is the start of a new upward trend, rather normal swings that will occur in the current range of outcomes we observe.


Mandiant が Citrix NetScaler の脆弱性 (CVE-2023-4966) を悪用する攻撃活動について報告

(10/31) Investigation of Session Hijacking via Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966) | Mandiant

On Oct. 10, 2023, Citrix released a security bulletin for a sensitive information disclosure vulnerability (CVE-2023-4966) impacting NetScaler ADC and NetScaler Gateway appliances.

Mandiant has identified zero-day exploitation of this vulnerability in the wild beginning in late August 2023 as well as n-day exploitation after Citrix’s publication. Mandiant is investigating multiple instances of successful exploitation of CVE-2023-4966 that resulted in the takeover of legitimate user sessions on NetScaler ADC and Gateway appliances. The session takeovers bypassed password and multi-factor authentication.

In this blog post, we will discuss artifacts that can be used to identify exploitation activity and highlight some of the post exploitation techniques we observed during the incident response investigations.


ESET が Mozi ボットネットの活動状況について報告

(11/1) Who killed Mozi? Finally putting the IoT zombie botnet in its grave

In August 2023, the notorious Mozi botnet, infamous for exploiting vulnerabilities in hundreds of thousands of IoT devices each year, experienced a sudden and unanticipated nosedive in activity. First observed in India on August 8th, 2023 and a week later in China on August 16th, this mysterious disappearance stripped Mozi bots of most of their functionality.


「カウンターランサムウェア・イニシアティブ会合」に日本を含む 50ヶ国・機関が参加し、共同声明を発表

(11/1) International Counter Ransomware Initiative 2023 Joint Statement | The White House

(11/2) 「カウンターランサムウェア・イニシアティブ会合」への参加


脆弱性

Apache ActiveMQ にリモートコード実行可能な脆弱性 (CVE-2023-46604)。悪用も確認される。

(10/25) activemq.apache.org/security-advisories.data/CVE-2023-46604

(11/1) Suspected Exploitation of Apache ActiveMQ CVE-2023-46604 | Rapid7 Blog

Beginning Friday, October 27, Rapid7 Managed Detection and Response (MDR) identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in two different customer environments. In both instances, the adversary attempted to deploy ransomware binaries on target systems in an effort to ransom the victim organizations. Based on the ransom note and available evidence, we attribute the activity to the HelloKitty ransomware family, whose source code was leaked on a forum in early October. Rapid7 observed similar indicators of compromise across the affected customer environments, both of which were running outdated versions of Apache ActiveMQ.

(11/2) Critical Vulnerability: Exploitation of Apache ActiveMQ CVE-2023-46604

A partner recently deployed Huntress agents on October 30, 2023, after experiencing a “HelloKitty” ransomware attack on October 27. This ransomware attack followed closely with what was described by Rapid7 in their blog post on November 1, titled Suspected Exploitation of Apache ActiveMQ CVE-2023-46604.


Cisco IOS XE の脆弱性 (CVE-2023-20198) の POC が公開

(10/30) Cisco IOS XE CVE-2023-20198: Deep Dive and POC – Horizon3.ai


Atlassian Confluence に脆弱性 (CVE-2023-22518)

(10/31) CVE-2023-22518 - Improper Authorization Vulnerability In Confluence Data Center and Server | Atlassian Support | Atlassian Documentation

As part of Atlassian's ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation. There are still no reports of an active exploit, though customers must take immediate action to protect their instances. If you already applied the patch, no further action is required.

(11/2) Atlassian Confluence Server (CVE-2023-22518) - Improper Authorization

(11/2) Atlassian warns of exploit for Confluence data wiping bug, get patching

(11/3) CVE-2023-22518: Critical Atlassian Confluence Data Center and Server Improper Authorization Vulnerability - Blog | Tenable®


CISA が Known Exploited Vulnerabilities (KEV) カタログに 2+1 個の脆弱性を追加

(10/31) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

(11/2) CISA Adds One Known Exploited Vulnerability to Catalog | CISA


CVSS v4.0 が正式にリリース

(11/1) FIRST has officially published the latest version of the Common Vulnerability Scoring System (CVSS v4.0)

(11/2) CVSS v4 Is Now Live and What You Need To Know About It | Qualys Security Blog


その他

10/16 リリースの Chrome 118 から HTTPS への自動アップグレード機能がデフォルトで有効になった

(10/30) Google Chrome now auto-upgrades to secure connections for all users

(11/1) ChromeがHTTPSに優先アクセスする307リダイレクトをHSTS関係なくやるようになった - Code Day's Night


MITRE ATT&CK v14 がリリース

(10/31) ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections | by Amy L. Robertson | MITRE ATT&CK® | Nov, 2023 | Medium


NICT が 2023年第 3 四半期の NICTER観測統計を公開

(10/31) NICTER観測統計 - 2023年7月~9月 - NICTER Blog