今週の気になるセキュリティニュース - Issue #153

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

米証券取引委員会 (SEC) の X アカウントが乗っ取り被害。「ビットコイン現物 ETF を SEC が承認した」との偽投稿により、市場が混乱。翌日に SEC は承認を正式に発表

(1/9) US SEC’s X account hacked to announce fake Bitcoin ETF approval

(1/10) ビットコイン相場乱高下 「SECがETF承認」偽情報で - 日本経済新聞

(1/10) 米証券取引委のXアカウント ハッキングされ偽投稿で市場混乱 | NHK | アメリカ

(1/10) SEC.gov | Statement on the Approval of Spot Bitcoin Exchange-Traded Products


ジェットスター・ジャパンでシステム障害により、複数の国内便が欠航

(1/12) 1月12日に発生したシステム障害による欠航便の影響について | 重要なお知らせ | ジェットスター

(1/12) ジェットスター 午後7時半すぎにシステム障害復旧 運航を再開 17便が欠航 | NHK | 航空

(1/12) ジェットスター・ジャパンで17便が欠航、原因はパイロット向けシステムの不具合 | 日経クロステック(xTECH)


攻撃、脅威

Cisco Talos が Avast と協力して、Babuk Tortilla ランサムウェアの復号ツールを公開

(1/9) New decryptor for Babuk Tortilla ransomware variant released

  • Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
  • Cisco Talos shared the key with our peers at Avast for inclusion in the Avast Babuk decryptor released in 2021. The decryptor includes all known private keys, allowing many users to recover their files once encrypted by different Babuk ransomware variants.
  • Dutch Police, acting on threat intelligence supplied by Talos, identified, apprehended and the Dutch Prosecution Office prosecuted the threat actor behind Babuk Tortilla operations, demonstrating the power of cooperation between law enforcement agencies and commercial security organizations such as Talos and Avast.

(1/9) Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police - Avast Threat Labs

Babuk, an advanced ransomware strain, was publicly discovered in 2021. Since then, Avast has blocked more than 5,600 targeted attacks, mostly in Brazil, Czech Republic, India, the United States, and Germany.

Today, in cooperation with Cisco Talos and Dutch Police, Avast is releasing an updated version of the Avast Babuk decryption tool, capable of restoring files encrypted by the Babuk variant called Tortilla. To download the tool, click here.


Akamai が 2023年の DDoS 攻撃の傾向について報告

(1/9) A Retrospective on DDoS Trends in 2023 and Actionable Strategies for 2024 | Akamai


Cloudflare が 2023年第 4四半期の DDoS 攻撃レポートを公開

(1/9) DDoS threat report for 2023 Q4


Mandiant が暗号資産の Solana を狙う攻撃キャンペーンについて報告。自身の X アカウント乗っ取り被害と関連。

(1/10) Hundreds of Thousands of Dollars Worth of Solana Cryptocurrency Assets Stolen in Recent CLINKSINK Drainer Campaigns | Mandiant


奇安信の Xlab が Mirai 亜種 Rimasuta の活動状況について報告

(1/10) Rimasuta New Variant Switches to ChaCha20 Encryption Algorithm


Akamai が Mirai 亜種 NoaBot の活動状況について報告

(1/10) You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance | Akamai


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 6+1+2 個の脆弱性を追加

(1/8) CISA Adds Six Known Exploited Vulnerabilities to Catalog | CISA

(1/10) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

(1/10) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

  • CVE-2024-21887 Ivanti Connect Secure and Policy Secure Command Injection Vulnerability
  • CVE-2023-46805 Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability


Microsoft が 2024年 1月の月例パッチを公開

(1/9) 2024 年 1 月のセキュリティ更新プログラム (月例) | MSRC Blog | Microsoft Security Response Center

(1/9) Zero Day Initiative — The January 2024 Security Update Review


Ivanti Connect Secure と Ivanti Policy Secure にゼロデイ脆弱性。すでに悪用が確認されている。

(1/10) CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways

(1/10) KB CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways

(1/10) Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | Volexity

Volexity has uncovered active in-the-wild exploitation of two vulnerabilities allowing unauthenticated remote code execution in Ivanti Connect Secure VPN devices. An official security advisory and knowledge base article have been released by Ivanti that includes mitigation that should be applied immediately. However, a mitigation does not remedy a past or ongoing compromise. Systems should simultaneously be thoroughly analyzed per details in this post to look for signs of a breach.

(1/11) Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation | Mandiant

On January 10, 2024, Ivanti disclosed two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, impacting Ivanti Connect Secure VPN (“CS”, formerly Pulse Secure) and Ivanti Policy Secure (“PS”) appliances. Successful exploitation could result in authentication bypass and command injection, leading to further downstream compromise of a victim network. Mandiant has identified zero-day exploitation of these vulnerabilities in the wild beginning as early as December 2023 by a suspected espionage threat actor, currently being tracked as UNC5221.


GitLab が複数の脆弱性を修正

(1/11) GitLab Critical Security Release: 16.7.2, 16.6.4, 16.5.6 | GitLab

(1/12) GitLab warns of critical zero-click account hijacking vulnerability


その他

今週の気になるセキュリティニュース - Issue #152

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

1月1日に令和6年能登半島地震が発生

(参考) 令和6年能登半島地震の偽情報関連の報道についてまとめてみた - piyolog


スペインの通信会社 Orange España の RIPE NCC アカウントが不正アクセスされ、BGP の不正な設定により通信障害が発生

(1/3) Hacker hijacks Orange Spain RIPE account to cause BGP havoc

Orange Spain suffered an internet outage today after a hacker breached the company's RIPE account to misconfigure BGP routing and an RPKI configuration.

(1/3) Infostealer infection of an Orange employee results in BGP disruptions | InfoStealers

The Orange employee had their computer infected by a Raccoon type Infostealer on September 4th 2023, and among the corporate credentials identified on the machine, the employee had specific credentials to “https://access.ripe.net” using the email address which was revealed by the threat actor (adminripe-ipnt@orange.es).

It is also worth noting that the password that was used on Orange’s RIPE administrator account was “ripeadmin” which is ridiculously weak.

(1/3) RIPE NCC Access: Security Breach Investigation — RIPE Network Coordination Centre

We are currently investigating the compromise of a RIPE NCC Access account, which resulted in some services of the account holder being temporarily impacted.

(1/4) Digging into the Orange España Hack | Kentik Blog

Orange España, Spain’s second largest mobile operator, suffered a major outage on January 3, 2024. The outage was unprecedented due to the use of RPKI, a mechanism designed to protect internet routing security, as a tool for denial of service. In this post, we dig into the outage and the unique manipulation of RPKI.


Mandiant の X アカウントが乗っ取り被害

(1/3) Mandiant’s account on X hacked to push cryptocurrency scam

The Twitter account of American cybersecurity firm and Google subsidiary Mandiant was hijacked earlier today to impersonate the Phantom crypto wallet and share a cryptocurrency scam.

(1/4) Mandiant, the security firm Google bought for $5.4 billion, gets its X account hacked | Ars Technica

Google-owned security firm Mandiant spent several hours trying to regain control of its account on X (formerly known as Twitter) on Wednesday after an unknown scammer hijacked it and used it to spread a link that attempted to steal cryptocurrency from people who clicked on it.


全国の複数の自治体に爆破予告のファックスが届く

(1/4) <独自>「公共施設を爆破する」 全国の複数自治体に爆破予告 能登半島地震で震度5強の糸魚川市も - 産経ニュース


米司法省が 2019年に摘発した xDedic Marketplace に関与したとされる容疑者 19人を訴追

(1/4) Middle District of Florida | 19 Individuals Worldwide Charged In Transnational Cybercrime Investigation Of The xDedic Marketplace | United States Department of Justice


浜松市中央区役所でシステムのバッチ処理不具合により、証明書発行が一時停止

(1/4) 浜松市でシステムダウン、住民票など一時発行できず データベース検索で負荷か、現在は復旧|静岡新聞アットエス

(1/4) システム障害で一時証明書が発行できず ヒューマンエラーか…1日スタートの行政区再編とは無関係 浜松市中央区役所 - LOOK 静岡朝日テレビ

(1/5) 浜松市中央区役所で一時戸籍証明書など発行できず、原因はバッチ処理の不具合 | 日経クロステック(xTECH)


攻撃、脅威

奇安信の Xlab が Mirai 亜種 Mirai.TBOT の活動状況について報告

(1/3) Mirai.TBOT Uncovered: Over 100 Groups and 30,000+ Infected Hosts in a big IoT Botnet

(コメント) 2023年11月に Akamai が報告した InfectedSlurs と同じボットネット


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 2 個の脆弱性を追加

(1/2) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA


その他

今週の気になるセキュリティニュース - Issue #151

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

中小企業等事業再構築促進事業において事務局の元職員が不正に情報を持ち出し

(12/22) 「中小企業等事業再構築促進事業」における採択者情報の不正持出の疑いについて|中小機構

(12/22) 「中小企業等事業再構築促進事業」における採択者情報の不正持出の疑いについて


千葉県市原市の職員が行政総合情報システムを不正に閲覧し、知人女性の個人情報を収集

(12/25) 懲戒処分の公表について


攻撃、脅威

警察庁金融庁がインターネットバンキングの不正送金被害について注意喚起

(12/25) フィッシングによるものとみられるインターネットバンキングに係る不正送金被害の急増について(注意喚起)


Microsoft が App Installer を悪用する攻撃について報告

(12/28) Financially motivated threat actors misusing App Installer | Microsoft Security Blog


脆弱性

Barracuda ESG に新たな脆弱性

(12/24) Barracuda Email Security Gateway Appliance (ESG) Vulnerability

Barracuda has filed CVE-2023-7102 in relation to Barracuda’s use of Spreadsheet::ParseExcel which has been patched. In addition, in order to increase public awareness of the ACE vulnerability in Spreadsheet::ParseExcel, Barracuda has filed CVE-2023-7101. At the time of this update, there is no known patch or update available to remediate CVE-2023-7101 within the open source library. For organizations utilizing Spreadsheet::ParseExcel in their own products or services, we recommend reviewing CVE-2023-7101 and promptly taking necessary remediation measures.


NICTASUS ルータの認証情報が漏洩する問題について注意喚起

(12/27) ASUSルータにおける認証情報が漏洩する問題とその対策方法 - NICTER Blog


その他

米国で FISA の Section 702 が来年 4月19日まで暫定延長

(12/22) Biden signs short-term FISA extension before year-end deadline

(12/14) Debate over US surveillance powers pushed into 2024

(参考) Foreign Intelligence Surveillance Act (FISA) and Section 702 — FBI


Ghidra 11.0 がリリース

(12/23) Ghidra


JNSA が2023セキュリティ十大ニュースを発表

(12/26) JNSAセキュリティ十大ニュース

今週の気になるセキュリティニュース - Issue #150

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

イランでサイバー攻撃により多数のガソリンスタンドの販売システムに障害

(12/18) Hacktivists say they shut down Iran's gasoline pumps • The Register

Hacktivists reportedly disrupted services at about 70 percent of Iran's gas stations in a politically motivated cyberattack.

Iran's oil minister Javad Owji confirmed on Monday the IT systems of the nation's petrol stations had been attacked as Iranian media told of long queues at the pumps and traffic jams – particularly in Tehran - as folks tried and failed to fill up.

(12/18) Iran confirms nationwide cyberattack on gas stations

(12/19) イランでガソリンスタンドに大規模サイバー攻撃か | NHK | イラン


多数の法執行機関の協力による半年間に及ぶ作戦 Operation HAECHI IV の結果、34ヶ国で約 3,500人を逮捕し、$300Mの資産を差し押え

(12/19) USD 300 million seized and 3,500 suspects arrested in international financial crime operation

A transcontinental police operation against online financial crime has concluded with almost 3,500 arrests and seizures of USD 300 million (approx. EUR 273 million) worth of assets across 34 countries.

The six-month Operation HAECHI IV (July-December 2023) targeted seven types of cyber-enabled scams: voice phishing, romance scams, online sextortion, investment fraud, money laundering associated with illegal online gambling, business email compromise fraud, and e-commerce fraud.


長野日報ランサムウェア感染被害により新聞製作・発行に影響

(12/22) おわび(サーバーウイルス感染のため特別紙面) – Nagano Nippo Web

12月19日深夜に弊社のサーバーが身代金要求型ウイルス(ランサムウエア)に感染した影響で、新聞製作に及ぼす影響が続いております。このため、22日付本紙も通常よりページ数を減らした特別紙面として発行します。

サーバーには、いずれも公開を前提として紙面に使用する記事と写真データが蓄積されていますが、個人情報の流出はありません。当社のホームページやメールシステムは通常通り稼働しています。


攻撃、脅威

CISA などが共同で、Play ランサムウェアに関する注意喚起

(12/18) #StopRansomware: Play Ransomware | CISA


CISA と FBI が共同で ALPHV Blackcat ランサムウェアに関する注意喚起。また米司法省は Blackcat ランサムウェアのリークサイトを差し押え、被害組織に対して復号ツールを提供

(12/19) #StopRansomware: ALPHV Blackcat | CISA

(12/19) Office of Public Affairs | Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant | United States Department of Justice

The Justice Department announced today a disruption campaign against the Blackcat ransomware group — also known as ALPHV or Noberus — that has targeted the computer networks of more than 1,000 victims and caused harm around the world since its inception, including networks that support U.S. critical infrastructure.

Over the past 18 months, ALPHV/Blackcat has emerged as the second most prolific ransomware-as-a-service variant in the world based on the hundreds of millions of dollars in ransoms paid by victims around the world. Due to the global scale of these crimes, multiple foreign law enforcement agencies are conducting parallel investigations.

The FBI developed a decryption tool that allowed FBI field offices across the country and law enforcement partners around the world to offer over 500 affected victims the capability to restore their systems. To date, the FBI has worked with dozens of victims in the United States and internationally to implement this solution, saving multiple victims from ransom demands totaling approximately $68 million. As detailed in a search warrant unsealed today in the Southern District of Florida, the FBI has also gained visibility into the Blackcat ransomware group’s computer network as part of the investigation and has seized several websites that the group operated.

(12/19) FBI disrupts Blackcat ransomware operation, creates decryption tool

(12/19) How the FBI seized BlackCat (ALPHV) ransomware’s servers


ESET が 2023年下半期の脅威レポート "ESET Threat Report H2 2023" を公開

(12/19) ESET Threat Report H2 2023


IIJ が Mirai 亜種 InfectedSlurs の活動状況について報告

(12/20) Mirai 亜種 InfectedSlurs の活動状況 – IIJ Security Diary

(コメント) 久しぶりに会社ブログの方に記事書きました


消費者庁がショッピングサイトの偽サイトに関する注意喚起

(12/21) 人気ブランドの女性用衣料品等を販売すると称する偽サイトに関する注意喚起 | 消費者庁

令和4年の夏以降、SNS等を見ていると、「ミズノ」又は「ワコール」の商品ブランドロゴを使用した女性用衣料品等に関する広告が表示され、当該広告のリンク先のウェブサイトで商品を注文したところ、これらのブランドの商品ではないものが届いたなどという相談が、各地の消費生活センター等に数多く寄せられています。

消費者庁が調査を行ったところ、上記行為を行う事業者が、消費者の利益を不当に害するおそれのある行為(消費者を欺く行為)を行っていたことを確認したため、消費者安全法(平成21年法律第50号)第38条第1項の規定に基づき、消費者被害の発生又は拡大の防止に資する情報を公表し、消費者の皆様に注意を呼びかけます。


脆弱性

QNAP VioStor NVR に脆弱性。すでに悪用が確認されている。

(12/9) Vulnerability Affecting Legacy VioStor NVR - Security Advisory | QNAP

(12/14) Actively Exploited Vulnerability in QNAP VioStor NVR: Fixed, Patches Available | Akamai

(12/22) JVNVU#96089700: QNAP製VioStor NVRにおけるOSコマンドインジェクションの脆弱性

なお、本件の報告者により本脆弱性を悪用した攻撃が確認されており、またJPCERT/CCにおいても同様の通信を確認しています。


メールの送信元詐称を可能にする SMTP Smuggling 脆弱性。複数の SMTP サーバ実装に影響

(12/18) SMTP Smuggling - Spoofing E-Mails Worldwide - SEC Consult

By exploiting interpretation differences of the SMTP protocol, it is possible to smuggle/send spoofed e-mails - hence SMTP smuggling - while still passing SPF alignment checks. During this research, two types of SMTP smuggling, outbound and inbound, were discovered. These allowed sending spoofed e-mails from millions of domains (e.g., admin@outlook.com) to millions of receiving SMTP servers (e.g., Amazon, PayPal, eBay). Identified vulnerabilities in Microsoft and GMX were quickly fixed, however, SEC Consult urges companies using the also affected Cisco Secure Email product to manually update their vulnerable default configuration (see Responsible Disclosure section below)!

(12/22) SMTP Smuggling

Days before a 10+ day holiday break and associated production change freeze, SEC Consult has published an email spoofing attack that involves a composition of email services with specific differences in the way they handle line endings other than .

Unfortunately, criticial information provided by the researcher was not passed on to Postfix maintainers before publication of the attack, otherwise we would certainly have convinced SEC Consult to change their time schedule until after people had a chance to update their Postfix systems.


SSHプロトコルに中間者攻撃が可能な脆弱性

(12/19) Terrapin Attack

Terrapin is a prefix truncation attack targeting the SSH protocol. More precisely, Terrapin breaks the integrity of SSH's secure channel. By carefully adjusting the sequence numbers during the handshake, an attacker can remove an arbitrary amount of messages sent by the client or server at the beginning of the secure channel without the client or server noticing it.

(12/19) SSH protects the world’s most sensitive networks. It just got a lot weaker | Ars Technica

(12/19) シーケンス番号操作によるSSH通信の完全性への攻撃


GoogleChrome のゼロデイ脆弱性を修正

(12/20) Chrome Releases: Stable Channel Update for Desktop

Google is aware that an exploit for CVE-2023-7024 exists in the wild.


CISA が Known Exploited Vulnerabilities (KEV) カタログに 2 個の脆弱性を追加

(12/21) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

  • CVE-2023-49897 FXC AE1021, AE1021PE OS Command Injection Vulnerability
  • CVE-2023-47565 QNAP VioStor NVR OS Command Injection Vulnerability


その他

IPA がサポート詐欺の「偽セキュリティ警告画面の閉じ方体験サイト」を公開

(12/19) サポート詐欺の「偽セキュリティ警告画面の閉じ方体験サイト」を公開 | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構

(12/19) 偽セキュリティ警告(サポート詐欺)対策特集ページ | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構


欧米の10ヶ国が、ウクライナの民間分野でのサイバー能力向上を支援する枠組み「タリン・メカニズム」を創設

(12/20) Tallinn Mechanism | Välisministeerium

Estonia and Canada, Denmark, France, Germany, Netherlands, Poland, Sweden, Ukraine, the United Kingdom and the United States have decided to set up a system aimed at amplifying the cyber support of donors to Ukraine in the civilian domain. The plan composed on 30 May in Tallinn by all participating states was launched on 20 December 2023 and the system was named the Tallinn Mechanism after the location of the initial meeting.

(12/20) Formalization of the Tallinn Mechanism to Coordinate Civilian Cyber Assistance to Ukraine - United States Department of State

(12/20) UK and partners form The Tallinn Mechanism for cyber security - GOV.UK

今週の気になるセキュリティニュース - Issue #149

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

KDDI の西日本エリアで、通信設備の故障により、音声・データ通信サービスに障害

(12/11) 【復旧】西日本エリアにて携帯電話サービスがご利用できない、またはご利用しづらい状況について(12月11日 午後12時45分時点)


ウクライナの大手通信事業者 Kyivstar でサイバー攻撃による通信障害

(12/13) CERT-UA experts are investigating a cyberattack against Kyivstar telecom operator’s network

(12/13) Hacker Group Linked to Russian Military Claims Credit for Cyberattack on Kyivstar | WIRED

(12/13) ウクライナの通信最大手に大規模サイバー攻撃 - CNN.co.jp

(12/14) Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica

(12/15) Kyivstar restores mobile internet across Ukraine, reactivates international roaming | VEON


Ledger Connect Kit が不正に置き換えられ、利用している複数の DApps に影響

(12/14) A letter from Ledger Chairman & CEO Pascal Gauthier Regarding Ledger Connect Kit Exploit | Ledger

(12/14) Ledger dApp supply chain attack steals $600K from crypto wallets

(12/15) Supply chain attack targeting Ledger crypto wallet leaves users hacked | TechCrunch


攻撃、脅威

CISA などが共同で、ロシアの攻撃者グループによる JetBrains TeamCity の脆弱性を悪用する攻撃活動に関する注意喚起

(12/13) Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally | CISA


Microsoft が不正に Microsoft アカウントの販売などを行っていた犯罪者グループ Storm-1152 のドメインを差し押さえ

(12/13) Disrupting the gateway services to cybercrime - Microsoft On the Issues

(12/13) CaaS Alert: Disrupting Storm-1152 | Arkose Labs


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 1 個の脆弱性を追加

(12/11) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2023-6448 Unitronics Vision PLC and HMI Insecure Default Password


ApplemacOS Monterey 12.7.2, macOS Ventura 13.6.3, macOS Sonoma 14.2, iOS 16.7.3 / iPadOS 16.7.3, iOS 17.2 / iPadOS 17.2, tvOS 17.2, watchOS 10.2, Safari 17.2 をリリース。すでに悪用が確認されている脆弱性の修正を含む。

(12/11) Apple security releases - Apple Support


Microsoft が 2023年 12月の月例パッチを公開

(12/12) 2023 年 12 月のセキュリティ更新プログラム (月例) | MSRC Blog | Microsoft Security Response Center

今月のセキュリティ更新プログラムで修正した脆弱性のうち、以下の脆弱性は更新プログラムが公開されるよりも前に悪用や脆弱性の詳細が一般へ公開されていることを確認しています。お客様においては、更新プログラムの適用を早急に行ってください。脆弱性の詳細は、各 CVE のページを参照してください。

  • CVE-2023-20588 AMD: CVE-2023-20588 AMD Speculative Leaks Security Notice

(12/12) Zero Day Initiative — The December 2023 Security Update Review


その他

「国立研究開発法人情報通信研究機構法の一部を改正する等の法律案」が国会で可決、成立

(12/11) 閣法 第212回国会 6 国立研究開発法人情報通信研究機構法の一部を改正する等の法律案

(コメント) 5年間の時限立法により実施されていた NOTICE の取組は来年度以降も継続することに

今週の気になるセキュリティニュース - Issue #148

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

アルプスアルパインの元従業員が営業秘密情報を不正に持ち出したとして、不正競争防止法違反の容疑で逮捕

(12/5) 退職した元従業員の逮捕について

(参考) 私物HDDを使用して営業秘密を不正に持ち出ししていた事案についてまとめてみた - piyolog


ドコモショップ店員が電子計算機使用詐欺などの疑いで逮捕

(12/5) 「dポイント」40万円分を不正取得か、元ドコモショップ店員の女を逮捕…客のスマホ預かり操作 : 読売新聞

 NTTドコモの「dポイント」を不正に取得したとして、元ドコモショップ店員の女が11月、北海道警に逮捕された。機種変更のために来店した客からスマートフォンを預かり、聞き出したパスワードを入力して操作。7月以降、40回にわたって計40万円分のポイントを自分のアカウントに送信していたとみられる。


攻撃、脅威

CISAAdobe ColdFusion の脆弱性 CVE-2023-26360 を悪用する攻撃活動に関する注意喚起

(12/5) CISA Releases Advisory on Threat Actors Exploiting CVE-2023-26360 Vulnerability in Adobe ColdFusion | CISA

(12/5) Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers | CISA

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing a Cybersecurity Advisory (CSA) in response to confirmed exploitation of CVE-2023-26360 by unidentified threat actors at a Federal Civilian Executive Branch (FCEB) agency. This vulnerability presents as an improper access control issue impacting Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier). CVE-2023-26360 also affects ColdFusion 2016 and ColdFusion 11 installations; however, they are no longer supported since they reached end of life. Exploitation of this CVE can result in arbitrary code execution. Following the FCEB agency’s investigation, analysis of network logs confirmed the compromise of at least two public-facing servers within the environment between June and July 2023.


CISA などが共同で、ロシアの攻撃者グループによる攻撃活動に関する注意喚起。また米英政府は攻撃者グループの 2人のロシア人を制裁対象に追加し、米司法省は 2人を起訴

(12/7) CISA and International Partners Release Advisory on Russia-based Threat Actor Group, Star Blizzard | CISA

(12/7) Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns | CISA

The Russia-based actor Star Blizzard (formerly known as SEABORGIUM, also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to successfully use spear-phishing attacks against targeted organizations and individuals in the UK, and other geographical areas of interest, for information-gathering activity.

(12/7) Office of Public Affairs | Two Russian Nationals Working with Russia’s Federal Security Service Charged with Global Computer Intrusion Campaign | United States Department of Justice

Indictment Alleges the So-Called “Callisto Group” Hacked Computers in the United States and Allied Countries, and Stole Information Used in Foreign Malign Influence Operations Designed to Influence the U.K.’s 2019 Elections

(12/7) United States and the United Kingdom Sanction Members of Russian State Intelligence-Sponsored Advanced Persistent Threat Group | U.S. Department of the Treasury

Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC), in coordination with the United Kingdom, designated two individuals associated with an advanced persistent threat (APT) group that is sponsored by the Russian Federal Security Service (FSB) and has targeted individuals and entities in the United States, United Kingdom, and other allied and partner countries.

(12/7) UK exposes attempted Russian cyber interference in politics and democratic processes - GOV.UK

(12/7) Russian FSB cyber actor Star Blizzard continues worldwide... - NCSC.GOV.UK

(12/7) Star Blizzard increases sophistication and evasion in ongoing attacks | Microsoft Security Blog


脆弱性

CISA が Known Exploited Vulnerabilities (KEV) カタログに 2+4+2 個の脆弱性を追加

(12/4) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

(12/5) CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA

(12/7) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA


FXC製無線LANルータ「AE1021PE」および「AE1021」に脆弱性。すでに悪用が確認されている

(12/6) JVNVU#92152057: FXC製無線LANルータ「AE1021PE」および「AE1021」におけるOSコマンドインジェクションの脆弱性

(12/6) AE1021/AE1021PEのファームウェア 2.0.10 公開のお知らせ

ファームウェアを2.0.10 にアップデート実施後、工場出荷リセット実施して、デフォルトパスワードを変更してください。

(12/6) Actively Exploited Vulnerability in FXC Routers: Fixed, Patches Available | Akamai

As part of the InfectedSlurs discovery, the SIRT uncovered a vulnerability in FXC AE1021 and AE1021PE outlet wall routers that are being actively exploited in the wild. This device is described as an outlet-based wireless LAN router for hotels and residential units. It is manufactured in Japan by FXC. This vulnerability has been assigned the CVE ID of CVE-2023-49897 with a CVSS v3 score of 8.0.


WordPressプラグインなど他の脆弱性と組み合わせることでリモートコード実行可能な脆弱性を修正

(12/6) WordPress 6.4.2 Maintenance & Security Release – WordPress News

A Remote Code Execution vulnerability that is not directly exploitable in core, however the security team feels that there is a potential for high severity when combined with some plugins, especially in multisite installs.

(12/6) PSA: Critical POP Chain Allowing Remote Code Execution Patched in WordPress 6.4.2

WordPress 6.4.2 was released today, on December 6, 2023. It includes a patch for a POP chain introduced in version 6.4 that, combined with a separate Object Injection vulnerability, could result in a Critical-Severity vulnerability allowing attackers to execute arbitrary PHP code on the site.

We urge all WordPress users to update to 6.4.2 immediately, as this issue could allow full site takeover if another vulnerability is present.


その他

Microsoft が2025年10月14日にサポートを終了する Windows 10 に関して、最長 3年間の延長サポート (Extended Security Updates) を有償で提供する計画を発表

(12/5) Plan for Windows 10 EOS with Windows 11, Windows 365, and ESU | Windows IT Pro Blog

While we strongly recommend moving to Windows 11, we understand there are circumstances that could prevent you from replacing Windows 10 devices before the EOS date. Therefore, Microsoft will offer Extended Security Updates.

Like the Windows 7 ESU program, your organization will be able to purchase a yearly subscription to security updates. The yearly commitment is renewable for three years. Devices enrolled in ESUs will receive monthly security updates to keep these Windows 10 PCs secure.


Meta が Messenger における E2EE のデフォルト有効化を開始すると発表

(12/6) Launching Default End-to-End Encryption on Messenger | Meta

We want to be open about the security technology we use and welcome the chance to engage with external cryptographers and security experts. That’s why we are also publishing two papers which outline our approach to cryptography, as well as how we encrypt your message history with Secure Storage. Because there are over a billion Messenger users, not everyone will get default end-to-end encryption right away. It will take a number of months to complete the global roll-out. When your chats are upgraded, you will be prompted to set up a recovery method, such as a PIN, so you can restore your messages if you lose, change or add a device.

(12/6) Building end-to-end security for Messenger - Engineering at Meta

Today, we’re announcing that we’ve begun to upgrade people’s personal conversations on Messenger to use E2EE by default. Our aim is to ensure that everyone’s personal messages on Messenger can only be accessed by the sender and the intended recipients, and that everyone can be sure the messages they receive are from an authentic sender.

(12/7) NCA response to Meta's rollout of end-to-end-encryption - National Crime Agency

(12/8) As Meta rolls out end-to-end encryption, police warn keeping children safe ‘no longer possible’

今週の気になるセキュリティニュース - Issue #147

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

欧米の複数の法執行機関の国際協力により、ウクライナランサムウェアグループを摘発

(11/28) International collaboration leads to dismantlement of ransomware group in Ukraine amidst ongoing war | Europol

In an unprecedented effort, law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations wreaking havoc across the world. The operation comes at a critical time, as the country grapples with the challenges of Russia’s military aggression against its territory.


財務省が、北朝鮮の Lazarus Group による資金洗浄に利用されているとして、暗号資産ミキシングサービス Sinbad への制裁を実施

(11/29) Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency | U.S. Department of the Treasury

oday, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Sinbad.io (Sinbad), a virtual currency mixer that serves as a key money-laundering tool of the OFAC-designated Lazarus Group, a state-sponsored cyber hacking group of the Democratic People’s Republic of Korea (DPRK). Sinbad has processed millions of dollars’ worth of virtual currency from Lazarus Group heists, including the Horizon Bridge and Axie Infinity heists. Sinbad is also used by cybercriminals to obfuscate transactions linked to malign activities such as sanctions evasion, drug trafficking, the purchase of child sexual abuse materials, and additional illicit sales on darknet marketplaces.

(11/29) Sinbad crypto mixer flagged by Elliptic sanctioned and seized


Okta のサポートシステムへの不正アクセスに関する続報

(11/29) October Customer Support Security Incident - Update and Recommended Actions | Okta Security

We have determined that the threat actor ran and downloaded a report that contained the names and email addresses of all Okta customer support system users. All Okta Workforce Identity Cloud (WIC) and Customer Identity Solution (CIS) customers are impacted except customers in our FedRamp High and DoD IL4 environments (these environments use a separate support system NOT accessed by the threat actor). The Auth0/CIC support case management system was also not impacted by this incident.


日米などが共同で、北朝鮮の団体・個人に対する制裁措置を実施

(11/30) Treasury Targets DPRK’s International Agents and Illicit Cyber Intrusion Group | U.S. Department of the Treasury

Today, in coordination with foreign partners, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned eight foreign-based Democratic People’s Republic of Korea’s (DPRK) agents that facilitate sanctions evasion, including revenue generation and missile-related technology procurement that support the DPRK’s weapons of mass destruction (WMD) programs. Additionally, OFAC sanctioned cyber espionage group Kimsuky for gathering intelligence to support the DPRK’s strategic objectives.

(12/1) 北朝鮮の核その他の大量破壊兵器及び弾道ミサイル関連計画その他の北朝鮮に関連する国際連合安全保障理事会決議により禁止された活動等に関与する者に対する資産凍結等の措置の対象者の追加について|外務省

 我が国は、令和5年11月21日に北朝鮮が我が国の上空を通過する形で、「衛星」打ち上げのために、弾道ミサイル技術を使用した発射を行ったこと等を踏まえ、北朝鮮をめぐる問題の解決を目指す国際平和のための国際的な努力に我が国として寄与するため、主要国が講じた措置の内容に沿い、閣議了解外国為替及び外国貿易法に基づく北朝鮮の核その他の大量破壊兵器及び弾道ミサイル関連計画その他の北朝鮮に関連する国際連合安全保障理事会決議により禁止された活動等に関与する者に対する資産凍結等の措置について」(令和5年12月1日付)を行い、これに基づき、外国為替及び外国貿易法による次の措置を実施することとした。


仙台市の職員が住民情報システムを不正に利用したとして懲戒処分

(12/1) 懲戒処分の公表について|仙台市

 市民局区政部において住民基本台帳事務を担当していた令和4年8月6日、業務とは関係ない私的な理由から、住民情報システムを用いて、知人女性の住所情報を不正に収集したもの。

 また、令和3年6月30日に、総務局人事課から、当該女性に対するつきまとい行為等に係る指導を受けていたにもかかわらず、不正に収集した住所情報を用いて、複数回にわたり当該女性宅付近を訪れたほか、令和5年3月12日に当該女性宅前で待ち伏せ行為を行ったもの。


攻撃、脅威

Elliptic と Corvus Insurance が共同で、Black Basta ランサムウェアに対する身代金の支払い状況を分析。2022年以降これまでに、少くとも $107M に相当する Bitcoin が支払われている。

(11/29) Black Basta ransomware victims have paid over $100 million

  • Joint research by Elliptic and Corvus Insurance has identified at least $107 million in Bitcoin ransom payments to the Black Basta ransomware group since early 2022.
  • Black Basta has infected over 329 victims, including Capita, ABB and Dish Network.
  • Analysis of blockchain transactions shows a clear link between Black Basta and the Conti Group - a Russian ransomware gang that ceased operations in 2022, around the time that Black Basta emerged.
  • Much of the laundered ransom payments can be traced onwards to Garantex, the sanctioned Russian crypto exchange.


CISA などが共同で、イランの攻撃者グループによる攻撃活動に関する注意喚起

(12/1) IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities | CISA

The IRGC is an Iranian military organization that the United States designated as a foreign terrorist organization in 2019. IRGC-affiliated cyber actors using the persona “CyberAv3ngers” are actively targeting and compromising Israeli-made Unitronics Vision Series programmable logic controllers (PLCs). These PLCs are commonly used in the Water and Wastewater Systems (WWS) Sector and are additionally used in other industries including, but not limited to, energy, food and beverage manufacturing, and healthcare. The PLCs may be rebranded and appear as different manufacturers and companies. In addition to the recent CISA Alert, the authoring agencies are releasing this joint CSA to share indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with IRGC cyber operations.

(11/28) Exploitation of Unitronics PLCs used in Water and Wastewater Systems | CISA

CISA is responding to active exploitation of Unitronics programmable logic controllers (PLCs) used in the Water and Wastewater Systems (WWS) Sector. Cyber threat actors are targeting PLCs associated with WWS facilities, including an identified Unitronics PLC, at a U.S. water facility. In response, the affected municipality’s water authority immediately took the system offline and switched to manual operations—there is no known risk to the municipality’s drinking water or water supply.


脆弱性

Arcserve UDP にリモートコード実行可能な脆弱性 CVE-2023-41998

(11/27) Arcserve Unified Data Protection Multiple Vulnerabilities - Research Advisory | Tenable®

An unauthenticated, remote attacker can execute code remotely via the downloadAndInstallPatch() routine within “com.ca.arcflash.rps.webservice.RPSService4CPMImpl.” This routine allows users to upload and execute arbitrary files.


GoogleChrome のゼロデイ脆弱性を修正

(11/28) Chrome Releases: Stable Channel Update for Desktop

Google is aware that an exploit for CVE-2023-6345 exists in the wild.


ownCloud の脆弱性 CVE-2023-49103 で悪用が確認される

(11/28) Hackers start exploiting critical ownCloud flaw, patch now

(11/29) CVE-2023-49103: ownCloud Critical Vulnerability Quickly Exploited in the Wild | GreyNoise Blog

(11/29) ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation | Ars Technica

(12/1) CVE-2023-49103: Critical Information Disclosure in ownCloud Graph API | Rapid7 Blog


ApplemacOS Sonoma 14.1.2, iOS 17.1.2 / iPadOS 17.1.2, Safari 17.1.2 をリリース。すでに悪用が確認されている脆弱性の修正を含む。

(11/30) Apple security releases - Apple Support


Zyxel の NAS 製品に複数の脆弱性

(11/30) Zyxel security advisory for authentication bypass and command injection vulnerabilities in NAS products | Zyxel Networks

Zyxel has released patches addressing an authentication bypass vulnerability and command injection vulnerabilities in NAS products. Users are advised to install them for optimal protection.


CISA が Known Exploited Vulnerabilities (KEV) カタログに 2 個の脆弱性を追加

(11/30) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA


その他

11/27 に B-Root の IP アドレスが変更

(11/28) b.root-servers.net(B-Root)のIPアドレス変更に伴う設定変更について