Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, and More 

Welcome to ANY.RUN‘s monthly updates, where we share our latest achievements and improvements. 

October has been another productive month here at ANY.RUN, filled with new features to enhance your cybersecurity toolkit. We’ve introduced TI Lookup Notifications for real-time threat updates, rolled out a newly improved Linux sandbox for smoother malware analysis, and added the ability to export STIX reports for seamless data sharing. 

In addition, we’ve expanded our detection capabilities with a range of new signatures and YARA rules, empowering you with even stronger threat coverage. 

And that’s just the beginning!  

Let’s dive into all the exciting updates from ANY.RUN this month. 

Product Updates

Upgraded Linux Sandbox  

At ANY.RUN, we’re always working to improve our services, and this time, we’ve focused on making our Linux sandbox even better. This upgrade brings a seamless, stable experience on par with our Windows environment, making it easier than ever to analyze Linux malware in real time. 

Upgraded Linux sandbox

We’ve fine-tuned the Linux sandbox with new features and enhancements to boost both performance and usability. Here’s a quick overview of what’s new and how these updates benefit you: 

  • File events tracking: Monitor and log all file actions—whether malware is creating, modifying, or deleting files, you’ll see it all in the analysis report. 
  • Improved process tree: Navigating the process tree is now lag-free, letting you analyze malware behaviors more efficiently. 
  • Real-time file uploads: You can now upload files during an active session, adding flexibility to your investigation without needing to restart. 

See all updates in our blog post.

Try malware and phishing analysis
in ANY.RUN’s Linux sandbox for free 



Try it now


STIX Reports 

In October, we enhanced ANY.RUN’s capabilities by introducing the option to export threat analysis data in the Structured Threat Information eXpression (STIX) format. STIX is a standardized language that facilitates consistent and machine-readable sharing of cyber threat intelligence. 

Click Export → STIX to download threat data 

Key features of STIX reports: 

  • Comprehensive data inclusion: Each STIX report encompasses a wide range of information from your analysis, such as sandbox session links, file hashes, network traffic details, file system modifications, and Tactics, Techniques, and Procedures (TTPs). 
  • Seamless integration: These reports are compatible with Security Information and Event Management (SIEM) systems and other automated tools, promoting efficient threat detection and response. 
  • Enhanced collaboration: By utilizing STIX reports, analysts and incident response teams can effortlessly share threat data across various platforms, improving communication and coordination. 

Discover all types of reports available in the ANY.RUN sandbox.

TI Lookup Notifications 

We have enhanced Threat Intelligence Lookup with Notifications. The new functionality allows users to subscribe to real-time updates on new results related to their specific queries. This includes Indicators of Compromise (IOCs), Indicators of Attack (IOAs), and Indicators of Behavior (IOBs). 

Notifications in TI Lookup are easy to set up

After subscribing to specific queries, the new results will appear in the dashboard, highlighted in green. This will make it easier for you to notice the fresh updates. 

Why use Lookup Notifications? 

  • Automatically monitor and receive updates for your chosen queries, so you never miss critical threat information. 
  • Tap into threat data sourced from samples uploaded by over 500,000 security pros using ANY.RUN’s Interactive Sandbox, giving you a broad view of global cyber activity. 
  • Keep track of IOCs, IOAs, and IOBs relevant to your organization, helping you verify potential threats and proactively strengthen your defenses. 
  • Use real-time insights to refine detection rules, enrich your data, and stay prepared against emerging threats. 

See a guide on how to set up notifications in TI Lookup.

Enrich your threat investigations with data
from TI Lookup 



Request trial


Export Session Lists from Team History 

We’ve introduced a new feature that allows you to export analysis session lists from your team’s history in a specific JSON format. This export provides a structured list of all sandbox sessions completed by your team. 

This feature is designed to help with record-keeping and reporting, making it easier to manage and track your team’s activities over time. 

Custom Tags for Analysis Sessions via API 

We’ve added the ability to set custom tags for sandbox sessions via the API. Previously, you could assign personalized tags to sessions through the web interface, in addition to the system-generated tags. Now, you can do the same directly through the API, giving you more flexibility in organizing and categorizing your analyses. 

Redesigned Threat Intelligence Home Screen with MITRE ATT&CK Matrix 

We’ve redesigned our Threat Intelligence home screen to give you a clearer and more intuitive view of the threat landscape.

Redesigned Threat Intelligence home screen

The updated home screen now features a MITRE ATT&CK matrix with refined techniques and tactics, helping you better assess and understand threats. 

Threat Coverage Updates 

In October, we’ve significantly expanded our detection capabilities with new and updated signatures and YARA rules. 

New Signatures 

This month, we’ve added 90 new signatures to improve detection and monitoring across various malware types and tools, including:

VOBFUS

BASUN

SYSBOT

TIWI

NESHTA

KMS Tool

Blackshades

Modiloader

Shellrunner

Revenge

GoToHttp

AnyDesk

Emmenhtal

SkypeLogView

LockBit3

Ngrok

PSExec

COBINT

ProcDump 

PowerView

SecretsDump 

We added signatures for actions performed via PowerShell: 

  • Resets Windows Defender malware definitions to the base version  
  • Changes settings for sending potential threat samples to Microsoft servers  
  • Changes settings for reporting to Microsoft Active Protection Service (MAPS)  
  • Changes Controlled Folder Access settings  
  • Changes settings for real-time protection  
  • Changes settings for checking scripts for malicious actions  
  • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)  
  • Changes settings for protection against network attacks (IPS)  
  • Removes files via Powershell 
  • Renames file via Powershell 
  • Hides errors and continues executing the command without stopping  

We also implemented detection for Pafish, aka Paranoid Fish, execution with cohost.exe as a parent process, and encrypted JSE scripts.

YARA Rules 

This month, we’ve expanded our YARA rule set with several new and improved detections, enhancing the ability to identify and monitor specific threats.  

In total, we’ve added 9 new YARA rules, covering various malware families, programming language-based detections, and refinements for better accuracy.

Unknown Stealer (go)  

PureCrypter  

DarkGate  

HijackLoader   

Network Detection Update 

In October, we worked to enrich our database with phishing IOCs, leveraging advanced data analysis within TI Lookup. This effort led to the identification of nearly 6,000 domains, each generating a dedicated Suricata rule

 Most of the rules are now live, strengthening our phishing detection capabilities. 

We also expanded our catalog of detected phishing kits with the addition of Mamba2FA, enhancing our overall threat coverage.

Our external threat intelligence this month focused on proactively detecting phishing campaigns by groups like Storm, allowing us to better track and respond to their evolving tactics. 

Heuristic and Proactive Phishing Detection

This month, our phishing detection capabilities have been enhanced with advanced heuristics and proactive signatures. Here are some examples of recent detections: 

  • Heuristic signature detection: PHISHING [ANY.RUN] Domain chain identified as Phishing (challengepoint). View analysis session 
  • Statistical analysis detection: Using statistical processing of previously detected phishing patterns, we flagged PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (logbook-annul-srt[.]click) as a high-risk domain. View analysis session 
  • External threat intelligence detection: Through threat intelligence from external sources, we identified PHISHING [ANY.RUN] Suspected AiTM Storm1575 Domain Phishing Infrastructure (eslebrrte[.]com, eslebrrte[.]de), linked to the Storm1575 phishing campaign. View analysis session 

About ANY.RUN  

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

  • Detect malware in seconds
  • Interact with samples in real time
  • Save time and money on sandbox setup and maintenance
  • Record and study all aspects of malware behavior
  • Collaborate with your team 
  • Scale as you need

Request free trial of ANY.RUN’s products →

The post Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, <br>and More  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Cybersecurity and Influence Operations Threaten Integrity of U.S. Elections, Warns FBI, CISA, and ODNI

CISA

Overview

As the United States nears another election cycle, the nation faces an increased risk of influence operations targeting the democratic process. In a joint statement, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) highlighted growing concerns about foreign interference—particularly from Russia and Iran—in efforts to undermine public trust in the integrity of the U.S. election system.

According to the intelligence community (IC), foreign adversaries, especially Russia, are intensifying their influence campaigns to sow distrust and division among American voters. These activities are expected to escalate as election day draws closer, with Russia’s influence actors primarily focusing on critical swing states, where their efforts could have the most significant impact.

The IC’s assessment reveals that Russian influence actors are engaging in the creation and dissemination of fake media content designed to manipulate public opinion. “Since our statement on Friday, we have observed additional influence operations that seek to stoke divisions and question the legitimacy of the election process,” stated the joint statement. The fabricated videos and articles are part of a broader strategy aimed at generating fear and confusion, particularly around voting procedures.

One recent example includes a video circulating online that falsely portrays an interview with an individual alleging election fraud in Arizona, involving bogus overseas ballots and tampering with voter rolls to favor Vice President Kamala Harris. The Arizona Secretary of State has already debunked this claim as entirely false.

In addition to spreading misinformation, CISA says that the Russian operatives are amplifying the false narrative that U.S. officials across several swing states are orchestrating widespread election fraud, such as ballot stuffing and cyberattacks. These fabricated stories have the potential to incite violence, particularly against election officials. As these false claims continue to spread, Russian influence actors are expected to release more of such content throughout election day and in the aftermath of the vote, exacerbating tensions across the nation.

Iran’s Role in Election Cybersecurity Threats

Iran, while less active than Russia, continues to pose a significant cybersecurity threat to the upcoming elections. As highlighted in previous reports, Iran has been involved in cyber activities targeting U.S. political figures, including former President Donald Trump’s campaign.

The U.S. intelligence community also notes that Iran’s influence operations are likely to include the creation of fake media content designed to suppress voter turnout or incite political violence. Additionally, Iran has maintained a desire for retribution against specific U.S. officials tied to the death of Iranian General Qassem Soleimani in 2020, and this could influence its approach to future election-related activities.

Iranian operatives, like their Russian counterparts, have long sought to manipulate public perception through false narratives, amplifying divisiveness and spreading misinformation. While the Iranian government’s influence operations may not be as widespread or sophisticated as Russia’s, they remain a persistent threat to election integrity.

FBI and CISA’s Call to Action for Election Security

Considering these growing threats, both the FBI and CISA are urging election stakeholders to remain vigilant and proactive in securing election infrastructure and preventing the spread of disinformation. “Voters should seek out information from trusted, official sources, particularly from state and local election officials,” the agencies recommended.

 CISA further emphasized the importance of reporting any suspicious or criminal activity related to election security. Election infrastructure stakeholders, as well as the public, can report cyber incidents or suspicious activity to CISA via its dedicated reporting channels, such as calling 1-844-Say-CISA or emailing report@cisa.dhs.gov.

The FBI and CISA also continue to encourage campaigns, election officials, and other stakeholders to remain in close contact with local Election Crime Coordinators to report potential security threats. These collaborative efforts are essential to counter the growing wave of influence operations and to ensure that the U.S. election process remains free from foreign manipulation.

CISA and EAC’s Support for State and Local Election Officials

In a related statement, CISA, along with the U.S. Election Assistance Commission (EAC), reiterated its support for state and local election officials as they prepare for the election. These officials, often working behind the scenes, play a critical role in ensuring that the election process runs smoothly and securely. “We are proud to support the hard work and dedication of election officials across the country,” CISA Director Jen Easterly said. “They are the heroes of our democracy, and we stand with them as they continue their tireless efforts to safeguard the integrity of our elections.”

The EAC also issued a joint statement, acknowledging the extensive preparation that has gone into ensuring the security of the 2024 election. “Planning for tomorrow’s election began four years ago,” said the EAC, emphasizing the comprehensive efforts made at both the state and local levels to address potential challenges. While operational issues may arise—such as delays at polling locations or power outages—election officials are prepared to handle such contingencies and ensure that every eligible vote is counted accurately.

The statement also addressed the importance of understanding that election night results are unofficial, as media outlets call the races based on preliminary results. “Accurately counting millions of ballots takes time, and we ask Americans to be patient during this process,” the EAC urged. It further emphasized that recounts and audits are standard procedures to ensure election accuracy, which will be conducted in accordance with state and territorial laws.

Fighting Disinformation: A Collective Effort

The growing sophistication of influence operations—especially those linked to Russia—has prompted the U.S. government to take proactive steps in combating foreign disinformation campaigns. The FBI, CISA, and other agencies are working around the clock to track and disrupt foreign interference in U.S. elections. In addition to technical defenses, these agencies are actively engaged in educating the public about the dangers of inauthentic content and misinformation.

The impact of influence operations, particularly in swing states, cannot be overstated. As foreign actors continue to amplify divisive rhetoric and fabricate stories about election fraud, it is essential that Americans rely on trusted sources for accurate information. State and local election officials, supported by CISA and the EAC, will continue to be the primary resources for election integrity.

Voters are encouraged to stay informed by consulting official channels, and to report any suspicious activity or potential cyber threats they encounter. “We are all in this together,” said Easterly. “It is up to every American to help protect the democracy that we all value.”

Conclusion

The U.S. elections are expected to be a critical test of the nation’s resilience against foreign influence operations and cyber threats. With Russia and Iran poised to continue their interference campaigns, it is important that the American public, election officials, and cybersecurity agencies work together to protect the electoral process. As foreign influence actors ramp up their activities, vigilance, awareness, and collaboration will be key to ensuring that the 2024 elections remain secure and free from foreign manipulation.

Sources: https://www.cisa.gov/news-events/news/joint-statement-cisa-and-eac-support-state-and-local-election-officials

https://www.cisa.gov/news-events/news/joint-odni-fbi-and-cisa-statement-1

The post Cybersecurity and Influence Operations Threaten Integrity of U.S. Elections, Warns FBI, CISA, and ODNI appeared first on Cyble.

Blog – Cyble – ​Read More

Critical Vulnerabilities in PTZ Cameras: CISA Adds New Exploits to Its Catalog

PTZ Cameras

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, spotlighting security flaws in Pan-Tilt-Zoom (PTZ) cameras.

The vulnerabilities, which affect specific PTZOptics camera models, pose a considerable risk to organizations that rely on these devices for surveillance, live streaming, and conference automation.

These flaws could be leveraged by malicious actors to execute OS command injections or bypass authentication controls, exposing sensitive systems to potential breaches.

Vulnerabilities in PTZOptics Cameras: CVE-2024-8956 and CVE-2024-8957

The two vulnerabilities—CVE-2024-8956 and CVE-2024-8957—affect the PT30X-SDI/NDI series of PTZ cameras from PTZOptics. These devices, which are also embedded in various white-label AV equipment, are vulnerable to critical security flaws that could allow attackers to gain unauthorized access and execute arbitrary commands. Here’s an overview of each vulnerability:

  1. CVE-2024-8956: Authentication Bypass Vulnerability

  1. CVSS Score: 9.1 (Critical)
    1. Description: This authentication bypass vulnerability affects the PTZOptics PT30X-SDI and PT30X-NDI-xx-G2 cameras running versions prior to 6.3.40. Due to improper authorization, attackers can remotely access the cameras without authentication. This allows them to leak sensitive data, including usernames, password hashes, and device configuration details. Additionally, attackers can modify or overwrite the configuration files, compromising the system’s integrity.

    1. Impact: The vulnerability provides attackers with the ability to access critical configuration files and potentially disrupt operations by altering camera settings.

  • CVE-2024-8957: OS Command Injection Vulnerability
    • CVSS Score: 9.8 (Critical)
    • Description: This OS command injection vulnerability arises from insufficient validation of the ntp_addr configuration value in the PTZOptics cameras. When the ntp_client service is started, the flaw allows remote attackers to execute arbitrary commands on the affected devices. When combined with the previous authentication bypass vulnerability (CVE-2024-8956), an attacker could leverage both vulnerabilities to perform even more damaging actions, such as executing malicious commands remotely.

    • Impact: Attackers can exploit this flaw to compromise the camera’s operating system, potentially allowing them to gain full control over the device and even spread their attack within a network.

CISA’s Action: Immediate Attention Required

PTZ cameras are widely used across various industries for surveillance, broadcasting, and remote monitoring, making them a prime target for cybercriminals. The authentication bypass vulnerability and OS command injection vulnerability in these cameras represent frequent attack vectors for malicious cyber actors, who often exploit such flaws to gain unauthorized access, exfiltrate sensitive data, or even take control of critical systems.

Organizations that utilize PTZ cameras in their infrastructure are strongly advised to patch these vulnerabilities immediately to mitigate potential security risks. The vulnerabilities disclosed in PTZOptics cameras are part of a broader trend of vulnerabilities in Pan-Tilt-Zoom (PTZ) cameras, which have increasingly become targets for attackers due to their prevalence in critical systems. OS command injection vulnerabilities and authentication bypass vulnerabilities in cameras expose organizations to severe security risks, especially when these devices are connected to the internet without proper safeguards.

PTZ cameras, like many IoT devices, often operate with limited built-in security measures. These devices typically have embedded software and firmware that can be vulnerable to attack, especially when manufacturers fail to release timely security updates. Additionally, the growing use of white-label AV equipment based on third-party camera firmware further complicates the security landscape, as these devices may not receive adequate vendor support.

Both CVE-2024-8956 and CVE-2024-8957 are acknowledged by ValueHD Corporation, the vendor behind the PTZOptics camera models. The company has released a patch for the affected camera models to address these vulnerabilities. Customers using PTZOptics PT30X-SDI and PTZOptics PT30X-NDI-xx-G2 cameras should immediately upgrade to version 6.3.40 or later to prevent exploitation.

Recommendations and Mitigating for PTZ Camera Vulnerabilities

To address the risks by vulnerabilities in PTZ cameras, organizations should implement several best practices to protect their systems from potential exploitation:

  1. As soon as a vendor releases a patch addressing critical vulnerabilities like authentication bypass or OS command injection, organizations should prioritize its installation. Delays in patching can expose devices to active attacks.
  2. Critical devices, including PTZ cameras, should not be exposed directly to the internet. Organizations should segment their networks to isolate critical assets and use firewalls and access controls to limit exposure.
  3. Implementing a patch management process that includes inventory management, patch assessment, testing, and deployment can help ensure that vulnerabilities are addressed in a timely manner across the entire infrastructure.
  4. Organizations should have a clear and tested incident response plan in place to quickly detect, respond to, and recover from security incidents. This plan should be aligned with current threat landscapes and should include procedures for addressing vulnerabilities like those found in PTZ cameras.
  5. Continuous monitoring and logging are essential for identifying suspicious activity and detecting potential threats. Security Information and Event Management (SIEM) systems can help aggregate and correlate logs for real-time threat detection.
  6. Organizations should assess the criticality of any End-of-Life (EOL) products, including PTZ cameras, and plan for timely upgrades or replacements. Using outdated devices increases the risk of exploitation, as they may no longer receive security patches.

Conclusion

The critical vulnerabilities in PTZ cameras, including the OS command injection and authentication bypass vulnerabilities, highlight the importance of securing embedded devices used in modern enterprise environments.

As PTZ camera vulnerabilities become a vector for cyberattacks, organizations must act quickly to patch affected devices and adopt stronger security practices. Timely patching, network segmentation, and comprehensive monitoring are key to protecing systems against the growing threat posed by such vulnerabilities in Pan-Tilt-Zoom cameras.

With active exploitation of these vulnerabilities in the wild, organizations that rely on PTZ cameras should prioritize security assessments and patch management to protect sensitive data and maintain system integrity.

Sources: https://ptzoptics.com/firmware-changelog/

https://www.cisa.gov/news-events/alerts/2024/11/04/cisa-adds-two-known-exploited-vulnerabilities-catalog

The post Critical Vulnerabilities in PTZ Cameras: CISA Adds New Exploits to Its Catalog appeared first on Cyble.

Blog – Cyble – ​Read More

Security and privacy settings in ASICS Runkeeper | Kaspersky official blog

We’ve already discussed how most tracking apps provide minimal protection for your personal data by default. Routes and workout times, your fitness data and photos from your runs are usually publicly available online unless you explicitly block them. The consequences, as we’ve written, can be disastrous — ranging from leaks of secret facility locations to stalking and even attempted murder.

To avoid this, you need to configure both your smartphone in general and running apps in particular. You can find our instructions for the most popular running trackers via these links: Strava, Nike Run Club, MapMyRun, adidas Running.

Today, wrapping up our review of training-app privacy settings, we’ll explain how to properly configure ASICS Runkeeper (for both Android and iOS).

Like other major sportswear brands like Nike and adidas, the Japanese company ASICS, well-known for its running shoes, didn’t try to reinvent the wheel. Instead, it just acquired the popular running tracking app Runkeeper, and didn’t even rename it — simply adding its brand name to give us ASICS Runkeeper.

The privacy settings in ASICS Runkeeper — like in the other running apps — are not so easy to find. If you click on the gear icon in the upper left corner of the main screen, you won’t find them there — those are activity settings. Instead, click Me in the lower left corner, then click the gear icon in the upper right corner, and on the next page, select Privacy Settings.

Privacy settings in the ASICS Runkeeper running app

Where to find privacy settings in ASICS Runkeeper: Me → Settings → Privacy Settings

These settings are basic — there are only three items on the page. The key thing to do here is to make sure the switch next to Public Account is turned off. I also recommend going into the Maps and Activities sections and changing the visibility from Followers to Only Me (in Runkeeper, the Everyone option appears only for public accounts).

All privacy settings in ASICS Runkeeper

ASICS Runkeeper’s privacy settings are quite minimal

It’s also a good idea to adjust the types of notifications ASICS Runkeeper can send you (there are many in the settings) by going back to Settings and choosing Push Notifications. Next to that option, there’s an Email Notifications section where you can turn off email notifications from the app.

Finally, if you decide to stop using Runkeeper, don’t forget to delete your data from the app. You can do this by going to SettingsAccount SettingsDelete Account. You can also download your data before deleting it.

If you use other tracking apps for your workouts, you can configure their privacy settings using our guides:

To learn how to configure privacy in other apps — from social networks to browsers — visit our website Privacy Checker.

And Kaspersky Premium will maximize your privacy protection and prevent digital identity theft across all your devices.

Don’t forget to subscribe to our blog to get more instructions and useful articles so that scammers will always… eat your dust.

Kaspersky official blog – ​Read More

Expert Q&A: Dr. Jim Furstenberg on Cybersecurity Education and Practice 

Dr. Jim Furstenberg is a distinguished faculty member in the Ferris State University Information Security and Intelligence program. Since joining the faculty in 2014, he has combined his extensive industry experience — including roles as Chief Information Officer, Cybersecurity Consultant, and Chief Operating Officer — with his passion for teaching. 

With an information technology/security career spanning sectors such as retail, healthcare, and nonprofit organizations, Dr. Furstenberg brings a wealth of practical knowledge to the classroom. He is not only a licensed Private Investigator specializing in digital forensics and cyber investigations but also the founder of Kalos Cybersecurity LLC. As a retired team leader in Michigan’s Cyber Partners Incident Response (MIC3), he has played a pivotal role in educating and responding to cyber incidents across public and private sectors. 

In this interview, Dr. Furstenberg shares insights into how his real-world experience shapes his teaching methods, the differences between educating students and training professionals, and the critical importance of hands-on learning in cybersecurity. He discusses the integration of tools like ANY.RUN‘s interactive malware sandbox into his curriculum, the evolving landscape of cybersecurity education, and the essential skills students need to thrive in this dynamic field.  

Join us as we explore Dr. Furstenberg’s approach to fostering the next generation of cybersecurity experts. 

On the approach to teaching 

Q: As someone coming from a practical background, how does your industry experience shape your teaching methods? 

Dr. Jim Furstenberg: My industry experience informs my teaching methods in several ways. First, it allows me to provide real-world experiential learning and examples that make cybersecurity concepts more relatable and engaging for students. I emphasize hands-on-keyboard practical applications of theoretical knowledge; helping students understand how their learning can be applied in actual work environments.  

I also foster a collaborative learning environment, similar to what they would experience in a professional setting, i.e., group projects that prepare them for teamwork and communication in their careers. I draw on industry best practices to create relevant assignments and projects, encouraging students to develop skills that are in demand. 

Additionally, our Information Security and Intelligence (ISIN) program’s faculty team draws on over 20 years of work experience ranging from leadership positions in multibillion-dollar corporations, healthcare, nonprofits, law enforcement, and licensed professional investigators.  

ISIN Faculty includes a Distinguished Professor, Michigan Professor of the Year, multiple Fulbright Scholars, and International Educator of the Year. Our faculty team has taught on four continents, including teaching digital forensics to the entire federal cybercrime units in Chile and Perú. In 2023,  I was nominated for Outstanding Professor of the year by students; although I did earn the award, just the nomination meant a lot to me.   

Finally, I am still active and, in the cybersecurity, and digital forensics profession and industry. I own my own cybersecurity business, and those firsthand client engagements and experiences help me stay updated on industry trends and challenges, allowing me to incorporate current topics into the curriculum and ensure that students are equipped for the future job market. 

Q: What are the main differences you see in how you tailor your approach to educating students versus training employees in cybersecurity? 

Dr. Jim Furstenberg: When tailoring my approach to educating students versus training employees in cybersecurity, several vital differences emerge: 

  • Learning Objectives: For students, the focus is often on foundational knowledge and theory, while employee training is more about practical skills and immediate application. I emphasize real-world scenarios and problem-solving in corporate training. 
  • Curriculum Depth: Student programs may explore a broader range of topics to provide a comprehensive understanding, whereas employee training is typically more targeted, addressing specific skills or compliance requirements relevant to their roles. 
  • Engagement Strategies: Students may benefit from various teaching methods, including lectures, discussions, and group projects, to foster critical thinking. In contrast, employee training often involves hands-on workshops, simulations, and table top exercises to engage them in real-life situations. 
  • Assessment Methods: Student assessments might include exams, essays, and projects to gauge theoretical and skill understanding. For employees, assessments, such as hands-on tests or simulations, are often more practical to measure their ability to apply skills in real-world scenarios. 
  • Feedback and Adaptation: In an academic setting, feedback can focus on personal and professional growth and deeper understanding, while in corporate training, it is crucial to provide immediate, actionable feedback to improve job performance quickly. 
  • Motivation and Mindset: Students may be motivated by grades and learning for the sake of knowledge, while employees are often driven by career advancement, job performance, and the application of skills, which can shape how I present material and relate it to their goals. 

Q: As cyber threats keep changing, how do you balance providing a broad foundation in core cybersecurity principles with keeping your curriculum up-to-date on the latest threats? 

Dr. Jim Furstenberg: It is undoubtedly challenging, but since I am actively involved in the profession and not just teaching, I often look for and bring the business reality into the classroom by engaging top-notch vendor solutions into the classroom for practical skills engagement.  

I am grateful for partnerships with vendors like ANY.RUN, which allows me to do this. While many vendors focus solely on short-term profits, several best-in-class companies we partner recognize the importance of providing low or no-cost access to their products for students. This approach enables real world application/learning and helps create future advocates for their solutions. 

Learn about ANY.RUN’s educational program
Security Training Lab
Get a quote for your university 



Get a quote


Q: How do you measure the success of your cybersecurity curriculum? Is it based on student feedback, job placement rates, or other factors? 

Dr. Jim Furstenberg: We measure success by assessing our students’ employability, gathering feedback from their internships, and the overall feedback from the government and industry regarding our alums. Additionally, our program holds national recognition and rigorous accreditations. For instance, in 2017, the ISI undergraduate program earned ABET Engineering Accreditation for Cybersecurity, becoming one of the first seven universities in the nation to achieve this distinction.  

Moreover, the National Security Agency and the Department of Homeland Security have designated Ferris State University as a National Center of Academic Excellence in Cyber Defense Education, as well as The Department of Defense Cyber Crime Center (DC3) and the Air Force Office of Special Investigations has named Ferris State University as the first university in the United States to obtain designation as a National Center of Digital Forensics Academic Excellence. 

On training methods and hands-on practice 

Q: Which methods have you found work best for teaching complex cybersecurity concepts?  

Dr. Jim Furstenberg: In short, experiential learning is essential—it involves hands-on experience while bridging the gap between academia and real-world realities. Our profession requires both knowledge and skills (technical & professional), along with a lifelong commitment to continuous learning and re-skilling oneself as it is constantly evolving, and our adversaries are highly skilled. 

Q: How do you incorporate real-world scenarios and hands-on labs into your teaching? 

Dr. Jim Furstenberg: There are numerous ways, but I will focus on three 

  • Hands-On Labs: Practical exercises allow students to engage with real tools and scenarios, helping them understand abstract concepts through direct experience. 
  • Case Studies: Analyzing real-world incidents provides context and relevance, illustrating the implications of cybersecurity practices and failures. 
  • Interactive Simulations: Using cyber warfare games and simulations, immerse students in threat detection, incident response, and other critical areas, enhancing their problem-solving skills. 

Q: Where does ANY.RUN’s interactive malware sandbox come into play in your curriculum? 

Dr. Jim Furstenberg: ANY.RUN provides students with access to a top-tier interactive malware sandbox, allowing them to understand the intricacies of malware hands-on. We integrate ANY.RUN labs with MITRE ATT&CK mapping and process enumeration, a collaboration made possible by ANY.RUN’s partnership and generosity.  

Students gain experience with a best of breed vendor and tools they are likely to encounter in the industry. ANY.RUN’s partnership with our program affords students to observe firsthand the full interaction of malware and its consequences. This real-world application enhances their understanding of how to respond to incidents with concrete artifacts and facts.  

Ultimately, ANY.RUN helps students articulate their findings and teaches them to adopt a pragmatic approach when creating defensive solutions and more importantly the ability to communicate visually what is happening and why to leadership and executives.


ANY.RUN cloud interactive sandbox interface

Security Training Lab

Discover ANY.RUN’s educational program for universities:

  • 30 Hours of Academic Content
  • Access to ANY.RUN Sandbox
  • Practical Learning



On advice to cybersecurity students 

Q: Students often struggle with balancing specialization and being a jack-of-all-trades. What advice do you give them for managing this throughout their career? 

Dr. Jim Furstenberg: This profession is not…Tube Socks… “one size does NOT fit all.” We emphasize the importance of self-discovery for students to seek out what they are genuinely passionate about. In cybersecurity, there are numerous horizontal and vertical paths to explore, all based on individual interests and passion. This passion for the profession makes it feel less like work and more of a mission. You have to be passionate about what you do…or why do it? 

However, a significant challenge is the vast knowledge domain and hands-on practical skills required. Students must navigate to their strengths to find their niche within it. This profession may not be for everyone, as it can lead to high burnout rates due to the extensive knowledge, skills, and the never-ending reality of “Cyber never sleeps”… an adage that continues to remain true as we face relentless attacks on our nation’s infrastructure and industries. 

I advise that a student’s approach to college should be to learn a profession, not just earn a degree. As professionals, we are passionate about our work, continually applying and updating our skills constantly, learning and even unlearning… as our profession constantly changes exponentially. In this profession, one never really “arrives,” but it is possible to be passionate about and master a specific niche. 

Q: What technical and soft skills do you notice students often lack when they enter the workforce? 

Dr. Jim Furstenberg: Get your face up from the device, look around, and actually talk to people. Behind all the cyber…there are real people. As time passes, I see students who are more introverted and anxious, often challenged to look at the person talking to them. After all, this is still a people business and people skills are critical. 

Technical Skills can be taught, however interpersonal and team player skills are acquired by first having a willingness to understand that interpersonal skills matter… and matter a lot; it’s a huge mistake to think that its only about the technical.  

Q: What essential recommendations would you give to students looking for their first job in cybersecurity? 

Dr. Jim Furstenberg: What separates a good cybersecurity analyst from a poor one is a combination of critical thinking, creativity, and persistence;  the emotional courage to keep going when things don’t work as expected. In cybersecurity, giving up is never an option. You need to buckle down and figure things out. 

Notice how technical skill is not on my list – because it can be learned; the attributes I listed above are a conscious choice. Furthermore, if cybersecurity were easy, anyone could do it. The truth is, it’s not easy, and not anyone can succeed in this field. 

As a student, it’s crucial to go beyond basic instructions and not give up when the first problem arises. Effective cybersecurity work often demands that you dig deeper to uncover issues that are not immediately obvious, as things are constantly changing. It’s about being resourceful, thinking critically, and persevering through challenges rather than stopping at the surface.  This mindset and discipline are essential for identifying and solving real-world security threats. They will set you apart as you grow in the field. 

On the future of cybersecurity education and work 

Q: How do you see AI affecting both the education and the tools and techniques used in professional cybersecurity settings? 

Dr. Jim Furstenberg: We have used AI for years in the infrastructure backend of appliances, so this is not new in my opinion. Only now is AI consumable so to say…  AI is and has been critical in cybersecurity to do what we do.  

I see more integration into areas where perhaps we had low to no visibility and time saving so the analyst can get Good Findings Fast (GFF)… AI’s speed and its ability to sort signal from noise more provides deeper integration pragmatically.  

Q: What factors, trends, or technologies do you see having the most significant impact on how we approach cybersecurity in the next three years? 

Dr. Jim Furstenberg: I see a deeper integration of Zero Trust. Companies finally understand that Cybersecurity is not an IT problem; it is an enterprise privacy and security issue, and it deserves a seat at the boardroom table.  

Cybersecurity is and should not be a department within IT — it is an integrated whole enterprise approach toward everything in the enterprise, not some bolted-on blinky appliance that IT manages; thankfully, this Luddite mentality appears to be finally waning. GDPR put some teeth into cybersecurity at the board and ownership level, and rightly so.

About ANY.RUN   

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.    

With ANY.RUN you can:  

  • Detect malware in under 40s.  
  • Interact with samples in real time.  
  • Save time and money on sandbox setup and maintenance  
  • Record and study all aspects of malware behavior.  
  • Collaborate with your team  
  • Scale as you need.  

Try all features of ANY.RUN for 14 days by requesting a free trial → 

The post Expert Q&A: Dr. Jim Furstenberg on Cybersecurity Education and Practice  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

ICS Vulnerability Intelligence Report: Key Insights and Recommendations

ICS Vulnerability

Overview

Cyble Research & Intelligence Labs (CRIL) has investigated key ICS vulnerabilities this week, providing critical insights issued by the Cybersecurity and Infrastructure Security Agency (CISA), focusing on multiple flaws in several ICS products.

During this reporting period, CISA issued four security advisories targeting vulnerabilities across various Industrial Control Systems, including those from ICONICS, Mitsubishi Electric, VIMESA, iniNet Solutions, and Deep Sea Electronics. These advisories pinpoint ICS vulnerabilities that security teams should prioritize for immediate patching to mitigate potential risks.

The recent vulnerability assessment has revealed a high-severity path traversal vulnerability in SpiderControl SCADA. The Deep Sea Electronics DSE855 has also been identified as susceptible to a configuration disclosure vulnerability. This issue enables unauthorized access to stored credentials via an HTTP GET request directed at the Backup.bin file.

ICS Vulnerabilities Overview

The Cyble Research & Intelligence Labs (CRIL) analysis details several critical vulnerabilities, providing essential information to help organizations prioritize their mitigation efforts. The following vulnerabilities were identified as the most vulnerable ones to look out for and patch immediately, if susceptible:

  • CVE-2024-7587: This vulnerability affects the ICONICS Suite, including products like GENESIS64 and Hyper Historian. This vulnerability is categorized as an issue of incorrect default permissions, which poses a high-severity risk to control systems such as DCS, SCADA, and BMS. A patch is available for this vulnerability.
  • CVE-2024-9692: This vulnerability relates to the Blue Plus Transmitter from VIMESA. It involves improper access control and is rated as medium severity, impacting communication units and transmitters. A link to the patch is provided for this issue as well. 
  • CVE-2024-10313: This vulnerability highlights a path traversal vulnerability in the SpiderControl HMI Editor from iniNet Solutions. This vulnerability is also classified as high severity and affects human-machine interface systems. A corresponding patch is accessible.
  • CVE-2024-5947: The last vulnerability, CVE-2024-5947, is related to DSE855 from Deep Sea Electronics. This medium-severity vulnerability is characterized by missing authentication, affecting communication units and transmitters. A patch link is available for users to address this vulnerability.

The severity overview reveals that all disclosed vulnerabilities fall into medium and high severity categories but need urgent attention.

Recommendations and Mitigations

To effectively address the identified vulnerabilities and upgrade defenses, organizations should consider the following best practices:

  1. Staying informed about security/patch advisories from vendors and regulatory bodies is crucial for timely updates.
  2. Organizations should implement a risk-based vulnerability management strategy to minimize the potential for exploitation.
  3. Threat intelligence analysts should actively monitor critical vulnerabilities published in CISA’s Known Exploited Vulnerabilities (KEV) catalog, especially those that are being actively exploited in the wild.
  4. Effective network segmentation can prevent attackers from conducting reconnaissance and lateral movements, thereby reducing the exposure of critical assets.
  5. Frequent vulnerability assessments and penetration testing are essential for identifying and rectifying security weaknesses.
  6. Implement physical barriers to prevent unauthorized access to devices and networks.
  7. An effective incident response plan outlines procedures for detecting, responding to, and recovering from security incidents. Regular testing and updates ensure its relevance to current threats.
  8. Ongoing cybersecurity training for all employees, particularly those with access to OT systems, is crucial. Training should cover recognizing phishing attempts, proper authentication practices, and adherence to security protocols.

Conclusion

The vulnerabilities identified in this ICS vulnerability intelligence report call for urgent prioritization from organizations to take apt cybersecurity measures. With threats continuously evolving and exploits discussed in underground forums, staying vigilant and proactive is essential.

Implementing the recommendations outlined above will help organizations protect their critical infrastructure and maintain system integrity, ultimately reducing the risk of potential exploitation of ICS vulnerabilities.

Sources: https://www.cisa.gov/news-events/alerts/2024/10/31/cisa-releases-four-industrial-control-systems-advisories

The post ICS Vulnerability Intelligence Report: Key Insights and Recommendations appeared first on Cyble.

Blog – Cyble – ​Read More

CISA Warns of Critical Vulnerabilities in Rockwell Automation’s FactoryTalk ThinManager

Rockwell Automation

Overview

The Cybersecurity and Infrastructure Security Agency (CISA) has alerted about new vulnerabilities in Rockwell Automation FactoryTalk ThinManager. The alert, designated ICSA-24-305-01, outlines serious security risks that could affect users of the software. With a CVSS v4 score of 9.3, these vulnerabilities demand immediate attention from security teams to safeguard industrial control systems.

The vulnerabilities identified in Rockwell Automation’s FactoryTalk ThinManager include “Missing Authentication for Critical Function” and “Out-of-Bounds Read.” These issues can allow remote attackers to manipulate databases or cause denial-of-service conditions.

The successful exploitation of these vulnerabilities poses a risk to users. Attackers could send specially crafted messages to FactoryTalk ThinManager devices, which might lead to serious consequences, including unauthorized database modifications or service disruptions.

Technical Details

Several versions of Rockwell Automation’s FactoryTalk ThinManager have been identified as vulnerable, including versions 11.2.0 to 11.2.9, 12.0.0 to 12.0.7, 12.1.0 to 12.1.8, 13.0.0 to 13.0.5, 13.1.0 to 13.1.3, 13.2.0 to 13.2.2, and version 14.0.0.

The first critical vulnerability, CVE-2024-10386, is categorized as “Missing Authentication for Critical Function” (CWE-306) and assigned a CVSS v3.1 base score of 9.8. This flaw allows network-accessible attackers to send crafted messages to FactoryTalk ThinManager, which could potentially result in database manipulation.

The second vulnerability, CVE-2024-10387, relates to an “Out-of-Bounds Read” (CWE-125) and poses a denial-of-service risk. It enables attackers with network access to send crafted messages that could disrupt FactoryTalk ThinManager’s operations. This vulnerability carries a CVSS v3.1 base score of 7.5 and a CVSS v4 score of 8.7, indicating a serious security concern.

Rockwell Automation has acknowledged these vulnerabilities, which significantly impact critical infrastructure sectors, particularly in manufacturing, and are deployed globally. To address the risks associated with these vulnerabilities, Rockwell Automation has made patches available for the affected versions on the FactoryTalk ThinManager download site and urges users to apply these updates without delay.

Additionally, users are advised to implement network hardening by restricting communications to TCP port 2031 only to necessary devices that require connection to the ThinManager. Following Rockwell Automation’s guidelines for security best practices is also encouraged to minimize risks in industrial automation control systems.

Recommendations from CISA

The Cybersecurity and Infrastructure Security Agency (CISA) recommends several defensive measures:

  1. Minimize network exposure for all control system devices, ensuring they are not accessible from the internet.
  2. Isolate control system networks and remote devices behind firewalls.
  3. Utilize secure methods for remote access, such as Virtual Private Networks (VPNs), while recognizing that these should be updated regularly.
  4. Perform comprehensive impact analysis and risk assessment before implementing defensive measures.
  5. Regularly review and apply security advisories from credible sources.

Conclusion

CISA encourages organizations to report any suspected malicious activity for tracking and correlation with other incidents. Currently, there have been no known public exploitations targeting these vulnerabilities.

Given the high severity of the vulnerabilities associated with Rockwell Automation’s FactoryTalk ThinManager, organizations must prioritize addressing these issues to maintain security within their industrial environments.

By adhering to recommended practices and implementing available patches, companies can reduce the risk of exploitation and protect their critical infrastructure.

Source: https://www.cisa.gov/news-events/ics-advisories/icsa-24-305-01

The post CISA Warns of Critical Vulnerabilities in Rockwell Automation’s FactoryTalk ThinManager appeared first on Cyble.

Blog – Cyble – ​Read More

Improvements to our SIEM for Q3 2024 | Kaspersky official blog

Clearly, the sooner malicious actions come to the attention of security solutions and experts, the more effectively they’re able to minimize, or even prevent damage. Therefore, while working on new detection rules for our SIEM system named the Kaspersky Unified Monitoring and Analysis Platform, we pay special attention to identifying attackers’ activity at the very initial stage of an attack, when they try to collect information about infrastructure. We’re talking about activity related to the discovery tactics according to the Enterprise Matrix MITRE ATT&CK Knowledge Base classification.

Modern attackers are increasingly paying attention to containerization infrastructure, which is where rather dangerous vulnerabilities are sometimes found. For example, our May report on exploits and vulnerabilities describes the CVE-2024-21626 vulnerability, which allows for a container escape. That’s why in our Q3 2024 SIEM system update, among the rules for identifying atypical behavior that may indicate attacker activity at the initial data collection stage, we’ve added detection rules that catch (i) attempts to collect data on the containerization infrastructure, and (ii) traces of various attempts to manipulate the containerization system itself.

This was done by adding detection rules R231, R433, and R434, which are already available to Kaspersky Unified Monitoring and Analysis Platform users through the rule update system. In particular, they’re used to detect and correlate the following events:

  • access to credentials inside a container;
  • launching a container on a non-container system;
  • launching a container with excessive privileges;
  • launching a container with access to host resources;
  • collecting information about containers using standard tools;
  • searching for weak spots in containers using standard tools;
  • searching for security vulnerabilities in containers using special utilities.

Considering the above-described update, there are now more than 659 rules available on the platform, including 525 rules with direct detection logic.

We continue to align our detection rules with the Enterprise Matrix MITRE ATT&CK Knowledge Base, which today describes 201 techniques, 424 sub-techniques, and thousands of procedures. As of today our solution covers 344 MITRE ATT&CK techniques and sub-techniques.

In addition, we’ve improved many old rules by correcting or adjusting conditions – for example, to reduce the number of false positives.

New and improved normalizers

In the latest update, we’ve also added to our SIEM system normalizers that allow you to work with the following event sources:

  • [OOTB] OpenLDAP
  • [OOTB] Avaya Aura Communication Manager syslog
  • [OOTB] Orion soft Termit syslog
  • [OOTB] Postfix
  • [OOTB] Barracuda Web Security Gateway syslog
  • [OOTB] Parsec ParsecNET
  • [OOTB] NetApp SnapCenter file
  • [OOTB] CommuniGate Pro
  • [OOTB] Kaspersky Industrial CyberSecurity for Networks 4.2 syslog
  • [OOTB] Yandex Cloud
  • [OOTB] Barracuda Cloud Email Security Gateway syslog

Our experts have also improved normalizers for these sources:

  • [OOTB] Yandex Browser
  • [OOTB] Citrix NetScaler syslog
  • [OOTB] KSC from SQL
  • [OOTB] Microsoft Products for KUMA 3
  • [OOTB] Gardatech Perimeter syslog
  • [OOTB] KSC PostgreSQL
  • [OOTB] Linux auditd syslog for KUMA 3.2
  • [OOTB] Microsoft Products via KES WIN
  • [OOTB] PostgreSQL pgAudit syslog
  • [OOTB] ViPNet TIAS syslog

You can find the full list of supported event sources in the Kaspersky Unified Monitoring and Analysis Platform version 3.2 in the technical support section of our web site, where you can also get more information about correlation rules. We’ll continue to write about improvements to our SIEM system in future posts that can be found via the SIEM tag.

Kaspersky official blog – ​Read More

How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN

Network traffic analysis provides critical insights into malware and phishing attacks. Doing it effectively requires using proper tools like ANY.RUN’s Interactive Sandbox. It simplifies the entire process, letting you investigate threats with ease and speed.

Take a look at the key ways you can monitor and analyze network activity with the service.

Connections 

Examining network connections involves looking at source and destination IP addresses, ports, URLs, and protocols. During this process, you can observe all activities that may pose a risk to the system, such as connections to known malicious domains and attempts to access external resources. 

To correlate the network activity with other behaviors or components of the malware, ANY.RUN identifies the process name and Process Identifier (PID) initiating the connection. This allows you to gain a better understanding of the threat’s functionality and purpose. 

In the Connections section, additional attributes like the country (CN) and Autonomous System Number (ASN) provide context for the geographical location and the organization managing the IP address. 

The service also lists DNS requests that help you identify malicious domains used for Command & Control (C&C) communication or phishing campaigns. 

Use Case: Identifying Agent Tesla’s Data Exfiltration Attempt  

Consider the following sandbox session. Here, we can discover a malicious connection to an external server. 

Malicious connection identified by the ANY.RUN sandbox and marked with a flame icon 

We can navigate to the process that started this connection (PID 6904) to see the details.  

The sandbox shows that the process connected to a server controlled by attackers 

The service displays two signatures related to the connection, which specify that it was made to a server suspected of data theft over the SMTP port. The sandbox also links the process of Agent Tesla, a malware family used by cyber criminals for remote control and data exfiltration.  

Suricata rule used for detecting Agent Tesla’s malicious connection

Thanks to ANY.RUN’s integration of Suricata IDS, you can discover triggered detection rules by navigating to the Threats tab. The detection of data exfiltration over SMTP in this case is done without decryption. The sandbox relies solely on specific sequences of packet lengths characteristic of sending victim data. 

HTTP Requests and Content 

ANY.RUN provides comprehensive analysis of HTTP requests and their content. To access header information, simply navigate to the Network tab. Here, you’ll find a detailed list of all HTTP requests recorded by the sandbox.

You can investigate HTTP Requests in detail in ANY.RUN

Click on a specific request to view its headers, which include information such as the request method, user-agent, cookies, and response status codes. 

ANY.RUN also offers static analysis of the resources transmitted as part of HTTP requests and responses. These may include HTML pages, binary, and other types of files. The sandbox extracts their metadata and strings. 

Use Case: Discovering a Server for Collecting Stolen Passwords 

When investigating phishing attacks, it is sometimes necessary to check which server ends up receiving the passwords entered by victims on a malicious webpage. To accomplish this task, we need to enable Man-in-the-Middle (MITM) Proxy. 

Switching on MITM Proxy takes just one click in the VM setup window 

The feature acts as an intermediary between the malware and the server, allowing analysts to intercept and decrypt even HTTPS traffic, typically used for secure communication. 

ANY.RUN allows you to interact with the VM including by entering text

Here is an example of a typical attack that is designed to trick users into entering their real login credentials on a fake webpage. 

Please Note

Under no circumstances should you enter real credentials when analyzing threats in the ANY.RUN sandbox. Instead, use a non-existent test email and password.

After we enter a fake password, we need to navigate to the HTTP request section. Here, we need to start reviewing the HTTP POST requests, beginning with the most recent connection by time.

The fake password we entered which was exfiltrated via Telegram

 In most cases, you will be able to understand which server the web page is communicating with. In our example, the stolen data is being sent to Telegram. 

Access MITM Proxy and other PRO features of ANY.RUN
for free 



Get 14-day trial


Use Case: Collecting Information on Attackers’ Telegram Infrastructure 

Here is analysis of XWorm malware sample that connects to a Telegram bot for exfiltrating data collected on the infected system. 

Thanks to MITM Proxy, we can decrypt the traffic between the host and the Telegram bot.

Bot token and chat_id are found in the query string

By examining the header of a GET request sent by XWorm we can identify a Telegram bot token along with the id of the chat controlled by attackers where information on successful infections is sent.  

Using the bot token and chat id, we can gain access to the data exfiltrated from other systems infected by the same sample. 

Packets 

Packet capture involves intercepting and recording network packets as they are sent and received by the system. In ANY.RUN, you can determine the specific data being transmitted and received, which can include sensitive information, commands, or exfiltrated data.  

Through this detailed examination, you can uncover the structure and content of network packets, including the headers and payloads, which can reveal the nature of the communication. For instance, tracking the information contained in outgoing packets aids in identifying what data was stolen, such as passwords, logins, and cookies. 

To study network traffic packets effectively, you can use the Network stream window. Simply select the connection you’re interested in to access RAW network stream data. Received packets are blue, while sent ones are green. 

Use Case: Investigating a Pass-the-Hash Attack 

Let’s consider the following sandbox analysis. Here, we can observe a theft of an NTLM hash via a malicious web page. 

About NTLM

NTLM (NT LAN Manager) authentication is a challenge-response protocol used by Microsoft Windows to verify user credentials.

It involves hashing a user’s password with the MD4 algorithm to create an NTLM hash, which is then used to encrypt a server-sent challenge. NTLM relay attacks intercept and reuse these hashes to impersonate users on other services, enabling unauthorized access without cracking the hash.

Accessing 10dsecurity[.]com led to compromising the system’s NTLM hash  

Once we enable MITM Proxy, we can see how the attack is executed. It starts with the victim’s browser sending a request to access an HTML page, which triggers a redirect to an Impacket SMB server hosted on 10dsecurity[.]com. 

Impacket is a Python-based toolkit designed for working with network protocols that can be used for harvesting NTLM authentication data. 

The sent and received packets of the host’s communication with the SMB server

When the victim’s browser attempts to access the redirected resource via SMB, the Impacket-SMBServer intercepts the request and captures the following information: 

  • The victim’s IP address 
  • NTLM Challenge Data 
  • The victim’s username 
  • The victim’s computer name 
Suricata IDS detection rule used for identifying an impacket SMB server with a Wireshark filter

ANY.RUN allows us to download PCAP data for further examination in specialized software like Wireshark. To make it easier to identify the connection of our interest, we can collect a display filter right from the sandbox. 

Analysis of the captured packets in Wireshark  

Once we upload the data to the program and paste the filter, we can once again determine that it is indeed an impacket SMB server.  

Conclusion 

Packet capture, payload analysis, protocol dissection, DNS requests, and connection analysis are essential components of this process. By leveraging these techniques, security analysts can gain a comprehensive understanding of malicious activities, enabling them to develop effective countermeasures and protect against evolving cyber threats. 

About ANY.RUN  

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI LookupYARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

  • Detect malware in seconds. 
  • Interact with samples in real time. 
  • Save time and money on sandbox setup and maintenance 
  • Record and study all aspects of malware behavior. 
  • Collaborate with your team 
  • Scale as you need. 

Request free trial → 

The post How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

IT Vulnerability Report: Fortinet, SonicWall, Grafana Exposures Top 1 Million

1 million vulnerable Fortinet and SonicWall devices

Overview

Cyble Research and Intelligence Labs (CRIL) researchers investigated 17 vulnerabilities and nine dark web exploits during the period of Oct. 23-29, and highlighted seven vulnerabilities that merit high-priority attention from security teams.

This week’s IT vulnerability report affects an unusually high number of exposed devices and instances: Vulnerabilities in Fortinet, SonicWall, and Grafana Labs can be found in more than 1 million web-facing assets, and a pair of 10.0-severity vulnerabilities in CyberPanel have already been mass-exploited in ransomware attacks.

Security teams should assess which of these vulnerabilities are present in their environments and the risks they pose and apply patches and mitigations promptly.

The Week’s Top IT Vulnerabilities

Here are the top IT vulnerabilities identified by Cyble threat intelligence researchers this week.

CVE-2024-40766: SonicWall SonicOS

CVE-2024-40766 is a 9.8-severity improper access control vulnerability in the administrative interface and controls in the SonicOS operating system used for managing SonicWall’s network security appliances and firewalls. Managed security firm Arctic Wolf has reported that Fog and Akira ransomware operators are increasingly exploiting this vulnerability in SSL VPN environments to gain an initial foothold to compromise networks. 

Cyble has detected more than 486,000 internet-exposed devices with this vulnerability, making it a critically important priority for security teams.

CVE-2024-47575 and CVE-2024-23113: Fortinet FortiOS and FortiManager

Fortinet environments are under attack from threat actors exploiting a pair of recent 9.8-severity vulnerabilities: CVE-2024-47575, also known as “FortiJump,” is a vulnerability in Fortinet FortiManager that allows an attacker to execute arbitrary code or commands via specially crafted requests. Recently, researchers disclosed that the threat actor tracked as UNC5820 has been exploiting the flaw since at least June 27, 2024.

For more than a week before the October 23 disclosure of CVE-2024-47575, security researchers were concerned that Fortinet was slow in disclosing a FortiManager zero-day known to be under exploitation. However, it appears that a week before the CVE was released, Fortinet notified customers of a FortiManager vulnerability and provided some recommended mitigations. Some FortiManager customers reported that they didn’t get that communication, suggesting a need for a clearer advisory process. Fortinet update its guidance on the vulnerability yesterday.

Cyble researchers also observed threat actors on a cybercrime forum discussing exploits of CVE-2024-23113, a critical vulnerability in multiple versions of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager that allows remote, unauthenticated attackers to execute arbitrary code through specially crafted requests.

Cyble has identified 62,000 exposed instances of the FortiManager vulnerability, and 427,000 internet-facing Fortinet devices exposed to CVE-2024-23113 (see graphic below).

Exposed assets for the top vulnerabilities (Cyble research)

CVE-2024-9264: Grafana Labs

CVE-2024-9264 is a 9.4-severity vulnerability in the SQL Expressions experimental feature of Grafana, an open-source analytics and monitoring platform developed by Grafana Labs. It is designed to visualize and analyze data from various sources through customizable dashboards. This feature allows for the evaluation of ‘duckdb’ queries containing user input. These queries are insufficiently sanitized before being passed to ‘duckdb,’ leading to a command injection and local file inclusion vulnerability.

Cyble reported 209,000 internet-facing Grafana instances exposed to the vulnerability.

CVE-2024-51567 and CVE-2024-51568: CyberPanel

CVE-2024-51567 and CVE-2024-51568  are critical vulnerabilities in CyberPanel, an open-source web hosting control panel designed to simplify server management, particularly for those using the LiteSpeed web server. NVD has yet to rate the vulnerabilities, but MITRE has assigned them each a 10.0. CVE-2024-51567 is a flaw in upgrademysqlstatus in databases/views.py, which allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, and was exploited in the wild in October in a massive PSAUX ransomware attack.

CVE-2024-51568 is a command Injection flaw via completePath in the ProcessUtilities.outputExecutioner() sink.

Nearly 33,000 CyberPanel instances are exposed to these vulnerabilities, more than half of which have been targeted in mass ransomware and cryptominer attacks.

CVE-2024-46483: Xlight FTP Server

CVE-2024-46483 is a critical integer overflow vulnerability still undergoing analysis that affects Xlight FTP Server, a high-performance file transfer server for Windows designed to facilitate secure and efficient FTP and SFTP (SSH2) file transfers. The flaw lies in the packet parsing logic of the SFTP server, which can lead to a heap overflow with attacker-controlled content. Multiple organizations across various sectors use this server because of its Active Directory and LDAP integration functionalities. Cyble assesses that attackers could leverage this vulnerability in campaigns due to the availability of public Proof of Concepts (PoC).

Vulnerabilities and Exploits on Underground Forums

CRIL researchers observed multiple Telegram channels and cybercrime forums where channel administrators shared or discussed exploits weaponizing a number of vulnerabilities, some of which were discussed above. Others include:

CVE-2024-9464: A critical OS command injection vulnerability found in Palo Alto Networks’ Expedition tool, which allows an attacker to execute arbitrary OS commands as root, potentially leading to the disclosure of sensitive information.

CVE-2024-42640: A critical vulnerability affecting the angular-base64-upload library, specifically in versions prior to v0.1.21. This vulnerability allows remote code execution (RCE) through the demo/server.php endpoint, enabling attackers to upload arbitrary files to the server.

CVE-2024-3656: A high-risk vulnerability affecting Keycloak versions prior to 24.0.5. The vulnerability allows low-privilege users to access certain endpoints in Keycloak’s admin REST API, enabling them to perform actions reserved for administrators.

CVE-2024-9570: A critical buffer overflow vulnerability in the D-Link DIR-619L B1 router, specifically in firmware version 2.06, occurs in the ‘formEasySetTimezone’ function. The issue arises when the ‘curTime’ argument is manipulated, leading to a situation where an attacker can execute arbitrary code remotely.

CVE-2024-46538: A critical cross-site scripting (XSS) vulnerability in pfSense version 2.5.2 allows attackers to execute arbitrary web scripts or HTML by injecting a ‘crafted payload’ into the $pconfig variable, specifically through the ‘interfaces_groups_edit.php’ file.

CVE-2024-21305: A vulnerability identified as a Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass allows attackers to circumvent HVCI protections, enabling the execution of unauthorized code on affected systems running versions of Windows and Windows Server OS.

CVE-2024-23692: A critical vulnerability affecting the Rejetto HTTP File Server (HFS) that allows unauthenticated remote code execution (RCE) through a command injection flaw.

Cyble Recommendations

To protect against these vulnerabilities and exploits, organizations should implement the following best practices:

  • To mitigate vulnerabilities and protect against exploits, regularly update all software and hardware systems with the latest patches from official vendors.
  • Develop a comprehensive patch management strategy that includes inventory management, patch assessment, testing, deployment, and verification. Automate the process where possible to ensure consistency and efficiency.
  • Divide your network into distinct segments to isolate critical assets from less secure areas. Use firewalls, VLANs, and access controls to limit access and reduce the attack surface exposed to potential threats.
  • Create and maintain an incident response plan that outlines procedures for detecting, responding to, and recovering from security incidents. Regularly test and update the plan to ensure its effectiveness and alignment with current threats.
  • Implement comprehensive monitoring and logging solutions to detect and analyze suspicious activities. Use SIEM (Security Information and Event Management) systems to aggregate and correlate logs for real-time threat detection and response.
  • Subscribe to security advisories and alerts from official vendors, CERTs, and other authoritative sources. Regularly review and assess the impact of these alerts on your systems and take appropriate actions.
  • Conduct regular vulnerability assessment and penetration testing (VAPT) exercises to identify and remediate vulnerabilities in your systems. Complement these exercises with periodic security audits to ensure compliance with security policies and standards.

Conclusion

These vulnerabilities highlight the urgent need for security teams to prioritize patching critical vulnerabilities in major products and those that could be weaponized as entry points for wider attacks. With increasing discussions of these exploits on dark web forums, organizations must stay vigilant and proactive. Implementing strong security practices is essential to protect sensitive data and maintain system integrity.

The post IT Vulnerability Report: Fortinet, SonicWall, Grafana Exposures Top 1 Million appeared first on Cyble.

Blog – Cyble – ​Read More