Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Threat Intelligence Report - 17th August to 23rd August 2020

Threat Intelligence Report - 17th August to 23rd August 2020

Published by Red Piranha, 2020-09-03 09:49:21

Description: Trends
The top attacker country was China with 176327 unique attackers (37.00%).
The top Trojan C&C server detected was Heodo with 49 instances detected.
The top phishing campaign detected was against Facebook accounts with 236 instances detected.

Read more:

Keywords: cybersecurity, next-generation firewall, UTM gateway penetration testing compliance, Australian firewall manufacturer


Read the Text Version

Trends The top attacker country was China with 176327 unique attackers (37.00%). The top Trojan C&C server detected was Heodo with 49 instances detected. The top phishing campaign detected was against Facebook accounts with 236 instances detected. Top Attackers By Country Country Occurences Percentage China 176327 37.00% Australia 99681 21.00% United States 75072 16.00% Canada 22671 4.00% India 21806 4.00% Netherlands 6588 1.00% Indonesia 6439 1.00% Hong Kong 5695 1.00% United Kingdom 4846 1.00% France 4055 0% Russia 3409 0% Sweden 3242 0% Japan 3239 0% Singapore 2113 0% Germany 1923 0% Malaysia 1772 0% Chile 1623 0% Thailand 950 0%

Top Attackers by Country 10.4% China Australia 39.9% United States Canada India Other 17% 22.6% Threat Geo-location 950 176,327 Occurrences 20076 Top Attacking Hosts 18523 8170 Host 7767 5482 4859 4735 4189 3282 3251 3242 3239 3234 3231 3227 Top Attackers 30,000 20,000 10,000 0 112.8…49.88.…112.8…112.8…222.1…103.1…34.20…222.1…198.9…192.2…192.3…202.1…192.2…192.3…198.4… Top Network Attackers ASN Country Name CHINA169-BACKBONE CHINA UNICOM 4837 China China169 Backbone, CN CHINANET-BACKBONE No.31,Jin-rong 4134 China Street, CN CHINANET-JIANGSU-PROVINCE-IDC AS 23650 China Number for CHINANET jiangsu province backbone, CN 133441 South Korea CLOUDITIDC-KR CloudITIDC Global, HK 14618 United States AMAZON-AES, US TISCALI-UK TalkTalk Communications 9105 United Kingdom Limited, GB DNIC-AS-01508, US 1508 United States NARC-EROOT, US 21556 United States I-ROOT DNS root name server i.root-, SE 29216 Sweden M-ROOT-DNS WIDE Project, JP BROOT-AS, US 7500 Japan COGENT-2149, US 394353 United States VGRS-AC24, US VRSN-AC50-340, US 2149 France VRSN-AC50-340, US VRSN-AC50-340, US VRSN-AC50-340, US VRSN-AC50-340, US 32651 396549 396566 396570 United States VRSN-AC28, US VRSN-AC28, US 396571 396574 397197 397203 Remote Access Trojan C&C Servers Found Name Number Discovered Location , , Anubis 3 FlexNet 1

Heodo 49 , , , , Nexus 1 , , PurpleWave 1 , , TrickBot 2 , , , , UAdmin 13 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Common MalwTroajarneC&C Servers Detected MD5 VirusTotal FileName Claimed Product Detection Name PUA.Win.File.Seguraz https://www.virustotal. Anubis com/gui/file/449f4a4 Heodo Win.Exploit.Shadowbr 179c09b866c90632 524c06e798193c1d3 54083216b55693e6 2b2a2712c727d819983.863c%8598336738705 SAService.exe SAServiTcreickBot to.talos Win.Trojan.Generic::in1 392d4d8/details UAdmin 0.talos Other PUA.Win.Dropper.Seg https://www.virustotal. urazo::tpd com/gui/file/85b936 N/A W32.9836CF123C- 8c80dd97c3752592 960fbe5100c170b77 100.SBX.TG 7c1e549cb59bcbf3 7e1647ce9f0f01e3ab Eter.exe qmreportupload 9742dfc23f37cb082 70% SAService 5b30b5/details N/A https://www.virustotal. com/gui/file/3f6e3d8 47b97de62ae8b2b9 741da950451668c8 27542aa5d7f3c858 333a4958330e9624 qmreportupload.exe 5be1d592fcaa485f4e e4eadb3/details https://www.virustotal. com/gui/file/8b4216a 34560233e751b7e9 7dca580ae569f90b71b14284f118a7b6ea6 SAService.exe 5f155b6f61e7419a 590c2440004ea4db 5becc9/details https://www.virustotal. com/gui/file/9836cf1 26b2996b69542d03 23caa799eaf57a449 226a60f6-4340- 9c303e2fee6dac81 ba6da0cdecf0445f5 45e9-9b01- 8a8238fa0d98b19e9 d95106369b83 3cdb22/details Top Phishing Campaigns Count 21 Phishing Target 1425 PayPal 10 Other 8 8 Microsoft 236 RuneScape 1 Facebook 6 Netflix 14 Halifax 1 Virustotal 2 Yahoo 6 LinkedIn 4 Adobe 1 Google 3 EE 2 Apple Steam CVEs with Recently Discovered Exploits This is a list of recent vulnerabilities for which exploits are available.

CVE, Title, Vendor Description CVSS v3.1 Base Date Created Date Updated Score 08/20/2020 08/21/2020 A remote code execution 08/19/2020 vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio CVE-2020-1147 when the software Microsoft Sharepoint fails to check the CVSSv3BaseScore:7. Server Remote Code source markup of 8(AV:L/AC:L/PR:N/UI: 07/14/2020 Execution XML file input. An R/S:U/C:H/I:H/A:H) Vulnerability attacker who Microsoft successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who CVE-2020- successfully exploited 1464 this vulnerability could CVSSv3BaseScore:5. 08/17/2020 Microsoft Windows bypass security 3(AV:L/AC:L/PR:N/UI: Spoofing Vulnerability features and load R/S:U/C:L/I:L/A:L) improperly signed Microsoft files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded A use-after-free vulnerability could allow remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. The CVE-2020- specific flaw exists 9715 within the handling of ESObject data CVSSv3BaseScore:7. Adobe Acrobat objects. The issue 8(AV:L/AC:L/PR:N/UI: 08/19/2020 Reader User After results from the lack R/S:U/C:H/I:H/A:H) Free Vulnerability of validating the existence of an object Adobe prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.

A vulnerability in Cisco DNA Center software could allow an unauthenticated remote attacker access to sensitive information on an affected system. The vulnerability is due to CVE-2020-3411 improper handling of authentication tokens Cisco DNA Center by the affected CVSSv3BaseScore:7. Information software. An attacker 5(AV:N/AC:L/PR:N/UI: 08/17/2020 08/21/2020 Disclosure could exploit this N/S:U/C:H/I:N/A:N) 07/30/2020 Vulnerability vulnerability by sending a crafted Cisco HTTP request to an affected device. A successful exploit could allow the attacker access to sensitive device information, which includes configuration files. An Out of bound write happens in the component QoS DSCP when mapping due to improper input validation for data received from association response CVE-2020- frame in Qualcomm 3698 Snapdragon Auto, Snapdragon Qualcomm Out-Of- Compute, CVSSv3BaseScore:9. 07/30/2020 Bounds Memory Snapdragon 8(AV:N/AC:L/PR:N/UI: Corruption Consumer Electronics N/S:U/C:H/I:H/A:H) Vulnerability Connectivity, Qualcomm Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music and Snapdragon Wearables (ChipSoftware).

vBulletin allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_p CVE-2019- hp routestring 16759 request. The vulnerability was vBulletin Remote disclosed through an CVSSv3BaseScore:9. 08/19/2020 Code Execution 18-line exploit that 8(AV:N/AC:L/PR:N/UI: 09/24/2019 08/20/2020 Vulnerability was published on N/S:U/C:H/I:H/A:H) vBulletin Monday by an unidentified person. The exploit allows unauthenticated attackers to remotely execute malicious code on just about any vBulletin server. A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow CVE-2020- an authenticated, 3433 local attacker to perform a DLL Cisco AnyConnect hijacking attack. The CVSSv3BaseScore:7. 08/17/2020 Secure Mobility Client vulnerability is due to 8(AV:L/AC:L/PR:L/UI: for Windows DLL insufficient validation N/S:U/C:H/I:H/A:H) Hijacking Vulnerability of resources that are loaded by the Cisco application at run time. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges.

Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook