Page 16 - Threat Intelligence 12-13-2019
P. 16

Web / Internet Threats















        AWS has new tool for those leaky S3 buckets so, yeah, you might need to reconfigure a few things. At its
        re:Invent event under way in Las Vegas, Amazon Web Services (AWS) dropped the veil on a new tool to help
        customers to avoid spewing data stored on its S3 (Simple Storage) service to world+dog. "Access Analyzer for
        S3 is a new feature that monitors your access policies, ensuring that the policies provide only the intended
        access to your S3 resources," the cloud giant said. Customers can enable Access Analyzer via a new option in
        the console for IAM (Identity and Access Management). The tool will then alert you when a bucket (an area of
        storage in S3) is configured to allow public access or access to other AWS accounts. The implication of the tool,
        of course, is that this is sometimes done accidentally via misconfigured policies or access control lists (ACLs).

                Source: https://www.theregister.co.uk/2019/12/03/aws_s3_buckets/



        Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the Azure Accounts.
        Researchers discovered a critical vulnerability in Microsoft Azure named “BlackDirect” that allows attackers to
        take over the Azure user’s accounts and creating the Token with the victim’s permissions. The vulnerability
        specifically affected Microsoft’s OAuth 2.0 applications that allow malicious attacker access and control a
        victim’s account. “OAuth is a protocol for authorization that is commonly used as a way for end-users to grant
        websites or applications access to their information from other websites without giving the website or app
        secrets or passwords.” In the next generation, OAuth2 allows third-party applications to grant limited access to
        an HTTP service and accessing clients might be a website or mobile application.
                Source:  https://ctovision.com/critical-vulnerability-in-microsoft-azure-let-hackers-take-over-the-
                complete-control-of-the-azure-accounts/



        Estimating Emotet’s size and reach. As many of you will be aware, Emotet, one of the most dangerous botnets
        in operation, restarted its malicious activity on 16th September 2019. Since its resurgence, Spamhaus Malware
        Labs has been closely monitoring and studying Emotet’s activity. Here’s what we’ve uncovered... One of the
        most noticeable changes that we observed over the past three months was that Emotet had predominantly
        spammed Microsoft Office documents containing malicious macros. This differed significantly from its old
        modus operandi of mixing both infected Office documents and URLs in its malware campaigns. We found this
        rather odd, as most anti-spam solutions these days tend to block or quarantine, by default, all Office
        documents that include macros with suspicious functions like CreateProcess, ShellExecute, etc. We initially
        deduced from this change in behavior that the cyber-criminals using Emotet considered this to be the most
        cost-effective solution. However, over the past few days (approximately 6th December 2019), we are once
        again observing the inclusion of malware URLs. Perhaps those anti-spam solutions were proving too efficient
        at blocking the macro-enabled MS Office documents?
                Source: https://www.spamhaus.org/news/article/791/estimating-emotets-size-and-reach









                                                    www.accumepartners.com
                                                                                                                    16
   11   12   13   14   15   16   17   18   19   20   21