Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
16 résultats taggé VMWare  ✕
VMware Patches Remote Code Execution Flaw Found in Chinese Hacking Contest https://www.securityweek.com/vmware-patches-remote-code-execution-flaw-found-in-chinese-hacking-contest/
17/09/2024 21:52:46
QRCode
archive.org

VMware warned that an attacker with network access could send a specially crafted packet to execute remote code. CVSS severity score 9.8/10.

securityweek EN 2024 CVE-2024-38812 CVE-2024-38813 VMware RCE vulnerability
Operation Crimson Palace: A Technical Deep Dive – Sophos News https://news.sophos.com/en-us/2024/06/05/operation-crimson-palace-a-technical-deep-dive/
06/06/2024 20:40:09
QRCode
archive.org
thumbnail

Sophos Managed Detection and Response initiated a threat hunt across all customers after the detection of abuse of a vulnerable legitimate VMware executable (vmnat.exe) to perform dynamic link library (DLL) side-loading on one customer’s network. In a search for similar incidents in telemetry, MDR ultimately uncovered a complex, persistent cyberespionage campaign targeting a high-profile government organization in Southeast Asia. As described in the first part of this report, we identified at least three distinct clusters of intrusion activity present in the organization’s network from at least March 2023 through December 2023.

The three security threat activity clusters—which we designated as Alpha (STAC1248), Bravo (STAC1870), and Charlie (STAC1305) – are assessed with high confidence to operate on behalf of Chinese state interests. In this continuation of our report, we will provide deeper technical analysis of the three activity clusters, including the tactics, techniques, and procedures (TTPs) used in the campaign, aligned to activity clusters where possible. We also provide additional technical details on prior compromises within the same organization that appear to be connected to the campaign.

sophos EN 2024 TTPs VMware cyberespionage Alpha STAC1248 Bravo STAC1870 Charlie STAC1305
VMware fixes three zero-day bugs exploited at Pwn2Own 2024 https://www.bleepingcomputer.com/news/security/vmware-fixes-three-zero-day-bugs-exploited-at-pwn2own-2024/
14/05/2024 19:58:47
QRCode
archive.org
thumbnail

VMware fixed four security vulnerabilities in the Workstation and Fusion desktop hypervisors, including three zero-days exploited during the Pwn2Own Vancouver 2024 hacking contest.
#Computer #Hypervisor #InfoSec #Pwn2Own #Security #VMware #Zero-Day

Zero-Day Pwn2Own Computer VMware InfoSec Hypervisor Security
VMSA-2023-0023 https://www.vmware.com/security/advisories/VMSA-2023-0023.html
25/10/2023 23:47:03
QRCode
archive.org
thumbnail

VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities

vmware EN 2023 vulnerability VMSA-2023-0023 CVE-2023-34048 advisory
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation https://blog.talosintelligence.com/weaknesses-mac-os-vmware-msrpc/
14/07/2023 09:47:57
QRCode
archive.org
thumbnail

Cisco Talos discovered 12 memory corruption vulnerabilities in MSRPC implementations on Apple macOS and VMWare vCenter.
      - Seven vulnerabilities affect Apple macOS only.
      - Two vulnerabilities affect VMWare vCenter.
      - Three vulnerabilities affect both.

talosintelligence EN 2023 MSRPC macOS VMWare vCenter vulnerabilities
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass
27/06/2023 21:45:57
QRCode
archive.org
thumbnail

Additional techniques UNC3886 utilized across multiple organizations to evade EDR solutions.

mandiant EN 2023 ESXi Zero-Day CVE-2023-20867 CVE-2022-22948 VMware
VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest https://www.securityweek.com/vmware-patches-critical-vulnerability-disclosed-at-pwn2own-hacking-contest/
26/04/2023 11:27:38
QRCode
archive.org
thumbnail

VMware this week released patches for a critical vulnerability disclosed at the Pwn2Own Vancouver 2023 hacking contest.

securityweek EN 2023 VMware critical vulnerability Pwn2Own CVE-2023-20869
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/
05/02/2023 12:57:29
QRCode
archive.org
thumbnail

Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution vulnerability to deploy ransomware.

bleepingcomputer EN 2023 ESXiArgs Nevada-Ransomware Ransomware VMware Vmware-ESXi
Ransomware : des centaines de serveurs VMware ESXi pris dans une vaste campagne https://www.lemagit.fr/actualites/365530273/Ransomware-vaste-campagne-contre-les-serveurs-VMware-ESXi
05/02/2023 10:52:27
QRCode
archive.org
thumbnail

Déclenchée ce vendredi 3 février, une vaste campagne d’infection avec ransomware frappe les serveurs VMware ESXi à travers le monde. La France ne fait pas exception. L’échelle suggère une opération automatisée.

lemagit FR 2023 VMware ESXiArgs ESXi VMware infection France
Campagne d’exploitation d’une vulnérabilité affectant VMware ESXi https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/
05/02/2023 10:51:57
QRCode
archive.org

Le 03 février 2023, le CERT-FR a pris connaissance de campagnes d'attaque ciblant les hyperviseurs VMware ESXi dans le but d'y déployer un rançongiciel.

Dans l'état actuel des investigations, ces campagnes d'attaque semblent exploiter la vulnérabilité CVE-2021-21974, pour laquelle un correctif est disponible depuis le 23 février 2021. Cette vulnérabilité affecte le service Service Location Protocol (SLP) et permet à un attaquant de réaliser une exploitation de code arbitraire à distance.

Les systèmes actuellement visés seraient des hyperviseurs ESXi en version 6.x et antérieures à 6.7.

CERT-FR FR 2023 VMware ESXi ESXiArgs Advisory
A Custom Python Backdoor for VMWare ESXi Servers https://blogs.juniper.net/en-us/threat-research/a-custom-python-backdoor-for-vmware-esxi-servers
14/12/2022 08:44:25
QRCode
archive.org
thumbnail

Juniper Threat Labs analyzes a backdoor installed on a compromised VMware ESXi server that can execute arbitrary commands and launch reverse shells.

juniper EN 2022 VMware ESXi python
Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability https://www.fortinet.com/blog/threat-research/multiple-malware-campaigns-target-vmware-vulnerability
24/10/2022 07:01:03
QRCode
archive.org
thumbnail

n April, VMware patched a vulnerability CVE-2022-22954. It causes server-side template injection because of the lack of sanitization on parameters “deviceUdid” and “devicetype”. It allows attackers to inject a payload and achieve remote code execution on VMware Workspace ONE Access and Identity Manager. FortiGuard Labs published Threat Signal Report about it and also developed IPS signature in April.

fortinet EN 2022 VMware CVE-2022-22954 vulnerability Campaigns deviceUdid devicetype
The Evolution of the Chromeloader Malware - VMware Security Blog - VMware https://blogs.vmware.com/security/2022/09/the-evolution-of-the-chromeloader-malware.html
21/09/2022 23:39:47
QRCode
archive.org

The VMware Carbon Black MDR team goes in depth on the latest variants of the Chromeloader malware and how to detect them.

vmware EN 2022 Chromeloader malware IoCs Analysis
IAM Whoever I Say IAM :: Infiltrating VMWare Workspace ONE Access Using a 0-Click Exploit https://srcincite.io/blog/2022/08/11/i-am-whoever-i-say-i-am-infiltrating-vmware-workspace-one-access-using-a-0-click-exploit.html
27/08/2022 15:57:56
QRCode
archive.org

On March 2nd, I reported several security vulnerabilities to VMWare impacting their Identity Access Management (IAM) solution. In this blog post I will discu...

srcincite EN 2022 0-Click VMWare IAM WorkspaceOne vulnerabilities
Chinese Hackers Target VMware Horizon Servers with Log4Shell to Deploy Rootkit https://thehackernews.com/2022/04/chinese-hackers-target-vmware-horizon.html?m=1&s=09
01/04/2022 12:44:09
QRCode
archive.org
thumbnail

A Chinese advanced persistent threat tracked as Deep Panda has been observed exploiting the Log4Shell vulnerability in VMware Horizon servers to deploy a backdoor and a novel rootkit on infected machines with the goal of stealing sensitive data.

Chine VMware Horizon Log4Shell Rootkit DeepPanda EN 2022
VMware Horizon servers are under active exploit by Iranian state hackers https://arstechnica.com/information-technology/2022/02/iranian-state-hackers-are-using-log4shell-to-infect-unpatched-vmware-servers/?s=09
18/02/2022 18:24:25
QRCode
archive.org
thumbnail

Hackers aligned with the government of Iran are exploiting the critical Log4j vulnerability to infect unpatched VMware users with ransomware, researchers said on Thursday.

arstechnica log4shell EN 2022 TunnelVision Iranian VMware Horizon CVE-2021-44228
4252 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio