Quotidien Hebdomadaire Mensuel

Quotidien Shaarli

Tous les liens d'un jour sur une page.

January 29, 2025

(Non-US) :: DSL-3788 :: H/W Rev. Ax/Bx :: F/W v1.01R1B036_EU_EN :: Unauthenticated Remote Code Execution (RCE) Vulnerability

On November 25, 2024, a third party, from SECURE NETWORK BVTECH, reported the D-Link DSL-3788 hardware revision B2 with firmware version vDSL-3788_fw_revA1_1.01R1B036_EU_EN or below, of a Unauthenticated Remote Code Execution (RCE) vulnerability.

When D-Link became aware of the reported security issues, we promptly started investigating and developing security patches. Patches were release within the 90-day of the report of the vulnerabilities.

New TorNet backdoor seen in widespread campaign

Cisco Talos discovered an ongoing malicious campaign operated by a financially motivated threat actor targeting users, predominantly in Poland and Germany.

  • The actor has delivered different payloads, including Agent Tesla, Snake Keylogger, and a new undocumented backdoor we are calling TorNet, dropped by PureCrypter malware.
  • The actor is running a Windows scheduled task on victim machines—including on endpoints with a low battery—to achieve persistence.
  • The actor also disconnects the victim machine from the network before dropping the payload and then connects it back to the network, allowing them to evade detection by cloud antimalware solutions.
  • We also found that the actor connects the victim’s machine to the TOR network using the TorNet backdoor for stealthy command and control (C2) communications and detection evasion.
Cyber-attacks: three individuals added to EU sanctions list for malicious cyber activities against Estonia

The Council imposed restrictive measures on three individuals involved in cyber-attacks against Estonia.

After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online

The Chaos Computer Club demands that the trust service provider D-Trust take responsibility and abolish the hacker paragraph.

Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor

Salt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has breached at least nine U.S.-based telecommunications companies with the intent to target high profile government and political figures. Tenable Research examines the tactics, techniques and procedures of this threat actor.

Updated: Frederick Health takes systems offline due to ransomware attack

Frederick Health Hospital's emergency department was not accepting new patients on Monday morning, according to a state emergency medical services website.

Unmasking FleshStealer: A New Infostealer Threat in 2025

We dive into FleshStealer, a new strain of information-stealing malware—explaining what it is and its potential impact on organizations.

OpenAI launches ChatGPT Gov for U.S. government agencies

OpenAI on Tuesday announced the launch of ChatGPT for government agencies in the U.S. ...It allows government agencies, as customers, to feed “non-public, sensitive information” into OpenAI’s models while operating within their own secure hosting environments, OpenAI CPO Kevin Weil told reporters during a briefing Monday.