Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 24 (June 12, 2023)

Le piratage de la société Xplain, une véritable bombe à retardement pour la Suisse

Dans l’ombre des attaques de sites web, le piratage du prestataire informatique Xplain a mis à nu 907 gigaoctets de données hautement sensibles, touchant plusieurs services de l’Etat

XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek

Microsoft addressed two XSS vulnerabilities in Azure Bastion and Azure Container Registry (ACR) leading to unauthorized access to sessions.

Des données personnelles aussi touchées lors de la cyberattaque contre la Confédération - rts.ch - Suisse

Outre des données opérationnelles de la Confédération, l'attaque informatique par rançongiciel contre l'entreprise bernoise Xplain a permis de mettre la main sur des informations concernant des particuliers, affirme Le Matin Dimanche.

Piratage: la Suisse est très mauvaise élève de la cybersécurité

Des dizaines de milliers de serveurs présentent des failles de sécurité en Suisse. La Confédération ne fait pas grand-chose pour remédier à la situation.

Hijacking S3 Buckets: New Attack Technique

Without altering a single line of code, attackers poisoned the NPM package “bignum” by hijacking the S3 bucket serving binaries necessary for its function and replacing them with malicious ones

Microsoft says early June disruptions to Outlook, cloud platform, were cyberattacks

Microsoft says the early June disruptions to its Microsoft’s flagship office suite — including the Outlook email apps — were denial-of-service attacks by a shadowy new hacktivist group. In a blog post published Friday evening after The Associated Press sought clarification on the sporadic but serious outages, Microsoft confirmed that that they were DDoS attacks by a group calling itself Anonymous Sudan, which some security researchers believe is Russia-affiliated. The software giant offered few details on the attack. It did not comment on how many customers were affected.

A simple bug exposed access to thousands of smart security alarm systems

The vulnerability — now fixed — was discovered in a cloud-based system that allows customers to remotely manage their security alarm systems.

Cyberattaques massives contre la Suisse, huit questions pour analyser une semaine folle

La guerre s’est invitée dans le cyberespace suisse avec fracas cette semaine, le groupe de hackers NoName visant des dizaines de cibles. Il faudra mieux se préparer face à des attaques qui pourraient s’intensifier, avertissent trois experts

A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

‘Several’ US federal agencies affected by MOVEit breach

Top U.S. cybersecurity officials confirmed Thursday that several federal agencies have been impacted by cyberattacks on the widely used MOVEit file transfer tool.

Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly told reporters that her team and the FBI are working to provide assistance to federal agencies that used MOVEit, which is being exploited by the Russia-based Clop ransomware gang in a widespread breach that appears to have compromised dozens of entities.

“We’ve been working closely with Progress Software [which makes MOVEit], the FBI and our federal partners to understand its prevalence within federal agencies,” she said. Earlier in the day, CNN first reported that several government agencies were compromised in the hacks. Easterly said that CISA is providing support to “several agencies that have experienced intrusions of their MOVEit applications.”

Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China

Mandiant is investigating a Barracuda ESG appliance zero-day vulnerability being exploited in the wild.

Suspected LockBit ransomware affiliate arrested, charged in US

Russian national Ruslan Magomedovich Astamirov was arrested in Arizona and charged by the U.S. Justice Department for allegedly deploying LockBit ransomware on the networks of victims in the United States and abroad.

Fake Security Researcher GitHub Repositories Deliver Malicious Implant

VulnCheck discovers a network of fake security researcher accounts promoting hidden malware.

Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes

Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes

Ransomware gang lists first victims of MOVEit mass-hacks, including US banks and universities | TechCrunch

The hackers responsible for exploiting a flaw to target users of a popular file transfer tool has begun listing victims of the mass-attacks

Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave

Over the past few days, we have seen phishing attacks that use a combination of compromised Microsoft 365 accounts and .rpmsg encrypted emails to deliver the phishing message.

Ce qui se cache derrière les cyberattaques pro-russes contre la Suisse

Le groupe d'hacktivistes pro-russe «NoName057(16)» poursuit sans relâche ses attaques contre des serveurs suisses. Voici leur organisation sur Telegram.

Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard (DEV-0586), including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.

The Phantom Menace: Brute Ratel remains rare and targeted

The commercial attack tool’s use by bad actors has faded after an initial flurry, while Cobalt Strike remains the go-to post-exploitation tool for many.

Cyberattaque contre l'entreprise Xplain: les premiers résultats des analyses indiquent que des mesures sont nécessaires

Berne, 14.06.2023 - Depuis la révélation de l'attaque par rançongiciel qui a visé l'entreprise Xplain, des examens approfondis sont en cours à l'administration fédérale. Les analyses effectuées jusqu'à présent montrent que les données dérobées comprennent aussi des données opérationnelles de diverses autorités et organisations. Le but est maintenant de comprendre comment ces données se sont retrouvées sur l'infrastructure de l'entreprise Xplain.

TAG Aviation: Black Basta pirate une compagnie romande

La société TAG Aviation a été victime d'une attaque par ransomware. Les recherches de watson révèlent que Black Basta est à l'origine de cette attaque.

Switzerland under cyberattack

The Swiss government is under DDoS attacks, but several ransomware gangs have also turned their sights on other Swiss organizations.

Microsoft June 2023 Patch Tuesday fixes 78 flaws, 38 RCE bugs

Today is Microsoft's June 2023 Patch Tuesday, with security updates for 78 flaws, including 38 remote code execution vulnerabilities.

Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign

Affected Platforms: FortiOS
Impacted Users: Targeted at government, manufacturing, and critical infrastructure
Impact: Data loss and OS and file corruption
Severity Level: Critical

Today, Fortinet published a CVSS Critical PSIRT Advisory (FG-IR-23-097 / CVE-2023-27997) along with several other SSL-VPN related fixes. This blog adds context to that advisory, providing our customers with additional details to help them make informed, risk-based decisions, and provides our perspective relative to recent events involving malicious actor activity.

Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was

When Lexfo Security teased a critical pre-authentication RCE bug in FortiGate devices on Saturday 10th, many people speculated on the practical impact of the bug. Would this be a true, sky-is-falling level vulnerability like the recent CVE-2022-42475? Or was it some edge-case hole, requiring some unusual and exotic requisite before any exposure? Others even went further, questioning the legitimacy of the bug itself. Details were scarce and guesswork was rife.

CVE-2023-34362

On May 31, 2023, Progress Software disclosed a critical SQL injection vulnerability that was later assigned CVE-2023-34362. Rapid7 has observed exploitation in…

Attaque DDoS contre l’administration fédérale: plusieurs applications et sites Internet ne sont plus accessibles

Lundi 12 juin 2023, plusieurs sites Internet de la Confédération étaient ou sont encore inaccessibles, en raison d’une attaque DDoS menée contre ses systèmes. Celle-ci a été rapidement détectée par les spécialistes de l’administration fédérale, qui travaillent actuellement à rétablir dans les plus brefs délais l’accès aux applications et sites Internet touchés.

Sites officiels paralysés: L’administration fédérale suisse fait l’objet d’une attaque informatique | 24 heures

L’entité «NoName» a pris pour cible des sites officiels de l’administration, comme FedPol, lundi matin lors d’une cyberattaque.

Microsoft 365 sous le feu nourri d'attaques DDoS Dominique Filippone , publié le 09 Juin 2023

Revendiquée par un cyberpirate dénommé Anonymous Sudan, une série d'attaques a paralysé pendant plusieurs jours de multiples services cloud de Microsoft dont Outlook, SharePoint et OneDrive. Les difficultés de l'éditeur à assurer une remise en service complète dans ce laps de temps interroge.

How North Korea’s Hacker Army Stole $3 Billion in Crypto, Funding Nuclear Program

Regime has trained cybercriminals to impersonate tech workers or employers, amid other schemes

Shell Recharge security lapse exposed EV drivers’ data

Oil giant Shell said it is investigating after a security researcher found an exposed internal database spilling the personal information of drivers who use the company’s electric vehicle charging stations.