infosec.exchange
Open in
urlscan Pro
2a04:4e42:400::820
Public Scan
URL:
https://infosec.exchange/@screaminggoat/113314746053792994
Submission: On November 14 via api from IN — Scanned from CA
Submission: On November 14 via api from IN — Scanned from CA
Form analysis
0 forms found in the DOMText Content
Mastodon Create accountLogin RECENT SEARCHES No recent searches SEARCH OPTIONS Only available when logged in. infosec.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse. A Mastodon instance for info/cyber security-minded people. ADMINISTERED BY: Merry Jerry ️ @jerry SERVER STATS: 14K active users infosec.exchange: About · Profiles directory · Privacy policy Mastodon: About · Get the app · Keyboard shortcuts · View source code · v4.4.0-alpha.1+glitch POSTS AND REPLIES Not Simon @screaminggoat ENFeatures an attached preview cardPublic Microsoft Security Response Center (MSRC) security advisories: * CVE-2024-38208 [msrc.microsoft.com] (6.1 medium) Microsoft Edge for Android Spoofing Vulnerability (Note: Unknown if publicly disclosed since it's not populated) * CVE-2024-38209 [msrc.microsoft.com] (7.8 high) Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability * CVE-2024-38210 [msrc.microsoft.com] (7.8 high) Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability * CVE-2024-41879 [msrc.microsoft.com] (score pending) Adobe: CVE-2024-41879 Adobe PDF Viewer Remote Code Execution Vulnerability * CVE-2024-43477 [msrc.microsoft.com] (7.5 high) Entra ID Elevation of Privilege Vulnerability (Note: The vulnerability documented by this CVE requires no customer action to resolve) * CVE-2024-7971 [msrc.microsoft.com] Chromium: CVE-2024-7971 Type confusion in V8 * Google is aware that an exploit for CVE-2024-7971 exists in the wild. * CVE-2024-38178 [msrc.microsoft.com] (7.5 high, disclosed 13 August 2024 as an exploited zero-day) Scripting Engine Memory Corruption Vulnerability (updated the acknowledgements only) Notes: * Microsoft Edge has been updated to version 128.0.2739.42, which is based on Chromium version 128.0.6613.84/.85. This includes patching against the actively exploited zero-day CVE-2024-7971. * Besides CVE-2024-7971, I skipped mentioning 19 other vulnerabilities that Google publicly announced yesterday [chromereleases.googleblog.com]. * It's worth noting that Microsoft credited AhnLab and National Cyber Security Center (NCSC), Republic of Korea for reporting CVE-2024-38178. AhnLab Security Emergency Response Center (ASEC) has historically tracked various North Korean state-sponsored APTs such as Kimsuky, Reaper (Scarcruft), Andariel, and Lazarus. This is speculation but it's likely that CVE-2024-38178 was exploited by North Korean APTs, even though it's not their usual flavor of zero-day vulnerabilities (Bring Your Own Vulnerable Driver). msrc.microsoft.comSecurity Update Guide - Microsoft Security Response Center #Microsoft#MSRC#vulnerability…and 12 more Aug 22 Not Simon @screaminggoat ENThis toot is a replyFeatures an attached preview cardPublic anyone read Korean? ASEC: ASEC and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178) [asec.ahnlab.com] See parent toot for information on CVE-2024-38178. AhnLab SEcurity intelligence Center (ASEC) and Korea's National Cyber Security Center (NCSC) published a joint report "Operation Code on Toast by TA-RedAnt" confirming that the DPRK actor known as Scarcruft (APT37) exploited CVE-2024-38178 as a zero-day: * This operation exploited a zero-day vulnerability in IE to utilize a specific toast ad program that is installed alongside various free software. * TA-RedAnt first attacked the Korean online advertising agency server for ad programs to download ad content. They then injected vulnerability code into the server’s ad content script. This vulnerability is exploited when the ad program downloads and renders the ad content. As a result, a zero-click attack occurred without any interaction from the user. * This vulnerability occurs when one type of data is mistakenly treated as another during the optimization process of IE’s JavaScript engine (jscript9.dll), allowing type confusion to occur. TA-RedAnt exploited this vulnerability to trick victims into downloading malware on their desktops with the toast ad program installed. After infecting the system, various malicious behaviors can be performed, such as remote commands. ASEC · Oct 15ASEC and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178) - ASECAhnLab SEcurity intelligence Center (ASEC) and the National Cyber Security Center (NCSC) have discovered a new zero-day vulnerability in the Microsoft Internet Explorer (IE) browser and have conducted a detailed analysis on attacks that exploit this vulnerability. This post shares the joint analysis report “Operation Code on Toast by TA-RedAnt” which details the findings of […] #northkorea#apt#scarcruft…and 11 more Oct 15 Not Simon @screaminggoat@infosec.exchange Scarcruft/APT37 Indicators of Compromise: * ad_toast : e11bb2478930d0b5f6c473464f2a2B6e * 43 : b9d4702c1b72659f486259520f48b483 * 23 : b18a8ea838b6760f4857843cafe5717d * MOVE : da2a5353400bd5f47178cd7dae7879c5 * ban04.bak(top_08.bak,content) : bd2d599ab51f9068d8c8eccadaca103d * operating_system.rb : Varies by infected PC * 1st loader : Varies by infected PC * secondary loader : Varies by infected PC * RokRAT : Varies by infected PC #threatintel#northkorea#cyberespionage…and 7 more Oct 15, 2024, 07:30 PM·Public 1boost·3favorites ExploreLive feeds -------------------------------------------------------------------------------- Mastodon is the best way to keep up with what's happening. Follow anyone across the fediverse and see it all in chronological order. No algorithms, ads, or clickbait in sight. Create accountLogin -------------------------------------------------------------------------------- About Drag & drop to upload