GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 15-Jan-2024 00:39:14 JST Kevin Beaumont Kevin Beaumont

    I have written a #ConnectAround scanner and I’m scanning the internet’s to see exposure level, if you spot me in your logs. #threatintel

    In conversation Monday, 15-Jan-2024 00:39:14 JST from cyberplace.social permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 16-Jan-2024 18:51:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The finders of #ConnectAround have updated their blog to say 1700 orgs have been compromised, not less than 10 https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/

      If you use Pulse Secure, you probably want to find an IR firm.

      #threatintel

      In conversation Tuesday, 16-Jan-2024 18:51:16 JST permalink

      Attachments


    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 16-Jan-2024 22:45:44 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • Rich Warren

      If you use the Ivanti integrity checking tool, the results it gives are encrypted and can only be read by Ivanti support.

      Since there are thousands of #ConnectAround victims, this doesn’t scale. To compensate you can decrypt the results yourself now: https://gist.github.com/rxwx/03a036d8982c9a3cead0c053cf334605 HT @buffaloverflow

      #threatintel

      In conversation Tuesday, 16-Jan-2024 22:45:44 JST permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/111/765/928/647/707/169/original/80595e7a42518683.jpeg
      2. Domain not in remote thumbnail source whitelist: github.githubassets.com
        Encrypt and decrypt Pulse Secure configuration files (no password)
        from rxwx
        Encrypt and decrypt Pulse Secure configuration files (no password)
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 16-Jan-2024 22:50:28 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • Rich Warren

      Unfortunately it looks like Ivanti have been a bit naughty with CVE allocation too. @buffaloverflow #ConnectAround

      In conversation Tuesday, 16-Jan-2024 22:50:28 JST permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/111/765/947/222/722/879/original/4a7d5d12e5cc27e5.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 16-Jan-2024 23:49:43 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Complete exploitation info for #ConnectAround is now public. https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805

      It’s a chaotic mix of ../../ directory traversal and open APIs… if you haven’t applied the mitigations you’re going to have a really bad time as ransomware groups will jump on the train soon. #threatintel

      In conversation Tuesday, 16-Jan-2024 23:49:43 JST permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/111/766/180/009/335/003/original/6cc99c1170bfda8d.jpeg
      2. Domain not in remote thumbnail source whitelist: attackerkb.com
        CVE-2023-46805 | AttackerKB
        An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted reso…
    • Embed this notice
      RecklessPush38671 (recklesspush38671@infosec.exchange)'s status on Wednesday, 17-Jan-2024 02:47:36 JST RecklessPush38671 RecklessPush38671
      in reply to

      @GossiTheDog I'm getting a gateway error for this link. Did they take the article down?

      In conversation Wednesday, 17-Jan-2024 02:47:36 JST permalink
    • Embed this notice
      Tod Beardsley (todb@infosec.exchange)'s status on Wednesday, 17-Jan-2024 06:02:46 JST Tod Beardsley Tod Beardsley
      in reply to
      • Rich Warren

      @GossiTheDog @buffaloverflow You might want to double check that assigning CNA.

      https://www.cve.org/cverecord?id=CVE-2024-21887

      Maybe it’s one issue that has several vectors. Haven’t looked myself yet since I’m on vacation.

      But the CVE isn’t issued by Ivanti, technically.

      In conversation Wednesday, 17-Jan-2024 06:02:46 JST permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 17-Jan-2024 08:46:15 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Palo-Alto are tracking 30k boxes exposed to #ConnectAround

      https://unit42.paloaltonetworks.com/threat-brief-ivanti-cve-2023-46805-cve-2024-21887/

      #threatintel

      In conversation about a year ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/111/768/289/838/733/999/original/046778af3782a717.jpeg
      2. Domain not in remote thumbnail source whitelist: unit42.paloaltonetworks.com
        Threat Brief: Ivanti Vulnerabilities CVE-2023-46805 and CVE-2024-21887
        from Unit 42
        Ivanti VPNs can be exploited by CVE-2023-46805 (High severity) and CVE-2024-21887 (Critical severity), chained together to run commands without authentication.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 18-Jan-2024 05:14:27 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Amazing - first mass spraying of #ConnectAround by notChina and they’re delivering.. coin miners. 🤣🤣🤣

      https://infosec.exchange/@greynoise/111773096176640713

      #threatintel

      In conversation about a year ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 19-Jan-2024 00:54:28 JST Kevin Beaumont Kevin Beaumont
      in reply to

      I strongly suspect there are a whole bunch of large orgs running incidents for #ConnectAround now.

      Why? Pulse Secure boxes which didn't have the mitigation supplied have stopped responding totally for over a day.. when Shodan history shows they've been running on same IP for years.

      In conversation about a year ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 19-Jan-2024 20:06:15 JST Kevin Beaumont Kevin Beaumont
      in reply to

      https://www.assetnote.io/resources/research/high-signal-detection-and-exploitation-of-ivantis-pulse-connect-secure-auth-bypass-rce
      #ConnectAround #threatintel

      In conversation about a year ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: assets-global.website-files.com
        High Signal Detection and Exploitation of Ivanti's Pulse Connect Secure Auth Bypass & RCE
        Last week, Ivanti disclosed two critical vulnerabilities affecting Ivanti Pulse Connect Secure - CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Remote Command Execution).
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Saturday, 20-Jan-2024 08:18:18 JST Kevin Beaumont Kevin Beaumont
      in reply to

      IPs exploiting #ConnectAround to RCE

      https://viz.greynoise.io/query/?gnql=last_seen%3A1d%20AND%20spoofable%3Afalse%20AND%20%28tags%3A%22Ivanti%20Connect%20Secure%20%28ICS%29%20RCE%20Attempt%22%29

      #threatintel

      In conversation about a year ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: viz.greynoise.io
        GreyNoise Visualizer
        At GreyNoise, we collect and analyze untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet.
    • Embed this notice
      VessOnSecurity (bontchev@infosec.exchange)'s status on Saturday, 20-Jan-2024 17:44:28 JST VessOnSecurity VessOnSecurity
      in reply to

      @GossiTheDog Is there a way to find remotely if an Ivanti setup has been compromised? Not just vulnerable but actually compromised?

      In conversation about a year ago permalink
    • Embed this notice
      VessOnSecurity (bontchev@infosec.exchange)'s status on Saturday, 20-Jan-2024 17:49:45 JST VessOnSecurity VessOnSecurity

      @GossiTheDog You mean, they drop webshells?

      The reason I asked is because I haven't seen stats of how many devices are compromised - only how many are vulnerable or how many are trying to exploit.

      If the only way to detect a compromised device is to access it via the webshell, this could explain this lack of statistics - it would be essentially hacking into the device, which would be illegal.

      In conversation about a year ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 23-Jan-2024 04:47:44 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Latest #ConnectAround issue - there’s no patch, and the mitigation silently fails to work if an admin makes a config change elsewhere.

      If you run Pulse Secure I’d suggest being very cautious.

      https://www.bleepingcomputer.com/news/security/ivanti-vpn-appliances-vulnerable-if-pushing-configs-after-mitigation/

      #threatintel

      In conversation about a year ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.bleepstatic.com
        Ivanti: VPN appliances vulnerable if pushing configs after mitigation
        from @BleepinComputer
        Ivanti warned admins to stop pushing new device configurations to appliances after applying mitigations because this will leave them vulnerable to ongoing attacks exploiting two zero-day vulnerabilities.
    • Embed this notice
      paulw6533 (paulw6533@cyberplace.social)'s status on Wednesday, 24-Jan-2024 22:21:40 JST paulw6533 paulw6533
      in reply to

      @GossiTheDog - Ivanti said patches would be available from w/c 22nd Jan, its Wednesday and still no patch this week. When will they take security seriously and release a proper patch?

      In conversation about a year ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 31-Jan-2024 07:33:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Latest on #ConnectAround - the vendor promised patches weeks later, but hasn’t been hitting its own milestones to release said patches.

      https://www.securityweek.com/ivanti-struggling-to-hit-zero-day-patch-release-schedule/

      #threatintel

      In conversation about a year ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.securityweek.com
        Ivanti Struggling to Hit Zero-Day Patch Release Schedule
        from @https://www.twitter.com/ryanaraine/
        Ivanti is struggling to hit its own timeline for the delivery of patches for critical -- and already exploited -- flaws in its flagship VPN appliances.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 31-Jan-2024 20:34:27 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • fthy

      More hilarity on #ConnectAround - there’s now two NEW vulnerabilities in Ivanti Pulse Secure, being actively exploited as zero days too - no patches.

      Updated advisory with updated mitigations you need to reapply:
      https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

      CVEs: CVE-2024-21893 and CVE-2024-21888

      CERT advisory: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-205101-1032.pdf?__blob=publicationFile&v=2

      HT @fthy

      #threatintel

      In conversation about a year ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Ivanti Community

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.