<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[DoTheNeedful Forums - Cybersecurity]]></title>
		<link>https://dotheneedful.online/forums/</link>
		<description><![CDATA[DoTheNeedful Forums - https://dotheneedful.online/forums]]></description>
		<pubDate>Sun, 05 Apr 2026 17:29:54 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Gibby's Cybersecurity Roundup 4/4/2025]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=42</link>
			<pubDate>Fri, 04 Apr 2025 18:26:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=3">gibby</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=42</guid>
			<description><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the third edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
Well, look at that! The usual suspects in the software world apparently took a collective "no new critical flaws this week" vacation. So, instead of our regularly scheduled panic, let's dive into the KEV list – the Hall of Shame for bugs <span style="font-style: italic;" class="mycode_i">already</span> being used to cause trouble. And wouldn't you know it, this week's inductees are all bringing the high-stakes drama! <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> </span><span style="font-size: large;" class="mycode_size">Google Chrome Zero-day Vulnerability Exploited in the Wild (CVE-2025-2783)</span><br />
<a href="https://threatprotect.qualys.com/2025/03/26/google-chrome-zero-day-vulnerability-exploited-in-the-wild-cve-2025-2783/" target="_blank" rel="noopener" class="mycode_url">https://threatprotect.qualys.com/2025/03...2025-2783/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Cisco Smart Licensing Utility Vulnerabilities</span><br />
<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...u-7gHMzWmw</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Apache Tomcat CVE-2025-24813</span><br />
<a href="https://www.rapid7.com/blog/post/2025/03/19/etr-apache-tomcat-cve-2025-24813-what-you-need-to-know/" target="_blank" rel="noopener" class="mycode_url">https://www.rapid7.com/blog/post/2025/03...d-to-know/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Google's Kyle Chrzanowski says big companies need robot overlords for their digital who's-who, automating everything from birth (account creation) to death (access revocation) of employee identities. Apparently, tackling the messy middle of governance before a massive single sign-on migration is the smart way to avoid a chaotic digital identity crisis. <br />
<a href="https://www.googlecloudcommunity.com/gc/Community-Blog/The-Director-s-Guide-IAM-Security-at-Scale/ba-p/882952" target="_blank" rel="noopener" class="mycode_url">https://www.googlecloudcommunity.com/gc/...a-p/882952</a><br />
<br />
Sophos detailed this week that evilnginx is still remarkably effective in grabbing credentials and MFA codes<br />
<a href="https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/" target="_blank" rel="noopener" class="mycode_url">https://news.sophos.com/en-us/2025/03/28...-evilginx/</a><br />
<br />
Checkpoint reassures its customers that the bad guys are "totally lying" about what they were able to get into and steal and to trust them instead: <br />
<a href="https://support.checkpoint.com/results/sk/sk183307" target="_blank" rel="noopener" class="mycode_url">https://support.checkpoint.com/results/sk/sk183307</a><br />
<br />
China hackers are *still* exploiting buffer overflow flaw in Ivanti's Connect Secure, Policy Secure, and ZTA gateway products. CVE-2025-22457, released in February was originally marked as "low severity" and now that bad guys are kicking in the door reliably, they reconsidered and have classified the flaw as "critical." Idiots.<br />
<a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457" target="_blank" rel="noopener" class="mycode_url">https://forums.ivanti.com/s/article/Apri...2025-22457</a><br />
<br />
Don't use DMARC? Don't expect Outlook, Live, and Hotmail accounts to get your messages then. After May 5, DMARC is mandatory to get messages to inboxes. <br />
<a href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/strengthening-email-ecosystem-outlook%E2%80%99s-new-requirements-for-high%E2%80%90volume-senders/4399730" target="_blank" rel="noopener" class="mycode_url">https://techcommunity.microsoft.com/blog...rs/4399730</a><br />
<br />
After *WEEKS* of denying it, Oracle finally acknowledged a breach occurred, surprising absolutely no one<br />
<a href="https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen" target="_blank" rel="noopener" class="mycode_url">https://www.bloomberg.com/news/articles/...ata-stolen</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Stratus Red Team is a tool by Datadog that can “detonate” offensive attack techniques against a live cloud environment so you can validate that your detections work as expected. I’m highlighting here that the docs now provide coverage matrices of MITRE ATT&amp;CK tactics and techniques currently covered for different cloud platforms: AWS, Azure, GCP, Kubernetes, Entra ID, and EKS.<br />
<a href="https://stratus-red-team.cloud/attack-techniques/mitre-attack-coverage-matrices" target="_blank" rel="noopener" class="mycode_url">https://stratus-red-team.cloud/attack-te...e-matrices</a><br />
<br />
Wiz has launched a new site for security teams to track critical cloud vulnerabilities, offering handy filters like technology and exploit status. Now you can finally stop manually sifting through endless CVEs and let Wiz be your cloud's most wanted poster.<br />
<a href="https://www.wiz.io/vulnerability-database" target="_blank" rel="noopener" class="mycode_url">https://www.wiz.io/vulnerability-database</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
By Thalium comes a Rust-powered digital bloodhound for Linux, sniffing out sneaky kernel-level rootkits with its fancy integrity checks. It's like giving your kernel a superhero sidekick, but instead of a cape, it wields the Linux Rust API.<br />
<a href="https://github.com/thalium/rkchk" target="_blank" rel="noopener" class="mycode_url">https://github.com/thalium/rkchk</a><br />
<br />
This tool sniffs out Google Workspace Domain-Wide Delegation slip-ups in Google Cloud, essentially showing you where you left the keys to the digital kingdom under the doormat. Consider it your auditor for those "oops, did I leave that open?" moments in your GCP setup.<br />
<a href="https://github.com/n0tspam/delepwn" target="_blank" rel="noopener" class="mycode_url">https://github.com/n0tspam/delepwn</a><br />
<br />
ServiceNow, the cloud platform that promised IT zen, turns out to have some hidden ninja stars, according to MDSec's Tim Carrington. Apparently, you can weaponize its own features like custom actions and discovery scripts to run rogue code and generally cause digital mayhem.<br />
<a href="https://www.mdsec.co.uk/2025/03/red-teaming-with-servicenow" target="_blank" rel="noopener" class="mycode_url">https://www.mdsec.co.uk/2025/03/red-team...servicenow</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
I sure hope you have a wonderful rest of your week.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the third edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
Well, look at that! The usual suspects in the software world apparently took a collective "no new critical flaws this week" vacation. So, instead of our regularly scheduled panic, let's dive into the KEV list – the Hall of Shame for bugs <span style="font-style: italic;" class="mycode_i">already</span> being used to cause trouble. And wouldn't you know it, this week's inductees are all bringing the high-stakes drama! <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> </span><span style="font-size: large;" class="mycode_size">Google Chrome Zero-day Vulnerability Exploited in the Wild (CVE-2025-2783)</span><br />
<a href="https://threatprotect.qualys.com/2025/03/26/google-chrome-zero-day-vulnerability-exploited-in-the-wild-cve-2025-2783/" target="_blank" rel="noopener" class="mycode_url">https://threatprotect.qualys.com/2025/03...2025-2783/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Cisco Smart Licensing Utility Vulnerabilities</span><br />
<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...u-7gHMzWmw</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Apache Tomcat CVE-2025-24813</span><br />
<a href="https://www.rapid7.com/blog/post/2025/03/19/etr-apache-tomcat-cve-2025-24813-what-you-need-to-know/" target="_blank" rel="noopener" class="mycode_url">https://www.rapid7.com/blog/post/2025/03...d-to-know/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Google's Kyle Chrzanowski says big companies need robot overlords for their digital who's-who, automating everything from birth (account creation) to death (access revocation) of employee identities. Apparently, tackling the messy middle of governance before a massive single sign-on migration is the smart way to avoid a chaotic digital identity crisis. <br />
<a href="https://www.googlecloudcommunity.com/gc/Community-Blog/The-Director-s-Guide-IAM-Security-at-Scale/ba-p/882952" target="_blank" rel="noopener" class="mycode_url">https://www.googlecloudcommunity.com/gc/...a-p/882952</a><br />
<br />
Sophos detailed this week that evilnginx is still remarkably effective in grabbing credentials and MFA codes<br />
<a href="https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/" target="_blank" rel="noopener" class="mycode_url">https://news.sophos.com/en-us/2025/03/28...-evilginx/</a><br />
<br />
Checkpoint reassures its customers that the bad guys are "totally lying" about what they were able to get into and steal and to trust them instead: <br />
<a href="https://support.checkpoint.com/results/sk/sk183307" target="_blank" rel="noopener" class="mycode_url">https://support.checkpoint.com/results/sk/sk183307</a><br />
<br />
China hackers are *still* exploiting buffer overflow flaw in Ivanti's Connect Secure, Policy Secure, and ZTA gateway products. CVE-2025-22457, released in February was originally marked as "low severity" and now that bad guys are kicking in the door reliably, they reconsidered and have classified the flaw as "critical." Idiots.<br />
<a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457" target="_blank" rel="noopener" class="mycode_url">https://forums.ivanti.com/s/article/Apri...2025-22457</a><br />
<br />
Don't use DMARC? Don't expect Outlook, Live, and Hotmail accounts to get your messages then. After May 5, DMARC is mandatory to get messages to inboxes. <br />
<a href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/strengthening-email-ecosystem-outlook%E2%80%99s-new-requirements-for-high%E2%80%90volume-senders/4399730" target="_blank" rel="noopener" class="mycode_url">https://techcommunity.microsoft.com/blog...rs/4399730</a><br />
<br />
After *WEEKS* of denying it, Oracle finally acknowledged a breach occurred, surprising absolutely no one<br />
<a href="https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen" target="_blank" rel="noopener" class="mycode_url">https://www.bloomberg.com/news/articles/...ata-stolen</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Stratus Red Team is a tool by Datadog that can “detonate” offensive attack techniques against a live cloud environment so you can validate that your detections work as expected. I’m highlighting here that the docs now provide coverage matrices of MITRE ATT&amp;CK tactics and techniques currently covered for different cloud platforms: AWS, Azure, GCP, Kubernetes, Entra ID, and EKS.<br />
<a href="https://stratus-red-team.cloud/attack-techniques/mitre-attack-coverage-matrices" target="_blank" rel="noopener" class="mycode_url">https://stratus-red-team.cloud/attack-te...e-matrices</a><br />
<br />
Wiz has launched a new site for security teams to track critical cloud vulnerabilities, offering handy filters like technology and exploit status. Now you can finally stop manually sifting through endless CVEs and let Wiz be your cloud's most wanted poster.<br />
<a href="https://www.wiz.io/vulnerability-database" target="_blank" rel="noopener" class="mycode_url">https://www.wiz.io/vulnerability-database</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
By Thalium comes a Rust-powered digital bloodhound for Linux, sniffing out sneaky kernel-level rootkits with its fancy integrity checks. It's like giving your kernel a superhero sidekick, but instead of a cape, it wields the Linux Rust API.<br />
<a href="https://github.com/thalium/rkchk" target="_blank" rel="noopener" class="mycode_url">https://github.com/thalium/rkchk</a><br />
<br />
This tool sniffs out Google Workspace Domain-Wide Delegation slip-ups in Google Cloud, essentially showing you where you left the keys to the digital kingdom under the doormat. Consider it your auditor for those "oops, did I leave that open?" moments in your GCP setup.<br />
<a href="https://github.com/n0tspam/delepwn" target="_blank" rel="noopener" class="mycode_url">https://github.com/n0tspam/delepwn</a><br />
<br />
ServiceNow, the cloud platform that promised IT zen, turns out to have some hidden ninja stars, according to MDSec's Tim Carrington. Apparently, you can weaponize its own features like custom actions and discovery scripts to run rogue code and generally cause digital mayhem.<br />
<a href="https://www.mdsec.co.uk/2025/03/red-teaming-with-servicenow" target="_blank" rel="noopener" class="mycode_url">https://www.mdsec.co.uk/2025/03/red-team...servicenow</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
I sure hope you have a wonderful rest of your week.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Gibby's Cybersecurity Roundup 3/21/25]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=33</link>
			<pubDate>Thu, 20 Mar 2025 19:51:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=3">gibby</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=33</guid>
			<description><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the second edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
First, lets get started with this weeks new vulnerabilities. While this list is not exhaustive-- there were a touch more than 600 new CVEs assigned this week-- it does cover some of the more popular and higher-risk ones. <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> Apach</span><span style="font-size: large;" class="mycode_size">e Tomcat vulnerability exploited 30 hours after security bulletin released, confluence admins collectively groan in unison.</span><span style="font-size: medium;" class="mycode_size">  </span><br />
Can't make this up-- just 30 hours after the release of the vuln, hackers had a extremely effective and really good exploit for the tomcat service. So, you might want to <a href="https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html" target="_blank" rel="noopener" class="mycode_url">patch this if you haven't already!</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> A Vulnerability in Veeam allows attackers to execute code remotely; because why not?</span><br />
<span style="font-size: small;" class="mycode_size">Veeam has had some doosies lately, but this one is pretty up there. Domain joined backup servers can pew pew code out making it easy for attackers to disto malware. There is a patch, but the race is on before this is added to the known exploited database, so get on it. </span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">https://ww</a></span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">w.veeam.com/kb4724</a></span><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs</span><br />
<span style="font-size: small;" class="mycode_size">tj-actions, a well</span> known and used repo for automating CI/CD silliness had its source changed and hackers were able to get info they shouldn't have. <a href="https://www.cve.org/CVERecord?id=CVE-2025-30066" target="_blank" rel="noopener" class="mycode_url">https://www.cve.org/CVERecord?id=CVE-2025-30066</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Another Popular Wordpress Plugin used on 200,000+ sites has a major security flaw; no one is surprised. </span><br />
WP Ghost, a popular WordPress security plugin, has a critical remote code execution vulnerability, allowing server takeover by unauthenticated attackers. <a href="https://patchstack.com/articles/critical-lfi-to-rce-vulnerability-in-wp-ghost-plugin-affecting-200k-sites/" target="_blank" rel="noopener" class="mycode_url">https://patchstack.com/articles/critical...00k-sites/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Some Cisco Routers have a software flaw that allows attacker to DoS the BGP service. </span><br />
Looks like this flaw is contained within the BGP service on Cisco XR routers, but it is a pretty bad thing. Check out the security advisory here: <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bgp-dos-O7stePhX" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...s-O7stePhX</a><br />
<br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Here's a free web scanner that returns some really awesome information:<br />
<a href="https://cyscan.io/" target="_blank" rel="noopener" class="mycode_url">https://cyscan.io/</a><br />
<br />
Into Threat Modeling? TRAIL, a threat modeling process by Trail of Bits, blends RRA and NIST approaches to analyze system architecture for design flaws. It models system components, maps threat actor paths, and documents scenarios, providing both immediate mitigations and strategic recommendations.<br />
<a href="https://blog.trailofbits.com/2025/02/28/threat-modeling-the-trail-of-bits-way" target="_blank" rel="noopener" class="mycode_url">https://blog.trailofbits.com/2025/02/28/...f-bits-way</a><br />
<br />
State Sponsored Hackers (and some red teams (shhhhh)) are leveraging a flaw that was discovered in 2017 and still not patched by Microsoft. <br />
<a href="https://www.zerodayinitiative.com/advisories/ZDI-25-148/2017" target="_blank" rel="noopener" class="mycode_url">https://www.zerodayinitiative.com/adviso...5-148/2017</a> <br />
<br />
Sperm bank breach deposits data into hands of cybercriminals (I didn't want to edit this hilarious article title because its A+ on its own)<br />
<a href="https://www.malwarebytes.com/blog/news/2025/03/sperm-bank-breach-deposits-data-into-hands-of-cybercriminals" target="_blank" rel="noopener" class="mycode_url">https://www.malwarebytes.com/blog/news/2...rcriminals</a><br />
<br />
By Golly G Wizz... Google Buys Wiz (for a metric shittonne of money)<br />
<a href="https://www.reuters.com/technology/cybersecurity/google-agrees-buy-cybersecurity-startup-wiz-32-bln-ft-reports-2025-03-18/" target="_blank" rel="noopener" class="mycode_url">https://www.reuters.com/technology/cyber...025-03-18/</a><br />
<br />
New kali version out! Now with less salt and more theme action! <br />
<a href="https://www.kali.org/blog/kali-linux-2025-1-release/" target="_blank" rel="noopener" class="mycode_url">https://www.kali.org/blog/kali-linux-2025-1-release/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Detection Studio is a browser tool that converts Sigma rules to SIEM languages (Splunk, Elasticsearch, Grafana) locally using pySigma. It features pipeline/filter support, persistent workspaces, and rule sharing. <br />
<a href="https://detection.studio/" target="_blank" rel="noopener" class="mycode_url">https://detection.studio/</a> <br />
<br />
Purple Lab simplifies detection rule testing by deploying a lab for log simulation, malware/ATT&amp;CK execution, and sandbox restoration. <br />
<a href="https://github.com/Krook9d/PurpleLab" target="_blank" rel="noopener" class="mycode_url">https://github.com/Krook9d/PurpleLab</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
shadow-rs is a rust-based Windows kernel rootkit showcases advanced kernel manipulation with Rust's safety and performance <br />
<a href="https://github.com/joaoviictorti/shadow-rs" target="_blank" rel="noopener" class="mycode_url">https://github.com/joaoviictorti/shadow-rs</a><br />
<br />
Adversary Simulation Success by the folks over at TrustedSec outlines measuring AdSim success via control testing, defensive enlightenment, and professional courtesy, providing metrics for each. <br />
<a href="https://trustedsec.com/blog/measuring-the-success-of-your-adversary-simulations" target="_blank" rel="noopener" class="mycode_url">https://trustedsec.com/blog/measuring-th...imulations</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
Keep an eye out on the clickfix campaigns I mentioned last week folks. That activity is really ramping up.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the second edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
First, lets get started with this weeks new vulnerabilities. While this list is not exhaustive-- there were a touch more than 600 new CVEs assigned this week-- it does cover some of the more popular and higher-risk ones. <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> Apach</span><span style="font-size: large;" class="mycode_size">e Tomcat vulnerability exploited 30 hours after security bulletin released, confluence admins collectively groan in unison.</span><span style="font-size: medium;" class="mycode_size">  </span><br />
Can't make this up-- just 30 hours after the release of the vuln, hackers had a extremely effective and really good exploit for the tomcat service. So, you might want to <a href="https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html" target="_blank" rel="noopener" class="mycode_url">patch this if you haven't already!</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> A Vulnerability in Veeam allows attackers to execute code remotely; because why not?</span><br />
<span style="font-size: small;" class="mycode_size">Veeam has had some doosies lately, but this one is pretty up there. Domain joined backup servers can pew pew code out making it easy for attackers to disto malware. There is a patch, but the race is on before this is added to the known exploited database, so get on it. </span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">https://ww</a></span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">w.veeam.com/kb4724</a></span><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs</span><br />
<span style="font-size: small;" class="mycode_size">tj-actions, a well</span> known and used repo for automating CI/CD silliness had its source changed and hackers were able to get info they shouldn't have. <a href="https://www.cve.org/CVERecord?id=CVE-2025-30066" target="_blank" rel="noopener" class="mycode_url">https://www.cve.org/CVERecord?id=CVE-2025-30066</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Another Popular Wordpress Plugin used on 200,000+ sites has a major security flaw; no one is surprised. </span><br />
WP Ghost, a popular WordPress security plugin, has a critical remote code execution vulnerability, allowing server takeover by unauthenticated attackers. <a href="https://patchstack.com/articles/critical-lfi-to-rce-vulnerability-in-wp-ghost-plugin-affecting-200k-sites/" target="_blank" rel="noopener" class="mycode_url">https://patchstack.com/articles/critical...00k-sites/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Some Cisco Routers have a software flaw that allows attacker to DoS the BGP service. </span><br />
Looks like this flaw is contained within the BGP service on Cisco XR routers, but it is a pretty bad thing. Check out the security advisory here: <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bgp-dos-O7stePhX" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...s-O7stePhX</a><br />
<br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Here's a free web scanner that returns some really awesome information:<br />
<a href="https://cyscan.io/" target="_blank" rel="noopener" class="mycode_url">https://cyscan.io/</a><br />
<br />
Into Threat Modeling? TRAIL, a threat modeling process by Trail of Bits, blends RRA and NIST approaches to analyze system architecture for design flaws. It models system components, maps threat actor paths, and documents scenarios, providing both immediate mitigations and strategic recommendations.<br />
<a href="https://blog.trailofbits.com/2025/02/28/threat-modeling-the-trail-of-bits-way" target="_blank" rel="noopener" class="mycode_url">https://blog.trailofbits.com/2025/02/28/...f-bits-way</a><br />
<br />
State Sponsored Hackers (and some red teams (shhhhh)) are leveraging a flaw that was discovered in 2017 and still not patched by Microsoft. <br />
<a href="https://www.zerodayinitiative.com/advisories/ZDI-25-148/2017" target="_blank" rel="noopener" class="mycode_url">https://www.zerodayinitiative.com/adviso...5-148/2017</a> <br />
<br />
Sperm bank breach deposits data into hands of cybercriminals (I didn't want to edit this hilarious article title because its A+ on its own)<br />
<a href="https://www.malwarebytes.com/blog/news/2025/03/sperm-bank-breach-deposits-data-into-hands-of-cybercriminals" target="_blank" rel="noopener" class="mycode_url">https://www.malwarebytes.com/blog/news/2...rcriminals</a><br />
<br />
By Golly G Wizz... Google Buys Wiz (for a metric shittonne of money)<br />
<a href="https://www.reuters.com/technology/cybersecurity/google-agrees-buy-cybersecurity-startup-wiz-32-bln-ft-reports-2025-03-18/" target="_blank" rel="noopener" class="mycode_url">https://www.reuters.com/technology/cyber...025-03-18/</a><br />
<br />
New kali version out! Now with less salt and more theme action! <br />
<a href="https://www.kali.org/blog/kali-linux-2025-1-release/" target="_blank" rel="noopener" class="mycode_url">https://www.kali.org/blog/kali-linux-2025-1-release/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Detection Studio is a browser tool that converts Sigma rules to SIEM languages (Splunk, Elasticsearch, Grafana) locally using pySigma. It features pipeline/filter support, persistent workspaces, and rule sharing. <br />
<a href="https://detection.studio/" target="_blank" rel="noopener" class="mycode_url">https://detection.studio/</a> <br />
<br />
Purple Lab simplifies detection rule testing by deploying a lab for log simulation, malware/ATT&amp;CK execution, and sandbox restoration. <br />
<a href="https://github.com/Krook9d/PurpleLab" target="_blank" rel="noopener" class="mycode_url">https://github.com/Krook9d/PurpleLab</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
shadow-rs is a rust-based Windows kernel rootkit showcases advanced kernel manipulation with Rust's safety and performance <br />
<a href="https://github.com/joaoviictorti/shadow-rs" target="_blank" rel="noopener" class="mycode_url">https://github.com/joaoviictorti/shadow-rs</a><br />
<br />
Adversary Simulation Success by the folks over at TrustedSec outlines measuring AdSim success via control testing, defensive enlightenment, and professional courtesy, providing metrics for each. <br />
<a href="https://trustedsec.com/blog/measuring-the-success-of-your-adversary-simulations" target="_blank" rel="noopener" class="mycode_url">https://trustedsec.com/blog/measuring-th...imulations</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
Keep an eye out on the clickfix campaigns I mentioned last week folks. That activity is really ramping up.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Gibby’s Cybersecurity Roundup – 3/14/25]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=25</link>
			<pubDate>Thu, 13 Mar 2025 16:24:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=3">gibby</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=25</guid>
			<description><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://i.imgur.com/nDIfEKX.png" loading="lazy"  alt="[Image: nDIfEKX.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the first edition of Gibby’s cybersecurity roundup. Each week, I’ll compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
First, lets get started with this weeks new vulnerabilities. While this list is not exhaustive-- there were a touch more than 600 new CVEs assigned this week-- it does cover some of the more popular and higher-risk ones. <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> Publicly facing VMWare ESXi servers are getting smoked with a chain of vulnerabilities that allow hackers to execute code on the hypervisor. </span><br />
Find the Q&amp;A about this here: <a href="https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004" target="_blank" rel="noopener" class="mycode_url">https://github.com/vmware/vcf-security-a...-2025-0004</a><br />
And more information about the vulnerability here: <a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390" target="_blank" rel="noopener" class="mycode_url">https://support.broadcom.com/web/ecx/sup...es/0/25390</a><br />
<br />
<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="color: #c10300;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">High Risk:</span> </span>Microsoft Patch Tuesday fixes Seven 0-days and fifty-seven security flaws. </span><br />
Six of the Seven 0days were being publicly exploited (yay!). I wont list all of them, but the critical security updates are:<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24983" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24983</a> - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24984" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24984</a> - Windows NTFS Information Disclosure Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24985" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24985</a> - Windows Fast FAT File System Driver Remote Code Execution Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24991" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24991</a> - Windows NTFS Information Disclosure Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24993" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24993</a> - Windows NTFS Remote Code Execution Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26633" target="_blank" rel="noopener" class="mycode_url">CVE-2025-26633</a> - Microsoft Management Console Security Feature Bypass Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26630" target="_blank" rel="noopener" class="mycode_url">CVE-2025-26630</a> - Microsoft Access Remote Code Execution Vulnerability<br />
<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk: </span></span>Fortinet released a number of patches for a slew of their products, some of which are high severity (again). </span><br />
Double check your devices here: <a href="https://www.fortiguard.com/psirt" target="_blank" rel="noopener" class="mycode_url">https://www.fortiguard.com/psirt</a><br />
<br />
<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="color: #c10300;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">High Risk:</span> </span>Hackers are using an old vulnerability to pop Cisco Small Business Routers.</span> <br />
CISA added <a href="https://www.cve.org/CVERecord?id=CVE-2023-20118" target="_blank" rel="noopener" class="mycode_url">CVE-2023-20118 </a> to its known exploited vulnerabilities catalog this week, meaning the bad guys are bad guying a 2 year old vulnerability. <br />
Check out Cisco’s Security Advisory here <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...n-ej76Pke5</a><br />
 <br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Researchers have noted a 42% increase in Medusa ransomware attacks from 2023 to 2024, with incidents doubling in early 2025. Medusa, operated as a ransomware-as-a-service (RaaS) by the group tracked as Spearwing, employs double extortion tactics, steals and encrypts data.<br />
<a href="https://www.security.com/threat-intelligence/medusa-ransomware-attacks" target="_blank" rel="noopener" class="mycode_url">https://www.security.com/threat-intellig...re-attacks</a><br />
 <br />
Silk Typhoon, a Chinese espionage group, is now using common IT tools for initial access, exploiting unpatched applications to escalate privileges within targeted organizations. After gaining access, they steal credentials to infiltrate networks and abuse various applications, including Microsoft services, for espionage. Microsoft's threat intelligence has detailed these tactics and offers security solutions and mitigation guidance to defend against these attacks.<br />
<a href="https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/" target="_blank" rel="noopener" class="mycode_url">https://www.microsoft.com/en-us/security...ply-chain/</a><br />
 <br />
Google Cloud CISO Phil Venables applies Jim Collins' flywheel concept to amplifying the effects of our security programs, walking through seven potential security flywheels. Those of you in a leadership role inside our outside Cybersecurity should give this a read<br />
<a href="https://www.philvenables.com/post/turning-the-security-flywheel" target="_blank" rel="noopener" class="mycode_url">https://www.philvenables.com/post/turnin...y-flywheel</a><br />
 <br />
A two-year joint effort by Fortra, Microsoft's Digital Crimes Unit, and Health-ISAC has significantly disrupted ransomware operations by targeting the illicit use of Cobalt Strike and compromised Microsoft software. This campaign achieved an 80% reduction in unauthorized Cobalt Strike copies and seized over 200 malicious domains, drastically shortening the time between detecting and dismantling attacks to under a week in the U.S. and under two weeks globally.<br />
<a href="https://www.cobaltstrike.com/blog/update-stopping-cybercriminals-from-abusing-cobalt-strike" target="_blank" rel="noopener" class="mycode_url">https://www.cobaltstrike.com/blog/update...alt-strike</a><br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
FBI Watchdog is a cyber threat intelligence OSINT tool that monitors domain DNS changes in real-time, specifically detecting law enforcement seizures. It alerts users via Telegram and Discord and captures screenshots of seized domains.<br />
<a href="https://github.com/DarkWebInformer/FBI_Watchdog" target="_blank" rel="noopener" class="mycode_url">https://github.com/DarkWebInformer/FBI_Watchdog</a><br />
 <br />
APT-ATTACK-SIMULATION is a compilation of APT simulations (Russia, China, Iran, North Korea) that target many vital sectors, both private and governmental, including written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks.<br />
<a href="https://github.com/S3N4T0R-0X0/APT-Attack-Simulation" target="_blank" rel="noopener" class="mycode_url">https://github.com/S3N4T0R-0X0/APT-Attack-Simulation</a><br />
 <br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
A tool created for the red team to test default credentials on SSH and WinRM and then execute scripts if logging in was successful.<br />
<a href="https://github.com/RITRedteam/StreetCred" target="_blank" rel="noopener" class="mycode_url">https://github.com/RITRedteam/StreetCred</a><br />
<br />
CaptainCrez is a modular and discreet password-spraying tool inspired by CredMaster, featuring enhancements like a cache mechanism, customizable post-actions, and IP rotation via the IPSpinner proxy.<br />
<a href="https://github.com/synacktiv/captaincredz" target="_blank" rel="noopener" class="mycode_url">https://github.com/synacktiv/captaincredz</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
This week I’ve had some discussions around two specific issues. One being regulation, specifically around CMMC, and the other being a new vector that attackers are using that is wildly successful despite it being incredibly obvious that it is bad. <br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">CMMC Sucks and its not going anywhere for 4 more years</span></span><br />
 <br />
Let's first address regulatory compliance, specifically the Cybersecurity Maturity Model Certification (CMMC). For you non-US readers, CMMC is a framework designed to enhance the cybersecurity posture of organizations within the Defense Industrial Base (DIB), a critical sector for national security. It aims to standardize and verify the implementation of cybersecurity best practices across all tiers of the supply chain, from essential support services to advanced research and development.<br />
 <br />
The anticipated release of the latest CMMC version has been delayed, likely until the next administration. This delay creates a significant challenge: a regulatory vacuum. This vacuum introduces ambiguity, hindering long-term strategic planning and investment in cybersecurity initiatives. Risk owners, from Directors to C-suite executives, are navigating the whiplash of shifting priorities, facing the difficult task of justifying resource allocation amidst regulatory uncertainty. The substantial resource allocation required for CMMC implementation, encompassing not only technology upgrades but also process redesign and workforce training, has been abruptly disrupted. This leaves internal CMMC champions, often IT and security leaders, facing skepticism and uncertainty from other stakeholders who may question the ROI of continued investment.<br />
 <br />
The resulting impact is a diminished perceived authority of cybersecurity regulations, particularly within the DIB. This uncertainty risks eroding future compliance efforts, potentially leading to continued resistance to essential security measures, such as multi-factor authentication, robust encryption, and continuous monitoring. In a rapidly evolving threat landscape, such resistance can significantly increase an organization's vulnerability.<br />
 <br />
This situation underscores the critical need for organizations to maintain a proactive and adaptable cybersecurity strategy, regardless of regulatory fluctuations. IT professionals must advocate for a risk-based approach, prioritizing security controls that align with industry best practices and address the most critical threats. This includes fostering a culture of security awareness, implementing robust security architectures, and establishing continuous monitoring and incident response capabilities. It is also essential to maintain open communication with stakeholders, demonstrating the ongoing value of cybersecurity investments and aligning security initiatives with broader business objectives. <br />
<br />
<span style="font-style: italic;" class="mycode_i">TL;DR: CMMC delays create regulatory uncertainty, impacting cybersecurity budgets and adoption. IT pros must advocate for proactive security despite shifting regulations.</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Please stop running malicious code willingly</span></span><br />
 <br />
If you're in Incident Response, you've probably seen a rise in this weird attack called 'ClickFix.' If not, buckle up for a wild ride! It's surprisingly simple, and that's why it's working. Here's how it goes:<ul class="mycode_list"><li>Fake Alert: Users get a pop-up or fake error message in their browser, looking like a legit system warning.<br />
</li>
<li>Copy-Paste-Run: They're told to copy some code, right-click the Start button, and paste it into a PowerShell terminal and hit enter.<br />
</li>
</ul>
<br />
Yeah, it's working. And here's the kicker: it's hitting a specific group of users. Think back to the Windows 95 days. We used to tinker with everything—backgrounds, sounds, even HTML for our MySpace profiles. We broke stuff, fixed it, learned. Everyone did it.<br />
<br />
Then came the iPad generation. They got locked-down devices, limited customization. They never played with command lines, never saw what 'Start &gt; Run &gt; cmd' did. They don't know what PowerShell is, let alone why running random code in it is a huge red flag.<br />
<br />
So, when they see a pop-up telling them to run a long code in a terminal, they don't get that 'uh-oh' feeling. It looks normal, or at least not dangerous.<br />
 <br />
That's how people are getting tricked into running malicious code. They just don't know any better. This whole thing highlights a big problem: our security training isn't keeping up with how users have changed. We've got to show them how to spot red flags and get them asking questions. And, you know, maybe bring back a little bit of that healthy skepticism we all used to have.<br />
<br />
<span style="font-style: italic;" class="mycode_i">TL;DR: "ClickFix" attack tricks users into running bad code in PowerShell. They don't know it's dangerous because of how they grew up with computers.</span><br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week. <br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://i.imgur.com/nDIfEKX.png" loading="lazy"  alt="[Image: nDIfEKX.png]" class="mycode_img" /></div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://i.imgur.com/nDIfEKX.png" loading="lazy"  alt="[Image: nDIfEKX.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the first edition of Gibby’s cybersecurity roundup. Each week, I’ll compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
First, lets get started with this weeks new vulnerabilities. While this list is not exhaustive-- there were a touch more than 600 new CVEs assigned this week-- it does cover some of the more popular and higher-risk ones. <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> Publicly facing VMWare ESXi servers are getting smoked with a chain of vulnerabilities that allow hackers to execute code on the hypervisor. </span><br />
Find the Q&amp;A about this here: <a href="https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004" target="_blank" rel="noopener" class="mycode_url">https://github.com/vmware/vcf-security-a...-2025-0004</a><br />
And more information about the vulnerability here: <a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390" target="_blank" rel="noopener" class="mycode_url">https://support.broadcom.com/web/ecx/sup...es/0/25390</a><br />
<br />
<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="color: #c10300;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">High Risk:</span> </span>Microsoft Patch Tuesday fixes Seven 0-days and fifty-seven security flaws. </span><br />
Six of the Seven 0days were being publicly exploited (yay!). I wont list all of them, but the critical security updates are:<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24983" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24983</a> - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24984" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24984</a> - Windows NTFS Information Disclosure Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24985" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24985</a> - Windows Fast FAT File System Driver Remote Code Execution Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24991" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24991</a> - Windows NTFS Information Disclosure Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24993" target="_blank" rel="noopener" class="mycode_url">CVE-2025-24993</a> - Windows NTFS Remote Code Execution Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26633" target="_blank" rel="noopener" class="mycode_url">CVE-2025-26633</a> - Microsoft Management Console Security Feature Bypass Vulnerability<br />
<a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26630" target="_blank" rel="noopener" class="mycode_url">CVE-2025-26630</a> - Microsoft Access Remote Code Execution Vulnerability<br />
<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk: </span></span>Fortinet released a number of patches for a slew of their products, some of which are high severity (again). </span><br />
Double check your devices here: <a href="https://www.fortiguard.com/psirt" target="_blank" rel="noopener" class="mycode_url">https://www.fortiguard.com/psirt</a><br />
<br />
<br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="color: #c10300;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">High Risk:</span> </span>Hackers are using an old vulnerability to pop Cisco Small Business Routers.</span> <br />
CISA added <a href="https://www.cve.org/CVERecord?id=CVE-2023-20118" target="_blank" rel="noopener" class="mycode_url">CVE-2023-20118 </a> to its known exploited vulnerabilities catalog this week, meaning the bad guys are bad guying a 2 year old vulnerability. <br />
Check out Cisco’s Security Advisory here <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...n-ej76Pke5</a><br />
 <br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Researchers have noted a 42% increase in Medusa ransomware attacks from 2023 to 2024, with incidents doubling in early 2025. Medusa, operated as a ransomware-as-a-service (RaaS) by the group tracked as Spearwing, employs double extortion tactics, steals and encrypts data.<br />
<a href="https://www.security.com/threat-intelligence/medusa-ransomware-attacks" target="_blank" rel="noopener" class="mycode_url">https://www.security.com/threat-intellig...re-attacks</a><br />
 <br />
Silk Typhoon, a Chinese espionage group, is now using common IT tools for initial access, exploiting unpatched applications to escalate privileges within targeted organizations. After gaining access, they steal credentials to infiltrate networks and abuse various applications, including Microsoft services, for espionage. Microsoft's threat intelligence has detailed these tactics and offers security solutions and mitigation guidance to defend against these attacks.<br />
<a href="https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/" target="_blank" rel="noopener" class="mycode_url">https://www.microsoft.com/en-us/security...ply-chain/</a><br />
 <br />
Google Cloud CISO Phil Venables applies Jim Collins' flywheel concept to amplifying the effects of our security programs, walking through seven potential security flywheels. Those of you in a leadership role inside our outside Cybersecurity should give this a read<br />
<a href="https://www.philvenables.com/post/turning-the-security-flywheel" target="_blank" rel="noopener" class="mycode_url">https://www.philvenables.com/post/turnin...y-flywheel</a><br />
 <br />
A two-year joint effort by Fortra, Microsoft's Digital Crimes Unit, and Health-ISAC has significantly disrupted ransomware operations by targeting the illicit use of Cobalt Strike and compromised Microsoft software. This campaign achieved an 80% reduction in unauthorized Cobalt Strike copies and seized over 200 malicious domains, drastically shortening the time between detecting and dismantling attacks to under a week in the U.S. and under two weeks globally.<br />
<a href="https://www.cobaltstrike.com/blog/update-stopping-cybercriminals-from-abusing-cobalt-strike" target="_blank" rel="noopener" class="mycode_url">https://www.cobaltstrike.com/blog/update...alt-strike</a><br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
FBI Watchdog is a cyber threat intelligence OSINT tool that monitors domain DNS changes in real-time, specifically detecting law enforcement seizures. It alerts users via Telegram and Discord and captures screenshots of seized domains.<br />
<a href="https://github.com/DarkWebInformer/FBI_Watchdog" target="_blank" rel="noopener" class="mycode_url">https://github.com/DarkWebInformer/FBI_Watchdog</a><br />
 <br />
APT-ATTACK-SIMULATION is a compilation of APT simulations (Russia, China, Iran, North Korea) that target many vital sectors, both private and governmental, including written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks.<br />
<a href="https://github.com/S3N4T0R-0X0/APT-Attack-Simulation" target="_blank" rel="noopener" class="mycode_url">https://github.com/S3N4T0R-0X0/APT-Attack-Simulation</a><br />
 <br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
A tool created for the red team to test default credentials on SSH and WinRM and then execute scripts if logging in was successful.<br />
<a href="https://github.com/RITRedteam/StreetCred" target="_blank" rel="noopener" class="mycode_url">https://github.com/RITRedteam/StreetCred</a><br />
<br />
CaptainCrez is a modular and discreet password-spraying tool inspired by CredMaster, featuring enhancements like a cache mechanism, customizable post-actions, and IP rotation via the IPSpinner proxy.<br />
<a href="https://github.com/synacktiv/captaincredz" target="_blank" rel="noopener" class="mycode_url">https://github.com/synacktiv/captaincredz</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
This week I’ve had some discussions around two specific issues. One being regulation, specifically around CMMC, and the other being a new vector that attackers are using that is wildly successful despite it being incredibly obvious that it is bad. <br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">CMMC Sucks and its not going anywhere for 4 more years</span></span><br />
 <br />
Let's first address regulatory compliance, specifically the Cybersecurity Maturity Model Certification (CMMC). For you non-US readers, CMMC is a framework designed to enhance the cybersecurity posture of organizations within the Defense Industrial Base (DIB), a critical sector for national security. It aims to standardize and verify the implementation of cybersecurity best practices across all tiers of the supply chain, from essential support services to advanced research and development.<br />
 <br />
The anticipated release of the latest CMMC version has been delayed, likely until the next administration. This delay creates a significant challenge: a regulatory vacuum. This vacuum introduces ambiguity, hindering long-term strategic planning and investment in cybersecurity initiatives. Risk owners, from Directors to C-suite executives, are navigating the whiplash of shifting priorities, facing the difficult task of justifying resource allocation amidst regulatory uncertainty. The substantial resource allocation required for CMMC implementation, encompassing not only technology upgrades but also process redesign and workforce training, has been abruptly disrupted. This leaves internal CMMC champions, often IT and security leaders, facing skepticism and uncertainty from other stakeholders who may question the ROI of continued investment.<br />
 <br />
The resulting impact is a diminished perceived authority of cybersecurity regulations, particularly within the DIB. This uncertainty risks eroding future compliance efforts, potentially leading to continued resistance to essential security measures, such as multi-factor authentication, robust encryption, and continuous monitoring. In a rapidly evolving threat landscape, such resistance can significantly increase an organization's vulnerability.<br />
 <br />
This situation underscores the critical need for organizations to maintain a proactive and adaptable cybersecurity strategy, regardless of regulatory fluctuations. IT professionals must advocate for a risk-based approach, prioritizing security controls that align with industry best practices and address the most critical threats. This includes fostering a culture of security awareness, implementing robust security architectures, and establishing continuous monitoring and incident response capabilities. It is also essential to maintain open communication with stakeholders, demonstrating the ongoing value of cybersecurity investments and aligning security initiatives with broader business objectives. <br />
<br />
<span style="font-style: italic;" class="mycode_i">TL;DR: CMMC delays create regulatory uncertainty, impacting cybersecurity budgets and adoption. IT pros must advocate for proactive security despite shifting regulations.</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Please stop running malicious code willingly</span></span><br />
 <br />
If you're in Incident Response, you've probably seen a rise in this weird attack called 'ClickFix.' If not, buckle up for a wild ride! It's surprisingly simple, and that's why it's working. Here's how it goes:<ul class="mycode_list"><li>Fake Alert: Users get a pop-up or fake error message in their browser, looking like a legit system warning.<br />
</li>
<li>Copy-Paste-Run: They're told to copy some code, right-click the Start button, and paste it into a PowerShell terminal and hit enter.<br />
</li>
</ul>
<br />
Yeah, it's working. And here's the kicker: it's hitting a specific group of users. Think back to the Windows 95 days. We used to tinker with everything—backgrounds, sounds, even HTML for our MySpace profiles. We broke stuff, fixed it, learned. Everyone did it.<br />
<br />
Then came the iPad generation. They got locked-down devices, limited customization. They never played with command lines, never saw what 'Start &gt; Run &gt; cmd' did. They don't know what PowerShell is, let alone why running random code in it is a huge red flag.<br />
<br />
So, when they see a pop-up telling them to run a long code in a terminal, they don't get that 'uh-oh' feeling. It looks normal, or at least not dangerous.<br />
 <br />
That's how people are getting tricked into running malicious code. They just don't know any better. This whole thing highlights a big problem: our security training isn't keeping up with how users have changed. We've got to show them how to spot red flags and get them asking questions. And, you know, maybe bring back a little bit of that healthy skepticism we all used to have.<br />
<br />
<span style="font-style: italic;" class="mycode_i">TL;DR: "ClickFix" attack tricks users into running bad code in PowerShell. They don't know it's dangerous because of how they grew up with computers.</span><br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week. <br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://i.imgur.com/nDIfEKX.png" loading="lazy"  alt="[Image: nDIfEKX.png]" class="mycode_img" /></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Who's affected by the recent zero-day vulnerabilities in ESXi?]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=22</link>
			<pubDate>Wed, 12 Mar 2025 03:30:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=4">mistiry</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=22</guid>
			<description><![CDATA[See: <a href="https://www.rapid7.com/blog/post/2025/03/04/etr-multiple-zero-day-vulnerabilities-in-broadcom-vmware-esxi-and-other-products/" target="_blank" rel="noopener" class="mycode_url">https://www.rapid7.com/blog/post/2025/03...-products/</a><br />
<ul class="mycode_list"><li>CVE-2025-22224 (<a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" target="_blank" rel="noopener" class="mycode_url">CVSS 9.3</a>): A Time-of-Check Time-of-Use (TOCTOU) vulnerability in VMware ESXi and Workstation that can lead to an out-of-bounds write condition. An attacker with local administrative privileges on a virtual machine could exploit this issue to execute code as the virtual machine's VMX process running on the host.<br />
</li>
<li>CVE-2025-22225 (<a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" target="_blank" rel="noopener" class="mycode_url">CVSS 8.2</a>): An arbitrary write vulnerability in VMware ESXi that allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.<br />
</li>
<li>CVE-2025-22226 (<a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" target="_blank" rel="noopener" class="mycode_url">CVSS 7.1</a>): An information disclosure vulnerability in VMware ESXi, Workstation, and Fusion that arises from an out-of-bounds read in the Host Guest File System (HGFS). An attacker with administrative privileges to a virtual machine could exploit this issue to leak memory from the VMX process.<br />
</li>
</ul>
<br />
I don't directly deal with our ESXi systems at work, but they were up patching systems tonight for this. A few days late <img src="https://dotheneedful.online/forums/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /> but...NMFP!]]></description>
			<content:encoded><![CDATA[See: <a href="https://www.rapid7.com/blog/post/2025/03/04/etr-multiple-zero-day-vulnerabilities-in-broadcom-vmware-esxi-and-other-products/" target="_blank" rel="noopener" class="mycode_url">https://www.rapid7.com/blog/post/2025/03...-products/</a><br />
<ul class="mycode_list"><li>CVE-2025-22224 (<a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" target="_blank" rel="noopener" class="mycode_url">CVSS 9.3</a>): A Time-of-Check Time-of-Use (TOCTOU) vulnerability in VMware ESXi and Workstation that can lead to an out-of-bounds write condition. An attacker with local administrative privileges on a virtual machine could exploit this issue to execute code as the virtual machine's VMX process running on the host.<br />
</li>
<li>CVE-2025-22225 (<a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" target="_blank" rel="noopener" class="mycode_url">CVSS 8.2</a>): An arbitrary write vulnerability in VMware ESXi that allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.<br />
</li>
<li>CVE-2025-22226 (<a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" target="_blank" rel="noopener" class="mycode_url">CVSS 7.1</a>): An information disclosure vulnerability in VMware ESXi, Workstation, and Fusion that arises from an out-of-bounds read in the Host Guest File System (HGFS). An attacker with administrative privileges to a virtual machine could exploit this issue to leak memory from the VMX process.<br />
</li>
</ul>
<br />
I don't directly deal with our ESXi systems at work, but they were up patching systems tonight for this. A few days late <img src="https://dotheneedful.online/forums/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /> but...NMFP!]]></content:encoded>
		</item>
	</channel>
</rss>