Yun
@yunzhenghu
ID: 295255006
08-05-2011 17:24:06
707 Tweet
359 Followers
696 Following
๐จFox-IT and Dutch Institute for Vulnerability Disclosure have revealed that a exploitation campaign targeting Citrix NetScalers has backdoored approximately 2K NetScalers worldwide! Check your NetScalers for indicators of compromise, even after patching CVE-2023-3519!๐ ๐blog: blog.fox-it.com/2023/08/15/appโฆ
๐โโ๏ธUpdate! With Cisco IOS XE CVE-2023-20198 exploitation details now public, we're releasing our Suricata rules. These rules monitor for a percent-encoded-percent which can be used to bypass authentication on unpatched Cisco IOS XE devices. github.com/fox-it/cisco-iโฆ [1/2]
๐ง ๐ก๐ฒ๐ ๐ฏ๐น๐ผ๐ด: "๐ง๐ต๐ฟ๐ฒ๐ฒ ๐๐ฎ๐๐ฎ๐ฟ๐๐ ๐ฅ๐๐ง๐ ๐๐ผ๐บ๐ถ๐ป๐ด ๐ณ๐ผ๐ฟ ๐ฌ๐ผ๐๐ฟ ๐๐ต๐ฒ๐ฒ๐๐ฒ" Read about PondRAT, ThemeForestRAT and RemotePE - three RATs we encountered during incident response involving the Lazarus group. Check the indicators and don't let them steal
Thanks Fox-IT for github.com/fox-it/dissect. This project is totally underrated. I tried it once before, but it didnโt click until a few weeks ago. Itโs a masterpiece that radically changed my IR workflows, enabling me to implement forensics playbooks I dreamed for years ๐๐๐
And thank you ๐ฝ๐ด๐๐๐ด๐๐ด๐ฒ for documenting PCAP-over-IP on your blog, which is how we found out about it. Itโs such an underrated method for reading pcap data!
Yun It's really great to see more tools adopting this method for streaming packet data! We're missing that feature in Suricata IDS/IPS though. Native pcap-over-ip support in Suricata would eliminate the need for this: nc localhost 57012 | suricata -r /dev/stdin redmine.openinfosecfoundation.org/issues/5499