Ujawniono pięć aktywnie wykorzystywanych luk zero-day w systemie Windows

W maju 2025 roku badacze bezpieczeństwa (Google, CrowdStrike) oraz Microsoft ujawnili i załatali pięć aktywnie wykorzystywanych luk zero-day w systemie Windows. Najpoważniejsza z nich umożliwia zdalne wykonanie kodu (RCE) przez przeglądarkę internetową – atak ten został już zaobserwowany „na żywo” i wykorzystuje zarówno stare, jak i nowe mechanizmy systemowe. Główny...

#WBiegu #Clfs #Cve #Microsoft #Mshtml #Rce

https://sekurak.pl/ujawniono-piec-aktywnie-wykorzystywanych-luk-zero-day-w-systemie-windows/

Ujawniono pięć aktywnie wykorzystywanych luk zero-day w systemie Windows

W maju 2025 roku badacze bezpieczeństwa (Google, CrowdStrike) oraz Microsoft ujawnili i załatali pięć aktywnie wykorzystywanych luk zero-day w systemie Windows. Najpoważniejsza z nich umożliwia zdalne wykonanie kodu (RCE) przez przeglądarkę internetową – atak ten został już zaobserwowany „na żywo” i wykorzystuje zarówno stare, jak i nowe mechanizmy systemowe. Główny...

Sekurak
Windows under attack: 0-day vulnerability used by ransomware group - gHacks Tech News

Microsoft confirmed limited targeted attacks against a 0-day vulnerability. A patch is available, but not for all Windows systems at the time.

gHacks Technology News
Patch Tuesday, April 2025 Edition – Krebs on Security

Patch Tuesday, April 2025 Edition - Microsoft today released updates to plug at least 121 security holes in its Window... https://krebsonsecurity.com/2025/04/patch-tuesday-april-2025-edition/ #windowsremotedesktopservices #commonlogfilesystem #latestwarnings #thecomingstorm #cve-2025-26671 #cve-2025-27480 #cve-2025-27482 #cve-2025-29824 #securitytools #satnamnarang #timetopatch #chrisgoettl #microsoft #windows #ivanti #clfs
Patch Tuesday, April 2025 Edition – Krebs on Security

After releasing his PoC for CVE-2024-49138, @ale98 is back with two new articles that provide background on #Windows #CLFS, analyze two distinct #vulnerabilities patched by Microsoft’s KB5048685, and describe how to #exploit them.

https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-1

https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-2
CVE-2024-49138 Windows CLFS heap-based buffer overflow analysis - Part 1 - hn security

CVE-2024-49138 is a Windows vulnerability detected […]

hn security
Microsoft releasing security mitigation for Common Log Filesystem (CLFS) to Windows 11 Insiders

Security, Compliance, and Identity Blog: Microsoft will soon be releasing a new security mitigation for the Common Log File System (CLFS) to the Windows Insiders Canary channel. In the past five years, 24 CVEs impacting CLFS have been identified and mitigated, making it one of the largest...

Windows 11 Forum

It's been a heck of a week, with tonnes of great research and tooling that I'm sure you're going to get a kick out of - check out our wrap-up for all the news!:

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-16042023

Kaspersky researchers shone a light on the Dark Web trade in Google Play Loaders - a service to help inject malware into legitimate, and supposedly vetted apps, with guarantees of >1 week up-time and the option to boost your spread with targeted Ads.

#Nokoyawa ransomware have clearly got some talent on their team, having abused a #CLFS 0-day prior to Microsoft patching it last week - one of 5 different exploits they've used, mind you - and they appear to have a new, distinct ransomware strain in rotation, too.

There's heaps more great threat reporting, including a report that #FIN7 and former #Conti (#FIN12/#WizardSpider) members are collaborating on a new backdoor, and a crypto-mining campaign that may be the canary in the coal mine, indicating broader uptake of BYOVD and IPFS by low-level operators.

The #QueueJumper vulnerability from last week looks primed to explode in coming days, with a no-fix vulnerability in Microsoft Intune capping off a lousy week for Windows admins struggling to keep their networks secure.

TOOLING. Ooooh boy, this was a good week for tooling and tradecraft, ladies and gentlemen.

The #redteam have a new port of the SharpHound AD enumeration tool for Cobalt Strike; a great reference piece on leveraging stolen Office tokens to bypass MFA and access cloud workloads, and a list of keywords to avoid when crafting stealthy PowerShell scripts.

The #blueteam have a script to help tweak VM settings to circumvent malware anti-analysis checks; Procmon for macOS, and a lightweight bastion host to help redirect and record traffic sent to honeypots in your network.

This was a fun one to write up, with heaps of interesting reads and takeaways to be had. Get amongst it!

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-16042023

#infosec #cyber #news #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #darkweb #microsoft #azure #mfa #mfabypass #cobaltstrike #bloodhound #sharphound #byovd #ipfs #intune #GooglePlay #Android #zeroday #0day

SOC Goulash: Weekend Wrap-Up

Your week in Infosec: Dark Web targets Google Play; FIN7 and Conti collaborate on backdoor; QueueJumper vulnerability, more in Intune, Azure with no patches.

Opalsec
A new #malware family has been discovered that uses Common Log File System (#CLFS) to stay undetected. Named PRIVATELOG, this malware uses another #malware—StashLog—as its installer.
https://cyware.com/news/new-privatelog-malware-uses-clfs-log-files-to-hide-123f1c9c/?&web_view=true
#security
New PRIVATELOG Malware Uses CLFS Log Files to Hide | Cyware Hacker News

A new malware family dubbed PrivateLog was found using Common Log File System (CLFS) to stay under the radar and uses another malware. Learn more!

Hang on a sec, did I just compile my kernel without nftables support? #clfs #linux