Ryosuke Eto

6 Followers
11 Following
8 Posts
🛡️Threat Researcher🇯🇵
@GossiTheDog Thank you for the list of scan results. Was the first day you ran the scan July 6, or have you been doing it for longer?
RiskIQ has been acquired by MS. Is there no comparable pDNS service anywhere?
ArrayNetworks/Fortinet/Proself(online storage service) ...🤔​ https://www.jpcert.or.jp/at/2023/at230029.html
日本の組織を標的にした外部からアクセス可能なIT資産を狙う複数の標的型サイバー攻撃活動に関する注意喚起

JPCERT/CC

UPDATE: Cisco IOS XE Web UI CVE-2023-20198 version 2 BadCandy implant detection has dropped again 2023-11-03: https://dashboard.shadowserver.org/statistics/combined/time-series/?date_range=7&source=compromised_website&source=compromised_website6&tag=device-implant%2B&group_by=geo&style=stacked

Note on 2023-11-02 Cisco updated their threat advisory on CVE-2023-20198/BadCandy with observations of a version 3:
https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/

Over 2200 unique IPs seen with CVE-2023-20198 attempts on 2023-11-03 in our honeypot sensors (many different actors now probing)
https://dashboard.shadowserver.org/statistics/honeypot/monitoring/vulnerability/?category=monitoring&statistic=unique_ips&d2=2023-11-03&limit=100

Time series · General statistics · The Shadowserver Foundation

IMPORTANT: Surprise http://shadowserver.org domain suspension (changed to clientHold). Currently working hard to escalate with registrar and get back online, but all services currently impacted, including email
JPCERT/CC issued an alert to users in Japan, introducing an additional investigation report by Mandiant and related information from the FBI. #BarracudaESG #cve_2023_2868 #infosec #vulnerability
(Japanese only)
https://www.jpcert.or.jp/at/2023/at230017.html
Barracuda Email Security Gateway(ESG)の脆弱性(CVE-2023-2868)を悪用する継続的な攻撃活動に関する注意喚起

JPCERT/CC
Japan's JPCERT warns of new 'MalDoc in PDF' attack technique

Japan's JPCERT warns of a new recently detected 'MalDoc in PDF' attack that embeds malicious Word files into PDFs.

Security Affairs