<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CERT-W - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cert-w-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cert-w-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 16 Apr 2026 12:55:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>CERT-W - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cert-w-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>StormCell: How our blue team scales up incident response</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/#respond</comments>
		
		<dc:creator><![CDATA[Clément Gonnaud]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 12:10:04 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[CERT-W Stormcell]]></category>
		<category><![CDATA[CERT-Wavestone]]></category>
		<category><![CDATA[Cyber incident response]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Indicators of Compromise]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[IoC]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Windows Forensics]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29788</guid>

					<description><![CDATA[<p>CERT-Wavestone handles cybersecurity incidents of all types and magnitudes, from investigating a single suspicious workstation to large-scale overnight ransomware outbreaks. After 10 years of forensics investigations and crisis management at Wavestone, one thing stands out: attackers are more sophisticated than...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/">StormCell: How our blue team scales up incident response</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><strong>CERT-Wavestone handles cybersecurity incidents of all types and magnitudes,</strong> from investigating a single suspicious workstation to large-scale overnight ransomware outbreaks. After 10 years of forensics investigations and crisis management at Wavestone, one thing stands out: <strong>attackers are more sophisticated than ever, and every hour matters for blue teams.</strong></p>
<p style="text-align: justify;">When CERT-Wavestone is called, three priorities drive every action and decision making:<strong> containing the threat, understanding the attack and eradicating the attacker.</strong> To achieve these objectives,<strong> establishing visibility</strong> across the impacted perimeter is the <strong>critical first step</strong>.</p>
<p style="text-align: justify;">In such contexts where<strong> speed and effectiveness are mandatory,</strong> CERT-Wavestone relies on many tools: cybersecurity solutions (EDR, SIEM, etc.), open-source collectors and parsers, and its own internally developed tools.</p>
<p style="text-align: justify;">Among these, <strong>StormCell stands out as an open-source tool developed by CERT-Wavestone</strong> to automate Windows triage processing and<strong> free analysts’ time to focus on what truly matters: the investigation itself.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Contain. Understand. Eradicate. Every hour counts.</h2>
<h3 style="text-align: justify;">Increasingly effective attackers</h3>
<p style="text-align: justify;">Several cybersecurity incident response actors agree that <strong>certain types of cyberattacks</strong>, such as ransomware and data exfiltration attacks, <strong>are becoming increasingly fast paced.</strong> The charts published by Zero Day Clock (<span style="color: #451dc7;"><a style="color: #451dc7;" href="https://zerodayclock.com">https://zerodayclock.com</a></span>) illustrate this trend:</p>
<ul style="text-align: justify;">
<li><strong>A growing share of zero day vulnerabilities are being actively exploited each year</strong>, rising from 16% in 2018 to 71% in 2026,</li>
<li><strong>A decreasing time to exploit</strong> (TTE) for these vulnerabilities is noted, falling from several years in 2018 to less than one day in 2026.</li>
</ul>
<p style="text-align: justify;">This is also a <strong>commonly shared observation among Wavestone’s incident response team</strong> in its latest annual report (see: <a href="https://www.wavestone.com/en/insight/2025-wavestone-cert-report/"><span style="color: #451dc7;">CERT-Wavestone annual report</span></a>), which is based on a set of around twenty major incidents affecting Wavestone clients during 2025:</p>
<figure id="attachment_29792" aria-describedby="caption-attachment-29792" style="width: 1688px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="size-full wp-image-29792" style="border: 1px solid #000000;" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/1-Ransomware-An-end-to-end-attack-in-15-days-e1776342358749.png" alt="Ransomware - An end-to-end attack in 1,5 days" width="1688" height="943" /><figcaption id="caption-attachment-29792" class="wp-caption-text"><em>Ransomware &#8211; An end-to-end attack in 1,5 days</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">As a result, to contain and remediate incidents as early as possible our incident response team <strong>must be effective in its analysis and decision‑making</strong>. This requires an especially <strong>quick understanding of the context and of the incident.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The anatomy of a CERT-Wavestone investigation</h2>
<p style="text-align: justify;">Each CERT-Wavestone investigation typically begins with a limited scope before rapidly expanding to cover dozens of systems as the situation evolves:</p>
<ul style="text-align: justify;">
<li><strong>Stage 1 — Initial analysis:</strong> Once the perimeter is secured and initial containment measures are in place, CERT-Wavestone is engaged and assesses the situation on a <strong>handful of suspicious or confirmed compromised machines.</strong> If the client has a SOC or CERT, existing telemetry and detection tooling provide an immediate starting point. If not, CERT-Wavestone leverages available resources to perform initial forensic collections and <strong>outline an initial overview of the attack.</strong></li>
<li><strong>Stage 2 — Broader investigation:</strong> As the killchain becomes clearer, the investigation expands to dozens of compromised machines. When the client’s infrastructure cannot support <strong>large-scale acquisitions,</strong> CERT-Wavestone <strong>deploys its own forensic collection tool to gather triage data efficiently.</strong></li>
<li><strong>Stage 3 — IoC hunting across the entire IS:</strong> Indicators of compromise are established, and the search extends to the entire information system. If not already in place, <strong>EDR or alternative tools can be deployed by CERT-Wavestone</strong>. Large-scale IoC sweeps rely on the built-in capabilities of the EDR, SIEM or log collection platforms.</li>
</ul>
<p style="text-align: justify;">Whether on Stage 1 or Stage 2, each collection requires the<strong> same standardized pipeline:</strong> retrieval, parsing, ingestion, Indicator of Compromise (IoC) identification, and cross-collection correlation. Consequently, <strong>manual forensic processing consumes valuable time and effort,</strong> forcing analysts to handle routine data operations instead of focusing on investigations.</p>
<p style="text-align: justify;"><strong>Handling each collection individually</strong> by each analyst <strong>is slow, prone to errors and discrepancies,</strong> and <strong>poorly scales</strong> to the <strong>number of machines</strong> to investigate, and the<strong> number of analysts</strong> mobilized on the incident.</p>
<p style="text-align: justify;"><strong>This is precisely the problem that StormCell, a tool developed by the CERT-W, was designed to solve.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">StormCell : what is it ?</h2>
<p style="text-align: justify;">StormCell is a tool developed by CERT-Wavestone to address a <strong>long-standing need:</strong> a Windows forensic analysis orchestrator that <strong>adapts to multiple investigation contexts, automates the end-to-end processing of triage data</strong> from artifact extraction to centralized ingestion into a SIEM platform, and frees analysts to <strong>focus on the investigation</strong>, not the pipeline.</p>
<p style="text-align: justify;">Developed in Python to make it easy to use, <strong>the tool was recently published on GitHub</strong> so that the entire incident response community can access it as open source: <strong><span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/CERT-W/StormCell">https://github.com/CERT-W/StormCell</a></span></strong>. <strong>CERT‑Wavestone intends for this tool to be used, tested, and improved directly by the community.</strong></p>
<p style="text-align: justify;">Although other similar tools have been developed and released since the beginning of its development, <strong>StormCell stands out through its modularity and its underlying technology choices, both geared towards speed and adaptability.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Three key stages : ingest, process and enrich, centralize</h3>
<p style="text-align: justify;">StormCell’s workflow is based on three key stages:</p>
<figure id="attachment_29799" aria-describedby="caption-attachment-29799" style="width: 1750px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-29799 size-full" style="border: 1px solid #000000;" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old.png" alt="Three key stages - Ingest, Process and Enrich, Centralize_old" width="1750" height="774" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old.png 1750w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-432x191.png 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-768x340.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/2-Three-key-stages-Ingest-Process-and-Enrich-Centralize_old-1536x679.png 1536w" sizes="(max-width: 1750px) 100vw, 1750px" /><figcaption id="caption-attachment-29799" class="wp-caption-text"><em>Three key stages &#8211; Ingest, Process and Enrich, Centralize</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To properly perform those steps, StormCell relies on several third-party tools : whether it is for artifacts collection with <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://www.kroll.com/en/services/cyber/incident-response-recovery/kroll-artifact-parser-and-extractor-kape">Kape</a></span>, enrichment and ingestion of logs into a SIEM with <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://vector.dev/">Vector</a></span> or SIEM built-in functionalities with <a href="https://www.splunk.com/"><span style="color: #451dc7;">Splunk</span></a> or <a href="https://www.elastic.co/fr/elastic-stack"><span style="color: #451dc7;">ELK</span>.</a></p>
<p style="text-align: justify;">Despite these dependencies, <strong>the tool only needs to be installed and configured once on a single workstation before it can be used throughout the incident response by all analysts.</strong></p>
<p> </p>
<h3 style="text-align: justify;">Extract and Ingest</h3>
<p style="text-align: justify;">StormCell is designed to work with <strong>two types of forensics collections:</strong> disk images and artifact ZIP extracts produced by Kape.</p>
<p style="text-align: justify;">When StormCell is run against a disk image, it directly <strong>uses Kape to extract the relevant artifacts.</strong></p>
<p style="text-align: justify;">Compatible ZIP archives can also be generated with the CERT‑Wavestone tool <a href="https://github.com/CERT-W/CollectRaptor"><span style="color: #451dc7;">CollectRaptor</span></a>, which is based on Velociraptor, or with any other collection performed using the Velociraptor KapeTarget module.</p>
<p> </p>
<h3 style="text-align: justify;">Process and Enrich</h3>
<p style="text-align: justify;">Once raw artifacts are extracted, the core of the processing chain comes into play: <strong>the artifacts are processed with Kape.</strong></p>
<p style="text-align: justify;">Kape is used because it is a <strong>tool dedicated to Windows forensics artifacts parsing</strong>. It allows, through modules, to automatically execute several tools such as the <a href="https://ericzimmerman.github.io/#!index.md"><span style="color: #451dc7;">Zimmerman Suite</span></a>, <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/Yamato-Security/hayabusa">Hayabusa</a></span> or even <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/WithSecureLabs/chainsaw">Chainsaw</a></span>. Moreover, logs parsed by Kape are <strong>directly organized on the filesystem by artifact category</strong> (executions, filesystem, registries, etc.) allowing to perform efficient local and manual analysis whenever necessary.</p>
<p style="text-align: justify;">As a whole, StormCell <strong>uses Kape to run more than thirty artifact‑processing tools</strong>, each covering a complementary analysis scope and <strong>ensuring a high level of exhaustiveness for the elements available to analysts.</strong></p>
<p style="text-align: justify;">All these tools <strong>can be easily downloaded through the StormCell installation command</strong> described in its Readme. <strong>StormCell’s modular configuration</strong> also makes it <strong>simple to integrate new artifact‑processing tools as needed.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Centralize</h3>
<p style="text-align: justify;">Once the artifacts have been parsed by Kape,<strong> the generated logs are normalized, enriched, and sent to a SIEM platform through Vector,</strong> an open‑source tool <strong>particularly well‑suited to handling large volumes of data.</strong></p>
<p style="text-align: justify;">To determine which artifacts to send, as well as the normalizations and enrichments to apply, <strong>Vector relies on its TOML configuration files. These files include parsers that structure raw data into meaningful fields, and sinks (output destinations) that route events to the target environment,</strong> whether a client’s ELK or Splunk instance, or an internal ELK instance dedicated to CERT‑Wavestone.</p>
<p style="text-align: justify;">To retrieve these configurations, <strong>StormCell uses the configuration files from the GitHub repository <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/Qazeer/Vector4IR">Vector4IR</a> </span></strong>whose CERT‑Wavestone is a contributor.</p>
<p> </p>
<h3 style="text-align: justify;">A major time-saver for analysts</h3>
<p style="text-align: justify;">By chaining these three stages together, <strong>each forensic collection only needs to be processed once before it becomes available in the SIEM for all analysts</strong>. This makes it possible to carry out global investigations while fully <strong>leveraging the built‑in capabilities of SIEM technologies:</strong> search languages, dashboards and saved searches, lookups and data tables, correlation features, and so on.</p>
<p style="text-align: justify;">The retrieval of collections and their<strong> handling with StormCell can be handled by a single analyst, while the others can already begin investigating in real time</strong> as the logs are being sent.</p>
<p> </p>
<h2 style="text-align: justify;">StormCell execution modes</h2>
<p style="text-align: justify;">According to the setup and configuration details provided in the Readme of the <span style="color: #451dc7;"><a style="color: #451dc7;" href="https://github.com/CERT-W/StormCell">Github repository</a></span>,<strong> a dedicated setup command can be used to download all the tools required</strong> for StormCell to properly operate. In addition, <strong>numerous options,</strong> described in the default configuration file and the help command, <strong>are available to accommodate different execution requirements.</strong></p>
<p style="text-align: justify;">For example, <strong>it is possible to specify which Kape modules should run, or to force a fresh processing and re‑ingestion of logs.</strong> Because StormCell <strong>uses a local database file to maintain state across successive executions,</strong> its behavior can be completely reset by removing this database.</p>
<p style="text-align: justify;">Finally, StormCell offers <strong>three complementary execution modes,</strong> designed to adapt to every investigation context, from small scopes to large‑scale crises, and to let analysts be operational as quickly as possible, regardless of the types of resources available to them.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Once mode: small scopes and need for rapid investigation</h3>
<p style="text-align: justify;"><strong>Designed specifically for targeted investigations</strong> on a limited scope, this mode <strong>handles a set of preexisting collections in a single execution.</strong></p>
<p style="text-align: justify;">After an initial configuration by the analysts, <strong>the tool executes and enables the analysis of the collections without any additional steps.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Mountpoint mode: local collect and analysis in a single command</h3>
<p style="text-align: justify;">Mountpoint is StormCell’s end‑to‑end execution mode:<strong> from collecting artifacts on a disk or a locally mounted forensic copy all the way to sending them into the SIEM.</strong></p>
<p style="text-align: justify;">This mode is preferred when analyzing disk copies, and it <strong>natively includes artifact extraction through Kape’s built‑in capabilities.</strong> Once the extraction is complete, <strong>its behavior is similar to the Once mode.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Loop mode : Continuous processing for large‑scale investigations</h3>
<p style="text-align: justify;">CERT-Wavestone’s preferred mode, it is <strong>designed for large‑scale crises</strong> and aims to enable StormCell to run continuously throughout the incident. Once configured, the tool monitors a designated folder and automatically processes all collections placed there by the analysts.</p>
<p style="text-align: justify;"><strong>This centralized drop‑off folder becomes the logistical core of the investigation:</strong> once it is set up, analysts no longer need to worry about processing collections, whether the incident lasts a few days or several weeks, and<strong> can simply deposit the triage images then access the processed data in the SIEM platform being used.</strong></p>
<p style="text-align: justify;">Finally, <strong>two levels of artifact processing can be configured</strong> to best match analysts’ needs when investigations are carried out <strong>on new machines:</strong></p>
<ul style="text-align: justify;">
<li><strong>Short</strong>: a <strong>lightweight treatment</strong> prioritizing speed, suited to surface‑level analyses that quickly assess a machine and help prioritize investigations.</li>
<li><strong>Long</strong>: an <strong>exhaustive treatment</strong> that activates in‑depth analysis modules, intended for detailed investigations requiring a full view of the machine’s activity.</li>
</ul>
<p style="text-align: justify;"><strong>The modules to be executed in both modes can be freely configured</strong> by the analyst using StormCell. These two complementary modes make it possible to deposit archives initially into the <strong>Short folder to obtain a quick but non-exhaustive list of artifacts</strong>, then later in the investigations, deposit them into the <strong>Long folder to obtain an exhaustive list of artifacts.</strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">StormCell : What’s next ?</h2>
<p style="text-align: justify;">StormCell is currently a key tool frequently used within CERT‑Wavestone to accelerate the processing of Windows artifacts during its investigations.</p>
<p style="text-align: justify;"><strong>Its orchestration capabilities are planned to be extended to investigations on Cloud environments, particularly M365, as well as Linux and macOS,</strong> while also exploring the integration of new forensic sources and advanced technologies such as the use of AI.</p>
<p style="text-align: justify;">That’s why CERT‑Wavestone invites you to <strong>contribute to its evolution:</strong> forks, pull requests, and feedback from your operational experience are welcome, so that StormCell can become the most suitable tool possible for incident response needs.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/">StormCell: How our blue team scales up incident response</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/stormcell-how-our-blue-team-scales-up-incident-response/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zimbra Mailbox Compromise: From Analysis to Remediation (Part 2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Evenson Jeunesse]]></dc:creator>
		<pubDate>Wed, 07 Jan 2026 09:47:27 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Amavis]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Zimbra]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28717</guid>

					<description><![CDATA[<p>It&#8217;s time to begin the second part of our Zimbra investigation. If you haven&#8217;t read the first part yet, we strongly recommend starting HERE before continuing.In this second part, we&#8217;ll assume that an attacker has managed to compromise a Zimbra...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">It&#8217;s time to begin the second part of our Zimbra investigation. If you haven&#8217;t read the first part yet, we strongly recommend starting <a href="https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/"><span style="color: #000080;">HERE</span> </a>before continuing.<br />In this second part, we&#8217;ll assume that an attacker has managed to compromise a Zimbra account and that we&#8217;ve already identified their entry point (initial access). We&#8217;ll now analyze how to leverage Zimbra logs to identify the malicious actions the attacker could have carried out from their access. We&#8217;ll then see what remediation measures to implement to prevent this type of incident and respond to it effectively.<br />Get comfortable (and make sure your coffee is still hot): let&#8217;s dive right into the heart of the matter!</p>
<p> </p>
<h2>Investigating in a Zimbra Environment</h2>
<p style="text-align: justify;">Now that Zimbra’s infrastructure and logs <strong>hold no secrets for you</strong>, it’s time to get <strong>practical</strong>.</p>
<p style="text-align: justify;">Imagine you’re a forensic analyst, arriving early one morning, when suddenly: <strong>the phone rings.</strong> You’re being called because several users are reporting that emails, <strong>they didn’t send</strong> are appearing in their “Sent” folder.</p>
<p style="text-align: justify;"><strong>Panic ensues</strong>! Users are afraid to log into their mailboxes, and some administrators start wondering whether the <strong>Zimbra infrastructure itself</strong> might be <strong>compromised</strong>.</p>
<p style="text-align: justify;">Since you know Zimbra inside out, the team naturally turns to you to <strong>investigate this incident</strong>!</p>
<p style="text-align: justify;">As a forensic analyst, many questions come to mind:</p>
<ul style="text-align: justify;">
<li><em>Have the accounts really been compromised? If so, how and since when?</em></li>
<li><em>How many users are affected?</em></li>
<li><em>What is the attacker’s objective, and what malicious actions have been carried out from these accounts?</em></li>
<li><em>Have the mail server or other Zimbra components been compromised?</em></li>
<li><em>And, most importantly: do I have time for a coffee </em><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2615.png" alt="☕" class="wp-smiley" style="height: 1em; max-height: 1em;" /><em> before the information hunt begins?</em></li>
</ul>
<p style="text-align: justify;">To help you in your investigation, we’ll look at how to answer these questions through Zimbra log analysis. But first, here are some tips to guide your investigation.</p>
<p style="text-align: justify;">During incident response, it’s easy to feel <strong>overwhelmed</strong> by the <strong>amount of logs</strong> <strong>and</strong> <strong>events</strong> <strong>to analyze</strong>. Keeping a clear line of reasoning is essential. A few simple practices can help maintain focus:</p>
<ul style="text-align: justify;">
<li><strong>Confirm:</strong> Verify the information that triggered the incident. Before diving deeper, ensure the initial alert is accurate. This undeniable baseline will serve as the foundation for the entire investigation.</li>
<li><strong>Correlate:</strong> Cross-check suspicious IP addresses and domains with other sources (proxy, VPN, EDR, online antivirus databases). This provides additional context related to the identified indicator.</li>
<li><strong>Pivot:</strong> Use the collected information to expand your analysis. An attacker might reuse the same IP address or user-agent across multiple accounts. Conversely, a compromised account might be accessed from different IP addresses or user-agents. Pivoting can reveal other indicators that help identify the attacker.</li>
<li><strong>Compare patterns:</strong> Even without direct access to email content or attachments, certain elements can reveal similarities (file size, identical filenames, repeated sequences of actions after account compromise). This behavioral analysis approach can help identify multiple users compromised by the same attacker. Such hypotheses should be formulated and handled cautiously, but they can be valuable for confirming intuition.</li>
<li><strong>Ensure log preservation:</strong> This may seem obvious, but as soon as an incident is detected, securing the logs is critical. Collect logs immediately from the entire Zimbra infrastructure and extend their retention period to prevent automatic deletion. Because let’s be honest: logs disappearing just as the forensic team arrives is a way too common scenario… one you definitely want to avoid.</li>
</ul>
<p style="text-align: justify;">While these tips <strong>aren’t exhaustive</strong>, they provide a solid foundation for conducting an analysis that is both <strong>fast</strong> and <strong>efficient</strong>.</p>
<p> </p>
<h2>Post-compromise activity</h2>
<h3>Analysis of user activity  </h3>
<p style="text-align: justify;"><strong>What mastery</strong>! You have successfully traced back to the initial entry point used by the attacker to compromise user accounts. You have identified the malicious IP addresses, spotted the User-Agent used, and even uncovered other compromised accounts thanks to this information. In short, clean and efficient work. Impressive!</p>
<p style="text-align: justify;">But… we still haven’t answered a crucial question: &#8220;<em>What was the attacker’s objective, and what actions did they take from the compromised accounts?</em>&#8220;</p>
<p style="text-align: justify;">To find out, you now need to analyze the <strong>attacker’s activity within the Zimbra infrastructure</strong>. Once authenticated, an attacker can indeed:</p>
<ul style="text-align: justify;">
<li>Launch an <strong>internal</strong> or <strong>external</strong> <strong>phishing</strong> <strong>campaign</strong></li>
<li>Send messages aimed at tricking a colleague, partner, or client into taking action (CEO fraud, fictitious urgent requests, etc.)</li>
<li><strong>Exfiltrate sensitive data</strong> from mailboxes</li>
</ul>
<p style="text-align: justify;">In this section, we will examine <strong>some examples of suspicious activities</strong> that can be identified from Zimbra logs.</p>
<p> </p>
<h4>Sending a large number of emails in a short amount of time</h4>
<p style="text-align: justify;">You want to determine whether compromised accounts were used to co<strong>nduct additional phishing attempts</strong> by sending <strong>mass emails</strong> to <strong>internal</strong> or <strong>external</strong> <strong>recipients</strong>. Unfortunately, Zimbra does not provide a native event that allows you to retrieve this information directly. However, a simple <strong>grep</strong> command will get the job done.</p>
<p style="text-align: justify;">The command below extracts the <strong>number of messages sent by each user</strong> over a specific period (here, from <strong>November</strong> <strong>21 to November 27, 2025</strong>):</p>
<figure id="attachment_28721" aria-describedby="caption-attachment-28721" style="width: 1377px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-28721" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_.png" alt="Retrieving the number of emails sent per user (mailbox.log)" width="1377" height="444" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_-437x141.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/1-Retrieving-the-number-of-emails-sent-per-user-mailbox.log_-768x248.png 768w" sizes="(max-width: 1377px) 100vw, 1377px" /><figcaption id="caption-attachment-28721" class="wp-caption-text"><em>Retrieving the number of emails sent per user (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In this example, <strong>user25@wavestone.corp</strong> clearly <strong>stands out</strong> with a <strong>sending volume far above normal</strong>. An <strong>unusually high volume</strong> of emails sent from a mailbox <strong>over a short period</strong> constitutes <strong>suspicious activity</strong>.</p>
<p style="text-align: justify;">In legitimate use, mass email sending is relatively rare and is generally associated with <strong>generic addresses</strong> or <strong>internal communication systems</strong> (e.g., newsletters, HR announcements). When a standard user account exhibits this type of behavior, it is important to:</p>
<ul style="text-align: justify;">
<li>Determine whether this is normal, recurring activity for the user</li>
<li>Check the sending time frame, IP address, and User-Agent</li>
<li>Verify whether any suspicious attachments were associated with the emails</li>
</ul>
<p style="text-align: justify;">Mass email sending can <strong>trigger built-in protection mechanisms</strong> in Zimbra, including <strong>quota rules</strong>. These thresholds are designed to limit the volume of messages sent by an account over a given period to prevent abuse, spam, or phishing campaigns.</p>
<p style="text-align: justify;">The two commands below allow you to retrieve events related to quota exceedances:</p>
<figure id="attachment_28723" aria-describedby="caption-attachment-28723" style="width: 1378px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28723" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_.png" alt="Retrieval of quota overruns (mailbox.log)" width="1378" height="146" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_.png 1378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_-437x46.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_-71x8.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/2-Retrieval-of-quota-overruns-mailbox.log_-768x81.png 768w" sizes="auto, (max-width: 1378px) 100vw, 1378px" /><figcaption id="caption-attachment-28723" class="wp-caption-text"><em>Retrieval of quota overruns (mailbox.log)</em></figcaption></figure>
<figure id="attachment_28727" aria-describedby="caption-attachment-28727" style="width: 1375px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28727" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_.png" alt="Retrieval of quota overruns (mail.log)" width="1375" height="187" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_.png 1375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/3-Retrieval-of-quota-overruns-mail.log_-768x104.png 768w" sizes="auto, (max-width: 1375px) 100vw, 1375px" /><figcaption id="caption-attachment-28727" class="wp-caption-text"><em>Retrieval of quota overruns (mail.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">The appearance of error messages related to quota exceedances is a signal <strong>not to be ignored</strong>, because:</p>
<ul style="text-align: justify;">
<li>Either the legitimate user accidentally exceeded a quota</li>
<li>Or the account is being used fraudulently to send mass emails</li>
</ul>
<p style="text-align: justify;">Since this indicator can generate a <strong>large number of false positives</strong>, it is recommended to <strong>correlate it with other information</strong> in order to draw meaningful conclusions.</p>
<p> </p>
<h4>Sending an email to a large number of recipients</h4>
<p style="text-align: justify;">To avoid triggering a quota‑exceedance alert, a more seasoned attacker may adopt a more &#8220;<em>subtle</em>&#8221; strategy. Instead of sending <strong>dozens of individual</strong> emails (a noisy method), they may choose to send a <strong>single message</strong> addressed to a <strong>long list of recipients</strong>: an efficient way to optimize their phishing campaign.</p>
<p style="text-align: justify;">Fortunately for you, Zimbra logs make it possible to identify the <strong>number of recipients associated with each sent email</strong>, which makes this type of maneuver detectable without too much effort.</p>
<p style="text-align: justify;">The commands below allow you to identify emails sent to an unusually <strong>high number of recipients</strong>:</p>
<figure id="attachment_28729" aria-describedby="caption-attachment-28729" style="width: 1377px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28729" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_.png" alt="Retrieval of emails sent to more than 100 recipients (mail.log)" width="1377" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_-437x46.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_-71x7.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/4-Retrieval-of-emails-sent-to-more-than-100-recipients-mail.log_-768x80.png 768w" sizes="auto, (max-width: 1377px) 100vw, 1377px" /><figcaption id="caption-attachment-28729" class="wp-caption-text"><em>Retrieval of emails sent to more than 100 recipients (mail.log)</em></figcaption></figure>
<figure id="attachment_28731" aria-describedby="caption-attachment-28731" style="width: 1371px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28731" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_.png" alt="Retrieval of emails sent to more than 100 recipients (mailbox.log)" width="1371" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_.png 1371w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/5-Retrieval-of-emails-sent-to-more-than-100-recipients-mailbox.log_-768x104.png 768w" sizes="auto, (max-width: 1371px) 100vw, 1371px" /><figcaption id="caption-attachment-28731" class="wp-caption-text"><em>Retrieval of emails sent to more than 100 recipients (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Here, you can observe that the user <strong>user25@wavestone.corp</strong> sent an email to <strong>211 recipients</strong>. Such behavior is clearly <strong>suspicious</strong>.</p>
<p style="text-align: justify;">In practice, it is <strong>rare</strong> for a <strong>personal email address</strong> to send a message to s<strong>everal dozen recipients simultaneously</strong>. This type of volume is usually associated with <strong>shared mailboxes</strong> or <strong>generic addresses</strong> (e.g., internal communications, HR services, institutional announcements).</p>
<p style="text-align: justify;">When a standard user account exhibits this kind of activity, it is essential to:</p>
<ul style="text-align: justify;">
<li>identify the usual communication practices within the organization</li>
<li>determine whether this sending volume is normal or recurrent for the user in question</li>
<li>examine the time window, IP address, and user agent used during the sending</li>
<li>check if any potentially malicious attachments were associated with the messages</li>
</ul>
<p style="text-align: justify;">To save time, it is often relevant to <strong>confirm directly with the user</strong> whether the sending was legitimate.</p>
<p style="text-align: justify;">The example presented here isolates sends containing <strong>more than 100 recipients</strong>. However, this <strong>threshold should be adjusted</strong> depending on:</p>
<ul>
<li style="text-align: justify;">the usual volume within the organization</li>
<li style="text-align: justify;">the type of accounts involved</li>
<li style="text-align: justify;">and the period covered by the logs analyzed</li>
</ul>
<p> </p>
<h4>Uploading suspicious attachments</h4>
<p style="text-align: justify;">Unlike email reception, the <strong>upload of suspicious attachments</strong> is better logged by Zimbra. Each time a user attaches a file to a new email, Zimbra carefully records the operation in its logs.</p>
<p style="text-align: justify;">Using the commands below, you can <strong>retrieve the attachments added to emails</strong> by a potentially compromised user:</p>
<figure id="attachment_28737" aria-describedby="caption-attachment-28737" style="width: 1374px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28737" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2.png" alt="Retrieval of attachment upload events (mailbox.log) (1/2)" width="1374" height="184" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2.png 1374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/6-Retrieval-of-attachment-upload-events-mailbox.log-1-2-768x103.png 768w" sizes="auto, (max-width: 1374px) 100vw, 1374px" /><figcaption id="caption-attachment-28737" class="wp-caption-text"><em>Retrieval of attachment upload events (mailbox.log) (1/2)</em></figcaption></figure>
<figure id="attachment_28739" aria-describedby="caption-attachment-28739" style="width: 1377px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28739" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2.png" alt="Retrieval of attachment upload events (mailbox.log) (2/2)" width="1377" height="147" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2-437x47.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2-71x8.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/7-Retrieval-of-attachment-upload-events-mailbox.log-2-2-768x82.png 768w" sizes="auto, (max-width: 1377px) 100vw, 1377px" /><figcaption id="caption-attachment-28739" class="wp-caption-text"><em>Retrieval of attachment upload events (mailbox.log) (2/2)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Similarly to the reception of malicious attachments, you can search in the logs for:</p>
<ul style="text-align: justify;">
<li>the <strong>upload of attachments with suspicious extensions</strong> (e.g., .htm, .html, .exe, .js, .arj, .iso, .bat, .ps1, or Office/PDF documents containing macros);</li>
<li><strong>files already observed earlier</strong> during the initial phases of the incident (for example, a document downloaded by patient zero);</li>
<li><strong>correlating upload activities</strong> with malicious source IP addresses or accounts identified as compromised.</li>
</ul>
<p style="text-align: justify;">This list is <strong>not exhaustive</strong>; it may be relevant to search for <strong>any type of file</strong> that seems <strong>pertinent</strong> <strong>to the context of your investigation</strong>.</p>
<p> </p>
<h4>Removal of traces</h4>
<p style="text-align: justify;">Now that you have a clear picture of what the attacker did with the compromised accounts, you are disappointed because you <strong>cannot locate the emails in question</strong>. You suspect that the attacker <strong>erased its traces</strong>. But how can you verify this?</p>
<p style="text-align: justify;">Indeed, after sending malicious emails, an experienced attacker may try to <strong>hide its tracks</strong> from the legitimate mailbox owner by <strong>deleting sent emails</strong> or returned messages.</p>
<p style="text-align: justify;">Fortunately, the following commands will allow you to <strong>identify email deletions </strong>performed in Zimbra:</p>
<figure id="attachment_28743" aria-describedby="caption-attachment-28743" style="width: 1373px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28743" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_.png" alt="Retrieval of deleted items from the trash (mailbox.log)" width="1373" height="361" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_.png 1373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_-437x115.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/8-Retrieval-of-deleted-items-from-the-trash-mailbox.log_-768x202.png 768w" sizes="auto, (max-width: 1373px) 100vw, 1373px" /><figcaption id="caption-attachment-28743" class="wp-caption-text"><em>Retrieval of deleted items from the trash (mailbox.log)</em></figcaption></figure>
<figure id="attachment_28746" aria-describedby="caption-attachment-28746" style="width: 1375px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28746" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_.png" alt="Retrieval of permanently deleted files (mail.log)" width="1375" height="364" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_.png 1375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_-437x116.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/9-Retrieval-of-permanently-deleted-files-mail.log_-768x203.png 768w" sizes="auto, (max-width: 1375px) 100vw, 1375px" /><figcaption id="caption-attachment-28746" class="wp-caption-text"><em>Retrieval of permanently deleted files (mail.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In legitimate use, it is not uncommon for a user to <strong>delete multiple emails</strong> (e.g., inbox cleanup, managing newsletters). However, the situation becomes <strong>suspicious</strong> when deletions occur:</p>
<ul style="text-align: justify;">
<li><strong>Immediately</strong> after a <strong>mass email sending</strong></li>
<li>Targeting specifically the <strong>most recently sent messages</strong></li>
</ul>
<p style="text-align: justify;">During your investigation, keep in mind that an attacker may also attempt to delete:</p>
<ul style="text-align: justify;">
<li><strong>Read receipts generated by their emails</strong></li>
<li><strong>Automatic replies</strong> (out-of-office messages, NDRs) that could alert the victim</li>
</ul>
<p style="text-align: justify;">It is therefore important <strong>not to overlook deletions</strong> and to <strong>correlate them with other indicators</strong> (suspicious authentications, mass email sending, quota exceedances, connections from malicious IPs) to assess the <strong>legitimacy</strong> <strong>of these actions</strong>.</p>
<p> </p>
<h4>Data exfiltration</h4>
<p style="text-align: justify;"><strong>One question still troubles you</strong>… Among the compromised accounts, some belonged to users who handled sensitive data for the company. You therefore want to determine whether the attacker attempted to <strong>exfiltrate any email</strong> they had access to.</p>
<p style="text-align: justify;">Unfortunately for you, <strong>Zimbra does not log the direct download of emails</strong>. After all, retrieving messages via IMAP or SMTP is essentially a &#8220;<em>download</em>&#8221; from the server to the mail client. It is therefore difficult to distinguish a <strong>normal transfer</strong> from a <strong>malicious download</strong>. And in the Nginx logs (which expose the webmail), the same issue arises: it is impossible to precisely identify whether an email was downloaded.</p>
<p style="text-align: justify;">As a small consolation, Zimbra does log certain internal operations, particularly <strong>copy actions</strong> performed within the mailbox. An attacker could, for example, create a folder to store sensitive emails before extraction.</p>
<p style="text-align: justify;">The following command allows you to identify a <strong>massive copy of emails</strong> <strong>into a folder</strong> (here named &#8220;<em>Exfiltration</em>&#8220;) from the web client:</p>
<figure id="attachment_28748" aria-describedby="caption-attachment-28748" style="width: 1254px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28748" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2.png" alt="Retrieval of mass email copy events (mailbox.log) (1/2)" width="1254" height="785" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2.png 1254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/10-Retrieval-of-mass-email-copy-events-mailbox.log-1-2-768x481.png 768w" sizes="auto, (max-width: 1254px) 100vw, 1254px" /><figcaption id="caption-attachment-28748" class="wp-caption-text"><em>Retrieval of mass email copy events (mailbox.log) (1/2)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">The following command allows you to identify a copy of a large number of emails in a folder from an IMAP thick client:</p>
<figure id="attachment_28750" aria-describedby="caption-attachment-28750" style="width: 1129px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28750" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2.png" alt="Retrieval of mass email copy events (mailbox.log) (2/2)" width="1129" height="708" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/11-Retrieval-of-mass-email-copy-events-mailbox.log-2-2-768x482.png 768w" sizes="auto, (max-width: 1129px) 100vw, 1129px" /><figcaption id="caption-attachment-28750" class="wp-caption-text"><em>Retrieval of mass email copy events (mailbox.log) (2/2)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Although there are legitimate cases (e.g., manual backup by the user), this type of activity should <strong>raise attention</strong>, especially when correlated with:</p>
<ul style="text-align: justify;">
<li>Logins from unusual IP addresses</li>
<li>Suspicious authentications</li>
<li>Mass email sending</li>
</ul>
<p style="text-align: justify;">However, as you can see, it is very difficult to <strong>confirm a data exfiltration</strong>. Therefore, it should be assumed that if a <strong>mailbox is compromised</strong>, the attacker potentially had the ability to <strong>download all emails</strong> <strong>of the affected user</strong>.</p>
<p> </p>
<h3>Detection of antivirus and antispam solutions</h3>
<p style="text-align: justify;">We haven’t really covered this until now, but it’s important to know that Zimbra natively integrates <strong>Amavis</strong>, a &#8220;<em>central</em>&#8221; component that <strong>orchestrates various security engines</strong>. These engines help identify suspicious files, phishing campaigns, and mass spam sending. It is therefore valuable to leverage these detection mechanisms when analyzing an attacker’s activities.</p>
<p style="text-align: justify;">During your investigations, examining the messages generated by Amavis can help highlight:</p>
<ul>
<li style="text-align: justify;"><strong>Messages blocked</strong> before reaching the user’s mailbox (e.g., spoofing attempts)</li>
<li style="text-align: justify;"><strong>Malicious attachments</strong> detected and placed in quarantine</li>
<li style="text-align: justify;"><strong>Violations of certain security policies</strong> defined on the platform</li>
</ul>
<p> </p>
<h4>Amavis</h4>
<p style="text-align: justify;">It is possible to retrieve certain events generated by <strong>Amavis</strong> with the following commands:</p>
<figure id="attachment_28754" aria-describedby="caption-attachment-28754" style="width: 1124px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28754" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_.png" alt="Retrieval of amavis events (mail.log)" width="1124" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_.png 1124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_-437x72.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/12-Retrieval-of-amavis-events-mail.log_-768x126.png 768w" sizes="auto, (max-width: 1124px) 100vw, 1124px" /><figcaption id="caption-attachment-28754" class="wp-caption-text"><em>Retrieval of amavis events (mail.log)</em></figcaption></figure>
<figure id="attachment_28757" aria-describedby="caption-attachment-28757" style="width: 1127px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28757" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_.png" alt="Retrieval of amavis events (mailbox.log)" width="1127" height="272" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_.png 1127w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_-437x105.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/13-Retrieval-of-amavis-events-mailbox.log_-768x185.png 768w" sizes="auto, (max-width: 1127px) 100vw, 1127px" /><figcaption id="caption-attachment-28757" class="wp-caption-text"><em>Retrieval of amavis events (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Since Amavis generates a <strong>large number of events</strong>, it may be wise to focus your investigation on detections related to <strong>spam</strong> and <strong>phishing</strong>. Note that the identification of phishing messages has already been discussed in a previous section of this article (&#8220;<em>Account Compromise via Phishing Attack</em>&#8220;)</p>
<p> </p>
<h4>Incoming spam</h4>
<p style="text-align: justify;">It may be useful to identify messages that have triggered incoming <strong>spam detections</strong>. When a message is classified as spam, Zimbra generates logs indicating the <strong>reason for this categorization</strong>.</p>
<p style="text-align: justify;">These events can contain <strong>several useful pieces of information</strong>:</p>
<ul style="text-align: justify;">
<li>The affected account</li>
<li>The unique identifier of the message in the mailbox</li>
<li>The originating IP address of the email</li>
<li>Additionally, in the case of a SpamReport:
<ul>
<li>The result of the analysis (isSpam field)</li>
<li>The action taken (e.g., moving the message from the Inbox to Junk)</li>
<li>Sometimes the recipient of the report used for training or reporting purposes (e.g., a dedicated address such as spam@wavestone.corp</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">The following command can help you <strong>identify events related to the processing of incoming spam:</strong></p>
<figure id="attachment_28759" aria-describedby="caption-attachment-28759" style="width: 1124px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28759" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_.png" alt="Retrieval of events related to incoming spam (zimbra.log)" width="1124" height="456" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_.png 1124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_-437x177.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/14-Retrieval-of-events-related-to-incoming-spam-zimbra.log_-768x312.png 768w" sizes="auto, (max-width: 1124px) 100vw, 1124px" /><figcaption id="caption-attachment-28759" class="wp-caption-text"><em>Retrieval of events related to incoming spam (zimbra.log)</em></figcaption></figure>
<figure id="attachment_28761" aria-describedby="caption-attachment-28761" style="width: 1127px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28761" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_.png" alt="Retrieval of events related to incoming spam (mailbox.log)" width="1127" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_.png 1127w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_-437x60.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/15-Retrieval-of-events-related-to-incoming-spam-mailbox.log_-768x105.png 768w" sizes="auto, (max-width: 1127px) 100vw, 1127px" /><figcaption id="caption-attachment-28761" class="wp-caption-text"><em>Retrieval of events related to incoming spam (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Since spam detections generate a <strong>large number of false positives</strong>, it may be useful to <strong>narrow the scope of your investigation</strong> as much as possible (for example, by focusing on a specific time period or a specific set of users).</p>
<p> </p>
<h4>Outgoing spam</h4>
<p style="text-align: justify;">The threat does not always come from outside. Some malicious emails <strong>sent from compromised internal accounts</strong> to external recipients can leave very interesting traces in Zimbra’s logs. Indeed, if the message sent from the compromised account is <strong>blocked by the recipient mail server’s antispam solution</strong>, that server will send an error notification back to the Zimbra server to report the rejection.</p>
<p style="text-align: justify;">Analyzing these <strong>non-delivery reports (NDRs)</strong> can therefore raise a red flag:<br />it may reveal that a user is compromised… or that an account has been used in an <strong>attempt to send malicious emails</strong>.</p>
<p style="text-align: justify;">It is possible to extract these rejected messages using the following command:</p>
<figure id="attachment_28763" aria-describedby="caption-attachment-28763" style="width: 1130px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28763" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam.png" alt="Retrieval of events related to outgoing spam" width="1130" height="188" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam.png 1130w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam-437x73.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/01/16-Retrieval-of-events-related-to-outgoing-spam-768x128.png 768w" sizes="auto, (max-width: 1130px) 100vw, 1130px" /><figcaption id="caption-attachment-28763" class="wp-caption-text"><em>Retrieval of events related to outgoing spam</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Outgoing spam is generally rare. Analyzing it only becomes truly useful in cases where the attacker attempts to <strong>lateralize</strong> to <strong>external email accounts</strong>.</p>
<p> </p>
<h2>Remediation measures</h2>
<p style="text-align: justify;"><strong>You have conducted your investigation at full speed</strong>: compromised users identified, malicious IP addresses cataloged, suspicious activities analyzed… in short, you have traced the attack with surgical precision. It is now time to move to the next step: <strong>remediation</strong>.</p>
<p style="text-align: justify;">The primary goal of remediation is to <strong>remove the attacker’s access</strong> to the infrastructure, <strong>implement detection mechanisms</strong> capable of preventing further compromise attempts, and <strong>strengthen user awareness</strong> to limit the impact of <strong>ongoing</strong> and <strong>future</strong> <strong>phishing</strong> <strong>campaigns</strong>.</p>
<p style="text-align: justify;">By <strong>collecting various indicators</strong> related to the phishing campaign (compromised or suspected accounts, email addresses, malicious IPs and domains, etc.), it is recommended to implement a series of <strong>corrective</strong> and <strong>preventive</strong> <strong>actions</strong> (non-exhaustive):</p>
<ul style="text-align: justify;">
<li><strong>Reset passwords for suspected accounts</strong>: For any user who has been compromised or is suspected of being compromised, a password reset is required.</li>
<li><strong>Block malicious domains, IP addresses, and email addresses</strong>: Infrastructure elements used by the attacker (domains, IPs, senders) should be blocked using available network solutions (proxy, firewall, mail filters) as soon as they are detected. This will limit the risk of further propagation.</li>
<li><strong>Perform antivirus/EDR scans on compromised user workstations</strong>: Workstations of compromised users should undergo antivirus or EDR analysis to:
<ul>
<li>Detect and remove any potential malicious files</li>
<li>Ensure that phishing-related files are no longer present on the workstation</li>
</ul>
</li>
<li><strong>Strengthen user awareness</strong>: Communication about ongoing phishing campaigns should be sent to users to prevent further compromise. Regular phishing awareness campaigns are strongly recommended, particularly for users who have already been compromised.</li>
<li><strong>Implement multi-factor authentication (MFA) for Zimbra mail access</strong>: Deploying a second authentication factor is highly recommended to secure mailbox access. While MFA can be perceived as inconvenient, using a Single Sign-On (SSO) with unified MFA can reduce friction while strengthening overall authentication security.</li>
<li><strong>Deploy a specialized phishing detection and filtering solution</strong>: It is recommended to install a specialized solution in detecting malicious activity in email environments. The solution should be able to identify:
<ul>
<li>Logins from unusual IP addresses</li>
<li>Brute-force attempts on user accounts</li>
<li>Mass email sending to numerous recipients</li>
<li>Use of suspicious attachments or links to untrusted domains</li>
<li>Active phishing campaigns (e.g., identified by a CTI service)</li>
</ul>
</li>
<li><strong>Ensure Zimbra log retention</strong>: It is important to secure the collection and retention of logs. It is recommended to centralize logs from the entire Zimbra infrastructure on a server external to that infrastructure. This ensures that even in the event of compromise, modification, or encryption of Zimbra servers, logs remain intact and accessible, allowing reliable forensic investigations.</li>
</ul>
<p style="text-align: justify;">Although non-exhaustive, these remediation measures will help <strong>restore confidence</strong> in your Zimbra infrastructure and user accounts. <strong>Continuous monitoring</strong> and <strong>improvement</strong> <strong>of</strong> <strong>the</strong> <strong>security</strong> <strong>posture</strong> will, however, be necessary to adapt to <strong>future</strong> <strong>threats</strong>.</p>
<h1 style="text-align: justify;"> </h1>
<p style="text-align: justify;">At the end of this little investigation, one thing is certain: while the attacker can choose the easiest path, the forensic analyst doesn’t have that luxury. Between <strong>scattered</strong> (or sometimes <strong>missing</strong>) <strong>logs</strong>, <strong>conflicting</strong> <strong>user</strong> <strong>testimonials</strong>, and <strong>limited</strong> <strong>visibility</strong> into certain Zimbra events, conducting an investigation can sometimes feel <strong>like solving a Rubik’s Cube</strong>… <strong>in the dark</strong>… <strong>with mittens on</strong>.</p>
<p style="text-align: justify;">But with a <strong>solid methodology</strong> and a <strong>few good habits</strong>, Zimbra can reveal far more information than it might seem at first glance. Its logs are a <strong>real goldmine</strong>, provided you <strong>don’t get lost in them</strong>.</p>
<p style="text-align: justify;">Ultimately, this article does not aim to turn every reader into a J<strong>edi master of Zimbra forensics</strong>… but if it can save you two days of trying to <strong>decode Zimbra logs</strong> or <strong>hunt down the useful information</strong>, then the goal has been achieved!</p>
<p style="text-align: justify;">And as is often said, in cybersecurity as elsewhere, <strong>prevention is better than cure</strong>. So harden your Zimbra infrastructure, back up your logs, raise user awareness… and above all, don&#8217;t be short on coffee supplies!</p>
<p> </p>
<h1>Sources</h1>
<ul>
<li><span style="color: #000080;"><a style="color: #000080;" href="https://wiki.zimbra.com/wiki/Log_Files">https://wiki.zimbra.com/wiki/Log_Files</a></span></li>
<li><span style="color: #000080;"><a style="color: #000080;" href="https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview">https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview</a></span></li>
<li><span style="color: #000080;"><a style="color: #000080;" href="https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes">https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes</a></span></li>
</ul>
<p> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/01/zimbra-mailbox-compromise-from-analysis-to-remediation-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zimbra Mailbox Compromise: From Analysis to Remediation (Part 1)</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/#respond</comments>
		
		<dc:creator><![CDATA[Evenson Jeunesse]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 09:07:27 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[Compromission]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[SPF]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Zimbra]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28540</guid>

					<description><![CDATA[<p>The simplest attacks are often the most effective. In most companies, webmail access portals are exposed on the internet and do not always benefit from sufficient access-control mechanisms. In addition, some messaging services offer extended features that go beyond simple...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The <strong>simplest</strong> attacks are often the <strong>most effective</strong>.</p>
<p style="text-align: justify;">In most companies, <strong>webmail access portals</strong> are <strong>exposed on the internet</strong> and do not always benefit from <strong>sufficient access-control mechanisms</strong>. In addition, some messaging services offer extended features that go beyond simple email consultation, such as <strong>file sharing</strong> or access to <strong>collaborative applications</strong>.</p>
<p style="text-align: justify;"><strong>Poorly secured messaging services</strong> therefore represent <strong>prime targets for attackers</strong>. Compromising a mailbox can then be used to launch phishing campaigns, <strong>access sensitive data</strong>, carry out <strong>fraud attempts</strong>, or even gain <strong>access to other services</strong>.</p>
<p style="text-align: justify;">At <strong>CERT-W</strong>, we regularly deal with this type of compromise. In particular, several of our investigations in 2025 involved the <strong>compromise of Zimbra email accounts</strong>, a solution used by many public and private organizations. Faced with these incidents, we noticed a clear <strong>lack of forensic documentation</strong> specific to Zimbra infrastructures.</p>
<p style="text-align: justify;">This article is therefore our modest contribution to filling this gap. We share a <strong>pragmatic</strong> approach and a <strong>few tips</strong> to help you save time when analyzing this type of environment, as well as some remediation measures.</p>
<p> </p>
<h2>The Zimbra Infrastructure</h2>
<p style="text-align: justify;">If you’re not familiar with Zimbra infrastructures, don’t worry: <strong>this section is for you</strong>! For the more experienced readers, feel free to jump straight to the investigation section (<em>we won’t hold it against you</em>).</p>
<h3>The architecture</h3>
<p style="text-align: justify;">Zimbra isn’t just &#8220;<em>another mail server</em>&#8220;. It’s a complete <strong>open-source collaborative suite</strong> that brings together several useful components<strong>:</strong></p>
<ul style="text-align: justify;">
<li><strong>A mail server:</strong> the core of the system.</li>
<li><strong>A calendar, contacts, and task manager:</strong> so you never forget that 9 AM meeting.</li>
<li><strong>A web client:</strong> accessible from any browser.</li>
<li><strong>Additional services:</strong> antispam, antivirus, mobile synchronization, and more.</li>
</ul>
<p style="text-align: justify;">But like any infrastructure used by hundreds (or even thousands) of users simultaneously, sizing and performance quickly become important topics. That’s why Zimbra can be deployed in two different ways:</p>
<ul style="text-align: justify;">
<li><strong>Monolithic mode:</strong> everything on a single server (simple and effective… up to a point).</li>
<li><strong>Distributed mode:</strong> multiple servers, each with a specific role, to better handle load, availability, and maintenance.</li>
</ul>
<p style="text-align: justify;">In simplified form, a distributed Zimbra infrastructure looks like this<strong>:</strong></p>



<figure id="attachment_28574" aria-describedby="caption-attachment-28574" style="width: 1196px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28574" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN.png" alt="Architecture of a Distributed Zimbra Infrastructure" width="1196" height="669" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN.png 1196w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN-341x191.png 341w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Architecture-zimbra-EN-768x430.png 768w" sizes="auto, (max-width: 1196px) 100vw, 1196px" /><figcaption id="caption-attachment-28574" class="wp-caption-text"><em>Architecture of a Distributed Zimbra Infrastructure</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Although the architecture may vary, the following components are usually present:</p>
<ul style="text-align: justify;">
<li><strong>Proxy Server:</strong> the entry point for Web, IMAP/POP, and ActiveSync clients. Logs generated at this level provide visibility into user connections (IP addresses, user agents, timestamps, etc.).</li>
<li><strong>Web Client Server (Mailboxd UI):</strong> hosts the Webmail interface used by users to access their mailbox through a browser.</li>
<li><strong>Mailbox Server (Mailboxd):</strong> hosts user mailboxes and manages messages, folders, and calendars. This component generates the richest logs (e.g., <em>mailbox.log</em>, <em>audit.log</em>, <em>sync.log</em>).</li>
<li><strong>MTA Server (Message Transfer Agent):</strong> receives emails via SMTP and delivers them to the appropriate Zimbra mailbox server using the LMTP (Local Mail Transfer Protocol).</li>
</ul>
<p style="text-align: justify;">The Zimbra MTA relies on several complementary services:</p>
<ul style="text-align: justify;">
<li><strong>Postfix MTA:</strong> handles message routing, relaying, and filtering (including attachments).</li>
<li><strong>ClamAV:</strong> antivirus engine responsible for scanning messages and attachments.</li>
<li><strong>SpamAssassin and DSPAM:</strong> spam filters that use various mechanisms to identify unwanted emails.</li>
<li><strong>Amavis:</strong> the orchestrator that runs the configured antivirus and antispam engines, then applies processing policies to incoming messages.</li>
</ul>
<p style="text-align: justify;">The <strong>MTA server</strong> plays a key role in the Zimbra infrastructure. This is where <strong>most of the security checks</strong> applied to <strong>incoming emails</strong> are performed. The diagram below illustrates the main stages of this analysis workflow:</p>
<figure id="attachment_28578" aria-describedby="caption-attachment-28578" style="width: 1448px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28578" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN.png" alt="Zimbra incoming email analysis process" width="1448" height="596" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN.png 1448w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN-437x180.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/Zimbra-MTA-scans-EN-768x316.png 768w" sizes="auto, (max-width: 1448px) 100vw, 1448px" /><figcaption id="caption-attachment-28578" class="wp-caption-text"><em>Zimbra incoming email analysis process</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In the process of receiving an incoming email, the message is first handled by <strong>Postfix</strong>, which then forwards it to <strong>Amavis</strong> for analysis. <strong>Amavis</strong> invokes the <strong>various configured analysis engines</strong> and submits the email to each of them to collect their results. Based on the defined policies, Amavis returns a verdict to Postfix: deliver the message, block it, or move it to a specific folder.</p>
<p> </p>
<h3>Zimbra logs</h3>
<p style="text-align: justify;">Now that you’re practically a Zimbra architecture expert (or almost <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" />), you’ve probably noticed that <strong>many services</strong> are required to handle users’ email <strong>sending</strong> and <strong>receiving</strong>. The good news is that <strong>each of these services generates its own logs</strong>, providing significant <strong>visibility</strong> into the activity of the mail infrastructure. And for us forensic analysts, that’s excellent news: <strong>we love logs</strong>!</p>
<p style="text-align: justify;">Studying the logs generated by Zimbra allows us to <strong>reconstruct the timeline of a compromise</strong>, identify compromised mailboxes, spot malicious attachments, and even detect potential internal relays.</p>
<p style="text-align: justify;">This <strong>wealth of information</strong> is made possible thanks to logs, which are mainly located in:</p>
<ul style="text-align: justify;">
<li><strong>/opt/zimbra/log/mailbox.log:</strong> main log of user activities (authentications, sending/receiving emails, managing mails, folders, contacts, calendars, etc.).</li>
<li><strong>/opt/zimbra/log/access_log:</strong> Webmail access log (IP addresses, user agents, visited URLs).</li>
<li><strong>/opt/zimbra/log/audit.log:</strong> authentication traces (successes, failures, mechanisms used).</li>
<li><strong>/opt/zimbra/log/sync.log:</strong> mobile synchronization traces (ActiveSync/EAS).</li>
<li><strong>/opt/zimbra/log/convertd.log:</strong> file conversion traces (Webmail previews, indexing).</li>
<li><strong>/opt/zimbra/log/clamd.log | /opt/zimbra/log/freshclam.log:</strong> ClamAV antivirus activity.</li>
<li><strong>/opt/zimbra/log/spamtrain.log:</strong> traces of user-initiated antispam training.</li>
<li><strong>/opt/zimbra/log/cbpolicyd.log:</strong> Postfix policy enforcement (quotas, anti-relay, restrictions).</li>
<li><strong>/var/log/mail.log:</strong> system Postfix logs (SMTP, LMTP, Amavis).</li>
<li><strong>/var/log/nginx.access.log | /var/log/nginx.log:</strong> Nginx web server logs (useful for contextualizing web sessions).</li>
</ul>
<p style="text-align: justify;">Unfortunately, in a <strong>distributed Zimbra architecture</strong>, logs are <strong>not centralized</strong>. In other words, to get a complete picture of an incident, an analyst often needs to <strong>collect logs from each node</strong>: proxy, mailstore, MTA, or any other peripheral server. Yes, it requires a bit of gymnastics (<em>and patience</em>).</p>
<p style="text-align: justify;">As we mentioned, the wealth of Zimbra logs is a real <strong>goldmine</strong> for investigations… but, like any mine, you need to <strong>dig methodically</strong>, or you’ll quickly find yourself buried under tons of log lines. Some effort in <strong>sorting</strong> and <strong>correlating</strong> data is therefore necessary to <strong>extract relevant information</strong>.</p>
<p style="text-align: justify;">And despite their undeniable usefulness, Zimbra logs have some <strong>notable limitations</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>No access to the full content of emails</strong> or their attachments.</li>
<li style="text-align: justify;"><strong>Email subjects are rarely available</strong>, except when intercepted by antispam or antivirus modules.</li>
<li style="text-align: justify;"><strong>No native visibility into the creation of forwarding rules</strong>.</li>
<li style="text-align: justify;"><strong>Rapid rotation of verbose logs</strong> (like <em>log</em>), which limits the analysis time window if logs are not centralized.</li>
</ul>
<p> </p>
<h2>Investigating in a Zimbra Environment</h2>
<p style="text-align: justify;">Now that Zimbra’s infrastructure and logs <strong>hold no secrets for you</strong>, it’s time to get <strong>practical</strong>.</p>
<p style="text-align: justify;">Imagine you’re a forensic analyst, arriving early one morning, when suddenly: <strong>the phone rings.</strong> You’re being called because several users are reporting that emails, <strong>they didn’t send</strong> are appearing in their “Sent” folder.</p>
<p style="text-align: justify;"><strong>Panic ensues</strong>! Users are afraid to log into their mailboxes, and some administrators start wondering whether the <strong>Zimbra infrastructure itself</strong> might be <strong>compromised</strong>.</p>
<p style="text-align: justify;">Since you know Zimbra inside out, the team naturally turns to you to <strong>investigate this incident</strong>!</p>
<p style="text-align: justify;">As a forensic analyst, many questions come to mind:</p>
<ul style="text-align: justify;">
<li><em>Have the accounts really been compromised? If so, how and since when?</em></li>
<li><em>How many users are affected?</em></li>
<li><em>What is the attacker’s objective, and what malicious actions have been carried out from these accounts?</em></li>
<li><em>Have the mail server or other Zimbra components been compromised?</em></li>
<li><em>And, most importantly: do I have time for a coffee </em><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2615.png" alt="☕" class="wp-smiley" style="height: 1em; max-height: 1em;" /><em> before the information hunt begins?</em></li>
</ul>
<p style="text-align: justify;">To help you in your investigation, we’ll look at how to answer these questions through Zimbra log analysis. But first, here are some tips to guide your investigation.</p>
<p style="text-align: justify;">During incident response, it’s easy to feel <strong>overwhelmed</strong> by the <strong>amount of logs</strong> <strong>and</strong> <strong>events</strong> <strong>to analyze</strong>. Keeping a clear line of reasoning is essential. A few simple practices can help maintain focus:</p>
<ul style="text-align: justify;">
<li><strong>Confirm:</strong> Verify the information that triggered the incident. Before diving deeper, ensure the initial alert is accurate. This undeniable baseline will serve as the foundation for the entire investigation.</li>
<li><strong>Correlate:</strong> Cross-check suspicious IP addresses and domains with other sources (proxy, VPN, EDR, online antivirus databases). This provides additional context related to the identified indicator.</li>
<li><strong>Pivot:</strong> Use the collected information to expand your analysis. An attacker might reuse the same IP address or user-agent across multiple accounts. Conversely, a compromised account might be accessed from different IP addresses or user-agents. Pivoting can reveal other indicators that help identify the attacker.</li>
<li><strong>Compare patterns:</strong> Even without direct access to email content or attachments, certain elements can reveal similarities (file size, identical filenames, repeated sequences of actions after account compromise). This behavioral analysis approach can help identify multiple users compromised by the same attacker. Such hypotheses should be formulated and handled cautiously, but they can be valuable for confirming intuition.</li>
<li><strong>Ensure log preservation:</strong> This may seem obvious, but as soon as an incident is detected, securing the logs is critical. Collect logs immediately from the entire Zimbra infrastructure and extend their retention period to prevent automatic deletion. Because let’s be honest: logs disappearing just as the forensic team arrives is a way too common scenario… one you definitely want to avoid.</li>
</ul>
<p style="text-align: justify;">While these tips <strong>aren’t exhaustive</strong>, they provide a solid foundation for conducting an analysis that is both <strong>fast</strong> and <strong>efficient</strong>.</p>
<p> </p>
<h3>Compromise and initial access</h3>
<h4><em>The spoofing trap</em></h4>
<p style="text-align: justify;"><strong>You are not fooled</strong>! You know that sometimes one might believe the attacker is already inside the system, when in reality, they are still outside (fake it until you make it). Especially when multiple users start reporting concerning incidents, such as:</p>
<ul style="text-align: justify;">
<li>&#8220;<em>I received an email from so-and-so, yet they claim they never sent it.</em>&#8220;</li>
<li>&#8220;<em>I received an email from my own address, which makes no sense!</em>&#8220;</li>
</ul>
<p style="text-align: justify;">But your experience pushes you to verify that the current confusion is not simply the result of… a <strong>spoofing attack</strong>.</p>
<p style="text-align: justify;">Indeed, <strong>spoofing</strong> is a relatively simple identity impersonation attack used by malicious actors to <strong>falsify email header information</strong> (e.g. sender address) in order to <strong>deceive a victim</strong>. Spoofing allows an email to be sent while pretending to be from a <strong>legitimate sender</strong> (for example, an internal user of the company or the recipient themselves), when in reality the email comes from an infrastructure that has <strong>no authorization</strong> <strong>to use that email address</strong>.</p>
<p style="text-align: justify;">The goal is to <strong>gain the recipient’s trust</strong> to prompt them to <strong>take an action</strong> (click a link, open an attachment, provide credentials, etc.) or bypass<strong> filtering mechanisms</strong>.</p>
<p style="text-align: justify;">Mechanisms such as <strong>SPF</strong>, <strong>DKIM</strong>, and <strong>DMARC</strong> were designed to reduce the risks associated with spoofing by allowing verification of the sender domain and server authenticity.</p>
<p style="text-align: justify;">More specifically, the <strong>Sender Policy Framework (SPF)</strong> is an email security mechanism that allows verification that the sending server of a message is indeed authorized to send emails on behalf of the domain indicated in the sender’s address. The steps of an SPF check are illustrated below:</p>
<figure id="attachment_28576" aria-describedby="caption-attachment-28576" style="width: 1143px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28576" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN.png" alt="Steps involved in an SPF check" width="1143" height="478" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN.png 1143w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN-437x183.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/SPF-check-Zimbra-EN-768x321.png 768w" sizes="auto, (max-width: 1143px) 100vw, 1143px" /><figcaption id="caption-attachment-28576" class="wp-caption-text"><em>Steps involved in an SPF check</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Concretely, the domain owner publishes in the DNS records a li<strong>st of IP addresses authorized to send emails</strong> on behalf of their domain. When a mail server receives an email, it can <strong>compare the sender’s IP address</strong> to this list and determine whether the message is legitimate or potentially fraudulent.</p>
<p style="text-align: justify;">An <strong>SPF check failure</strong> indicates that the email was sent from a <strong>server not authorized</strong> by the sender’s domain. This serves as an indicator for identifying <strong>potential spoofing attempts</strong>.</p>
<p style="text-align: justify;">In Zimbra logs, <strong>SPF check failures</strong> can be identified using the following command:</p>
<figure id="attachment_28544" aria-describedby="caption-attachment-28544" style="width: 1682px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28544" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_.png" alt="Retrieval of messages that failed SPF check (zimbra.log)" width="1682" height="333" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_.png 1682w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-437x87.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-71x14.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-768x152.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/1-Retrieval-of-messages-that-failed-SPF-check-zimbra.log_-1536x304.png 1536w" sizes="auto, (max-width: 1682px) 100vw, 1682px" /><figcaption id="caption-attachment-28544" class="wp-caption-text"><em>Retrieval of messages that failed SPF check (zimbra.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">In above example, we can see that the message sent from <strong>attacker@microsoft.com</strong> to <strong>user25@wavestone.corp</strong> <strong>does not pass SPF validation</strong> (SPF_FAIL). The &#8220;<em>Yes</em>&#8221; field indicates that it is classified as spam. Since its score (9.172) exceeds the required threshold (4), this message will therefore <strong>not be delivered</strong> to its recipient.</p>
<p style="text-align: justify;">However, you should not place blind trust in the antispam engine! Some emails that <strong>fail SPF checks may still be delivered</strong>. To extract only these messages, you can use the following command:</p>
<figure id="attachment_28546" aria-describedby="caption-attachment-28546" style="width: 1692px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28546" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_.png" alt="Retrieval of messages that failed SPF check and were delivered (zimbra.log)" width="1692" height="360" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_.png 1692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-437x93.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-768x163.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/2-Retrieval-of-messages-that-failed-SPF-check-and-were-delivered-zimbra.log_-1536x327.png 1536w" sizes="auto, (max-width: 1692px) 100vw, 1692px" /><figcaption id="caption-attachment-28546" class="wp-caption-text"><em>Retrieval of messages that failed SPF check and were delivered (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In the example below, the message <strong>fails the SPF check</strong>, but its score is negative (-2.06) and below the spam threshold (4). It is therefore considered <strong>legitimate</strong> and <strong>delivered to the recipient despite the SPF failure.</strong></p>
<p style="text-align: justify;">As you can see, Zimbra logs make it possible to quickly <strong>identify senders responsible for spoofing attacks</strong>. Detecting a <strong>spoofing case</strong> <strong>early</strong> in the investigation helps to quickly reduce concerns and restore a certain level of <strong>trust in the Zimbra infrastructure</strong>.</p>
<p style="text-align: justify;"> </p>
<h4><em>Analysis of the attacker&#8217;s initial access</em></h4>
<p style="text-align: justify;">Once you have confirmed that you are <strong>not dealing with a spoofing attack</strong>, it means the attacker has, in one way or another, succeeded in compromising an account or a component of the infrastructure. The first step of your investigation will be to <strong>identify the attacker’s initial point of entry</strong>. This means finding the answers to the questions “Where?”, “When?”, and “How?”. But when it comes to compromising a mailbox, several approaches are possible…<br /><br /></p>
<p><span style="text-decoration: underline;"><em><strong>Account compromise through password brute‑forcing</strong></em></span></p>
<p style="text-align: justify;">One path you can explore is the possibility that the attacker attempted to compromise certain accounts through a <strong>brute‑force attack</strong>.</p>
<p style="text-align: justify;">To do this, simply examine authentication failures in the Zimbra logs<strong>:</strong></p>
<figure id="attachment_28548" aria-describedby="caption-attachment-28548" style="width: 1693px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_.png" alt="Retrieval of connection failures (mail.log)" width="1693" height="229" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_.png 1693w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-437x59.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-768x104.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/3-Retrieval-of-connection-failures-mail.log_-1536x208.png 1536w" sizes="auto, (max-width: 1693px) 100vw, 1693px" /><figcaption id="caption-attachment-28548" class="wp-caption-text"><em>Retrieval of connection failures (mail.log)</em></figcaption></figure>
<figure id="attachment_28550" aria-describedby="caption-attachment-28550" style="width: 1690px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_.png" alt="Retrieval of connection failures (audit.log)" width="1690" height="384" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_.png 1690w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-437x99.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-768x175.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/4-Retrieval-of-connection-failures-audit.log_-1536x349.png 1536w" sizes="auto, (max-width: 1690px) 100vw, 1690px" /><figcaption id="caption-attachment-28550" class="wp-caption-text"><em>Retrieval of connection failures (audit.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In the events above, we can see <strong>authentication attempts</strong> coming from the IP address <strong>100.100.4.111 </strong>that failed for the account <strong>user25@wavestone.corp</strong>.</p>
<p style="text-align: justify;">A <strong>large number of unsuccessful login</strong> <strong>attempts</strong> over a <strong>short period</strong>, from the <strong>same IP address</strong> or targeting the <strong>same account</strong>, is indicative of a <strong>brute‑force attempt</strong>.</p>
<p style="text-align: justify;">An excessive number of authentication failures can also <strong>trigger automatic</strong> <strong>account lockout</strong> by Zimbra:</p>
<figure id="attachment_28552" aria-describedby="caption-attachment-28552" style="width: 1692px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28552" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_.png" alt="Retrieval of account lockout events (mail.log)" width="1692" height="180" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_.png 1692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-437x46.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-71x8.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-768x82.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/5-Retrieval-of-account-lockout-events-mail.log_-1536x163.png 1536w" sizes="auto, (max-width: 1692px) 100vw, 1692px" /><figcaption id="caption-attachment-28552" class="wp-caption-text"><em>Retrieval of account lockout events (mail.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">From a forensic perspective, the appearance of such an event in the logs may suggest that an account was <strong>potentially targeted</strong>.</p>
<p style="text-align: justify;">Once the brute‑force attempt has been identified, it is possible to check when the attacker may have used the compromised account by analyzing the <strong>successful logins</strong> associated with that user:</p>
<figure id="attachment_28554" aria-describedby="caption-attachment-28554" style="width: 1689px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28554" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_.png" alt="Retrieval of successful authentication events (audit.log)" width="1689" height="280" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_.png 1689w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-437x72.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-768x127.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/6-Retrieval-of-successful-authentication-events-audit.log_-1536x255.png 1536w" sizes="auto, (max-width: 1689px) 100vw, 1689px" /><figcaption id="caption-attachment-28554" class="wp-caption-text"><em>Retrieval of successful authentication events (audit.log)</em></figcaption></figure>
<figure id="attachment_28556" aria-describedby="caption-attachment-28556" style="width: 1692px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_.png" alt="Retrieval of successful authentication events (mailbox.log)" width="1692" height="335" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_.png 1692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-437x87.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-71x14.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-768x152.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/7-Retrieval-of-successful-authentication-events-mailbox.log_-1536x304.png 1536w" sizes="auto, (max-width: 1692px) 100vw, 1692px" /><figcaption id="caption-attachment-28556" class="wp-caption-text"><em>Retrieval of successful authentication events (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Additionally, if you have <strong>identified the attacker&#8217;s IP address</strong>, you can find all <strong>successful connections from that address</strong> using the following commands:</p>
<figure id="attachment_28558" aria-describedby="caption-attachment-28558" style="width: 1694px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28558" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_.png" alt="Retrieval of successful authentication events via IP (audit.log)" width="1694" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_.png 1694w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-437x13.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-71x2.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-768x22.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/8-Retrieval-of-successful-authentication-events-via-IP-audit.log_-1536x44.png 1536w" sizes="auto, (max-width: 1694px) 100vw, 1694px" /><figcaption id="caption-attachment-28558" class="wp-caption-text"><em>Retrieval of successful authentication events via IP (audit.log)</em></figcaption></figure>
<figure id="attachment_28560" aria-describedby="caption-attachment-28560" style="width: 1693px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28560" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_.png" alt="Retrieval of successful authentication events via IP (mailbox.log)" width="1693" height="48" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_.png 1693w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-437x12.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-71x2.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-768x22.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/9-Retrieval-of-successful-authentication-events-via-IP-mailbox.log_-1536x44.png 1536w" sizes="auto, (max-width: 1693px) 100vw, 1693px" /><figcaption id="caption-attachment-28560" class="wp-caption-text"><em>Retrieval of successful authentication events via IP (mailbox.log)</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">Once malicious connections have been identified, it is necessary to <strong>analyze the account activity </strong>following these accesses in order to identify the <strong>actions performed by the attacker</strong>.</p>
<p> </p>
<p><span style="text-decoration: underline;"><em><strong>Account compromise through phishing attacks</strong></em></span></p>
<p style="text-align: justify;">If no brute‑force attempts have been identified, another common initial compromise vector is the way too familiar: <strong>phishing attack</strong>! In this case, the attack does not target the Zimbra infrastructure directly: the user first receives an email prompting them to <strong>visit a fraudulent page</strong> or <strong>open a malicious file</strong>. Only after clicking does the damage occur (such as credential or session token theft).</p>
<p style="text-align: justify;">In this scenario, you should, <strong>if possible</strong>, retrieve the malicious email from the user’s mailbox for analysis. If you can obtain it, here are the <strong>key pieces of information to collect</strong>:</p>
<ul style="text-align: justify;">
<li>Date and time of receipt</li>
<li>Subject of the email</li>
<li>Sender (From)</li>
<li>Recipients (To, Cc)</li>
<li>Reply addresses (Reply-To, Return-Path)</li>
<li>IP address of the originating sending server</li>
<li>Names of attachments (if any)</li>
<li>Results of SPF, DKIM, and DMARC checks</li>
<li>Identified phishing URLs (if present)</li>
</ul>
<p style="text-align: justify;">These elements will help reconstruct the <strong>attacker’s methodology</strong>, provide <strong>initial guidance</strong> for your investigation and define <strong>first remediation measures</strong>.</p>
<p style="text-align: justify;">Unfortunately, if you <strong>do not have direct access to the user’s mailbox</strong>, you will need to rely primarily on Zimbra logs, specifically the <strong>events generated by Amavis</strong> when analyzing <strong>incoming emails</strong>.</p>
<p style="text-align: justify;">Suppose you want to <strong>identify malicious attachments</strong> sent by an attacker to users. Zimbra logs are very useful in this case, as they allow you to track the files that were analyzed and extract information such as their name, size, type, and fingerprint (SHA1).</p>
<p style="text-align: justify;">The following command allows you to identify attachments processed by Amavis during the analysis of incoming messages:</p>
<figure id="attachment_28562" aria-describedby="caption-attachment-28562" style="width: 1694px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28562" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_.png" alt="Retrieval of attachments scanned by amavis (zimbra.log)" width="1694" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_.png 1694w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-437x80.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-768x141.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/10-Retrieval-of-attachments-scanned-by-amavis-zimbra.log_-1536x282.png 1536w" sizes="auto, (max-width: 1694px) 100vw, 1694px" /><figcaption id="caption-attachment-28562" class="wp-caption-text"><em>Retrieval of attachments scanned by amavis (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The result above shows that the file <strong>Evil.htm</strong> was analyzed by Amavis. Several useful pieces of information can be found:</p>
<ul style="text-align: justify;">
<li>Date and time: <strong>November 12 at 11:15</strong></li>
<li>SHA‑1 signature of the file: <strong>9d57b71f9f758a27ccd680f701317574174e82d8</strong></li>
<li>Size: <strong>22,111 bytes</strong></li>
<li>Content-Type: <strong>text/html</strong></li>
<li>Amavis session ID associated with this analysis: <strong>4384125-19</strong></li>
</ul>
<p style="text-align: justify;">However, on their own, these elements do not allow you to determine <strong>which users received this attachment</strong> or <strong>who the sender was</strong>. To obtain this information, a second command must be executed to retrieve all traces associated with this Amavis session:</p>
<figure id="attachment_28564" aria-describedby="caption-attachment-28564" style="width: 1317px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png" alt="Retrieval of traces generated by an amavis analysis session (zimbra.log)" width="1317" height="723" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png 1317w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/11-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-768x422.png 768w" sizes="auto, (max-width: 1317px) 100vw, 1317px" /><figcaption id="caption-attachment-28564" class="wp-caption-text"><em>Retrieval of traces generated by an amavis analysis session (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">From this information, you can now deduce that <strong>attacker@example.com</strong> sent the file <strong>Evil.htm</strong> (22,111 bytes) to <strong>user25@wavestone.corp</strong> on <strong>November 12 at 11:15</strong>, and that its SHA‑1 signature is <strong>9d57b71f9f758a27ccd680f701317574174e82d8</strong>. Not bad, right?</p>
<p style="text-align: justify;">During your investigation, you can further filter the output of these commands to identify:</p>
<ul style="text-align: justify;">
<li><strong>Attachments with suspicious extensions</strong> (e.g., *.htm, *.html, *.exe, *.js, *.arj, *.iso, *.bat, <em>.ps1,</em> or Office/PDF documents containing macros)</li>
<li><strong>Files previously observed during the early stages of the incident</strong> (for example, a file downloaded by patient zero)</li>
</ul>
<p style="text-align: justify;">During a <strong>phishing campaign</strong> involving the <strong>delivery</strong> <strong>of</strong> <strong>a</strong> <strong>malicious</strong> <strong>file</strong>, attackers often tend to distribute the <strong>same file to multiple users</strong>. It is therefore possible to rely on <strong>statistical analysis</strong> to highlight <strong>abnormal values</strong>.</p>
<p style="text-align: justify;">The following command allows you to identify <strong>identical files</strong> present in several incoming emails:</p>
<figure id="attachment_28566" aria-describedby="caption-attachment-28566" style="width: 1320px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28566" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png" alt="Retrieval of traces generated by an amavis analysis session (zimbra.log)" width="1320" height="528" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_.png 1320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/12-Retrieval-of-traces-generated-by-an-amavis-analysis-session-zimbra.log_-768x307.png 768w" sizes="auto, (max-width: 1320px) 100vw, 1320px" /><figcaption id="caption-attachment-28566" class="wp-caption-text"><em>Retrieval of traces generated by an amavis analysis session (zimbra.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The command above allows you to retrieve, for <strong>each attachment</strong> in emails received by Zimbra, the <strong>number of times it has been observed</strong> in other emails, based on its <strong>name</strong> and <strong>SHA‑1 signature</strong>.</p>
<p style="text-align: justify;">In this example, the file <strong>Evil.htm</strong> appears in <strong>40 emails</strong>, which, combined with its <em>.htm</em> extension, makes it particularly suspicious. It would therefore be relevant to attempt to <strong>retrieve this file from the affected users</strong> to verify its legitimacy.</p>
<p style="text-align: justify;">If the analysis of attachments did not help you identify the culprit, there is one last avenue to explore: retrieving phishing detections from <strong>SpamAssassin</strong> (an antispam engine executed by Amavis).</p>
<p style="text-align: justify;">The following command allows you to identify messages flagged as suspected phishing by SpamAssassin:</p>
<figure id="attachment_28568" aria-describedby="caption-attachment-28568" style="width: 1318px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28568" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2.png" alt="Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (1/2)" width="1318" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2.png 1318w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2-437x145.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/13-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-1-2-768x255.png 768w" sizes="auto, (max-width: 1318px) 100vw, 1318px" /><figcaption id="caption-attachment-28568" class="wp-caption-text"><em>Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (1/2)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">However, this command only provides <strong>limited information</strong>: the sender, the recipient, and the detection rules that were triggered. To obtain more details on the complete analysis, you must retrieve the <strong>Amavis session ID</strong> associated with the message (here <strong>765283-08</strong>), then execute the following command:</p>
<figure id="attachment_28570" aria-describedby="caption-attachment-28570" style="width: 1319px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2.png" alt="Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (2/2)" width="1319" height="40" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2.png 1319w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2-437x13.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2-71x2.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/14-Retrieval-of-messages-categorized-as-phishing-by-SpamAssassin-zimbra.log-2-2-768x23.png 768w" sizes="auto, (max-width: 1319px) 100vw, 1319px" /><figcaption id="caption-attachment-28570" class="wp-caption-text"><em>Retrieval of messages categorized as phishing by SpamAssassin (zimbra.log) (2/2)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">This second command provides access to <strong>additional information</strong> generated during the analysis of the message by Amavis.</p>
<p style="text-align: justify;">However, <strong>SpamAssassin results should be interpreted with caution</strong>, as its detection rules can generate a significant number of false positives.</p>
<p> </p>
<p><span style="text-decoration: underline;"><em><strong>Exploiting a vulnerability on the Zimbra web server</strong></em></span></p>
<p style="text-align: justify;"><strong>Your experience as a forensic investigator has taught you</strong>: this is neither the first nor the last time that an application vulnerability allows an attacker to hijack user sessions. <strong>Zimbra is no exception</strong>, and its web server, which provides access to mailboxes, could very well be vulnerable to this type of attack.</p>
<p style="text-align: justify;">Compromise of the Zimbra web server could, in theory, allow an attacker to <strong>capture credentials of users logging in</strong>. “But how can we check if Zimbra has been subjected to web intrusion attempts?” you might ask.</p>
<p style="text-align: justify;">A first step is to <strong>inspect the proxy (nginx) logs</strong> to identify <strong>malicious</strong> or <strong>suspicious</strong> <strong>HTTP</strong> <strong>requests</strong> targeting the web interface:</p>
<figure id="attachment_28572" aria-describedby="caption-attachment-28572" style="width: 1501px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-28572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_.png" alt="Retrieval of web exploitation attempts (nginx.log/nginx.access.log)" width="1501" height="566" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_.png 1501w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/12/15-Retrieval-of-web-exploitation-attempts-nginx.lognginx.access.log_-768x290.png 768w" sizes="auto, (max-width: 1501px) 100vw, 1501px" /><figcaption id="caption-attachment-28572" class="wp-caption-text"><em>Retrieval of web exploitation attempts (nginx.log/nginx.access.log)</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Among the indicators to look for in the logs are:</p>
<ul style="text-align: justify;">
<li>Unusual <strong>POST </strong>or<strong> PUT</strong> requests or requests to unexpected endpoints</li>
<li>Injection attempts (<strong>SQLi</strong>, <strong>LFI</strong>, <strong>RCE</strong> payloads visible in URIs or parameters)</li>
<li>Repeated access to non-public resources or atypical scripts</li>
<li>Strange <strong>User-Agents</strong> or a high concentration of requests from the same IP</li>
<li>Numerous <strong>4xx/5xx errors</strong> on sensitive paths (indicative of scanning/enumeration)</li>
<li>Signs of file uploads (attempts to access <strong>/tmp</strong>, <strong>/uploads</strong>, etc.) or hits on <strong>known web shells</strong></li>
</ul>
<p style="text-align: justify;">If you observe <strong>malicious requests</strong> that succeeded (for example, with an <strong>HTTP 200</strong> code), it is recommended to <strong>conduct a more in-depth investigation</strong> on the server to determine whether the exploitation was actually successful.</p>
<p> </p>
<p><span style="text-decoration: underline;"><em><strong>Compromise of the user&#8217;s workstation</strong></em></span></p>
<p style="text-align: justify;">If none of the previous scenarios seem to match what you are observing and the initial point of entry remains <strong>unidentified</strong>, it is possible that the attacker <strong>obtained access credentials directly from the user’s workstation</strong>.</p>
<p style="text-align: justify;">This type of compromise can occur, for example:</p>
<ul style="text-align: justify;">
<li>As a result of a <strong>previous phishing campaign</strong></li>
<li>Because the user <strong>executed a malicious program</strong> on their machine (cracks, software downloaded from a dubious site, connecting an infected USB drive, etc.)</li>
</ul>
<p style="text-align: justify;">Once able to execute code on the workstation, the attacker can easily extr<strong>act credentials stored in the browser</strong>, <strong>retrieve session cookies</strong>, or even <strong>install a keylogger</strong> to capture keystrokes.</p>
<p style="text-align: justify;">Detecting this type of compromise goes beyond the scope of this article. But keep this possibility in mind: if no intrusion traces appear in Zimbra, <strong>the problem may lie elsewhere</strong> <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Yes! The investigation is far from over! This first part has allowed you to master Zimbra’s architecture, understand the different sources of evidence, and observe that through Zimbra logs it is possible to identify several compromise techniques. However, the initial access is only the starting point of our research. In a second part, we will continue the post–initial-access analysis. First, we will try to identify the malicious actions carried out by the attacker after compromising an account. Second, we will review the various remediation measures to implement. Stay tuned, a follow-up article will be published soon to delve deeper into these next steps!</p>
<p> </p>
<h2>Sources</h2>
<ul>
<li><a href="https://wiki.zimbra.com/wiki/Log_Files"><span style="color: #333399;">https://wiki.zimbra.com/wiki/Log_Files</span></a></li>
<li><a href="https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview"><span style="color: #333399;">https://wiki.zimbra.com/wiki/Troubleshooting_Course_Content_Rough_Drafts-Zimbra_Architecture_Component_Overview</span></a></li>
<li><a href="https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes"><span style="color: #333399;">https://wiki.zimbra.com/wiki/Trouble_Shooting_Spam_Score_Changes</span></a></li>
</ul>
<p> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/">Zimbra Mailbox Compromise: From Analysis to Remediation (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/12/zimbra-mailbox-compromise-from-analysis-to-remediation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – March 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 24 Mar 2023 15:08:27 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20080</guid>

					<description><![CDATA[<p>An overview of the different cybercriminal uses case of ChatGPT The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU CHATGPT What opportunities for the underground world of cybercrime ?   Need a refresh about...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ul>
<li>An overview of the different cybercriminal uses case of ChatGPT</li>
<li>The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU</li>
</ul>
<h1 style="text-align: center;">CHATGPT</h1>
<h2 style="text-align: center;">What opportunities for the underground world of cybercrime ?</h2>
<h2> </h2>
<h2 style="text-align: left;"><strong>Need a refresh about ChatGPT?</strong></h2>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-20082 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png" alt="" width="1129" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-437x89.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-768x157.png 768w" sizes="auto, (max-width: 1129px) 100vw, 1129px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; Screenshot from ChatGPT when prompted &#8220;Introduce ChatGPT in a funny way and at the first person&#8221;</em></p>
<p> </p>
<p style="text-align: justify;">Unless living under a rock, you have heard about the incredibly notorious <span style="color: #503078;"><strong>AI powered chatbot</strong> </span>developed by OpenAI: Chat GPT, a tool that relies on the Generative Pre-trained Transformer architecture. But just in case, you must know that ChatGPT has been trained on a <span style="color: #503078;"><strong>vast amount of data from the Internet</strong> </span>and is able to <span style="color: #503078;"><strong>understand human speech</strong></span> and <span style="color: #503078;"><strong>interact</strong> </span>with users. Chat GPT has not finished to be talked about: on March 14<sup>th</sup> 2023, Open AI has announced the <strong><span style="color: #503078;">arrival of Chat GPT 4.0</span><a href="#_edn1" name="_ednref1">[i]</a></strong>.</p>
<p style="text-align: justify;">The growing popularity and potential future applications of ChatGPT have also caught the attention of cybercriminals. Nord VPN&#8217;s examination of Dark Web posts from January 13th to February 13th revealed a significant increase in Darkweb forum threads discussing ChatGPT, <span style="color: #503078;"><strong>jumping from 37 to 91 in just a month</strong></span>. The main topics of these threads included:</p>
<ul style="text-align: justify;">
<li>Breaking ChatGPT</li>
<li>Using ChatGPT to create Dark Web Marketplace scripts</li>
<li>A new ChatGPT Trojan Binder</li>
<li>ChatGPT as a phishing tool with answers indistinguishable from humans</li>
<li>ChatGPT trojan</li>
<li>ChatGPT jailbreak 2.0</li>
<li>Progression of ChatGPT malware</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20084 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg" alt="" width="245" height="230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg 245w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-203x191.jpg 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-42x39.jpg 42w" sizes="auto, (max-width: 245px) 100vw, 245px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Cybercriminal is using ChatGPT to improve Infostealer’s code</em></p>
<p> </p>
<p style="text-align: justify;">These threads give a first <span style="color: #503000;"><strong><span style="color: #503078;">interesting overview of all the rogue usage that can involves ChatGPT or be carried out via the chatbot</span>.</strong></span> Another key security concern could also be included in this list when thinking about ChatGPT’s limitations in terms of cybersecurity, which is the risk of personal and/or corporate data leak, that could lead to identity theft, fraud, or other malicious uses.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the plausible cybercriminal use cases?</strong></h2>
<p style="text-align: justify;"><strong><em> <img loading="lazy" decoding="async" class="aligncenter wp-image-20086 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png" alt="" width="883" height="468" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png 883w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-768x407.png 768w" sizes="auto, (max-width: 883px) 100vw, 883px" /></em></strong></p>
<p style="text-align: center;"><strong><em> </em></strong><em>Figure 3 &#8211; Screenshot of a ChatGPT answer when prompted “Talk at the first person about possible cybercriminal usage of ChatGPT”</em></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Use Case #1 – Support malware creation and kill chain attack</strong></h3>
<p style="text-align: justify;">ChatGPT is designed to decline inappropriate requests but there are ways to bypass its restrictions and generate malicious code. For example, instead of directly requesting a ransomware script, users can describe step-by-step functions needed for such a script, ultimately receiving functional parts of malicious code.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20088 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png" alt="" width="569" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-236x191.png 236w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-48x39.png 48w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 4 – Screenshot of a ChatGPT answer to the request “Write me a function named &#8220;find_files&#8221; in Python that searches all files that end up with &#8220;txt, pdf, docx, ppt, xlsm&#8221; starting from the root directory and that return all paths of files that match with the criteria”.</em></p>
<p> </p>
<p style="text-align: justify;">It has been proven possible to use ChatGPT to insert harmful code into a commonly used <a href="https://www.cyberark.com/resources/threat-research-blog/chatting-our-way-into-creating-a-polymorphic-malware">computer program and create programs that constantly change their appearance</a>, making them harder for security software to detect and block and to obtain an <a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/">entire process of an artificial intelligence-driven cyberattack</a>, starting with targeted phishing emails and ending with gaining unauthorized access to someone&#8217;s computer.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png" alt="" width="569" height="440" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-247x191.png 247w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-50x39.png 50w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Screenshot from CheckPoint: Example of the ability to create a malware code without anti-abuse restrictions in a Telegram bot utilizing the OpenAI API</em></p>
<p> </p>
<p style="text-align: justify;">However, as highlighted by <a href="https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk">NCSC</a> and <a href="https://www.kaspersky.fr/blog/chatgpt-cybersecurity/20052/">Kaspersky</a>, <span style="color: #503078;"><strong>using ChatGPT</strong></span> for creating malware is not that reliable, due to potential errors and logical loopholes in the generated code, and even if it provides a certain level of support, <span style="color: #503078;"><strong>the tool doesn’t currently reach the level of cyber professional.</strong></span></p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;"><strong>Use Case #2 – Discover and exploit vulnerabilities</strong></h3>
<p style="text-align: justify;">When it comes to code vulnerabilities, ChatGPT raises several challenges in terms of detection and exploitation.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>detection</strong></span>, ChatGPT is currently able to detect vulnerabilities in any piece of code submitted if properly prompted to do so, but it can also debug code. For example, when a computer security researcher asked ChatGPT to solve a capture-the-flag challenge, it successfully detected a buffer overflow vulnerability and wrote code to exploit it, with only a minor error that was later corrected.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>exploitation</strong></span>, the risks posed by ChatGPT, and more generally Large Language Models (LLMs) can be used to produce malicious code or exploits despite restrictions, as they can be bypassed. Additionally, LLMs may generate vulnerable and misaligned code, and while future models will be trained to produce more secure code, it&#8217;s not the case yet. Moreover, some security researchers remain skeptical about AI&#8217;s ability to create modern exploits that require new techniques.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #3 – Create persuasive content for phishing and scam operations</strong></h3>
<p style="text-align: justify;">Creating persuasive text is a major strength of GPT-3.5/ChatGPT, and GPT-4 performs even better in this area. Consequently, it&#8217;s highly probable that automated spear phishing attacks using chatbots already exist. Crafting targeted phishing messages for individual victims is more resource-intensive, which is why this technique is typically reserved for specific attacks.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg" alt="" width="266" height="254" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg 266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-200x191.jpg 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-41x39.jpg 41w" sizes="auto, (max-width: 266px) 100vw, 266px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Screenshot from chatGPT, pishing mail generation</em></p>
<p> </p>
<p style="text-align: justify;">ChatGPT has the potential to significantly change this dynamic, as it allows cybercriminals to <span style="color: #503078;"><strong>produce personalized and compelling messages for each target</strong>.</span> To include all necessary components, however, the chatbot requires detailed instructions.</p>
<p style="text-align: justify;">A notable advantage of ChatGPT is its capability to interact and create content in multiple languages, complete with reliable translation. In the past, this was a key way to identify scams and phishing attempts. While some methods are being developed to detect content created by ChatGPT, they haven&#8217;t yet proven entirely effective.</p>
<p style="text-align: justify;">This poses a significant risk to all companies, as it makes their employees more susceptible to such attacks and may expose their resources if passwords are stolen in this manner. As mentioned earlier, it is essential to raise awareness about this issue while also strengthening authentication methods, such as implementing two-factor authentication as a potential solution.</p>
<p style="text-align: justify;">Interestingly, other uses have been made of ChatGPT notoriety to develop scams without using the tool itself, such as <strong><span style="color: #503078;">phishing mails/Scams</span></strong> in order to push towards the purchase of a (fake)<span style="color: #503078;"><strong> ChatGPT subscription</strong> </span>and <a href="https://www.hackread.com/scammers-chatgpt-phishing-scam/?web_view=true">to provide personal data details</a></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #4 Exploit companies’ data</strong></h3>
<p style="text-align: justify;">ChatGPT has been trained on a massive amount of internet data, including personal sites and media content, meaning that it may have access to personal data that is currently hard to remove or control, as no &#8220;right to be forgotten&#8221; measures exist to date. Consequently, ChatGPT&#8217;s compliance with regulations like GDPR is under debate. GPT-4 can manage basic tasks related to personal and geographic information, such as identifying locations connected to phone numbers or educational institutions. By combining these capabilities, GPT-4 could be used to <span style="color: #503078;"><strong>identify individuals when paired with external data.</strong></span></p>
<p style="text-align: justify;">Another significant concern is the <span style="color: #503078;"><strong>sensitive information</strong></span> users might <span style="color: #503078;"><strong>provide through prompts</strong></span>. Users could inadvertently share confidential information when seeking assistance or using the chatbot for tasks, like reviewing and enhancing a draft contract. This information may appear in future responses to other users&#8217; prompts. They might not only find their confidential documents or research leaked on such platforms due to employees&#8217; inattention, but also reveal <span style="color: #503078;"><strong>information about their system or employees</strong></span> which will be used by hacker to <span style="color: #503078;"><strong>facilitate an intrusion</strong></span>. The primary course of action should be to increase awareness on this subject by providing formation and explanation or to restrict access to the website in the sensitive domains until there is a better comprehension of how data is utilized.</p>
<p style="text-align: justify;">Not only the real ChatGPT can be used for this objective, but the creation of <span style="color: #503078;"><strong>other chatbots</strong></span> using the same model as ChatGPT but configured to <span style="color: #503078;"><strong>trick victims into disclosing sensitive information</strong></span> or <span style="color: #503078;"><strong>downloading malware </strong></span>has also been observed.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #5 Disinformation campaigns </strong></h3>
<p style="text-align: justify;">ChatGPT can be used to quickly write very convincing articles and speeches <a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive">based on fake news.</a> The American startup Newsguard <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">has conducted an experience</a> on ChatGPT to demonstrate its disinformation potential: on 100 fake information submitted to ChatGPT, the tool has produced fake detailed articles, essays and TV scripts for 80 of them, including significant topics such as Covid-19 and Ukraine<a href="#_edn2" name="_ednref2">[ii]</a>.</p>
<p style="text-align: justify;">As highlighted (again) by the war between Ukraine and Russia, <a href="https://www.nytimes.com/2023/02/08/technology/ai-chatbots-disinformation.html">the crucial role of information and disinformation</a> through cyber channels, can have significant consequences.</p>
<h3 style="text-align: justify;"><strong>Use Case #6 Create darknet marketplace</strong></h3>
<p style="text-align: justify;">Cybercriminals have also been observed using ChatGPT to support <span style="color: #503078;"><strong>the creation of DarkWeb marketplaces</strong>.</span> ChekPoint has illustrated this phenomenon with some examples<a href="#_edn3" name="_ednref3">[iii]</a>:</p>
<ul style="text-align: justify;">
<li>A cybercriminal post on a Darkweb forum showing how to code with ChatGPT a DarkWeb Market script that does not rely on Python or Java Script, using third-party API to get up-to-date cryptocurrency (Monero, Bitcoin and Etherium) prices as part of the Dark Web market payment system.</li>
<li>Dark web discussions threads linked to fraudulent usage of ChatGPT, such as how to generate an e-book or a short chapter using ChatGPT and then sell its content online.</li>
</ul>
<p> </p>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png" alt="" width="675" height="242" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png 675w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-71x25.png 71w" sizes="auto, (max-width: 675px) 100vw, 675px" /></strong></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Multiple threads in the underground forums on how to use ChatGPT for fraud activity</em></p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the key take aways? </strong></h2>
<p style="text-align: justify;">Even if ChatGPT tends to lack of the necessary level of features, it can still be a useful tool to facilitate cyberattacks. Even if it is an obvious support tool mostly for script kiddies and unexperimented actors, ChatGPT &#8211; as any AI tool &#8211; can be a facilitator for any type of hackers, either to completely conceive a malware, to accelerate malicious actions such as phishing or to increase the sophistication level of cyberattacks.</p>
<p style="text-align: justify;">With the release of GPT-4, OpenAI has made efforts to counter inappropriate requests, however ChatGPT  still raise serious security issues and challenges for business security. It is important to keep in mind that the malicious use cases detailed in the previous section are only hypothetical scenarios: malicious use of ChatGPT has already been observed and it is essential to convey strong cybersecurity messages on the topic:</p>
<ul style="text-align: justify;">
<li>Don&#8217;t include sensitive info in queries to <a href="https://www.linkedin.com/feed/hashtag/?keywords=chatgpt&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7041697316570849280">#ChatGPT</a> : Avoid personal/sensitive information sharing while using ChatGPT</li>
<li>Stay informed and vigilant: AI-related topics are evolving quickly, it is central to stay put regarding tools evolution (e.g. release of Chat GPT 4.0), and new security topics that can emerged over time</li>
<li>Scams and phishing are likely to become more and more realistic in their crafting: continue raising awareness about this risk and train yourself and your ecosystem</li>
<li>Basic cybersecurity practices are still true: have a regular vulnerability management, set up doble authentication, train your teams and raise awareness…</li>
<li>ChatGPT opening the door to the possibility of creating realistic fake content, it is central to stay informed about tooling initiatives aiming at detecting machine-written text such as <a href="https://gptzero.me/">GPT Zero</a>, a tool developed by Princeton student (<em>Note: OpenAI is also working on a tool to detect machine-written text, but is for now far from being perfect since it </em><a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive"><em>detect machine-written text only one in four times</em></a>)</li>
</ul>
<h1 style="text-align: center;">Reading of the Month</h1>
<h1 style="text-align: center;">CERT-EU : RUSSIA&#8217;S WAR ON UKRAINE: ONE YEAR OF CYBER OPERATIONS</h1>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png" alt="" width="233" height="190" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8-48x39.png 48w" sizes="auto, (max-width: 233px) 100vw, 233px" /></strong></p>
<p style="text-align: center;"><a href="https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf">https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf</a></p>
<p style="text-align: justify;"><a href="#_ednref1" name="_edn1">[i]</a> <a href="https://cdn.openai.com/papers/gpt-4.pd">https://cdn.openai.com/papers/gpt-4.pd</a></p>
<p style="text-align: justify;"><a href="#_ednref2" name="_edn2">[ii]</a> <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">https://www.newsguardtech.com/misinformation-monitor/jan-2023/</a></p>
<p style="text-align: justify;"><a href="#_ednref3" name="_edn3">[iii]</a> <a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyberattacks in 2021: ransomwares, still threat n°1</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Wed, 20 Oct 2021 11:23:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[benchmark]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[Incident response]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17170</guid>

					<description><![CDATA[<p>On the launch of the European Cybersecurity Month and for the Assises de la Sécurité (from 13 to 16 October 2021), Wavestone unveils the new edition of its benchmark of cybersecurity incidents.  To this end, we reviewed the interventions of the CERT-Wavestone crisis...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/">Cyberattacks in 2021: ransomwares, still threat n°1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">On the launch of the European Cybersecurity<strong> Month and for the Assises de la Sécurité</strong> (from 13 to 16 October 2021), <strong>Wavestone unveils the new edition of its benchmark of cybersecurity incidents</strong>.  To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.</p>
<p style="text-align: justify;">This represents <strong>60 major security incidents</strong> that led to business interruption or advanced IS compromise in a diverse sector:  industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is <strong>to shed light on and show the evolution of the state of the cyber threats, </strong>whilst also providing the keys for better anticipation and reaction.</p>



<h2 class="wp-block-heading"><strong>A strong preponderance of ransomware in the panorama of cyberattacks</strong></h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1255" height="505" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057.png" alt="" class="wp-image-17195" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057.png 1255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-768x309.png 768w" sizes="auto, (max-width: 1255px) 100vw, 1255px" /></figure></div>



<p>  </p>
<p style="text-align: justify;">Ransomware accounts for<strong> 60%</strong> of the cyberattacks encountered by CERT-W for our customers. Furthermore, attackers are becoming increasingly more organized and skilled at carrying out more effective attacks</p>



<p><em>&#8220;Cybercriminal groups have succeeded in their digital transformation and their organization into a platform has made it possible to majorly make their attacks more efficient and faster&#8221; Gerôme Billois, Partner Cybersecurity</em></p>



<p style="text-align: justify;">Beyond the simple blocking of the IS, <strong>the combination with data theft is becoming more and more present</strong>. Indeed, <strong>30%of the ransomware attacks observed  include combine the blocking of the IS and the theft of data</strong>,  the latter being an additional lever to obtain financial gains.</p>



<h2 class="wp-block-heading"><strong>Faster and more targeted ransomware</strong> <strong>attacks</strong></h2>



<p style="text-align: justify;">We see a reduction in the average time between initial access and deployment of ransomware in the system with<strong> a minimum of 3 days for the fastest attack and an average of 25 days</strong> on managed cases. Attackers are becoming <strong>more and more determined to harm their victims</strong>.  Indeed, they now go so far as to target and destroy the backup mechanisms  in order to force the payment of the ransom  (21% of  cases).</p>
<p style="text-align: justify;">We also find that in<strong> 90% of cases data has been irretrievably lost.</strong> It should be noted that  we are seeing a significant decrease in ransom payments this year (from 20% the previous year to 5% of cases). Multiple factors can  explain  this decrease, between the better understanding of the low interest to be paid  (the payment of the ransom does not accelerate the time of resolution of the crisis), the actions of awareness  and pressure on the payment intermediaries by the different authorities.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="2000" height="1125" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6.png" alt="" class="wp-image-17191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6.png 2000w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-800x450.png 800w" sizes="auto, (max-width: 2000px) 100vw, 2000px" /></figure></div>



<p>   </p>



<h2 class="wp-block-heading"><strong>Other types of attacks are still raging in the background</strong></h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1974" height="1076" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7.png" alt="" class="wp-image-17193" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7.png 1974w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-768x419.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-1536x837.png 1536w" sizes="auto, (max-width: 1974px) 100vw, 1974px" /></figure></div>



<div class="row-container onepage-section" data-parent="true" data-label="Parce qu'il est important de faire du maillage interne" data-name="parce-quil-est-important-de-faire-du-maillage-interne" data-section="5">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode_text_column">
<p> </p>
<p style="text-align: justify;">The ransomware threat should not make us forget the attacks <strong>of data theft, fraud and the gain in attack capacity that remain well present (25%)</strong> even if they are less frequent.  </p>
<p style="text-align: justify;">When it comes to accessing channels to break into systems, the main gateways are still the <strong>use of valid accounts (23%), fraudulent emails,  <em>phishing</em>  to obtain information (20%) and remote access services using security vulnerabilities or configuration defects  (18%)</strong>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="6">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="heading-text el-text">
<h2 class="h2"> </h2>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>



<h2 class="wp-block-heading"><strong>How not to be an easy target? Some tips from CERT-W</strong></h2>



<div class="uncode_text_column">
<p style="text-align: justify;"><strong>56% of victims did not anticipate </strong>being the <strong>potential</strong> <strong>target  of a </strong> <strong>cyberattack.</strong> They  did not have an incident response contract or a cyber insurance and 42% of  victims had not thought about  their resilience in the event of an attack</p>
</div>



<p>&#8220;Even if diplomatic and judicial actions have weakened the cybercriminal ecosystem, it is not a question of stopping efforts, we must prepare now thanks to simple actions to put in place&#8221; Nicolas Gauchard, Head of CERT-W</p>



<div class="messagebox_text style-accent-bg">
<p><span style="color: #503078;"><strong>The most important actions are known:</strong></span></p>
<ol>
<li><span style="color: #503078;"><strong>Identify and protect the most critical systems and data, including mention technical systems such as Active  Directory</strong></span></li>
<li><span style="color: #503078;"><strong>Improve the efficiency of attack detection with a specialized 24/7 service</strong></span></li>
<li><span style="color: #503078;"><strong>Know how to manage a major crisis by training through crisis management exercises</strong></span></li>
<li><span style="color: #503078;"><strong>Strengthen backup security and practice rebuilding immediately</strong></span></li>
<li><span style="color: #503078;"><strong>Subscribe to a cyber insurance and a contract with a specialized service in case of crisis</strong></span></li>
</ol>
</div>
<p> </p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link has-white-color has-text-color has-background" href="" style="background-color:#503078" target="_blank" rel="noreferrer noopener">Download the publication</a></div>



<div class="wp-block-button"><a class="wp-block-button__link has-white-color has-text-color has-background" href="" style="background-color:#503078" target="_blank" rel="noreferrer noopener">Contact-us</a></div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/">Cyberattacks in 2021: ransomwares, still threat n°1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; June 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 13:39:44 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[front line]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16204</guid>

					<description><![CDATA[<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is&#160;Emotet?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">CYBER CRIMINAL NETWORK DISMANTELING</h2>
<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them.</strong></p>
<p><strong>What is&nbsp;Emotet?</strong></p>
<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,</strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper</strong> of malwares. The trojan used&nbsp;a&nbsp;<a href="https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation"><strong>botnet of 1.6 million machines</strong></a>&nbsp; to realize phishing campaign and install itself on victims’ machines.</p>
<p><strong>Why is&nbsp;Emotet called the “king of malware”?</strong></p>
<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action"><strong>one of the most dangerous&nbsp;malwares</strong></a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door</strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims’ assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware</strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href="https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/"><strong>wave of ransomware attacks</strong></a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href="https://www.kaspersky.com/resource-center/threats/emotet"><strong>$1 million per incident</strong></a><strong>.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16210" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png" alt="" width="877" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-233x191.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-48x39.png 48w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-768x631.png 768w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p style="text-align: center;"><em>Main TA542’s customer base, “The Malware As a Service EMOTET”, ANSSI 2021</em></p>
<p>&nbsp;</p>
<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.</p>
<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?</strong></p>
<p>The end of one botnet actually <a href="https://info.phishlabs.com/blog/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in"><strong>led to&nbsp;the rise of several others</strong></a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.</p>
<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/"><strong>TrickBot&nbsp;also suffered a dismantlement of its own</strong></a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href="https://securityintelligence.com/posts/trickbot-survival-instinct-trickboot-version/"><strong>TrickBot&nbsp;or other versions of this malware, still lives on</strong></a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance</strong>.</p>
<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href="https://www.cybereason.com/threat-alert-new-trickbot-variants">Bazar</a></strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.</p>
<p><strong>What about the people behind these groups?</strong></p>
<p>More recently, on June 4th,&nbsp;<a href="https://www.justice.gov/opa/pr/latvian-national-charged-alleged-role-transnational-cybercrime-organization"><strong>Alla&nbsp;Witte was charged on multiple counts</strong></a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals’ operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href="https://blog.malwarebytes.com/ransomware/2021/02/egregor-ransomware-hit-by-arrests/"><strong>an arrest against Egregor members</strong></a>, while&nbsp;<a href="https://threatpost.com/netwalker-ransomware-suspect-charged/163405/"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged</strong>&nbsp;</a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href="https://www.zdnet.com/article/europol-arrests-hackers-behind-infinity-black-hacker-group/"><strong>the arrest of members of the Infinity Black website&nbsp;</strong></a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte’s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href="https://any.run/malware-trends/trickbot">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021</a>. Last but not least, <a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-clop-ransomware-gang-members-seizes-servers/">some mid-tier members of the Cl0p gang may have been arrested</a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.</p>
<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?</strong></p>
<p>It’s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href="https://www.zdnet.com/article/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit/"><strong>President Joe Biden met with Russian President Vladimir Putin</strong></a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil</strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href="https://www.zdnet.com/article/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders/"><strong>G7</strong></a> and the <a href="https://www.zdnet.com/article/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack/"><strong>NATO</strong></a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.</p>
<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity</strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg" alt="" width="936" height="638" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg 936w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-768x523.jpg 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>
</figure>
<h1></h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Phishing</h2>
<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!</p>
<p>The technical zoom of the month:</p>
<figure id="post-16215 media-16215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png" alt="" width="973" height="1849" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png 973w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-101x191.png 101w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-21x39.png 21w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-768x1459.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-808x1536.png 808w" sizes="auto, (max-width: 973px) 100vw, 973px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>To learn more about this:</strong></p>
<figure id="post-16217 media-16217" class="align-center"><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish-infographic"><img loading="lazy" decoding="async" class="aligncenter wp-image-16217" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png" alt="" width="235" height="197" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png 462w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-46x39.png 46w" sizes="auto, (max-width: 235px) 100vw, 235px" /></a></figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the short report “APT trends report Q1 2021”, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.</p>
<figure id="post-16219 media-16219" class="align-center"><a href="https://securelist.com/apt-trends-report-q1-2021/101967/"><img loading="lazy" decoding="async" class="aligncenter wp-image-16219" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg" alt="" width="248" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-63x39.jpg 63w" sizes="auto, (max-width: 248px) 100vw, 248px" /></a></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter February 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 16 Mar 2021 15:00:24 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15372</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK Two French hospital under ransomware attacks Ransomware attacks struck two French hospital groups in less than a week, prompting the transfer of some patients to other facilities but not affecting care for Covid-19 patients or virus...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/">CERT-W Newsletter February 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center">
<figure id="post-15176 media-15176" class="align-center">
<figure id="post-15373 media-15373" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-15373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23.png" alt="" width="761" height="239" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23.png 1498w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-437x137.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-768x241.png 768w" sizes="auto, (max-width: 761px) 100vw, 761px" /></figure>
</figure>
</figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.euronews.com/2021/02/16/several-french-hospitals-crippled-by-cyberattacks"><span style="text-decoration: underline; color: #21a6a6;"><strong>Two French hospital under ransomware attacks</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">Ransomware attacks struck <strong style="font-family: inherit; font-size: inherit;">two French hospital groups in less than a week</strong><span style="font-family: inherit; font-size: inherit;">, prompting the transfer of some patients to other facilities but not affecting care for Covid-19 patients or virus vaccinations. </span>The two French hospitals were stricken with <strong style="font-family: inherit; font-size: inherit;">ransomware attacks,</strong><span style="font-family: inherit; font-size: inherit;"> and a third pre-emptively </span><strong style="font-family: inherit; font-size: inherit;">cut connections with an IT provider</strong><span style="font-family: inherit; font-size: inherit;">. </span>The Villefranche-sur-Saône hospital complex in France’s eastern Rhone département (administrative area) announced Monday that a cyber-attack had been detected at 4:30am local time. The attack by the crypto-virus RYUK, a kind of ransomware, &#8220;strongly impacts&#8221; the Villefranche, Tarare and Trévoux sites of the North-West Hospital.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://abcnews.go.com/US/outdated-computer-system-exploited-florida-water-treatment-plant/story?id=75805550"><span style="text-decoration: underline; color: #21a6a6;"><strong>An outdated version of Windows and a weak cybersecurity network allowed hackers to poison the Florida water treatment</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2"><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;">The hacker was able to <strong style="font-family: inherit; font-size: inherit;">use remote access software to raise the levels of sodium hydroxide</strong><span style="font-family: inherit; font-size: inherit;"> in the water from about 100 parts per million to 11,100 parts per million for a few minutes, according to investigators. The FBI&#8217;s Cyber Division on Tuesday notified law enforcement agencies and businesses to warn them about the computer vulnerabilities, which led to the Bruce T. Haddock </span><strong style="font-family: inherit; font-size: inherit;">Water Treatment Plant</strong><span style="font-family: inherit; font-size: inherit;"> in Oldsmar being hacked on Feb. 5.</span><br />
</span></span></span><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;">The plant&#8217;s computer systems were using Windows 7, which hasn&#8217;t received support or updates from Microsoft in over a year, according to the FBI.</span></span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://cybernews.com/news/largest-compilation-of-emails-and-passwords-leaked-free/"><span style="text-decoration: underline; color: #21a6a6;"><strong>COMB: more than 3 billion of Gmail, Hotmail, Netflix passwords have leaked</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">It’s being called <strong>the biggest breach of all time</strong> and <strong>the mother of all breaches</strong>: COMB, or the Compilation of Many Breaches, contains more than 3.2 billion unique pairs of cleartext emails and passwords. While many data breaches and leaks have plagued the internet in the past, this one is exceptional in the sheer size of it. To wit, the entire population of the planet is at roughly 7.8 billion, and this is about 40% of that.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.europol.europa.eu/newsroom/news/ten-hackers-arrested-for-string-of-sim-swapping-attacks-against-celebrities"><span style="text-decoration: underline; color: #21a6a6;"><strong>Arrest,Ten hackers arrested after stealing over USD 100 million in cryptocurrencies by hijacking phone numbers</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Around 10 criminals have been <strong>arrested</strong> as a result of an <strong>international investigation into a series of sim swapping attacks</strong> targeting high-profile victims in the United States. The attacks orchestrated by this criminal gang targeted thousands of victims throughout 2020, including famous internet influencers, sport stars, musicians and their families. The criminals are believed to have <strong>stolen</strong> from them over <strong>USD 100 million in cryptocurrencies</strong> after illegally gaining access to their phones.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-005/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">Sandworm intrusion set campaign targeting Centreon systems, impacting several French entities</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">ANSSI has been informed of <strong style="font-family: inherit; font-size: inherit;">an intrusion campaign targeting the monitoring software Centreon</strong><span style="font-family: inherit; font-size: inherit;"> distributed by the French company CENTREON which resulted in the </span><strong style="font-family: inherit; font-size: inherit;">breach of several French entities</strong><span style="font-family: inherit; font-size: inherit;">. This campaign mostly affected information technology providers, especially web hosting providers.</span><br />
On compromised systems, ANSSI discovered the presence of a backdoor in the form of a webshell dropped on several Centreon servers exposed to the internet. This campaign bears several similarities with previous campaigns attributed to the <strong>intrusion set named Sandworm.</strong></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/dutch-covid-19-patient-data-sold-on-the-criminal-underground/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Following Emotet and Netwalker arrest, groups of cybercriminal publicity released victim&#8217;s decrytption keys</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Less than one month after the arrest of <strong style="font-family: inherit; font-size: inherit;">Emotet and Netwalker</strong><span style="font-family: inherit; font-size: inherit;"> networks, two cybercriminal groups known as Ziggy and Fonix announced that they were shutting down their ransomware operations and would be releasing all of the </span><strong style="font-family: inherit; font-size: inherit;">decryption keys</strong><span style="font-family: inherit; font-size: inherit;">. The groups mentioned concerns about recent law enforcement activity and guilt for encrypting victims. Ziggy ransomware admin indeed </span><strong style="font-family: inherit; font-size: inherit;">posted a SQL file</strong><span style="font-family: inherit; font-size: inherit;"> containing 922 decryption keys for encrypted victims. For each victim, the SQL file lists three keys needed to decrypt their encrypted files.</span></td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1300"><strong>CVE-2021-1300</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Cisco SD-WAN Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>Cisco is warning of multiple, critical vulnerabilities in its software-defined networking for wide-area networks (<a href="https://threatpost.com/cisco-zero-day-anyconnect-secure-patch/160988/">SD-WAN</a>) solutions for business users. One of them is this buffer-overflow flaw stems from incorrect handling of IP traffic; an attacker could exploit the flaw by sending crafted IP traffic through an affected device, which may cause a buffer overflow when the traffic is processed. Ultimately, this allows an attacker to execute arbitrary code on the underlying operating system with root privileges.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1257"><strong>CVE-2021-1257</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Cisco Digital Network Architecture CSRF Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>The flaw exists in the web-based management interface of the Cisco DNA Center, which is a centralized network-management and orchestration platform for Cisco DNA. An attacker could exploit the vulnerability by socially engineering a web-based management user into following a specially crafted link, say via a phishing email or chat. If the user clicks on the link, the attacker can then perform arbitrary actions on the device with the privileges of the authenticated user.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1647"><strong>CVE-2021-1647</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft Defender Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/">CERT-W Newsletter February 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter January 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/cert-w-newsletter-january-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 08:00:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15175</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK SolarWinds aftermaths On the 11th of January, a website presumably owned by the actors behind the SolarWinds breach has surfaced, claiming to be selling data obtained using the SolarWinds backdoor. The site, using the domain solarleaks.net,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/cert-w-newsletter-january-2021/">CERT-W Newsletter January 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center">
<figure id="post-15176 media-15176" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-15176" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january.png" alt="" width="862" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january.png 1358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january-768x245.png 768w" sizes="auto, (max-width: 862px) 100vw, 862px" /></figure>
</figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://securityboulevard.com/2021/01/solarwinds-aftermath-continues-with-solarleaks/"><span style="text-decoration: underline; color: #21a6a6;"><strong>SolarWinds aftermaths</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">On the 11<sup style="font-family: inherit;">th</sup><span style="font-family: inherit; font-size: inherit;"> of January, a website presumably owned by the actors behind the SolarWinds breach has surfaced, claiming to be selling data obtained using the SolarWinds backdoor. The site, using the domain </span><strong style="font-family: inherit; font-size: inherit;">solarleaks.net</strong><span style="font-family: inherit; font-size: inherit;">, displays only a pgp signed message, in which the actors share the links to download the stolen information, which has already been encrypted. The domain solarwinds.net has a sister domain located in the dark web, presumably to provide access in case of a takedown.<br />
</span>Simultaneously, a growing number of cybersecurity vendors like <a href="https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/"><strong>CrowdStrike</strong></a>, <a href="https://fidelissecurity.com/threatgeek/data-protection/ongoing-analysis-solarwinds-impact/"><strong>Fidelis</strong></a>, FireEye, <a href="https://threatpost.com/malwarebytes-solarwinds-attackers/163190/"><strong>Malwarebytes</strong></a>, Palo Alto Networks and <a href="https://threatpost.com/mimecast-solarwinds-hack-security-vendor-victims/163431/"><strong>Mimecast</strong></a> are confirming being targeted in the espionage attack. “What started out as the SolarWinds attack is slowly turning out to be perhaps the most sophisticated and wide-reaching cyber-campaign we have ever seen,” Ami Luttwak, CTO and co-founder of Wiz “It encompasses multiple companies used as backdoors to other companies, numerous tools and novel attack methods. This is far more than SolarWinds.”</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://www.theregister.com/2021/01/21/dept_education_school_laptops_malware/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Laptops given to British schools came preloaded with remote-access worm</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2"><span style="font-family: inherit; font-size: inherit;">A shipment of laptops supplied to British schools by the Department for Education to help kids learn under lockdown came preloaded with <strong>Gamarue</strong> – an old remote-access worm from the 2010s. This software nasty doesn&#8217;t just spread from computer to computer, it also tries to connect to outside servers for instructions to carry out. From what we know a batch of <strong>23,000 computers</strong>, the GeoBook 1E running Windows 10, made by Shenzhen-headquartered Tactus Group, contained the units that were loaded with malware.</span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://threatpost.com/meetmindful-daters-compromised-data-breach/163313/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Hacker leaks data of 2.28 million dating site user</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">The dating site&#8217;s data has been shared as a free download on a publicly accessible hacking forum known for its trade in hacked databases. The leaked data, a <strong>1.2 GB</strong> file, appears to be a dump of the site&#8217;s <strong>users database</strong>. Some of the most sensitive data points included in the file include: Real names; Email addresses; City, state, and ZIP details; Body details; Dating preferences; Marital status; Birth dates; Latitude and longitude; IP addresses; Bcrypt-hashed account passwords; Facebook user IDs; and Facebook authentication tokens. Messages exchanged by users were not included in the leaked file; however, this does not make the entire incident less sensitive.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://krebsonsecurity.com/2021/01/arrest-seizures-tied-to-netwalker-ransomware/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Arrest, seizure tied to NetWalker ransomware</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">U.S. and Bulgarian authorities this week seized the dark web site used by the <strong>NetWalker</strong> ransomware cybercrime group to publish data stolen from its victims. NetWalker is a ransomware-as-a-service crimeware product in which affiliates rent access to the continuously updated malware code in exchange for a percentage of any funds extorted from victims. In connection with the seizure, a Canadian national suspected of extorting more than <strong>$27 million</strong> through the spreading of NetWalker was charged in a Florida court.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://krebsonsecurity.com/2021/01/international-action-targets-emotet-crimeware/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">International action targets Emotet crimeware</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Authorities across Europe said they’d seized control over <strong>Emotet</strong>, a prolific malware strain and cybercrime-as-service operation. Investigators say the action could help quarantine more than <strong>a million Microsoft Windows systems currently compromised</strong> with malware tied to Emotet infections. The law enforcement action included the arrest of several suspects in Europe thought to be connected to the crimeware gang and the take down of various servers that communicate with infected systems.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/dutch-covid-19-patient-data-sold-on-the-criminal-underground/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Duch insider attack on Covid-19 data</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Dutch police have arrested <strong>two individuals</strong> in Amsterdam for allegedly selling data from the Dutch health ministry’s COVID-19 systems on the criminal underground. The arrests came after an investigation by RTL Nieuws reporter Daniel Verlaan who discovered ads for Dutch citizen data online, advertised on instant messaging apps like Telegram, Snapchat, and Wickr. According to Verlaan, <strong>the two suspects worked in DDG call centers</strong>, where they had access to official Dutch government COVID-19 systems and databases, and as they were working from home, they could easily take photos of their screens.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1300"><strong>CVE-2021-1300</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Cisco SD-WAN Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>Cisco is warning of multiple, critical vulnerabilities in its software-defined networking for wide-area networks (<a href="https://threatpost.com/cisco-zero-day-anyconnect-secure-patch/160988/">SD-WAN</a>) solutions for business users. One of them is this buffer-overflow flaw stems from incorrect handling of IP traffic; an attacker could exploit the flaw by sending crafted IP traffic through an affected device, which may cause a buffer overflow when the traffic is processed. Ultimately, this allows an attacker to execute arbitrary code on the underlying operating system with root privileges.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1257"><strong>CVE-2021-1257</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Cisco Digital Network Architecture CSRF Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>The flaw exists in the web-based management interface of the Cisco DNA Center, which is a centralized network-management and orchestration platform for Cisco DNA. An attacker could exploit the vulnerability by socially engineering a web-based management user into following a specially crafted link, say via a phishing email or chat. If the user clicks on the link, the attacker can then perform arbitrary actions on the device with the privileges of the authenticated user.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1647"><strong>CVE-2021-1647</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft Defender Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/cert-w-newsletter-january-2021/">CERT-W Newsletter January 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter December 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/cert-w-newsletter-december-2020-risk-insight/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 08:00:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14972</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK The massive SolarWind hack Russian SVR Hackers have been romping through some 18,000 of SolarsWinds&#8217; Origin customer servers using the SUNBURST malware installed via a backdoored update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/cert-w-newsletter-december-2020-risk-insight/">CERT-W Newsletter December 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14983" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER.png" alt="" width="1512" height="482" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER.png 1512w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER-768x245.png 768w" sizes="auto, (max-width: 1512px) 100vw, 1512px" /></figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.theregister.com/2020/12/21/in_brief_security/"><span style="text-decoration: underline; color: #21a6a6;"><strong>The massive SolarWind hack</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">Russian SVR Hackers have been romping through some 18,000 of SolarsWinds&#8217; Origin customer servers using the SUNBURST malware installed via a backdoored update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain has been used to coordinate attacks. We do not know yet how the hackers hacked into SolarWinds but last year the company’s server was protected by the password “solarwinds123” (<a style="font-family: inherit; font-size: inherit;" href="https://www.theregister.com/2020/12/16/solarwinds_github_password/">link</a><span style="font-family: inherit; font-size: inherit;"> for more details).</span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://arstechnica.com/gadgets/2020/12/iphone-zero-click-wi-fi-exploit-is-one-of-the-most-breathtaking-hacks-ever/"><span style="text-decoration: underline; color: #21a6a6;"><strong>iPhone zero click Wi-Fi exploit</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2">Before Apple patch, Wi-Fi packets could steal photos. No interaction needed. Over the air. This Wi-Fi packet of death exploit was devised by Ian Beer, a researcher at Project Zero, Google’s vulnerability research arm. In this post (<a href="https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html">link</a>), Beer covers the entire process to successfully exploiting this vulnerability in order to run arbitrary code on any nearby iOS device and steal all the user data.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://www.theregister.com/2020/12/07/data_breach_in_hackathon_data/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Travel agency leaked customer data by giving away in a hackaton</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">When running a hackathon in 2017, the Australian travel agency, Flight Centre, provided a dataset containing 106 million rows of data and containing 6,121,565 individual customer records. Unfortunately, credit card records and passport numbers belonging to close to 7,000 people were in free text fields. An investigation showed that the agency:</p>
<ul>
<li>Did not implement a way to prevent its employees to fill out those fields with personal information.</li>
<li>Did not carry out the necessary checks, only reviewing a top 1,000 row sample for each data file within the dataset.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/"><span style="text-decoration: underline; color: #21a6a6;"><strong>A hacker is selling access to the email accounts of hundreds of C-Level Executives</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">The data (email and password combinations for Office 365 and Microsoft accounts) is being sold on a closed-access underground forum for Russian-speaking hackers named Exploit.in. Access to any of these accounts is sold for prices ranging from $100 to $1,500, depending on the company size and user&#8217;s role. The validity of the data has been confirmed and the seller refused to share how he obtained the login credentials but said he had hundreds more to sell.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.theregister.com/2020/12/01/scam_call_prison/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">A tax scam ringleader impersonating the IRS just got sent down for 20 years</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">The man who headed an international criminal call center racket that conned Americans into handing over tens of millions of dollars in the belief they were being chased for money by the US government has been jailed for 20 years. The con artists ran a complex scheme in which employees from call centers in Ahmedabad, India, impersonated officials from the IRS and US Citizenship and Immigration Services (USCIS). Their victims were threatened with arrest, imprisonment, fines or deportation if they did not pay money allegedly owed to the government.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.europol.europa.eu/newsroom/news/cybercriminals%E2%80%99-favourite-vpn-taken-down-in-global-action#:~:text=The%20virtual%20private%20network%20(VPN,agencies%20from%20around%20the%20world."><span style="text-decoration: underline; color: #21a6a6;"><strong>Cybercriminal&#8217;s favourite VPN taken down in global action</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">The virtual private network (VPN) Safe-Inet used by the world’s foremost cybercriminals has been taken down in a coordinated law enforcement action led by Europol and the FBI. Its infrastructure was seized in Germany, the Netherlands, Switzerland, France and the United States. The servers were taken down, and a splash page was put up online after the domain seizures.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17095"><strong>CVE-2020-17095</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Hyper-V Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.9 CRITICAL</strong></p>
<p>It is a bug that could allow an attacker to escalate privileges from code execution in a Hyper-V guest to code execution on the Hyper-V host by passing invalid vSMB packet data. It appears that no special permissions are needed on the guest OS to exploit this vulnerability.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17132"><strong>CVE-2020-17132</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Microsoft Exchange Remote Code Execution Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 9.1 CRITICAL</strong></p>
<p>Microsoft doesn’t provide an attack scenario here but does note that the attacker needs to be authenticated. This indicates that if you take over someone’s mailbox, you can take over the entire Exchange server.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17121"><strong>CVE-2020-17121</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft SharePoint Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/cert-w-newsletter-december-2020-risk-insight/">CERT-W Newsletter December 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter November 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/cert-w-newsletter-november-2020-risk-insight/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Wed, 16 Dec 2020 08:00:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14783</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK Brazilian government recovers from &#8220;worst-ever&#8221; cyberattack After suffering the most severe cyberattack ever orchestrated against a Brazilian public sector institution on the 3rd , the Superior Electoral Court (STJ, in the Portuguese acronym) has managed to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/cert-w-newsletter-november-2020-risk-insight/">CERT-W Newsletter November 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center"><img loading="lazy" decoding="async" class="wp-image-14786 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov.png" alt="" width="981" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov.png 1269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov-768x244.png 768w" sizes="auto, (max-width: 981px) 100vw, 981px" /></figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.zdnet.com/article/brazilian-government-recovers-from-worst-ever-cyberattack/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Brazilian government recovers from &#8220;worst-ever&#8221; cyberattack</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">After suffering the most severe cyberattack ever orchestrated against a Brazilian public sector institution on the 3<sup style="font-family: inherit;">rd</sup><span style="font-family: inherit; font-size: inherit;"> , the </span><strong style="font-family: inherit; font-size: inherit;">Superior Electoral Court</strong><span style="font-family: inherit; font-size: inherit;"> (STJ, in the Portuguese acronym) has managed to get its systems back up and running. The Court had to suspend all STJ sessions for a few days and then operate with limited functionality for urgent cases until the systems were fully re-established in November 20. The ransomware would have relied on a vulnerability discovered during a </span><a style="font-family: inherit; font-size: inherit;" href="https://www.theregister.com/2020/11/09/tianfu_cup/">Chinese hacking competition</a><span style="font-family: inherit; font-size: inherit;">.</span></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://www.lemagit.fr/actualites/252492731/Ransomware-le-groupe-Egregor-revendique-la-cyberattaque-sur-Ouest-France"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">The Egregor ransomware disrupts the distribution of the daily &#8220;Ouest France&#8221;</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 10px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2">Ouest-France, <strong>the leading French daily</strong> by its distribution, will publish only one edition of its Sunday newspaper, against ten usually, after being the victim of the <strong>Egregor ransomware</strong> in the night from 20th to 21st of November.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://www.darkreading.com/threat-intelligence/new-gitpaste-12-botnet-exploits-12-known-vulnerabilities/d/d-id/1339401?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple"><span style="text-decoration: underline; color: #21a6a6;"><strong>GitPaste-12 worm targets Linux servers, IoT devices</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2">Security researchers have discovered a new worm and botnet dubbed Gitpaste-12, named for <strong>its usage of GitHub and Pastebin </strong>to host component code and the <strong>12 known vulnerabilities</strong> it exploits to compromise systems.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://threatpost.com/millions-hotel-guests-worldwide-data-leak/161044/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Millions of hotel worldwide caught up in mass data leak</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">Widely used hotel reservation platforms (including Booking.com and Expedia) has <strong style="font-family: inherit; font-size: inherit;">exposed 10 million files</strong><span style="font-family: inherit; font-size: inherit;"> related to guests at various hotels around the world, thanks to </span><strong style="font-family: inherit; font-size: inherit;">a misconfigured Amazon Web Services S3 bucket</strong><span style="font-family: inherit; font-size: inherit;">. The incident has affected </span><strong style="font-family: inherit; font-size: inherit;">24.4 GB worth of data in total</strong><span style="font-family: inherit; font-size: inherit;">, threating travellers with identity theft, scams, credit-card fraud and vacation-stealing, according to the security team at Website Planet, which uncovered the bucket. </span></td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://krebsonsecurity.com/2020/11/two-charged-in-sim-swapping-vishing-scams/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Two charged in SIM swapping, vishing scams</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Two young men from the eastern united states have been hit <strong>with identity theft and conspiracy charges</strong> for allegedly stealing bitcoin and social media accounts by tricking employees at wireless phone companies into giving away credentials needed to remotely access and modify customer account information.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://blog.malwarebytes.com/ransomware/2020/11/regretlocker-new-ransomware-can-encrypt-windows-virtual-hard-disks/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">New Regret Locker ransomware targets Windows Virtual Machines</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">A new ransomware called Regret Locker was discovered in October. It may be a simple ransomware in terms of appearance, but it makes up for in advanced features. In fact, Regret Locker uses an <strong>interesting technique of mounting a virtual disk file</strong> so each of its files can be encrypted individually.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://threatpost.com/ragnar-locker-ransomware-facebook-ads/161133/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Ragnar Locker ransomware gang takes out Facebook ads in key tactic</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">The Ragnar Locker ransomware group has decided to ratchet up the pressure on its latest high-profile victim, Italian liquor conglomerate <strong>Campari</strong>, by taking out Facebook ads threatening to release the <strong>2TB</strong> of sensitive data it stole in a Nov. 3 attack – unless <strong>a $15 million ransom is paid in Bitcoin.</strong></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware _Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf"><span style="text-decoration: underline; color: #21a6a6;"><strong>Ransomware Activity targeting the Healthcare and Public Health Sector</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">CISA, FBI, and HHS have credible information of an <strong>increased and imminent cybercrime threat to U.S. hospitals and healthcare providers</strong>. CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17051"><strong>CVE-2020-17051</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Remote kernel heap overflow in NFSv3 Windows Server</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>A critical vulnerability in the Windows NFSv3 (Network File System) server. NFS is typically used in heterogenous environments of Windows and Unix/Linux for file sharing. The vulnerability can be reproduced to cause an immediate BSOD (Blue Screen of Death) within the nfssvr.sys driver.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17087"><strong>CVE-2020-17087</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Windows Kernel Local Elevation of Privilege Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>A privilege escalation flaw that would allow an attacker who has already compromised a less powerful user account on a system to gain administrative control. In essence, it would have to be chained with another exploit.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-3556"><strong>CVE-2020-3556</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>CISCO AnyConnect VPN Zero-Day</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.3 HIGH</strong></p>
<p>A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/cert-w-newsletter-november-2020-risk-insight/">CERT-W Newsletter November 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter October 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/cert-w-newsletter-october-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 08:00:41 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14591</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK SOPRA STERIA HIT BY NEW VERSION OF RYUK RANSOMWARE French IT giant Sopra Steria was hit with a cyber-attack that disrupted the business of the firm. The virus has been identified: it is a new version...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cert-w-newsletter-october-2020/">CERT-W Newsletter October 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-14582" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4.png" alt="" width="1263" height="395" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4.png 1263w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4-437x137.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4-768x240.png 768w" sizes="auto, (max-width: 1263px) 100vw, 1263px" /></p>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.soprasteria.com/newsroom/press-releases/details/cyberattack-information-update"><span style="text-decoration: underline; color: #21a6a6;"><strong>SOPRA STERIA HIT BY NEW VERSION OF RYUK RANSOMWARE</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">French IT giant Sopra Steria was hit with a cyber-attack that disrupted the business of the firm. The virus has been identified: it is a new version of the Ryuk ransomware, previously unknown to antivirus software providers and security agencies. Fortunately, according to Guillaume POUPARD, ANSSI’s managing director, the attack was foiled.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP RANSOM</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://threatpost.com/software-ag-data-clop-ransomware/160042/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">SOFTWARE AG DATA RELEASED AFTER CLOP RANSOMWARE STRIKE</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 10px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2">The <strong>Clop</strong> group attacked Software AG, a German conglomerate with operations in more than <strong>70 countries</strong>, threatening to dump stolen data if the whopping <strong>$23 million ransom</strong> isn’t paid.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://threatpost.com/3-month-apple-hack-vulnerabilities-critical/159988/"><span style="text-decoration: underline; color: #21a6a6;"><strong>WORMABLE APPLE ICLOUD BUG ALLOWS AUTOMATIC PHOTO THEFT</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2">As part of Apple’s Security Bounty, a group of ethical hackers discovered <strong>55 vulnerabilities</strong>, earning <strong>$300,000</strong>. Some of the more interesting vulnerabilities abled wormable stored <strong>Cross-Site Scripting</strong> and <strong>command injection</strong>. Here is the <a href="https://samcurry.net/hacking-apple/"><strong>link</strong></a> to an extensive blog post detailing the team’s findings.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://www.darkreading.com/attacks-breaches/cybercriminals-extort-psychotherapy-patients-following-vastaamo-breach/d/d-id/1339280?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple"><span style="text-decoration: underline; color: #21a6a6;"><strong>VASTAAMO BREACH: HACKERS BLACKMAILING PSYCHOTHERAPY PATIENTS</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">Cybercriminals have hacked the systems of psychotherapy giant <strong>Vastaamo</strong>, and are now reaching out to therapy patients, threatening to dump their patient files if they do not pay a ransom. They have already reportedly posted <strong>the details of 300 Vastaamo patients</strong>.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 0.947867%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 0.947867%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.darkreading.com/attacks-breaches/us-treasury-sanctions-russian-institution-linked-to-triton-malware/d/d-id/1339265?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple"><span style="text-decoration: underline; color: #21a6a6;"><strong>US TREASURY SANCTIONS RUSSIAN INSTITUTION LINKED TO TRITON MALWARE</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 0.947867%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Triton, also known as TRISIS and HatMan, was developed to target and <strong>manipulate industrial control systems</strong>, the US Treasury reports<strong>.</strong> The US Department of the Treasury&#8217;s Office of Foreign Assets Control has sanctioned a Russian government research institution connected to the Triton malware.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 0.947867%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://threatpost.com/doj-charges-6-sandworm-apt-members-in-notpetya-cyberattacks/160304/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">US DOJ CHARGES 6 SANDWORM APT MEMBERS IN NOTPETYA CYBERATTACK</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 0.947867%; border-color: #ffffff; text-align: left;" colspan="2">The Department of Justice (DOJ) announced charges against <strong>six Russian nationals</strong> who are allegedly tied to the Sandworm APT. The threat group is believed to have launched several high-profile cyberattacks over the past few years – including the destructive NotPetya cyberattack that <a href="https://threatpost.com/notpetya-linked-to-industroyer-attack-on-ukraine-energy-grid/138287/">targeted hundreds of firms and hospitals worldwide in 2017.</a></td>
</tr>
<tr style="height: 48px;">
<td style="width: 0.947867%; height: 21px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://thedfirreport.com/2020/11/05/ryuk-speed-run-2-hours-to-ransom/"><span style="text-decoration: underline; color: #21a6a6;"><strong>RYUK RANSOMWARE GANG USES ZEROLOGON BUG FOR LIGHTNING-FAST ATTACK</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 0.947867%; border-color: #ffffff; height: 10px; text-align: left;" colspan="2">The gang behind the Ryuk ransomware has added a new tool to their arsenal, which allowed them to significantly <strong>decrease the time needed to fully encrypt the target system to 2 hours</strong>. For more information concerning exploits of the <strong>Zerologon</strong> vulnerability click <a href="https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/">here</a>.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>CVE-2020-5135</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5135"><span style="text-decoration: underline; color: #21a6a6;"><strong>CRITICAL VULNERABILITY ALLOWS HACKERS TO DISRUPT SONICWALL FIREWALLS</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 9.8 CRITICAL</strong></p>
<p>A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>CVE-2020-16898</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5135"><span style="color: #21a6a6;"><b><u>WINDOWS TCP/IP REMOTE CODE EXECUTION VULNERABILITY</u></b></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>CVE-2020-16947</strong></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5135"><span style="text-decoration: underline; color: #21a6a6;"><strong>MICROSOFT OUTLOOK REMOTE CODE EXECUTION VULNERABILITY</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka &#8216;Microsoft Outlook Remote Code Execution Vulnerability&#8217;.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cert-w-newsletter-october-2020/">CERT-W Newsletter October 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of the current news by CERT-W &#8211; September 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/10/review-of-the-current-news-by-cert-w-september-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 09 Oct 2020 07:43:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercriminality]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14354</guid>

					<description><![CDATA[<p>Indicators of the month Top attack &#8211; French shipping giant CMA CGM hit by ransomware cyber attack CMA CGM announces that it has been affected by a ransomware attack, which disabled its reservation system and affected some of its Chinese...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/review-of-the-current-news-by-cert-w-september-2020/">Review of the current news by CERT-W &#8211; September 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12838" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png" alt="" width="1021" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png 1021w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-437x126.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-768x222.png 768w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></p>
<h2>Indicators of the month</h2>
<h3>Top attack &#8211; <a href="https://www.porttechnology.org/news/cma-cgm-emerges-from-cyber-attack/">French shipping giant CMA CGM hit by ransomware cyber attack</a></h3>
<p>CMA CGM announces that it has been affected by a ransomware attack, which <strong>disabled its reservation system</strong> and affected some of its <strong>Chinese offices. The RagnarLocker gang</strong> reportedly asked the company to contact them within two days &#8220;via a live chat and pay for a special decryption key&#8221;. In a statement, the company said it had shut all external accesses to their network and computer applications as a precautionary measure and that <strong>the group’s information system was gradually resuming.</strong></p>
<h3>Top exploit &#8211; <a href="https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/">Microsoft warns of attackers now exploiting “Zerologon”</a><a href="https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/"> flaw</a></h3>
<p>Microsoft&#8217;s Security Intelligence team says it&#8217;s monitoring new attacks that employ public exploits of the recently patched CVE-2020-1472 Netlogon EoP vulnerability, aka Zerologon. The vulnerability carries a <strong>critical severity rating</strong> from Microsoft as well as a maximum of 10 under the Common Vulnerability Scoring System as it lets anyone with a network toehold obtain domain-controller password.</p>
<h3>Top leak &#8211; <a href="https://www.theregister.com/2020/09/23/microsoft_leaks_over_65tb_bing/">Microsoft leaks 6.5TB in Bing search data via unsecured elastic server</a></h3>
<p>Microsoft earlier this month exposed a 6.5TB Elastic server to the world <strong>that included search terms, location coordinates, device ID data, and a partial list of which URLs were visited.</strong> According to a report from cyber-security outfit WizCase, the server was password-protected until around 10 September, when “the authentication was removed”.</p>
<p>&nbsp;</p>
<h2>Cybercrime watch</h2>
<h3><a href="https://us-cert.cisa.gov/ncas/analysis-reports/ar20-259a">US CISA report shares details on web shells used by iranian</a><a href="https://us-cert.cisa.gov/ncas/analysis-reports/ar20-259a"> hackers</a></h3>
<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a malware analysis report (MAR) that includes technical details about web shells employed by Iranian hackers. According to the CISA’s report, Iranian hackers from an unnamed APT group are employing several known web shells, in <strong>attacks on IT, government, healthcare, financial, and insurance organizations</strong> across the United States. The malware used by the threat actors includes the <strong>ChunkyTuna, Tiny, and China Chopper</strong> web shells.</p>
<h3><a href="https://krebsonsecurity.com/2020/09/two-russians-charged-in-17m-cryptocurrency-phishing-spree/">Two Russians charged in $17m cryptocurrency phishing</a><a href="https://krebsonsecurity.com/2020/09/two-russians-charged-in-17m-cryptocurrency-phishing-spree/"> spree</a></h3>
<p>U.S. authorities today announced criminal charges and financial sanctions against two Russian men <strong>accused of stealing nearly $17 million worth of virtual currencies</strong> in a series of phishing attacks throughout 2017 and 2018 that spoofed websites for some of the most popular cryptocurrency exchanges.</p>
<h3><a href="https://threatpost.com/google-chrome-attack/159466/">Google Chrome bugs open browsers to attack</a></h3>
<p>Google’s release of Chrome 85.0.4183.121 for Windows, Mac and Linux fixed <strong>10 vulnerabilities</strong>. The successful exploitation of the most severe of these could <strong>allow an attacker to execute arbitrary code</strong> in the context of the browser, according to Google. Google Chrome versions prior to 85.0.4183.121 are affected.</p>
<p>&nbsp;</p>
<h2>Vulnerabilities watch</h2>
<h3><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472">CVE-2020-1472 – Netlogon Elevation of Privilege Vulnerability</a></h3>
<p><strong>CVSS score: 10.0 CRITICAL</strong></p>
<p>An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.</p>
<h3><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922">CVE-2020-0922 – Microsoft COM* for Windows Remote Code Execution Vulnerability</a></h3>
<p><strong>CVSS score: 8.8 HIGH</strong></p>
<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p>
<p><em>*The Microsoft Component Object Model (COM) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM is the foundation technology for Microsoft&#8217;s OLE (compound documents), ActiveX (Internet-enabled components), as well as others.</em></p>
<h3><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1380">CVE-2020-1380 – Scripting Engine Memory Corruption Vulnerability</a></h3>
<p><strong>CVSS score: 7.5 HIGH</strong></p>
<p>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/review-of-the-current-news-by-cert-w-september-2020/">Review of the current news by CERT-W &#8211; September 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of the current news by CERT-W &#8211; March 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/review-of-the-current-news-by-cert-w-march-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 07 Apr 2020 09:30:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercriminality]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12914</guid>

					<description><![CDATA[<p>Cybercrime watch The most consequent Patch Tuesday in the history of Patch Tuesday On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/review-of-the-current-news-by-cert-w-march-2020/">Review of the current news by CERT-W &#8211; March 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-12838 media-12838" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12838" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png" alt="" width="1021" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png 1021w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-437x126.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-768x222.png 768w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></figure>
<h2>Cybercrime watch</h2>
<h3><a href="https://www.zdnet.com/article/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities/">The most consequent Patch Tuesday in the history of Patch Tuesday</a></h3>
<p style="font-weight: 400;">On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are considered &#8220;critical&#8221;, which is the highest level of severity. The exploit of some of them allow remote code execution and takeover of vulnerable assets without user interaction.</p>
<h3><a href="https://threatpost.com/new-mirai-variant-mukashi-targets-zyxel-nas-devices/153982/">Mukashi: the new variant of the famous Mirai botnet is targeting Zyxel NAS</a></h3>
<p>The Mukashi botnet has been found performing bruteforce attacks on random hosts. The botnet is using various combinations of credentials in an attemps to log in and seize control of the asset. It is now targeting the Network Access Storage (NAS) from the Zyxel brand by using the recent CVE-2020-9054, which allows for remote code execution on the 5.21 version of the firmware.</p>
<h3><a href="https://www.darkreading.com/attacks-breaches/fbi-warns-of-fake-cdc-emails-in-covid-19-phishing-alert/d/d-id/1337381">Coronavirus is now the most used decoy of all times</a></h3>
<p>During the sanitary crisis linked to COVID-19, the coronavirus has become the most used decoy of all times in phishing attacks. The FBI Internet Crime Complaint Center (IC3) mentions that it can either be email pretending to offer information on the virus itself, test kits, vaccines. Attackers even go to such length like posing as charities asking for donations.</p>
<p>&nbsp;</p>
<h2>Vulnerability watch</h2>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0684">CVE-2020-0684 &#8211; Remote code execution in Microsoft Windows</a></h3>
<p>A new remote code execution vulnerability has been found in the Windows operating system that is triggered when a .LNK file is processed (analyzed or executed). An attacker could gain the same privileges as the local user by exploiting this vulnerability.</p>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3947">CVE-2020-3946 &#8211; Denial of Service in Vmware Workstation</a></h3>
<p>Some versions of Vmware Workstation and Fusion are exposed to a &#8220;use-after-free&#8221; vulnerability in the vmnetdhcp service. The successful exploit of this vulnerability currently leads to denial of service but could be used in theory to execute arbitrary code.</p>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10887">CVE-2020-10887 &#8211; Firewall bypass in TP-Link routers</a></h3>
<p>A version of the TP-Link firmware is exposed to firewall bypass. This vulnerability originates from an insufficiant filtering when handling IPv6 SSH connections. It can be exploited without authentication and can even be used to peform privilege escalation and code execution, up to root.</p>
<p>&nbsp;</p>
<h2>Weekly top</h2>
<h3>The top leak &#8211; <a href="https://threatpost.com/millions-guests-marriott-data-breach-again/154300/">A 5-million record leak of Mariott&#8217;s clients</a></h3>
<p>Cybercriminals have succeeded in obtaining the credentials of two employees on a third-party piece of software used in Mariott resort to provide clients with various services. They used them to access numerous information on Mariott&#8217;s clients, including names, email addresses, phone numbers, etc.<br />
It is the second data leak in 24 months for the brand!</p>
<h3>The top exploit &#8211; <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0796">CVE-2020-0796 &#8211; Remote code execution vulnerability in the SMB protocol</a></h3>
<p>SMB is a network protocol used for file sharing, printers, and for other network purposes. The Microsoft SMB 3.1.1 (SMBv3) is suject to a vulnerability in the way it handles some requests. Unauthenticated attackers can use this vulnerability to remotely execute code on SMB servers as well as clients.</p>
<h3>The top attack &#8211; <a href="https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/">One of the largest Czech hospital hit by a cyberattack</a></h3>
<p>The Brno university hospital in Czech Republic has been hit by a major cyberattack in the midst of the COVID-19 outbreak. It has been forced to shut down all IT equipment and information system. Consequently, surgical procedures have been rescheduled and newly infected patients transferred to other hospitals.</p>
<p>&nbsp;</p>
<h2>Software version watch</h2>
<table style="border-style: solid; border-color: #000000;" border="1">
<tbody>
<tr>
<td><strong>Software</strong></td>
<td><strong>Current version</strong></td>
</tr>
<tr>
<td>Adobe Flash Player</td>
<td><a href="https://get.adobe.com/fr/flashplayer/">32.0.0.344</a></td>
</tr>
<tr>
<td>Adobe Acrobat Reader DC</td>
<td><a href="https://get.adobe.com/fr/reader/">2020.006.20042</a></td>
</tr>
<tr>
<td>Java</td>
<td><a href="https://java.com/fr/download/">Version 8 Update 241</a></td>
</tr>
<tr>
<td>Mozilla Firefox</td>
<td><a href="https://www.mozilla.org/fr/firefox/new/">74.0</a></td>
</tr>
<tr>
<td>Google Chrome</td>
<td><a href="https://www.google.com/chrome/browser/desktop/index.html">80.0.3987.163</a></td>
</tr>
<tr>
<td>VirtualBox</td>
<td><a href="https://www.virtualbox.org/wiki/Downloads">6.1.4</a></td>
</tr>
<tr>
<td>CCleaner</td>
<td><a href="https://www.piriform.com/ccleaner/download/standard">5.65.7632</a></td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/review-of-the-current-news-by-cert-w-march-2020/">Review of the current news by CERT-W &#8211; March 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
