<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Redis - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/redis/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/redis/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 13 Jan 2023 10:58:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Redis - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/redis/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch – December 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 10:48:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BYOVKD]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Redis]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19444</guid>

					<description><![CDATA[<p>FOCUS TECH BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD) Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver. Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD)</h3>
<p style="text-align: justify;">Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-19447" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png" alt="" width="1625" height="1091" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png 1625w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-768x516.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-1536x1031.png 1536w" sizes="(max-width: 1625px) 100vw, 1625px" /></p>
<p style="text-align: justify;">Even if it does not raise an alert on the EDR console, the Defense team must <strong>be vigilant</strong> to any telemetry that would indicate the <strong>loading of an unusual driver on assets</strong>. Furthermore, <strong>prevention mechanisms</strong> exist for this type of case, some examples below:</p>
<ul>
<li style="text-align: justify;"><a href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-abuse-of-exploited-vulnerable-signed-drivers">Block abuse of exploited vulnerable signed drivers</a></li>
<li style="text-align: justify;"><a style="font-size: revert;" href="https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules">Driver block rules</a></li>
</ul>
<h2> </h2>
<h2 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img decoding="async" class="aligncenter size-full wp-image-19449" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png" alt="" width="770" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-768x413.png 768w" sizes="(max-width: 770px) 100vw, 770px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;"><strong>READING OF THE MONTH</strong></h2>
<h3 style="text-align: center;">EMOTET</h3>
<p><strong>What is Emotet 2022?</strong></p>
<p style="text-align: justify;"><strong>Emotet is a <em>Malware-as-a-Service</em></strong> (<em>MaaS</em>) relying on a botnet network which appeared in 2014. It was originally designed as a banking Trojan aiming to steal sensitive information related to bank accounts<em>.</em> In 2021, police forces arrested several people belonging to Emotet organization, which then <strong>reappeared with new features in 2022</strong>. The group behind Emotet seems to be <strong>opportunist</strong> and most of its victims are from US, UK, Japan, Germany, Italy, Spain, <strong>France</strong>, and Brazil.</p>
<p><strong>Why is it dangerous?</strong></p>
<p style="text-align: justify;">Emotet is a polymorphic malware whose code changes over time. Among the numerous new features of the 2022 version, searchers from the <a href="https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/">DFIR Report</a> have identified an ability to <strong>bypass anti-malware detection</strong>. To do that, Emotet 2022 uses a 64 bits base code and various signatures to avoid pattern recognition. The malware is also able <strong>to keep itself up to date</strong> once downloaded by using <strong>Command &amp; Control servers</strong>, which send it updates the same as an Operating System. The <em>MaaS</em> is also <strong>able to release IcedID</strong>, which are modular banking Trojans able <strong>to drop other malwares</strong>. Doing so, Emotet helped to distribute ransomwares for impact, Cobalt Strike for initial access, XMRig for stealing wallet data…</p>
<p><strong>How does Emotet 2022 initial infection work?</strong></p>
<p style="text-align: justify;">Using a <strong>phishing email with a malicious Office attachment</strong>, Emotet exploits a 2017 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11882">Microsoft vulnerability</a> which allows remote code execution on vulnerable devices (CVE 2017-11882) to compromise its first victim.</p>
<p style="text-align: justify;">Once downloaded in memory, the malware executes a sequence of legitimate Windows commands to <strong>perform a recognition of its environment,</strong> then spreads in the local network and steals information.</p>
<p style="text-align: justify;">Emotet spreads through spam emails. According to <a href="https://www.deepinstinct.com/blog/emotet-malware-returns-in-2022"><em>Deep Instinct</em></a>, 45% of them are containing malicious Office attachment such as Spreadsheets or scripts in most of the cases. As those emails traduce the object and attachments names in the target’s local language and come from known senders, the phishing looks particularly realistic.<img decoding="async" class="aligncenter size-full wp-image-19451" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png" alt="" width="1111" height="528" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png 1111w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-402x191.png 402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-768x365.png 768w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<p style="text-align: center;"><a href="https://www.proofpoint.com/us/blog/threat-insight/comprehensive-look-emotets-fall-2022-return">Comprehensive look of EMOTET fall 2022</a></p>
<p style="text-align: left;"><strong>Why is this new version of the MaaS particularly tricky?</strong></p>
<p style="text-align: justify;">Emotet 2022 can identify whether it’s downloaded into a sandbox environment, or a device connected to a network. In the first configuration it won’t activate itself, but in the second it will rely <strong>on a password dictionary to spread</strong> thanks to brute-force.  Moreover, the November 2022 Excel files generally enclosed <strong>contains macros which no longer needs a user click to be authorized</strong>. The victim is only asked two things: <strong>copying the files into the Microsoft Office Template zone, which requires administrator privileges</strong>. Opening the file in this location will execute the macros without any warnings.</p>
<p style="text-align: justify;"><strong>How to protect from Emotet 2022?</strong></p>
<p>Since Emotet 2022 uses malicious spam and phishing is the most used technique for initial access, we highly advice you to consider these measures:</p>
<ul>
<li style="text-align: justify;">Provide your company a <strong>solution against phishing</strong>.</li>
<li style="text-align: justify;">Launch an <strong>awareness campaign</strong> for employees and stakeholders.</li>
<li style="text-align: justify;">Provide you company an <strong>Endpoint Detection and Response</strong> which complete the anti-virus by performing <strong>behavioural analysis</strong>, which helps visualize the virus kill chain to identify the action levers.</li>
</ul>
<p style="text-align: justify;">Give a local administrator account to an employee only in case of specific need.</p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">DEBIAN-SPECIFIC REDIS SERVER LUA SANDBOX ESCAPE VULNERABILITY &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0543"><strong>CVE-2022-0543</strong></a></h3>
<p style="text-align: center;">Published by NVD: 18/02/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Redis server for Debian and Debian-derived Linux distributions</p>
<p style="text-align: center;"><strong>Versions: </strong>less and equal to 5:5.0.14-1+deb10u2, 5:6.0.16-1+deb11u2, 5:7.0.5-1, 5:7.0.7-1</p>
<p style="text-align: center;"><strong>Score: </strong><strong>10 CRITICAL</strong></p>
<p style="text-align: center;"><a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><strong>Context</strong></a><strong>  </strong><a href="https://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"><strong>PoC</strong></a></p>
<p style="text-align: justify;"><a href="https://redis.io/">Redis</a> is an opensource NoSQL database management system. Redis includes an <strong>embedded Lua scripting engine</strong>, it allows client to run scripts. By design, the Lua engine must be <strong>sandboxed</strong>: it means that packages and APIs available are limited in an execution context. Redis clients <strong>are not allowed to execute arbitrary code</strong> on the Redis server.</p>
<p style="text-align: justify;">In some <strong>Debian and Debian-derived Linux packages</strong>, the Lua environment is <strong>not sufficiently regulated </strong>because the Lua Library is provided as a dynamic library. It can allow attackers to access arbitrary Lua functionalities and results in a Lua Sandbox escape.</p>
<p style="text-align: justify;">Early December, reports indicate that attackers are exploiting this vulnerability <strong>to deploy a new backdoor malware dubbed Redigo</strong> on Redis Server. The malware communicates with a server of command and control using <strong>port 6379 </strong>which is a legitimate port used by Redis for communication between client and server: the Redis server joins a botnet network.</p>
<p style="text-align: justify;">According to <a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><em>Aqua</em></a>, the malware has some functions specially written to the Redis server which may imply that the group behind this desired <strong>to build an adjusted attack that would target Redis servers</strong>.</p>
<p style="text-align: justify;"><strong>A successful attack implies that attacker could execute arbitrary commands and access to sensitive information.</strong></p>
<p style="text-align: justify;">A group of attackers is behind the Redigo malware which is an emerging threat. Furthermore, the <strong>exploit of the CVE-2022-0543 is public</strong> and is <strong>used in the wild</strong> to deploy the malware. <strong>Vulnerable Redis Server must be patched and up to date</strong>.</p>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
