{"id":6773,"date":"2017-02-24T11:00:32","date_gmt":"2017-02-24T19:00:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/24\/news-564\/"},"modified":"2017-02-24T11:00:32","modified_gmt":"2017-02-24T19:00:32","slug":"news-564","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/24\/news-564\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of February 20, 2017"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 24 Feb 2017 18:45:55 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>I\u2019ve been fascinated with the rise and fall of exploit kits, especially the ones that are really popular that disappear seemingly overnight. Angler was one that at one point, contributed 59.5% in the total exploit kit activity for 2015. But now it\u2019s presumed dead as of June 2016 after the arrest of a hacker gang. After Angler, there was a big move to Neutrino, but even Neutrino activity is down to a trickle. A lot of factors can contribute to the demise of an exploit kit \u2013 the authors may get caught, or competition from other exploit kits.<\/p>\n<p>Earlier this month, we <a href=\"http:\/\/blog.trendmicro.com\/achieving-real-time-threat-prevention-tippingpoint-machine-learning\/\">announced<\/a> our machine learning capabilities using our TippingPoint solutions. We collect statistical information about web pages and other protocols and make decisions based on models we\u2019ve created using machine learning to determine what is good and what is bad. This can be applied to our Digital Vaccine\u00ae (DV) filters to block exploit kits, obfuscated content (e.g. JavaScript, HTML), polymorphic malware, and other malicious content. In this week\u2019s ThreatDV package, we have added a new filter that uses our machine learning intelligence to protect against the Rig\/Sundown exploit kits, which have gained in popularity after the fall of Angler and Neutrino.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26901: HTTP: Obfuscated HTML Usage in Exploit Kits (Rig\/Sundown)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Zero Day Initiative Filters Settings Adjustment<\/strong><\/p>\n<p>Starting with this week\u2019s Digital Vaccine\u00ae (DV) package, all newly added pre-disclosed Zero Day Initiative (ZDI) filters which would typically be configured to Block \/ Notify as a Recommended Setting will instead be set to Block \/ Notify \/ Trace. This is done in an effort to ensure network traces are always available for customers who wish to contact TippingPoint in the event of a ZDI pre-disclosed filter firing. In addition, over the next few weeks, all ZDI pre-disclosed filters shipped in previous DV packages that match these criteria will be modified to add the trace setting as well. This change will not impact any filter which has been manually overridden. Customers can contact the TippingPoint Technical Assistance Center (TAC) for additional information.<\/p>\n<p><strong>Adobe Updates<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine (DV) package includes coverage for the Adobe Security Bulletins released on or before February 21, 2017. The following table maps Digital Vaccine filters to the Adobe Security Bulletins. Filters designated with an asterisk (*) shipped prior to this week\u2019s package, providing zero-day protection for our customers:<\/p>\n<div class=\"lightTable\">\n<table width=\"936\">\n<tbody>\n<tr>\n<td width=\"140\"><strong>Bulletin #<\/strong><\/td>\n<td width=\"186\"><strong>CVE #<\/strong><\/td>\n<td width=\"222\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"374\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2982<\/td>\n<td width=\"222\">27144<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2984<\/td>\n<td width=\"222\">27145<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2985<\/td>\n<td width=\"222\">27146<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2986<\/td>\n<td width=\"222\">27154<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2987<\/td>\n<td width=\"222\">&#8211;<\/td>\n<td width=\"374\">Insufficient Vendor Information<\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2988<\/td>\n<td width=\"222\">27147<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2990<\/td>\n<td width=\"222\">27153<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2992<\/td>\n<td width=\"222\">27213<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2991<\/td>\n<td width=\"222\">27155<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2993<\/td>\n<td width=\"222\">27148<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2994<\/td>\n<td width=\"222\">27149<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2995<\/td>\n<td width=\"222\">27150<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-04<\/td>\n<td width=\"186\">CVE-2017-2996<\/td>\n<td width=\"222\">27151<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 10 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website.<\/p>\n<p><strong><em>Adobe (5)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27149: HTTP: Adobe Flash removeEventListener Use-After-Free Vulnerability (ZDI-17-110)<\/li>\n<li>27150: HTTP: Adobe Flash MessageChannel Type Confusion Vulnerability (ZDI-17-109)<\/li>\n<li>27158: ZDI-CAN-4334: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>27159: ZDI-CAN-4335: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>27160: ZDI-CAN-4336: Zero Day Initiative Vulnerability (Adobe Reader DC)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Apple (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27157: ZDI-CAN-4329: Zero Day Initiative Vulnerability (Apple Mac OS)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Delta (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27215: ZDI-CAN-4045: Zero Day Initiative Vulnerability (Delta Industrial Automation PMSoft)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Hewlett Packard Enterprise (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26815: HTTP: HPE Operations Orchestration Backwards Compatibility Deserialization Vulnerability(ZDI-17-001)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>SpiderControl (2)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>27216: ZDI-CAN-4174: Zero Day Initiative Vulnerability (SpiderControl SCADA)<\/li>\n<li>27217: ZDI-CAN-4194: Zero Day Initiative Vulnerability (SpiderControl SCADA)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-february-13-2017\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-february-20-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 24 Feb 2017 18:45:55 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/04\/TP-WeeklyBlog-300x205-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>I\u2019ve been fascinated with the rise and fall of exploit kits, especially the ones that are really popular that disappear seemingly overnight. Angler was one that at one point, contributed 59.5% in the total exploit kit activity for 2015. But now it\u2019s presumed dead as of June 2016 after the arrest of a hacker gang&#8230;.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-6773","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6773"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6773\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6773"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}