Rewterz Threat Advisory – CVE-2019-18189 – Trend Micro Commercial Endpoints Root Login Bypass with Directory Traversal Vulnerability
October 29, 2019Rewterz Threat Advisory – CVE-2019-16675 – ICS: PHOENIX CONTACT Automation Worx Software Suite
October 30, 2019Rewterz Threat Advisory – CVE-2019-18189 – Trend Micro Commercial Endpoints Root Login Bypass with Directory Traversal Vulnerability
October 29, 2019Rewterz Threat Advisory – CVE-2019-16675 – ICS: PHOENIX CONTACT Automation Worx Software Suite
October 30, 2019Severity
High
Analysis Summary
Potential DTRACK dumps the data mined output via manually mapped share over SMB to RFC1918 address with a statically encoded user/pass, containing the hard-coded username and password likely stolen from an Indian nuclear plant operator.
Lazarus has been active in the South Asian region targeting different facilities in India, Pakistan and Bangladesh. This time they’ve hit the nuclear facility in India, a second 1,000 MW nuclear power unit at Kudankulam, owned by the Nuclear Power Corporation of India Ltd. The atomic power plant stopped generation about 12.30 a.m. on Saturday owing to “Steam Generation level low”, the company added.
Impact
Exposure of sensitive information
Indicators of Compromise
SHA256
- c5c1ca4382f397481174914b1931e851a9c61f029e6b3eb8a65c9e92ddf7aa4c
- a0664ac662802905329ec6ab3b3ae843f191e6555b707f305f8f5a0599ca3f68
- 93a01fbbdd63943c151679d037d32b1d82a55d66c6cb93c40ff63f2b770e5ca9
- 791c59a0d6456ac1d9976fe82dc6b13f3e5980c6cfa2fd9d58a3cc849755ea9f
- 4b1948bc4fe200d493a106474f460a744fce2be0c5e33f97fc09aaafb84f6f9a
- 3cc9d9a12f3b884582e5c4daf7d83c4a510172a836de90b87439388e3cde3682
- bfb39f486372a509f307cde3361795a2f9f759cbeb4cac07562dcbaebc070364
Remediation
Block all threat indicators at your respective controls.