Government of the Republic of Trinidad and Tobago
gov.tt

Securing the Nation's Digital Infrastructure

TTCSIRT-363.09.25.20: TT-CSIRT ADVISORY – LokiBot Malware

There has been a notable increase in the use of LokiBot malware by malicious cyber actors since July 2020. Throughout this period, CISA’s EINSTEIN Intrusion Detection System has detected persistent malicious LokiBot activity. LokiBot uses a credential- and information-stealing malware, often sent as a malicious attachment and known for being simple, yet effective, making it …

TTCSIRT-362.09.25.20: TT-CSIRT ADVISORY – Cisco Security Updates

Cisco has released security updates to address vulnerabilities in multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. Administrators are encouraged to review and apply the necessary updates.For further information and support, please visit the Cisco security page .

TTCSIRT-361.09.25.20: TT-CSIRT ADVISORY – Apple Security Updates

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. Users and administrators need to review the Apple security pages for the following products and apply the necessary updates: iCloud for Windows 11.4 macOS Catalina 10.15.7, Security Update 2020-005 High …

TTCSIRT-360.09.15.20: TT-CSIRT ADVISORY – Iran-Based Threat Actor Exploits VPN Vulnerabilities

An analysis of threat actor’s indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) indicates a correlation with the group known by the names, Pioneer Kitten and UNC757. This Iran-based threat actor has been observed exploiting several publicly known Common Vulnerabilities and Exposures (CVEs) dealing with Pulse Secure virtual private network (VPN), Citrix NetScaler, …

TTCSIRT-359.09.15.20: TT-CSIRT ADVISORY – Netlogon Remote Protocol Vulnerability

There is a publicly available exploit code for CVE-2020-1472, an elevation of privilege vulnerability in Microsoft’s Netlogon. Although Microsoft provided patches for CVE-2020-1472 in August 2020, unpatched systems will be an attractive target for malicious actors. Attackers could exploit this vulnerability to obtain domain administrator access. For further information and support, please visit the following link:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 …

TTCSIRT-358.09.09.20: TT-CSIRT ADVISORY – Google Releases Security Updates for Chrome

Google has released Chrome version 85.0.4183.102 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. For further information and support, please visit the following link:https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html If you have any queries or comments with regards to this advisory, please feel free to contact TTCSIRT …

TTCSIRT-357.09.09.20: TT-CSIRT ADVISORY – Adobe Releases Security Updates

Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. These updates addresses multiple critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.  For more information and support, please visit the following appropriate link: …

TTCSIRT-356.09.09.20: TT-CSIRT ADVISORY – Microsoft Releases September 2020 Security Updates

Microsoft has released updates to address vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. The security updates released concerns Microsoft Windows, Microsoft Edge (EdgeHTML-based & Chromium-based), Microsoft ChakraCore, Internet Explorer, SQL Server, Microsoft JET Database Engine, Microsoft Office and Microsoft Office Services and Web Apps, …

TTCSIRT-355.09.07.20: TT-CSIRT ADVISORY – WordPress File Manager Plugin Vulnerability

Security researchers have identified a high severity vulnerability in the WordPress File Manager plugin. This vulnerability allows unauthenticated users to execute commands and upload malicious files on a target site. All WordPress versions running the File Manager plug-in before version 6.9 are vulnerable. The File Manager plugin is designed to help WordPress administrators manage files on their sites. …

TTCSIRT-354.09.03.20: TT-CSIRT ADVISORY – Cisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability

A vulnerability in the REST API of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to overwrite certain files that should be restricted on an affected device. The vulnerability is due to insufficient authorization enforcement on an affected system. An attacker could exploit this vulnerability by uploading a file using the REST …