Advisory ID: NCC-CSIRT-0702-008
Summary: Gtm Mänôz, a bug-bounty hunter discovered the lack of rate-limiting issue in Meta's Instagram application programming interface (API) endpoints which could have allowed an attacker to bypass two factor authentication (2FA) on Facebook by confirming the targeted user’s already-confirmed Facebook mobile number using the Meta Accounts Center.
Vulnerable Platform(s): Social Media
Read more: Vulnerability on Facebook Allows Two-Factor Authentication Bypass Via Instagram
Advisory ID: NCC-CSIRT-0202-007
Summary: Attackers use OneNote attachments in phishing emails that infect victims with remote access malware. From samples found by BleepingComputer, the malicious emails pretend to be DHL shipping notifications, invoices, ACH remittance forms, mechanical drawings, and shipping documents. Once installed, this type of malware can spread to install further malware, allows threat actors to remotely access a victim’s device to steal files, saved browser passwords, take screenshots, and in some cases, even record video using webcams.
Vulnerable Platform(s): Windows Operating Systems
Read more: Hackers Spread Malware Using Microsoft OneNote Attachments
Advisory ID: NCC-CSIRT-2601-006
Summary: Ken Gannon, a cybersecurity researcher from NCC Group discovered new vulnerabilities in the Galaxy App Store application on Samsung devices that are running Android 12 and below. Successful exploit could allow local attackers to install malicious applications or execute JavaScript code by launching a specific web page. Furthermore, it allows the malicious applications installed on the same Samsung device to automatically install any application available on the Galaxy App Store without the user’s knowledge.
Vulnerable Platform(s): Samsung Android device
Advisory ID: NCC-CSIRT-1901-005
Summary:
Threat actors are using malicious crafted websites for popular free and open-source applications to promote malicious downloads through advertisements in Google search results. Upon a remote attacker's successful exploitation, an information-stealing malware is distributed, giving the attacker access to the victims' cryptocurrency wallets, cookies, Discord tokens, and saved browsers passwords.
Vulnerable Platform(s):
Google Ads
Advisory ID: NCC-CSIRT-1801-004
Summary: Dawid Potocki, a Polish (Poland) security researcher discovered many MSI motherboards to be affected due to changes in the default UEFI secure boot setting. The setting allows any operating system image to run even if it detects security violations. The issue impacts many Intel and AMD-based MSI (Micro-Star International Co., LTD) motherboards that use a recent firmware update version (version 7C02v3C). Moreover, it affects even the brand-new MSI motherboard models.
Vulnerable Platform(s): Operating Systems