News

11.10.2017 10:57
News

Under the heading "Trustful cooperation", Joachim Gutmann summarizes the tasks and activities of CERT@VDE in the current issue of the BSI magazine.

Under the heading "Trustful cooperation", Joachim Gutmann summarizes the tasks and activities of CERT@VDE in the current issue of the BSI magazine.

show more show less
29.08.2017 11:46
Warning

"A list of IP addresses including access data of IoT devices with activated remote access was floating around on the Internet." - heise.de

An unknown person has published a list of 8233 IP addresses along with valid usernames and passwords for IoT devices such as routers on Pastebin, warns security researcher Ankit Anubhav.

The list is said to have been online and regularly updated since June. Since there have been reports about this list, the number of hits is said to have risen from 700 to over 13,000.

"A list of IP addresses including access data of IoT devices with activated remote access was floating around on the Internet." - heise.de

An unknown person has published a list of 8233 IP addresses …

show more show less
10.07.2017 16:24
Warning

Warning to "M.E.Doc" users

The BSI warns all companies that have used the accounting software "M.E.Doc" in recent months.
According to the BSI, the threat situation revealed by the NotPetya outbreak is greater than previously assumed. The update function of the Ukrainian accounting software "M.E.Doc" has allegedly been used to spread malware since mid-April 2017.

The BSI therefore warns that companies that have used this software may have been infected with spyware unnoticed, even if they were not directly affected by the NotPetya outbreak. According to analyses by IT security researchers, variants of the malware distributed via the update function make it possible to spy on data in the affected company networks.

In addition to urgently installing the patch MS17-010, the BSI therefore recommends a number of other measures. Among other things, computers on which "M.E.Doc" was used or which can be accessed from such computers should be checked for possible infections. Infected computers should be reinstalled and all passwords used should be changed. Backups created after April 13 should also be considered potentially compromised. If in doubt, external specialists should be called in, according to the BSI.

The BSI asks affected companies to report this at meldestelle@bsi.bund.de.

The BSI warns all companies that have used the accounting software "M.E.Doc" in recent months.
According to the BSI, the threat situation revealed by the NotPetya outbreak is greater than previously a…

show more show less
29.06.2017 11:09
Warning

Malware "NotPetya"

The Trojan, which spread rapidly on Tuesday, is similar to the "Petya" Trojan that appeared in 2016. However, security researchers classify it as a new Trojan and therefore usually refer to it as "NotPetya". Although the Trojan initially gave the impression of being ransomware like "WannaCry", the aim is clearly not to extort a ransom from those affected. >The attackers are not even able to decrypt the data again</a. The suspicion has therefore now been confirmed that the main aim of "NotPetya" is to paralyze companies and cause as much damage as possible.

Among other things, it spreads via the vulnerability in the SMB protocol that was already used by "WannaCry". However, other distribution channels have been added. After infecting the first system in a network, the Trojan looks for a domain controller as its next target. There it collects a list of systems in the network, which it then specifically infects. In doing so, it also uses admin passwords that it has previously tried to capture on the domain controller.

A mechanism has now been found for the currently observed version of "NotPetya" that can prevent infection. The Trojan checks whether certain files exist and aborts execution if they do. Creating these files as a precautionary measure, at least on the domain controllers and all particularly vulnerable systems, could therefore protect companies from damage. This filecan be used for this purpose.

Of course, a new variant that no longer reacts to the presence of these files can be put into circulation at any time, which is why this should not remain the only measure. In any case, IT managers should also check whether all security updates from Microsoft have been installed on all domain controllers and whether appropriate measures have been taken to harden them.

The Trojan, which spread rapidly on Tuesday, is similar to the "Petya" Trojan that appeared in 2016. However, security researchers classify it as a new Trojan and therefore usually refer to it as "No…

show more show less
23.05.2017 10:00
Video

The report "Wir hacken Deutschland" was shown on ARD on 22.05.2017 at 22:45.

ARD describes the content as follows: "The "Internet of Things" is making its way into our four walls - with intelligent coffee machines, smart light bulbs and surveillance systems to boot. The film makes it clear how we are becoming increasingly vulnerable to networked systems."

For all those who missed this successful contribution yesterday, it is available in the ARD media library until 22.05.2018.

The report "Wir hacken Deutschland" was shown on ARD on 22.05.2017 at 22:45.

ARD describes the content as follows: "The "Internet of Things" is making its way into our four walls - with intelligent co…

show more show less
15.05.2017 10:31
Warning

Ransomware "WannaCry"

Seit Freitag wird über weltweite IT-Sicherheitsvorfälle mit hoher Schadenswirkung berichtet, die durch die Ransomware "WannaCry" ausgelöst werden. German companies are also affected. Infection can occur via an email with a compressed file attachment. Antivirus filters on mail servers usually do not filter out the malware. Once a system in a network is infected, the malware uses a vulnerability in Microsoft Windows to spread further in the network without the user having to do anything.

By chance, a way was found to contain the spread of the malware for the time being by registering a domain that functions as a kind of "killswitch". To benefit from this, it is essential that the domain iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is accessible and that traffic to it is not filtered by a proxy or virus protection software.

However, new variants have already been spotted in which this "killswitch" has no effect. Therefore, the most important countermeasure is to install the Microsoft security update MS-17-010 on all devices with a Windows operating system as soon as possible. Microsoft hat auch Updates für ältere Versionen von Windows veröffentlicht, inklusive Windows XP.

The BSI has summarized general information and recommendations for action to protect against ransomware in a dossier that can be downloaded from the BSI-Webseite. The BSI provides businesses and public authorities with information and recommendations for action via the established channels CERT-Bund , UP KRITIS and Allianz für Cyber-Sicherheit.

Update 2017-05-18

The US-CERT has a Fact Sheet zu WannaCry published.

Seit Freitag wird über weltweite IT-Sicherheitsvorfälle mit hoher Schadenswirkung berichtet, die durch die Ransomware "WannaCry" ausgelöst werden. German companies are also affected. Infection can oc…

show more show less
03.05.2017 12:59
Workshops

Presentations from the workshop

Download available

During the CERT@VDE workshop at the Hannover Messe 2017, we were asked by visitors whether we could make the presentations available online. We are happy to comply with this request and are publishing the presentations here as PDF files:

Download available

During the CERT@VDE workshop at the Hannover Messe 2017, we were asked by visitors whether we could make the presentations available online. We are happy to comply with this request…

show more show less
23.04.2017 13:00
News

Website online

The CERT@VDE website is online as of today

Following the VDE press conference at the Hannover Messe 2017 this morning, this website was released to the public. We are delighted that the work of the last few weeks is now bearing fruit.

We will probably make a few more changes to this first public version over the next few days. Feedback on the content and design of the website is welcome.

The CERT@VDE website is online as of today

Following the VDE press conference at the Hannover Messe 2017 this morning, this website was released to the public. We are delighted that the work of the la…

show more show less