January(137)  February(207)  March(430) April(317) May(278)  June(237)  July(216)  August(316) September(186) October(24) November(114) December(126)

i

DATE

NAME

INFO

CATEGORY

SUBCATE

31.5.24

GRU’s BlueDelta Targets Key
Networks in Europe
GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns REPORT REPORT

31.5.24

BlueDelta GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns Operation Operation

31.5.24

Doppelganger This page is designed to gather a timeline of the Doppelganger operation with a few elements collected from different reports. Operation Operation

31.5.24

AI and Covert Influence Operations:
Latest Trends
OpenAI is committed to enforcing policies that prevent abuse and to improving transparency around AI-generated content. REPORT AI

31.5.24

UAC-0006 UAC-0006 is a financially motivated threat actor that has been active since at least 2013. They primarily target Ukrainian organizations, particularly accountants, with phishing emails containing the SmokeLoader malware. Their goal is to steal credentials and execute unauthorized fund transfers, posing a significant risk to financial systems. Group Group

31.5.24

CVE-2024-1086 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Vulnerebility

CVE

31.5.24

CVE-2023-38831 RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive.

Vulnerebility

CVE

31.5.24

FlyingYeti Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. Group Group

31.5.24

Malicious activity by LilacSquid threat group A recently disclosed infostealing campaign attributed to the threat group known as LilacSquid has been active since at least 2021. As reported by Cisco Talos, the attackers have been targeting vulnerable public-facing servers and leveraging compromised RDP credentials to deploy a wide range of tools and malware in their attacks. ALERTS GROUP 

31.5.24

Unveiling cryptocurrency mining tactic of the 8220 Gang The 8220 Gang, a widely recognized threat actor based in China and driven by financial motives, has been active since 2017. Specializing in deploying cryptocurrency-mining malware, they primarily target cloud-based environments and Linux servers, exploiting known application vulnerabilities as part of their tactics, techniques, and procedures (TTPs). ALERTS CRYPTOCURRENCY 

31.5.24

SmallTiger malware campaign reported targeting Korean companies A malware campaign distributing SmallTiger malware has been reported targeting Korean companies in the defence, automobile parts, and semiconductor manufacturing sectors. This malware acts as a downloader, connecting to the attackers' C&C server to fetch and execute the final payload in memory. ALERTS CAMPAIGN 

30.5.24

AhMyth AhMyth is malware that spreads through a few different infection vectors and uses various means to collect and exfiltrate sensitive information from infected devices. Malware Android

30.5.24

RedTail RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Malware Cryptocurrency

30.5.24

CVE-2023-6961 (CVSS score: 7.2) - Unauthenticated Stored Cross-Site Scripting in WP Meta SEO <= 4.5.12

Vulnerebility

CVE

30.5.24

CVE-2023-40000 (CVSS score: 8.3) - Unauthenticated Stored Cross-Site Scripting in LiteSpeed Cache <= 5.7

Vulnerebility

CVE

30.5.24

CVE-2024-2194 (CVSS score: 7.2) - Unauthenticated Stored Cross-Site Scripting in WP Statistics <= 14.5

Vulnerebility

CVE

30.5.24

LilacSquid The stealthy trilogy of PurpleInk, InkBox and InkLoader Group Group

30.5.24

BitRAT and Lumma Stealer spread as fake browser updates A new campaign delivering BitRAT and Lumma Stealer malware has been observed in the wild. The malware is spread via fake browser updates. The attack chain is initiated by users visiting compromised websites and triggering malicious Javascript code redirecting them to fake update websites. Further down the chain, malicious PowerShell scripts lead to the retrieval of malware loaders and final payload execution. The attackers can leverage the delivered payloads to gain control over the compromised endpoints, remote command execution, and infostealing purposes. ALERTS Virus

30.5.24

Metamorfo Banking Trojan Metamorfo is a banking Trojan malware (aka Casbaneiro) that is spread through malspam campaigns luring users to click on HTML attachments. The HTML attachment contains malicious code that kicks off processes with the main focus on exfiltrating victims’ financial information including banking credentials. ALERTS Virus

30.5.24

Datebug updating toolkits with Golang to be cross-platform APT group Datebug, in operation since 2013, has been observed updating their toolkit with a new data exfiltration tool written in Golang created with the goal of targeting APAC governments and defense sectors. The group utilizes phishing emails to lure recipients into opening an attached or linked malicious ZIP or ISO file which leads to the data exfiltration tool being installed. ALERTS APT 

30.5.24

NSIS-based packer usage observed in many common malware families The Nullsoft Scriptable Install System (NSIS) is a commonly seen open source software used by cybercriminals for generating malware. This system is used to generate self-extracting custom installers which have been observed delivering many different malware families. In a recent report by Check Point Research, they have provided details on a group of packers using this system. ALERTS Virus

30.5.24

CatDDoS: A rising threat across multiple sectors A rise in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant called CatDDoS has been observed. Multiple threat actors are employing various CatDDoS variants to target organizations across multiple sectors, including cloud vendors, communication providers, scientific and research entities, and educational institutions. The vulnerabilities exploited under CatDDoS affect numerous products and technologies, such as Jenkins servers, Apache ActiveMQ servers, Apache Log4j, Cisco Linksys, and NetGear routers, among others. ALERTS BOTNET 

30.5.24

Mexican Telecom Continuously Impersonated by SpyNote Actor Since at least October 2023, a SpyNote actor has been abusing the brand of a well-known and prominent telecommunications company in Mexico that operates extensively across Latin America and the Caribbean, serving millions of customers in countries such as Argentina, Brazil, Chile, Colombia, and many more. ALERTS Virus

30.5.24

AllaSenha - new AllaKore malware variant AllaSenha is a new banking malware variant from the AllaKore RAT family that has recently been used in distribution campaigns targeted at banking users in Brazil. The multi-staged infection chain leverages malicious .lnk files possibly delivered through phishing, BPyCode launcher binaries and a DLL loader dubbed ExecutorLoader that leads to the final AllaSenha payload. The malware functionality focuses on theft of user credentials associated with Brazil’s most popular banks. The targeted data includes passwords, QR codes and 2FA tokens. The malware abuses Azure Cloud infrastructure for the purpose of C2 communication and data exfiltration. ALERTS Virus

30.5.24

Zonix Ransomware Zonix is a recently discovered ransomware variant from the Xorist malware family. The malware encrypts user files and appends the ".ZoN" extensions to them. Zonix drops a ransom note as a text file called "HOW TO DECRYPT FILES.txt" and also displays a pop-up window on the desktop demanding 1500 USD in bitcoin for the decryption of the locked files. ALERTS RANSOM 

30.5.24

CVE-2024-32640 - SQL Injection vulnerability in Mura/Masa CMS CVE-2024-32640 is a recently disclosed SQL injection vulnerability affecting Mura/Masa CMS, which is an open source enterprise content management system. If successfully exploited the vulnerability might allow unauthorized attackers to access sensitive data. The product vendor has already released a patch to remediate this vulnerability in software versions 7.4.6, 7.3.13 and 7.2.8. ALERTS VULNEREBILITY 

30.5.24

Emergence of a new North Korean threat actor dubbed Moonstone Sleet A recent emergence in the threat landscape involves a new North Korean actor dubbed Moonstone Sleet. This actor has been detected engaging in various deceptive tactics, including the establishment of fake companies and job listings to lure potential targets. Additionally, they have been distributing trojanized versions of legitimate software tools, developing malicious games, and introducing a novel custom ransomware named FakePenny, comprising a loader and an encrypter. Their targets span individuals and organizations across sectors such as software and information technology, education, and defense industrial base. ALERTS APT 

30.5.24

Fraudulent PDF Viewer Login Pages Phishing for User Credentials A phishing campaign was recently observed where a malicious HTML attachment masquerading as a PDF Viewer login page prompts users to verify their password to access a document. Meanwhile, hidden in the background, a malicious JavaScript will attempt to steal the victim's credentials. ALERTS PHISHING 

30.5.24

Agent Tesla: The Uninvited Guest at Indonesia's GEMASTIK 2024 Event Symantec has recently observed a peculiar malspam campaign in Indonesia where the actor is running a sophisticated email scheme impersonating the School of Electrical Engineering and Informatics (STEI) at the Institut Teknologi Bandung (ITB) in Indonesia. ALERTS Virus

30.5.24

Red Akodon threat group recent activities According to recent report published by SCITUM, Red Akodon is a new threat group conducting its malicious activities prevalently in Colombia since at least April 2024. The threat actors have been observed to target various public organizations and other businesses with a variety of commodity malware variants such as Remcos, QuasarRAT, Neshta, XWorm or AsyncRAT. The attack chain often relies on phishing emails coming from compromised accounts. The attackers have been leveraging malicious .svg files either directly attached in malspam or hosted on public file hosting repositories. The attacks conducted by this threat group aim at information exfiltration and gaining control over the compromised endpoints. ALERTS Virus

30.5.24

TXZ file extension: Evolution of malware distribution in email campaigns Threat actors usually send malicious emails with attachments carrying a malicious payload, or they send out containers which include files like archives. In a recent campaign, multiple emails carrying files with the TXZ extension as attachments were observed. Late last year, Microsoft added native support to Windows 11 for the TXZ filetype. This means recipients of the malicious messages would have been able to open the TXZ attachment using Windows File Explorer if they are using the Windows 11 operating system. This shows that TXZ campaigns are actively used in some regionally targeted campaigns and can grow in the future with the adoption of Windows 11 or higher. ALERTS Virus

30.5.24

Gipy malware distributed under the disguise of AI voice generator tools A new malicious campaign spreading infostealing malware dubbed Gipy has been observed in the wild. The malware binaries are masqueraded as an AI voice generator tool and distributed via phishing websites. Some examples of the package names observed for this malware are as follows: VoiceAIbeta-x64.exe, VoiceAIAdvancedPro.exe, VoiceAiPro-x64.exe, VoiceAIChanger.exe, etc. Next to typical infostealing features, the malware has capabilities to download and execute additional arbitrary payloads. Various malware families have been observed among the malware payloads downloaded by Gipy, including: Lumma Stealer, Redline Stealer, DCRat, RadxRAT, RisePro, TrueClient and more. ALERTS Virus

30.5.24

Operation Endgame International law enforcement and partners have joined forces. We have been investigating you and your criminal undertakings for a long time and we will not stop here. BigBrother BigBrother

30.5.24

Detecting Cross-Origin Authentication Credential Stuffing Attacks Okta has determined that the cross-origin authentication feature in Customer Identity Cloud (CIC) is prone to being targeted by threat actors orchestrating credential-stuffing attacks. Incident Incident

30.5.24

PyPI crypto-stealer PyPI crypto-stealer targets Windows users, revives malware campaign Malware Python

29.5.24

CVE-2024-24919 Important Security Update – Stay Protected Against VPN Information Disclosure (CVE-2024-24919)

Vulnerebility

CVE

29.5.24

AllaSenha ALLASENHA: ALLAKORE VARIANT LEVERAGES AZURE CLOUD C2 TO STEAL BANKING DETAILS IN LATIN AMERICA Malware RAT

29.5.24

Moonstone Sleet Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks Group APT

28.5.24

CVE-2024-23109 An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.

Vulnerebility

CVE

28.5.24

CVE-2024-23108 An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.

Vulnerebility

CVE

28.5.24

DNSBOMB: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses DNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses. Papers DNS

28.5.24

DNSBomb DNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses. Hacking DNS

28.5.24

CatDDoS Botnet XLab's CTIA(Cyber Threat Insight Analysis) System continuously tracks and monitors the active mainstream DDoS botnets. Recently, our system has observed that CatDDoS-related gangs remain active and have exploited over 80 vulnerabilities over the last three months. Additionally, the maximum number of targets has been observed to exceed 300+ per day. BOTNET BOTNET

28.5.24

Server Side Credit Card Skimmer Lodged in Obscure Plugin Attackers are always finding new ways to inject malware into websites and new ways to obscure it to avoid detection, but they’re always up to their same old tricks. In this post, we’ll explore how attackers are using a very obscure PHP snippet WordPress plugin to install server-side malware to harvest credit card details from a WooCommerce online store. Hacking Hacking

28.5.24

Remote Command Execution on TP-Link Archer C5400X Before the release of our binary zero-day identification feature, we tested and validated it on our firmware corpus to make sure we were providing meaningful analysis results. In the process, we identified numerous vulnerabilities that we reported to vendors.

Vulnerebility

CVE

28.5.24

CVE-2024-5035 The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890.

Vulnerebility

CVE

28.5.24

Embargo Ransomware Embargo is a new Rust-based ransomware variant identified in the wild. The malware encrypts user files and appends “.564ba1” extension to them. Ransom note is dropped in form of a text file called “HOW_TO_RECOVER_FILES.txt” advising the victims to register on the attackers portal via the provided onion site link. The threat actors behind this malware have been reported to be employing the double extortion technique by not only encrypting confidential data but also by exfiltrating it and threatening the victims with public release. ALERTS RANSOM 

28.5.24

Rising popularity of Arc browser overshadowed by malvertising campaign The Arc browser, developed by The Browser Company, has been gaining a lot of popularity in the market, promising to personalize the way users browse the internet. With its innovative user interface design that sets it apart from traditional browsers, it started receiving even more attention after becoming available for Windows, whereas previously it was only intended for macOS systems. ALERTS CAMPAIGN 

28.5.24

Phishing campaign targeting financial institutions impersonates medical center A phishing campaign targeting European and US financial institutions has been reported. The attacks involve sending emails impersonating a medical center, with SCR files disguised as financial documents to trick victims into downloading and executing them. These files contain code from a Python clone of the Minesweeper game, along with malicious Python code that downloads additional scripts from a remote source. The scripts are then used to extract and run a legitimate remote computer management program called SuperOps RMM which provides unauthorized remote access to victims' computers. ALERTS PHISHING 

28.5.24

Iluria Stealer There have been reports of in-the-wild activity for a run-of-the-mill stealer known as Iluria. Like many other forks and variants of Discord Stealers, it is capable of stealing tokens, browser credentials, and payment information. The malware is currently being advertised, and for now, consumers appear to be the focus via drive-by-download attacks. In addition, multiple tests are also being observed. ALERTS Virus

28.5.24

Rise of Fake AV websites hosting advanced malware Recently, there has been an increase in the number of fake antivirus (AV) websites pretending to be legitimate solutions. These deceptive sites have been found hosting advanced malicious files, such as APKs, EXEs, and Inno Setup installers, which can deliver spyware like the Spynote Trojan and data-stealing malwares such as Lummna and StealC. These malicious programs are adept at harvesting victim information, including browser data, and sending it to remote servers under the control of attackers. ALERTS Virus

28.5.24

CVE-2024-30268: XSS Vulnerability in Cacti CVE-2024-30268 is a reflected cross-site scripting vulnerability in Cacti, a network monitoring and fault management framework. If successfully exploited, this vulnerability allows attackers to obtain the cookies of the administrator and fake their login using the cookies. The vulnerability has been fixed in versions 1.3.x DEV. Symantec's network protection technology, Intrusion Prevention System (IPS), blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. ALERTS VULNEREBILITY 

28.5.24

CVE-2024-21793 and CVE-2024-26026 - two recent vulnerabilities affecting F5 BIG-IP Next Central Manager CVE-2024-21793 and CVE-2024-26026 are two recently identified high severity vulnerabilities affecting the F5 BIG-IP Next Central Manager. Both flaws are code injection vulnerabilities and have been given the CVSS score of 7.5. If successfully exploited they might allow unauthenticated attackers to run malicious SQL statements through the BIG-IP Central Manager API. ALERTS VULNEREBILITY 

28.5.24

CVE-2020-17519: Directory Traversal Vulnerability in Apache Flink The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added a three-year-old directory traversal vulnerability (CVE-2020-17519) in Apache Flink to the Known Exploited Vulnerabilities Catalog. Apache Flink is an open-source batch-processing framework used for distributed processing of streaming data and is widely used in the field of big data. If successfully exploited, this vulnerability allows unauthenticated attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. ALERTS VULNEREBILITY 

28.5.24

Android Bankbot impersonates Uzbekistan banks In recent days, mobile users in Uzbekistan have been targeted by an Android BankBot campaign where actors are disguising their malware as fictitious banking apps (Xalq Banki Credit.apk & Bank Ipak.apk), impersonating two Uzbekistan banks: Xalq Banki and Ipak Yuli. If a user is successfully lured into installing these on their mobile phone, BankBot will monitor for when the user launches any banking apps it is coded to target. It will then leverage the classic overlay technique, overlaying a fake page on top of the legitimate one in order to steal the user's inputs, such as credentials. At this time, the vector of infection remains unknown but it's very likely that these are being spread via malicious SMS messages or redirections.  ALERTS Virus

27.5.24

Storm-0539 Navigating cyberthreats and strengthening defenses in the era of AI Group Group

27.5.24

HTML Smuggling HTML smuggling is an innovative attack technique, which abuses HTML5 and JavaScript features to inject or extract data across network boundaries. Hacking HTML

27.5.24

Transparent Phishing and HTML Smuggling Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling Hacking Phishing

27.5.24

Transparent Tribe Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages Campaign Campaign

25.5.24

Space Pirates

Space Pirates: analyzing the tools and connections of a new hacker group

Group

Group

25.5.24

Path Traversal Vulnerability in Nexus Repository CVE-2024-4956

CVE-2024-4956 is a path traversal vulnerability in Sonatype Nexus Repository 3. Nexus Repository is a widely used artifact repository manager. If successfully exploited, this vulnerability will allows unauthenticated remote attackers to access and download sensitive system files, application source code and configurations. The CVSS score of this vulnerability was 7.5. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system.

ALERTS

VULNEREBILITY 

25.5.24

Operation Diplomatic Specter: A Chinese APT campaign targeting political entities in multiple regions

An ongoing campaign dubbed Operation Diplomatic Specter, targeting political entities in the Middle East, Africa, and Asia, has been reported. A Chinese APT group behind the campaign has been leveraging rare email exfiltration techniques against compromised servers.

ALERTS

APT 

25.5.24

RustDoor malware exploits JAVS Viewer vulnerability in courtroom software

A Windows-based malware named RustDoor has been observed being distributed via a compromised audio-visual recording software package used in courtroom environments. This backdoor enables attackers to gain full control of affected systems and transmit data about the host system to a command-and-control (C2) server. The malware exploits a deserialization vulnerability in JAVS Viewer software, tracked as CVE-2024-4978. JAVS technologies are utilized in courtrooms, jails, prisons, councils, hearings, and lecture halls nationwide, with more than 10,000 installations worldwide.

ALERTS

Virus

25.5.24

CVE-2024-5274

Type Confusion in V8. Reported by Clément Lecigne of Google's Threat Analysis Group and Brendon Tiszka of Chrome Security on 2024-05-20

Vulnerebility

CVE

25.5.24

ShadowSyndicate

No sleep until the Cybercrime Fighters Club is done with finding the answer as to who is behind this new ransomware-as-a-service affiliate.

Group

Group

25.5.24

CVE-2024-4978

CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software Used in Apparent Supply Chain Attack

Vulnerebility

CVE

25.5.24

ShadowPad

BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, which is believed to be a successor to ShadowPad.

Malware

RAT

25.5.24

BloodAlchemy

Malware Transmutation! - Unveiling the Hidden Traces of BloodAlchemy

Malware

RAT

24.5.24

ESXi Ransomware

ESXi Ransomware Attacks: Evolution, Impact, and Defense Strategy

Ransomware

Hacking

24.5.24

CVE-2020-17519

A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.

Vulnerebility

CVE

24.5.24

SHARP DRAGON

SHARP DRAGON EXPANDS TOWARDS AFRICA AND THE CARIBBEAN

Group

APT 

23.5.24

Expanded operations of the Sharp Dragon APT

As reported by Checkpoint, Sharp Dragon APT group (also formerly known as Sharp Panda) has been expanding its operations towards targets in Africa and in the Caribbean. Sharp Dragon is known to use large-scale phishing attacks, malicious RTF files, DLL-loaders but most recently also executable loaders disguises as documents. The threat group has also been reported to leverage CVE-2023-0669 RCE vulnerability affecting Fortra GoAnywhere in their attacks.

ALERTS

APT 

23.5.24

CVE-2024-29895 - Command Injection Vulnerability in Cacti

CVE-2024-29895 is a critical (CVSS score 10) command injection vulnerability affecting Cacti, which is a network monitoring and fault management framework. If successfully exploited the vulnerability may allow unauthenticated remote attackers to execute arbitrary commands on the affected servers through URL manipulation. While the vulnerability has not yet been reported as being exploited in the wild, a Proof of Concept for it is publicly available. The product vendor has already released a patch to remediate this vulnerability.

ALERTS

VULNEREBILITY 

23.5.24

Waltuhium Grabber

Waltuhium is an open-source infostealer that has been observed being shared in dark web forums. It is claimed to have features such as keylogging, screenshot capturing, WiFi stealing, Discord injection, password stealing, credit card stealing, cryptocurrency and wallet stealing, as well as tokens from Discord and browsers, and session stealing. Additionally, it has anti-VM and anti-debug functionality. The stolen data is zipped and posted to a defined Discord webhook server.

ALERTS

HACKING 

23.5.24

GuLoader Impersonates an Italian Seafood Distributor

GuLoader, an advanced downloader, is showing no signs of stopping, and its prevalence continues to increase with more and more campaigns observed around the world. One campaign was recently identified where actors are posing as a known Italian company that specializes in the wholesale and retail distribution of seafood, sourcing and importing its products from various countries. 

ALERTS

Virus

23.5.24

CLOUD#REVERSER campaign leverages cloud storage for malware delivery

A new campaign dubbed CLOUD#REVERSER has been reported to abuse various cloud storage repositories such as Dropbox or Google Drive for malware delivery and C&C purposes. The attackers leverage phishing emails with malicious attachments in the initial attack stages and several VBScript and PowerShell-based payload executions in later stages. The dropped malware has the functionality to exfiltrate user data, execute arbitrary commands and scripts received from the attackers as well as download additional binaries and execute them on the infected endpoints.

ALERTS

CAMPAIGN 

23.5.24

Acrid infostealer leverages “Heaven’s Gate” technique

Acrid is a recently identified C++-based infostealing malware. In its functionality, it is very similar to other infostealer variants present currently in the threat landscape. Its main functionality relies on collecting various user data from the compromised endpoints and exfiltration to the C&C servers controlled by the attackers. Acrid focuses on the theft of data such as browser cookies, passwords stored in browsers, banking information, cryptocurrency wallets, and credentials stored in various applications. Acrid has been reported to leverage a "Heaven’s Gate" technique that effectively enables 64-bit code to be executed within a 32-bit process, potentially allowing the malware to evade security controls monitoring only 32-bit processes.

ALERTS

Virus

23.5.24

CVE-2023-43208 - NextGen Healthcare Mirth Connect RCE vulnerability exploited in the wild

CVE-2023-43208 is a Remote Code Execution (RCE) vulnerability disclosed in October last year. The vulnerability affects NextGen Healthcare Mirth Connect prior to version 4.4.1, which is an open-source data integration suite used by healthcare companies. If exploited the vulnerability may allow unauthenticated remote attackers to execute code on affected systems, leading to the compromise of critical healthcare data. The vulnerability has been reported as being exploited in the wild and has been added to the "Known Exploited Vulnerabilities Catalog" (KEV) by CISA. 

ALERTS

VULNEREBILITY 

23.5.24

GhostEngine malware terminates EDR agents and deploys coin miner

A multimodule malware dubbed GhostEngine has been observed in the wild. This malware leverages vulnerable drivers to terminate and delete known Endpoint Detection and Response (EDR) agents that would likely interfere with the deployed coin miner.

ALERTS

Virus

23.5.24

Diplomatic Specter

Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia

Operation

Operation

23.5.24

CVE-2024-29848

Avalanche 6.4.3.602 - additional security hardening and CVE fixed

Vulnerebility

CVE

23.5.24

Unfading Sea Haze

Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea

Group

Group

23.5.24

GHOSTENGINE

Elastic Security Labs has identified REF4578, an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining.

Operation

Cryptocurrency

23.5.24

MS Exchange Server Flaws

Positive Technologies detects a series of attacks via Microsoft Exchange Server

Attack

Exchange

22.5.24

Smishing: Fake IRS Scare Tactic to Snatch Cryptowallets' 12-Word Recovery Phrases

Symantec has recently observed a malicious SMS campaign in the US targeting mobile users' cryptowallet 12-word recovery phrases. The actors are impersonating the IRS and using a scare tactic related to cryptocurrency holdings declaration. 

ALERTS

PHISHING 

22.5.24

XWorm v5.6 malware

A new v5.6 variant of the XWorm malware has been observed in the wild. The malware is distributed under the disguise of various applications, games or adult content, with the binaries spread through either online sharing repositories or via torrent downloads. XWorm has miscellaneous capabilities including keylogging, data theft, download of additional arbitrary payloads, RAT functionalities and others.

ALERTS

Virus

22.5.24

Malware campaign uses LNK files and MSBuild to likely deliver TinyTurla backdoor

A malware campaign utilizing malicious LNK files has been observed. The threat actors behind the campaign are using human rights seminar invitations and public advisories to lure users. Once lured, MSBuild is used to execute and deliver a fileless final payload. This payload is believed to be the TinyTurla backdoor, based on its first-stage backdoor functionalities and utilization of a specific C2 infrastructure.

ALERTS

Virus

22.5.24

Keyplug backdoor distributed against organizations in Italy

A new campaign attributed to the Grayfly threat group (aka APT41) has been distributing the Keyplug modular malware to various organizations in Italy. As reported by Yoroi, this C++based malware comes in variants supporting both Windows and Linux platforms. Keyplug has the capabilities to initiate the C2 communication with attacker servers either via abuse of CloudFlare's CDN (Content Delivery Network) and via the WSS protocol.

ALERTS

Virus

22.5.24

CVE-2024-29852

(CVSS score: 2.7), which allows a privileged user to read backup session logs

Vulnerebility

CVE

22.5.24

CVE-2024-29851

(CVSS score: 7.2), which allows a privileged user to steal NTLM hashes of a Veeam Backup Enterprise Manager service account if it's not configured to run as the default Local System account

Vulnerebility

CVE

22.5.24

CVE-2024-29850

(CVSS score: 8.8), which allows account takeover via NTLM relay

Vulnerebility

CVE

22.5.24

CVE-2024-29849

(CVSS score: 9.8), the vulnerability could allow an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface as any user.

Vulnerebility

CVE

22.5.24

CVE-2024-27130

A set of buffer overflow vulnerabilities that could allow authenticated users to execute arbitrary code via a network

Vulnerebility

CVE

22.5.24

CVE-2024-27129

A set of buffer overflow vulnerabilities that could allow authenticated users to execute arbitrary code via a network

Vulnerebility

CVE

22.5.24

CVE-2024-27128

A set of buffer overflow vulnerabilities that could allow authenticated users to execute arbitrary code via a network

Vulnerebility

CVE

22.5.24

CVE-2024-27127

A double free vulnerability that could allow authenticated users to execute arbitrary code via a network

Vulnerebility

CVE

22.5.24

CVE-2024-21902

An incorrect permission assignment for critical resource vulnerability that could allow authenticated users to read or modify the resource via a network

Vulnerebility

CVE

22.5.24

SolarMarker

Analysis and Detection of CLOUD#REVERSER: An Attack Involving Threat Actors Compromising Systems Using A Sophisticated Cloud-Based Malware

Malware

InfoStealer

22.5.24

CVE-2024-4985

An authentication bypass vulnerability was present in the GitHub Enterprise Server (GHES) when utilizing SAML single sign-on authentication with the optional encrypted assertions feature.

Vulnerebility

CVE

22.5.24

CVE-2024-34359

llama-cpp-python is the Python bindings for llama.cpp. `llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models.

Vulnerebility

CVE

21.5.24

CVE-2023-43208

NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679.

Vulnerebility

CVE

21.5.24

CVE-2024-4323

A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.

Vulnerebility

CVE

21.5.24

Deuterbear RAT targets Asia-Pacific in advanced cyber espionage campaign

A cyber espionage campaign has been reported targeting the Asia-Pacific region, involving the deployment of a remote access trojan (RAT) called Deuterbear. The RAT exhibits advanced capabilities, such as anti-analysis techniques, avoiding handshakes during RAT operation, anti-memory scanning, and using HTTPS for command-and-control (C&C) communication. The Deuterbear infection chain involves two stages: the first stage functions as a plugin downloader, while the second stage acts as a backdoor, harvesting sensitive information from the compromised host.

ALERTS

Virus

21.5.24

SamsStealer malware

Reports have emerged of a new infostealer, dubbed SamsStealer, circulating in the threat landscape. This malware covertly infiltrates victims' systems, exfiltrating various forms of personal data, including login credentials, cryptocurrency wallets, session data, and browsing history. The stolen data is transmitted to file-sharing services and messaging platforms like Telegram, which are used as command-and-control (C2) servers by the attackers.

ALERTS

Virus

21.5.24

Bank Mellat Users in Various Countries Targeted by FakeBank Campaign

Symantec has observed an Android FakeBank campaign targeting mobile users of a private Iranian bank known as Mellat, by posing as a fictitious banking app (Mellat.apk). Bank Mellat, also known as "Bank of the Nation", has a number of offices and branches both domestically within Iran and internationally. 

ALERTS

CAMPAIGN 

21.5.24

Vultur Malware Poses as Antivirus

Recently, a Vultur campaign has been observed in which the actor is disguising it as a known antivirus mobile application (<company name>_Security.apk). This Android banking malware leverages the overlay technique, displaying fake overlay windows in the hope of tricking users into entering their banking credentials. It targets hundreds of banks and cryptocurrency exchange platforms.

ALERTS

Virus

21.5.24

HiJackLoader gets new modules to lay low

HijackLoader is a multi-stage loader that has recently seen some updates. The first stage allows the loader decrypt and decompress additional modules and execute a second stage while the second stage process lives in memory to read an embedded or remotely hosted image in order to fully initiate the second stage and load additional modules. Some of the newly discovered modules, like User Account Control bypass, are design to allow for additional persistence in the target environment.

ALERTS

Virus

21.5.24

Antidot mobile malware

Antidot is a recently discovered banking trojan for Android. The malware is distributed under the disguise of a Google Play update app. Functionality-wise Antidot is capable of keylogging, overlay attacks, SMS exfiltration, screen captures, credentials theft, device control and execution of commands received from the attackers. Malware has the capability to establish http connections or WebSocket communication to the C2 servers.

ALERTS

Virus

21.5.24

Chaos Ransomware Lures Gamers with Fake Free Discord Nitro

As the Chaos Ransomware builder is widely available to the public, instances are observed on a daily basis around the world with both consumers and enterprises being targeted. Recently, one actor has been luring consumers, more specifically gamers, with a Chaos Ransomware disguised as a fake free Discord Nitro. Within the ransom note, the actor is hoping to extort compromised users of 0.003 BTC, which is the equivalent of 195 USD at the time of writing.

ALERTS

RANSOM 

21.5.24

Synapse Ransomware

Synapse is a ransomware written in C that can encrypt local files, files on removable drives, and files stored on network shares, with the capability of propagating to other systems on a network. Encrypted files will have the extension .Synapse added to them. Additionally, a ransom note named [random_string].README.txt is dropped. The ransomware has the capability to collect system information and encryption statistics, and exfiltrate the data to its remote C2 server. Victims are provided with a URL (hosted on the Tor network) as a means of contact.

ALERTS

RANSOM 

21.5.24

Storm-1811 threat actor conducts Vishing attack via Quick Assist tool

Threat actor Storm-1811 has been reported carrying out a vishing (voice phishing) attack using the client management tool Quick Assist. Quick Assist is an application that enables a user to share their system with another person over a remote connection to resolve issues. Once the user grants full control, the threat actor executes scripts that lead to the download of batch files with the aim of deploying Black Basta ransomware as the final payload throughout the network.

ALERTS

GROUP 

21.5.24

Springtail threat group uses new Linux backdoor in attacks

In a newly released report, Symantec’s Threat Hunter Team sheds light on a recently discovered Linux backdoor developed by the North-Korean Springtail espionage group (aka Kimsuky). This group is linked to malware used in a recent campaign against organizations in South Korea. The campaign leveraged Trojanized software installation packages to deliver the backdoor.

ALERTS

APT 

21.5.24

No-Justice

No-Justice Wiper - Wiper attack on Albania by Iranian APT)

Malware

Wipper

21.5.24

Cl Wiper

Iranian State Actors Conduct Cyber Operations Against the Government of Albania

Malware

Wipper

21.5.24

Void Manticore

BAD KARMA, NO JUSTICE: VOID MANTICORE DESTRUCTIVE ACTIVITIES IN ISRAEL

Group

Group

21.5.24

GitCaught

GitCaught: Threat Actor Leverages GitHub Repository for Malicious Infrastructure

Group

Group

20.5.24

LATRODECTUS

The LATRODECTUS loader evolves to deliver ICEDID and other malware

Malware

Loader

20.5.24

Grandoreiro

Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns

Malware

Banking

19.5.24

htmlLawed 1.2.5 - Remote Code Execution (RCE)

PHP

Exploit

WebApps

19.5.24

PopojiCMS 2.0.1 - Remote Command Execution (RCE)

PHP

Exploit

WebApps

19.5.24

Backdrop CMS 1.27.1 - Remote Command Execution (RCE)

PHP

Exploit

WebApps

19.5.24

Apache OFBiz 18.12.12 - Directory Traversal

Java

Exploit

WebApps

19.5.24

Wordpress Theme XStore 9.3.8 - SQLi

PHP

Exploit

WebApps

19.5.24

Rocket LMS 1.9 - Persistent Cross Site Scripting (XSS)

PHP

Exploit

WebApps

19.5.24

Prison Management System - SQL Injection Authentication Bypass

PHP

Exploit

WebApps

19.5.24

PyroCMS v3.0.1 - Stored XSS

PHP

Exploit

WebApps

19.5.24

CE Phoenix Version 1.0.8.20 - Stored XSS

PHP

Exploit

WebApps

19.5.24

Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS)

PHP

Exploit

WebApps

19.5.24

Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS)

PHP

Exploit

WebApps

19.5.24

CrushFTP < 11.1.0 - Directory Traversal

Multiple

Exploit

Remote

19.5.24

Plantronics Hub 3.25.1 - Arbitrary File Read

Windows

Exploit

Local

19.5.24

Apache mod_proxy_cluster - Stored XSS

PHP

Exploit

WebApps

19.5.24

iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)

Multiple

Exploit

WebApps

19.5.24

Clinic Queuing System 1.0 - RCE

PHP

Exploit

WebApps

19.5.24

QakBot attacks with Windows zero-day (CVE-2024-30051)

In April 2024, while researching CVE-2023-36033, we discovered another zero-day elevation-of-privilege vulnerability, which was assigned CVE-2024-30051 identifier and patched on May, 14 as part of Microsoft’s patch Tuesday.

ANALÝZA

Vulnerebility

19.5.24

Incident response analyst report 2023

As an information security company, our services include incident response and investigation, and malware analysis. Our customer base spans Russia, Europe, Asia, South and North America, Africa and the Middle East.

ANALÝZA

Incident

18.5.24

CVE-2024-22267

(CVSS score: 9.3) - A use-after-free vulnerability in the Bluetooth device that could be exploited by a malicious actor with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host

Vulnerebility

CVE

18.5.24

CVE-2024-22268

(CVSS score: 7.1) - A heap buffer-overflow vulnerability in the Shader functionality that could be exploited by a malicious actor with non-administrative access to a virtual machine with 3D graphics enabled to create a DoS condition

Vulnerebility

CVE

18.5.24

CVE-2024-22269

(CVSS score: 7.1) - An information disclosure vulnerability in the Bluetooth device that could be exploited by a malicious actor with local administrative privileges on a virtual machine to read privileged information contained in hypervisor memory from a virtual machine

Vulnerebility

CVE

18.5.24

CVE-2024-22270

(CVSS score: 7.1) - An information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality that could be exploited by a malicious actor with local administrative privileges on a virtual machine to read privileged information contained in hypervisor memory from a virtual machine

Vulnerebility

CVE

18.5.24

Kinsing Demystified

Kinsing Demystified A Comprehensive Technical Guide

REPORT

Group

18.5.24

Kinsing

Kinsing Demystified A Comprehensive Technical Guide

Group

Hacking

18.5.24

SugarGh0st RAT

Artificial Sweetener: SugarGh0st RAT Used to Target American Artificial Intelligence Experts

Malware

RAT

18.5.24

Earth Hundun's

Tracking the Progression of Earth Hundun's Cyberespionage Campaign in 2024

Campaign

CyberSpy

18.5.24

Springtail

More than one legitimate software package was modified to deliver malware in North Korean group’s recent campaign against South Korean organizations.

Malware

Backdoor

17.5.24

CVE-2014-100005

A cross-site request forgery (CSRF) vulnerability impacting D-Link DIR-600 routers that allows an attacker to change router configurations by hijacking an existing administrator session

Vulnerebility

CVE

17.5.24

CVE-2021-40655

An information disclosure vulnerability impacting D-Link DIR-605 routers that allows attackers to obtain a username and password by forging an HTTP POST request to the /getcfg.php page

Vulnerebility

CVE

17.5.24

SSID Confusion Attack

This vulnerability exploits a design flaw in the WiFi standard, allowing attackers to trick WiFi clients on any operating system into connecting to a untrusted network.

Attack

WIFI

17.5.24

Kimsuky

Kimsuky APT attack discovered using Facebook & MS management console

APT

APT

16.5.24

Storm-1811

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Group

Group

16.5.24

CVE-2024-4947

Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Vulnerebility

CVE

16.5.24

LunarMail

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

Malware

APT

16.5.24

LunarWeb 

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

Malware

APT

16.5.24

Ebury is alive but unseen

400k Linux servers compromised for cryptocurrency theft and financial gain

REPORT

REPORT

16.5.24

Ebury

Ebury botnet alive & growing; 400k Linux servers compromised for cryptocurrency theft and financial gain

BOTNET

Cryptocurrency

16.5.24

Operation Windigo

The vivisection of a large Linux server-side credential stealing malware campaign

Operation

 

16.5.24

New malware Cuttlefish

A new malware dubbed Cuttlefish was reported to infect small office/home office and enterprise grade routers with the intent to monitor passing data traffic and discreetly exfiltrating only authentication related information such as usernames, passwords, and tokens etc. It also has the capability of introducing more payloads.

ALERTS

Virus

16.5.24

Remcos RAT expands functionality with PrivateLoader module

Remcos RAT, a remote access Trojan, enables unauthorized remote control and surveillance of compromised systems. Recently, Remcos RAT was observed leveraging a PrivateLoader module to augment its functionality and persistence on the victim's machine. By employing VB scripts,registry modification, and establishing services to restart the malware at varying intervals, this malware can thoroughly infiltrate a system, evade detection, and report statistics to its C2 server.

ALERTS

Virus

16.5.24

Malicious Minecraft mod harvests data from Windows system

Many gamers prefer to enhance their gaming experience with custom mods, such as those offering the Windows Borderless feature. This feature enables multitasking and seamless switching between applications, facilitating tasks like game recording.

ALERTS

Virus

16.5.24

Atomic Stealer (AMOS) among the malware variants spread in the GitCaught operation

A recent malicious campaign dubbed GitCaught has been reported to spread multiple infostealing payloads targeted at various platforms including macOS. The distributed malware variants include Atomic Stealer (AMOS), Vidar Stealer, Lumma and Octo banking trojan. The attackers have been leveraging fake profiles and repositories hosted on Github that offer software binaries masqueraded as various popular applications. Threat actors behind this campaign have also been utilizing web-based infrastructure including Filezilla FTP servers for malware delivery.

ALERTS

Virus

16.5.24

PureCrypter malware used in Mallox ransomware distribution campaign

PureCrypter loader has been used in a recent malicious campaign leading up to the delivery of Mallox ransomware payloads. The attackers have been reported to employ brute-force attacks against vulnerable or otherwise mis-configured MS-SQL servers in the initial attacks stages. PureCrypter is a piece of Malware-as-a-Service (MaaS) offering and potentially leveraged by various affiliates. The delivered payloads might also exfiltrate the user data before encryption, as the Mallox ransomware operators have been known to employ double extortion techniques in the past attacks.

ALERTS

Virus

16.5.24

Malicious Word Document Dropping DanaBot Malware

A recent Danabot malspam campaign was observed being delivered via a Word document containing a malicious external link which if clicked will launch a series of events where additional executable files will get downloaded including a command prompt, and a PowerShell. This process eventually leads to the dropping of payloads such as iu4t4.exe (Danabot) and rundll32.exe, which are responsible for collecting sensitive user and system information.

ALERTS

Virus

15.5.24

Phorpiex botnet distributes LockBit Black Ransomware via email campaign

A high-volume email campaign facilitated by the Phorpiex botnet, delivering LockBit Black ransomware, has been reported. Phorpiex functions as a Malware-as-a-Service platform and has amassed a significant customer base among threat actors over more than a decade of operation. Since 2018, Phorpiex has been involved in activities such as data exfiltration and ransomware distribution. Despite attempts to disrupt its operations over the years, the botnet continues to persist.

ALERTS

BOTNET 

15.5.24

Dracula (Samurai) Stealer

Dracula (also known as Samurai Stealer) is an infostealing malware variant attributed to the threat group known as the Amnesia Team (aka Cerberus). This threat actor is known for using various other infostealer variants including Aurora, Lumma, Redline and Rhadamanthys, among others. Dracula Stealer is leveraged by the attackers to exfiltrate a wide range of confidential information from victim machines including credentials, banking information and others. 

ALERTS

Virus

15.5.24

WaveStealer: New malware distributed on messaging platforms

WaveStealer, a newly emerged sophisticated malware tool, is being distributed on platforms like Telegram and Discord for purchase at a low cost. This malware is disguised as video game installers and designed to extract various types of sensitive data from compromised systems. It targets web browsers, cryptocurrency wallets, credit card numbers, as well as data associated with messaging platforms like Telegram and Discord. Additionally, WaveStealer has the capability to capture screenshots, enhancing its data exfiltration capabilities.

ALERTS

Virus

15.5.24

FIN7 malware campaign exploiting Google Ads

A malware campaign exploiting Google Ads, attributed to the threat actor FIN7, has been reported in the wild. The attackers utilized deceptive websites masquerading as well-known brands like AnyDesk, WinSCP, BlackRock, Asana, Concur, and Google Meet. Visitors to these sites, often directed through sponsored Google Ads, encountered fake pop-ups urging them to download what seemed to be a browser extension. However, the downloaded payload was actually an MSIX file, a packaging format for Windows apps, which delivered NetSupport RAT and DiceLoader for subsequent stages in the infection chain.

ALERTS

Virus

15.5.24

Beast Ransomware and Vidar Infostealer delivered via disguised documents

Documents like copyright violation warnings and resumes were leveraged in a recent campaign to deliver ransomware and infostealer. Initial infection initiates from a phishing email with an external malicious link that if clicked will download a compressed file. Upon decompression, two executable files will be dropped and these are identified as Beast Ransomware and Vidar Infostealer.

ALERTS

RANSOM 

15.5.24

GCash Users Targeted in Latest Smishing Scam

Mobile wallets have transformed the financial landscape by providing convenience and accessibility, but they also present lucrative targets for cybercriminals as Symantec continues to observe a flurry of smishing around the world. 

ALERTS

SPAM 

15.5.24

Trinity Ransomware

According to a recent research published by Cyble, Trinity is a newly identified ransomware variant believed to be an updated version of the “2023Lock” ransomware. The malware encrypts user files and appends “.trinitylock” extension to them. Trinity ransomware has also been reported to share some code base with yet another ransomware variant known as Venus. The threat actors behind Trinity are employing the double extortion techniques by also exfiltrating confidential files and threatening to publicly release them. 

ALERTS

RANSOM 

15.5.24

Malspam campaign delivers ASyncRAT by way of multiple scripts

In a recently observed campaign, multiple scripts were used to deliver the ASyncRAT payload. Initiated by an HTML email attachment, victims would be compromised by various non-PE files to deliver and establish persistence of ASyncRAT. The attack downloads a Windows Script File (WSF) that in turn launches a VBS file that's responsible for further execution. Latter parts of the attack are carried out by JS, PowerShell, and batch script components.

ALERTS

Virus

15.5.24

Black Basta ransomware attacks target the healthcare sector

Symantec Security Response is aware of the recent joint alert from CISA, the FBI, Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) regarding a number of targeted activities observed for the Black Basta ransomware. This malware variant is known since at least 2022 and has been leveraged in a number of campaigns targeted at critical infrastructure including the Healthcare and Public Health (HPH) sector. Black Basta is ransomware-as-a-service (RaaS) variant mostly distributed via phishing or exploitation of disclosed vulnerabilities. The attackers behind this malware often employ the double extortion model by not only encrypting user files but also by exfiltrating them and threatening with public release of the stolen data.

ALERTS

RANSOM 

15.5.24

A Mining Trojan called Hidden Shovel

Researchers uncovered a new mining trojan dubbed "Hidden Shovel", discovered through network security monitoring. This Trojan was initially spotted back in November 2023 and has been undergoing multiple upgrades, currently at version 3.0. Hidden Shovel's key features are strong concealment, anti-analysis measures, DLL hijacking backdoor and shellcode injection capabilities. 

ALERTS

Virus

15.5.24

Ongoing

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Campaign

Social

15.5.24

CVE-2024-4761

High CVE-2024-4761: Out of bounds write in V8. Reported by Anonymous on 2024-05-09

Vulnerebility

CVE

15.5.24

CVE-2024-31459

(CVSS score: N/A) - A file inclusion issue in the "lib/plugin.php" file that could be combined with SQL injection vulnerabilities to result in remote code execution

Vulnerebility

CVE

15.5.24

CVE-2024-31445

(CVSS score: 8.8) - An SQL injection vulnerability in api_automation.php that allows authenticated users to perform privilege escalation and remote code execution

Vulnerebility

CVE

15.5.24

CVE-2024-29895

(CVSS score: 10.0) - A command injection vulnerability allows any unauthenticated user to execute arbitrary command on the server when the "register_argc_argv" option of PHP is On

Vulnerebility

CVE

15.5.24

CVE-2024-25641

(CVSS score: 9.1) - An arbitrary file write vulnerability in the "Package Import" feature that allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server, resulting in remote code execution

Vulnerebility

CVE

15.5.24

CVE-2024-30040

(CVSS score: 8.8) - Windows MSHTML Platform Security Feature Bypass Vulnerability

Vulnerebility

CVE

15.5.24

CVE-2024-30051

(CVSS score: 7.8) - Windows Desktop Window Manager (DWM) Core Library Elevation of Privilege Vulnerability

Vulnerebility

CVE

14.5.24

CVE-2023-47610

(CVSS score: 8.1) - A buffer overflow vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.

Vulnerebility

CVE

14.5.24

CVE-2023-47611

(CVSS score: 7.8) - An improper privilege management vulnerability that could allow a local, low-privileged attacker to elevate privileges to manufacturer level on the targeted system.

Vulnerebility

CVE

14.5.24

CVE-2023-47612

(CVSS score: 6.8) - A files or directories accessible to external parties vulnerability that could allow an attacker with physical access to the target system to obtain read/write access to any files and directories on the targeted system, including hidden files and directories.

Vulnerebility

CVE

14.5.24

CVE-2023-47613

(CVSS score: 4.4) - A relative path traversal vulnerability that could allow a local, low-privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system.

Vulnerebility

CVE

14.5.24

CVE-2023-47614

(CVSS score: 3.3) - An exposure of sensitive information vulnerability that could allow a local, low-privileged attacker to disclose hidden virtual paths and file names on the targeted system.

Vulnerebility

CVE

14.5.24

CVE-2023-47615

(CVSS score: 3.3) - An exposure of sensitive information through environmental variables vulnerability that could allow a local, low-privileged attacker to obtain unauthorized access to the targeted system.

Vulnerebility

CVE

14.5.24

CVE-2023-47616

(CVSS score: 2.4) - An exposure of sensitive information vulnerability that could allow an attacker with physical access to the target system to get access to sensitive data on the targeted system.

Vulnerebility

CVE

12.5.24

CVE-2024-24506 - LimeSurvey Community Edition XSS vulnerability

CVE-2024-24506 is a recently disclosed Cross Site Scripting (XSS) vulnerability affecting LimeSurvey Community Edition version 5.3.32. The bug is caused by improper validation of user-supplied input of the Administrator email address field. If successfully exploited, the vulnerability might allow the remote attackers to insert and execute arbitrary code via the Administrator email address parameter.

ALERTS

VULNEREBILITY 

12.5.24

CVE-2024-1313 - BOLA vulnerability in Grafana

CVE-2024-1313 is a recently disclosed Broken Object-Level Authorization (BOLA) vulnerability affecting Grafana, which is a open-source data visualization web application. Successfull exploitation of this vulnerability might potentially lead to unauthorized access and data leak from the vulnerable dashboards. The unprivileged attackers might be allowed to bypass authorization and also delete Grafana dashboard snapshots. Grafana vendor has already released a patch to address this vulnerability.

ALERTS

VULNEREBILITY 

11.5.24

zEus

zEus Stealer Distributed via Crafted Minecraft Source Pack

Malware

Stealer

11.5.24

#StopRansomware: Black Basta

Black Basta affiliates use common initial access techniques—such as phishing and exploiting known vulnerabilities—and then employ a double-extortion model, both encrypting systems and exfiltrating data.

CERT

REPORT

11.5.24

StopRansomware: Black Basta

Black Basta affiliates use common initial access techniques—such as phishing and exploiting known vulnerabilities—and then employ a double-extortion model, both encrypting systems and exfiltrating data.

Ransomware

Ransomware

11.5.24

FIN7

FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX Payloads

APT

APT

11.5.24

2024-05-09 - GootLoader activity

Zip files are password-protected. Of note, this site has a new password scheme. For the password, see the "about" page of this website.

Malware traffic

Malware traffic

10.5.24

Exploitation of Ivanti Pulse Secure vulnerabilities for Mirai botnet delivery

In January of this year, Ivanti reported two vulnerabilities, CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Command Injection), affecting Ivanti Connect Secure and Ivanti Policy Secure Gateways.

ALERTS

Exploit 

10.5.24

Malware campaign targeting Windows and MS Office users via software cracks

A malware campaign distributing RATs and coinminers via cracks for popular software, specifically targeting users of Windows and MS Office software, has been observed. The malware, once installed, often registers commands in the task scheduler to maintain persistence, enabling continuous installation of new malware even after removal.

ALERTS

Virus

10.5.24

Coper Actors Abuse LiveChat CDN in Ongoing Fake Chrome Tactic

Symantec continues to observe daily instances of Coper malware disguised as a fake Chrome Android application. This tactic is not new having been in use for some time now. The attack chain's initial step remains uncertain, but recently observed Coper samples have been hosted on a content delivery network (CDN) used by LiveChat, a customer service platform.

ALERTS

Virus

10.5.24

Malspam campaign: Password protected archive hosted on GitHub leads to AsyncRAT

Over the past two weeks, Symantec has observed an actor leveraging a peculiar attack chain to distribute highly obfuscated payload onto compromised systems. The attacks start with malicious emails containing a malicious PDF, DOCX, or SVG file (REMITIRA A TRAVES DEL SERVICIO POSTAL AUTORIZADO.docx, Radicado juridico 23156484.svg, and 99-DEMANDA .docx).

ALERTS

CAMPAIGN 

10.5.24

Russian bulletproof hosting services exploited for malicious activities, SocGholish malware campaigns

The use of Russian bulletproof hosting services for hosting malicious activities, including command-and-control (C2) servers and phishing pages distributing SocGholish malware, has been reported. Multiple malware campaigns in recent months have utilized the Matanbuchus loader, with their C2 infrastructure hosted on bulletproof hosting services like "Proton66 OOO".

ALERTS

Exploit

10.5.24

Malicious Minecraft Mods: zEus stealer targets gamers

A malware campaign targeting Minecraft players has been reported, where custom packages promising to enhance the game's appearance are actually distributing the zEus stealer. This infostealer is designed to evade detection while stealing sensitive data and dropping additional payloads, typically in the form of a batch file, to establish communication with a command-and-control (C2) server for further instructions. This malware is capable of capturing screenshots and exfiltrating data to a webhook server controlled by the threat actor.

ALERTS

Virus

10.5.24

ServerIP Attack

Tricking the VPN client into using the wrong server IP

Attack

VPN

10.5.24

LocalNet Attack

On Windows, Linux, macOS and Android we are not vulnerable to the LocalNet attack. We never leak traffic to public IPs outside the VPN tunnel. However, on iOS we are affected by this attack vector.

Attack

VPN

10.5.24

CVE-2024-4671

CVE-2024-4671: Use after free in Visuals. Reported by Anonymous on 2024-05-07

Vulnerebility

CVE

10.5.24

Coper

Coper is a descendant of ExoBotCompat, which was a rewritten version of Exobot.

Malware

Android

10.5.24

CVE-2021-3129

Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.

Vulnerebility

CVE

10.5.24

LLMjacking

LLMjacking: Stolen Cloud Credentials Used in New AI Attack

Attack

Cloud

10.5.24

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tabl

Virtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users’ security and privacy, and are used in professional and personal settings to defend against malicious actors, circumvent censorship, remotely work from home, etc. It is therefore essential that VPNs are secure.

Papers

Papers

10.5.24

Tunnelcrack

TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel.

Hacking

VPN

10.5.24

TunnelVision

A local network VPN leaking technique that affects all routing-based VPNs

Hacking

VPN

10.5.24

CVE-2024-3661

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface.

Vulnerebility

CVE

10.5.24

APT28

APT28 campaign targeting Polish government institutions

Campaign

APT

9.5.24

DHCP Starvation Attack

In DHCP starvation attacks, an attacker floods the DHCP server with DHCP requests to consume all available IP addresses that the DHCP server can allocate. After these IP addresses are allocated, the server cannot allocate any more addresses and this situation leads to a Denial of Service (DoS) attack as new clients cannot gain network access.

Attack

DHCP

9.5.24

CVE-2024-3661

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface.

Vulnerebility

CVE

9.5.24

CVE-2024-21887

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Vulnerebility

CVE

9.5.24

CVE-2023-46805

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

Vulnerebility

CVE

9.5.24

CVE-2024-21793

(CVSS score: 7.5) - An OData injection vulnerability that could allow an unauthenticated attacker to execute malicious SQL statements through the BIG-IP NEXT Central Manager API

Vulnerebility

CVE

9.5.24

CVE-2024-26026

(CVSS score: 7.5) - An SQL injection vulnerability that could allow an unauthenticated attacker to execute malicious SQL statements through the BIG-IP Next Central Manager API

Vulnerebility

CVE

9.5.24

Malicious Minecraft Mods: zEus stealer targets gamers

A malware campaign targeting Minecraft players has been reported, where custom packages promising to enhance the game's appearance are actually distributing the zEus stealer. This infostealer is designed to evade detection while stealing sensitive data and dropping additional payloads, typically in the form of a batch file, to establish communication with a command-and-control (C2) server for further instructions. This malware is capable of capturing screenshots and exfiltrating data to a webhook server controlled by the threat actor.

ALERTS

Virus

9.5.24

Continuous Distribution of RokRAT Malware

APT37 (ScarCruft) continues to distribute RokRAT malware via LNK files particularly targeting South Korean users. The malware, disguised within a genuine document will execute PowerShell commands after activation. Subsequently, these commands will execute additional files, enabling attackers to gather user information and transmit that data back to their C2 servers.

ALERTS

Virus

9.5.24

Gadfly buzzes inboxes with new phishing campaign

Symantec has recently observed an uptick in phishing campaigns being delivered out of Gadfly (aka TA577). This campaign entices users to open the attached PDF, named with a Latin word, containing a link utilizing typo squatted subdomains for Microsoft login services, with the end goal being credential theft for later use.

ALERTS

CAMPAIGN 

9.5.24

Hunt Ransomware - another Dharma/Crysis variant

Hunt is another Dharma/Crysis ransomware variant discovered recently in the wild. The malware encrypts user files and appends .hunt extension to them alongside of a unique victim ID and the threat actor email address. The dropped ransom note in form of a text file asks the victims to contact the attackers via the provided email address for further instructions on how to restore the locked files.

ALERTS

RANSOM 

9.5.24

CVE-2024-27956 - WP-Automatic Plugin SQL Injection vulnerability exploited in the wild

CVE-2024-27956 is a recently disclosed critical (CVSS score 9.8) SQL injection (SQLi) vulnerability in WP-Automatic plugin prior to version 3.92.1. Successfully exploitation of this vulnerability might allow the attackers to run arbitrary SQL queries, create new admin accounts or upload malicious files onto the compromise servers. This vulnerability has been reported as being actively exploited in the wild.

ALERTS

VULNEREBILITY 

9.5.24

Shinra Ransomware

Shinra, a recently discovered ransomware variant from the Proton malware family, encrypts files and appends the ".SHINRA3" extension while renaming file names to random strings. A ransom note is dropped as a text file called "#SHINRA-Recovery.txt" containing contact details, typically the attacker's email address. 

ALERTS

RANSOM 

9.5.24

CVE-2024-2389 - Command Injection vulnerability affecting Progress Flowmon

CVE-2024-2389, a recently disclosed critical vulnerability with a CVSS score of 10, affects Progress Flowmon, a widely used network performance monitoring tool. If successfully exploited, the bug allows unauthenticated attackers to access the Flowmon web interface via crafted API requests. This compromise can lead further to arbitrary code execution on vulnerable systems. The proof-of-concept for this vulnerability has been released publicly and the vendor has already issued a patched version of the application.

ALERTS

VULNEREBILITY 

9.5.24

Increase of Lockbit ransomware attacks

Earlier in February this year the Lockbit ransomware family was targeted in a coordinated disruption operation called "Operation Cronos" that saw multiple members of this ransomware gang arrested, assets taken and a decryption tool released publicly. Despite those efforts Lockbit still remains active in the threat landscape and we recently observed a spike in detections related to this ransomware variant. Symantec's Advanced Machine Learning technology played a crucial role in blocking this attack by detecting the malicious emails at the beginning of the attack chain.

ALERTS

RANSOM 

8.5.24

HijackLoader

HijackLoader (a.k.a. IDAT Loader) is a malware loader initially spotted in 2023 that is capable of using a variety of modules for code injection and execution.

Malware

Loader

8.5.24

CVE-2023-40000

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Stored XSS.This issue affects LiteSpeed Cache: from n/a through 5.7.

Vulnerebility

CVE

8.5.24

Pathfinder

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

Papers

CPU

8.5.24

Pathfinder

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

Attack

CPU

8.5.24

BMC software fails to validate IPMI session.

The Intelligent Platform Management Interface (IPMI) implementations in multiple manufacturer's Baseboard Management Controller (BMC) software are vulnerable to IPMI session hijacking.

Alert

Alert

8.5.24

R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rdx files

A vulnerability in the R language that allows for arbitrary code to be executed directly after the deserialization of untrusted data has been discovered.

Alert

Alert

7.5.24

APT42

Uncharmed: Untangling Iran's APT42 Operations

APT

APT

7.5.24

CVE-2024-4040 - CrushFTP vulnerability exploited in the wild

CVE-2024-1852 is a recently disclosed injection vulnerability affecting CrushFTP versions before 10.7.1 and 11.1.0. Successful exploitation of this vulnerability could allow unauthenticated remote attackers to perform VFS Sandbox escape, bypass authentication, gain administrative privileges and potentially execute arbitrary remote code on the vulnerable servers. The vulnerability has been reported as being exploited in the wild and the vendor has already released patched version of the application.

ALERTS

VULNEREBILITY 

7.5.24

Counterfeit Revenue Agency page distributing VBlogger malware

A malware campaign involving a counterfeit Revenue Agency webpage hosted on an Italian domain has been reported. Upon accessing the site, users unwittingly download an archive containing a malware downloader, which in turn fetches the final payload via FTP to Altervista. The malware, dubbed "vblogger," is developed in VB6 and possesses keylogging and clipboard capture functionalities. The harvested information is stored in a text file and then sent to the command-and-control server (C2) on Altervista.

ALERTS

Virus

7.5.24

Cuckoo: A new macOS malware targeting music ripping applications

A new macOS malware dubbed Cuckoo has been reported. This malware is distributed through websites that offer applications for ripping music from streaming services. Cuckoo boasts extensive functionality, including the collection of browser-stored information such as passwords, cookies, and other credentials. Additionally, it gathers system information and data related to installed cryptocurrency wallets and extensions.

ALERTS

Virus

7.5.24

Android malware used in targeted attack against Indian defense forces

A socially engineered delivery through WhatsApp was leveraged to reportedly target Indian defense forces with a new Android malware by presenting itself as a defense-related application. Upon successful delivery, the application would install itself under the guise of a Contacts application. Upon execution, the app would request permissions for SMS, Contacts, Storage, and Telephone and subsequently remove itself from view.

ALERTS

Virus

7.5.24

MetaStealer

Post-infection traffic triggers signatures for Win32/MetaStealer Related Activity from the EmergingThreats Pro (ETPRO) ruleset.

Malware

Stealer

7.5.24

BASICSTAR

CharmingCypress: Innovating Persistence

Malware

VBS

7.5.24

WIREFIRE

Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion

Malware

Python

7.5.24

CVE-2024–21887

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Vulnerebility

CVE

7.5.24

CVE-2023–46805

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

Vulnerebility

CVE

6.5.24

TALOS-2023-1889

A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.

Vulnerebility

CVE

6.5.24

CVE-2023-49606

A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.

Vulnerebility

CVE

6.5.24

Cuckoo

Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware

Malware

Apple

5.5.24

Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure

Hardware

Exploit

WebApps

5.5.24

Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass

Hardware

Exploit

WebApps

5.5.24

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Device Config Disclosure

PHP

Exploit

WebApps

5.5.24

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass

Hardware

Exploit

WebApps

5.5.24

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Device Config Disclosure

Hardware

Exploit

WebApps

5.5.24

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass

Hardware

Exploit

WebApps

4.5.24

Managed Detection and Response in 2023

The report covers the tactics, techniques and tools most commonly deployed by threat actors, the nature of incidents detected and their distribution among MDR customers.

ANALÝZA

ANALÝZA

3.5.24

NiceCurl and TameCat custom backdoors leveraged by Damselfly APT

NiceCurl and TameCat are two custom backdoor variants recently leveraged in malicious campaigns attributed to the Damselfly APT (also known as APT42). These backdoors are reported to be delivered mostly by spear-phishing campaigns and used by the threat actors for the purpose of initial access to the targeted environments. While NiceCurl is a VBScript-based malware with capabilities to download and execute additional modules, TameCat backdoor is used to execute PowerShell and C# scripts as well as download additional arbitrary content.

ALERTS

APT 

3.5.24

TesseractStealer malware leverages OCR engine for information extraction

TesseractStealer is an infostealer recently distributed by variants of the ViperSoftX malware. This malware leverages Tesseract (an open source OCR engine) in an effort to extract text from user image files. The malware focuses on specific data related to credentials and cryptocurrency wallet information. Next to TesseractStealer, some of the recent ViperSoftX runs have also been observed to drop another payload from the QuasarRAT malware family.

ALERTS

Virus

3.5.24

A recent Darkgate malspam campaign

The infection chain for this campaign initiates from an email file with an HTML attachment. This HTML file uses a background image that resembles what looks like a blank Microsoft Document file, where instructions on how to fix the offline viewing of the file can be seen. This is an attempt to trick victims into pasting malicious PowerShell code into a Windows Terminal. Once the code is executed, an HTA file will be downloaded and will continue to execute, eventually downloading a follow-up ZIP file. Once extracted, it will launch an open-source automation engine called AutoIt to execute a malicious AutoIt script named script.a3x that will eventually load the Darkgate trojan.

ALERTS

CAMPAIGN 

3.5.24

Latest macOS Adload variant focuses on detection evasion

A recent report by SentinelOne outlines changes observed to a recent macOS malware Adload. The most recent variants of this malware family come with capabilities allowing it to evade the latest Apple XProtect signatures. Adload malware has been present in the macOS landscape for several years now, known to be distributed via drive-by-downloads and often used in attempts to hijack browser search results, inject ads into webpages or deliver various payloads to the victims.

ALERTS

Virus

3.5.24

Old dogs teaching new tricks to ZLoader

ZLoader, a modular trojan, has implemented anti-analysis capabilities that appear to be lifted from the ZeuS source code. This 'new' ability allows ZLoader to block installation on machines other than where the initial infection occurred, stopping further stages from deploying, in the hopes of hindering in depth analysis.

ALERTS

Virus

3.5.24

Goldoon botnet

According to a recent report from FortiGuard Labs, a new botnet variant dubbed Goldoon has been observed in the wild. This malware targets the exploitation of an old D-Link vulnerability from 2015 - CVE-2015-2051 for its propagation. Goldoon can establish persistence on the affected device and execute commands received from C2 servers. The attackers might use this malware variant to gain control over the infected devices, collect system information as well as perform various forms of distributed denial-of-service (DDoS) attacks.

ALERTS

BOTNET 

3.5.24

BirdyClient malware leverages Microsoft Graph API for C&C communication

An increasing number of threats have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services. The technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware called BirdyClient used the Graph API to leverage Microsoft OneDrive for C&C purposes.

ALERTS

Virus

3.5.24

DarkGate loader continues to be actively distributed

DarkGate loader malware has been a very actively distributed within the last year. Numerous email campaigns have leveraged various attack chains to deliver the DarkGate payload. Emails have been observed containing direct download links while others may use attachments (PDF, ZIP, etc) to initiate the delivery.

ALERTS

 

3.5.24

Dwphon mobile malware

Dwphon is a recently identified malware variant targeting the Android platform. The malware has the functionality to collect information about the infected device, the info about applications installed on the device as well as some confidential personal information. Dwphon might consist of several distinct modules, each with its own functions and C2 instructions.  

ALERTS

Virus

3.5.24

SpyNote using Central Bank of Kazakhstan as a lure

No countries or financial institutions are exempt from having their brands abused to lure mobile users into installing Android malware—a trend that continues to grow. Symantec has recently observed an actor actively targeting users in Kazakhstan with the SpyNote RAT. 

ALERTS

Virus

3.5.24

GuLoader campaign targeting industries in Russian-speaking countries

An actor has been observed running two email campaigns with different social engineering tactics that lead to Guloader. Both campaigns target industries in Russian-speaking countries such as Russia, Belarus, Kyrgyzstan, and Kazakhstan.

ALERTS

CAMPAIGN 

3.5.24

The Shape of Money Laundering: Subgraph Representation
Learning on the Blockchain with the Elliptic2 Dataset

Subgraph representation learning is a technique for analyzing local structures (or shapes) within complex networks. Enabled by recent developments in scalable Graph Neural Networks (GNNs), this approach encodes relational information at a subgroup level (multiple connected nodes) rather than at a node level of abstraction.

Papers

Papers

3.5.24

Cuttlefish

The Black Lotus Labs team at Lumen Technologies is tracking a malware platform we’ve named Cuttlefish, that targets networking equipment, specifically enterprise-grade small office/home office (SOHO) routers.

Malware

Trojan

3.5.24

Wpeeper

Playing Possum: What's the Wpeeper Backdoor Up To?

Malware

Backdoor

3.5.24

Goldoon

New “Goldoon” Botnet Targeting D-Link Devices

BOTNET

BOTNET

3.5.24

Graph

Graph: Growing number of threats leveraging Microsoft API

Malware

 

3.5.24

North Korean Actors Exploit Weak DMARC

North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts

CERT

CERT

3.5.24

CVE-2024-33512

(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the Local User Authentication Database Accessed via the PAPI Protocol

Vulnerebility

CVE

3.5.24

CVE-2024-33511

(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the Automatic Reporting Service Accessed via the PAPI Protocol

Vulnerebility

CVE

3.5.24

CVE-2024-26305

(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the Utility Daemon Accessed via the PAPI Protocol

Vulnerebility

CVE

3.5.24

CVE-2024-26304

(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via the PAPI Protocol

Vulnerebility

CVE

3.5.24

Dirty stream

“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps

Vulnerebility

Vulnerebility

1.5.24

Zloader

Zloader Learns Old Tricks

Malware

Trojan