28 July 2023

Cyber Security Week in Review: July 28, 2023


Cyber Security Week in Review: July 28, 2023

Zero-day fixes: Zimbra, Apple, Ivanti

Zimbra released security updates to address a recently disclosed zero-day vulnerability abused in attacks targeting Zimbra Collaboration Suite (ZCS) email servers.

The vulnerability is a cross-site scripting (XSS) issue that allows a remote attacker to steal potentially sensitive information, change the appearance of the web page, perform phishing and drive-by-download attacks.

Software company Ivanti issued security updates to patch a zero-day flaw used in the recent attacks on the Norwegian government. The Norwegian authorities revealed that the attackers used the zero-day flaw in the Ivanti Endpoint Manager Mobile (EPMM) software, formerly known as MobileIron Core. Tracked as CVE-2023-35078, the vulnerability is an improper authentication issue, which could be used by a remote hacker to bypass authentication and gain unauthorized access to the application.

Apple has also rolled up security updates for its iOS, macOS and iPadOS platforms to fix at least 25 security issues, including two zero-days.

The first zero-day (CVE-2023-38606) is a new kernel bug exploited in attacks targeting devices running older iOS versions released before iOS 15.7.1. The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges. The flaw is said to be part of a zero-click exploit chain used to infect iPhones with the Triangulation spyware via iMessage exploits.

The second zero-day (CVE-2023-37450) is a remote code execution flaw that stems from a boundary error when processing HTML content in WebKit.

Thousands of Citrix servers are vulnerable to a recent zero-day bug

At least 15,000 Citrix servers are exposed to attacks exploiting a recently disclosed zero-day vulnerability (CVE-2023-3519) affecting Citrix NetScaler ADC and NetScaler Gateway products. Most of the vulnerable servers are located in the United States (5,700), Germany (1,500), the UK (1,000), and Australia (585).

Hundreds of thousands of MikroTik routers are exposed to hacking due to a bug

Hundreds of thousands of MikroTik routers are potentially vulnerable to hacker attacks due to a privilege escalation vulnerability that can be exploited to take over the target device. Tracked as CVE-2023-30799, the issue stems from improperly imposed security restrictions in RouterOS. A remote authenticated user with “admin” privileges can bypass implemented security restrictions and obtain a “super-admin” role.

One of the top 10 Genesis Market users arrested in the Netherlands

Dutch police apprehended a 32-year-old Dutch national, a resident of Brazil, in connection to an investigation into Genesis Market, a dark web marketplace that sold stolen credentials. The authorities didn’t reveal the identity of the suspect but said that he was one of the top Genesis users and robbed “a lot of people” of tens of thousands of euros.

SSNDOB Marketplace admin pleads guilty

A Ukrainian man, Vitalii Chychasov, has pleaded guilty in the US court to conspiracy to commit access device fraud and trafficking in unauthorized access devices relating to his administration of the now-defunct SSNDOB Marketplace, a platform used by cybercriminals to buy stolen personal information.

SSNDOB was dismantled in June 2022 by the US authorities. The SSNDOB Marketplace has listed the personal information of millions of individuals in the US, generating more than $19 million in sales revenue.

Chychasov was arrested in March 2022 in Hungary and extradited to the US in July of the same year. As part of his plea agreement, the man has agreed to forfeit some of the SSNDOB domains, as well as $5 million obtained via illicit activities. He faces a maximum penalty of 15 years in prison.

North Korean Lazarus APT linked to $60 million Alphapo crypto theft

North Korean state-sponsored cybercrime unit has been linked to the recent incident at centralized crypto payment provider Alphapo resulting in the theft of an estimated $60 million in crypto assets from the company’s hot wallets.

Separately, Estonian crypto-payments service provider CoinsPaid disclosed that it had over $37 million stolen in a security incident that took place on July 22. The company blamed Lazarus for the theft.

Russian hackers target diplomatic entities in Eastern Europe with new GraphicalProton backdoor

The Russian nation-state actor known as APT29, Cloaked Ursa, and Midnight Blizzard (formerly Nobelium) and BlueBravo has been observed using a new GraphicalProton malware in cyber-espionage attacks targeting diplomatic entities throughout Eastern Europe.

Recorded Future’s Insikt Group says that GraphicalProton is the latest addition to a long list of malware targeting diplomatic organizations after GraphicalNeutrino (aka Snowyamber), Halfrig, and Quarterrig.

BlueBravo appears to prioritize cyber-espionage efforts against European government sector entities, possibly due to the Russian government's interest in strategic data during and after the war in Ukraine, the researchers noted.

Threat actor UAC-0006 bombards Ukraine with SmokeLoader attacks

Ukraine’s Computer Emergency Response Team (CERT-UA) shared Indicators of Compromise related to a recent wave of SmokeLoader attacks on Ukrainian government entities. The campaign was attributed to a threat actor known as UAC-0006, which CERT-UA characterizes as a financially motivated operation. The defenders said that this was the third SmokeLoader attack in ten days.

The banking sector targeted in novel OSS supply chain attacks

Checkmarx researchers uncovered several open-source software supply chain attacks that targeted the banking sector.

Checkmarx’s report details two such attacks against banks involving malicious libraries on the NPM repository. In the first incident, a threat actor uploaded a package to NPM containing posing as a bank employee. The package contained a preinstall script that installed the Havoc Framework on the victim system.

In a second attack, a threat actor downloaded a malicious library to NPM containing code intended to blend into the website of the victim bank and lay dormant until it was prompted to spring into action. It was designed to latch onto a specific login form element, stealthily intercepting login data and then transmitting it to a remote location.

Nitrogen malvertizing campaign abuses Google and Bing ads to deliver Cobalt Strike

Security researchers came across a new malvertizing campaign dubbed “Nitrogen” that abuses Google and Bing ads to target users seeking certain IT tools to gain access to enterprise environments to deploy second-stage attack tools such as Cobalt Strike.

The primary objective of the Nitrogen malware is to provide threat actors a foothold into corporate networks, facilitating data theft, cyber-espionage, and the deployment of ransomware.

The new malware has been detailed by SophosBitdefendereSentire, and Trend Micro.


Back to the list

Latest Posts

New EagleMsgSpy surveillance tool linked to Chinese authorities

New EagleMsgSpy surveillance tool linked to Chinese authorities

The Android-based tool has been in operation since at least 2017.
12 December 2024
Russian Turla APT exploits other threat actors’ tools to attack Ukraine

Russian Turla APT exploits other threat actors’ tools to attack Ukraine

Secret Blizzard used the Amadey bot malware to deliver its custom backdoor called “KazuarV2” onto specifically selected systems in Ukraine.
12 December 2024
Global police op shuts down major DDoS platforms

Global police op shuts down major DDoS platforms

As part of the effort, three suspected administrators were arrested in France and Germany.
11 December 2024