Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 05/23/2023

    KeePass Vulnerability Allows Master Password Recovery

    Overview

    A vulnerability in KeePass password manager has been discovered that allows for the recovery of the master password in clear text. The vulnerability is tracked as CVE-2023-32784 and impacts KeePass versions 2.x for Windows, Linux, and macOS, and is expected to be patched in version 2.54.

    Potential Impact

    Attackers can potentially recover the master password from a memory dump. Note that code execution is not required. However, the vulnerability can be exploited if an attacker has already compromised and has access to the device. Additionally, the password can only be recovered from memory if it is typed and not copied/pasted from the clipboard.

    Recommended Actions

    The patch is likely to be released early next month. Upon release, patches should be applied a timely manner. It is also recommended that endpoints be monitored and protected with Endpoint Detection & Response software for efficient response to anomalous behavior.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

      Oracle Web Logic Vulnerability Being Exploited

      Overview

      The vulnerability tracked as CVE-2017-3506 (CVSS score: 7.4) is exploited by a threat actor group named 8220 Gang. The vulnerability could allow an unauthenticated attacker to execute arbitrary commands remotely. The flaw is discovered and exploited by attackers scanning and identifying vulnerable instances exposed to the Internet.

      Potential Impact

      Successful exploitation could allow for unauthorized access to sensitive data and compromise the entire system. The 8220 Gang has exploited this vulnerability to deploy crypto-mining software and build botnets.

      Recommended Actions

      Ensure updates addressing CVE-2017-3506 have been applied. Additionally, ensure vendor advisories are reviewed for critical vulnerabilities and vulnerability scanning is performed to discover unaddressed vulnerabilities or weak configurations.

      Sources

      https://www.oracle.com/security-alerts/cpuapr2017.html

      https://thehackernews.com/2023/05/8220-gang-exploiting-oracle-weblogic.html

      Apple Patches Zero-Day Vulnerabilities

      Overview

      On May 18, 2023, Apple released updates for iOS and macOS, including three, which, according to several sources, are being actively exploited. Exploiting these vulnerabilities may result in Remote Code Execution (RCE) and reading contents from memory.

      Potential Impact

      The exploitation of these bugs can result in kernel-level RCE. This gives attackers complete control over the compromised machine and can provide attackers with a foothold for full network compromise.

      Recommended Actions

      Patches are available to fix the vulnerability. A workaround is to block or limit connections to Apply these patches immediately, and monitor all systems for potential exploitation.

      Sources

      https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2023-052

      https://www.macworld.com/article/1922377/webkit-security-update-ios-macos.html

      https://support.apple.com/en-us/HT201222

      “Fleeceware” ChatGPT Apps on Apple and Google App Stores

      Overview

      Sophos released a report last week describing several fleeceware apps attempting to capitalize on the current popularity of ChatGPT. These apps incorporate “intrusive advertising” and trick users into subscribing for expensive services.

      Potential Impact

      The impact of installing these apps is likely limited to individual users losing money, but the use of these apps may also result in the loss of personal data.

      Recommended Actions

      Always exercise caution when installing apps.

      Sources

      https://news.sophos.com/en-us/2023/05/17/fleecegpt-mobile-apps-target-ai-curious-to-rake-in-cash/

      APT Group FIN7 Returns

      Overview

      Microsoft researchers have identified the financially motivated cybercriminal group FIN7 engaging in ransomware attacks using Cl0p ransomware. This marks a shift in tactics for FIN7, which previously targeted U.S. firms with ransomware campaigns using BadUSB devices. In recent attacks, the group employed a PowerShell-based in-memory malware dropper called POWERTRASH to deploy the Lizar post-exploitation tool on compromised systems. FIN7 utilizes Impacket and OpenSSH to infiltrate networks and laterally move to deploy Cl0p ransomware.

      The group’s return includes other attacks on PaperCut printing servers with Bl00dy, LockBit, and Clop ransomware. Other threat groups have also been observed leveraging FIN7’s tools, indicating their influence on the cybercrime landscape. Despite some arrests within the group, their increased activities suggest they remain active and resilient. Organizations should be aware of FIN7’s recent activities and tactics, employing threat intelligence sharing platforms to stay informed and enhance their protection.

      Potential Impact

      The resurgence of FIN7 and the adoption of Cl0p ransomware pose significant risks to companies. Potential impacts include:

      • Data encryption and loss: Cl0p ransomware encrypts valuable data, disrupting business operations and potentially leading to data loss if organizations fail to recover encrypted files.
      • Financial loss: Companies may face financial losses due to ransom payments, downtime, recovery efforts, and potential regulatory penalties resulting from a ransomware attack.
      • Reputational damage: Falling victim to a high-profile ransomware attack can tarnish a company’s reputation, erode customer trust, and negatively impact business relationships.
      • Operational disruptions: Ransomware attacks can cause significant disruptions, including system outages, service unavailability, and loss of productivity, leading to potential revenue loss.
      • Regulatory compliance challenges: A ransomware attack may result in non-compliance with data protection and privacy regulations, triggering legal and financial consequences.
      Recommended Actions

      To protect against FIN7 and similar ransomware attacks, organizations should consider the following measures:

      Implement robust cybersecurity measures: Maintain up-to-date security controls, including firewalls, intrusion detection/prevention systems, endpoint protection, and strong access controls. Regularly patch and update software and systems to address vulnerabilities.

      • Conduct employee training and awareness programs: Educate employees about phishing techniques, malicious email attachments, and social engineering tactics. Encourage a culture of security awareness to prevent successful attacks.
      • Backup critical data: Regularly back up important data and verify the integrity of backups. Store backups offline or in a separate, secure environment to mitigate the impact of ransomware encryption.
      • Follow the principle of least privilege: Enforce strong access controls, granting employees the minimum level of privileges required to perform their duties. Limit administrative access to critical systems.
      • Employ network segmentation: Isolate critical systems and data from the rest of the network, making it harder for ransomware to spread laterally.
      • Monitor and detect: Implement robust network and endpoint monitoring solutions to detect malicious activities, anomalous behavior, and signs of compromise. Promptly investigate and respond to any indicators of a potential attack.
      • Develop and test an incident response plan: Establish an incident response plan that outlines procedures for responding to a ransomware attack. Regularly test and update the plan to ensure its effectiveness.
      • Collaborate and share threat intelligence: Engage in information sharing with trusted industry partners, cybersecurity organizations, and government agencies to stay informed about emerging threats and tactics.

      By implementing these recommendations, organizations can enhance their resilience against FIN7 and mitigate the potential impact of ransomware attacks.

      Sources

      https://cyware.com/news/fin7-returns-with-cl0p-ransomware-attacks-a376ce74

      Custom Royal Ransomware Loader

      Overview

      The Russian-speaking Royal ransomware group, which emerged from the Conti group, is developing its own malware loader inspired by other malware samples. The loader aims to deploy the Cobalt Strike beacon and connect to a Royal command-and-control (C2) server. The group leverages strategies other groups use, such as exploiting the CVE-2022-41073 vulnerability for initial access and incorporating functionality from Anubis. Although the analyzed loader is a test version, the group plans to use the final version in spam campaigns, where they have been effective in the past. Organizations are encouraged to report the tactics, techniques, and procedures (TTPs) of this threat to enable preventive measures by other organizations.

      Potential Impact

      Developing a new malware loader by the Royal ransomware group can have severe consequences for companies. If successfully deployed, the loader can infect endpoint devices and download additional malware, potentially leading to ransomware attacks, data breaches, and financial loss. The group’s utilization of effective spam campaigns increases the likelihood of successful attacks and widespread damage to targeted organizations.

      Recommended Actions

      To mitigate the risk posed by the Royal ransomware group and their evolving loader, companies should take the following steps:

      • Keep software and systems up to date: Regularly apply security patches and updates to prevent vulnerabilities, such as the one exploited by the Royal group.
      • Implement multi-layered security measures: Deploy robust endpoint protection solutions, firewalls, and intrusion detection systems to detect and block malicious activities. Consider using behavior-based detection to identify anomalous behavior associated with the loader.
      • Educate employees: Conduct regular security awareness training to educate employees about phishing emails, suspicious attachments, and links. Encourage reporting of any suspicious activity or potential indicators of compromise.
      • Enable strong security practices: Implement multi-factor authentication, strong passwords, and least privilege access control to limit the impact of a potential breach.
      • Establish incident response plans: Develop and regularly test incident response plans to ensure a swift and effective response during an attack. Include measures for isolating infected systems and restoring data from backups.
      • Share threat intelligence: Collaborate with industry peers and security organizations to share information about the Royal ransomware group’s TTPs, enabling others to proactively defend against them.

      By implementing these recommendations, companies can enhance their security posture and minimize the risk of falling victim to the Royal ransomware group’s evolving malware loader.

      Sources

      https://cyware.com/news/royal-gang-builds-its-own-malware-loader-383629ab

      For strategic clients, your vCISO will add this to your next Office Hours for further discussion. However, if you have an immediate need, concern, or question, please reach out to them directly.

      For non-strategic clients, please reach out to your Advisor for further discussion.

      For those not yet clients of GreyCastle Security, please click the “Contact Us” button below and we’ll be glad to provide assistance as well as answer any questions you might have.


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us