Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 08/23/2023

    UPDATE: Microsoft .NET Vulnerability Being Actively Exploited

    Overview

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added a vulnerability in Citrix ShareFile storage zones controller to the Known Exploited Vulnerabilities catalog. The vulnerability is tracked as CVE-2023-24489 (CVSS score: 9.8) and is described as improper access control of how cryptographic operations are handled.

    Potential Impact

    The vulnerability can potentially be exploited from a remote, unauthenticated perspective to compromise instances by uploading arbitrary files and executing code. Exploitation attempts first spiked toward the end of July. There isn’t a particular threat actor group known to target this vulnerability, but expect this to be in the sights of ransomware actors.

    Recommended Actions

    The vulnerability affects all currently supported versions of customer-managed ShareFile storage zones controller before version 5.11.24. A patch was available prior to knowing about the exploitation occurring, but organizations should ensure the patch has been installed. Regular vulnerability scans should be performed to ensure patches and weak configurations are addressed promptly.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

       

      WinRAR Vulnerability Could Result in Code Execution

      Overview

      A high-severity vulnerability in WinRAR has been disclosed and is tracked as CVE-2023-40477 (CVSS score: 7.8). The vulnerability is described as improper validation of user-supplied data that could result in buffer overflow.

      Potential Impact

      CVE-2023-40477 can be leveraged to execute in the context of the current process. Note that successful exploitation will require user interaction, such as clicking a malicious link or opening a malicious file. There is currently no evidence that exploitation is currently happening in the wild.

      Recommended Actions

      This vulnerability is addressed in WinRAR 6.23 that was released on August 2, 2023. It is also recommended that organizations review workflows for how third-party application updates are addressed. This is typically done most efficiently using third-party patching tools/frameworks that allow for centralized management. Additionally, regular vulnerability scanning is recommended to ensure patches are addressed in a timely manner.

      Sources

      https://thehackernews.com/2023/08/new-winrar-vulnerability-could-allow.html

      https://www.zerodayinitiative.com/advisories/ZDI-23-115

      QR Codes Observed in Large Phishing Campaign

      Overview

      Cofense published a blog post on August 16, 2023 describing research into phishing campaigns utilizing QR codes for credential phishing. The research found that these attacks were usually targeted, with the majority aimed at the US energy sector, but it also describes campaigns against a “wide array of industries.”

      Potential Impact

      The QR codes involved in these campaigns were aimed at gathering Microsoft 365 credentials. Stolen credentials are often used to perpetrate fraud or can be used as an initial foothold in a victim’s environment, leading to network compromise and ransomware deployment.

      Recommended Actions

      Incorporate this knowledge into user awareness training. Ensure that users know that scanning a QR code is approximately the same as clicking a link. Users should regard both links and QR codes with suspicion before clicking or scanning. Find out what protection is available through your organization’s spam filtering services to detect malicious QR codes.

      Sources

      https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/

      Attacks Using Legitimate Internet Services

      Overview

      Research recently published by Recorded Future’s Insikt group highlights the usage of Legitimate Internet Services (LIS) such as GoogleDrive, Github, and Telegram for malware deployment. Of the 400 malware families studied by Insikt, 25% of them involved LIS abuse. Abuse of LIS by threat actors makes their activity challenging to detect and prevent. The publication mentions that “The lack of comparable reporting makes it challenging to quantify a definitive trend,” but it is likely that LIS abuse will become increasingly common.

      Potential Impact

      The potential impact of malware deployment includes network compromise, data exfiltration, and ransomware deployment.

      Recommended Actions

      As the publication suggests, defenders should “flag or block legitimate internet services that are not (typically) used within their environment.” IT service management methodologies and cybersecurity frameworks recommend that organizations keep an inventory of hardware and software assets. In today’s environment, this asset inventory should include internet-based services.

      Sources

      https://www.recordedfuture.com/threat-actors-leverage-internet-services-to-enhance-data-theft-and-weaken-security-defenses

      How can we help?

      If you need assistance with any of the Threats identified today or any other cybersecurity concerns, compliance issues or questions, please reach out through the contact button below.  We stand ready to assist!


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us