Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 09/13/2023

    Active Exploitation of ManageEngine Vulnerability

    Overview

    The Cybersecurity and Infrastructure Security Agency (CISA) recently published an advisory regarding the exploitation of CVE-2022-47966, a remote code execution vulnerability that affects multiple on-premises Zoho ManageEngine products. Note that evidence of exploitation in the wild was first observed in January 2023.

    Potential Impact

    Exploitation has been observed to gain unauthorized access to public-facing applications affected by the vulnerability. Persistence is established, and lateral movement through the internal network will likely occur post-exploitation. In some cases, attackers must obtain specific SAML configuration values for exploitation, but it is unknown how easily this information can be obtained.

    Recommended Actions

    Ensure available patches are applied and risky or unnecessary services are not exposed to the Internet. Such items can be discovered through regular vulnerability scanning. Organizations should also ensure endpoints, especially those in DMZ networks, are protected and monitored via an Endpoint Detection & Response platform.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

       

      Cisco VPN Zero-Day Vulnerability Exploited

      Overview

      Cisco is warning customers of the exploitation of CVE-2023-20269, a zero-day vulnerability that affects Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD). The exposure relates the VPN service and could allow an unauthorized attacker to perform brute-force attacks against accounts.

      Potential Impact

      Exploitation leads to attackers being able to establish a clientless VPN session. Ransomware groups have reportedly targeted this flaw. Post-exploitation activity will likely include lateral movement and persistence, such as the creation of unknown accounts, malicious PowerShell activity, or the use of remote access software such as AnyDesk.

      Recommended Actions

      There is currently no fix available, but there are mitigation steps available. In addition to the layer of security multifactor authentication provides against brute-force attacks, mitigate risk with the following:

      • Use DAP (Dynamic Access Policies) to stop VPN tunnels with DefaultADMINGroup or DefaultL2LGroup.
      • Deny access with Default Group Policy by adjusting vpn-simultaneous-logins for DfltGrpPolicy to 0 and ensuring that all VPN session profiles point to a custom policy.
      • Implement LOCAL user database restrictions by locking specific users to a single profile with the ‘group-lock’ option, and prevent VPN setups by setting ‘vpn-simultaneous-logins’ to 0.

      Sources

      https://www.bleepingcomputer.com/news/security/cisco-warns-of-vpn-zero-day-exploited-by-ransomware-gangs/?&web_view=true

      https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC#fs

      Apple Patches Zero-Day After Pegasus Spyware Delivery

      Overview

      On September 7, 2023, Citizen Lab published a report on a “Zero-Click, Zero-Day Exploit” they refer to as “BLASTPASS”. The exploit was used to deploy Pegasus spyware on Apple iOS devices through images sent in iMessage. Apple disclosed two CVEs, CVE-2023-41064 and CVE-2023-41061, and patched devices as a result.

      Potential Impact

      Pegasus spyware is known for its ability to ultimately compromise the communications of its victims. Pegasus likely contributed to the murder of journalist Jamal Kashoggi in 2018.

      Recommended Actions

      Install updates to apple iOS devices as soon as possible. For those who may be targets of nation-state-level actors, lockdown mode is an option. Note that lockdown mode severely impacts the usability of iOS devices.

      Sources

      https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/

      https://www.pbs.org/wgbh/frontline/article/pegasus-spyware-jamal-khashoggi-wife-phone-washington-post/

      https://support.apple.com/en-us/HT212650

      Minneapolis School District Reports Data Breach Impacting More Than 100,000 people

      Overview

      In response to a data breach and ransomware event in February 2023, Minneapolis began notifying more than 100,000 people about leaked data. The data included Personally Identifiable Information (PII), which can be used to commit fraud against victims.

      Potential Impact

      Cybersecurity is time-consuming and expensive. Recovering from a ransomware attack approaches financial devastation. The impact on the Minneapolis school district and its stakeholders has been significant.

      Recommended Actions

      If you are a school administrator, review and enhance your organization’s cybersecurity program immediately. All citizens can help by encouraging school boards and administrators to implement robust security programs.

      Sources

      https://therecord.media/minneapolis-schools-say-data-breach-affected-100000

      How can we help?

      If you need assistance with any of the Threats identified today or any other cybersecurity concerns, compliance issues or questions, please reach out through the contact button below.  We stand ready to assist!


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us