Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 09/20/2023

    SMS and Vishing Phishing Attacks

    Overview

    GreyCastle Security continues to observe SMS-based phishing attacks where the threat actor is purporting to be an IT team member, a CEO, or another individual in a leadership role. Many campaigns seem more generic, such as asking for gift cards or similar for a quick monetary gain.

    However, reports of more targeted and sophisticated attacks involving SMS-based phishing, such as the incident suffered by the software company Retool, led to multiple compromised customers. 

    Potential Impact

    In this particular attack, the threat actor posed as a member of the IT team and tricked a user into clicking an SMS-based link to address a payroll issue. The link led to a phishing page that asked for credentials. The threat actor also contacted the employee by phone, posing as the IT team member by deepfaking their voice to obtain the multifactor authentication code.

    Recommended Actions

    Though most campaigns still have a generic theme, more targeted social engineering attacks aimed at stealing multifactor authentication codes are expected to become more common. Individuals who work in IT, C-level individuals, and others with access to sensitive information should have a heightened awareness of such attacks. Regular security awareness training is recommended using real-world examples such as this one.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

      CISA Offering Free Vulnerability Scans for Water Utilities

      Overview

      The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has announced free vulnerability scans for water utilities to protect these critical environments. Vulnerability scanning will be external to identify critical vulnerabilities on Internet-facing systems or devices. 

      Potential Impact

      Performing external vulnerability scanning can help organizations address vulnerabilities or weak configurations, allowing an attacker to access the network by exploiting an Internet-facing vulnerability. GreyCastle Security often observes exploitations of Internet-facing vulnerabilities, typically leading to more severe attacks against an organization’s internal network.

      Recommended Actions

      It is recommended that qualifying organizations take advantage of CISA’s program. Furthermore, GreyCastle Security can offer assistance with analyzing results or if additional vulnerability scanning is needed. In addition to external vulnerability scanning, it is highly recommended that internal vulnerability scanning be performed to assess the security posture of systems and the risk of compromise to threats targeting end users, such as phishing links or malicious websites. 

      Sources

      https://www.bleepingcomputer.com/news/security/cisa-offers-free-security-scans-for-public-water-utilities/#google_vignette?&web_view=true

      Fortinet Patches Multiple Devices

      Overview

      Fortinet released two security updates affecting FortiOS, FortiProxy, and FortiWeb. According to CISA, “A cyber threat actor can exploit one of these vulnerabilities to take control of an affected system.”

      Potential Impact

      Exploitation of the Fortinet devices specified in these security updates can lead to network compromise, data exfiltration, and ransomware. 

      Recommended Actions

      Upgrade to the most recent version of FortiOS FortiProxy, and FortiWeb as soon as possible.

      Sources

      https://www.cisa.gov/news-events/alerts/2023/09/15/fortinet-releases-security-updates-multiple-products

      https://www.fortiguard.com/psirt/FG-IR-23-106

      Heap Buffer Overflow (CVE-2023-4863) Patched in Multiple Browsers

      Overview

      CVE-2023-4863, a buffer overflow vulnerability impacting an image encoding function common to several browsers and other applications, was reportedly exploited in the wild last week. Browsers impacted include Chrome, Firefox, Edge, Opera, and Brave.

      Potential Impact

      Exploitation of this vulnerability will allow attackers to run arbitrary code on impacted systems.

      Recommended Actions

      Update browsers to the most recent release.

      Sources

      https://www.wired.com/story/libwebp-flaw-browser-updates/

      https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863

      How can we help?

      If you need assistance with any of the Threats identified today or any other cybersecurity concerns, compliance issues or questions, please reach out through the contact button below.  We stand ready to assist!


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us