Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 10/25/2022

    Text4Shell Apache Commons Text Vulnerability

    Overview

    Wordfence, a WordPress security company, announced exploitation attempts for a recently released Apache Commons Text vulnerability tracked as CVE-2022-42889 (CVSS 9.8) and dubbed Text4Shell. The vulnerability is in a feature that expands text with lookups and replacing a string will call the vulnerable lookup function.

    Potential Impact

    Several methods can be invoked during exploitation. Some fields that introduce security issues are dns, url, and script, which could potentially allow for arbitrary code execution. It should be noted that the vulnerable functions are not widely used, but for those affected the impact could be significant.

    Recommended Actions

    The released fix included removal of the dns, url, and script lookups from the default behavior. This fix can be applied by upgrading the package to version 1.10.0. If an upgrade is not possible, the StringSubstitutor can be initialized with safe StringLookup configurations.

    Request Consultation

    For more information, fill out the form below and we will be in touch shortly

      Number of Employees - select one:
      Industry - select one:

      Malicious JavaScript Executed Using Windows “Smart Screen” Bypass Used in Ransomware Attacks

      Overview

      Security researcher Will Dormann described an apparent flaw in Windows SmartScreen which allowed for unhindered execution of malicious JavaScript.  If a JavaScript file is signed with a corrupt Authenticode signature, windows SmartScreen does not recognize the “Mark of the Web” (MOTW) data in a file downloaded from the internet.  This failure results in code being run without warning the user that the file in question has been downloaded from the internet.  BleepingComputer announces this as a “Zero-Day” vulnerability, although a CVE number has not been assigned.

      Potential Impact

      Dorman and a journalist from Bleeping Computer have described cases in which Magniber ransomware was deployed using this method.

      Recommended Actions

      To put security teams between a rock and a hard place: Disabling the “Check apps and files” SmartScreen feature reportedly mitigates this bypass; this action does, however, disable other security features. Monitor patch releases from Microsoft for fixes to this issue.

      Sources
      https://www.bleepingcomputer.com/news/security/exploited-windows-zero-day-lets-javascript-files-bypass-security-warnings/
      https://twitter.com/wdormann/status/1582466468968792064

      New Attack Surface on MS Exchange Details Released

      Overview

      In a blog post titled “A New Attack Surface on MS Exchange Part 4 – ProxyRelay!”, security researcher Orange Tsai provides details on an attack surface on Microsoft Exchange servers comprised of at least four vulnerabilities.  Orange Tsai became famous for identifying and demonstrating the ProxyLogon and ProxyShell vulnerabilities in Microsoft Exchange.  This latest blog post from Orange Tsai is a continuation of his research on the Microsoft Exchange attack surface.

      Potential Impact

      Exploitation of ProxyShell and ProxyLogon vulnerabilities since their discovery has resulted in numerous network intrusions, with impact ranging from spam campaigns to data exfiltration and devastating ransomware attacks.  If reliable exploit code is released for the vulnerabilities described by Orange Tsai, expect it to be used extensively by threat actors.

      Recommended Actions
      • Ensure that all cumulative updates and patches are applied to on-premises Exchange servers, and ensure that the manual process for enabling “Windows Extended Protection” has been applied as described in this Microsoft blog post: https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862
      • Strongly consider migration to cloud-based email services such as Microsoft365 or Google Workspace.  Orange Tsai’s blog post describes the difficulties encountered by Microsoft in patching the Exchange server code.  Many in the IT administration and information security community also voice concern about the difficulty of applying patches when they are released.  Organizations running Exchange servers on-premises must consider these factors when planning technology upgrades.
      • Ensure that on-premises Exchange servers are placed in a DMZ with strict rules restricting network traffic.  The GreyCastle Security Incident Response Team (GCSIRT) has responded to multiple network intrusions that started with a compromise of Microsoft Exchange servers and rapidly spread to other areas of corporate networks due to inadequate segmentation.
      • Monitor Microsoft patch release information, and plan to apply patches quickly.  Ensure that organizational stakeholders are aware of the risk of running unpatched Microsoft Exchange servers so that they understand the necessity of possible email service downtime when patches are applied. These discussions may help encourage buy-in for moves to cloud-based email services.

      Sources
      https://devco.re/blog/2022/10/19/a-new-attack-surface-on-MS-exchange-part-4-ProxyRelay/

      CISA Warns of Daixin Team Hackers Targeting Health Organizations

      Overview

      An alert was published by CISA, the FBI, and HHS to the healthcare sector about a cybercrime gang known as the Daixin Team targeting US-based healthcare organizations.

      Potential Impact

      The Daixin Team appears to be following the typical ransomware attack process of double extortion where data is encrypted and exfiltrated. This group tries to ensure sensitive data, such as PHI, is encrypted and/or exfiltrated. The group also maintains a leak site to publish victim data. The alert indicated that initial access is gained through VPN servers and often taking advantage of unpatched security flaws and compromised credentials obtained via phishing emails.

      Recommended Actions

      Organizations should ensure latest software and patches are in place, enforce multifactor authentication for all access and email accounts, and maintain offline backups. Implementation of Endpoint Detection & Response (EDR) software which will provide behavioral analysis is also recommended.

      Sources
      https://thehackernews.com/2022/10/cisa-warns-of-daixin-team-hackers.html

      BIG-IP Advanced WAF and ASM iControl REST Vulnerability

      Overview

      When the F5 BIG-IP Advanced WAF or BIG-IP ASM module is provisioned, an authenticated remote code execution vulnerability exists in the BIG-IP iControl REST interface. This vulnerability is tracked as CVE-2022-41617 with a CVSS score of 7.2.

      Potential Impact

      The vulnerability can be exploited from the perspective of a privileged authenticated attack with network access to the iControl REST interface. This applies to systems deployed in Standard or Appliance mode. The vulnerability can be exploited if an attacker sends a crafted request to an affected system.

      Recommended Actions

      The fix for this vulnerability is to upgrade to a non-vulnerable version as advised here: https://support.f5.com/csp/article/K11830089. Additionally, it is recommended to implement segmentation so that network access to administrative interfaces or sensitive systems is restricted as much as possible to reduce security risk.

      Sources
      https://support.f5.com/csp/article/K11830089

      For strategic clients, your vCISO will add this to your next Office Hours for further discussion. However, if you have an immediate need, concern, or question, please reach out to them directly.

      For non-strategic clients, please reach out to your Advisor for further discussion.

      For those not yet clients of GreyCastle Security, please click the “Contact Us” button below and we’ll be glad to provide assistance as well as answer any questions you might have.


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us