Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 10/25/2023

    Ongoing Exploitation of NetScaler Vulnerability

    Overview

    Citrix is warning administrators to secure NetScaler ADC and Gateway appliances immediately against ongoing attacks exploiting the CVE-2023-4966. The vulnerability is a critical sensitive information disclosure flaw that is remotely exploitable by unauthenticated attackers and it does not require user interaction.

    Potential Impact

    The vulnerability allows threat actors to steal authentication sessions and hijack accounts, potentially bypassing multifactor authentication, which could lead to a network wide compromise. Attackers may deploy backdoors so that their access can persist even after patches are applied.

    Recommended Actions

    A patch is available and should be applied immediately if not already completed. If not, it is recommended that active and persistent sessions be terminated. Ensure that critical systems are monitored with Endpoint Detection & Response software and that suspicious activity originating from Citrix appliances is investigated immediately.

    Request Consultation

    For a complimentary consultation, fill out the form below and we will be in touch soon.

      Number of Employees - select one:
      Industry - select one:

      Backdoor on Compromised Cisco Devices Modified to Evade Detection

      Overview

      Backdoors implanted on Cisco devices through the exploitation of zero-day flaws CVE-2023-20198 and CVE-2023-20273 are being modified by threat actors to evade current signature detections. The new implant version now checks for an Authorization HTTP header before responding.

      Potential Impact

      Requiring an authorized HTTP header means that initial scan methods to detect the implant will be ineffective. Scan methods are likely to update quickly to include authorized HTTP headers. There are also curl commands that can be used to check for implants. Keep in mind that the exploitation of CVE-2023-20198 and CVE-2023-20273 can be used as a launching point for more severe network-wide attacks.

      Recommended Actions

      Ensure available patches and mitigation steps are applied. Once patched, ensure checks for implants are performed. Additionally, critical systems should be monitored with Endpoint Detection & Response software to efficiently respond to incidents early in the attack chain where impact will be minimized.

      Sources

      https://www.bleepingcomputer.com/news/security/hackers-update-cisco-ios-xe-backdoor-to-hide-infected-devices/

      OKTA Support Team Suffers Breach With Significant Downstream Impact

      Overview

      Okta shared some details about a recent breach in which attackers exfiltrated support files of Okta customers which contained sensitive data such as website session tokens. These tokens were replayed by attackers to impersonate victims.

      Potential Impact

      The potential impact of this type of impersonation can lead to data exfiltration and compromise of other accounts.

      Recommended Actions

      Review the posting from Okta by clicking on this link  https://sec.okta.com/harfiles  and search your environment for the associated indicators of compromise. Ensure that authentication logs are being aggregated and regularly reviewed by competent security professionals.

      Sources

      https://www.bleepingcomputer.com/news/security/okta-says-its-support-system-was-breached-using-stolen-credentials/

      Microsoft Expands Cloud Logging at No Extra Cost

      Overview

      One of the most frequent frustrations of incident response teams working on cloud breaches is the discovery that a particular category of log events is unavailable because of the victim’s licensing level. In the wake of a recent breach, Microsoft, under pressure from CISA, has expanded the logging included with their cloud offerings. In the recent expansions, Microsoft has increased the default retention time for logs, and added some events useful for incident responders and forensic experts.

      Potential Impact

      This is a win for Microsoft cloud service customers. The additional log events will provide insight into cloud services operations that were not previously available.

      Recommended Actions

      Gain an understanding of what logging options exist for any service, Microsoft Cloud included.  Like most organizations, sensitive information is exchanged via email. Ensure that logs exist so that you can defensibly report on attackers activities in the case of a breach. Although Software-As-A-Service (SAAS) offerings do have the benefit of outsourcing direct server and software maintenance logging and licensing are not “set-and-forget” configuration items. They require regular maintenance.

      Sources

      https://www.microsoft.com/en-us/security/blog/2023/10/18/expanding-audit-logging-and-retention-within-microsoft-purview-for-increased-security-visibility/

      https://www.cisa.gov/sites/default/files/2023-07/aa23-193a_joint_csa_enhanced_monitoring_to_detect_apt_activity_targeting_outlook_online_2.pdf

      How can we help?

      If you need assistance with any of the Threats identified today or any other cybersecurity concerns, compliance issues or questions, please reach out through the contact button below.  We stand ready to assist!


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us