InfoSec Weekly

July 16, 2023

Table Of Contents

PicassoLoader Malware Used in Ongoing Attacks on Ukraine and Poland

Description

Ukraine and Poland have experienced a series of cyberattacks targeting government entities, military organizations, and civilians. These campaigns, spanning from April 2022 to July 2023, involve sophisticated tactics such as phishing emails and decoy documents. The attackers utilize malware like PicassoLoader, Cobalt Strike Beacon, and njRAT to gain persistent remote access and steal sensitive data. GhostWriter, a threat actor with alleged ties to the Belarusian government, is among the groups involved. Additionally, Russia’s APT28 and APT29 have targeted Ukraine, employing phishing techniques and repurposing legitimate materials for their malicious activities. These ongoing attacks highlight the need for strong cybersecurity measures and heightened vigilance to protect against evolving cyber threats.

The cyberattacks in Ukraine and Poland have employed multi-stage infection chains and advanced techniques. Phishing emails containing malicious Microsoft Office documents are used to initiate the attacks, with victims being tricked into enabling macros. This triggers the deployment of PicassoLoader, a downloader malware that retrieves additional payloads from attacker-controlled servers. GhostWriter, APT28, and APT29 are among the threat actors involved, targeting various organizations and individuals. The attacks highlight the persistent risks faced by these countries and the importance of robust cybersecurity practices, including user awareness, to safeguard sensitive data and systems.

Infected Technology

Microsoft Office with ‘Malware, Phishing, Command-and-Control, Image Files, Email, Instant Messengers, Office Suite’

Source

https://thehackernews.com/2023/07/picassoloader-malware-used-in-ongoing.html?m=1

Recommendation

• Implement robust email security solutions that can identify and block malicious emails, phishing attempts, and suspicious attachments. • Ensure that all software, including operating systems and applications, is promptly patched, and updated to address known vulnerabilities.


Description

A significant security flaw has been uncovered in a highly popular messaging app, raising serious concerns about the privacy and security of its users. The discovery of this critical vulnerability has brought attention to the urgent need for users to update their software promptly and take necessary precautions to protect their sensitive information from potential cyber threats. According to the security researchers who identified the flaw, the vulnerability exposes users to potential attacks that could compromise their personal data, including chat logs, media files, and even their login credentials. Such unauthorized access to private conversations and personal information can have severe consequences, ranging from identity theft to blackmail or espionage. The alarming nature of this discovery serves as a stark reminder to users of the importance of keeping their software up to date. Security patches and updates are often released by app developers to address vulnerabilities and strengthen the overall security of their platforms. Neglecting to apply these updates can leave users susceptible to exploitation by cybercriminals who actively seek out and exploit security flaws in widely-used applications.

Infected Technology

Github

Source

https://thehackernews.com/2023/07/blog-post.html

Recommendation

● Users of the affected messaging app should immediately check for updates and install the latest version provided by the app developer. It is crucial to ensure that the software is regularly updated to protect against known vulnerabilities and potential exploits. Additionally, users are advised to exercise caution when sharing sensitive information or clicking on suspicious links within the app until the update is applied.


Microsoft Bug Allowed Hackers to Breach Over Two Dozen Organizations via Forged Azure AD Tokens

Description

Microsoft disclosed that a validation error in its source code allowed a malicious actor, known as Storm-0558, to forge Azure Active Directory (Azure AD) tokens using a Microsoft account (MSA) consumer signing key. This breach impacted approximately 25 organizations, including government entities, compromising email access and exfiltrating mailbox data. The origin of how Storm-0558 obtained the key is under investigation. The token validation issue has been addressed. Storm-0558 is suspected to be a China-based threat actor engaged in espionage activities. The hacking crew primarily targets U.S. and European governing bodies, Taiwan and Uyghur interests, media companies, think tanks, and telecommunications providers. Microsoft has taken steps to mitigate the issue and notified affected customers. However, concerns have been raised about Microsoft’s handling of the incident and access to forensic capabilities. The breach highlights China’s cyber espionage capabilities and its ability to penetrate various IT systems.

Infected Technology

Microsoft

Source

https://thehackernews.com/2023/07/microsoft-bug-allowed-hackers-to-breach.html

Recommendation

• Implement multi-factor authentication and update security practices. • Improve monitoring to detect suspicious activities. • Train employees on phishing and security best practices. • Collaborate with government entities for threat intelligence. • Provide customers with forensic capabilities and audit logs.


Critical Security Flaws Uncovered in Honeywell Experion DCS and QuickBlox Services

Description

Honeywell Experion DCS: Nine vulnerabilities, collectively known as Crit.IX, were found in the Honeywell Experion distributed control system. These flaws could allow unauthorized remote code execution, enabling attackers to take control of devices and manipulate DCS controllers. Insufficient encryption and authentication mechanisms in the Control Data Access (CDA) protocol contribute to the vulnerabilities. QuickBlox: Check Point and Claroty discovered critical flaws in QuickBlox, a chat and video calling platform widely used in telemedicine, finance, and IoT devices. Exploiting these vulnerabilities could lead to user database leaks and facilitate full account takeover attacks. Aerohive/Extreme Networks Access Points: Remote code execution vulnerabilities were found in these access points running HiveOS/Extreme IQ Engine versions prior to 10.6r2. Successful exploitation could result in arbitrary command execution. Ghostscript Library: Ghostscript, a widely used package, was found to have a remote code execution vulnerability. This library, which can be triggered through various applications like image editors or printers, poses risks beyond a single application. Golang-based Platforms: Two Golang-based open-source platforms, Owncast and EaseProbe, were discovered to have security weaknesses. Owncast is susceptible to Server-Side Request Forgery (SSRF) attacks (CVE-2023-3188), while EaseProbe is vulnerable to SQL injection attacks (CVE-2023-33967). Technicolor TG670 DSL Gateway Routers: Hard-coded credentials were identified in these routers, enabling authenticated users to gain full administrative control. Remote administration should be disabled to mitigate potential exploitation.

Infected Technology

Honeywell Experion DCS, QuickBlox, Aerohive/Extreme Networks Access Points, Ghostscript Library, Golang-based Platforms, Technicolor TG670 DSL Gateway Routers

Source

https://thehackernews.com/2023/07/critical-security-flaws-uncovered-in.html

Recommendation

• Disabling remote administration and contacting service providers to determine the availability of patches and updates to address these vulnerabilities.


AIOS WordPress Plugin Faces Backlash for Storing User Passwords in Plaintext

Description

The popular WordPress plugin, All-In-One Security (AIOS), released a security update due to a bug in version 5.1.9. The bug caused users’ passwords to be stored in plaintext in the database, potentially accessible to malicious site administrators. The issue was reported by a user three weeks ago, expressing surprise that a security plugin would make such a basic error. AIOS confirmed that the update removes the stored passwords and mentioned that exploiting the vulnerability requires the attacker to have already compromised the site or gained unauthorized access. However, as a precaution, users are advised to enable two-factor authentication and change their passwords, especially if they use the same credentials on other sites.

Infected Technology

• WPEverest’s user registration plugin

Source

https://thehackernews.com/2023/07/aios-wordpress-plugin-faces-backlash.html

Recommendation

• Change Passwords and Use Unique Credentials • Regularly Backup and Secure Your Website • Update AIOS and Enable Two-Factor Authentication

CVE ID

CVE-2023-3342


Critical Vulnerability Detected In The REST API of Cisco SD-WAN vManage Software

Description

A critical vulnerability (CVE-2023-20214) has been discovered in the Cisco SD-WAN vManage software’s REST API authentication validation. The flaw is due to insufficient request validation in the REST API feature. This issue allows remote attackers to modify configurations without proper authentication, disrupt network operations, retrieve confidential information and to gain unauthorized access to critical configuration data. Cisco SD-WAN vManage software users must immediately install the fixes provided by Cisco, which have been issued to remedy the vulnerability. Since there are currently no known solutions, it is crucial that the given patches be installed in order to minimize the risk from threat actors.

Infected Technology

• Cisco SD-WAN vManage software

Source

https://cybersecuritynews.com/cisco-sd-wan-vmanage-flaw

Recommendation

• Implement access control lists (ACLs) to restrict access to only trusted IP addresses, preventing outside attackers from gaining unauthorized access. • Utilize API keys when accessing APIs for an extra layer of security. • Monitor logs for any suspicious activity related to the REST API. • Keep the system software up to date with the latest patches and releases.

CVE ID

CVE-2023-20214



call to action image

Ready to get started?

Don’t let the attacker get the upper hand – protect your services with our expertise. Contact us now and stay ahead of the game.

Contact Us