New iOS 16 Exploit Enables Cellular Access Under Fake Airplane Mode , Cuba Ransomware Uses Veeam Exploit Against U.S. Organizations, and TP-Link Smart
Access Point Consulting
Hands-on cybersecurity for small to mid-sized companies.
At a Glance
Ransomware, Malware & Phishing
Vulnerabilities
Ransomware, Malware & Phishing
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode?
Analysis: Cybersecurity researchers from Jamf Threat Labs have uncovered a novel method of post-exploit persistence on iOS 16 devices, potentially allowing attackers to maintain a foothold on compromised devices without detection. This technique involves creating a deceptive version of Airplane Mode, a feature that disables wireless communication on mobile devices. However, in this case, the attackers manipulate Airplane Mode to deceive victims into thinking their device is offline, while in reality, the attacker has implemented an artificial Airplane Mode that only restricts internet connectivity to non-attacker apps. This enables the attacker to maintain a cellular network connection for a malicious application, allowing it to operate stealthily even when the victim believes their device is in Airplane Mode.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security
Analysis: A novel attack technique, dubbed "NoFilter," has recently been uncovered, exploiting the Windows Filtering Platform (WFP) to achieve privilege escalation in Windows operating systems. NoFilter allows an attacker with admin privileges to escalate their access to the "NT AUTHORITY\SYSTEM" level, which grants them higher privileges within the system. This discovery was presented at the DEF CON security conference and highlights a previously unknown method for privilege escalation.
Access Point Recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
Google Chrome's New Feature Alerts Users About Auto-Removal of Malicious Extensions
Analysis: Google is introducing a new feature in the upcoming Chrome web browser version (Chrome 117) that will proactively alert users when an installed extension has been removed from the Chrome Web Store. This feature aims to enhance user awareness and security by notifying them when an add-on has been unpublished by a developer, removed due to policy violations, or flagged as malware. Users will have options to review the extension, remove it, or hide the warning. Additionally, Google is working on automatically upgrading HTTP URLs to HTTPS URLs, even when users click on links explicitly stating HTTP, to improve security during web navigation.
Starting from mid-September 2023, Chrome will display a warning when users attempt to download high-risk files over insecure connections, reducing the risk of compromises resulting from malicious code within downloaded files. Google is also considering enabling HTTPS-First Mode by default in Incognito Mode to provide a more secure browsing experience. Users will have the option to manually enable this mode in Chrome's security settings.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools
Analysis: Microsoft has reported the discovery of a new variant of the BlackCat ransomware, which includes tools like Impacket and RemCom for lateral movement and remote code execution. This variant of BlackCat has been observed in attacks by a BlackCat affiliate since July 2023.
Here are some key details about this threat:
BlackCat is known for its continuous evolution and is associated with multiple ransomware attacks. Some ransomware groups are shifting tactics to focus on threatening to leak victims' data online if ransom demands are not met. Additionally, ransomware actors are adopting intermittent encryption techniques to speed up the encryption process and evade security solutions.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft
Analysis: A notable social engineering campaign, described as "mass-spreading," has recently come to light. This campaign has a specific focus on users of the Zimbra Collaboration email server, with the primary objective of acquiring their login credentials for subsequent malicious activities. It's important to note that this campaign has been ongoing since April 2023 and has been primarily directed towards small and medium-sized businesses, as well as government entities, spanning across various countries including Poland, Ecuador, Mexico, Italy, and Russia.
The modus operandi of this campaign involves the distribution of deceptive emails. These emails contain an attached HTML file, cleverly designed to resemble a legitimate Zimbra administrator's communication. This ruse is employed to lend credibility to the email. Inside the HTML file, recipients encounter a Zimbra login page that appears tailored to their specific organization. What's particularly cunning is that the victim's email address is pre-filled in the Username field, adding an extra layer of authenticity. Regrettably, once the victim enters their credentials, this sensitive information is surreptitiously harvested and transmitted to a server under the control of the malicious actors, utilizing HTTPS POST requests.
However, what sets this campaign apart from others is its capability to propagate even further. In subsequent waves of phishing attempts, the attackers utilize compromised administrator accounts from previously targeted, legitimate organizations to send emails to additional entities. This raises concerns about the potential use of password reuse by administrators who were initially targeted through phishing.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams
Analysis: Cybersecurity researchers have recently unveiled an updated version of the WoofLocker toolkit, a sophisticated tool primarily used for conducting tech support scams. First discovered by Malwarebytes in January 2020, WoofLocker employs JavaScript, embedded within compromised websites, to carry out anti-bot checks and traffic filtering.
One of its noteworthy features is the utilization of JavaScript that redirects unsuspecting users to browlock (browser locker) pages. To obscure its malicious intent, the toolkit employs steganographic techniques to hide JavaScript code within a PNG image. The ultimate goal is to redirect users to fraudulent call centers, where they are deceived into seeking assistance for non-existent computer issues, potentially resulting in financial losses due to the purchase of fake security solutions.
Although the campaign's tactics and techniques have largely remained consistent, its infrastructure has evolved to withstand takedown efforts. To enhance its resilience, WoofLocker now primarily targets users who visit compromised adult websites, utilizing hosting providers located in Bulgaria and Ukraine.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack
Analysis: The threat actors behind the HiatusRAT malware have made a bold return to the cyber landscape after a period of inactivity. These malicious actors have resumed their operations, engaging in a new wave of reconnaissance and targeting activities, with a focus on organizations in Taiwan and a U.S. military procurement system. Their tenacity and determination are evident, and their identity and origin remain shrouded in mystery.
Recent targets include semiconductor and chemical manufacturers, a municipal government organization in Taiwan, and a U.S. Department of Defense (DoD) server associated with defense contracts. The HiatusRAT malware, which was first disclosed in March 2023, initially targeted business-grade routers to clandestinely spy on victims in Latin America and Europe. In this latest series of attacks, which occurred between mid-June and August 2023, HiatusRAT employed pre-built binaries designed for different architectures. The threat actors primarily honed in on Ruckus-manufactured edge devices in Taiwan.
The infrastructure underpinning HiatusRAT comprises payload and reconnaissance servers that communicate directly with victim networks. These servers are operated and managed via Tier 1 and Tier 2 servers. In the case of the DoD server, the attackers used two IP addresses to establish connections, transferring an estimated 11 MB of bi-directional data over approximately two hours. While the precise motive remains unclear, it is suspected that the threat actors were seeking publicly available information related to military contracts for potential future targeting.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
领英推荐
This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers
Analysis: Threat actors are taking advantage of malware-infected Windows and macOS devices to distribute a proxy server application. This application transforms these compromised machines into proxy exit nodes, rerouting proxy requests through them. While the proxy service claims to rely on informed and consenting users, there's evidence that malware writers are surreptitiously installing the proxy on infected systems.
Operated by an unnamed company, this proxy service manages a vast network of over 400,000 proxy exit nodes. Some of these nodes appear to be hijacked by malware on infected devices. The proxy software, developed in the Go programming language, targets both Windows and macOS systems. To avoid detection, Windows versions use a valid digital signature.
Malware spreads this proxy software by luring users searching for cracked software and games. Once installed, the proxy collects information about the compromised systems, including running processes, CPU and memory usage, and battery status. Furthermore, the proxy installation often comes bundled with additional malware or adware components, adding complexity to the situation.
This tactic highlights a growing trend in malware campaigns using proxy applications for unauthorized financial gains. It also underscores the increasing focus on macOS systems by threat actors, evident in the rise of information stealers and sophisticated macOS tools since 2019.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
Cuba ransomware uses Veeam exploit against critical U.S. organizations
Analysis: The Cuba ransomware gang has recently been detected targeting critical infrastructure organizations in the United States and IT firms in Latin America. This group's attack tactics blend old and new tools, showcasing their evolving and persistent threat to cybersecurity.
BlackBerry's Threat Research and Intelligence team first identified this campaign in early June 2023. Cuba has now incorporated the exploitation of CVE-2023-27532 to pilfer credentials from configuration files. Unlike brute force, they opt for compromised admin credentials via Remote Desktop Protocol (RDP). Their custom downloader, "BugHatch," establishes communication with a command and control (C2) server to download DLL files or execute commands. To disable endpoint protection tools, they employ the "Bring Your Own Vulnerable Driver" (BYOVD) technique and rely on the "BurntCigar" tool to terminate kernel processes linked to security products.
Beyond CVE-2023-27532, Cuba exploits CVE-2020-1472, also known as "Zerologon," to achieve privilege escalation against Active Directory domain controllers. Their post-exploitation phase involves the use of Cobalt Strike beacons and various "living off the land binaries" (LOLBins). While the group's origins remain uncertain, linguistic clues, targeting patterns, and infrastructure indicators suggest Russian ties. The Cuba ransomware gang primarily seeks financial gain.
The persistent threat from this group underscores the importance of timely security updates and patches, especially when proof-of-concept exploits are publicly available.
Access Point recommends the following:
MITRE ATT&CK Technique Numbers associated with this campaign include:
Vulnerabilities
CISA Warns of Another Exploited Adobe ColdFusion Vulnerability
Analysis: ?The US Cybersecurity and Infrastructure Security Agency (CISA) has raised an alert regarding an exploited vulnerability in Adobe ColdFusion, labeled as CVE-2023-26359. This flaw, which was addressed by Adobe in their March 2023 Patch Tuesday updates, is categorized as a critical data deserialization issue, potentially allowing for arbitrary code execution. CISA has incorporated this vulnerability into its Known Exploited Vulnerabilities (KEV) Catalog and emphasizes the substantial risks it presents. In response, the agency has directed government entities to rectify this vulnerability by September 11, adhering to the Binding Operational Directive (BOD) 22-01, which mandates addressing known exploited vulnerabilities. Notably, the KEV catalog lists 12 ColdFusion vulnerabilities, with four being identified this year, and some have been utilized in combination during cyberattacks. Although specific details regarding attacks exploiting CVE-2023-26359 remain undisclosed, past incidents have shown that Adobe ColdFusion vulnerabilities attract various threat actors.?
Access Point recommends the following:
Ivanti Issues Fix for Critical Vuln in Its Sentry Gateway Technology?
Analysis: Ivanti has released a security patch to address a critical zero-day vulnerability in its Sentry security gateway product, identified as CVE-2023-38035. This flaw, with a severity rating of 9.8 out of 10, is present in the interface used by administrators for configuring security policies. If exploited, attackers could bypass authentication controls, potentially enabling them to access sensitive APIs, change the gateway's configuration, execute system commands, and write arbitrary files on the system. The issue affects all supported Sentry versions, including 9.18, 9.17, and 9.16, as well as older, non-supported releases. The vendor emphasized that organizations not exposing port 8443 to the internet have a minimal risk. Some reports indicate that attackers are already exploiting this vulnerability.
Ivanti Sentry, previously known as MobileIron Sentry, forms a part of Ivanti's Unified Endpoint Management products portfolio. The gateway technology manages, encrypts, and protects traffic between mobile devices and backend systems. It primarily functions as a gatekeeper for an organization's Microsoft Exchange Server, ActiveSync server, or other backend systems like SharePoint server. Ivanti Sentry can also act as a Kerberos Key Distribution Center Proxy (KKDCP) server. This technology has gained traction in many businesses to ensure secure access for remote workers using personal and company-issued mobile devices. Recently, attackers exploited another vulnerability in Ivanti Endpoint Manager, CVE-2023-35078, compromising systems of 12 Norwegian government agencies. Additionally, a separate bug, CVE-2023-32560, was found in Ivanti's Avalanche mobile management technology.
Ivanti acted promptly upon the identification of CVE-2023-38035, as reported by security vendor mnemonic. They have prepared RedHat Package Manager (RPM) scripts tailored for each supported version to address the vulnerability. Ivanti has cautioned organizations to apply the correct RPM script corresponding to their Sentry version. Applying the wrong script may not only fail to fix the vulnerability but could also destabilize the system.
Access Point recommends the following:
Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution
Analysis: Juniper Networks, the networking appliances manufacturer, has issued patches for four vulnerabilities detected in the J-Web interface of Junos OS. These vulnerabilities, designated as CVE-2023-36844 to CVE-2023-36847, possess a 'medium' severity individually. Yet, when exploited in tandem, they escalate to a 'critical severity' level. The first two, CVE-2023-36844 and CVE-2023-36845, pertain to PHP external variable modification issues that potentially let remote attackers alter environment variables without needing authentication. These vulnerabilities, when exploited, can compromise the system's integrity. The latter pair, CVE-2023-36846 and CVE-2023-36847, involve authentication lapses that enable attackers to arbitrarily upload files, affecting the system's file integrity. Juniper advises taking precautionary measures by either disabling the J-Web interface or granting access solely to trusted hosts.
These identified vulnerabilities predominantly affect the SRX series firewalls and EX series switches that operate on specific Junos OS versions. Consequently, users of the SRX and EX series are encouraged to promptly upgrade to the most recent Junos OS versions. While Juniper hasn't reported any active exploitation of these vulnerabilities, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has cautioned that if exploited, these vulnerabilities might trigger denial-of-service (DoS) conditions.
Access Point recommends the following:
Given the potential severity of these vulnerabilities, it is crucial for organizations to take immediate action, even if no active exploits have been reported as of now. By following these recommendations, organizations can effectively safeguard their network infrastructure.
Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks
Analysis: Microsoft's PowerShell Gallery, a prominent code repository hosting numerous scripts and modules, has come under scrutiny for lax naming protocols that can facilitate typosquatting attacks, where malicious actors could spoof popular packages, paving the way for potential supply chain attacks. AquaSec's Nautilus team revealed the ability for users to upload packages with names almost identical to existing ones on PS Gallery, as demonstrated by the example of the "AzTable" module which could be mirrored as 'Az.Table'. This issue is compounded by the possibility to mimic module details like Author and Copyright. Additionally, they identified another flaw that permits the exposure of hidden packages which are typically not indexed by the Gallery’s search engine. An XML file was discovered that detailed both listed and unlisted packages, providing an open gateway to the entire PowerShell package database, thus enabling access to potentially sensitive data within these unlisted packages.
Despite AquaSec reporting these vulnerabilities in September 2022, as of August 16, 2023, the issues remained unresolved. Microsoft initially responded in early November 2022, asserting that they had addressed the problems. However, subsequent testing by AquaSec in December 2022 showed that the vulnerabilities could still be exploited. By January 15, 2023, Microsoft shared that they had put a temporary solution in place while working on a more permanent fix, particularly for the name typosquatting and package detail spoofing problems. Microsoft emphasized that the report's concerns largely depend on social engineering for success. They've implemented some changes to identify and remove suspicious packages and urged users to report any dubious modules.
Access Point recommends the following:
New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC
Analysis: RARLAB, the developers behind popular file archiving software WinRAR have fixed a potential remote code execution vulnerability possible on Windows systems. The vulnerability known as CVE-2023-40477 does require user interaction as a user must be lured to a malicious page or open a specifically crafted file. CVE-2023-40477 (CVSS score: 7.8) is described as a case of improper validation while processing recovery volumes. The flaw can result in unauthorized memory access extending beyond the allocated buffer’s boundaries which can allow an attacker to use this vulnerability to execute code in the process’s context.
This vulnerability was found by the Zero Day Initiative, specifically by a researcher who goes by the name goodbyeselene. They were credited with finding and letting RARLABs know about this bug.
RARLAB has released a fix in version 6.23 of WinRAR as an update to this version and any version after should remediate this vulnerability.
Access Point recommends the following:
TP-Link smart bulbs can let hackers steal your WiFi password?
Analysis: Researchers from University of Catania and the University of London analyzed the TP-Link Tapo L530E smart bulb and TP-Link’s Tapo app. This Bulb was chosen as it was the top-selling smart bulb on many marketplaces like Amazon and it’s smart device management app with over 10 million installations on Google Play Store.
The goal of this research was to find security risks in the billions of IoT devices used by consumers on a day-today basis which feature “risky data transmission and lackluster authentication safeguards”.
The researchers identified four distinct vulnerabilities in their study.
The first vulnerability relates to improper authentication in the Tapo L503E bulb, presenting a significant security concern (CVSS v3.1 score: 7.6). This flaw permits potential attackers in close proximity to impersonate the device during the session key exchange phase. Consequently, they can steal Tapo user passwords and manipulate connected Tapo devices.
The second flaw, also categorized as high severity, allows attackers to acquire a hard-coded, short checksum shared secret through methods like brute-forcing or decompiling the application.
The third issue, rated as a medium severity concern, unveiled a deficiency in randomness during symmetric encryption, undermining the cryptographic scheme's ability to remain unpredictable.
Lastly, the fourth problem revolves around a lack of checks for message freshness. This lapse results in session keys remaining valid for an extended period of 24 hours, enabling attackers to replay messages during this timeframe.
The researchers found that utilizing the first two vulnerabilities an attacker can extract the victim’s Wifi SSID and password and gain access to all other devices connected to that network. Vulnerability one can also be used in a man-in-the-middle attack to intercept and manipulate communication between the app and the bulb by capturing the RSA encryption keys.
Access Point recommends the following: