Daily Cybersecurity Wire – January 26, 2024
January 26, 2024
Posted By: Research Team
Daily Cybersecurity Wire
January 26, 2024

 

NEW DEVELOPMENTS

 

RUSSIA-LINKED APT GROUP MIDNIGHT BLIZZARD HACKED HEWLETT PACKARD ENTERPRISE (HPE)
Source: Security Affairs
Russian APT group Midnight Blizzard successfully breached HPE, gaining unauthorized access to sensitive data within its cybersecurity division through Microsoft Office 365. A parallel attack on Microsoft was identified, involving unauthorized access to a small percentage of employee email accounts. Both companies are actively addressing the incidents and collaborating with law enforcement to mitigate the impact and enhance cybersecurity measures.
Article Link

 

New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits
Source: The Hacker News
CherryLoader, a newly discovered Go-based malware, poses as the legitimate CherryTree note-taking application to deceive users during installation. Identified by Arctic Wolf Labs, this loader deploys privilege escalation tools for subsequent exploitation. Notably, CherryLoader exhibits modularity, enabling threat actors to interchange exploits without recompiling code. Employing sophisticated techniques like process ghosting, the malware evades detection and sets up persistence on compromised hosts.
Article Link 

 

Cybercriminals stole $1.7 billion from crypto funds in 2023 as attacks proliferated
Source: The Record
Cybercriminals stole $1.7 billion from cryptocurrency platforms in 2023, experiencing a $2 billion decrease from the previous year’s record. Despite the overall decline in losses, the number of individual incidents rose to 231, fueled by exchange collapses and cryptocurrency value declines. The loss reduction is attributed to fewer cyber thefts targeting decentralized finance (DeFi) platforms, with notable incidents drawing attention. Cybersecurity experts highlight vulnerabilities in poorly built platforms that are prioritizing growth over security. Threat actors from North Korea stole $1 billion in 2023, down from $1.7 billion in 2022, employing obfuscation techniques and laundering methods.
Article Link

 

‘Significant security loophole’ found in Google software container system
Source: The Record
A major security flaw in Google Kubernetes Engine (GKE), a cloud service frequently used for deploying and administering containerized applications, has been fixed. The vulnerability, known as Sys:All, presented major security threats because it could have let attackers using any Google account take over improperly configured Kubernetes clusters. More than 100 of the 1,300 potentially exposed clusters were found to be susceptible. The problem emphasizes how crucial it is for businesses to set up identity and access controls more thoughtfully to prevent permissive access.
Article Link

 

Blackwood APT delivers malware by hijacking legitimate software update requests
Source: Help Net Security
A newly detected advanced persistent threat (APT) group, Blackwood, which is believed to be affiliated with China, uses sophisticated tactics to transmit malware to targets in China, Japan, and the United Kingdom. The attackers use a complicated multistage infection known as NSPX30 to hijack legitimate software update requests through adversary-in-the-middle methods. The NSPX30 implant evolved from an older backdoor known as Project Wood, allowing the APT group to spy on apps, snap screenshots, and exfiltrate sensitive data. The attackers’ ability to intercept communications and use lawful networks for anonymity raises concerns.
Article Link

 

Southern Water Confirms Data Breach Following Black Basta Claims
Source: Infosecurity Magazine
Southern Water, a UK utility serving 4.6 million customers, has confirmed a data breach following a cyber attack by the Black Basta ransomware group. Customer data, including identity documents and HR-related files, was leaked. The group threatens further data release unless a ransom is paid by February 29. Southern Water is cooperating with authorities, investigating the incident, and has not experienced service disruptions. The breach, potentially resulting from a supply chain attack, reveals vulnerabilities in the water sector’s cybersecurity.
Article Link

 


VULNERABILITIES TO WATCH

 

CISA Adds Atlassian Confluence Data Center Bug To Its Known Exploited Vulnerabilities Catalog
Source: Security Affairs
CISA has flagged the Atlassian Confluence Data Center and Server template injection vulnerability (CVE-2023-22527) as a Known Exploited Vulnerability. Atlassian has released patches to address the critical flaw, urging users to update to the latest versions. Federal agencies must comply with CISA’s directive (Binding Operational Directive 22-01) and remediate this vulnerability by February 14, 2024, to enhance network security and prevent potential exploitation.
Article Link

 

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP!
Source: The Hacker News
Jenkins has addressed a critical vulnerability (CVE-2024-23897) that could expose servers to remote code execution (RCE) attacks. The flaw allows arbitrary file read through the built-in command-line interface (CLI), potentially leading to severe security risks. Users are strongly urged to apply the provided fixes in Jenkins 2.442 and LTS 2.426.3 immediately. Disabling access to the CLI is recommended as a temporary workaround until the patch is implemented.
Article Link

 

 

Firefox 122 Patches 15 Vulnerabilities
Source: Security Week
Mozilla has issued security updates for Firefox and Thunderbird, addressing 15 vulnerabilities, including five rated as “high severity.” One critical flaw involves an out-of-bounds write in ANGLE (Almost Native Graphics Layer Engine), the graphics engine used as the default WebGL backend in Firefox and Chrome. Another high-severity issue is related to a failure to update the user input timestamp, potentially allowing unintentional activation or dismissal of certain browser prompts. Other vulnerabilities include a TLS handshake code issue, a JavaScript code bug, and a stack buffer overflow in WebAudio. Users are advised to update their browsers to Firefox 122 to mitigate the potential risks of these vulnerabilities.
Article Link

 

Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems
Source: The Hacker News
Cisco has released fixes to resolve a severe security problem (CVE-2024-20253) that affects certain Unified Communications and Contact Center Solutions products. The vulnerability, which has a CVSS score of 9.9, enables an unauthenticated, remote attacker to execute arbitrary code on an affected device. Successful exploitation may result in the execution of commands on the underlying operating system with the privileges of the web services user, potentially granting root access. The impacted products are Unified Communications Manager, Unified Communications Manager IM & Presence Service, Unified Communications Manager Session Management Edition, Unified Contact Center Express, Unity Connection, and Virtualized Voice Browser.
Article Link

 

SPECIAL REPORTS

 

CISOs’ role in identifying tech components and managing supply chains
Source: Help Net Security
In an exclusive interview with Help Net Security, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, provides essential insights for Chief Information Security Officers (CISOs) on safeguarding supply chains. The discussion covers tasks like identifying tech components, fostering collaboration between security and development teams, adapting strategies to global cybersecurity regulations, and ensuring rapid deployment without compromising security. Warfield also delves into the role of AI/ML in supply chain security, emphasizing proactive measures to address vulnerabilities.
Article Link

 

Cyber Threat Landscape: 7 Key Findings and Upcoming Trends for 2024
Source: The Hacker News
The Axur Threat Landscape Report for 2023/2024 provides a comprehensive analysis of the evolving cybersecurity landscape. The report, amalgamating data from the Surface, Deep, and Dark Web surveillance and insights from in-depth investigations, reveals key findings and anticipates upcoming trends. Notable shifts include the integration of cyber risk with business risk, geopolitical influences, and the escalating sophistication of cyber threats. The report delves into seven key findings, emphasizing the urgent need for organizations to adapt and fortify cybersecurity strategies and controls.
Article Link