A suspected Chinese hacking group (tracked as UNC4841) continues to target compromised Barracuda appliances in government, high tech, and information technology sectors. The group originally targeted organizations worldwide by exploiting a zero-day vulnerability discovered in Barracuda Email Security Gateway (ESG). Mandiant initially detailed the 8-month-long espionage campaign in a blog post on June 15, 2023. The vulnerability, reported as CVE-2023-2868, allows for remote command execution on the target appliance while processing .tar files containing specially crafted file names.
[Read more…] about Chinese Hackers Continue Espionage Campaign Despite Barracuda RemediationVulnerabilities
Cybersecurity Daily: August 30, 2023
Your daily dose of relevant cybersecurity advisories, industry news, and product updates for August 30, 2023.
Advisories
- VMware Aria vulnerable to critical SSH authentication bypass flaw
- Threat actors started exploiting Juniper flaws shortly after PoC release
- Hacking campaign bruteforces Cisco VPNs to breach networks
- High-Severity Memory Corruption Vulnerabilities Patched in Firefox, Chrome
- Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8
- DreamBus malware exploits RocketMQ flaw to infect servers
- Roblox and Rust Developers Targeted With Malicious Packages
- China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users
- Threat Actors Abuse Google Groups to Send Fake order Notifications
- Attackers can discover IP address by sending a link over the Skype mobile app
- BGP Flaw Can Be Exploited for Prolonged Internet Outages
Weekly Malware Roundup – August 29, 2023
This is the GreyKeep Security Malware Roundup for August 29, 2023. Here’s a summary of what’s in this week’s edition:
Targets
MacOS Adobe ColdFusion MOVEit Transfer WinRAR Openfire XMPP Ivanti Sentry Roblox | Juniper SRX Cisco Nexus 3000/9000 (NX-OS) Citrix NetScaler Barracuda ESG EsafeNet Cobra DocGuard IoT devices |
Organizations
U.S. government Rust developers Roblox developers | Taiwan Hong Kong Metropolitan Police Service |
Ransomware Campaign Targeting MOVEit Impacts 60 Million People
As reported by security research firms Emsisoft and Resecurity, as many as 1,000 organizations and 60 million individuals have been affected by the recent ransomware campaign targeting a SQL injection vulnerability (CVE-2023-34362) in the MOVEit Transfer web application. An attacker can exploit the vulnerability to access file transfers without authentication.
[Read more…] about Ransomware Campaign Targeting MOVEit Impacts 60 Million PeopleCybersecurity Daily: August 24, 2023
Your daily dose of relevant cybersecurity advisories, industry news, and product updates for August 24, 2023.
For the latest news on malware and ransomware, check out our weekly Malware Roundup.
Advisories
- More than 3,000 Openfire servers exposed to attacks using a new exploit
- Hackers use public ManageEngine exploit to breach internet org
- New stealthy techniques let hackers gain Windows SYSTEM privileges
- New Variant of XLoader macOS Malware Disguised as ‘OfficeNote’ Productivity App
- Ivanti Issues Fix for Critical Vuln in Its Sentry Gateway Technology
- Adobe Patches Critical Deserialization Vulnerability, but Exploits Persist
- New Juniper Junos OS Flaws Expose Devices to Remote Attacks – Patch Now
- Akira ransomware gang spotted targeting Cisco VPN products to hack organizations
- FBI: Patches for Recent Barracuda ESG Zero-Day Ineffective
- Traders Targeted by Cybercriminals in Attack Exploiting WinRAR Zero-Day
- Rockwell ThinManager Vulnerabilities Could Expose Industrial HMIs to Attacks
- New Telegram Bot “Telekopye” Powering Large-scale Phishing Scams from Russia
- TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwords
- Apache XML Graphics Batik Flaw Exposes Sensitive Information
- FBI Warns of Cryptocurrency Heists by North Korea’s Lazarus Group
- Attackers Dangle AI-Based Facebook Ad Lures to Hijack Business Accounts