{"id":15007,"date":"2023-02-17T10:32:33","date_gmt":"2023-02-17T17:32:33","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=15007"},"modified":"2023-04-06T15:14:42","modified_gmt":"2023-04-06T22:14:42","slug":"securins-threat-intelligence-feb-13-2023-feb-17-2023","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securins-threat-intelligence-feb-13-2023-feb-17-2023\/","title":{"rendered":"Securin’s Threat Intelligence: Feb 13, 2023 to Feb 17, 2023"},"content":{"rendered":"\t\t
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CISA has taken special notice of the vulnerability now because North Korean nation-state hackers are said to have\u00a0weaponized this exploit<\/a>.\u00a0<\/p> CVE-2023-0669<\/a>\u00a0is the\u00a0GoAnywhere MFT zero-day vulnerability<\/a>\u00a0that hackers are actively exploiting now. Clop ransomware has breached more than 130 organizations by exploiting this vulnerability.<\/p> CVE-2015-2291<\/a>\u00a0impacts Intel ethernet diagnostics driver for Windows (IQVW32.sys and IQVW64.sys). Exploiting this vulnerability can allow an attacker to drive the device into a denial-of-service state. Recently, the Scattered Spider APT group has been exploiting this vulnerability in the wild.\u00a0<\/p> On 14 Feb 2023, CISA added 4 more CVEs to the KEV – CVE-2023-23376, CVE-2023-21715, CVE-2023-21823, and CVE-2023-23529. All these vulnerabilities were added to the KEV catalog after the vendor, Microsoft released patches for them on February Patch Tuesday.<\/p> CVE-2023-23376<\/a>\u00a0is a privilege escalation flaw in Windows common log file system driver. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.<\/p> CVE-2023-21715<\/a>\u00a0is a feature bypass vulnerability in Microsoft Publisher. An authenticated attacker could exploit the vulnerability by convincing a victim, through social engineering and attack the local device.<\/p> CVE-2023-21823<\/a>\u00a0is a Windows graphics component remote code execution vulnerability that can grant SYSTEM privileges to an attacker.<\/p> CVE-2023-23529<\/a>\u00a0is Apple\u2019s type confusion issue that can be exploited for arbitrary code execution by getting the targeted user to access a malicious website. It is actively being exploited now.<\/p> On Feb 16, 2023, CVE-2022-46169<\/a> was also added to the Known Exploitable Vulnerabilities Catalog. This vulnerability is a critical command injection flaw found in the Cacti monitoring solution. It allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. Since an exploit for it was published, attackers have been actively exploiting this vulnerability in Cacti. CVE-2022-46169 was\u00a0patched<\/a>\u00a0in December 2023.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t On 10, Feb 2023, CISA added CVE-2022-24990<\/a>, CVE-2023-0669<\/a>, and CVE-2015-2291<\/a> to the KEV catalog.<\/p> CVE-2022-24990<\/a>\u00a0is the TerraMaster RCE vulnerability that affects their network-attached storage (TNAS) devices. An unauthenticated attack can also execute commands by exploiting this vulnerability. Given below is an image of the vulnerability\u2019s progression since discovery.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t These include 3 actively exploited zero-days – CVE-2023-23376<\/a>, CVE-2023-21715<\/a>, and CVE-2023-21823<\/a>. Other notable fixes include 12 elevation of privilege vulnerabilities, 2 security feature bypass vulnerabilities and 38 remote code execution vulnerabilities.\u00a0<\/p> You can find all the updates\u00a0here<\/a>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t RedEyes AKS ScarCruft has been using a new malware strain called M2RAT in their attacks on individuals for intelligence collection. This new malware uses a shared memory section for commands and data exfiltration and leaves very few operational traces on the infected machine. Initial access to victims\u2019 devices involves phishing emails with malicious attachments. The attachments are sometimes JPG image files which use steganography for malicious activity. Using steganography, attackers can\u00a0 hide code inside image files, to stealthily introduce the M2RAT executable (“lskdjfei.exe”) onto the system and inject it into “explorer.exe.” This malware can perform keylogging, data theft, command execution, and then take screenshots from the desktop. It can also be used to exfiltrate data from phones. Before exfiltration, the stolen data is compressed in a password-protected RAR archive, and the local copy is wiped from memory to eliminate any traces.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Last week we learnt of the zero-day vulnerability in GoAnywhere MFT application, CVE-2023-0669<\/a>. More than 1000 administrative ports of this solution are exposed to the public internet. It is now discovered that the Clop ransomware group has been exploiting this vulnerability to breach servers in around 130 organizations and steal their data. The group claimed that they could even move laterally through their victims\u2019 networks and deploy ransomware payloads to encrypt their systems but resigned to just stealing the data for the time being. There is no news on ransom demands from the group or the affected organizations.<\/p> The MFT vulnerability has received two patches from Forta since its disclosure. One\u00a0emergency patch<\/a>\u00a0was released immediately after the discovery and the other which can be accessible only after logging in with a user account. All GoAnywhere MFT users should apply these patches without delay.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t The Scar rental botnet is a malware service that attackers can buy for low-cost attacks. Their latest development is the GooberBot which exploits CVE-2022-30525<\/a>, CVE-2021-22205<\/a>, and CVE-2021-35394<\/a>.\u00a0 More than 10 products are affected by these vulnerabilities and exploits are also available for CVE-2022-30525 and CVE-2021-22205 . The malware is said to be still in development. There are 3 versions of the malware. In the first version, the botnet communicates with the C2 server in plaintext directly instead of encrypted data. In the next version, an encryption algorithm was used in communication. In the latest version, the single instance check method was changed to determine if the network communication of the C2 server is established.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t This new Chinese APT group calls itself Dalbit (moonlight in Korean) and targets Korean companies. This group relies on open-source tools to profile themselves and sometimes leaves some infected companies as proxies and download servers. They later use them as means to communicate with the threat actor upon infiltration of another company. Dalbit targets small-mid range companies in multiple sectors and exploits them for ransom. Dalbit targets three vulnerabilities:<\/p> CVE-2018-8639<\/a>\u00a0and\u00a0CVE-2019-1458<\/a>: Elevation of privilege vulnerabilities that exist in Windows when the Win32k component fails to properly handle objects in memory.<\/p> CVE-2017-10271<\/a>: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Easily exploitable vulnerability allows unauthenticated attackers with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in the takeover of the Oracle WebLogic Server.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Threat actors are targeting the proxyshell vulnerabilities CVE-2021-34473<\/a> and CVE-2021-34523<\/a> to deliver ProxyShellMiner to Windows endpoints in a highly evasive malware campaign. After initial access and successful delivery of the malware, the attackers compromised the mail servers that host the malware-dependent files. The malware requires a command line parameter to be supplied upon execution. This parameter is later used as a key for the XMRig miner configuration, and as an anti-runtime analysis tactic. The malware uses XMrig (Open source cryptocurrency miner) to mine cryptocurrency in the compromised systems.<\/p> Exchange servers that contain the remote code execution vulnerability\u00a0CVE-2021-34473\u00a0<\/a>and the privilege escalation vulnerability\u00a0CVE-2021-34523<\/a>\u00a0are targeted in these attacks. Organizations using Microsoft Exchange servers should take steps to immediately patch these vulnerabilities.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-23529<\/a>\u00a0 is a WebKit confusion flaw that can allow arbitrary code execution and trigger OS crashes on compromised devices. An attacker can achieve this by sending maliciously crafted web content. Apple addressed this vulnerability with improved checks in iOS\u00a016.3.1<\/a>, iPadOS 16.3.1, and macOS Ventura\u00a013.2.1<\/a>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-25194<\/a> was discovered in Apache Kafka Connect, a free, open-source component of Apache Kafka that operates as a central hub for data integration between systems, databases, and key-value stores. When exploited, it can lead to remote code execution or denial-of-service. However, it can only be triggered when there is access to a Kafka Connect worker \u2013 a logical work unit component \u2013 and the user must also be able to create or modify worker connectors with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol.\u00a0<\/p> Apache released a\u00a0patch<\/a>\u00a0for it and recommends that users update to the latest version.<\/em><\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t This\u00a0 is a YAML deserialization flaw that can be exploited by a remote attacker for arbitrary code execution using specially crafted API calls. It was discovered in October 2022 and\u00a0fixed<\/a>\u00a0in Jan 2023. It is classified as a high-severity vulnerability and more than 100 internet-exposed Aspera Faspex servers are available all over the world. An\u00a0exploit concept<\/a>\u00a0for this vulnerability was recently published making it even more dangerous to leave it unpatched.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t The CVE-2023-20032<\/a> vulnerability is found in the HFS+ file parser component of the antivirus software ClamAV. It has a critical rating of 9.8 on the CVSS scale and affects versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier.\u00a0 If exploited, it could allow an attacker to run arbitrary code with the same privileges as that of the ClamAV scanning process, or crash the process, resulting in a denial-of-service (DoS) condition. CISCO has published an advisory<\/a>\u00a0for this vulnerability.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tCISA Adds 3 New CVEs to the KEV Catalog<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Microsoft Fixes 80 Flaws on February Patch Tuesday<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
New Malware from RedEyes: M2RAT<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Clop Ransomware Exploits GoAnywhere Zero-day to Breach 130 Organizations<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
New Scar Rental Botnet - GooberBot<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
New Chinese APT Group - Dalbit (m00nlight)<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Microsoft Exchange ProxyShell Vulnerabilities Exploited<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Zero-day Vulnerability in Apple\u2019s iPhones, Macs<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-25194: Remote Code Execution Flaw in Apache Kafka<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2022-47986: IBM Aspera Faspex Vulnerability <\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-20032: Critical Flaw in ClamAV Open-Source Antivirus Software<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t