{"id":15789,"date":"2023-02-24T09:17:11","date_gmt":"2023-02-24T16:17:11","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=15789"},"modified":"2023-04-19T03:19:50","modified_gmt":"2023-04-19T10:19:50","slug":"securins-threat-intelligence-feb-20-2023-feb-24-2023","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securins-threat-intelligence-feb-20-2023-feb-24-2023\/","title":{"rendered":"Securin’s Threat Intelligence: Feb 20, 2023 – Feb 24, 2023"},"content":{"rendered":"\t\t
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Earth Kitsune is a new threat actor known for targeting North Korean entities. In a recent campaign, researchers have found that the group is using a new backdoor known as WhiskerSpy. This malware was delivered to the victims\u2019 devices when they tried to watch videos on a malicious website. The attacker compromised the website and injected a malicious script that asked the victim to install a video codec for the media to run. This tactic is known as a watering hole attack. WhiskerSpy can perform a number of actions including: interactive shell, download file, upload file, delete file, list files, take screenshot, load executable and call its export, and inject shellcode into a process.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
On February 22, 2023, the US Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2022-47986<\/a>, CVE-2022-41223<\/a>, and CVE-2022-40765<\/a> to the Known Exploitable Vulnerabilities catalog.\u00a0<\/p> CVE-2022-47986<\/a> is the IBM Aspera Faspex remote code execution vulnerability that could allow a remote attacker to execute arbitrary code in a compromised system. There is evidence that this vulnerability is actively exploited in the wild, especially after a proof of concept for the exploit was released.\u00a0<\/p><\/li><\/ul> We warned our customers regarding this vulnerability in last week\u2019s\u00a0threat intelligence blog<\/a>.<\/p> CVE-2022-41223<\/a> and CVE-2022-40765<\/a> impact Mitel\u2019s MiVoice Connect product. These code and command injection vulnerabilities allow an authenticated attacker with internal network access to execute arbitrary code. Mitel\u00a0patched<\/a>\u00a0these vulnerabilities in October 2022 but they still are targeted by attackers.<\/p><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Sidewinder (AKA Rattlesnake) is an Indian APT group that has been active since 2012. It carries out cyber espionage campaigns in Asian countries such as China, Pakistan, Bangladesh , etc. In a recent attack the group targeted Chinese scientific research universities and institutions using phishing emails with malicious attachments. In addition to this, they\u2019ve also used template injection to deliver malicious documents and launched attacks on the Pakistani government, military and other units. The group is suspected to download trojan horses in every download to carry out subsequent attacks. To gain initial access, Sidewinder has exploited\u00a0\u00a0CVE-2017-11882<\/a>. It is a Microsoft Office memory corruption vulnerability. It has over 1500 exploits and is associated with 8 ransomware strains.\u00a0<\/p> CVE Details<\/strong><\/p> CVE: CVE-2017-11882<\/p> CVSS: 9.3<\/p> CWE ID: CWE-119<\/p> Exploit Type: RCE,PE,WebApp<\/p> Affected Product Count: 4<\/p> APT Associations: Swede, Lone Wolf, and 21 others<\/p> Ransomware Associations: Zemblax, Fake Globe, and 6 others<\/p> Patch Link:\u00a0Download<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Fortinet fixed two critical remote code execution flaws in its products.<\/p> CVE-2022-39952<\/a>\u00a0affects FortiNAC. It has a critical rating of 9.8 on the CVSS scale. An external control of file name or path vulnerability [CWE-73] in FortiNAC web server may allow an unauthenticated attacker to perform arbitrary write on the system using this vulnerability.<\/p> Update<\/strong>: Threat actors are actively exploiting CVE-2022-39952 targeting Internet-exposed Fortinet appliances. They\u2019ve been observed using corn jobs to open reverse shells to attackers’ IP addresses after gaining initial access.\u00a0<\/p> CVE-2021-42756<\/a>\u00a0affects FortiWeb and it has 9.3 on the CVSS scale. Multiple stack-based buffer overflow vulnerabilities [CWE-121] in FortiWeb’s proxy daemon may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests.\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-20858<\/a> is a vulnerability in VMware\u2019s Carbon Black App Control product. It rates 9.1 on the CVSS scale. An authenticated threat actor with access to the App Control administration console may be able to use specially crafted input allowing access to the underlying server operating system. VMware released a\u00a0security advisory<\/a>\u00a0for this vulnerability and urged users to update to versions 8.7.8, 8.8.6, and 8.9.4 to mitigate potential risks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-23530<\/a>, CVE-2023-23531<\/a>, and CVE-2023-23520<\/a> were recently disclosed by Apple in a\u00a0security advisory<\/a>.\u00a0<\/p> CVE-2023-23530<\/a> is due to a race condition in the\u00a0 Crash Reporter component. If exploited, it could enable a malicious actor to read arbitrary files as root.\u00a0<\/p><\/li> CVE-2023-23531<\/a> and CVE-2023-23520<\/a> are present in the Foundation Framework. They could allow an attacker to remotely execute code in the compromised device.<\/p><\/li><\/ul> All three are classified as medium severity vulnerabilities.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2022-36537<\/a> is actively being exploited by deploying backdoors. It is a vulnerability in the ZK Java Framework that R1Soft Server Backup Manager utilizes. An attacker can exploit it to bypass authentication and even remotely execute code in R1Soft server software and its connected backup agents. In one of the recent attacks, researchers discovered that the vulnerability was used to gain initial access and drop a malicious JDBC driver. This driver can load new functionalities in memory and execute commands. ZK released a\u00a0security advisory<\/a>\u00a0for this vulnerability and recommends users to patch it as soon as possible.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Follow our weekly Threat Intelligence Series and podcast for proactive alerts on trending threats.<\/p>Indian APT Group Sidewinder Targets Educational Institutions<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2022-39952 and CVE-2021-42756: Critical Flaws in Fortinet<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-20858: Critical VMware Vulnerability <\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Critical Vulnerabilities in Apple OS<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2022-36537: Vulnerability in R1Soft Server Backup Manager<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t