{"id":15811,"date":"2023-03-03T13:37:05","date_gmt":"2023-03-03T20:37:05","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=15811"},"modified":"2023-04-19T03:15:44","modified_gmt":"2023-04-19T10:15:44","slug":"securins-threat-intelligence-feb-27-2023-mar-3-2023","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securins-threat-intelligence-feb-27-2023-mar-3-2023\/","title":{"rendered":"Securin’s Threat Intelligence: Feb 27, 2023 – Mar 3, 2023"},"content":{"rendered":"\t\t
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
The notorious Lazarus APT group (origin: North Korea) is found to have been using a new backdoor, WinorDLL64 in a recent attack campaign in South Korea. WinorDLL64 can perform file manipulation, such as exfiltrating, overwriting, and removing files. Apart from this, it can also execute additional commands and acquire extensive system information. The group exploited CVE-2021-21551<\/a>, Dell dbutil Driver\u2019s insufficient access control vulnerability to gain initial access. The WinorDLL64 campaign technique overlaps with Lazarus\u2019 previous attack campaign Operation GhostSecret. The loader for it is virtualized by the Oreans\u2019 Code Virtualizer, which is a commercial protector that is used frequently by Lazarus.<\/p> CVE Details<\/strong><\/p> CVE: CVE-2021-21551<\/p> CVSS: 7.8<\/p> CWE ID: CWE-285<\/p> Exploit Type: RCE,PE,WebApp<\/p> Affected Product Count: 1<\/p> Patch Link:\u00a0Download<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t On February 27, 2023, CISA added the R1Soft Server Backup Manager vulnerability CVE-2022-36537<\/a> to the Known Exploitable Vulnerabilities database. This vulnerability allows an attacker to bypass authentication and even remotely execute code in R1Soft server software and its connected backup agents. It is currently being exploited by the attackers in the wild prompting the CISA to take notice of this and add it to the KEV list.<\/p> We had warned you about this threat in our last week\u2019s\u00a0<\/span>threat intelligence blog<\/a>. We again urge users to patch this vulnerability as soon as possible.\u00a0<\/span><\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t RIG exploit kit was first released in 2014 and has been used as a malware distributor since then. It is a set of malicious JavaScript scripts embedded in compromised or malicious websites by the threat actors, which are then promoted through malvertising. The RIG kit was taken down in 2017 and most of its operations were halted. However, in 2019, RIG began ransomware distribution for Sodinokibi (REvil), Nemty, and ERIS ransomware. It also exploited CVE-2020-0674<\/a> and CVE-2021-26411<\/a> in Internet Explorer to achieve this. Now, the RIG kit is found to be dropping the Redline information-stealer malware onto victims. It is targeting enterprise devices that still use Internet Explorer. The RIG exploit is also distributing Dridex, SmokeLoader, RaccoonStealer, Zloader, Truebot, and IcedID malware. Enterprises that use the outdated Internet Explorer browser should immediately switch to another browser to avoid falling victim to ransomware attacks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Kaiji is a botnet written in the GO language. It was discovered in 2020 and its variant is called Chaos. Recently, it was discovered that this botnet is related to Ares, a hacking group that rents botnets. Some of their popular botnets are\u00a0 Mirai, Moobot, and Lucifer. They\u2019ve been used to launch DDoS attacks and crypto-mining activities (by distributing XMRig). Chaos uses stolen SSH keys to infect vulnerable devices with brute force attacks. It can run on both Linux and Windows devices. Chaos establishes persistence and connects to an embedded command and control (C&C) server. Next, it receives staging commands, such as to start propagation via known CVEs or SSH, or to begin IP spoofing. On infected Windows systems, the malware first creates a mutex by binding to a UDP port that it shields from analysis. If the binding fails, the malware exits its process. It also executes a number of commands to further comprise the infected device, launch DDoS attacks and mine crypto currency.\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t It was recently discovered that BlackLotus, a UEFI bootkit can bypass UEFI Secure Boot on fully updated systems. This is the first instance of a malware that can perform this action.\u00a0\u00a0<\/p> BlackLotus exploits a security flaw CVE-2022-21894<\/a> (aka Baton Drop) which allows arbitrary code execution during early boot phases, permitting a threat actor to carry out malicious actions on a system with UEFI Secure Boot enabled without having physical access to it. It also enables Bring Your Own Vulnerable Driver (BYOVD) attacks by bringing own copies of legitimate\u00a0 and vulnerable binaries to the system in order to exploit CVE-2022-21894<\/a>. Validly signed binaries have still not been added to the UEFI revocation list which makes it possible for BlackLotus to carry out BYOVD attacks.\u00a0<\/p> CVE-2022-21894 was\u00a0fixed<\/a>\u00a0in Microsoft\u2019s January Patch Tuesday.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-26540<\/a> and CVE-2023-26009 are vulnerabilities in the Houzez Theme plugin used in WordPress. The plugin is used primarily in real estate websites for easy listing management and customer experience enhancement.\u00a0<\/p> CVE-2023-26540<\/a>\u00a0(CVSS v3.1: 9.8) occurs because of a security misconfiguration in the plugin and allows privilege escalation to an unauthenticated attacker.<\/p> CVE-2023-26009<\/a>\u00a0 (CVSS v3.1: 9.8) also allows unauthenticated attackers to perform privilege escalation on sites using the plugin.\u00a0<\/p> PatchStack has fixed these vulnerabilities in the plugin versions 2.7.2 and higher.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t This vulnerability impacts SolarWinds Network Performance Monitor. It allows a remote,\u00a0 authenticated attacker to\u00a0 execute arbitrary code under the security context of SYSTEM by sending crafted requests to an affected server. It has been\u00a0patched<\/a>\u00a0by SolarWinds.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CISCO\u00a0addressed<\/a>\u00a0CVE-2023-20078<\/a> and CVE-2023-20079<\/a> that impacts multiple IP Phone models.<\/p> Both these vulnerabilities are caused by insufficient validation of user-supplied input and can be exploited using maliciously crafted requests sent to the targeted device’s web-based management interface.<\/p> Users of CISCO\u00a0 IP Phones should ensure that these vulnerabilities are patched immediately.<\/strong><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Follow our weekly Threat Intelligence Series and podcast for proactive alerts on trending threats.<\/p>CISA Adds CVE-2022-36537 to the KEV Catalog<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
The Very Active RIG Exploit Kit <\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Ares Hacking Group uses Kaiji Botnet in Attacks<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
BlackLotus Bypasses UEFI Secure Boot<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Critical Flaws in WordPress<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2022-38108: SolarWinds Vulnerability<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Critical Vulnerabilities in CISCO<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t