{"id":16593,"date":"2023-03-24T07:35:36","date_gmt":"2023-03-24T14:35:36","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=16593"},"modified":"2023-04-27T08:42:00","modified_gmt":"2023-04-27T15:42:00","slug":"securins-threat-intelligence-mar-20-2023-mar-24-2023","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securins-threat-intelligence-mar-20-2023-mar-24-2023\/","title":{"rendered":"Securin’s Threat Intelligence: Mar 20, 2023 – Mar 24, 2023"},"content":{"rendered":"\t\t
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t As seen before, Chaos is a Go-based malware and a variant of Kaiji botnet malware. It is being used as a ransomware strain, a remote access trojan (RAT), and also a DDoS malware variant. There have been wide sightings of multiple variants of this malware in the wild. It is constantly upgraded with the threat actors trying to develop a variant that persists even after a container reboot. Thus far, the malware is powerful in terms of persistence but is unable to survive a container reboot. Chaos is deployed in devices that are compromised after exploiting CVE-2017-17215<\/a>, CVE-2022-30525<\/a>, and CVE-2022-1388<\/a>. To avoid falling victim to Chaos, users are recommended to patch the mentioned vulnerabilities.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Hinata is a new malware botnet that is targeting\u00a0 Realtek SDK, Huawei routers, and Hadoop YARN servers. It is used by threat actors to launch powerful DDoS attacks. It is even capable of\u00a0 sending HTTP packets of size range between 484 and 589 bytes. The UDP packets generated by HinataBot are particularly large (65,549 bytes) and consist of null bytes capable of overwhelming the target with a large traffic volume. Hinata may be based on the Mirai botnet and is developed using the Go language. This malware was discovered exploiting old CVEs such as CVE-2014-8361<\/a> and CVE-2017-17215<\/a>. CVE-2014-8361<\/a> is a vulnerability in the Realtek SDK that can be exploited to perform\u00a0 arbitrary code execution. It has 7 publicly exposed exploits. Given below is the timeline of the CVE. From this, we can see that our analysis tool marked this as highly exploitable in Dec 2017 itself.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2017-17215<\/a> is a vulnerability in Huawei HG532.\u00a0 An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Our ML based analytical tool has been mapping the exploits of this CVE. The predictive VRS of this vulnerability has been continuously at the highest range since Jul 2020.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Following the exploitation of the Mark-of-the-Web vulnerability (CVE-2022-41091<\/a>), Microsoft had blocked Excel-4 and VBA macros downloaded from unknown sources on the internet. The threat actors behind QakBot found a way to bypass this restriction by using OneNote attachments with malicious files. In the latest phishing campaign, OneNote attachments were initially embedded with HTML Application (.HTA) files, capable of executing JavaScript, Jscript and VBScript. They were then used to deploy malware samples and further exploit the compromised systems.\u00a0<\/p> QakBot’s campaign is a reminder for us to verify the legitimacy of emails and attachments before downloading them onto our devices.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t A new threat actor tracked as UNC961 was found targeting organizations between December 2021 and July 2022. They were exploiting internet-facing servers and vulnerabilities for which the exploits were already publicly available. One of their famous exploits is the Log4Shell (<\/span>CVE-2021-44228<\/span><\/a>) vulnerability. UNC961 has also targeted Atlassian Confluence (<\/span>CVE-2021-26084<\/span><\/a>), Citrix ADC (<\/span>CVE-2019-19781<\/span><\/a>), Oracle WebLogic (<\/span>CVE-2020-14750<\/span><\/a>), Gitlab (<\/span>CVE-2021-22205<\/span><\/a>). After initial access was achieved, they exfiltrated sensitive data, including network reconnaissance and credential information that could be sold or used in support of follow-on missions. The attacks were usually followed by MAZE and EGREGOR ransomware deployments. The threat actors seem financially motivated and are also going for low-hanging fruits in terms of exploits.\u00a0<\/span><\/p> All the above mentioned vulnerabilities have patches and organizations should ensure that they are applied.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CVE-2023-0179<\/a> is a local privilege escalation vulnerability in the Linux kernel. An attacker can exploit this vulnerability to execute code on vulnerable computers with elevated rights if the kernel is installed on those systems. A proof of concept has also been released for this vulnerability. Ubuntu has patched<\/a> this CVE in the latest release.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t 4 new vulnerabilities have been discovered in the special mobile phone networking firmware that runs on the phone\u2019s baseband chip. An attacker can break into the phone network system as well as the phone’s main operating system to control it. One of the bugs is tracked as CVE-2023-24033<\/a> and could allow remote code execution without user interaction.\u00a0<\/p> Google has fixed these bugs in the latest update<\/a> and recommends users to apply it immediately.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t CloudPanel has 3 issues reported in its software. The first issue is regarding the authenticity verification of the installation script provided by the vendor. Since it is not properly verified, an attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.<\/p> The second bug allows the installer to overwrite local firewall rules and use an excess number of allowed inputs during setup.<\/p> The third issue, CVE-2023-0391<\/a> in the CloudPanel software allows all installations to share the same SSL certificate private key which the attackers can use to gain access to the victim\u2019s account.\u00a0<\/p> The firewall bug and the private key bug can be chained together and exploited to take over new CloudPanel instances as they are being deployed.\u00a0<\/p> CloudPanel is yet to address these issues and release fixes.<\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t The Microsoft zero-day vulnerability CVE-2023-23397<\/a> is a cause for concern as it is very easy to exploit. Moreover, it allows the hackers access to Net-NTLMv2 hashes, which enable authentication in Windows environments. Attackers can use this to authenticate themselves as the victims, escalate privileges, or further compromise the environment. This vulnerability impacts all supported versions of Microsoft Outlook for Windows including the locally installed Outlook from M365. Other versions of Microsoft Outlook such as Android, iOS, Mac as well as Outlook on the web and other M365 services on the web are not affected.<\/span><\/p> Users need to immediately <\/b>patch<\/b><\/a> this vulnerability if they use Microsoft Outlook for emails and calendar.<\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Proof-of-concept exploits for 4 vulnerabilities in Netgear\u2019s Orbi 750 series router and extender satellites have been released.\u00a0<\/span><\/p> CVE-2022-37337<\/span><\/a> is a remotely exploitable command execution vulnerability in the access control functionality of the Netgear Orbi router. An attacker can exploit publicly accessible admin consoles by sending a specially-crafted HTTP request to the vulnerable router to execute arbitrary commands on the device.<\/span><\/p> CVE-2022-38452<\/span><\/a> is a high-severity remote command execution vulnerability in the router\u2019s telnet service. The flaw\u2019s exploitation requires valid credentials and a MAC address.\u00a0<\/span><\/p> CVE-2022-36429<\/span><\/a>, a high-severity command injection in the backend communications functionality of the Netgear Orbi Satellite, which links to the router to extend the network coverage. An attacker can exploit this flaw by sending a sequence of specially-crafted JSON objects to the device. However, retrieving an admin token is required for the attack to work.<\/span><\/p>Why play catch up when you can fix this now?<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Trending Threats<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Trending Threats<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Enhanced Capabilities of the Chaos Malware<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
New Botnet: Hinata<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
QakBot's Latest Campaign Exploits OneNote<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
UNC961: New Threat Actor with Financial Motives<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Vulnerabilities to Watch Out For<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-0179: Linux Vulnerability<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Android Zero-Days\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-0391: MGT-COMMERCE CloudPanel Shared Certificate Vulnerability<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
CVE-2023-23397: Microsoft Outlook Vulnerability\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
PoC Released for Netgear Vulnerabilities\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t