Skip to content

Cyber Threat Weekly – #22

Derek Krein
5 min read

The week of April 15th through April 21st was heavier than the last couple of weeks with 424 cyber news articles reviewed.  With a large amount of cyber threat trend and adversarial behavior news available, really got selective this week.  Let’s start with LockBit maybe trying to rebrand.

Third-party data breach, Cisco Duo warns.  A new LockBit variant can self-propagate.  An interesting point of view on identity threat exposures.  Exploit code available for Palo Alto zero-day, now patched.  Bug in PuTTY leaks private keys.

Botnets are still after small office home office (SOHO) routers.  Large scale brute force campaign against many VPN and SSH services on multiple vendors.  2024 Bad Bot Report from Imperva.  Critical bugs in Ivanti Avalanche MDM solution.

Criminals offer T-Mobile and Verizon employees money for sim-swaps.  Researchers share insights into junk ransomware.  More malvertising targeting IT folks.  Threat actors targeting Kubernetes.  MITRE breached via Ivanti zero-day flaws.

This week in ransomware April 19th.

Broken Record Alert:  Please Patch N-Day Flaws!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

We should consider what is exposed to the Internet.  Let’s remove some of the low hanging fruit threat actors continue to target.

Is LockBit Now Dark Vault?

It appears LockBit may have screwed up their rebrand to Dark Vault and got caught.

Warning from Cisco Duo, Third-Party Data Breach

Currently Cisco is saying 10% of its more than 100,000 customers are affected.  We know how these things can change quickly, worth keeping an eye on if you use Cisco Duo for MFA.

In the Wild LockBit Variant Can Self-Spread

Let’s hope we don’t see more ransomware variants like this sample analyzed by researchers.

Identity Threats Revealed

Identity and access management is the foundation of zero-trust security and the new perimeter, this is an interesting report.  Continuous threat exposure management is being shared by Gartner; this is another use case to add.  Labeled Identity Threat Exposures (ITE’s), it’s another thing to think about.

Palo Alto N-Day Flaw, Exploit Code Released

Proof of concept code was released and detailed analysis of the bug shared a day after patches were released.  Are researchers trying to help the community or arm the adversaries?

SSH Client PuTTY Vulnerability Allows Private Key Recovery

Tracked as CVE-2024-31497, this flaw affects other software that utilizes PuTTY.

TP-Link Archer AX21 is Under Attack

As shared previously, both nation state and cyber criminal threat actors are targeting SOHO routers, it appears the same botnets are at it again.  Significant spikes in exploit attempts have been observed from Moobot and others.

Cisco Talos Reports on Massive Brute Force Campaign

Targeting vendors such as Cisco, Fortinet, CheckPoint, SonicWall and more.  The activity appears to be opportunistic in nature.   Cisco is observing a global increase in brute force attacks.

Bad Bots Account for 32% of Internet Traffic

The 2024 Imperva Bad Bot Report provides detailed analysis of bad bot traffic.  Bad bot traffic from residential ISPs grew 26%, coincides with the continued threat intel on threat actors going after SOHO routers.

Ivanti Released Fixes for 27 Flaws, Two Critical

Updates for their Avalanche mobile device management solution are available.  So far, there is no evidence of exploitation.

$300 offered to T-Mobile and Verizon Employees for Sim Swaps

Multiple carrier’s employees are getting text messages with cash offers to facilitate sim swaps.  With so many organizations using SMS for multi-factor authentication, this can be bad.  It appears opportunistic in nature.

Junk Ransomware on the Dark Web

Researchers share 19 varieties of low-quality ransomware found across four forums.

Researchers Expose New Backdoor Delivered via Malvertising

This is a similar campaign to some shared previously, only with several legitimate IP scanners and a previously unseen backdoor.  Researchers share detailed analysis.

Kubernetes Workloads Targeted via OpenMetadata Bugs

Researchers shar analysis of an attack campaign.

Ivanti Zero-Day Bugs Lead to MITRE Breach

MITRE shares information on the breach into their unclassified research and development network.

April 19th, This Week in Ransomware

Ransomware attacks are starting to ramp up again.

Member Reactions
Reactions are loading...

Sign in to leave reactions on posts


Sign in to join the conversation.
Just enter your email below to receive a login link.

Related Posts

Members Public

Cyber Threat Weekly – #33

The week of July 1st through July 7th was back down to 379 cyber news articles reviewed.  A relatively light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with an unprecedented password dump, nearly 10 billion unique passwords. HTTP File Server (HFS) Remote Code

Members Public

Cyber Threat Weekly – #32

The week of June 24th through June 30th picked up with 439 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with Juniper releases fix for critical authentication bypass bug. Run pipelines as any user in GitLab, critical

Members Public

Cyber Threat Weekly – #31

The week of June 17th through June 23rd was lighter than usual with 342 cyber news articles reviewed.  Only a moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with the CDK Global IT outage caused by BlackSuit ransomware. Outdated Android phones targeted by