Skip to content

Cyber Threat Weekly – #25

Derek Krein
4 min read

The week of April 6th through April 12th was near average with 428 cyber news articles reviewed. A moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with Tinyproxy critical remote code execution bug. 

Citrix fixes bug nearly identical to CitrixBleed, but not as severe.  Ransomware Summary Q1 2024.  MITRE shares more details on APT attack.  WordPress LiteSpeed Cache Bug exploited.  Microsoft is doubling down on security, be prepared.

A different view of the ransomware economy.  Researchers share an AsyncRAT campaign.  A new research report unveiled sharing the state of asset security across global enterprises.  An interesting report on the use of LLMs for influence operations.

Some ransomware clowns have no morals, no rules of engagement.  Bugs in F5 Networks Big-IP Next.  REMCOS RAT analysis part 4.  The Sophos State of Ransomware 2024 report.  Fifth Google Chrome zero-day this year is fixed.

A good write up on social engineering.  CISA releases AA24-131A – Black Basta Ransomware. 

Broken Record Alert:  Please Patch N-Day Bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  Abuse of N-day vulnerabilities is on the rise.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

We should consider what is exposed to the Internet.  Let’s remove some of the low hanging fruit threat actors continue to target.

CISA Known Exploited Vulnerabilities for May 6th to May 12th:

CVE-2024-4671 - Google Chromium Visuals Use-After-Free Vulnerability:
Allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Critical Remote Code Execution Vulnerability in Tinyproxy

More than 50,000 devices exposed to the Internet are vulnerable, the majority in the US.  Why do we keep exposing services to the Internet that should not be exposed?

High Severity NetScaler ADC and Gateway Bug Fixed by Citrix

Citrix addressed the bug earlier this year in version 13.1-51.15 but did not assign a CVE identifier.

Q1 2024 Ransomware Summary

A quick look at top stats for ransomware.  Worth the quick read.  Key stat, a record breaking Q1 with 192 disclosed ransomware attacks and 1,000 undisclosed.

Five Unique Payloads Used Against MITRE

MITRE was hit before the initial disclosure of the Ivanti vulnerabilities.  Zero-day bugs allowed initial access.  MITRE provides a nice timeline of events.

Threat Actors Targeting WordPress LiteSpeed Cache Plugin

Attackers creating administrator accounts abusing the plugin allowing for complete site take over.  The bummer, compromised WordPress sites are a favorite for threat actors to hide in plain sight.  The target opportunity is significant at over 1.8 million.  In addition, email Subscribers plugin is targeted too.

Get Ahead of Microsoft Security Changes

Legacy systems are on the chopping block, Microsoft is focusing on security after the scathing Cyber Safety Review Board report.

Researchers Share the Financial Side of Ransomware Disruptions

Chain analysis provides an interesting look at ransomware economics, the good news we are winning currently.  Less organizations are paying the ransom, and the average ransom is on the decline.

Novel AsyncRAT Infection Chain Analysis

Researchers share the multifaceted infection chain lacking portable executables.

runZero Research Report

With attack surfaces growing, this research provides a unique perspective into assets and the attack surface.

Russian Threat Actors Using LLMs for Influence Operations

Threat actors are using generative AI to plagiarize mainstream media to support Russian objectives.

Psychological Attacks are the New Ransomware Clown Norm

You know it’s bad when extortionists go after victims and kids of execs.

F5 Big-IP Next Flaws

Multiple vulnerabilities allow full takeover and hidden accounts.

Analyzing REMCOS RAT Part 4

Detection and hunting are the focus of this analysis.

The State of Ransomware 2024

Researchers present the findings of 5,000 individuals surveyed.

Security Update for Fifth Google Chrome Zero-Day Exploited in 2024

An exploit exists in the wild, this is one to patch asap.

Hacking the Human, Social Engineering

Social engineering is used quite often in attack campaigns, here is a nice refresher.

CISA AA24-131a – Black Basta Ransomware

Black Basta affiliates are a prolific threat, this advisory provides details to help defend your organization.

Member Reactions
Reactions are loading...

Sign in to leave reactions on posts


Sign in to join the conversation.
Just enter your email below to receive a login link.

Related Posts

Members Public

Cyber Threat Weekly – #33

The week of July 1st through July 7th was back down to 379 cyber news articles reviewed.  A relatively light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with an unprecedented password dump, nearly 10 billion unique passwords. HTTP File Server (HFS) Remote Code

Members Public

Cyber Threat Weekly – #32

The week of June 24th through June 30th picked up with 439 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with Juniper releases fix for critical authentication bypass bug. Run pipelines as any user in GitLab, critical

Members Public

Cyber Threat Weekly – #31

The week of June 17th through June 23rd was lighter than usual with 342 cyber news articles reviewed.  Only a moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with the CDK Global IT outage caused by BlackSuit ransomware. Outdated Android phones targeted by