Skip to content

Cyber Threat Weekly – #28

Derek Krein
6 min read

The week of May 27th through June 2nd was a bit light with only 381 cyber news articles reviewed.  Still a decent amount of cyber threat trend and adversarial behavior news to share.  Let’s start with new phishing tricks.  Threat actors advertising Pulse Connect Secure zero-day.

The use of legitimate software by threat actors continues.  Patched in February, exploit and technical deep dive for FortiSIEM flaw released.  New state sponsored North Korean threat actors discovered.  Check Point VPNs Targeted. 

Researchers analyze BlackSuit ransomware attack.  Credential stuffing attack against Okta’s CORS feature.  Windows Defender bypass tool shared on GitHub.  Previously unreported threat actor LilacSquid discovered. 

Researchers observe spike in activity against Internet exposed OT devices.  APT28 (aka BlueDelta) espionage campaign targets Europe.  Researchers are up in arms about Microsoft Copilot+ Recall feature.  Actively exploited Linux privilege escalation flaw.

Threat actors stole authentication tokens from AI platform Hugging Face.  BitRAT and Lumma Stealer delivered via fake browser updates.

Broken Record Alert:  Please patch N-day bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

We should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices exposed to the Internet.

CISA Known Exploited Vulnerabilities for May 27th to June 2nd:

CVE-2024-5274 – Google Chromium V8 Type Confusion Vulnerability:
Allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

CVE-2024-4978 – Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability:
Justice AV Solutions (JAVS) Viewer installer contains a malicious version of ffmpeg.exe, named fffmpeg.exe.  When run, this creates a backdoor connection to a malicious C2 server.

CVE-2024-1086 – Linux Kernel Use-After-Free Vulnerability:
Allows an attacker to achieve local privilege escalation.

CVE-2024-24919 – Check Point Quantum Security Gateways Information Disclosure Vulnerability:
Allows an attacker to access information on Gateways connected to the internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled.

CVE-2017-3506 – Oracle WebLogic Server OS Command Injection Vulnerability:
Allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.

Phishing Tricks, Threat Actor Innovation Continues

Researchers share several techniques recently used in phishing campaigns.  From adversary-in-the-middle (AitM) with Cloudflare Workers, HTML smuggling, phishing-as-a Service (PHaaS) tools like Greatness, to very large file sizes.

Ivanti Pulse Connect Secure Zero-Day for Sale

Researchers discover a remote code execution (RCE) zero-day exploit for sale on dark web forums.  With the assault on Ivanti the last several months, this is one to keep an eye on if you use Ivanti Pulse Connect Secure.

Legit Remote Management Software Abuse by Russian Threat Actors

The trend continues, legitimate software used in attack campaigns.  It is the behavioral pattern that is interesting here.  A python clone of the video game Minesweeper led to legitimate SuperOps remote monitoring and management software installation.

Patched FortiSIEM Remote Code Execution (RCE) Bug, Exploit Released

Researchers release proof of concept exploit code and technical deep dive for CVE-2024-23108.  The good news is that patches have been available for over 3 months.

North Korean Threat Actors Financially and Espionage Motivated

Researchers detect new state backed threat actors focused on collecting intelligence and financial gain.  Some state backed hackers fund themselves through ransomware and other financial gain campaigns.  Time will tell.  Sometimes ransomware is deployed to cover tracks.

Threat Actors Going After Check Point VPNs with Zero-Day Flaw

The trend continues, threat actors targeting VPNs and remote access capabilities.  Originally Check Point thought the weakness was in local accounts that are password only.  Turns out there is a zero-day bug, emergency hot fix released.

Researchers Analyze BlackSuit Ransomware TTPs

Consistent use of commodity TTPs and the high success rate indicates the challenge in defending against them.  With similarities between “Royal” and its reported successor “Conti”, BlackSuit appears to be technically proficient and experienced.

Customers Targeted in Credential Stuffing Attacks Against Okta’s CORS Feature

Okta shares recommended actions against ongoing credential stuffing attacks.

Researcher Shares Windows Defender Bypass Tool

The good ish news is that it requires admin privileges to run the tool.  The bad news, if a researcher can do it, so can threat actors.  The researcher reverse engineered an undocumented API using Avast and its wsc_proxy.exe service.

LilacSquid Espionage Threat Actor Discovered

Researchers share analysis of suspected advanced persistent threat actor LilacSquid.  Appearing to be active since at least 2021.

Spike Observed in Internet Exposed OT Device Activity

Researchers observe increased attacks focused on poorly secured OT devices exposed to the Internet.  The lesson here is that we need to stop exposing unnecessary devices to the Internet.  Architecture and zero trust network access would solve some of these challenges.

Europe Targeted by APT28 Espionage Campaigns

Multiphase campaigns targeting Ukraine and allies observed, researchers share analysis.

Copilot+ Recall Feature, a Security Nightmare

To be fair, vendors are rushing to take advantage of AI.  Looking at functionality only, it’s cool to find anything you’ve ever looked at quickly.  When we look at security, a genuinely personal experience is open to prying eyes and researchers have already proven infostealers can steal all the data.  This is a boon for threat actors, far more data than a typical info grab.

Actively Exploited Linux Privilege Escalation Bug

CISA added CVE-2024-1086 to the Known Exploited Vulnerabilities (KEV) catalog.  A proof of concept (PoC) exploit and detailed write up has been released.

Secrets Stolen from AI Platform Hugging Face Spaces

Hugging Face detected unauthorized access to their Spaces platform allowing threat actors to access authentication tokens.

Researchers Analyze Fake Browser Updates Delivering Malware

BitRAT and Lumma Stealer are being delivered via fake browser updates.  Researchers share analysis.

Member Reactions
Reactions are loading...

Sign in to leave reactions on posts


Sign in to join the conversation.
Just enter your email below to receive a login link.

Related Posts

Members Public

Cyber Threat Weekly – #33

The week of July 1st through July 7th was back down to 379 cyber news articles reviewed.  A relatively light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with an unprecedented password dump, nearly 10 billion unique passwords. HTTP File Server (HFS) Remote Code

Members Public

Cyber Threat Weekly – #32

The week of June 24th through June 30th picked up with 439 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with Juniper releases fix for critical authentication bypass bug. Run pipelines as any user in GitLab, critical

Members Public

Cyber Threat Weekly – #31

The week of June 17th through June 23rd was lighter than usual with 342 cyber news articles reviewed.  Only a moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with the CDK Global IT outage caused by BlackSuit ransomware. Outdated Android phones targeted by