Skip to content

Cyber Threat Weekly – #49

Derek Krein
5 min read

The week of October 21st through October 27th around 361 cyber news articles were reviewed.  Just a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with ransomware affiliates abusing Sonic Wall VPNs.

An update on the Windows downgrade attack.  Threat actors targeting exposed Docker daemons.  Black Basta ransomware operation shifting social engineering techniques.  The notorious APT29 carries out a broad phishing campaign.

Scattered Spider teams up with RansomHub, not good.  A new Qilin ransomware variant.  Fortinet Fortimanager critical bug exploited.  Researchers share incident response Q3 2024 trends.  Windows server “WinReg” attack, exploit released.

Open-source phishing toolkit abused by threat actors. 


Broken Record Alert: Please patch N-day bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

You should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices exposed to the Internet.


CISA Known Exploited Vulnerabilities for October 21st to October 27th:

CVE-2024-9537 – ScienceLogic SL1 Unspecified Vulnerability:
Affected by an unspecified vulnerability involving an unspecified third-party component.

CVE-2024-38094 – Microsoft SharePoint Deserialization Vulnerability:
Allows for remote code execution.

CVE-2024-47575 – Fortinet FortiManager Missing Authentication Vulnerability:
Allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.

CVE-2024-37383 – RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability:
Allows a remote attacker to run malicious JavaScript code.

CVE-2024-20481 – Cisco ASA and FTD Denial-of-Service Vulnerability:
Allows an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service.


SonicWall VPNs Targeted in Ransomware Attacks

Researchers observe Fog and Akira ransomware affiliates possibly exploiting CVE-2024-40766 and legit credentials.  Interestingly, the time on target ranged from 1.5 hours to 10 hours in most cases, before data encryption.  Lack of MFA continues to be an issue. 

https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/

https://arcticwolf.com/resources/blog/arctic-wolf-labs-observes-increased-fog-and-akira-ransomware-activity-linked-to-sonicwall-ssl-vpn/

https://arcticwolf.com/resource/security-operations-report/arctic-wolf-security-operations-report-2024


Windows Downgrade Attack Update

A researcher shared the Downgrade attack at BlackHat and Defcon 2024.  There is a tool available.  This update walks through another method to bypass Driver Signature Enforcement (DSE) and target the kernel. 

https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/

https://www.safebreach.com/blog/update-on-windows-downdate-downgrade-attacks/


Threat Actors Target Docker Environments for Cryptojacking

TeamTNT is preparing a new large-scale campaign.  Using tools such as masscan and ZGrab scanning for unauthenticated and exposed Docker daemons.  The group uses infected Docker endpoints for cryptojacking and selling the infrastructure on mining rental platforms.

https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html

https://www.aquasec.com/blog/threat-alert-teamtnts-docker-gatling-gun-campaign/


A Shift in Black Basta Social Engineering Techniques

Similar to before, they overwhelm users with benign emails, then contact them as help desk support.  Instead of calling, they are now contacting users via teams.  Same lure, a different way of contacting victims.  Tricking users into installing AnyDesk or QuickAssist.

https://www.bleepingcomputer.com/news/security/black-bastca-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/

https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/


Broad Phishing Campaign by APT29 Observed

Instead of the typical narrowly focused attack campaign, UA-CERT helped uncover a broad phishing campaign targeting a wide geography.   Domains appearing to be associated with AWS were used.  Malicious attachments triggered an outgoing RDP connection.

https://www.darkreading.com/cyberattacks-data-breaches/russias-apt29-aws-windows-credentials

https://www.bleepingcomputer.com/news/security/amazon-seizes-domains-used-in-rogue-remote-desktop-campaign-to-steal-data/

https://aws.amazon.com/blogs/security/amazon-identified-internet-domains-abused-by-apt29/


Scattered Spider, Famous for Social Engineering, Plus RansomHub

Researchers observe a campaign where Scattered Spider socially engineered their way to admin credentials.  The campaign start to finish, around 10 hours.  Yet another ransomware group moving fast.  This is a continuing trend, less than 24 hours from initial compromise to encryption.  Gotta detect an attack quickly or suffer a breach.

https://securityonline.info/ransomware-threat-escalates-as-scattered-spider-and-ransomhub-combine-forces/

https://www.reliaquest.com/blog/scattered-spider-x-ransomhub-a-new-partnership/


New Qilin.b Ransomware Variant Discovered

With improved crypto and evasion techniques, this variant is a step up.  Written is Rust, this variant continuously clears security logs and even deletes itself.  Ransomware groups continue to innovate and evolve.

https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html

https://www.halcyon.ai/blog/new-qilin-b-ransomware-variant-boasts-enhanced-encryption-and-defense-evasion

https://www.halcyon.ai/blog/power-rankings-ransomware-malicious-quartile-q3-2024


Critical Bug in Fortinet’s FortiManager Actively Exploited

Tracked as CVE-2024-47575, the bug was dubbed FortiJump by researcher Kevin Beaumont.  So, Fortinet didn’t publicly disclose right away and were called out.  There is mitigation guidance, but more importantly, why are these managers publicly exposed? 

https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-fortimanager-flaw-used-in-zero-day-attacks/

https://doublepulsar.com/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773

https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575/

https://censys.com/cve-2024-47575/


Talos Incident Response Quarterly Trends Q3 2024

A couple of highlights / trends, still massive threats abusing identity.  Password spraying and brute force attacks are still on going.  Weak or no MFA is a problem, phishing resistant MFA is a must have.  Valid accounts still the number one initial access method.  Infostealers are killing us.

https://blog.talosintelligence.com/incident-response-trends-q3-2024/


Windows Server “WinReg” NTLM Relay Attack, Exploit Published

This bug tracked as CVE-2024-43532 affects all servers 2008 to 2022.  This is one to keep an eye on, exploit code is now available.  NTLM relay attacks have been used by many threat actors. 

https://www.bleepingcomputer.com/news/security/exploit-released-for-new-windows-server-winreg-ntlm-relay-attack/

https://www.nohat.it/talks#talks

https://github.com/akamai/akamai-security-research/tree/main/PoCs/cve-2024-43532


Researchers Discover Abuse of Open-Sourcce Tool Gophish

Yet another open-source tool abused by threat actors in two different infection chains.  In this case a phishing toolkit.  Using either maldocs or HTML-based infections, both require user interaction.  The PowerRAT malware appears to be under active development. 

https://thehackernews.com/2024/10/gophish-framework-used-in-phishing.html

https://blog.talosintelligence.com/gophish-powerrat-dcrat/


Member Reactions
Reactions are loading...

Sign in to leave reactions on posts

Newsletter
Comments

Sign in to join the conversation.
Just enter your email below to receive a login link.


Related Posts

Members Public

Cyber Threat Weekly – #56

The week of December 9th through December 15th, about 348 cyber news articles were reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with HeartCrypt – Packer-as-a-Service (PaaS). Citrix NetScaler / NetScaler Gateway under brute force attack.  Covert Linux multi-stage rootkit attack.  New

Members Public

Cyber Threat Weekly – #55

The week of December 2nd through December 8th there were 353 cyber news articles reviewed.  A relatively large amount of cyber threat trends and adversarial behavior news to share.  Let’s start with a twist on the fake video conferencing apps campaign. New Russian hacktivist group targeting energy systems.  Supply

Members Public

Cyber Threat Weekly – #54

The Thanksgiving week of November 25th through December 1st was light with only 263 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with a novel phishing campaign using corrupted Word docs. Malicious Android SpyLoan apps installed 8