Skip to content

Cyber Threat Weekly – #56

Derek Krein
4 min read

The week of December 9th through December 15th, about 348 cyber news articles were reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with HeartCrypt – Packer-as-a-Service (PaaS).

Citrix NetScaler / NetScaler Gateway under brute force attack.  Covert Linux multi-stage rootkit attack.  New custom malware IOCONTROL targets SCADA and Linux IoT devices.  Zero-day remote code execution (RCE) bug in Cleo managed file transfer products.

Active Adversary Report 2024.  Updated version of ZLoader malware analyzed.  Social engineering continues to be a go-to technique.  Visual Studio Code tunnels are abused for remote access.  The 2024 Industry Threat Profile Report.


Broken Record Alert: Please patch N-day bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

You should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices exposed to the Internet.


CISA Known Exploited Vulnerabilities for December 9th to December 15th:

CVE-2024-49138 – Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability:
Allows a local attacker to escalate privileges.

CVE-2024-50623 – Cleo Multiple Products Unrestricted File Upload Vulnerability:
Can lead to remote code execution with elevated privileges, affects Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products.


Technical Analysis of HeartCrypt, Packer-as-a-Service

Packers obfuscate malware to minimize detection.  This service costs $20 per file.  Designed to be fully undetectable (FUD), and actively used by multiple threat actors.  The service started advertising February 2024; development started approximately July 2023.

https://unit42.paloaltonetworks.com/packer-as-a-service-heartcrypt-malware/


Password Spray Attacks Against NetScaler and NetScaler Gateway

Numerous widespread password spray attacks targeting edge network devices have occurred this year against multiple vendors.  Citrix is the latest vendor under attack.  Multi-factor authentication is the best defense against brute force attacks.

https://www.bleepingcomputer.com/news/security/citrix-shares-mitigations-for-ongoing-netscaler-password-spray-attacks/

https://www.citrix.com/blogs/2024/12/13/password-spraying-attacks-netscaler-december-2024/


Analysis of PUMAKIT, a Multi-Stage Linux Rootkit

Designed to target Linux kernels prior to version 5.7 and activate under specific conditions.  This sophisticated rootkit includes multiple stages consisting of a dropper, two -memory-resident executables, an LKM rootkit module, and a shared object (SO) userland rootkit.   

https://www.csoonline.com/article/3624326/puma-creeps-through-linux-with-a-stealthy-rootkit-attack.html

https://www.elastic.co/security-labs/declawing-pumakit


IOCONTROL, Abused by Iranian APT, Targets Linux OT / IoT Devices

Iran linked Cyber Av3ngers use this custom malware to attack industrial control systems (ICS).  This is the tenth malware family to specifically target ICS systems.  Researchers analyze a sample of the malware and share insights.

https://thehackernews.com/2024/12/iran-linked-iocontrol-malware-targets.html

https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol


Cleo Managed File Transfer Zero-Day RCE Bug

The LexiCom, VLTrader, and Harmony products are under active exploitation.  An insufficient patch of CVE-2024-50623 from October appears to be the culprit.  The new CVE-2024-55956 is now fixed.  File transfer software is a favorite threat actor target.

https://www.csoonline.com/article/3621746/attackers-exploit-zero-day-rce-flaw-in-cleo-managed-file-transfer.html

https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild

https://www.rapid7.com/blog/post/2024/12/11/etr-modular-java-backdoor-dropped-in-cleo-exploitation-campaign/

https://www.rapid7.com/blog/post/2024/12/10/etr-widespread-exploitation-of-cleo-file-transfer-software-cve-2024-50623/


Active Adversary Report 1H 2024 – Sophos

Nice insights and patterns from multiple active adversary reports.  Living off the land binaries (LOLbins), specifically abuse of unique LOLbins is up dramatically, and that’s just the first half of 2024.  Remote desktop protocol (RDP) abuse is always sky high, although there is a slight decrease in this report.  Dwell time and other trends are shared.

https://news.sophos.com/en-us/2024/12/12/active-adversary-report-2024-12/


Improved Version of ZLoader Malware Analyzed

The new malware gets some notable upgrades including an interactive shell, better anti-analysis methods, and custom DNS tunnel protocol for C2 comms.  Researchers observed deployment of the malware using more targeted techniques.

https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html

https://www.zscaler.com/blogs/security-research/inside-zloader-s-latest-trick-dns-tunneling


Dubai Police Impersonated in Social Engineering Scheme

In a wide-scale scam, victims are called by fraudsters and asked to pay traffic tickets, parking fines, and the like.  Getting creative, the campaign included SMS/iMessages and email messages with Dubai Police branding before phone calls were made. 

https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-action


Remote Access via Visual Studio Code (VSCode) Tunnels

Chinese threat actors abuse Microsoft’s Remote Development feature, a legit service allowing developers to securely access and work on remote systems.  The tunnels use Microsoft Azure infrastructure and executables are signed by Microsoft.  Look for this to possibly become a more popular technique. 

https://www.bleepingcomputer.com/news/security/chinese-hackers-use-visual-studio-code-tunnels-for-remote-access/

https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/


2024 Industry Threat Profile Report – Optiv

Threat intelligence findings from October 1, 2023, to September 30, 2024, are covered in this report.  Organized by industry, a threat heatmap for each industry split across geographies, and recommended CIS 18 controls for each industry.

https://www.optiv.com/sites/default/files/2024-12/threat-industry-report-2024_0.pdf


Member Reactions
Reactions are loading...

Sign in to leave reactions on posts

Newsletter
Comments

Sign in to join the conversation.
Just enter your email below to receive a login link.


Related Posts

Members Public

Cyber Threat Weekly – #65

The week of February 10th through February 16th, around 380 cyber news articles were reviewed.  A light-ish amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about proactive defense with deception technology. Low / no buck deception pays huge dividends.  As an industry, we struggle to detect

Members Public

Cyber Threat Weekly – #64

The week of February 3rd through February 9th, around 382 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Been thinkin, proactive security is a necessity in today’s threat landscape.  The Threat Informed Defense Cycle has three dimensions: 1.    Know

Members Public

Cyber Threat Weekly – #63

The week of January 27th through February 2nd, around 416 cyber news articles were reviewed.  A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin, complexity is the enemy of security. How do we take a step back, consolidate, automate, and simplify our security programs?