Skip to content

Cyber Threat Weekly – #56

Derek Krein
4 min read

The week of December 9th through December 15th, about 348 cyber news articles were reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with HeartCrypt – Packer-as-a-Service (PaaS).

Citrix NetScaler / NetScaler Gateway under brute force attack.  Covert Linux multi-stage rootkit attack.  New custom malware IOCONTROL targets SCADA and Linux IoT devices.  Zero-day remote code execution (RCE) bug in Cleo managed file transfer products.

Active Adversary Report 2024.  Updated version of ZLoader malware analyzed.  Social engineering continues to be a go-to technique.  Visual Studio Code tunnels are abused for remote access.  The 2024 Industry Threat Profile Report.


Broken Record Alert: Please patch N-day bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

You should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices exposed to the Internet.


CISA Known Exploited Vulnerabilities for December 9th to December 15th:

CVE-2024-49138 – Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability:
Allows a local attacker to escalate privileges.

CVE-2024-50623 – Cleo Multiple Products Unrestricted File Upload Vulnerability:
Can lead to remote code execution with elevated privileges, affects Cleo Harmony, VLTrader, and LexiCom, which are managed file transfer products.


Technical Analysis of HeartCrypt, Packer-as-a-Service

Packers obfuscate malware to minimize detection.  This service costs $20 per file.  Designed to be fully undetectable (FUD), and actively used by multiple threat actors.  The service started advertising February 2024; development started approximately July 2023.

https://unit42.paloaltonetworks.com/packer-as-a-service-heartcrypt-malware/


Password Spray Attacks Against NetScaler and NetScaler Gateway

Numerous widespread password spray attacks targeting edge network devices have occurred this year against multiple vendors.  Citrix is the latest vendor under attack.  Multi-factor authentication is the best defense against brute force attacks.

https://www.bleepingcomputer.com/news/security/citrix-shares-mitigations-for-ongoing-netscaler-password-spray-attacks/

https://www.citrix.com/blogs/2024/12/13/password-spraying-attacks-netscaler-december-2024/


Analysis of PUMAKIT, a Multi-Stage Linux Rootkit

Designed to target Linux kernels prior to version 5.7 and activate under specific conditions.  This sophisticated rootkit includes multiple stages consisting of a dropper, two -memory-resident executables, an LKM rootkit module, and a shared object (SO) userland rootkit.   

https://www.csoonline.com/article/3624326/puma-creeps-through-linux-with-a-stealthy-rootkit-attack.html

https://www.elastic.co/security-labs/declawing-pumakit


IOCONTROL, Abused by Iranian APT, Targets Linux OT / IoT Devices

Iran linked Cyber Av3ngers use this custom malware to attack industrial control systems (ICS).  This is the tenth malware family to specifically target ICS systems.  Researchers analyze a sample of the malware and share insights.

https://thehackernews.com/2024/12/iran-linked-iocontrol-malware-targets.html

https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol


Cleo Managed File Transfer Zero-Day RCE Bug

The LexiCom, VLTrader, and Harmony products are under active exploitation.  An insufficient patch of CVE-2024-50623 from October appears to be the culprit.  The new CVE-2024-55956 is now fixed.  File transfer software is a favorite threat actor target.

https://www.csoonline.com/article/3621746/attackers-exploit-zero-day-rce-flaw-in-cleo-managed-file-transfer.html

https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild

https://www.rapid7.com/blog/post/2024/12/11/etr-modular-java-backdoor-dropped-in-cleo-exploitation-campaign/

https://www.rapid7.com/blog/post/2024/12/10/etr-widespread-exploitation-of-cleo-file-transfer-software-cve-2024-50623/


Active Adversary Report 1H 2024 – Sophos

Nice insights and patterns from multiple active adversary reports.  Living off the land binaries (LOLbins), specifically abuse of unique LOLbins is up dramatically, and that’s just the first half of 2024.  Remote desktop protocol (RDP) abuse is always sky high, although there is a slight decrease in this report.  Dwell time and other trends are shared.

https://news.sophos.com/en-us/2024/12/12/active-adversary-report-2024-12/


Improved Version of ZLoader Malware Analyzed

The new malware gets some notable upgrades including an interactive shell, better anti-analysis methods, and custom DNS tunnel protocol for C2 comms.  Researchers observed deployment of the malware using more targeted techniques.

https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html

https://www.zscaler.com/blogs/security-research/inside-zloader-s-latest-trick-dns-tunneling


Dubai Police Impersonated in Social Engineering Scheme

In a wide-scale scam, victims are called by fraudsters and asked to pay traffic tickets, parking fines, and the like.  Getting creative, the campaign included SMS/iMessages and email messages with Dubai Police branding before phone calls were made. 

https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-action


Remote Access via Visual Studio Code (VSCode) Tunnels

Chinese threat actors abuse Microsoft’s Remote Development feature, a legit service allowing developers to securely access and work on remote systems.  The tunnels use Microsoft Azure infrastructure and executables are signed by Microsoft.  Look for this to possibly become a more popular technique. 

https://www.bleepingcomputer.com/news/security/chinese-hackers-use-visual-studio-code-tunnels-for-remote-access/

https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/


2024 Industry Threat Profile Report – Optiv

Threat intelligence findings from October 1, 2023, to September 30, 2024, are covered in this report.  Organized by industry, a threat heatmap for each industry split across geographies, and recommended CIS 18 controls for each industry.

https://www.optiv.com/sites/default/files/2024-12/threat-industry-report-2024_0.pdf


Member Reactions
Reactions are loading...

Sign in to leave reactions on posts

Newsletter
Comments

Sign in to join the conversation.
Just enter your email below to receive a login link.


Related Posts

Members Public

Cyber Threat Weekly – #55

The week of December 2nd through December 8th there were 353 cyber news articles reviewed.  A relatively large amount of cyber threat trends and adversarial behavior news to share.  Let’s start with a twist on the fake video conferencing apps campaign. New Russian hacktivist group targeting energy systems.  Supply

Members Public

Cyber Threat Weekly – #54

The Thanksgiving week of November 25th through December 1st was light with only 263 cyber news articles reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with a novel phishing campaign using corrupted Word docs. Malicious Android SpyLoan apps installed 8

Members Public

Cyber Threat Weekly – #53

The week of November 18th through November 24th, 342 cyber news articles were reviewed.  A moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with threat actors love the ‘bring your own vulnerable driver’ attack. Threat actors use Wi-Fi to breach US organization from