Skip to content

Cyber Threat Weekly – #61

Derek Krein
4 min read

The week of January 13th through January 19th, roughly 408 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Let’s start with researchers find a NTLMv1 bypass tactic.

Fortinet auth bypass bug and threat actors dump Fortinet config data.  Typosquatting abused targeting Discord developers.  Researchers share a deep dive into Gootloader.  New bug in UEFI Secure Boot, could allow bootkit installs.

Google Ads abused to target Google Ads advertisers.  Bruteforce campaign targeting Azure Active Directory Graph API.  Social engineering, phishing, legit apps and websites, and generative AI are top trends in 2024.


Broken Record Alert: Please patch N-day bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

You should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices exposed to the Internet.


CISA Known Exploited Vulnerabilities – January 13th to January 20th:

CVE-2023-48365 – Qlik Sense HTTP Tunneling Vulnerability:
Allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.

CVE-2024-12686 – BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability:
Can be exploited by an attacker with existing administrative privileges to upload a malicious file. Successful exploitation of this vulnerability can allow a remote attacker to execute underlying operating system commands within the context of the site user.

CVE-2025-21335 – Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability:
Allows a local attacker to gain SYSTEM privileges.

CVE-2025-21334 – Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability:
Allows a local attacker to gain SYSTEM privileges.

CVE-2025-21333 – Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability:
Allows a local attacker to gain SYSTEM privileges.

CVE-2024-55591 – Fortinet FortiOS Authorization Bypass Vulnerability:
Allow an unauthenticated remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

CVE-2024-50603 – Aviatrix Controllers OS Command Injection Vulnerability:
Could allow an unauthenticated attacker to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.


Bypass Group Policy Object to Block NTLMv1 Authentication

There is a flag in the protocol that non-Windows devices and malicious applications can use to bypass a NTLMv1 GPO.  Authentication is consistently abused, auditing your systems can help in minimizing abuse of weak authentication.

https://gbhackers.com/hackers-bypass-active-directory-group-policy/

https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/


New Fortinet Authentication Bypass Bug

The same day CVE-2024-55591 was announced, data was dumped from a similar bug in 2022.  The dump included IP addresses, credentials, device management certificates, and all the victims firewall rules.  This type of bug can lead to a really bad day, please prioritize patching.

https://www.darkreading.com/endpoint-security/15k-fortinet-device-configs-leaked-dark-web

https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting

https://www.cloudsek.com/blog/15k-fortigate-firewall-configs-leaked-by-belsen-group-dumped-using-zero-day-in-2022

https://www.rapid7.com/blog/post/2025/01/16/etr-fortinet-firewalls-hit-with-new-zero-day-attack-older-data-leak/

https://www.fortiguard.com/psirt/FG-IR-24-535


Discord Developers Targeted by Typosquatting

Typosquatting behavior is still prevalent and abused consistently.  In this case, a malicious package on the Python package index (PyPI) named ‘pycord-self’ mimicking the popular ‘discord.py-self’.  This malicious package steals authentication tokens and sets up a backdoor.

https://www.bleepingcomputer.com/news/security/malicious-pypi-package-steals-discord-auth-tokens-from-devs/

https://socket.dev/blog/malicious-pypi-package-targets-discord-developers-with-token-theft-and-backdoor


Gootloader Operations Deep Dive Revealed

From hijacked legit WordPress sites to malicious SEO practices, researcher’s breakdown Gootloader operations.  Using open-source intelligence, including other researchers’ information, the puzzle pieces are connected.

https://news.sophos.com/en-us/2025/01/16/gootloader-inside-out/


Researchers Discover UEFI Secure Boot Bug

There is a list of affected products and versions but be on the lookout for more.  The apps don’t have to be installed on the system, the adversary can use the ‘reloader.efi’ binary from the apps to perform the attack.

https://www.bleepingcomputer.com/news/security/new-uefi-secure-boot-flaw-exposes-systems-to-bootkits-patch-now/

https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/


Ironically, Google Ads Abused to Target Google Advertisers

Fake ads target individuals and businesses who want to advertise on Google or already do.  Malvertising is a common method for threat actors.  The goal for this campaign is to gather Google ads credentials.  The ads look legit.

https://www.bleepingcomputer.com/news/security/hackers-use-google-search-ads-to-steal-google-ads-accounts/

https://www.malwarebytes.com/blog/news/2025/01/the-great-google-ads-heist-criminals-ransack-advertiser-accounts-via-fake-google-ads


Azure Active Directory Graph API Bruteforce Campaign

Researchers discovered a campaign abusing the fasthttp library to gain unauthorized access to Azure Active Directory Graph API.  MFA fatigue is part of the attack campaign.  Observed activity finds 9.68% of attempts are successful. 

https://www.bleepingcomputer.com/news/security/hackers-use-fasthttp-in-new-high-speed-microsoft-365-password-attacks/

https://www.speartip.com/fasthttp-used-in-new-bruteforce-campaign/


Researchers Share Observations from 2024

A report covering four areas of cybersecurity; social engineering and phishing, legit apps and websites, GenAI, and adversarial risks.  People are at the center of cybersecurity both users and adversaries.  This is an interesting look at some stats on certain activities.

https://www.csoonline.com/article/3801010/phishing-click-rates-tripled-in-2024-despite-user-training.html

https://www.netskope.com/netskope-threat-labs/cloud-threat-report/cloud-and-threat-report-january-2025#pillar_content_4


Member Reactions
Reactions are loading...

Sign in to leave reactions on posts

Newsletter
Comments

Sign in to join the conversation.
Just enter your email below to receive a login link.


Related Posts

Members Public

Cyber Threat Weekly – #120

The week of March 9th through March 15th, only a light amount of cyber threat trends and adversarial behavior news to share.  Power outage during storms crashed my Open CTI server, slowing things down a bit and limiting coverage. Been using Open CTI to gather around 60 news feeds every

Members Public

Cyber Threat Weekly – #119

The week of March 2nd through March 8th, about 342 cyber news articles were reviewed. A light amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about what 2026 is going to look like from a security perspective. I’m concerned it’s not going to

Members Public

Cyber Threat Weekly – #118

The week of February 23rd through March 1st, about 345 cyber news articles were reviewed. A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about the velocity and volume of attacks. One thing seems certain; AI is helping threat actors move quicker and it’