CyberSecurity updates
Updated: 2024-12-04 14:06:31 Pacfic

MalBot @ Malware Analysis, News and Indicators
RomCom Zero-Day Exploits in Mozilla and Windows - 6d

The RomCom cyber threat group exploited zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Mozilla Firefox and Windows to deploy their backdoor. The vulnerabilities allowed zero-click exploitation, delivering payloads without user interaction. Fake websites were used to target victims worldwide, mainly in Europe and North America. The backdoor provided attackers with complete system control.

speakerdeck.com
XZ Backdoor: A Sophisticated and Stealthy Malware Attack - 9d

A sophisticated and stealthy backdoor hidden within the XZ compression library was discovered, potentially allowing attackers to execute malicious code without detection. The attack leverages complex techniques to remain undetected and has been analyzed by several security researchers. This incident highlights the importance of vigilant security practices, including code audits and continuous monitoring, to combat increasingly sophisticated attacks.

Anna Ribeiro @ Industrial Cyber
Earth Simnavaz APT Targets Gulf Organizations Using Microsoft Exchange Server Backdoor - 17d

The Earth Simnavaz APT, a suspected Iranian state-sponsored threat actor, has been targeting organizations in the Gulf region using a backdoor in Microsoft Exchange servers. The backdoor allows the attackers to gain unauthorized access to sensitive information and potentially deploy ransomware. The attacks highlight the growing threat of nation-state actors targeting critical infrastructure and businesses.

thehackernews.com
UNC2970 Targets Critical Infrastructure with Sophisticated Phishing Campaign: Uses Trojanized SumatraPDF to Deploy MISTPEN Backdoor - 15d

The North Korea-linked UNC2970 threat actor group has launched a sophisticated phishing campaign targeting critical infrastructure. The campaign involves distributing a modified version of SumatraPDF, a PDF reader, that is trojanized to deliver the MISTPEN backdoor. This backdoor provides attackers with remote access to compromised systems, potentially enabling data theft, espionage, and other malicious activities. The use of trojanized legitimate software highlights the importance of verifying the integrity of software before execution.

trendmicro.com
New 'More_eggs' Backdoor Targets Recruiters with Fake Job Applications - 28d

A new backdoor, named ‘More_eggs’, has emerged, specifically targeting recruiters using a spear-phishing campaign with malicious LNK files disguised as fake job applications. This attack vector, delivered through phishing emails, aims to infiltrate systems and provide attackers with unauthorized access. The malicious LNK files, when executed, silently download and run a Python distribution package containing a malicious Python script. This script is designed to establish persistence and provide the attacker with remote access to the compromised system. Organizations are urged to implement robust security measures, including email security solutions, employee training on phishing awareness, and regular security audits, to protect themselves from this evolving threat.

Ameer Owda @ SOCRadar
Critical Vulnerabilities in Palo Alto Networks Expedition Tool Could Expose Firewall Credentials - 16h

Palo Alto Networks has released patches for critical vulnerabilities found in its Expedition tool, which is used for migrating configurations from different vendors to Palo Alto Networks’ PAN-OS. These vulnerabilities could allow attackers to execute commands, access sensitive data, and potentially compromise firewall administrator accounts. The vulnerabilities include OS command injection, SQL injection, cleartext storage of sensitive data, and Cross-site Scripting (XSS). The most critical vulnerability, CVE-2024-9463, could allow attackers to execute OS commands as root and access sensitive data like usernames, cleartext passwords, and API keys. Organizations using Palo Alto Networks’ Expedition tool are urged to update to version 1.2.96 or later immediately to mitigate these risks. This includes implementing access control measures, regularly monitoring for suspicious activity, and ensuring strong security practices.


This site is an experimental news aggregator using feeds I personally follow. You can provide me feedback using this form or using Bluesky.