September 2023

10 new vulnerabilities disclosed by Talos, including use-after-free issue in Google Chrome

Jonathan Munshaw

https://blog.talosintelligence.com/vulnerability-roundup-sept-27-23/

Excerpt:

“Cisco Talos disclosed 10 vulnerabilities over the past two weeks affecting a range of software, including the popular Google Chrome web browser.

Attackers could exploit these vulnerabilities to carry out a variety of attacks, in some cases gaining the ability to execute remote code on the targeted machine.”


Overview of IoT threats in 2023

Vitaly Morgunov, Yaroslav Shmelev, Kaspersky Security Services And Kaspersky Ics Cert

https://securelist.com/iot-threat-report-2023/110644/

Excerpt:

“IoT devices (routers, cameras, NAS boxes, and smart home components) multiply every year. Statista portal predicts their number will exceed 29 billion by 2030. As connected device numbers increase, so does the need for protection against various threats. The first-ever large-scale malware attacks on IoT devices were recorded back in 2008, and their number has only been growing ever since. We conducted an analysis of the IoT threat landscape for 2023, as well as the products and services offered on the dark web related to hacking connected devices. This report contains the key findings of our research.”


Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

THN

https://thehackernews.com/2023/09/microsoft-uncovers-flaws-in-ncurses.html?&web_view=true

Excerpt:

“A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that could be exploited by threat actors to run malicious code on vulnerable Linux and macOS systems.”


Redline and Vidar Stealers Abuse EV Certificates, Deploy Ransomware

https://cyware.com/news/redline-and-vidar-stealers-abuse-ev-certificates-deploy-ransomware-8d46fdbc

Excerpt:

“A recent investigation by Trend Micro indicates that the threat groups operating RedLine and Vidar have started using the same methods to deliver ransomware as they do to distribute the info-stealers.”


Windows 11 ‘ThemeBleed’ RCE bug gets proof-of-concept exploit

Bill Toulas

https://www.bleepingcomputer.com/news/security/windows-11-themebleed-rce-bug-gets-proof-of-concept-exploit/?&web_view=true

Excerpt:

“Proof-of-concept exploit code has been published for a Windows Themes vulnerability tracked as CVE-2023-38146 that allows remote attackers to execute code.

The security issue is also referred to as ThemeBleed, and received a high-severity score of 8.8. It can be exploited if the target user opens a malicious .THEME file crafted by the attack.”


3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit

Excerpt:

“A new ransomware family calling itself 3AM has emerged. To date, the ransomware has only been used in a limited fashion. Symantec’s Threat Hunter Team, part of Broadcom, has seen it used in a single attack by a ransomware affiliate that attempted to deploy LockBit on a target’s network and then switched to 3AM when LockBit was blocked.”


New MidgeDropper Variant

James Slaughter and Shunichi Imano

https://www.fortinet.com/blog/threat-research/new-midgedropper-variant

Excerpt:

One of the most exciting aspects of malware analysis is coming across a family that is new or rare to the reversing community. Determining the function of the malware, who created it, and the reasons behind it become a mystery to solve. The previously unseen dropper variant we recently found, named MidgeDropper, has a complex infection chain that includes code obfuscation and sideloading, making it an interesting use case. Although we couldn’t obtain the final payload, this blog will still explore what makes this dropper tick.”


BatLoader Unleashed in Ongoing Webex Malvertising Campaign

https://cyware.com/news/batloader-unleashed-in-ongoing-webex-malvertising-campaign-774b17f8

Excerpt:

“A recent malvertising campaign has been found focusing on corporate users who are downloading the widely used web conferencing application, Webex. In this campaign, malicious actors have purchased an advertisement that mimics Cisco's branding, and it appears as the top result when conducting a Google search”


Malware distributor Storm-0324 facilitates ransomware access

Microsoft Threat Intelligence

https://www.microsoft.com/en-us/security/blog/2023/09/12/malware-distributor-storm-0324-facilitates-ransomware-access/

Excerpt:

“The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool to send phishing lures through Microsoft Teams chats. This activity is not related to the Midnight Blizzard social engineering campaigns over Teams that we observed beginning in May 2023. Because Storm-0324 hands off access to other threat actors, identifying and remediating Storm-0324 activity can prevent more dangerous follow-on attacks like ransomware.”


Chrome extensions can steal plaintext passwords from websites

Bill Toulas

https://www.bleepingcomputer.com/news/security/chrome-extensions-can-steal-plaintext-passwords-from-websites/?&web_view=true

Excerpt:

“A team of researchers from the University of Wisconsin-Madison has uploaded to the Chrome Web Store a proof-of-concept extension that can steal plaintext passwords from a website's source code.

An examination of the text input fields in web browsers revealed that the coarse-grained permission model underpinning Chrome extensions violates the principles of least privilege and complete mediation.”


Analyzing a Facebook Profile Stealer Written in Node.js

Jaromir Horejsi

https://www.trendmicro.com/en_ph/research/23/i/analyzing-a-facebook-profile-stealer-written-in-node-js.html

Excerpt:

“During our previous analysis of a campaign involving a Facebook stealer, we discovered another interesting stealer. It was written in Node.js, packaged into an executable, exfiltrated stolen data via both Telegram bot API and a command-and-control (C&C) server, and employed GraphQL as a channel for C&C communication. This blog entry investigates this new stealer and provides an in-depth analysis of its routines and capabilities.”


Vietnamese Cybercriminals Targeting Facebook Business Accounts with Malvertising

THN

https://thehackernews.com/2023/09/vietnamese-cybercriminals-targeting.html?&web_view=true

Excerpt:

“Malicious actors associated with the Vietnamese cybercrime ecosystem are leveraging advertising-as-a-vector on social media platforms such as Meta-owned Facebook to distribute malware.”


Freecycle users told to change passwords after data breach

Graham Cluley

https://grahamcluley.com/freecycle-users-told-to-change-passwords-after-data-breach/?web_view=true

Excerpt:

“Freecycle, an online community that encourages sharing unwanted items with eachother than chucking them in the bin or taking them to landfill, has told users to change their passwords after it suffered a data breach.”


New Agent Tesla Variant Being Spread by Crafted Excel Document

Xiaopeng Zhang

https://www.fortinet.com/blog/threat-research/agent-tesla-variant-spread-by-crafted-excel-document

Excerpt:

“Our FortiGuard Labs captured a phishing campaign that spreads a new Agent Tesla variant. This well-known malware family uses a .Net-based Remote Access Trojan (RAT) and data stealer to gain initial access. It is often used for Malware-as-a-Service (MaaS).”