Cyware Daily Threat Intelligence, December 02, 2024
Daily Threat Briefing • Dec 2, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Dec 2, 2024
An old adversary returns with new tricks. APT-C-01, also known as Poison Ivy, has resurfaced, targeting sectors like defense, government, and technology through advanced phishing techniques. The group has been creating fake websites to distribute Sliver RAT, enabling unauthorized access and remote operations to steal sensitive data.
Chipset vulnerabilities put millions of devices at risk. MediaTek disclosed a high-severity flaw in its video decoder component, which could allow unauthorized access and privilege escalation. The vulnerability affects a wide range of devices, from smartphones to IoT systems, highlighting the urgency of applying recent patches.
Phishing attacks are reaching a new level of sophistication. The new Rockstar 2FA PhaaS platform is bypassing Microsoft 365’s MFA protections with fake login pages, stealing user credentials in large-scale attacks. The platform has already launched over 5,000 phishing domains, posing a significant threat to enterprise security.
Poison Ivy resurges, deploys Sliver RAT
Researchers found that APT-C-01, also known as Poison Ivy, has resurged and is actively targeting defense, government, technology, and education sectors. It is using advanced phishing methods like watering hole and spear-phishing. Recent findings show an increase in its activities, including creating fake websites that trick victims into downloading Sliver RAT. The malware allows attackers to gain unauthorized access, steal sensitive information, and conduct remote operations.
New set of SpyLoan installed 8 million times
A new group of 15 SpyLoan Android malware apps with over eight million installs was found on Google Play, mainly affecting users in South America, Southeast Asia, and Africa. McAfee reported these apps to Google, which informed developers that their apps broke Google Play policies and required fixes. Some apps were removed while others were updated. From Q2 to Q3 2024, the number of malicious SpyLoan applications and unique infected devices rose by over 75%.
MediaTek patches high-severity bug
MediaTek has released a Product Security Bulletin addressing a high-severity vulnerability (CVE-2024-20125) in the video decoder component of its chipsets. This vulnerability could lead to unauthorized access and control of user devices, with potential for local privilege escalation. The bulletin also mentions medium-severity vulnerabilities in other components. The affected chipsets include those used in smartphones, tablets, smart displays, OTT devices, and IoT devices.
0-day in Windows Server 2012 and Server 2012 R2
ACROS Security discovered a zero-day vulnerability in Windows Server 2012 and Server 2012 R2, which allows attackers to bypass the Mark of the Web security feature. This flaw has gone unnoticed for over two years and even affects fully updated servers with Extended Security Updates. ACROS Security has released free micropatches to protect users until Microsoft issues an official fix.
New phishing campaign uses corrupted Word docs
A new phishing attack has been discovered that uses corrupted Word documents as email attachments to evade security software. The documents prompt the recipient to scan a QR code, leading to a phishing site that impersonates a Microsoft login page to steal credentials. Despite their corrupt state, the documents remain recoverable by the application and have been successful in avoiding detection by most security solutions.
Detailing new Rockstar 2FA PhaaS platform
A new PhaaS platform called Rockstar 2FA has appeared, enabling large-scale attacks that steal Microsoft 365 login details by bypassing MFA. Attackers create fake login pages resembling Microsoft 365 to trick users into entering their credentials. Rockstar 2FA is an updated version of earlier phishing kits and has gained popularity in the cybercrime world since August. Its service is offered for $200 for two weeks or $180 for API access renewal, and it is advertised on platforms like Telegram. The platform has launched over 5,000 phishing domains and employs various methods to bait users into clicking malicious links.