Cyware Daily Threat Intelligence, December 04, 2024
Daily Threat Briefing • Dec 4, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Dec 4, 2024
Attackers struck at the heart of Solana’s Web3.js library, turning a trusted tool for decentralized applications into a weapon for stealing private keys and cryptocurrency funds. Versions 1.95.6 and 1.95.7 were compromised for five hours before being replaced with a clean update but the ripple effects may still endanger third-party tools managing private keys.
A single filename was all it took to unravel security in MobSF. A Stored XSS vulnerability in feature allowed malicious scripts embedded in filenames to bypass security and execute harmful actions. Users of version 4.2.8 are urged to patch their systems without delay.
Cloudflare’s trusted domains became a haven for cybercriminals as phishing campaigns skyrocketed. With phishing incidents up 198% this year, attackers are using these platforms to disguise their scams and target thousands of unsuspecting users globally.
Solana library backdoored
Developers of decentralized applications downloaded compromised versions of the Solana Web3.js library after an attacker hacked a GitHub account with publishing rights. The backdoored library versions, 1.95.6 and 1.95.7, allowed attackers to steal private key material and drain funds from dapps. The compromised versions were available for download for about five hours on December 2, but have since been removed and replaced with a clean version, 1.95.8. While major cryptocurrency wallets were not hacked, third-party tools related to private keys may have been compromised.
Critical XSS vulnerability in MobSF
A critical vulnerability has been found in the Mobile Security Framework (MobSF), which lets attackers inject harmful scripts into the system. The vulnerability, identified as CVE-2024-53999, is a Stored Cross-Site Scripting (XSS) flaw in the “Diff or Compare” feature, caused by improper handling of file uploads with script-containing filenames. This issue was discovered in MobSF version 4.2.8, where the system allows users to upload files that contain scripts in their names.
Veeam issues patch for VSPC bug
Veeam has issued security updates for a critical flaw in the Service Provider Console (VSPC) that allows remote code execution. Tracked as CVE-2024-42448, it has a CVSS score of 9.9. A second vulnerability, CVE-2024-42449, rated 7.1, may leak sensitive data and delete files. Both flaws affect Veeam Service Provider Console versions 8.1.0.21377 and earlier, requiring an upgrade to version 8.1.0.21999 to fix.
Increasing abuse of Cloudflare dev domains
Cybercriminals are increasingly exploiting Cloudflare's pages[.]dev and workers[.]dev domains for phishing and malicious activities. Fortra observed a 198% rise in phishing attacks on Cloudflare Pages, increasing from 460 incidents in 2023 to 1,370 by mid-October 2024, with expectations to exceed 1,600 incidents by year-end. The report also noted a 104% increase in phishing attacks using this platform, climbing from 2,447 incidents in 2023 to nearly 6,000 expected by year-end.