We use cookies to improve your experience. Do you accept?

Skip to main content

Cyware Daily Threat Intelligence, December 10, 2024

shutterstock 1534644347

Daily Threat Briefing Dec 10, 2024

Digital trust took a hit in Southern Asia as WhatsApp became the delivery vector for a sophisticated SpyNote RAT campaign targeting high-profile individuals. Disguised as seemingly benign apps like “Best Friend,” the malware exploited accessibility settings to gain deeper control over devices, enabling location tracking and the reading of text messages.

OpenWrt narrowly avoided a potential security catastrophe with a critical flaw in its Attended Sysupgrade feature. The vulnerability, involving command injection and hash truncation, could have allowed attackers to distribute harmful firmware packages to network devices. 

Meanwhile, cybercriminals launched a new phishing campaign to spread the AppLite Banker malware, targeting Android devices through fake job applications. Masquerading as recruiters from trusted companies, the attackers directed victims to fraudulent websites where they were tricked into downloading a fake CRM app. 

Top Malware Reported in the Last 24 Hours

SpyNote propagates in Southern Asia

CYFIRMA found a complex cyberattack aimed at valuable individuals in Southern Asia. An unknown attacker used the SpyNote RAT to create a malicious Android payload to target the targeted systems. The malware was delivered through WhatsApp with four apps disguised under names like “Best Friend.” These apps connected to a single C2 server and operated secretly. The malware could access sensitive permissions, like location tracking and reading text messages, and directed victims to enable accessibility settings, which allowed deeper control over their devices. 

New AppLite Banker targets banking apps

A new phishing campaign has been discovered, distributing a malware variant known as AppLite Banker. This campaign mainly targets Android devices, using advanced social engineering techniques to steal personal and corporate credentials. The current attacks exploit mobile vulnerabilities through fake job application pages and banking trojans. The attackers impersonate recruiters from reputable companies, sending phishing emails that lead users to fake websites. These sites trick users into downloading a fake CRM app, which then installs the AppLite malware. 

Top Vulnerabilities Reported in the Last 24 Hours

Flaw in OpenWrt's Attended Sysupgrade

A flaw in OpenWrt's Attended Sysupgrade feature could have allowed harmful firmware packages to be distributed. OpenWrt is a customizable, Linux-based operating system mainly for network devices like routers. This critical flaw is tracked as CVE-2024-54143 and involved command injection and hash truncation. The OpenWrt team promptly took down the service, applied a fix, and restored it in three hours. Users are urged to perform an inplace upgrade to eliminate risks and should also update any self-hosted instances of ASU.

WPForms bug impacts 6 million installations

A critical vulnerability (CVE-2024-11205) in WPForms, a popular WordPress form builder plugin used by over six million websites, poses a serious financial risk. This flaw, rated 8.5 on the CVSS scale, allows authenticated attackers with subscriber access to execute unauthorized refunds and cancel Stripe subscriptions. The issue stems from the ajax_single_payment_refund() and ajax_single_payment_cancel() functions that lack proper capability checks. The vulnerability affects WPForms versions 1.8.4 to 1.9.2.1.

Related Threat Briefings