We use cookies to improve your experience. Do you accept?

Skip to main content

Cyware Daily Threat Intelligence, December 12, 2024

shutterstock_1679249305

Daily Threat Briefing Dec 12, 2024

Malware threats continue to evolve, targeting both enterprises and individual developers. Zloader’s latest variant leverages a custom protocol for DNS tunneling and advanced anti-analysis features. Meanwhile, a typosquatting attack tricked developers by mimicking the popular TypeScript ESLint plugin’s NPM package, enabling clipboard monitoring and persistence on compromised systems.

Researchers revealed details about the AuthQuake vulnerability affecting Microsoft’s MFA system, leaving critical services like Outlook, Teams, and Azure exposed to brute-force attacks. Meanwhile, Siemens Healthineers issued a hotfix to address an SQL injection flaw in its syngo.plaza software that allowed database compromise.

Phishing campaigns are becoming increasingly elaborate, with "Aggressive Inventory Zombies (AIZ)" impersonating major retailers like Amazon, Etsy, and eBay, and crypto platforms like Binance and Kraken. The phishing network preyed on unsuspecting users using fake sites and fraudulent chat support.

Top Malware Reported in the Last 24 Hours

Ukrainian Military Devices Hit With Custom Malware

Microsoft warned of the Russian APT Secret Blizzard using tools from other cybercrime gangs to assist the Kremlin's military actions in Ukraine by installing custom malware on Ukrainian military devices. This cyber-espionage gang has targeted foreign ministries, embassies, and defense sectors globally. From March to April 2024, they used Amadey bots to deploy their Tavdig backdoor on targeted Ukrainian military devices.

Latest Zloader Variant Enhances Evasion

Zloader, a trojan linked to Zeus malware, has evolved again, with a new version 2.9.4.0 featuring a custom DNS tunneling protocol for C2 communication. Originally designed for banking fraud, Zloader is now used for ransomware attacks. The new version offers enhanced anti-analysis techniques and an interactive shell for executing commands. It also employs targeted distribution methods, connecting it with Black Basta ransomware attacks.

Rogue NPM Package Imitates ESLint Plugin

A new report revealed a typosquatting attack aimed at developers using the popular  TypeScript ESLint plugin. Attackers published a malicious NPM package, @typescript_eslinter/eslint, to infect developers’ systems. The package enabled clipboard and keyboard monitoring, and establishing persistence on compromised systems.

Windows UI Framework Abused to Avoid EDR Tools

A new malware technique uses a Windows accessibility system called UI Automation (UIA) to perform rogue actions without being detected by security software. Users can be tricked into running a UIA program, which can execute commands, access sensitive data, and redirect browsers to phishing sites. This method can also affect messaging apps and manipulate UI elements over a network. It can be abused to read messages, steal data, and execute harmful redirects.

Top Vulnerabilities Reported in the Last 24 Hours

Microsoft Azure MFA Flaw Fixed

Researchers revealed a major flaw in Microsoft's Multi-Factor Authentication (MFA) system that could let hackers circumvent key security defenses, and obtain access to Outlook, OneDrive, Teams, and Azure Cloud. The exploit relied on defects within the time-based one-time password (TOTP) system that Microsoft employs as part of its MFA procedure, which presents users with a six-digit code that changes every 30 seconds. However, Microsoft’s system enforces inadequate rate limits, letting hackers guess the codes relentlessly. A temporary fix was issued on July 4, followed by a permanent remedy on October 9.

WordPress Sites Exposed to Two Critical Bugs

Hackers have been abusing two critical security bugs in the Hunk Companion (CVE-2024-9707) and WP Query Console (CVE-2024-50498) WordPress plugins to obtain persistent backdoor access to vulnerable websites. The former causes remote code execution (RCE) while the latter enables website takeover. Installing Hunk Companion version 1.9.0 and checking websites for unauthorized installation of WP Query Console or other WordPress plugins is advised.

SQL Injection Flaw Impacts syngo.plaza VB30E

A critical unauthenticated SQL injection flaw, CVE-2024-52335, exists in the Siemens Healthineers syngo.plaza VB30E medical imaging software. The flaw affects all versions below VB30E_HF05 and arises from improper sanitization of input data before it is sent to the SQL server. Adversaries with access to the application could execute rogue SQL commands and compromise the entire database. A new hotfix (HF05) addresses this flaw.

Critical Apache Struts Flaw Causes RCE

A critical security flaw, CVE-2024-53677, lies in the file upload logic of Apache Struts versions 2.0.0 through 2.5.33, and 6.0.0 through 6.3.0.2. Intruders can manipulate file upload parameters to enable path traversal and remote code execution. The flaw has been remediated in version 6.4.0, however, developers need to migrate to a new file upload mechanism to protect the vulnerable instances of Apache Struts.

Top Scams Reported in the Last 24 Hours

Researchers uncover AIZ campaign

Researchers observed suspicious domains impersonating brands like Etsy in a widespread phishing and pig-butchering network targeting retail brands and a crypto phishing campaign. The retail phishing campaign, dubbed "Aggressive Inventory Zombies (AIZ)," targets major retailers and marketplaces, like Amazon, BestBuy, eBay, Wayfair, Costco, Rakuten, etc, and also targets crypto audiences from Binance, Kraken, etc. The operators behind this campaign have been creating phishing sites using a popular website template and integrating chat services for phishing activities. It's believed that the threat actor has some financial ties to India.

Related Threat Briefings