Cyware Daily Threat Intelligence, December 20, 2024
Daily Threat Briefing • Dec 20, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Dec 20, 2024
Disguised as a harmless health tool, the BMI CalculationVsn app hid its sinister purpose within the Amazon Appstore. The spyware recorded screens, intercepted sensitive SMS messages, and scanned installed apps, leaving users vulnerable before its removal. However, traces of the app may still linger, necessitating manual removal and device scans.
A critical vulnerability in BeyondTrust's Privileged Remote Access products landed on CISA's KEV catalog after reports of active exploitation. Tracked as CVE-2024-12356, the flaw enables attackers to execute commands as a site user, with patched updates now available for self-hosted installations.
Copy-paste commands are no longer innocent. Threat actors have weaponized clipboard activity, tricking users into running malicious PowerShell scripts under the guise of software notifications. By exploiting trusted brands and Cloudflare tunnels, they discreetly deploy malware while bypassing conventional defenses.
Android malware spotted on Amazon Appstore
The Amazon Appstore was found to have a malicious Android spyware app called BMI CalculationVsn disguised as a health tool. This app recorded the device screen, scanned for installed apps, and intercepted SMS messages, including OTPs and verification codes. Although the app has been removed from the store, users must manually uninstall it and conduct a full scan to remove any remaining traces. The app is still under development and is linked to a developer named "PT. Visionet Data Internasional."
New malware kills engineering process in ICS
An analysis by Forescout revealed new malware attacks targeting ICS, specifically Mitsubishi and Siemens engineering workstations. The malware, named Ramnit and Chaya_003, has the capability to terminate engineering processes, posing a significant threat to operational technology and ICS environments. The attackers used legitimate services for C2, making detection challenging. The Ramnit malware was observed in two clusters infecting workstations, while Chaya_003 was found to employ a Discord C2 infrastructure for system reconnaissance and process disruption.
Malicious npm libraries downloaded by thousands
Recent discoveries have revealed malicious typosquatting packages mimicking legitimate npm libraries. The legitimate ESLint packages are "typescript-eslint" and "@typescript-eslint/eslint-plugin." However, a fake package, "@typescript_eslinter/eslint," has been created, which closely resembles these names and has gained 3,030 downloads. Another counterfeit package called "types-node" also impersonates a popular library, achieving over 20,502 downloads. The fake packages contain hidden malware, with the counterfeit "@typescript_eslinter/eslint" even installing a trojan disguised as a "prettier.bat" file.
CISA adds BeyondTrust flaw to KEV catalog
The CISA has added a critical flaw affecting BeyondTrust Privileged Remote Access and Remote Support products to its KEV catalog due to active exploitation. The vulnerability, tracked as CVE-2024-12356, allows attackers to run commands as a site user. Users with self-hosted versions should update to specific patched versions. A second medium-severity flaw (CVE-2024-12686) was found and has been patched.
Sophos issues urgent security update
Sophos has fixed three critical security vulnerabilities in its Sophos Firewall product, which can lead to serious risks, like remote code execution and privilege escalation. CVE-2024-12727 is a SQL injection flaw that could allow attackers access to the database and execute code. It affects 0.05% of devices. CVE-2024-12728 involves a reused non-random SSH passphrase, putting about 0.5% of devices at risk. CVE-2024-12729 lets authenticated users run arbitrary code and poses a significant threat.
Social engineering scheme mimics multiple brands
Threat actors are using social engineering techniques to trick users into copying and executing malicious PowerShell commands from clipboard, posing a new danger in online security. A combination of fake Cloudflare notifications, decoy pages, and manual user actions is being leveraged to deliver and install malware through PowerShell code execution. The campaign targets popular software brands such as Notepad, Microsoft Teams, FileZilla, and others, and utilizes Cloudflare tunnels to send information to a C2 server.