Cyware Daily Threat Intelligence, December 23, 2024
Daily Threat Briefing • Dec 23, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Dec 23, 2024
Compromised npm packages are yet another reminder of the fragility of supply chains in the digital age. Threat actors inserted cryptomining malware into popular packages, impacting hundreds of thousands of users before developers patched and re-released them. The malicious code executed via npm's postinstall script, emphasizing the need for vigilance and prompt updates in package management.
IBM’s Cognos Analytics platform has been diagnosed with critical vulnerabilities that could undermine system security and expose sensitive data. Flaws like CVE-2024-51466, an Expression Language Injection vulnerability, and CVE-2024-40695, tied to poor file validation, affect several versions of the platform. IBM recommends urgent upgrades to patched versions to safeguard enterprise systems.
In the murky world of Phishing-as-a-Service (PhaaS), FlowerStorm has emerged as a dangerous new player, potentially taking over from the now-defunct Rockstar2FA. With majority of its attacks focused on U.S. users, the platform is setting its sights on key sectors, raising fresh alarms for cybersecurity defenders.
npm packages from Rspack and Vant compromised
The npm packages @rspack/core, @rspack/cli, and Vant were compromised by threat actors who published malicious versions containing cryptominers. The two Rspack packages were downloaded 394,000 and 145,000 times weekly, respectively, on npm. Vant has garnered 46,000 weekly downloads. The cryptomining code was hidden in specific files, and the malware used npm's postinstall script to execute upon installation. The compromised packages were fixed and re-released by the developers, and users are advised to upgrade to safe versions. This incident is part of a trend of supply chain compromises affecting various software packages.
DigiEver bug under attack by Hail Cock botnet
Akamai identified a vulnerability in DigiEver DS-2105 Pro DVRs that is being actively exploited by the Hail Cock botnet, a variant of the Mirai malware. This botnet targets unpatched devices and exploits vulnerabilities in various devices, such as DigiEver DS-2105 Pro DVR, TP-Link Devices, Tenda HG6 Routers, and Teltonika RUT9XX Routers. Hail Cock uses modern encryption techniques to avoid detection and gains persistence through cron jobs and dynamic domain communication for command and control. Compromised devices display unique console messages upon infection.
Critical vulnerability in IBM Cognos Analytics
IBM has revealed two critical vulnerabilities in its Cognos Analytics platform, CVE-2024-51466 and CVE-2024-40695, which could threaten sensitive data and system integrity. These issues affect versions 12.0.0 to 12.0.4 and 11.2.0 to 11.2.4 FP4. IBM urges users to upgrade to Cognos Analytics 12.0.4 Interim Fix 1 or 11.2.4 FP5. CVE-2024-51466 is an Expression Language Injection flaw that lets remote attackers execute harmful EL statements, risking sensitive data and server stability. CVE-2024-40695 involves poor file validation, allowing privileged users to upload harmful files.
RCE flaw in Craft CMS
A critical vulnerability (CVE-2024-56145) in Craft CMS, a popular PHP content management system, allows unauthenticated RCE under certain settings, putting affected installations at risk. The vulnerability takes advantage of the register_argc_argv configuration in PHP, which by default lets query string arguments fill the $_SERVER[‘argv’] array, acting like command-line input. In Craft CMS, the bootstrap/bootstrap. php file processes command-line options without checking if the environment is CLI, allowing attackers to manipulate paths and load unintended files.
FlowerStorm: New Microsoft phishing service
A new platform called FlowerStorm is emerging in the PhaaS market, replacing the defunct Rockstar2FA service. Sophos researchers have found similarities between the two platforms, suggesting a possible rebranding. FlowerStorm poses a new risk for users, especially in the U.S., where 63% of attacks occur. However, it has also targeted users in Canada, the U.K, Italy, and Australia. Key targeted sectors include services, manufacturing, retail, and financial services.