We use cookies to improve your experience. Do you accept?

Skip to main content

Cyware Daily Threat Intelligence, January 06, 2025

shutterstock 1534644347

Daily Threat Briefing Jan 6, 2025

Discord users are being lured by fake offers to beta test new video games, only to end up downloading malware. Scammers send direct messages posing as game developers, providing a password-protected installer link that spreads multiple info-stealers. The scam leverages installers like NSIS and MSI, making it harder to identify malicious intent until it's too late.

Deep learning models face a new threat with BARWM, a backdoor attack method utilizing DNN-based steganography. This advanced technique embeds imperceptible triggers into inputs, bypassing detection while maintaining high attack success rates. Sophos has patched three critical vulnerabilities in its firewall, addressing risks like SQL injection, weak credential management, and code injection. While no active exploitation has been reported, users are strongly urged to upgrade to version 21.0 GA or later.

Top Malware Reported in the Last 24 Hours

Steganography backdoor targets Android apps

BARWM is a new backdoor attack method for deep learning models used in mobile devices. It utilizes DNN-based steganography to create imperceptible and unique triggers for each input, enhancing the stealthiness of the attack. The approach outperforms existing methods in terms of attack success rate and stealthiness, while maintaining normal model performance.

Fake game sites deploy info-stealers

A new online scam is targeting people through direct messages on Discord, asking if they would like to beta test a new videogame. The message often pretends to come from the game's developer. If someone shows interest, they receive a download link and a password for an installer. Various types of installers, like NSIS and MSI, are used to spread different malware, including the Nova Stealer, Ageo Stealer, and Hexon Stealer. 

Malicious packages weaponize OAST

Researchers at Socket have found malicious campaigns using Out-of-Band Application Security Testing (OAST) techniques. While OAST is meant for ethical hackers to find vulnerabilities, it is now exploited by threat actors to steal sensitive data and set up C2 channels. OAST tools like Burp Collaborator and interact.sh are being misused for malicious purposes. Socket's report mentions threats involving JavaScript, Python, and Ruby packages that send data to attacker-controlled sites.

Top Vulnerabilities Reported in the Last 24 Hours

Multiple bugs patched in Sophos Firewall

Sophos addressed at least three vulnerabilities in Sophos Firewall, including CVE-2024-12727 (SQL injection), CVE-2024-12728 (weak credentials), and CVE-2024-12729 (code injection), which could allow attackers to gain unauthorized access and execute malicious code. These issues were patched in version 21.0 GA and older, releasing hotfixes and later updates. Users should check for updates and consider additional protection strategies if immediate fixes aren't available. No active exploitation of these vulnerabilities has been confirmed, but updates are urgent to avoid possible threats.

Nuclei flaw bypasses signature verification

A recently fixed vulnerability in the open-source vulnerability scanner Nuclei could let attackers bypass signature verification and insert harmful code into templates that are run on local systems. The flaw, tracked as CVE-2024-43405, involves how Go's regex-based signature verification handles line breaks, allowing malicious code to be injected without detection. The YAML parser interprets line breaks differently, causing the verification process to fail.

PoC released for Windows Registry bug

Security researchers have revealed details about CVE-2024-43452, a Windows Registry privilege escalation bug. This issue arises from a design flaw in how Windows manages its registry memory. The problem is linked to a process called double-fetch during registry hive loading, which can allow attackers to manipulate data if they control the server. Microsoft has released a patch for this vulnerability, and users are urged to apply it right away.

Related Threat Briefings