Cyware Daily Threat Intelligence
Daily Threat Briefing • Sep 19, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Sep 19, 2024
PondRAT is lurking in poisoned Python packages, quietly infiltrating Linux and macOS systems through PyPI downloads. Linked to the Gleaming Pisces group, this campaign targets developers’ endpoints in a clever bid to compromise software supply chain vendors and their customers.
Earth Baxia has left its mark, slipping through government networks in Taiwan and the broader APAC region by weaponizing a GeoServer flaw and spear-phishing campaigns. Armed with EAGLEDOOR and custom Cobalt Strike payloads, the attackers set their sights on critical sectors like energy and telecommunications.
A critical vulnerability in GitLab’s SAML authentication has put self-managed instances at risk, with attackers exploiting flaws in the OmniAuth-SAML and Ruby-SAML libraries to bypass authentication. GitLab has issued urgent patches, urging users to upgrade while providing clues to spot unauthorized access before damage is done.
Gleaming Pisces campaign spreads PondRAT
Unit 42 researchers identified the PondRAT campaign distributing backdoors through poisoned Python packages on Linux and macOS. The attackers, likely linked to the Gleaming Pisces group, uploaded malicious packages to PyPI. PondRAT is believed to be a lighter version of the known POOLRAT. The objective is to infiltrate developers' endpoints to reach supply chain vendors and their customers. The poisoned packages campaign targeted supply chain vendors through developers' endpoints, using evasive infection chains to avoid detection and compromise organizations.
Earth Baxia targets APAC, deploys new backdoor
Earth Baxia targeted a government organization in Taiwan and potentially other countries in the APAC region, using spear-phishing emails and the GeoServer vulnerability CVE-2024-36401. The threat actor utilized GrimResource and AppDomainManager injection to deploy additional payloads, including customized Cobalt Strike components and a new backdoor named EAGLEDOOR. The threat actor's activities were primarily targeted at government agencies, telecommunication businesses, and the energy industry in countries such as the Philippines, South Korea, Vietnam, Taiwan, and Thailand.
New Raptor Train IoT botnet
A new botnet called Raptor Train, likely operated by a Chinese nation-state group called Flax Typhoon, has been uncovered. This sophisticated botnet comprises SOHO and IoT devices, targeting routers, cameras, and NAS servers. The botnet's infrastructure consists of compromised devices, exploitation servers, and management nodes. It has been used in multiple campaigns since 2020, with evidence suggesting possible exploitation attempts against various sectors. The botnet had over 260,000 devices, with victims across multiple continents. However, the DOJ and the FBI took down this massive operation.
GitLab patches critical flaw
GitLab released security updates for a critical SAML authentication bypass vulnerability affecting self-managed installations of GitLab CE and EE. The vulnerability arises from a flaw in the OmniAuth-SAML and Ruby-SAML libraries, allowing attackers to manipulate the SAML response and gain unauthorized access to GitLab instances. The impacted GitLab versions have been identified, and users are urged to upgrade to the latest version. GitLab also provided signs of potential exploitation, including unusual authentication logs and unrecognized access patterns.
Two bugs in Proroute H685t-w 4G Router
Two vulnerabilities were found in the Proroute H685t-w 4G Router, specifically in firmware version 3.2.334. The first vulnerability is an authenticated command injection that allows attackers to execute arbitrary commands through the router's web interface. The second vulnerability is a reflected Cross-Site Scripting (XSS) issue that enables attackers to execute arbitrary JavaScript in the victim's browser session. Both vulnerabilities were disclosed to Proroute and users are advised to update their routers to firmware version 3.2.335 or higher to patch these vulnerabilities.