Cyware Daily Threat Intelligence
Daily Threat Briefing • Sep 23, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Sep 23, 2024
Splinter, a new post-exploitation tool, is tearing through victims' IT environments, enabling attackers to achieve multiple objectives with alarming efficiency. Written in Rust, Splinter self-deletes after leaving a trail of chaos in its wake.
A critical flaw in the Grafana Plugin SDK for Go is threatening to expose sensitive repository credentials, leaving developers scrambling. With a CVSS score of 9.1, this vulnerability could allow attackers to extract credentials from plugin binaries.
Two critical vulnerabilities in the WordPress theme Houzez and its companion plugin have opened the door to potential site takeovers. While one allows users to escalate privileges and hijack sites, the other lets attackers change email addresses and seize control of accounts.
New post-exploitation tool surfaces
Attackers are using Splinter, a new post-exploitation tool, to cause chaos in victims' IT environments. This tool allows them to execute Windows commands, steal files, collect cloud service account information, and download additional malware onto victims' systems. The malicious code then self-deletes. Splinter, written in Rust, uses a JSON format for configuration data and communicates with a C2 server over HTTPS.
Popular software cracks deliver AsyncRAT
Cybercriminals are using fake versions of popular software to distribute AsyncRAT, which can infiltrate systems and grant attackers remote access. The malware disguises itself as legitimate software like AnyDesk and CCleaner, tricking users into downloading and running it. Once executed, AsyncRAT remains undetected by exploiting system settings and using obfuscation techniques. It aims to establish a remote connection with the infected machine, allowing cybercriminals to carry out data theft and command execution. The malware's payload is designed to evade detection, and communicate with a C2 server, giving attackers control over compromised systems.
Critical Flaw in Microchip ASF
The Microchip Advanced Software Framework (ASF) has a critical security flaw (CVE-2024-7490) that could allow remote code execution due to a stack-based overflow vulnerability in the tinydhcp server. This vulnerability affects multiple versions of the software and forks of the tinydhcp software. Currently, there are no fixes available, and the recommendation is to replace the tinydhcp service with a different one.
Grafana plugin bug exposes info
A critical security vulnerability (CVE-2024-8986) in the Grafana Plugin SDK for Go could lead to the inadvertent leakage of sensitive information, including repository credentials. This vulnerability, with a CVSS score of 9.1, is significant as it allows attackers to extract embedded credentials from affected plugin binaries, potentially granting unauthorized access to private repositories. Developers using vulnerable SDK versions (up to 0.249.0) are advised to upgrade to version 0.250.0 or later immediately and review and rotate any exposed repository credentials.
Critical vulnerabilities in WordPress theme
Two critical vulnerabilities in the WordPress theme Houzez and its companion plugin Houzez Login Register have been uncovered. These vulnerabilities could enable unauthorized users to take control of WordPress sites running the theme, posing a significant risk to businesses and clients. CVE-2024-22303 is a privilege escalation flaw that allows unauthenticated users to elevate their privileges and potentially take over a site. The theme lacks proper authorization checks, enabling users with Subscriber roles to obtain nonce tokens and reset passwords, including administrator accounts. CVE-2024-21743 affects the Houzez Login Register plugin, allowing users to change email addresses and hijack accounts. Users must update to version 3. 3. 0 or higher to mitigate these risks.