Cyware Daily Threat Intelligence

Cyware Daily Threat Intelligence - Featured Image

Daily Threat Briefing January 13, 2022

The hide-and-seek game between security experts and threat actors is becoming complicated as the latter continue to adopt new tactics. There have been many such dangerous developments in the last 24 hours. OceanLotus aka the APT32 hacking group has reprogrammed its evasion technique by using web archive files to deploy backdoors. In another instance, a relatively inactive TellYouThePass ransomware has re-emerged as a Golang-compiled malware, making it easier for threat actors to target a wide range of operating systems, including macOS and Linux.

That’s not all! The Magniber ransomware was also spotted using digitally signed certificates for Chrome and Edge web browser updates to infect systems. Unfortunately, Windows understands them as trusted files and does not trigger a warning.

Top Breaches Reported in the Last 24 Hours

TransCredit suffers a data breach

A misconfigured database owned by TransCredit had exposed 822,789 records of users in America and Canada. This included full names, payment history, email addresses, Tax ID numbers, Social Security Numbers (SSNs), Employee Identification Numbers (EIN), and banking information. The incident was discovered in September 2021.

OceanLotus improves its evasion tactic

With an aim to evade detection, the OceanLotus threat actor group is now using the web archive file format to deploy backdoors on compromised systems. The attack chain starts with a RAR compression of a 35–65 MB file containing a malicious Word document.

Take over of FIFA 22 accounts

Cybercriminals are using social engineering tactics to take over accounts of players associated with the Electronic Arts video game FIFA 22. So far, less than 50 accounts have been affected by the attack.

Top Malware Reported in the Last 24 Hours

TellYouThePass ransomware revamped

The TellYouThePass ransomware has been revamped as a Golang malware to enable its attackers to launch attacks against multiple operating systems, including macOS and Linux. The ransomware was spotted exploiting the Log4Shell vulnerability last month.

Magniber ransomware spotted

The Magniber ransomware used Windows application package files signed with valid certificates to infect systems. As part of the infection chain process, the visitors were lured to visit a website that pretended to offer updates for Chrome and Edge web browsers.

Top Vulnerabilities Reported in the Last 24 Hours

Apple fixes DoorLock vulnerability

Apple has rolled out software updates for iOS and iPadOS to fix the DoorLock vulnerability that can lead to DoS attacks. Tracked as CVE-2022-22588, the flaw exists in HomeKit, the API used for connecting smart home devices to iOS applications. The flaw can be triggered by sending a maliciously crafted HomeKit accessory name.

Microsoft to fix an RCE flaw

Microsoft is working on a security patch for an RCE vulnerability affecting macOS. Tracked as CVE-2022-21840, the flaw can be exploited to execute malicious code remotely on vulnerable systems. Meanwhile, the firm has issued security updates, addressing the same flaw for Windows systems.

Related Threat Briefings