Cyware Daily Threat Intelligence

Daily Threat Briefing • June 1, 2023
Daily Threat Briefing • June 1, 2023
Lately, researchers uncovered about a dozen security holes in an educational software program known as Faronics Insight. It includes three critical bugs that potentially jeopardize the sensitive data of the stakeholders i.e. students and teachers; two of these could be exploited without authentication. This is the second time in quick succession that Ukrainian officials have cautioned against cyberattacks deploying the SmokeLoader malware. In other news, a North Korean threat group has been observed using LNK files to drop the RokRAT malware.
Chrome 114 for Windows, Mac, and Linux is out! The rollout addressed 16 security issues; eight with a high severity rating, four with a medium rating, and one with a low level. It is advised to upgrade to Chrome’s latest version immediately.
BlackCat steals legal data
The BlackCat ransomware group has updated its Tor leak site to include the company Casepoint as one of its victims. The group claimed to have pilfered approximately 2TB of sensitive data purportedly pertaining to lawyers and governmental entities, such as the SEC, DoD, FBI, and police departments. The group has shared images of the alleged stolen documents as proof of the crime.
Ghost sites leak PII
Data security and analytics firm Varonis identified a number of improperly deactivated websites labeled as Salesforce ‘ghost sites' blurting out confidential information, including PII and business data. Furthermore, the exposed data not only include old information but also contain recent records that were shared with guest users due to the sharing configuration within their Salesforce environment.
Millions exposed by biotech company
Enzo Biochem, a New York-based biosciences and diagnostics company, disclosed that it experienced a ransomware attack that affected the test information and personal data of 2.5 million individuals. No specific ransomware group has claimed responsibility for the attack. The company had to take its systems offline following the attack.
SmokeLoader in Ukraine
Ukraine’s CERT has once again warned organizations to prepare themselves for the ongoing SmokeLoader malware. The hacker group responsible for this campaign, UAC-0006, distributes compressed files via compromised email addresses. These files contain malicious JavaScript loaders that serve as a means to deploy SmokeLoader malware onto targeted systems.
RokRAT via LNK files
Spear-phishing attacks by the North Korean group ScarCruft were found employing LNK files to initiate multi-stage infection sequences, leading to RokRAT malware infection. The malware provides the adversary with a range of capabilities from gathering system metadata, capturing screenshots, and enumerating directories to executing remote commands and exfiltrating specific files.
PoC for an RCE bug
A researcher has released the Proof-of-Concept (PoC) exploit for an RCE flaw impacting the Python library ReportLab Toolkit. The issue, earmarked CVE-2023-33733, has nearly 3.5 million monthly downloads on PyPI. Due to the extensive adoption of the library and the existence of a public exploit, numerous users are at risk. To mitigate the resulting supply chain risk, software vendors utilizing the library should promptly implement the available security update.
Google patches over a dozen bugs
Google announced the release of Chrome 114 to the stable channel, patching a total of 18 security vulnerabilities. A total of 13 security flaws were reported by external researchers, eight of which received a ‘high’ severity rating. One of the significant flaws addressed in Chrome 114 is an out-of-bounds write issue within Swiftshader tracked as CVE-2023-2929.
Insecure education software
Researchers detected 11 vulnerabilities in Faronics Insight education software, with three of those categorized as critical with a CVSS score of 9.6. The vulnerabilities could facilitate a cybercriminal to trigger various types of attacks, including unauthenticated RCE attacks. The transmission of data between the Teacher and Student consoles occurs in plaintext. The flaws, hence, expose the transmitted data to Man-in-the-Middle (MitM) attacks.
Flawed security product
Organizations utilizing Moxa's MXsecurity product are affected by two potentially critical vulnerabilities that attackers could abuse to target their OT networks. The first one is an authentication bypass issue (CVE-2023-33235) and the other is a high-severity RCE flaw (CVE-2023-33236) in the SSH command-line interface. SSH admin credentials are required to abuse the latter.