Cyware Daily Threat Intelligence

Daily Threat Briefing • May 10, 2023
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Daily Threat Briefing • May 10, 2023
It’s that time of the month when software vendors and critical infrastructure industries issue security patches in bulk to address numerous vulnerabilities across different services and products. To start with, Intel and AMD rolled out updates for over 100 vulnerabilities found in their products. On the other hand, Microsoft shared patches for 38 new vulnerabilities, out of which three are zero-day flaws. Siemens and Schneider Electric also issued several new advisories to address over 30 vulnerabilities affecting their products.
Moving on from security updates, researchers encountered a new RapperBot campaign that has been active since January. The attackers behind the campaign are using new variants of the malware to venture into cryptojacking.
Updates on the Metropolitan Opera attack
In a new update, the Metropolitan Opera revealed that the personal information of over 45,000 customers was impacted in a cyberattack that occurred last December. This included the names, financial account information, tax identification numbers, Social Security numbers, payment card information, and driver’s license numbers of individuals. It is learned that the attackers had access to their systems between September 20, 2022, and December 6, 2022.
Sysco confirms cyberattack
Sysco, a leading food distribution company, confirmed that its network was breached earlier this year in a cyberattack that impacted the sensitive data of its employees and customers. The investigation is ongoing and, so far, it is believed that the accessed data includes names, Social Security numbers and account numbers of employees.
Snake malware attack dismantled
The FBI-led Operation Medusa dismantled a Snake malware campaign that was operated by the Center 16 of Russia’s Federal Security Service (FSB) to collect sensitive information from high-priority targets such as government entities, research facilities, and journalists. The malware infection has been identified in over 50 countries, including the U.S., Europe, and Asia. In the U.S., the victims include organizations in the education, media, financial, and government sectors.
A new variant of RapperBot observed
FortiGuard Labs encountered a new variant of the RapperBot botnet that has been in use in an attack campaign since January. The attackers are using the variant to expand their malicious activities beyond DDoS attacks to now include cryptojacking capabilities. It includes a revamped C2 communication protocol to receive commands and send back information about the infected systems.
Microsoft fixes 38 CVEs
Microsoft rolled out fixes for around 38 vulnerabilities, including three zero-day flaws, as part of May Patch Tuesday. The zero-day flaws are identified as CVE-2023-29336, CVE-2023-24932, and CVE-2023-29325. Experts warn that organizations must patch the zero-days quickly as two of them are being actively exploited in the wild.
ICS flaws patched
Siemens and Schneider Electric issued several new advisories for May 2023 Security Updates to address over 30 vulnerabilities affecting their products. Siemens has released patches for 26 vulnerabilities, out of which two are critical flaws found in Siveillance Video products. Other issues are related to command injection, path traversal, DoS, and hardcoded credentials. Schneider Electric has published advisories for half a dozen vulnerabilities affecting OPC Factory Server, PowerLogic power meters, and Aveva.
Adobe issues patches for 14 security flaws
Adobe released security patches for 14 vulnerabilities discovered in Substance 3D Painter. These flaws affect versions prior to 8.3.0 of the product. A vast majority of these flaws are memory-related vulnerabilities that can be exploited to launch arbitrary code execution attacks. There is no indication that these flaws have been exploited in the wild.
Intel and AMD issued over 100 patches
Intel and AMD both have released advisories for more than 100 vulnerabilities found in their products. While Intel’s advisories cover patches for 80 vulnerabilities, AMD published advisories for 19 client vulnerabilities and 14 server vulnerabilities. Many of these flaws can be abused to escalate privileges and take control of the systems.
SAP address 18 flaws
SAP announced the release of security notes that addresses 18 new security vulnerabilities. Five of these vulnerabilities were found in the Reprise License Manage 14.2 component of SAP 3D Visual Enterprise License Manager. Other affected products include Business Objects Intelligence Platform, NetWeaver, IBP Excel add-in, and SAPUI5.