Cyware Daily Threat Intelligence

Cyware Daily Threat Intelligence - Featured Image

Daily Threat Briefing October 12, 2022

Voila! Patch Tuesday updates are here. Multiple software makers and ICS giants rolled out updates to protect their clients and users across the globe from a variety of cyberattacks. The top firms releasing updates include Microsoft, Siemens, Schneider Electric, Adobe, and SAP. A cybersecurity firm also took the wraps off a cybercriminal group attempting to capitalize on the Russian-Ukraine war situation. It is reportedly using a multi-stage attack chain involving Cobalt Strike Beacon.

What more? A Brazil-based cybercrime group typosquatted and starjacked nearly 200 open-source npm packages. By creating a false sense of legitimacy for their packages, the group aimed to exploit systems using malicious payloads, password stealers, and more.

Top Breaches Reported in the Last 24 Hours

Additional breach disclosure by Omnicell

Omnicell, an American multinational healthcare technology firm, announced that a breach earlier this year affected an additional 64,000 individuals. In the previous disclosure, the count was 62,000 patients. Its IT systems and third-party cloud services fell victim to ransomware attacks. The compromised data may include credit card information, SSNs, driver's license numbers, health insurance details, and more.

Multi-stage threat against Ukraine-Russia

FortiGuard Labs observed a highly opportunistic campaign wanting to take advantage of the ongoing Russia-Ukraine conflict. Researchers stumbled across a malicious Excel document impersonating a tool to calculate salaries for Ukrainian military personnel. It was found capable of downloading multi-stage loaders and also dropping Cobalt Strike Beacon malware infection.

Top Malware Reported in the Last 24 Hours

LockBit exploited Exchange zero-days?

According to cybersecurity firm AhnLab, LockBit ransomware affiliates are exploiting bugs in Microsoft Exchange servers. It is surmised that attackers used an undisclosed zero-day vulnerability. AhnLab claims two servers operated by one of its customers suffered infection with LockBit 3.0 ransomware in July. However, Kevin Beaumont, a renowned researcher, is not convinced that it’s a zero-day.

Black Basta-QakBot-Brute Ratel

Experts at Trend Micro alleged that the Black Basta ransomware is distributing a QakBot variant which further deploys the Brute Ratel framework as a second-stage payload. A large number of groups displayed greater interest in the cybercriminal underground for Brute Ratel, they noted. Also, this marks the first time they witnessed Brute Ratel as a second-stage payload via a QakBot infection.

200 malicious npm packages identified

Cybercrime group LofyGang dispatched roughly 200 malicious NPM packages containing or potentially linked to malicious payloads, Discord-specific malware, and password stealers. The Brazil-based group has been communicating between administrators and members and providing tech support for its hacking tools through a Discord server.

Top Vulnerabilities Reported in the Last 24 Hours

ICS Patch Tuesday update

Siemens and Schneider Electric released a total of 19 security advisories for the October 2022 Patch Tuesday. The former issued 15 advisories covering two dozen security holes with CVE-2022-38465 (related to a global cryptographic key) being the most critical one. The latter issued four new advisories covering a dozen vulnerabilities with six high-severity bugs leading to arbitrary code execution.

Microsoft Patch Tuesday fixes zero-day

In the latest round of patch Tuesday updates, Microsoft addressed a total of 85 security holes. Out of these, 15 are rated Critical, 69 as Important, and one is rated Moderate on the severity scale. This also includes fixes for an actively exploited zero-day, CVE-2022-41033, in the wild. The update, however, fails to offer mitigations against actively exploited ProxyNotShell flaws in Exchange Server.

Security Patch Day at SAP

German enterprise software maker SAP released 15 new security notes and also updated two previously released security notes. The recent release includes two ‘hot news’ notes with critical vulnerabilities, the most severe of which is a file path traversal in Manufacturing Execution - CVE-2022-39802. It has a CVSS score of 9.9 and concerns two plugins for displaying work instructions and models.

Adobe fixes critical bugs

Adobe security patches for 29 documented vulnerabilities across multiple enterprise-facing products are out with a warning of hackers exploiting those to take over vulnerable machines. The bugs impact both Windows and macOS users with the potential for arbitrary code execution, security bypass, arbitrary file system writing, and privilege escalation attacks. Some of the critical-rated flaws scored 9.8/10 in the CVSS severity rating.

Related Threat Briefings