Cyware Monthly Threat Intelligence

Monthly Threat Briefing • July 1, 2024
Monthly Threat Briefing • July 1, 2024
Recent developments showcase a proactive stance in bolstering cybersecurity across critical sectors. The collaboration between the U.K’s National Crime Agency (NCA) and the FBI to dismantle the Qilin ransomware gang highlights international efforts to combat cybercrime affecting healthcare providers globally. Meanwhile, the release of Supply Chain Cybersecurity Principles by the U.S. Department of Energy and the establishment of a G7 cybersecurity framework for operational technologies underscored a collective commitment to fortifying cybersecurity in global energy supply chains. On the other hand,**** the CISA Cybersecurity Advisory Committee's recommendations to optimize the Joint Cyber Defense Collaborative (JCDC) emphasized a strategic focus on operational cyber defense. This initiative enhances public-private partnerships in sharing cybersecurity data and coordinating defense operations, strengthening national cyber resilience.
The ongoing cyber incidents underscore the evolving and diverse threats faced globally. The Unfurling Hemlock group’s use of the cluster bomb technique highlighted their advanced tactics in delivering multiple malware types, posing significant challenges for detection and mitigation across targeted countries. Some persistent state-sponsored operations were seen. State-linked threat actors like UAC-0184 and Midnight Blizzard were observed conducting cyber-espionage campaigns against Ukraine and France respectively, leveraging sophisticated malware and social engineering tactics to compromise sensitive networks. Scammers were seen using fake job ads to lure victims into cryptocurrency scams highlighting ongoing efforts to exploit economic uncertainties and remote work trends, posing financial risks to unsuspecting job seekers.
The cybersecurity landscape continues to evolve with the emergence of sophisticated threats and critical vulnerabilities. InnoLoader was found disguising itself as cracks and commercial tools, dynamically creating unique malware instances with varying hash values but consistent malicious functionalities via InnoSetup. In other news,**** Snowblind was seen targeting banking customers in Southeast Asia, bypassing detection mechanisms of Android banking apps using accessibility services. A critical authentication bypass vulnerability in MOVEit Transfer versions was identified exposing systems to unauthorized access. Other critical flaws in the vCenter Server could enable remote code execution via the DCE/RPC protocol, impacting virtual machine management.