Cyware Monthly Threat Intelligence

Monthly Threat Briefing • September 30, 2024
Monthly Threat Briefing • September 30, 2024
The government took significant steps to strengthen cybersecurity resilience across various sectors. The DHS allocated $279.9 million in grants for the FY 2024 State and Local Cybersecurity Grant Program (SLCGP) to help state, local, and territorial governments enhance their ability to detect and respond to cyber threats. Meanwhile, German authorities dismantled the infrastructure of a ransomware group using Vanir Locker malware, seizing a leak site and 47 cryptocurrency exchanges linked to illegal money laundering. The FCC also introduced a voluntary cybersecurity labeling program, the U.S. Cyber Trust Mark, to help consumers identify IoT products that meet cybersecurity standards. In addition, the White House released a roadmap to enhance the security of the Border Gateway Protocol (BGP), encouraging the use of secure routing technologies and better monitoring to prevent BGP hijacking and safeguard critical networks.
In the ever-evolving landscape of cyber threats, attackers continue to leverage new vulnerabilities, deceptive tactics, and sophisticated malware to infiltrate systems and compromise sensitive data. Cybercriminals have been distributing AsyncRAT through fake versions of popular software like AnyDesk and CCleaner, tricking users into downloading malware that grants attackers remote access. In parallel, two critical vulnerabilities, CVE-2024-22303 and CVE-2024-21743, in the WordPress theme Houzez and its companion plugin Houzez Login Register, could allow unauthorized users to escalate privileges and take control of sites. Meanwhile, a phishing campaign has been delivering Excel files exploiting CVE-2017-0199 to execute a fileless version of the Remcos RAT via OLE objects and PowerShell commands, targeting various sectors globally. Additionally, Sophos uncovered a cyberespionage attack by Crimson Palace, a Chinese-linked threat actor, which targeted Southeast Asian government organizations using a new malware called Tattletale to steal sensitive data and compromise networks.
In recent developments, a new RomCom malware variant called SnipBot surfaced, incorporating advanced evasion techniques to execute commands and deliver additional payloads. Meanwhile, Earth Baxia has been actively targeting government organizations in Taiwan and potentially other APAC countries through spear-phishing emails exploiting the GeoServer vulnerability (CVE-2024-36401). Additionally, Cisco Talos identified a new threat actor named DragonRank, targeting countries in Asia and Europe with the use of PlugX and BadIIS for SEO manipulation. Moreover, Microsoft addressed 79 vulnerabilities in its September 2024 Patch Tuesday update, including seven critical flaws and actively exploited vulnerabilities such as CVE-2024-38014, CVE-2024-38217, and CVE-2024-38226. The updates also patched 26 flaws in the Chromium-based Edge browser, urging users to install the latest security patches to mitigate the risks.