Cyware Weekly Threat Intelligence - May 12–16

Weekly Threat Briefing • June 16, 2023
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • June 16, 2023
Enhancing the security of devices is one of the most efficient ways to protect against cyber attacks. Keeping this in mind, the CISA issued two separate advisories to improve the security of BMCs and internet-exposed networked management interfaces. Moreover, the FCC is also in the process of establishing a data protection task force to address data privacy threats and SIM swapping attacks.
Despite the good developments, the widescale exploitation of a now patched zero-day flaw in MOVEit file transfer software has reportedly led to the compromise of networks of over 100 organizations. Shell, Ofcom, and the Minnesota Department of Education (MDE) were the target of these attacks. In other news, over 100 well-known brand names were used in a massive impersonation attack that was active since 2022. Some of the major targets included brands such as Nike, Puma, Clarks, Crocs, Caterpillar, Fila, and Vans.
Moving on to new threats, a new variant of ChromeLoader malicious extension has been found targeting users visiting warez and pirated movie sites. The campaign has been underway since March. In another threat campaign, the DoubleFinger malware loader was found deploying the GreetingGhoul stealer to target entities in Europe, the U.S., and Latin America. Researchers also shared details of a modular Pikabot trojan that is capable of executing a range of malicious commands onto victims’ systems.