0% found this document useful (0 votes)
16 views10 pages

Week in Overview (6 Feb-13 Feb) - 2024

The document provides a technical overview of recent cybersecurity threats and vulnerabilities, including the exploitation of SOHO facilities by Chinese APT groups for cyberespionage, advancements in Raspberry Robin malware, and various critical vulnerabilities such as CVE-2024-21762 in FortiOS and CVE-2023-5996 in Google Chrome. It emphasizes the importance of patching and updating systems to mitigate risks associated with these threats. Additionally, it highlights a recent increase in exploitation attempts targeting Ivanti Connect Secure systems.

Uploaded by

matlnx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views10 pages

Week in Overview (6 Feb-13 Feb) - 2024

The document provides a technical overview of recent cybersecurity threats and vulnerabilities, including the exploitation of SOHO facilities by Chinese APT groups for cyberespionage, advancements in Raspberry Robin malware, and various critical vulnerabilities such as CVE-2024-21762 in FortiOS and CVE-2023-5996 in Google Chrome. It emphasizes the importance of patching and updating systems to mitigate risks associated with these threats. Additionally, it highlights a recent increase in exploitation attempts targeting Ivanti Connect Secure systems.

Uploaded by

matlnx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Week in Overview(6 Feb-13 Feb) - 2024

WWW.THREATRADAR.NET
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

Technical Summary
Technical Summary: Chinese APT Groups Exploiting SOHO Technical Summary: Raspberry Robin Malware Advances
Facilities for Cyberespionage with New Exploits
Chinese Advanced Persistent Threat (APT) groups, The Raspberry Robin malware has evolved with two new one-
particularly APT15 (Vixen Panda, Ke3chang) and APT31 day exploits, CVE-2023-36802 and CVE-2023-29360, to
(Zirconium, Judgment Panda), have been identified as escalate privileges on compromised devices. This Windows
exploiting Small Office/Home Office (SOHO) facilities for worm, discovered by security experts, infects networks via
cyberespionage operations, primarily targeting government infected USB drives and gains access through msiexec.exe,
and political institutions. These groups leverage installing malicious DLL files. The malware employs
compromised SOHO devices, such as routers, to create sophisticated techniques, including utilizing Discord for
sophisticated obfuscation networks, making detection of distribution and leveraging exploits targeting CVE
their activities challenging. Recent incidents, including the vulnerabilities, to evade detection and elevate privileges on
compromise of the Federal Agency for Cartography and compromised devices.
Geodesy (BKG) in Germany, highlight the severity of these
attacks. Preventive measures, such as updating and replacing Technical Summary: CVE-2024-22024 Exploitation Attempts
outdated devices, are recommended to mitigate the risks CVE-2024-22024 is a vulnerability exploited by threat actors,
associated with these Chinese cyber actors. primarily targeting the '/dana-na/auth/saml-sso.cgi' endpoint
in Ivanti Connect Secure. Exploitation attempts have been
Technical Summary: CrowdStrike Super Bowl Ad Campaign: observed, indicating a potential threat to organizations using
"Riding with CrowdStrike" Ivanti products. The vulnerability allows remote attackers to
CrowdStrike launched a high-impact ad campaign during the execute arbitrary code or commands, highlighting the
Super Bowl, titled "Riding with CrowdStrike," to raise importance of applying security patches and implementing
awareness about modern cybersecurity threats. The mitigations to prevent exploitation.
campaign emphasizes CrowdStrike's commitment to securing
the future against relentless adversaries. Through dynamic Technical Summary: CVE-2023-5996
visuals and a powerful narrative, the ad showcases CVE-2023-5996 is a use-after-free vulnerability discovered in
CrowdStrike's proactive approach to cybersecurity and its Chrome's WebAudio component, exploited by threat actors
role as a trusted ally in safeguarding organizations and to execute arbitrary code. The vulnerability allows attackers
individuals from cyberattacks. to trigger audio rendering threads in closed AudioContext
instances, leading to unauthorized code execution. Users are
Technical Summary: Exploring Malware Obfuscation advised to update their Chrome browsers to patched
Techniques versions to mitigate the risk of exploitation.
Malware authors employ various obfuscation techniques to
evade detection and analysis by cybersecurity researchers. Technical Summary: CVE-2024-21762
This series explores modern methods used by malware CVE-2024-21762 is an out-of-bounds write vulnerability
obfuscators, such as .NET Reactor and SmartAssembly, to identified in FortiOS, potentially allowing remote
modify malware code and hinder analysis. Techniques unauthenticated attackers to execute arbitrary code or
include proxy functions, character breakdown, numeric commands. The vulnerability affects multiple versions of
conversion, heavy math operations, and Control Flow Graph FortiOS, and users are advised to upgrade to patched
(CFG) obfuscation. The series aims to demystify versions to address the issue and mitigate the risk of
deobfuscation techniques and provide insights for both exploitation.
beginners and experienced malware analysts.

Key Findings
it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their
systems and data. The following key findings highlight the importance of proactive measures to mitigate risks
associated with various vulnerabilities and threats:

Chinese APT Groups Exploiting SOHO Facilities for Cyberespionage


CrowdStrike Super Bowl Ad Campaign: "Riding with CrowdStrike"
Exploring Malware Obfuscation Techniques
Raspberry Robin Malware Advances with New Exploits
CVE-2024-22024 Exploitation Attempts
CVE-2023-5996
CVE-2024-21762
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

🚨 Vulnerability of the Week


CVE-2024-21762
Advisory ID: FG-IR-24-015 Workaround: Disabling SSL VPN is advised as a temporary
Date: February 8, 2024 workaround. Note that disabling webmode is not
Severity: Critical considered a valid workaround.
CVE ID: CVE-2024-21762
CVSSv3 Score: 9.6 Recommendation: It is strongly recommended that all
IR Number: FG-IR-24-015 affected users apply the respective patches or upgrades
as soon as possible to mitigate the risk associated with
Summary: A critical vulnerability has been discovered in this vulnerability. Additionally, organizations should
FortiOS, specifically in the sslvpnd component, which monitor their networks for any signs of unauthorized
could allow remote attackers to execute arbitrary code access or unusual activity.
or commands via specially crafted HTTP requests. This
vulnerability stems from an out-of-bounds write issue https://twitter.com/Kostastsale/status/175582045510818
[CWE-787]. It is crucial to address this vulnerability 2280
promptly to prevent potential exploitation by malicious
actors. It has been noted that this vulnerability is
potentially being exploited in the wild.
Impact: Successful exploitation of this vulnerability
could result in unauthorized execution of arbitrary code
or commands on affected systems, leading to potential
compromise of confidentiality, integrity, and availability
of data and services.

Affected Versions and Solutions:


FortiOS 7.6: Not affected (Not Applicable)
FortiOS 7.4: Upgrade affected versions (7.4.0
through 7.4.2) to version 7.4.3 or above.
FortiOS 7.2: Upgrade affected versions (7.2.0
through 7.2.6) to version 7.2.7 or above.
FortiOS 7.0: Upgrade affected versions (7.0.0
through 7.0.13) to version 7.0.14 or above.
FortiOS 6.4: Upgrade affected versions (6.4.0
through 6.4.14) to version 6.4.15 or above.
FortiOS 6.2: Upgrade affected versions (6.2.0
through 6.2.15) to version 6.2.16 or above.
FortiOS 6.0: Migrate to a fixed release. All versions
are affected.
FortiProxy 7.4: Upgrade affected versions (7.4.0
through 7.4.2) to version 7.4.3 or above.
FortiProxy 7.2: Upgrade affected versions (7.2.0
through 7.2.8) to version 7.2.9 or above.
FortiProxy 7.0: Upgrade affected versions (7.0.0
through 7.0.14) to version 7.0.15 or above.
FortiProxy 2.0: Upgrade affected versions (2.0.0
through 2.0.13) to version 2.0.14 or above.
FortiProxy 1.2: Migrate to a fixed release. All versions
are affected.
FortiProxy 1.1: Migrate to a fixed release. All versions
are affected.
FortiProxy 1.0: Migrate to a fixed release. All
versions are affected.
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

🥵 Malware or Ransomware

https://twitter.com/socradar/status/1757070881833029799

Raspberry Robin, a Windows worm malware first discovered in 2021, has evolved with increased sophistication and now incorporates two
new one-day exploits: CVE-2023-36802 and CVE-2023-29360. These exploits enable the malware to escalate privileges on compromised
devices, posing significant risks to affected networks.

Recent Developments:
Hundreds of businesses' networks have already fallen victim to Raspberry Robin, indicating widespread impact.
Raspberry Robin infiltrates systems through infected USB drives containing malicious .LNK files.
Upon execution, the malware launches a msiexec.exe process to install malicious DLL files, subsequently establishing communication
with command and control (C2) servers via short URLs.
The malware leverages legitimate Windows utilities like fodhelper.exe and odbcconf.exe to execute and configure the malicious DLLs,
enabling it to gain persistence and evade detection.
Recent observations reveal that Raspberry Robin utilizes Discord to distribute malicious archive files, disguising them as legitimate
Windows components.
The malware now incorporates two new one-day exploits targeting CVE-2023-36802 and CVE-2023-29360, both Local Privilege Escalation
(LPE) vulnerabilities in Microsoft Streaming Service Proxy.

Significance:
The inclusion of new exploits signifies a significant advancement in Raspberry Robin's capabilities, potentially indicating collaboration
with exploit sellers or direct involvement of malware authors in exploit development.
Raspberry Robin continues to refine its features, enhance evasion techniques, and adapt communication methods to evade detection by
security measures.
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

Art of Detection

https://twitter.com/anyrun_app/status/1756975909402194428

A new series has commenced, delving into the complex realm of Sample Obfuscation Strategies: The series initiates by presenting
malware obfuscation. This series aims to dissect tools like .NET a simple obfuscator and exploring various strategies to enhance
Reactor and SmartAssembly, shedding light on how they modify protection, including:
.NET code to impede analysis, specifically targeting .NET's Proxy Functions: Moving string assignments into separate
Intermediate Language (IL). The exploration of obfuscation functions to complicate analysis.
techniques is geared towards providing insights for both Character Breakdown: Splitting strings into individual
beginners and seasoned individuals in malware analysis. characters to obscure their meaning.
Numeric Conversion: Replacing characters with their
Understanding Obfuscators: Obfuscators are software numerical representations to obfuscate the code.
designed to modify code, hindering analysis and making it Heavy Math: Using complex mathematical operations with
challenging for researchers to decompile. While some randomly generated expressions to deter analysis.
obfuscators mutate machine code, targeting malware CFG Obfuscation: Making the control flow complex and
developed using languages like C, Assembly, or Rust, others challenging to follow.
focus on modifying IL code generated by .NET compilers. Future Outlook: The series promises to continue dissecting
obfuscation techniques, aiming to provide readers with a deeper
Series Objectives: This series of articles aims to unravel modern understanding of malware evasion tactics. Each article will build
techniques employed by obfuscators like .NET Reactor and upon the previous, gradually unraveling the intricate layers of
SmartAssembly, preferred choices of malware creators. The obfuscation employed by malware creators.
articles will delve into deobfuscation methods, explore tools
designed to counter obfuscation, and potentially develop or
adapt deobfuscators.

Scope and Audience: The content is designed to be accessible


to individuals with a basic understanding of .NET, while also
catering to those with some experience in malware analysis. A
foundational knowledge of malware analysis tools and concepts
is expected, with prior experience in analyzing obfuscated code
considered advantageous.
🥷 TTP Analysis

The German intelligence service BfV (Bundesamt für Verfassungsschutz) has


issued a Cyber Brief detailing the activities of Chinese cyber espionage groups
APT15 (Vixen Panda, Ke3chang) and APT31 (Zirconium, Judgment Panda). These
groups have been identified as exploiting Small Office/Home Office (SOHO)
facilities for state-sponsored cyber operations, primarily targeting government
and political institutions.

In this campaign, APT15 and APT31 have utilized SOHO devices, commonly used
to create small home networks, for their cyber operations. These devices, if not
adequately updated or supported by manufacturers, are particularly vulnerable
to exploitation.

The attackers leverage compromised SOHO devices to create sophisticated


obfuscation networks, resembling commercial VPN networks. This infrastructure
enables them to penetrate victim networks with multiple intermediate steps,
making it challenging to detect their activities.

While the BfV has not reported any casualties, German news sources indicate
that APT15 compromised the Federal Agency for Cartography and Geodesy
(BKG) using a network of compromised routers. This incident, confirmed by
forensic network analysis, occurred in December 2021, resulting in the
reconstruction of the affected network.

The severity of the incident prompted international cooperation, leading to the


creation of a joint classified report on APT15, involving at least 12 countries
sharing their knowledge.

Additionally, APT31's campaign targeting SOHO devices, particularly routers,


was previously attributed by the French ANSSI in April 2021.

The Cyber Brief offers preventive measures to mitigate risks associated with
Chinese cyber actors, emphasizing the importance of installing updates and
replacing outdated devices no longer supported by manufacturers.

https://twitter.com/_cybule/status/1699741309479563512
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

🟥 1Day

Advisory ID: CVE-2023-5996


Date: October 31, 2023
Severity: High
CVE ID: CVE-2023-5996
Vulnerability Type: Use-after-free
Affected Software: Google Chrome
Impact: Remote Code Execution (RCE)

Summary: A critical vulnerability has been discovered in Google Chrome's WebAudio component, indexed
as CVE-2023-5996. The vulnerability allows remote attackers to execute arbitrary code within the context
of the renderer process. The issue was first brought to light by Hossein Lotfi during the Tianfu Cup 2023
event.

Vulnerability Details: The vulnerability stems from improper handling of AudioContext in certain scenarios,
allowing the forced initiation of audio rendering processes even without user interaction. Specifically, the
vulnerability occurs within the RealtimeAudioDestinationHandler class. By manipulating the channel count
parameter, attackers can trigger the StartPlatformDestination function, consequently initiating audio
rendering threads. This can be further exploited to reinstate audio rendering threads in closed
AudioContext objects, leading to a use-after-free vulnerability.

Exploitation: Exploiting this vulnerability enables attackers to execute arbitrary code within the context of
the affected renderer process. By carefully crafting an exploit, attackers can trigger a use-after-free
condition, allowing them to manipulate memory layout and execute arbitrary code. This could lead to
potential compromise of confidentiality, integrity, and availability of user data and system resources.

Recommendation: To mitigate the risk associated with CVE-2023-5996, it is strongly recommended that all
users update their Google Chrome installations to the latest available version as soon as possible.
Additionally, users are advised to exercise caution when visiting unfamiliar websites or downloading files
from untrusted sources to minimize the risk of exploitation.

References:
Google Chrome Issue Tracker - CVE-2023-5996
https://twitter.com/hosselot/status/1757049551888719973
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

🌶️ Trending Exploit

https://twitter.com/Shadowserver/status/1757063290746790184

Since February 9th, 2024, around 8:00 UTC, there has been a notable increase in exploitation attempts
targeting Ivanti Connect Secure systems. These attempts primarily focus on exploiting the '/dana-
na/auth/saml-sso.cgi' endpoint. Analysis reveals that these are primarily callback tests, suggesting
reconnaissance or vulnerability verification activities. As of the latest observation, a total of 47 unique IP
addresses have been identified engaging in exploitation attempts.

Advisory and Further Information: For detailed information regarding CVE-2024-22024 and mitigation
strategies, refer to the official Ivanti advisory available at Ivanti Advisory.

For ongoing monitoring of CVE-2024-22024 exploitation attempts and other targeted attacks against Ivanti
products, access the Shadowserver dashboard at Shadowserver Dashboard. Note that the tag for CVE-
2024-22024 was added on February 10th, 2024, and thus the dashboard does not display attack statistics
for February 9th, 2024.

Recommendations:
Ivanti Connect Secure administrators are strongly advised to review the provided advisory and apply
recommended patches or updates promptly.
Implement additional security measures such as firewall rules, intrusion detection systems, and web
application firewalls to detect and mitigate exploitation attempts.
Monitor network traffic and system logs for any suspicious activities or unauthorized access attempts.
Regularly update and patch Ivanti products to ensure resilience against known vulnerabilities and
emerging threats.
Threat Intel Roundup: FortiOS, Super Bowl, Chrome, APT15

🕯️ The Topic of the Week

https://www.youtube.com/watch?v=BEkziTXz9Js

CrowdStrike, a leading cybersecurity company, The ad effectively communicates CrowdStrike's message


launched an impactful ad campaign during the Super of resilience, highlighting the company's proactive
Bowl, tapping into the massive audience of one of the approach to cybersecurity and its commitment to staying
most-watched events globally. The campaign, titled ahead of emerging threats. By showcasing their
"Riding with CrowdStrike," aimed to raise awareness capabilities in a high-profile setting like the Super Bowl,
about modern cybersecurity threats and highlight CrowdStrike aims to reach a broad audience and
CrowdStrike's commitment to securing the future reinforce its position as a leader in the cybersecurity
against relentless adversaries. industry.

The ad opens with a powerful message: "Modern To experience the full impact of the CrowdStrike Super
adversaries are relentless." This sets the tone for the Bowl ad campaign, viewers can watch the captivating
narrative, emphasizing the ever-evolving nature of video on YouTube: CrowdStrike Super Bowl Ad.
cyber threats in an increasingly advanced technological
landscape. As the scene unfolds, viewers are introduced
to "Charlotte," portrayed as CrowdStrike's secret
weapon, ready to take on these adversaries.

With pulsating music and dynamic visuals, the ad


captures the urgency and importance of cybersecurity
in today's digital age. CrowdStrike positions itself as the
ally against these threats, offering protection not just
for today but also for the future.

The tagline "CrowdStrike stops breaches. Today.


Tomorrow. And beyond." encapsulates the company's
dedication to continuous innovation and proactive
defense against cyber breaches. It reinforces
CrowdStrike's reputation as a trusted partner in
safeguarding organizations and individuals from
cyberattacks.
HADESS
cat /etc/HADESS

"Hadess" is a cybersecurity company focused on safeguarding digital assets


and creating a secure digital ecosystem. Our mission involves punishing hackers
and fortifying clients' defenses through innovation and expert cybersecurity
services.

Website: Threat Radar


WWW.HADESS.IO WWW.THREATRADAR.NET

Threat Radar is a powerful threat intelligence platform that combines advanced analytics, machine learning, and human expertise to deliver actionable intelligence to organizations. It
continuously monitors various data sources, including the deep web, dark web, social media platforms, and open-source intelligence, to identify potential threats, vulnerabilities, and
emerging attack patterns.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy