We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner.

SummaryWater Sigbin continues to exploit CVE-2017-3506 and CVE-2023-21839 to deploy  cryptocurrency miners via a PowerShell script. The threat actor employs fileless execution techniques, using DLL reflective and process injection, allowing the malware code to run solely in memory and avoid disk-based detection mechanisms.…
Read More

Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three known exploited vulnerabilities to its catalog, including a code injection flaw in GeoServer and a use-after-free vulnerability in the Linux Kernel.

Threat Actor: N/A Victim: N/A

Key Point :

The GeoServer flaw (CVE-2022-24816) allows for remote code execution through code injection in the Jai-Ext open source project.…
Read More

Summary: This content discusses the unpatchable vulnerabilities found in temperature monitors made by Proges Plus and used in hospitals.

Threat Actor: No specific threat actor mentioned. Victim: Hospitals using temperature monitors made by Proges Plus.

Key Point :

Researchers have discovered unpatchable vulnerabilities in temperature monitors made by Proges Plus and used in hospitals.…
Read More

Affected Platforms: Microsoft WindowsImpacted Users: Microsoft WindowsImpact: The stolen information can be used for future attackSeverity Level: High

Spyware is malicious software engineered to covertly monitor and gather information from a user’s computer without their awareness or consent. It can record activities like keystrokes, browsing behavior, and personal information, often transmitting this data to a third party for espionage or theft.…

Read More

Summary: This content discusses a critical SQL injection vulnerability in Fortra FileCatalyst Workflow (CVE-2024-5276) and the availability of a proof-of-concept exploit online.

Threat Actor: N/A

Victim: Enterprise admins using Fortra FileCatalyst Workflow

Key Point:

A critical SQL injection vulnerability (CVE-2024-5276) has been discovered in the Workflow component of Fortra FileCatalyst.…
Read More

Summary: This content discusses multiple vulnerabilities in ADOdb, a PHP database abstraction layer library, and emphasizes the importance of updating the library to mitigate potential security risks.

Threat Actor: N/A

Victim: N/A

Key Point :

Multiple vulnerabilities have been addressed in ADOdb, including SQL injection attacks, cross-site scripting (XSS) attacks, and authentication bypasses.…
Read More

Summary: This content discusses a vulnerability in a vendor’s product and provides a business recommendation for addressing the issue.

Threat Actor: N/A

Victim: N/A

Key Point :

The vendor, Siemens, is a technology company focused on industry, infrastructure, transport, and healthcare. SEC Consult recommends installing a patch provided by the vendor and conducting a thorough security review of the product.…
Read More

Summary: Apple has released a firmware update for AirPods to address an authentication issue that could allow unauthorized access to the headphones, potentially enabling eavesdropping on private conversations.

Threat Actor: N/A

Victim: AirPods users

Key Point :

An authentication issue in AirPods could allow a malicious actor to gain unauthorized access to the headphones.…
Read More

Summary: The Cybersecurity and Infrastructure Security Agency (CISA) has notified organizations of potential data exposure after an unidentified threat actor accessed CISA’s Chemical Security Assessment Tool. While no evidence of data theft was found, unauthorized access to sensitive information may have occurred.

Threat Actor: Unidentified threat actor | unidentified threat actor Victim: Cybersecurity and Infrastructure Security Agency (CISA) | CISA

Key Point :

The intrusion into CISA’s systems was linked to widely exploited zero-day vulnerabilities in Ivanti remote access VPNs.…
Read More

Summary: This content discusses two new vulnerabilities in MOVEit Transfer and MOVEit Gateway, which can be exploited by threat actors to bypass SFTP authentication and gain unauthorized access.

Threat Actor: Unspecified | Unspecified Victim: Progress Software | Progress Software

Key Point :

Progress Software has disclosed two vulnerabilities in MOVEit Transfer and MOVEit Gateway, namely CVE-2024-5806 and CVE-2024-5805.…
Read More

Published On : 2024-06-26

Fancy Bear, also known as APT28, is a notorious Russian cyberespionage group with a long history of targeting governments, military entities, and other high-value organizations worldwide. Active since 2007, they are infamous for their stealthy and well-coordinated cyberattacks. Fancy Bear has been implicated in attempts to influence election processes in the U.S.,…

Read More

Threat Actor: Unknown | Unknown Victim: CISA’s CSAT environment | CISA’s CSAT environment Price: Not specified Exfiltrated Data Type: CSAT user accounts, Top-Screen surveys, Security Vulnerability Assessments, Site Security Plans, Personnel Surety Program (PSP) submissions

Key Points :

CISA’s CSAT environment was hacked in January, resulting in the potential unauthorized access of various sensitive information.…
Read More