News Items

  • news

    Visible to the public "CardioComm Takes Systems Offline Following Cyberattack"

    Canadian heart monitoring and medical electrocardiogram solutions provider CardioComm recently announced it has taken systems offline following a cyberattack. The company stated that the cyberattack impacted its production server environments and has an impact on its business operations. Visitors to the company's website are informed that CardioComm services are currently offline. The company noted that business operations will be impacted for several days and potentially longer depending on how quickly they are able to restore its data and re-establish its production server environments. According to CardioComm, it has no evidence that customer health information was compromised in the attack, mainly because its software runs on each client's systems. CardioComm noted that it does not collect patient health information from its clients. The incident, the company noted, might also impact its ability to finalize required filings in response to a Cease Trade Order issued by the Ontario Securities Commission, which resulted in the suspension of its shares trading, imposed by the TSX Venture Exchange. Although CardioComm did not share details on the type of cyberattack it fell victim to, it is possible that ransomware might have been involved. CardioComm provides hospital, physician, and consumer device software for recording, analyzing, and managing electrocardiograms for the diagnosis of cardiac patients.

    SecurityWeek reports: "CardioComm Takes Systems Offline Following Cyberattack"

  • news

    Visible to the public "Multiple Security Issues Identified in Peloton Fitness Equipment"

    Security researchers at Check Point have discovered that internet-connected Peloton fitness equipment is plagued with numerous security issues that could allow attackers to obtain device information or deploy malware. The researchers analyzed the software running on the Peloton Treadmill and revealed exposure to security risks associated with Android devices that are not updated to the most recent platform iterations, as well as risks posed by attackers with physical access to the device. The treadmill runs Android 10, which does not contain patches for more than 1,000 vulnerabilities that have been addressed in the operating system over the past three years. Furthermore, the device was found to have USB debugging enabled, meaning that an attacker with physical access could retrieve a list of all installed packages and could also obtain shell access, compromising the treadmill completely. The researchers noted that an attacker could use specific commands to exfiltrate data from the treadmill, or they could exploit the existing applications, which are compiled using different SDK versions. Applications can also be fetched for reverse engineering and for extracting secrets. According to the researchers, some applications on the device incorporate rooting detection mechanisms, but an attacker could use certain techniques to identify further vulnerabilities in the applications at runtime. Additionally, the researchers identified hardcoded sensitive information on the device, such as a license key for a text-to-speech voice service. The service could be abused for denial-of-service (DoS). The researchers noted that certain unprotected services were also identified on the treadmill, potentially allowing malicious applications to escalate privileges and gain access to sensitive data or to abuse broadcast receivers and send the device into an infinite loop, preventing updates. The researchers also discovered "differences in the signature scheme of the installed apps," which could potentially expose the device to malicious attacks. The researchers stated that the treadmill operating system includes numerous standard APIs that can be exploited to execute Android code, allowing attackers to carry out nefarious actions from a networking perspective and take advantage of the device's always-on nature. Moreover, the presence of a webcam and microphone makes the treadmill vulnerable to eavesdropping attacks if malware is installed. The researchers were able to sideload a mobile remote access tool (MRAT) on the device, gaining full access to the treadmill's functionality, including audio recording, taking photos, accessing geolocation, and abusing the network stack. According to the researchers, the compromised device also provided "full access to the local area network," which could be leveraged for additional malicious activities. After being informed of these issues, Peloton told the researchers that "they meet expected security measures for Android-based devices," pointing out that physical access is required for exploitation.

    SecurityWeek reports: "Multiple Security Issues Identified in Peloton Fitness Equipment"

  • news

    Visible to the public "EPSS Vulnerability Scores Can Help Focus on Key Patches, Says Study"

    According to a study by Rezilion, the new Machine Learning (ML)-based Exploit Prediction Scoring System (EPSS) can help overcome the limitations of existing vulnerability tracking systems. Researchers at Rezilion say that the leading vulnerability tracking systems, such as the Common Vulnerability Scoring System (CVSS) and the catalog of Known Exploited Vulnerabilities (KEV) maintained by the US Cybersecurity and Infrastructure Security Agency (CISA), do not effectively predict the severity and exploitability of a vulnerability. The study says that relying solely on a CVSS severity score to evaluate the risk of individual vulnerabilities is equivalent to randomly selecting vulnerabilities for remediation. This article continues to discuss points and findings from Rezilion's study regarding EPSS and issues with CVSS and KEV.

    CSO Online reports "EPSS Vulnerability Scores Can Help Focus on Key Patches, Says Study"

  • news

    Visible to the public "DepositFiles Exposed Config File, Jeopardizing User Security"

    DepositFiles is a service that claims to be the ideal location to store and share files. However, researchers discovered DepositFiles' publicly hosted environment configuration (config) file, a critical record of how to run software. The file exposed payment service credentials, Abuse and Support email credentials, and more. Due to this exposure, the service's clients are at risk of having their Personal Identifiable Information (PII), files, and passwords stolen. Researchers noted that attackers could also target the company with malware, ransomware, and unauthorized access to business payment systems. They believe that the environment configuration file was exposed beginning in February 2023 based on the indexing of another sensitive file. This article continues to discuss DepositFiles' environment configuration file being left accessible and the potential impact of this exposure.

    Security Affairs reports "DepositFiles Exposed Config File, Jeopardizing User Security"

  • news

    Visible to the public "NCSC Publishes New Guidance on Shadow IT"

    The UK's leading cybersecurity agency NCSC has released new guidance for system owners and technical staff on managing shadow IT in their organization. Shadow IT refers to the devices and services employees use for work without the IT department knowing. They could include smart devices, servers, virtual machines, cloud storage, and unapproved messaging or collaboration tools. The NCSC stated that since these are not accounted for by asset management nor aligned with corporate IT processes or policy, they're a risk to organizations. NCSC argued that given the potentially serious repercussions of shadow IT, technical teams should focus on finding where it exists in the organization and address the underlying causes of it. The NCSC shared both organizational mitigations and technical solutions to the shadow IT challenge. The latter includes network access controls, asset management, network scanners, unified endpoint management, and Cloud Access Security Broker (CASB) tools.

    Infosecurity reports: "NCSC Publishes New Guidance on Shadow IT"

  • news

    Visible to the public "Infostealer Incidents More Than Doubled in Q1 2023"

    In the first quarter of 2023, the number of incidents involving infostealer malware more than doubled compared to last year, mainly targeting Windows, Linux, and macOS. According to a recent study by Uptycs, most of the perpetrators behind infostealer malware use Telegram as a platform for command-and-control (C2) and data exfiltration. Infostealer malware targets victims by stealing passwords, login credentials, and other sensitive information. Following the collection of personal information, the stealer sends it to the malicious actor's C2 system. Uptycs' examination of the dark web revealed that RedLine has the largest market share, followed by Raccoon and the RecordBreaker stealer. Newcomer Meta, Vidar, Cryptbot, and AZORult are other widely-used infostealers. This article continues to discuss key findings from Uptycs' latest report on infostealers.

    SC Magazine reports "Infostealer Incidents More Than Doubled in Q1 2023"

  • news

    Visible to the public "Cybersecurity Performance Goals: Sector-Specific Goals"

    Now that the cross-sector Cybersecurity Performance Goals (CPGs) have been published, the US Cybersecurity and Infrastructure Security Agency (CISA) is collaborating with Sector Risk Management Agencies (SRMAs) to develop Sector-Specific Goals (SSGs) for each critical infrastructure sector. In most cases, these goals will consist of either new, unique additional goals with direct applicability to a given sector or materials to help sector constituents implement the existing cross-sector CPGs effectively. Developing SSGs will involve providing examples of recommended infrastructure and entity-specific actions. Since there are 16 critical infrastructure sectors with varying requirements, CISA will tackle this effort in phases. CISA will first work with the Energy, Financial Services, Information Technology (IT), and Chemical sectors. In addition, CISA will work with the Water/Wastewater sector, Healthcare sector, and K-12 subsector throughout the year to determine how organizations in these sectors/subsector can improve their cybersecurity posture by implementing the existing set of cross-sector goals. This article continues to discuss the cross-sector CPGs and SSGs.

    CISA reports "Cybersecurity Performance Goals: Sector-Specific Goals"

  • news

    Visible to the public "Supply Chain Attack Hits NHS Ambulance Trusts"

    A cyberattack on an NHS supplier has recently left two ambulance trusts serving millions of people without access to electronic patient records. Swedish healthcare IT firm Ortivus said in a statement that an attack on July 18 left affected UK customers using its hosted data center. Ortivus noted that electronic patient records are currently unavailable and are, until further notice, handled using manual systems. No patients have been directly affected. The company stated that no other systems have been attacked, and no customers outside of those in the hosted data center have been affected. Ortivus noted that it is currently working in close collaboration with the affected customers to restore the systems and recover data. The affected customers are the ones using MobiMed ePR, electronic patient record systems in a hosted environment. BBC claimed that South Central Ambulance Service (SCAS) and South Western Ambulance Service (SWASFT) are both affected by the incident. Neither trust has released any information publicly about the incidents. Although Ortivus claimed no patients have been directly affected, if ambulances turn up without the ability to access patient records, it's likely that the standard of care will suffer. The two trusts are said to serve around 12 million people in the south of England.

    Infosecurity reports: "Supply Chain Attack Hits NHS Ambulance Trusts"

  • news

    Visible to the public "Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining"

    As part of a new campaign designed to deliver the Mirai botnet malware and cryptocurrency miners, misconfigured and inadequately secured Apache Tomcat servers are being targeted. Over 800 attacks were detected against Aqua's Tomcat server honeypots over a two-year period, with 96 percent of the attacks linked to the Mirai botnet. Twenty percent (or 152) of these attack attempts involved the use of a web shell script named "neww" that originated from 24 different IP addresses, with 68 percent of them coming from a single IP address (104.248.157[.]218). Nitzan Yaakov, a security researcher at Aqua, explained that the threat actor scanned for Tomcat servers and launched a brute force attack against them, attempting to obtain access to the Tomcat web application manager by entering different credential combinations. After establishing a foothold, threat actors have been observed deploying a WAR file containing a malicious web shell class designed to listen for remote requests and execute arbitrary commands on the Tomcat server. This article continues to discuss hackers targeting Apache Tomcat servers in a new campaign aimed at delivering the Mirai botnet malware and cryptocurrency miners.

    THN reports "Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining"

  • news

    Visible to the public "Almost 40% Of Ubuntu Users Vulnerable to New Privilege Elevation Flaws"

    Two recently introduced Linux vulnerabilities in the Ubuntu kernel make it possible for unprivileged local users to acquire elevated privileges on a large number of devices. Ubuntu is one of the most popular Linux distributions, particularly in the US, with an estimated 40 million users. Two vulnerabilities tracked as CVE-2023-32629 and CVE-2023-2640, discovered by Wiz researchers, were recently introduced into the operating system, affecting about 40 percent of Ubuntu's users. CVE-2023-2640 is a high-severity (CVSS v3 score: 7.8) vulnerability in the Ubuntu Linux kernel that allows a local attacker to gain elevated privileges. CVE-2023-32629 is a medium-severity (CVSS v3 score: 5.4) vulnerability in the Linux kernel memory management subsystem, where a race condition when accessing VMAs may result in use-after-free, allowing arbitrary code execution by a local attacker. This article continues to discuss the discovery and impact of the Linux vulnerabilities.

    Bleeping Computer reports "Almost 40% Of Ubuntu Users Vulnerable to New Privilege Elevation Flaws"

  • news

    Visible to the public "SEC Adopts New Cybersecurity Incident Disclosure Rules for Companies"

    The Securities and Exchange Commission (SEC) has adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to annually disclose material information regarding their cybersecurity risk management, strategy, and governance. In addition, the Commission adopted rules requiring foreign private issuers to disclose similar information. The new rules will require registrants to disclose on the new Item 1.05 of Form 8-K any cybersecurity incident they deem material, along with a description of the nature, scope, and timing of the incident, as well as its material impact or reasonably likely material impact on the registrant. A registrant is generally required to submit an Item 1.05 Form 8-K within four business days after determining that a cybersecurity incident is material. This article continues to discuss the new cybersecurity incident disclosure rules adopted by SEC for companies.

    Help Net Security reports "SEC Adopts New Cybersecurity Incident Disclosure Rules for Companies"

  • news

    Visible to the public "'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads"

    Hackers are planting "malvertisements" for widely-used Information Technology (IT) tools on search engines in an attempt to lure IT professionals and conduct ransomware attacks in the future. The scheme involves pay-per-click advertisements on Google and Bing, which link to compromised WordPress sites and phishing pages that resemble download pages for software such as AnyDesk, Cisco AnyConnect, TreeSize Free, and WinSCP. Unsuspecting visitors end up downloading the intended software along with a Python package containing initial access malware, which the attackers then use to launch additional payloads. Sophos researchers have dubbed the campaign "Nitrogen." Several technology companies and nonprofits in North America have already been affected. Although none of the known cases have been successful, the researchers found that hundreds of brands have been co-opted for this type of malvertising across multiple campaigns in the past few months. This article continues to discuss findings and observations regarding the malicious Nitrogen campaign.

    Dark Reading reports "'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads"

  • news

    Visible to the public "Google Announces Inaugural Cohort in Cybersecurity Initiative"

    Researchers at Cornell Tech and the Cornell Ann S. Bowers College of Computing and Information Science are part of the first cohort of participants from four institutions to receive funding from the Google Cyber New York City (NYC) Institutional Research Program. The Google-funded effort aims to improve online privacy, safety, and security standards while also establishing NYC as a hub for cybersecurity research. In collaboration with Google, seven projects from Cornell faculty that combine basic research with computer innovations to provide solutions to cybersecurity issues in society have been selected. Each team will receive funding and access to Google Cloud Platform credits for up to three years while working with a Google sponsor. One of the inaugural projects from Cornell focuses on the theoretical foundations of post-quantum cryptography, cryptographic methods that enable a traditional computer to defend itself against attacks from a quantum computer (i.e., one that uses the quantum states of subatomic particles to store information and that can solve complex problems). As quantum computing technology progresses, the significance of this work grows. This article continues to discuss the projects from Cornell faculty that have been selected to provide solutions to cybersecurity issues.

    Cornell University reports "Google Announces Inaugural Cohort in Cybersecurity Initiative"

  • news

    Visible to the public "Researchers Uncover Fake Base Stations in Cellular Networks Using Machine Learning"

    Cellular networks are essential for various applications, including phone calls and Internet access. However, the growth of fake base stations in cellular networks, sometimes known as stingrays, cell-site simulators, or IMSI catchers, poses a major security threat with potentially severe consequences. Attackers can use fake base stations as stepping stones for different multi-step attacks, including signal counterfeiting, numb attacks, detach/downgrade attacks, energy depletion attacks, and panic attacks. These attacks can cause significant harm to individuals, businesses, and even governments. Therefore, security researchers at Purdue University's Department of Computer Science led a recent study demonstrating how high-quality datasets could be used to detect fake base stations in cellular networks using Machine Learning (ML) algorithms. This article continues to discuss the security researchers' work on high-quality datasets that could be used to detect fake base stations in cellular networks using ML algorithms.

    Purdue University reports "Researchers Uncover Fake Base Stations in Cellular Networks Using Machine Learning"

  • news

    Visible to the public "A Defense Against Attacks on Unmanned Ground and Aerial Vehicles"

    A University of Texas at Arlington (UTA) engineering researcher is developing defenses to prevent cyberattacks targeting networks of self-driving cars and Unmanned Aerial Vehicles (UAVs). Animesh Chakravarthy, associate professor in the Department of Mechanical and Aerospace Engineering (MAE), is the Principal Investigator (PI) on a US Department of Defense (DOD) grant titled "Resilient Multi-Vehicle Networks." If hackers discover a way to compromise 10 out of 100 self-driving cars in a given area, they could affect all 100 cars because the 10 compromised vehicles would have a domino effect on the other vehicles, Chakravarthy explained. Therefore, it is necessary to make these vehicle networks resistant to such attacks. This article continues to discuss the UTA research team investigating ways to thwart cyberattacks on networks of self-driving cars and UAVs.

    The University of Texas at Arlington reports "A Defense Against Attacks on Unmanned Ground and Aerial Vehicles"

  • news

    Visible to the public "Hacktivism: Is It Fashionable Again or Just a Sly Cover?"

    Reports of "hacktivism" are rising, with 2022 seeing a significant resurgence in the area, primarily fueled by the Russia-Ukraine conflict. According to Radware data, from February 18 to April 18 this year, hacktivists claimed over 1,800 Distributed Denial-of-Service (DDoS) attacks across 80 Telegram channels. Since the Russia-Ukraine conflict, hacktivism has experienced a resurgence, with loosely affiliated groups of partisans or volunteers being pitted against nation-states. Some well-known hacktivist groups include the IT Army, Guacamaya, and SiegedSec. The infamous pro-Russian entity NoName057(16) engages in targeted DDoS campaigns across multiple sectors in NATO countries. CyberArmyofRussia_Reborn (CARR) has been identified by Mandiant as a Russian hacktivist group conducting DDoS attacks against Ukraine. KillNet, a prominent pro-Russian hacktivist group, consistently targets the US and Europe with DDoS attacks. It may appear that these types of groups are becoming more prevalent, but cybersecurity experts paint a more nuanced picture, noting that it is unclear whether the practice is becoming more widespread, if the term is being redefined, or if it is being used as a cover for more traditional malicious activity in cyberspace, such as ransomware and cyber espionage. This article continues to discuss notable hacktivist groups, the potential use of hacktivism as a cover, and the future of such activity.

    SC Magazine reports "Hacktivism: Is It Fashionable Again or Just a Sly Cover?"

  • news

    Visible to the public "Decoy Dog Malware Upgraded to Include New Features"

    Security researchers at Infoblox have released crucial updates on the "Decoy Dog" remote access trojan (RAT) toolkit in a new threat report published today. Decoy Dog was initially discovered and disclosed in April 2023. Decoy Dog has proven to be more sophisticated than previously thought, using DNS for command-and-control (C2), and is suspected to be employed in ongoing nation-state cyberattacks. The researchers noted that after the disclosure of the toolkit, threat actors responded swiftly, adapting their systems to maintain access to compromised devices. The researchers stated that the malware has also expanded its reach, with at least three different actors now operating it. Though based on the open-source RAT Pupy, Decoy Dog is a new and previously unknown malware with advanced capabilities to persist on compromised devices. The researchers noted that the malware can now move victims to different controllers, maintaining communication with compromised machines for extended periods. Some victims have remained in contact with a Decoy Dog server for over a year.

    Infosecurity reports: "Decoy Dog Malware Upgraded to Include New Features"

  • news

    Visible to the public "Sneaky Python Package Security Fixes Help No One – Except Miscreants"

    According to computer security researchers, Python security fixes are often implemented through "silent" code commits without an associated Common Vulnerabilities and Exposures (CVE) identifier. That is not ideal, they argue, because attackers like exploiting undisclosed vulnerabilities in unpatched systems. In addition, developers who are not security experts may not notice that an upstream commit is targeting an exploitable vulnerability relevant to their code. Therefore, application developers may not realize that a Python package could have a major flaw due to little or no announcement about it, and not incorporate a patched version into their code. Malicious actors could take advantage of this by exploiting those non-publicized vulnerabilities. In a paper titled "Exploring Security Commits in Python," a team of researchers from George Mason University and Dougherty Valley High School propose a solution, which is a database of security commits called PySecDB. The database would increase the community's visibility of Python code repairs. This article continues to discuss the proposed security commits database aimed at making Python code repairs more visible to the community.

    The Register reports "Sneaky Python Package Security Fixes Help No One - Except Miscreants"

  • news

    Visible to the public "No, Criminals Are Not in Love With VPNs, Expert Insists"

    CrowdSec analyzed data on malicious Internet Protocol (IP) addresses and discovered that most malicious activity stems from Russia, the US, and India. Over one million IP addresses in each of these countries have been reported as malicious. However, CrowdSec emphasized that this number does not necessarily indicate the attacker's nationality but rather the "localization" of a compromised asset. Scanning makes up for the majority of malicious activity, indicating that a threat actor is actively searching the Internet for vulnerabilities they can exploit for unauthorized access, Distributed Denial-of-Service (DDoS) attacks, or other types of attacks. Nearly 60 percent of malicious IP addresses are involved in scanning, while over 23 percent are attempting to exploit known vulnerabilities. The third most prevalent threat is brute force, with threat actors targeting the most common and weak passwords, which are typically set by default. With the widespread adoption of Internet Protocol version 6 (IPv6), cybersecurity experts have begun noting an increase in the number of new threats associated with IPv6 addresses. This article continues to discuss key findings from the CrowdSec Majority Report for Q2 2023.

    Cybernews reports "No, Criminals Are Not in Love With VPNs, Expert Insists"

  • news

    Visible to the public "CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"

    According to a new report from the US Cybersecurity and Infrastructure Security Agency (CISA), more than half of all cyberattacks against government agencies, critical infrastructure organizations, and state-level government bodies involved legitimate accounts. CISA collaborated with the US Coast Guard (USCG) in 2022 to conduct 121 Risk and Vulnerability Assessments (RVAs) on federal civilian agencies, high-priority private and public sector critical infrastructure operators, and select state, local, tribal, and territorial stakeholders. According to Gabriel Davis, a federal lead for risk operations at CISA, these assessments are designed to test an organization's defenses and allow the government to explore how they would respond to a sophisticated attack. They also provide CISA with information about how hackers operate. A new report of their findings reveals that threat actors conducted their most successful attacks using standard techniques involving phishing and default credentials. In 54 percent of successful attacks studied, valid credentials, including those from former employee accounts that have not been disabled in addition to default administrator accounts, were used. This article continues to discuss key findings from the RVAs.

    The Record reports "CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"

  • news

    Visible to the public "Over 900,000 MikroTik Routers Exposed to Critical Bug"

    Security researchers at VulnCheck have warned that hundreds of thousands of routers produced by Latvian networking equipment maker MikroTik are vulnerable to a critical bug that could enable attackers to remotely control affected devices. The researchers noted that remote and authenticated attackers can use CVE-2023-30799 to get a root shell on MikroTik RouterOS routers. The vulnerability itself was first disclosed in June 2022 but only assigned a CVE after VulnCheck published new exploits. The researchers noted that a patch is now available, but the researchers claimed that around 472,000 RouterOS devices globally are still vulnerable via their web management interface, with the figure rising to more than 920,000 if exploitation happens via the Winbox management client. The vulnerability itself is a privilege escalation bug with a CVSS score of 9.1. The researchers stated that a remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system. The researchers warned that although exploitation of the bug requires authentication, this is easier than one might think. VulnCheck claimed around 60% of RouterOS users are still running a default admin user.

    Infosecurity reports: "Over 900,000 MikroTik Routers Exposed to Critical Bug"

  • news

    Visible to the public "Education Sector Has Highest Ransomware Victim Count"

    According to security researchers at Sophos, the education sector recorded a higher share of ransomware victims than any other in 2022. During the study, the researchers conducted interviews with 400 IT and cybersecurity leaders globally, split evenly across schools and higher education institutions. The researchers found that 79% of higher and 80% of "lower" education institutions were compromised by ransomware over the past year, up from 64% and 56% in 2021, respectively. The researchers noted that exploits and compromised credentials accounted for 77% of ransomware attacks against higher education organizations and 65% of attacks against lower education organizations. Breaches stemming from compromised credentials (37%/36%) accounted for a much bigger share than the cross-industry average of 29%. The researchers stated that the lack of adoption of multi-factor authentication (MFA) technology in the education sector makes them even more at risk of this method of compromise. Interestingly, the researchers noted that the education sector had one of the highest rates of ransom payment, with over half (56%) of higher education victims and 47% of schools paying up. This may account for why the sector is so frequently targeted by threat actors. Another possible factor is the fact that higher education institutions are less likely to maintain backups than the cross-sector average (63% versus 70%).

    Infosecurity reports: "Education Sector Has Highest Ransomware Victim Count"

  • news

    Visible to the public "Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets"

    Realst is a new malware family targeting Apple macOS systems. A third of the samples are already designed to infect macOS 14 Sonoma, the upcoming major release of the operating system. The malware is written in the Rust programming language and is distributed as fake blockchain games. It can empty cryptocurrency wallets as well as steal stored passwords and browser data from Windows and macOS devices. Realst was first found in the wild by the security researcher known as iamdeadlyz. Phil Stokes, a security researcher at SentinelOne, noted that Realst Infostealer is spread via malicious websites advertising fake blockchain games with names such as Brawl Earth, WildWorld, Dawnland, Destruction, Evolion, Pearl, Olymp of Reptiles, and SaintLegend. Each variation of the bogus blockchain game has its own website and associated Twitter and Discord accounts. This article continues to discuss the capabilities and distribution of the Realst malware.

    THN reports "Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets"

  • news

    Visible to the public "ALPHV Ransomware Adds Data Leak API in New Extortion Strategy"

    The ALPHV ransomware group, also known as BlackCat, is attempting to increase the pressure on their victims to pay a ransom by providing an Application Programming Interface (API) for their leak site in order to increase the visibility of their attacks. This action follows the recent breach of Estee Lauder, which resulted in the beauty company disregarding the threat actor's attempts to negotiate a ransom payment. Multiple researchers recently observed that the ALPHV/BlackCat data leak site added a new page with instructions on how to use their API to get timely updates about new victims. The malware research group VX-Underground warned of the new section on the gang's site. However, the "feature" appears to have been partially available to a limited audience for months. The ransomware group published API calls that could be used to fetch information about new victims added to their leak site or updates starting on a specific date. This article continues to discuss the ALPHV/BlackCat ransomware gang providing an API for their leak site to increase visibility for their attacks.

    Bleeping Computer reports "ALPHV Ransomware Adds Data Leak API in New Extortion Strategy"

  • news

    Visible to the public "Zero Trust Rated as Highly Effective by Businesses Worldwide"

    According to Beyond Identity, 82 percent of experts are currently working on implementing zero trust, and 16 percent plan to do so within the next 18 months. Over 90 percent of those working on zero trust cited the 2022 Federal Zero Trust Strategy as their primary motivator. Respondents were asked what authentication capabilities are necessary to attain zero trust. Fifty-three percent of respondents cited codeless capability as the most important element of a zero trust network. In addition, the respondents agreed that being passwordless and ensuring that each device satisfies certain security thresholds are almost of equal importance. Respondents viewed the maintenance of policy at each authentication point as equally critical to network security as protection against social engineering techniques. According to Jasson Casey, CTO of Beyond Identity, the findings of this study indicate that zero trust is the end goal now more than ever, and that it requires a concerted and coordinated effort to achieve. This article continues to discuss key findings from Beyond Identity's survey regarding the implementation of zero trust principles.

    Help Net Security reports "Zero Trust Rated as Highly Effective by Businesses Worldwide"

  • news

    Visible to the public "ChatGPT, Other Generative AI Apps Prone to Compromise, Manipulation"

    Users of applications involving Large Language Models (LLMs) similar to ChatGPT must be aware of the possible risks. Researchers warn that an attacker who develops untrusted content for the Artificial Intelligence (AI) system could compromise any information or recommendations generated by the system. The attack could enable job applicants to circumvent resume-checking applications, disinformation specialists to force a news summary bot to only give a specific point of view, or malicious actors to turn a chatbot into a willing participant in their fraud. In a session titled "Compromising LLMs: The Advent of AI Malware," a group of computer scientists will demonstrate that indirect prompt-injection (PI) attacks are possible because applications connected to ChatGPT and other LLMs often treat consumed data in the same manner as user queries or commands. Attackers can take control of the user's session by inserting specially crafted information as comments into documents or web pages that an LLM will parse. This article continues to discuss researchers finding that AI applications involving LLMs could be compromised by attackers using natural language to trick users.

    Dark Reading reports "ChatGPT, Other Generative AI Apps Prone to Compromise, Manipulation"

  • news

    Visible to the public "Why Computer Security Advice Is More Confusing Than It Should Be"

    A new study identifies a key issue with developing computer security guidelines and outlines basic steps that would likely make computers safer. This research puts the computer security guidelines provided to employees by businesses and government agencies under the microscope. These guidelines are supposed to help employees protect personal and employer data as well as minimize the risks associated with threats such as malware and phishing. Brad Reaves, corresponding author of the new study and assistant professor of computer science at North Carolina State University, has observed that some of the online computer security advice he has read is confusing, misleading, or incorrect. The research looked into who is developing these guidelines, what they have based their guidance on, their process, and areas of improvement. Researchers conducted 21 in-depth interviews with professionals responsible for writing the computer security guidelines used by organizations. The main takeaway is that the people who develop these guidelines aim to provide as much information as possible, which is good in theory, but the writers do not prioritize the most crucial suggestions, or they do not deprioritize the less important points. This article continues to discuss key points and findings from the study of computer security advice.

    North Carolina State University reports "Why Computer Security Advice Is More Confusing Than It Should Be"

  • news

    Visible to the public "OpenAI, Google and More Agree to White House List of Eight AI Safety Assurances"

    Some of the largest US-based generative Artificial Intelligence (AI) companies plan to watermark their content, according to a White House fact sheet released on July 21. Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI have agreed to eight voluntary commitments concerning the use and oversight of generative AI, including watermarking. This agreement follows a March statement expressing the White House's concerns about the misuse of AI. In addition, the agreement comes at a time when regulators are finalizing procedures for managing generative AI's impact on technology and how people interact with it since ChatGPT brought AI content to the public's attention in November 2022. This article continues to discuss the eight AI safety commitments and how government regulation of AI could discourage malicious actors.

    TechRepublic reports "OpenAI, Google and More Agree to White House List of Eight AI Safety Assurances"

  • news

    Visible to the public SoS Musings #75 - A Major Threat to Businesses: Point-of-Sale (PoS) Attacks

    SoS Musings #75 -

    A Major Threat to Businesses: Point-of-Sale (PoS) Attacks

  • news

    Visible to the public Cybersecurity Snapshots #44 - Data Travel is the Organization's Next Big Cybersecurity Challenge

    Cybersecurity Snapshots #44 -

    Data Travel is the Organization's Next Big Cybersecurity Challenge

  • news

    Visible to the public Cyber Scene #82 - Breaking News, Cyber and China

    Cyber Scene #82 -

    Breaking News, Cyber and China

  • news

    Visible to the public "New AI Phishing Tool FraudGPT Tied to Same Group Behind WormGPT"

    FraudGPT, a new Artificial Intelligence (AI) bot discovered being sold on different dark web marketplaces and Telegram accounts, is used exclusively for offensive purposes, such as spear-phishing, cracking tools, and carding. John Bambenek, principal threat researcher at Netenrich, which discovered FraudGPT, noted that his team believes the threat actor behind it is likely the same group that operates WormGPT, another AI phishing tool recently reported by SlashNext. According to Bambenek, Netenrich is currently unaware of any active attacks launched through FraudGPT tools. FraudGPT appears to focus more on short-duration, high-volume attacks such as phishing, whereas WormGPT is more focused on longer-duration attacks involving malware and ransomware. This article continues to discuss the new AI bot FraudGPT, believed to come from the same group that developed the WormGPT tools.

    SC Media reports "New AI Phishing Tool FraudGPT Tied to Same Group Behind WormGPT"

  • news

    Visible to the public "Maritime Cyberattack Database Launched by Dutch University"

    The NHL Stenden University of Applied Sciences in the Netherlands recently launched a database tracking cyberattacks and other cyber incidents impacting the maritime sector. The Maritime Cyber Attack Database, or MCAD, currently tracks more than 160 incidents recorded since 2001. The university noted that the database is publicly accessible at maritimecybersecurity[.]nl, and it's continuously updated and improved. The project is led by Dr. Stephen McCombie, professor of maritime IT security at NHL Stenden. The database was created in collaboration with students, using open-source information. McCombie stated that the goal of the project is to raise awareness and provide data for future maritime cybersecurity research. The database will also be used to analyze subsets of the data and highlight trends. McCombie noted that the Maritime Cyber Attack Database can also be used to create realistic cyber incident simulations. The database currently includes many attacks involving ransomware, as well as insider incidents and spoofing attacks. Incidents have been recorded worldwide, but many impacted ports are around Europe, East Asia, and the United States.

    SecurityWeek reports: "Maritime Cyberattack Database Launched by Dutch University"

  • news

    Visible to the public "The Promise of Watermarking AI Content"

    A group of major technology companies recently made an announcement about watermarking Artificial Intelligence (AI)-generated content. However, cybersecurity researchers already suggest this new approach has flaws. Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI met with the White House to discuss how they can mitigate the risks associated with the AI they create. They promised to invest in cybersecurity and AI-generated content watermarking. Dr. Florian Kerschbaum, a professor of computer science and member of the Cybersecurity and Privacy Institute at the University of Waterloo, explained that the watermarking technology pitched by the companies embeds a secret message within the content's code. The idea is that the message cannot be removed without also removing the content. Kerschbaum notes, however, that there are still some uncertainties in the scientific foundations of watermarking. Malicious actors may be able to remove a watermark, and the issue of digital watermarks has fascinated scientists for decades. This article continues to discuss concerns and questions regarding watermarking AI-generated content.

    The University of Waterloo reports "The Promise of Watermarking AI Content"

  • news

    Visible to the public "Pacific Premier Says Vendor Hit by MOVEit Data Breach"

    Pacific Premier Bancorp recently announced that a cybersecurity incident at a third-party vendor has led to a data leak of its clients, becoming the latest victim of the MOVEit hack. The company noted that the client data compromised contained social security numbers, account numbers, and other personally identifiable information. The bank did not disclose the scale of the data breach but said it is working with the vendor to notify the potentially affected parties and regulatory agencies.

    Reuters reports: "Pacific Premier Says Vendor Hit by MOVEit Data Breach"

  • news

    Visible to the public "1st Source Says 450,000 Records Affected in Client Data Breach"

    Recently, commercial and consumer bank 1st Source Corp announced that it was affected by a security breach that involved a popular file transfer tool, MOVEit. The data breach has impacted about 450,000 records. The company stated that a third party had gained access to data of its commercial and individual clients earlier this month, adding that it was in the process of identifying and notifying individual clients affected. MOVEit, made by Massachusetts-based Progress, allows organizations to securely transfer files and data between business partners and customers.

    U.S. News reports: "1st Source Says 450,000 Records Affected in Client Data Breach"

  • news

    Visible to the public "Hacker Claims to Have Stolen Sensitive Medical Records from Egypt's Ministry of Health"

    Security researchers at SOCRadar recently found that an "established" threat actor claimed to be in possession of two million data records stolen from the Egyptian Ministry of Health and Population. The allegation was made on the hacker forum Popurler. The researchers stated that according to the threat actor's post, the database includes comprehensive, personal patient information, including names, IDs, decision and national numbers, phone numbers, addresses, procedure classification details, diagnoses, and details on the treatment. The hacker provided a sample of the dataset, encompassing data on 1000 people to support the claim. The researchers noted that this threat actor, "known for selling databases that allegedly belonged to Indonesian entities last week, also directed potential buyers to contact them through the Telegram messaging app. Evidence points to financial gain as the primary motivation behind these actions."

    Infosecurity reports: "Hacker Claims to Have Stolen Sensitive Medical Records from Egypt's Ministry of Health"

  • news

    Visible to the public "Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique"

    The financially motivated threat actors responsible for the Casbaneiro banking malware family have been observed applying a User Account Control (UAC) bypass technique to gain full administrative privileges on a machine. This indicates that the threat actor is developing tactics to evade detection and run malicious code on compromised assets. Sygnia noted that despite the threat actors' continued focus on Latin American financial institutions, the alterations in their techniques pose a significant threat to multi-regional financial institutions. Casbaneiro, also known as Metamorfo and Ponteiro, is best known for its banking trojan, which emerged in 2018 due to mass email spam campaigns targeting the Latin American financial sector. Infection chains typically begin with a phishing email pointing to a booby-trapped attachment that, when opened, triggers a series of steps that culminate in the deployment of banking malware, along with scripts that use living-off-the-land (LotL) techniques to fingerprint the host and collect system metadata. Horabot, a binary designed to spread the infection to other unaware employees of the compromised organization, is also downloaded during this phase. This article continues to discuss what has changed in recent Casbaneiro attack waves.

    THN reports "Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique"

  • news

    Visible to the public "Lazarus Hackers Hijack Microsoft IIS Servers to Spread Malware"

    The North Korean state-sponsored Lazarus hacking group is taking over Windows Internet Information Service (IIS) web servers to distribute malware. IIS is Microsoft's web server solution used to host websites or application services. ASEC's security analysts previously reported that Lazarus targeted IIS servers for initial access to corporate networks. The cybersecurity company now notes that the threat group also distributes malware via inadequately protected IIS services. The key advantage of this technique is the ease with which it can infect visitors to websites or users of services hosted on compromised IIS servers owned by reputable companies. In the recent attacks observed by ASEC's analysts, Lazarus compromised legitimate South Korean websites in order to conduct 'Watering Hole' attacks against visitors using a vulnerable version of INISAFE CrossWeb EX V6 software. This article continues to discuss the hijacking of IIS web servers by the Lazarus hacking group to distribute malware.

    Bleeping Computer reports "Lazarus Hackers Hijack Microsoft IIS Servers to Spread Malware"

  • news

    Visible to the public "RaaS Proliferation: 14 New Ransomware Groups Target Organizations Worldwide"

    The GuidePoint Research and Intelligence Team (GRIT) tracked a total of 1,177 publicly posted ransomware victims claimed by 41 different threat groups during the second quarter of 2023. The report by GRIT reveals a 38 percent increase in the number of public ransomware victims compared to Q1 2023, and a 100 percent increase from Q2 2022. Manufacturing and technology, accounting for 14 percent and 11 percent of impacted industries, respectively, continue to be the most affected industries, a trend observed by GRIT in 2022 and Q1 2023. The consulting (+236 percent) and insurance (+160 percent) industries experienced the greatest relative growth in observed ransomware attacks, whereas the government (-61 percent) and automotive (-59 percent) sectors experienced a relative decline. GRIT observed an increase in the activity of Ransomware-as-a-Service (RaaS) groups during Q2 2023, attributable to the launch of 14 new groups. Compared to Q1, this represents a 260 percent increase in "First Seen" groups. This article continues to discuss key findings from GRIT's Q2 2023 Ransomware Report.

    Help Net Security reports "RaaS Proliferation: 14 New Ransomware Groups Target Organizations Worldwide"

  • news

    Visible to the public "KillNet's Kremlin Connection Unclear as the Cybercrime Collective Grows"

    While the exact relationship between the Russian threat group KillNet and the Kremlin remains unclear, the group's high-profile and increasingly effective cyberattacks continue to align with Russian state interests. Its public relations campaign is luring cybercriminals and their skills into the operation. According to a new report by Mandiant, KillNet's media branding strategy is effective, helping to consolidate Russian hacker power under one organization. In addition to reflecting Kremlin interests following the invasion of Ukraine, there is little concrete evidence of coordination between KillNet and the Russian government, as other analysts have noted. In a climate rife with disinformation, it can be difficult to discern the truth, and the Mandiant report follows a UK warning about cybercrime mercenaries partnering up with governments to become state proxies. This article continues to discuss observations and findings regarding KillNet.

    Dark Reading reports "KillNet's Kremlin Connection Unclear as the Cybercrime Collective Grows"

  • news

    Visible to the public "Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting"

    Ensuring information system security requires preventing system compromises and finding adversaries already present in the network before they can launch an attack from inside. Cyber threat hunting has been deemed critical for identifying threats by personnel in defensive computer operations. However, the time, expense, and expertise required for cyber threat hunting often prevent its use. What is needed is an autonomous cyber threat hunting tool capable of running more pervasively, achieving standards of coverage considered impractical, and significantly reducing competition for limited time, money, and analyst resources. Phil Groce, a senior network defense analyst in the Software Engineering Institute's (SEI) CERT Division, describes early efforts at Carnegie Mellon University (CMU) to apply game theory to the development of algorithms suitable for informing a fully autonomous threat hunting capability. As a starting point, the CMU team is developing chain games, a series of games that can be used to evaluate and refine threat hunting strategies. This article continues to discuss the work to apply game theory to developing algorithms fit for informing a fully autonomous threat hunting capability.

    Software Engineering Institute - Carnegie Mellon University reports "Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting"

  • news

    Visible to the public "Bitcoin Could Be in Danger as Quantum Computing Advances"

    IBM, Google, and other companies are competing to build the world's fastest quantum computer, a device that could significantly change cryptography as we know it. For their safety and security, communications, banks, and cryptocurrencies rely on robust encryption. One way to measure the power of a quantum system is the number of qubits or quantum-mechanical elements entangled in superposition. Each additional qubit exponentially increases the quantum system's potential processing capacity. Recently, Google announced that its quantum computer has 70 operational qubits. In minutes, this system can complete a task that would take traditional supercomputers decades to accomplish. IBM plans to release 433-qubit quantum systems soon and unveil the world's first universal quantum computer with over 1,000 qubits this year. Quantum computers will provide numerous benefits to society. However, these rapid developments should cause cryptocurrency enthusiasts concern. This article continues to discuss the potential threat to Bitcoin posed by quantum computing advances.

    Cybernews reports "Bitcoin Could Be in Danger as Quantum Computing Advances"

  • news

    Visible to the public "AMD 'Zenbleed' Bug Allows Data Theft From Zen 2 Ryzen 3000, EPYC CPUs: Patches Coming"

    Tavis Ormandy, a Google Information Security researcher, has posted information about a new vulnerability he discovered independently in AMD's Zen 2 processors. The 'Zenbleed' vulnerability affects the entire Zen 2 product stack, including AMD's EPYC data center processors and Ryzen 3000 CPUs, enabling the theft of sensitive information, such as encryption keys and user logins, from the CPU. According to Ormandy, the attack does not require physical access to the computer or server. It can even be executed via JavaScript on a webpage. The Zenbleed vulnerability, tracked as CVE-2023-20593, allows data exfiltration at a rate of 30kb per core, per second, which is enough to take sensitive information flowing through the processor. This attack is effective against all software operating on the processor, including Virtual Machines (VMs), sandboxes, containers, and processes. This attack's ability to read data across VMs poses a significant threat to cloud service providers and cloud instance users. This article continues to discuss the Zenbleed vulnerability.

    Tom's Hardware reports "AMD 'Zenbleed' Bug Allows Data Theft From Zen 2 Ryzen 3000, EPYC CPUs: Patches Coming"

  • news

    Visible to the public "DOJ Merges Cyber, Cryptocurrency Units to Go After Ransomware Attacks"

    The US Department of Justice (DOJ) is merging its cryptocurrency and computer crimes investigation units, echoing the importance of digital assets in ransomware attacks and other cyberattacks. Principal Deputy Attorney General Nicole Argentieri recently announced the move in remarks delivered at the Center for Strategic and International Studies (CSIS). She stated that it is now evident to the cybercrime field that cryptocurrency work and cyber prosecutions are intertwined and will become even more so in the future. Argentieri noted that ransomware prevention is an "urgent priority" and that putting the National Cryptocurrency Enforcement Team (NCET) under the same roof as the Computer Crime and Intellectual Property Section (CCIPS) will better equip federal law enforcement officials to combat cyber threats. This decision is expected to significantly increase the number of federal prosecutors authorized to handle criminal cases involving cryptocurrencies. This article continues to discuss DOJ merging cyber and cryptocurrency units to fight ransomware attacks.

    SC Magazine reports "DOJ Merges Cyber, Cryptocurrency Units to Go After Ransomware Attacks"

  • news

    Visible to the public "Los Angeles SIM Swapper Pleads Guilty to Cybercrime Charges"

    A Los Angeles man recently pleaded guilty to using SIM swapping to perpetrate multiple cybercrime schemes targeting hundreds of victims. Between April 2019 and February 2023, Amir Hossein Golshan, 24, engaged in account takeovers, Zelle payment fraud, and Apple support impersonation, causing roughly $740,000 in losses to his victims. According to the Department of Justice (DoJ), in December 2021, relying on SIM swapping, Golshan took over the Instagram account of an influencer with over 100,000 followers. Using the unauthorized access to the account, he contacted the victim's friends impersonating the influencer, asking them to send money via Zelle, PayPal, and other platforms, obtaining thousands of dollars from the unsuspecting victims. He also locked the influencer out of her accounts and sent her messages demanding a $2,000 ransom for returning control of the accounts. The DoJ noted that Golshan admitted to using SIM swapping against two other victims in January 2022. After taking control of one of the victims' social media accounts, he demanded a $5,000 ransom, threatening to release personal videos and photos. Golshan targeted roughly 500 individuals in SIM swapping and Zelle fraud schemes, receiving approximately $82,000 in payments from his victims. Golshan also impersonated Apple support personnel to gain access to victim accounts and steal NFTs, cryptocurrency, and other digital goods, defrauding five victims of between $2,000 and $389,000 each. Golshan pleaded guilty to unauthorized computer access, access to a computer to defraud, and wire fraud. Scheduled for sentencing on November 27, he faces up to five years in prison for the computer access counts and up to 20 years in prison for wire fraud.

    SecurityWeek reports: "Los Angeles SIM Swapper Pleads Guilty to Cybercrime Charges"

  • news

    Visible to the public "Data of 40 Million Plus Exposed in Latest T-Mobile Breach"

    Recently it was discovered that the names, Social Security numbers, and information from driver's licenses or other identification of just over 40 million people who applied for T-Mobile credit were exposed in a recent data breach. The company stated that the same data for about 7.8 million current T-Mobile customers who pay monthly for phone service also appears to be compromised. T-Mobile noted that no phone numbers, account numbers, PINs, passwords, or financial information from the nearly 50 million records and accounts were compromised. T-Mobile has previously disclosed a number of data breaches over the years, most recently in January and before that in Nov. 2019 and Aug. 2018, all of which involved unauthorized access to customer information. It also disclosed a breach affecting its own employees' email accounts in 2020. And in 2015, hackers stole personal information belonging to about 15 million T-Mobile wireless customers and potential customers in the U.S., which they obtained from credit reporting agency Experian.

    The Daily Gazette reports: "Data of 40 Million Plus Exposed in Latest T-Mobile Breach"

  • news

    Visible to the public "MOVEit Hack Could Earn Cybercriminals $100M as Number of Confirmed Victims Grows"

    Security researchers at Coveware believe that the Cl0p ransomware gang could earn as much as $100 million from the MOVEit hack. The researchers found that the percentage of victims that paid a ransom in the second quarter of 2023 fell to a record low of 34%. The researchers stated that the chances of cybercriminals getting paid in the case of attacks that only involve data theft without the deployment of file-encrypting ransomware, such as the MOVEit hack, is less than 50%, but the ransom amount has been typically higher. The researchers noted that while the MOVEit campaign may end up impacting over 1,000 companies directly, a tiny percentage of victims bothered trying to negotiate, let alone contemplated paying. Those that did pay paid substantially more than prior Cl0p campaigns and several times more than the global average ransom amount of $740,144. The researchers claimed that the Cl0p group might earn $75-100 million dollars just from the MOVEit campaign, with that sum coming from just a small handful of victims that succumbed to very high ransom payments.

    SecurityWeek reports: "MOVEit Hack Could Earn Cybercriminals $100M as Number of Confirmed Victims Grows"

  • news

    Visible to the public "Researchers Find 'Backdoor' in Encrypted Police and Military Radios"

    The TETRA standard is used globally in radios. According to security researchers, multiple vulnerabilities have been discovered in the fundamental cryptography and its implementation, including issues that enable the decryption of traffic. A group of cybersecurity researchers has discovered what they believe to be an intentional backdoor in the encrypted radios used by police, military, and critical infrastructure entities. They note that the backdoor may have existed for decades, potentially exposing a wealth of confidential information transmitted across them. While the researchers refer to their discovery as a backdoor, the organization responsible for maintaining the standard disputes this specific term, stating that the standard was designed for export controls that determine the encryption's strength. However, the result is radios with traffic that can be decrypted in under a minute using consumer hardware such as a laptop. This article continues to discuss the TETRA vulnerabilities.

    Motherboard reports "Researchers Find 'Backdoor' in Encrypted Police and Military Radios"

  • news

    Visible to the public "Thousands of Citrix Servers Exposed to Zero-Day Bug"

    Security researchers at the Shadowserver Foundation have found that over 15,000 Citrix servers worldwide are at risk of compromise unless administrators patch urgently. The researchers noted that of the impacted servers, the most significant number were based in the US (5700), followed by Germany (1500), the UK (1000), and Australia (582). Citrix posted an advisory about the vulnerability (CVE-2023-3519) and two others on July 18. The unauthenticated remote code execution bug has a CVSS score of 9.8. Citrix noted that it impacts NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) and emerged as a zero-day vulnerability in early July after being advertised online by a threat actor. Citrix warned that adversaries targeting CVE-2023-3519 on unmitigated appliances have been observed. Citrix strongly urges affected NetScaler ADC and NetScaler Gateway customers to install the relevant updated versions as soon as possible. The two other vulnerabilities listed in the advisory are CVE-2023-3466, a reflected cross-site scripting bug, and CVE-2023-3467, which enables privilege escalation to root administrator.

    Infosecurity reports: "Thousands of Citrix Servers Exposed to Zero-Day Bug"