6 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on the second-most-active Ransomware-as-a-Service organization, The Gentleman. We describe their observed TTPs.
1 min read
PacketWatch Team Sixty43
:
December 13, 2023
On December 7, Apache released a patch for their open-source Model-View-Controller (MVC) framework, Apache Struts.
This patch is to address a new critical unauthenticated file upload vulnerability that can lead to remote code execution (RCE), assigned to CVE-2023-50164.
Proof of exploit code is publicly available and evidence of active exploitation was observed on December 13.
Many 3rd party vendors leverage the Apache Struts framework in their products. Cisco released an advisory detailing which of their products are affected by the vulnerability, which can be found here.
Update vulnerable versions to the fixed version:
If you have any web-facing sites or applications, please check with your vendor if they leverage Apache Struts, and apply the appropriate patch. All vulnerable Apache Struts instances should be patched immediately.
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.
6 min read
This week, we briefed our clients on the second-most-active Ransomware-as-a-Service organization, The Gentleman. We describe their observed TTPs.
10 min read
This week, we briefed our clients on Anthropic's announcement of Claude Mythos Preview and its alleged ability to discover and exploit...
7 min read
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.