Cyber Threat Intelligence | PacketWatch

Cyber Threat Intelligence Report | 12/30/2024 | PacketWatch

Written by The PacketWatch Intelligence Team | December 30, 2024

This week we briefed our clients on how fake captchas are delivering infostealer malware and how some Google Chrome extensions have been compromised.

 

 KEY TAKEAWAYS 

  • Fake Captcha malvertising campaign delivering Lumma infostealer malware.
  • Google Chrome extensions backdoored.
  • Critical and high-severity vulnerabilities in Palo Alto, Apache Tomcat, Apache Struts, and Fortinet. Patch now!


 

Fake Captchas Deliver Infostealers

Infostealer malware is one of the most prevalent cybersecurity threats individuals and organizations face today. This type of malware is designed to harvest credentials, session cookies, banking and financial data, and more. In October, researchers at Qualys detailed a new method used for delivering the Lumma Infostealer: Fake Captchas.

With this method, users are presented with what looks like a “human verification” page, or Captcha portal. However, the page includes extra “verification steps” that trick the user into opening the Windows Run prompt and pasting in a PowerShell command that downloads and executes the malware (see screenshot below).

New research from Guardio labs details the latest campaign used by Lumma Stealer. The threat actors behind Lumma Stealer are using malvertising (malicious advertising), specifically through a single ad network: Monetag. The malicious links supplied to Monetag for this campaign are “cloaked” behind an ad tracking service called BeMob. This allows the threat actor to bypass Monetag’s safety and reputation filters and deliver the malicious ads.

Guardio’s research also shows that the fake Captcha pages are hosted on large, reputable hosting sites, such as Oracle Cloud and Cloudflare R2. Guardio was able to show that this ad campaign generated over 1 million ad impressions per day across 3000+ publisher sites.

 

How to Protect Your Organization

The sites hosting these malicious ads are overwhelmingly related to anime and TV/movie streaming sites. These types of webpages should generally never be visited by a work computer. Using a content filter at the web gateway to block these types of “entertainment” and “streaming” sites will limit exposure to these malicious advertisements.

These types of fake Captcha pages should be included in User Awareness training as it is becoming a popular technique for threat actors to deliver malware. Users should never run untrusted commands on their workstations. These permissions can also be disabled for standard users via GPO.

As always, having a fully up-to-date, properly configured EDR solution across all endpoints is an effective defense against this type of malware.

 

Fig 1. Fake Captcha Page | Source: Qualys

 

Resources:

 

 

Google Chrome Extensions Hacked

Last week, cybersecurity company Cyberhaven disclosed that their Google Chrome extension on the Chrome Web Store was compromised with malicious code. This code targeted identity data and access tokens of Facebook accounts, and communicated to a typo-squatted command and control (C2) domain of cyberhavenext[.]pro.

Over the weekend, sixteen other Chrome extensions have been identified that are suspected of being compromised by the same campaign:

  1. AI Assistant - ChatGPT and Gemini for Chrome
  2. Bard AI Chat Extension
  3. GPT 4 Summary with OpenAI
  4. Search Copilot AI Assistant for Chrome
  5. TinaMInd AI Assistant
  6. Wayin AI
  7. VPNCity
  8. Internxt VPN
  9. Vindoz Flex Video Recorder
  10. VidHelper Video Downloader
  11. Bookmark Favicon Changer
  12. Castorus
  13. Uvoice
  14. Reader Mode
  15. Parrot Talks
  16. Primus

Most of these backdoored Chrome extensions have already been removed from the Chrome Store. However, the malicious extension must be fully removed from the endpoint for the threat to be removed.

The malicious C2 domain cyberhavenext[.]pro resolves to the IP address 149.28.124[.]84. Analysis of this IP shows 16 additional domains registered within the last month. Traffic to any of these sites should be treated as malicious. Below are the PacketWatch queries to hunt for this traffic:

\*.ip:(149.28.124.84)

http.host:(graphqlnetwork.pro OR videodownloadhelper.pro OR yescaptcha.pro OR castorus.info OR bookmarkfc.info OR primusext.pro OR iobit.pro OR uvoice.live OR cyberhavenext.pro OR internxtvpn.pro OR yujaverity.info OR parrottalks.info OR censortracker.pro OR vpncity.live OR wayinai.live OR moonsift.store OR readermodeext.info)

 

Resources:

 

 

Vulnerability Roundup

 

Apache Tomcat Critical RCE

A new race condition vulnerability was disclosed by Apache for their Tomcat web server, tracked as CVE-2024-56337, which can allow for remote code execution (RCE). This new CVE covers additional mitigations that were not included in the initial patch released on December 17, which was tracked as CVE-2024-50379. This vulnerability affects Tomcat servers with the default servlet write enabled (“readonly” initialization parameter set to false) and that are running on case-insensitive file systems.

The issue affects Apache Tomcat 11.0.0-M1 through 11.0.1, 10.1.0-M1 through 10.1.33, and 9.0.0.M1 through 9.0.97. Administrators are urged to patch to versions 11.0.2, 10.1.34, 9.0.98 or higher. These additional changes are also required to mitigate the vulnerability:

  • If running on Java 8 or 11, it is recommended to set the system property ‘sun.io.useCanonCaches’ to ‘false’ (default: true)
  • If running on Java 17 and ‘sun.io.useCanonCaches’ is set, it needs to be configured as false (default: false)
  • For Java 21 and later, no configuration is needed. The property and problematic cache have been removed

 


 

Apache Struts Critical RCE

Apache released a security advisory detailing a file upload vulnerability in the Apache Struts framework which can lead to path traversal and remote code execution. The vulnerability is tracked as CVE-2024-53677, and affects the following versions:

  • Struts 2.0.0 – Struts 2.3.37 (End-of-life)
  • Struts 2.5.0 – Struts 2.5.33
  • Struts 6.0.0 – Struts 6.3.0.2

Upgrade to Apache Struts 6.4.0 or later and migrate to the new file upload mechanism.

 

VFortinet FortiWLM (Wireless LAN Manager) Relative Path Traversal Vulnerability

A critical vulnerability in FortiWLM, tracked as CVE-2023-34990, was disclosed by Fortinet last week. This flaw allows unauthenticated attackers to read sensitive files on the device, including the session ID of a target user. This vulnerability can also be combined with CVE-2023-48782, an authenticated command injection flaw, to gain remote code execution in the context of root. The following versions are affected:

Version

Affected

Solution

FortiWLM 8.6

8.6.0 through 8.6.5

Upgrade to 8.6.6 or above

FortiWLM 8.5

8.5.0 through 8.5.4

Upgrade to 8.5.5 or above




 

This report is provided FREE to the cybersecurity community.

Visit our Cyber Threat Intelligence Blog for additional reports.

 

Subscribe to be notified of future Reports:

NOTE
We have enhanced our report with data from SOCRadar. You may need to register to view their threat intelligence content.

DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.