17 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
6 min read
PacketWatch Team Sixty43
:
August 1, 2023
Welcome back to another week of Cyber Threat Intelligence (CTI). This week's report highlights new CISA Risk Advisories, a new Nitrogen Malvertising Campaign, and Vulnerability Roundup.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently published two advisories highlighting common techniques and vulnerabilities being leveraged by threat actors. Here are the key takeaways:
When threat actors are trying to gain initial access, the 'Valid Accounts' technique was used over 54% of the time. This can be from threat actors purchasing valid account credentials from initial access brokers, finding compromised accounts in 3rd party data breaches and using credential stuffing (using the same password across different sites) to gain access, or even brute-forcing weak passwords.
Additional details from CISA can be found here:
This report focused on a specific type of access control vulnerability known as insecure direct object reference (IDOR). This vulnerability allows the threat actor to modify or delete data and access sensitive data they should not have rights to. According to CISA, these vulnerabilities are frequently exploited because "they are common, hard to prevent outside the development process, and can be abused at scale."
A simple example would be where a parameter is exposed in the URL, and simply changing the parameter displays the unauthorized data:
https://example[.]com/data.php?id=12345 --> https://example[.]com/data.php?id=56789
While much of the remediation for this vulnerability is on the development side of the web application, CISA does list recommendations for all end users:
Ensure diligence when selecting web applications
Apply software patches for web applications as soon as possible.
Configure the web application to log and alert on tamper attempts.
Run vulnerability scans against web applications.
Run web application penetration tests, especially against internet facing web applications.
Use a web application firewall (WAF).
Depending on the sensitivity of the data, consider using a data loss prevention (DLP) tool to prevent unauthorized data from leaving the application.
Create and maintain an incident response plan.
Additional details from CISA and Varonis can be found here:
Security firm Sophos recently published research on a new malicious advertising (malvertising) campaign known as 'Nitrogen.'
With this campaign, threat actors abuse Google and Bing search ads to trick IT users into downloading fake tools masquerading as AnyDesk, Cisco AnyConnect VPN, and WinSCP.
These malicious downloads include legitimate versions of the tool to avoid suspicion from the user but include an additional malicious Python package which is used to connect back to the attacker's command and control (C2), open a Meterpreter shell, and eventually deploy Cobalt Strike for persistent access to the host. In some cases, this infection chain has led to the deployment of BlackCat (ALPHV) ransomware.
These types of campaigns highlight the importance of application control within an organization. All new software installs throughout the enterprise should be downloaded from a central repository of pre-approved applications.
If this is not possible, ensuring all endpoints have an up-to-date EDR solution deployed will help mitigate accidental attempts at installing these malicious packages.
Many EDR solutions also allow for application whitelisting. These policies can be configured to only allow pre-approved applications to be installed on the host.
Additional details from Sophos and The Hacker News can be found here:
Over the last two weeks, multiple high-profile vulnerabilities were disclosed for multiple software and hardware vendors. If your organization uses any of these technologies, it is recommended to patch them as soon as possible.
A critical vulnerability (CVE-2023-3519) in Citrix NetScaler ADC and Netscaler Gateway was disclosed. For the device to be vulnerable, it must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, or RDP Proxy) or as an authentication virtual server. It is believed that the exploit for this vulnerability was initially sold on as a 0-day. Organizations are urged to patch immediately.
A full list of vulnerable versions and patching information can be found in the Citrix advisory here.
CISA published an advisory containing technical details of the vulnerability, as well as detection methods to hunt for webshells on potentially compromised devices. The advisory can be found here.
PacketWatch publishes this report and other cybersecurity threat intel to the security community for free via our blog. If you are interested in personalized threat intel, contact us today to learn about our enterprise threat intelligence services.
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.
17 min read
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
17 min read
This week, we briefed our clients on the findings from Google's 2025 ransomware investigations. We highlighted the key TTPs used by ransomware...
16 min read
This week, we briefed our clients on a wave of new phishing campaigns worth noting due to their large scale and varied techniques—here are the TTPs.