August 24, 2022

Fortify Security Team
Aug 24, 2022

Title: Plex Forces Password Resets after Database Access Incident
Date Published: August 24, 2022

Excerpt: “The Plex media streaming platform is sending password reset notices to many of its users in response to discovering unauthorized access to one of its databases. According to the letter that a reader shared with BleepingComputer, the intruder potentially accessed a limited subset of data, including email addresses, usernames, and encrypted passwords. “Even though all account passwords that could have been accessed were hashed and secured in accordance with best practices, out of an abundance of caution, we are requiring all Plex accounts to have their password reset,” claims Plex’s notice.”

Title: Fake Chrome Extension ‘Internet Download Manager’ has 200,000 Installs
Date Published: August 24, 2022

Excerpt: “Google Chrome extension ‘Internet Download Manager’ installed by more than 200,000 users is adware. The extension has been sitting on the Chrome Web Store since at least June 2019, according to the earliest reviews posted by users. Although the extension may install a known and legitimate download manager program, BleepingComputer observed unwanted behavior exhibited by the extension—such as opening links to spammy sites, changing the default browser search engine, and further hounding the user with pop-ups asking them to download more “patches” and unwanted programs.”

Title: Pirated 3DMark Benchmark Tool Delivering Info-stealer Malware
Date Published: August 23, 2022

Excerpt: “Cybersecurity researchers have discovered multiple ongoing malware distribution campaigns that target internet users who seek to download copies of pirated software. The campaign uses SEO poisoning and malvertising to push malicious shareware sites high in Google Search results, promoting fake software along with cracks and product activation key generators.”

The software used for luring victims in the ongoing campaigns, according to Zscaler that discovered them, includes the following:

  • Adobe Acrobat Pro
  • 3DMark
  • 3DVista Virtual Tour Pro
  • 7-Data Recovery Suite
  • MAGIX Sound Force Pro
  • Wondershare Dr. Fone

Title: Phishing Attacks Abusing SaaS Platforms See a Massive 1,100% Growth  from June 2021 to June 2022.”

Title: Critical RCE Bug in GitLab Patched, Update ASAP! (CVE-2022-2884)

Date Published: August 23, 2022

Excerpt: “Threat actors are increasingly abusing legitimate software-as-a-service (SaaS) platforms like website builders and personal branding spaces to create malicious phishing websites that steal login credentials. According to a new report by Palo Alto Networks Unit 42, researchers have seen a sharp rise in this abuse, with the data collected by the firm showing a massive increase of 1,100% from June 2021 to June 2022.”

Title: Critical RCE Bug in GitLab Patched, Update ASAP! (CVE-2022-2884)
Date Published: August 24, 2022

Excerpt: “The vulnerability was reported through the company’s bug bounty program and there is no mention of it being actively exploited in the wild. CVE-2022-2884 is a critical severity issue that may allow an authenticated user to achieve remote code execution via the Import from GitHub API endpoint, the company explained.”

It affects all GitLab CE/EE versions:

  • Starting from 11.3.4 before 15.1.5
  • Starting from 15.2 before 15.2.3
  • Starting from 15.3 before 15.3.1

Title: France Hospital Center Hospitalier Sud Francilien Suffered Ransomware Attack
Date Published: August 24, 2022

Excerpt: “The Center Hospitalier Sud Francilien (CHSF), a hospital southeast of Paris, has suffered a ransomware attack over the weekend. The attack disrupted the emergency services and surgeries and forced the hospital to refer patients to other structures. According to local media, threat actors demand a $10 million ransom to provide the decryption key to restore encrypted data. “This attack on the computer network of the establishment makes inaccessible for the time being all the hospital’s business software, the storage systems (in particular medical imaging) and the information system relating to patient admissions.” reads the announcement published by the CHSF.”

Title: Microsoft Publicly Discloses Details on Critical ChromeOS Flaw
Date Published: August 23, 2022

Excerpt: “Microsoft shared details of a critical ChromeOS vulnerability tracked as CVE-2022-2587 (CVSS score of 9.8). The flaw is an out-of-bounds write issue in OS Audio Server that could be exploited to trigger a DoS condition or, under specific circumstances, to achieve remote code execution. “Microsoft discovered a memory corruption vulnerability in a ChromeOS component that can be triggered remotely, allowing attackers to perform either a denial-of-service (DoS) or, in extreme cases, remote code execution (RCE).” reads the advisory published by Microsoft. Microsoft reported the issue to Google in April 2022 as a part of the Chromium bug tracking system. Google addressed the vulnerability in June, an attacker can trigger the flaw using malformed metadata associated with the songs. Microsoft discovered a function in the server that did not check a user-supplied ‘identity’ argument, leading to a heap-based buffer overflow.”

Title: This Company Paid a Ransom Demand. Hackers Leaked its Data Anyway
Date Published: August 24, 2022

Excerpt: “A victim of a ransomware attack paid to restore access to their network – but the cyber criminals didn’t hold up their end of the deal. The real-life incident, as detailed by cybersecurity researchers at Barracuda Networks, took place in August 2021, when hackers from BlackMatter ransomware group used a phishing email to compromise the account of a single victim at an undisclosed company. Cybersecurity agencies warn that despite networks being encrypted, victims shouldn’t pay ransom demands for a decryption key because this only shows hackers that such attacks are effective. Despite this, the unidentified organization chose to pay the ransom after negotiating the payment down from half the original demand. But even though the company gave in to the extortion demands, the BlackMatter group still leaked the data a few weeks later – providing a lesson in why you should never trust cyber criminals.”

Title: Ransomware Surges to 1.2 Million Attacks Per Month
Date Published: August 24, 2022

Excerpt: “Ransomware threat detections have risen to over one million per month this year, with a French hospital the latest to suffer a major outage. The 1000-bed Center Hospitalier Sud Francilien (CHSF) near Paris revealed it was hit on Sunday morning, in an attack which has knocked out all the hospital’s business software, storage systems including medical imaging, and patient admissions. This has led to all but the most urgent emergency patients being diverted to other facilities in the region. France24 cited figures claiming cyber-attacks against French hospitals surged 70% year-on-year in 2021.”

Title: Ex-Security Chief Accuses Twitter of Cybersecurity Negligence
Date Published: August 23, 2022

Excerpt: “For Twitter it is going from bad to worse. While the social media behemoth is busy fighting a legal battle against Elon Musk, Peiter Zatko, the firm’s security chief until January 2022, has blown the whistle on the company’s cybersecurity posture, only five months after being sacked. In a complaint filed to the U.S. Securities and Exchange Commission (SEC) on July 6 and obtained by CNN and The Washington Post, Zatko accuses Twitter of severe cybersecurity mismanagement. In the complaint, he alleges that thousands of employee laptops contained complete copies of Twitter’s source code. He claims that about one-third of those devices blocked automatic security fixes, had system firewalls turned off and had remote desktop access enabled for non-approved purposes. He then accuses Twitter of failing to actively monitor what was downloaded on its employee’s devices, and that “employees were repeatedly found to be intentionally installing spyware on their work computers at the request of external organizations,” the complaint said.

Recent Posts

December 9, 2022

Title: US Health Dept Warns of Royal Ransomware Targeting Healthcare Date Published: December 8, 2022 Excerpt: “The U.S. Department of Health and Human...

December 8, 2022

Title: New ‘Zombinder’ Platform Binds Android Malware With Legitimate Apps Date Published: December 8, 2022 Excerpt: “A darknet platform dubbed...

December 7, 2022

Title: Fantasy – A New Agrius Wiper Deployed Through a Supply-Chain Attack Date Published: December 7, 2022 Excerpt: “ESET researchers discovered a new wiper and its execution...

December 6, 2022

Title: This Badly Made Ransomware Can’t Decrypt Your Files, Even if You Pay the Ransom Date Published: December 6, 2022 Excerpt: “Victims of a recently...

December 5, 2022

Title: SIM Swapper Gets 18-Months for Involvement in $22 Million Crypto Heist Date Published: December 3, 2022 Excerpt: “Florida man Nicholas Truglia...

December 2, 2022

Title: New Go-Based Redigo Malware Targets Redis Servers Date Published: December 1, 2022 Excerpt: “Redigo is a new Go-based malware employed in attacks against Redis servers...

December 1, 2022

Title: Keralty Ransomware Attack Impacts Colombia’s Health Care System Date Published: November 30, 2022 Excerpt: “The Keralty multinational healthcare...