DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Cyber Briefing

Cyber Briefing 2023.07.14

July 14, 2023
Reading Time: 8 mins read
in Blog, Cyber Briefing
Cyber Briefing 2023.07.14

Cyber Briefing

Get the newsletter in your inbox every weekday!

Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday.
First time seeing this? Please subscribe.

The latest in cybersecurity: Rockwell, QuickBlox, Zimbra, Honeywell, GhostWriter, Ukraine, GitHub, NRC, PBI, MOVEit, Nigeria, iPhone ban, Russia, Lapsus$, USB.


🚨 Cyber Alerts


1. Critical QuickBlox Vulnerabilities Expose User Privacy

Researchers from Claroty Team82 and CheckPoint Research (CPR) have uncovered critical vulnerabilities in the widely used QuickBlox SDK and API. These vulnerabilities pose a significant risk to industries such as telemedicine, smart IoT, and finance, potentially exposing sensitive user information. The researchers developed proof-of-concept exploits that demonstrated the ability to remotely open doors, leak patient data, and compromise user credentials.


2. Zimbra Urges Manual Fix for Zero-Day

Zimbra Collaboration Suite (ZCS), a widely adopted email and collaboration platform, is facing an actively exploited zero-day vulnerability that targets and compromises email servers. Over 200,000 businesses across 140 countries, including government and financial organizations, are currently using ZCS. The vulnerability, a reflected Cross-Site Scripting (XSS) flaw, was discovered while being exploited in a targeted attack, enabling threat actors to steal sensitive user information or execute malicious code.


3. GhostWriter: Targeting Ukraine & Poland

Government entities, military organizations, and civilian users in Ukraine and Poland have fallen victim to a series of sophisticated campaigns aimed at stealing sensitive data and establishing persistent remote access to compromised systems. The attackers, known as GhostWriter, utilize phishing tactics and decoy documents to distribute PicassoLoader malware, which serves as a conduit for launching Cobalt Strike Beacon and njRAT. The attacks involve multi-stage infection chains initiated through malicious Microsoft Office documents and employ various evasion techniques, including embedding payloads in image files. GhostWriter’s activities align with the priorities of the Belarusian government and have been ongoing since April 2022.


4. Deceptive Backdoor Discovered in GitHub PoC

A proof-of-concept (PoC) found on GitHub has been discovered to contain a backdoor with a crafty persistence method, posing as a harmless learning tool. The PoC disguises itself as a downloader and executes a Linux bash script, operating at the kernel-level to conceal its malicious activities. The repository initially posed as a PoC for a recently disclosed Linux kernel flaw but was eventually taken down after being forked 25 times.


5. APT Targets Rockwell: Critical Infrastructure Vulnerabilities

An advanced persistent threat (APT) group has identified vulnerabilities in Rockwell Automation products that could potentially disrupt critical infrastructure organizations. The flaws, CVE-2023-3595 and CVE-2023-3596, affect ControlLogix EtherNet/IP communication modules and can enable remote code execution and denial-of-service attacks. Rockwell Automation has released firmware patches and shared indicators of compromise, while the US Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory to raise awareness about the vulnerabilities. Although no exploitation has been detected, the potential risk to critical infrastructure remains a concern.


6. Industrial Vulnerabilities: Honeywell DCS Exploits

Cybersecurity company Armis has uncovered critical vulnerabilities in Honeywell’s distributed control system (DCS) products, posing a risk to industrial organizations. The nine vulnerabilities, dubbed ‘Crit.IX,’ were disclosed by Armis researchers and subsequently patched by Honeywell. The flaws, which impact various Experion DCS platforms, could allow attackers to launch denial-of-service attacks, gain unauthorized access to sensitive information, or execute remote code on controllers and servers, potentially leading to production downtime or damage to industrial equipment. Armis previously identified vulnerabilities in other ICS products, emphasizing the need for robust security measures in industrial environments.


No alt text provided for this image

💥 Cyber Incidents


7. Norwegian Refugee Council Cyberattack

The Norwegian Refugee Council (NRC) has revealed that it experienced a cyberattack targeting its online database containing personal information of project participants. The NRC swiftly suspended the database and initiated an external forensic investigation to assess the extent of the attack. While specific details of the attack and the perpetrators remain undisclosed, the NRC emphasized the importance of safeguarding the data of vulnerable individuals in need of humanitarian assistance.


8. Pension Benefit Information, LLC Data Breach

Pension Benefit Information, LLC (PBI) recently disclosed a data breach that occurred due to a vulnerability in their MOVEit file-transfer software. Unauthorized access resulted in the exposure of sensitive consumer information, including names, addresses, Social Security numbers, and dates of birth. PBI has taken swift action, notifying affected individuals and initiating an investigation into the incident. If you have received a data breach notification from PBI, it is crucial to understand the risks involved and take appropriate measures to protect yourself from potential fraud or identity theft.


9. Bangkok Post Hit by Ransomware

The Bangkok Post, along with numerous internet service users, fell victim to a rare ransomware attack, resulting in the inaccessibility of their website. Internet Thailand (Inet) Plc, the service provider, reported the attack on its hypervisor management system, impacting 300 out of its 2,500 clients. Inet is working diligently to restore services to all affected parties by the end of Wednesday.


10. Ogun State Government Website Hacked: Cyber Threats Rise

The official website of the Ogun state government in Nigeria fell victim to a cyberattack conducted by hackers claiming to be from the Maldives. The attack, which was discovered on Wednesday, resulted in the defacement of all website pages. The hackers, going by the name “Anon Ghost,” left their mark by displaying their logo and a bold inscription on the compromised site.


No alt text provided for this image

📢 Cyber News


11. Russia Mulls iPhone Ban Amid Spyware Concerns

The Russian government is contemplating a ban on the use of iPhones by government employees following suspicions of an American intelligence campaign exploiting vulnerabilities to spy on Russian staff. The ban, set to commence on Monday, will initially affect employees at the Ministry of Industry and Trade, with other government departments to follow suit. The move comes after the discovery of thousands of iPhones infected with spyware, leading to accusations of collaboration between Apple and the U.S. National Security Agency.


12. US Cyber Director Unveils Comprehensive Security Plan

The Office of the National Cyber Director (ONCD) has released a comprehensive implementation plan for its ambitious national cybersecurity strategy. The plan outlines specific initiatives and deadlines for 18 government agencies, aiming to strengthen cybersecurity regulation, enhance corporate responsibility, combat cybercrime, and build a skilled cyber workforce.


13. USB Malware Surge: Global Industry Risks

A new report by Mandiant reveals a significant rise in USB-delivered malware, with two major campaigns named ‘Sogu’ and ‘Snowydrive’ observed in 2023. These campaigns, attributed to threat groups TEMP.HEX and UNC4698, respectively, target industries worldwide, aiming to steal sensitive data. The Sogu campaign, considered the most aggressive USB-assisted cyber-espionage operation, has victims across various sectors and countries. The malware, known as ‘Korplug,’ establishes persistence, conducts system reconnaissance, and exfiltrates valuable files to a command-and-control server. Additionally, the Snowydrive campaign infects computers through a backdoor, allowing attackers to execute arbitrary payloads, modify the registry, and propagate through USB drives.


14. Nomination Denied: ONCD’s Uncertain Future

The current acting director of the Office of the National Cyber Director (ONCD) has been informed that she will not receive the nomination for the permanent position, raising concerns about the agency’s effectiveness and influence. Kemba Walden, who has played a crucial role in establishing the ONCD, received the news recently, leaving the agency’s leadership in uncertainty. The decision comes after the departure of Chris Inglis, the first National Cyber Director, and Rob Knake, the deputy director overseeing the national cybersecurity strategy.


15. Teenagers Accused of High-Profile Hacks

British prosecutors have accused two teenagers, identified as Arion Kurtaj and an unnamed 17-year-old, of hacking into companies such as Revolut, Uber, and Rockstar as part of the now-inactive Lapsus$ hacking group. The hackers exposed personal data of thousands of Revolut users and leaked unreleased game footage from Rockstar. The duo also targeted Microsoft, Nvidia Corp., Okta, and conducted cryptocurrency scams using fraudulent SIM cards. With their IP addresses traced, the teenagers now face charges including blackmail, fraud, and violations under the Computer Misuse Act.


No alt text provided for this image


Subscribe and Comment.
Copyright © 2023 CyberMaterial. All Rights Reserved.
Follow CyberMaterial on:
LinkedIn, Twitter, Reddit, Instagram, Facebook, YouTube, and Medium.

Tags: AlertsBlogClopCyber BriefingGhostwriterGithubHoneywellincidentsiPhone banJuly 2023Lapsus$MalwareMOVEitNewsNigeriaNRCPBIQuickBloxRockwellRussiaUkraineUSBZimbra
ADVERTISEMENT
0
VIEWS

Related Posts

October 2, 2023 – Cyber Briefing

October 2, 2023 – Cyber Briefing

October 2, 2023
September 29, 2023 – Cyber Briefing

September 29, 2023 – Cyber Briefing

September 29, 2023
September , 2023 – Cyber Briefing

September 28, 2023 – Cyber Briefing

September 28, 2023
September 27, 2023 – Cyber Briefing

September 27, 2023 – Cyber Briefing

September 27, 2023

September 26, 2023 – Cyber Briefing

September 26, 2023
September 25, 2023 – Cyber Briefing

September 25, 2023 – Cyber Briefing

September 25, 2023
Next Post
Cyber Briefing 2023.07.14

Cyber Briefing 2023.07.14

CompTIA Security+ Certification

CompTIA Security+ Certification

Offensive Security Certified Professional

Offensive Security Certified Professional

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.