DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Unpatched IBM file transfer software at Risk

March 31, 2023
Reading Time: 2 mins read
in Alerts

 

IBM’s Aspera Faspex file-exchange software has been flagged as vulnerable to ransomware attack by security experts. A flaw patched in December 2022 was not immediately detailed by IBM but has since been designated CVE-2022-47986, which can be used to sidestep authentication and remotely exploit code.

Malicious activity trackers have reported seeing active attempts to exploit this vulnerability in vulnerable versions of Aspera Faspex.

BuhtiRansom, a relatively new ransomware group, has been encrypting multiple vulnerable servers with the flaw. Aspera Faspex users are advised to take their software offline immediately unless they have upgraded it to a patched version.

The flaw is a deserialization vulnerability in the Ruby on Rails code that exists in IBM Aspera Faspex version 4.4.2 running patch level 1 and earlier. The vulnerability is fixed by removing the API call, but users can also upgrade to Faspex 5.x, which does not have the flaw.

Rapid7 recommends that Aspera Faspex users should patch on an emergency basis, without waiting for a typical patch cycle to occur. Targeting file transfer software or appliances is not a new tactic for ransomware groups.

Buhti is not the only ransomware group targeting IBM’s file transfer software. SentinelOne’s threat intelligence division, SentinelLabs, has reported that IceFire, a ransomware group first spotted in March 2022, has been using the Aspera vulnerability to attack Linux systems.

Launching a ransomware attack against Linux “at scale” is more difficult than for Windows, because Linux tends to run on servers, making “typical infection vectors like phishing or drive-by download less effective.” Exploitable vulnerabilities help attackers sidestep such restrictions.

 

Read More

Tags: AlertsAlerts 2023Aspera FaspexCyber AttacksIBMMarch 2023Ransomware
1
VIEWS
ADVERTISEMENT

Related Posts

Brazilian Hackers Target Portuguese Banks

Brazilian Hackers Target Portuguese Banks

May 26, 2023
Gaming Under Attack: Dark Frost Botnet

Gaming Under Attack: Dark Frost Botnet

May 26, 2023
D-Link Fixes Critical Vulnerabilities

D-Link Fixes Critical Vulnerabilities

May 26, 2023
Encrypted RPMSG Phishing: Targeting Accounts

Encrypted RPMSG Phishing: Targeting Accounts

May 26, 2023

More Articles

Hateful Speech

November 19, 2021
Alerts

Vidar spyware is now hidden in Microsoft help files

March 24, 2022
Book

Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

November 22, 2021
Book

Healthcare Cybersecurity

January 3, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.