Ukraine says Russian hackers are targeting country’s defense contractors

Ukraine’s Computer Emergency Response Team (CERT-UA) said in a report published over the weekend that a hacking group has been targeting the country’s defense and military companies with phishing attacks.  The CERT identified the hacking group as UAC-0185 — also known as UNC4221 — without saying who was behind the group. Earlier this year, however, […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Digital Assets Cybersecurity Essentials

Discover essential tips to secure your digital assets like crypto, NFTs, and tokens. Learn about wallet safety, avoiding…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

US medical device giant Artivion says hackers stole files during cybersecurity incident

Artivion, a medical device company that manufactures implantable tissues for cardiac and vascular transplant applications, says its services have been “disrupted” due to a cybersecurity incident.  In an 8-K filing with the SEC on Monday, Georgia-based Artivion, formerly CryoLife, said it became aware of a “cybersecurity incident” that involved the “acquisition and encryption” of data […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

WhatsApp fixes bug that let users bypass ‘View Once’ privacy feature

Weeks after a researcher reported the bug to WhatsApp, the company says it rolled out a long-term fix.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Prepare for 2025 with This CompTIA Training Bundle for $50

Learn at your own pace from your own space with lifetime Access to 310+ hours of learning from IT experts.

Security | TechRepublic – ​Read More

Large-Scale Incidents & the Art of Vulnerability Prioritization

We can anticipate a growing number of emerging vulnerabilities in the near future, emphasizing the need for an effective prioritization strategy.

darkreading – ​Read More

Cyble’s Weekly Vulnerability Report: Critical Flaws in Major Software Including Progress Software, QNAP, and 7-Zip

Weekly Vulnerability

Overview

The Cyble Research & Intelligence Labs (CRIL) has released its Weekly Vulnerability Insights Report, highlighting a series of critical vulnerabilities reported between November 27, 2024, and December 3, 2024.

This week’s findings focus on various vulnerabilities that pose risks to organizations, ranging from open-source applications to widely used enterprise software. The analysis includes vulnerabilities that have been actively exploited or are likely to be exploited in the near future, with some already accompanied by proof-of-concept (PoC) exploit code.

One of the most noteworthy vulnerabilities identified in this week’s report is CVE-2024-11680, which impacts ProjectSend, an open-source file-sharing application. This vulnerability is categorized as a critical vulnerability in CISA’s Known Exploited Vulnerabilities (KEV) catalog. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2024-11680 along with two other vulnerabilities to its catalog.

Throughout this week, CRIL has extensively analyzed vulnerabilities in products from major vendors like Progress Software, Veeam, Microsoft, and QNAP, as well as open-source software like 7-Zip.

CISA’s KEV Catalog: Active Exploitation and Critical Vulnerabilities

As part of its efforts to inform the public about vulnerabilities that are actively exploited, CISA has added three vulnerabilities to its Known Exploited Vulnerabilities Catalog between November 27 and December 3, 2024.

Among these is CVE-2024-11680, a critical flaw in ProjectSend that involves improper authentication, allowing attackers to bypass security and potentially gain unauthorized access. This vulnerability has been assigned a CVSSv3 score of 9.8, making it a high-priority issue for organizations using the software.

Additionally, CVE-2024-11667, a path traversal vulnerability in Zyxel firewalls, also made it to the KEV catalog. Although not as critical as CVE-2024-11680, this vulnerability is still high-risk, affecting multiple models of Zyxel Firewalls with a CVSSv3 score of 7.5. This issue could allow attackers to access sensitive files on vulnerable systems.

Furthermore, CVE-2023-45727, an XML External Entity (XXE) vulnerability in North Grid’s Proself software, was included as well. Exploitation of this vulnerability can allow attackers to launch XXE attacks remotely, exposing systems to potential data breaches.

Major Vulnerabilities Identified

Several other vulnerabilities have been identified as critical threats in this week’s report. Among them:

  1. CVE-2024-8785 – A Remote Code Execution (RCE) vulnerability in WhatsUp Gold, a network monitoring software by Progress Software Corporation. This vulnerability allows unauthenticated remote attackers to exploit the NmAPI.exe service to manipulate the Windows registry, potentially resulting in system compromise. With the availability of PoC exploit code, the risk of this vulnerability being weaponized is particularly high.
  2. CVE-2024-42448 and CVE-2024-42449 – Both vulnerabilities affect the Veeam Service Provider Console (VSPC), a cloud-based platform used for managing and monitoring data protection services. These vulnerabilities could allow for Remote Code Execution (RCE) and the exposure of sensitive information like NTLM hashes. Veeam has released patches, but organizations are urged to patch their systems immediately to prevent exploitation.
  3. CVE-2024-11477 – An RCE vulnerability in the popular file archiver 7-Zip. This flaw arises from Zstandard Decompression in versions prior to 24.07 and could be exploited in email-based phishing campaigns that use malicious compressed files as delivery mechanisms. Given the high use of 7-Zip in both personal and organizational settings, this vulnerability is a major concern.
  4. CVE-2024-49019 – A high-severity elevation of privilege vulnerability in Microsoft’s Active Directory Certificate Services. This flaw allows attackers to gain elevated permissions by exploiting misconfigurations in certificate templates. CVE-2024-49019 affects millions of Windows-based systems, and with exploit codes already circulating, it poses a significant risk.
  5. CVE-2024-38077 – A critical vulnerability affecting the Windows Remote Desktop Licensing Service, which allows Remote Code Execution (RCE). This vulnerability is particularly dangerous as it impacts multiple versions of Windows, making it a prime target for attackers.

Online Threats on Underground Forums

One of the more concerning findings in the Weekly Vulnerability Report is the presence of active discussions and exploit sharing on underground forums and Telegram channels. These forums are often frequented by cybercriminals who share PoC exploit codes for various vulnerabilities. This week, researchers from CRIL tracked several discussions related to the following vulnerabilities:

  • CVE-2024-44285 – A use-after-free vulnerability found in Apple’s operating systems, including iOS, iPadOS, and watchOS. Exploiting this flaw could lead to unexpected termination of the system or even kernel memory corruption.
  • CVE-2024-11320 – An arbitrary code execution (RCE) vulnerability affecting Pandora FMS. This vulnerability can be exploited via the LDAP authentication mechanism, potentially giving attackers full access to vulnerable systems.
  • CVE-2024-44308 – A critical vulnerability in JavaScriptCore, part of the WebKit engine used by Apple’s Safari browser. This flaw could lead to RCE when users visit malicious websites.
  • CVE-2024-0012 – An authentication bypass vulnerability in Palo Alto Networks’ PAN-OS, affecting several versions of the software. This flaw allows attackers to bypass authentication and gain administrative privileges, providing them with full control over affected devices.

Recommendations and Mitigations

Following these vulnerabilities, CRIL offers several key recommendations to help organizations mitigate potential security risks:

  1. Organizations should ensure they are applying the latest patches released by vendors to address vulnerabilities like CVE-2024-11680 and others identified in this report. Patching critical vulnerabilities immediately can prevent attacks from exploiting these weaknesses.
  2. A comprehensive patch management process is essential. This includes testing, deployment, and verification of patches to ensure that systems remain secure.
  3. Critical systems should be isolated from less secure areas of the network to reduce exposure to potential attacks. Using firewalls and access control measures can help limit the impact of a breach.
  4. Organizations should implement monitoring systems such as SIEM (Security Information and Event Management) to detect suspicious activities across their networks.
  5. Regular training on security best practices, particularly for dealing with phishing emails and malicious attachments, can help reduce the risk of exploitation through social engineering.

Conclusion

The Weekly Vulnerability Report from Cyble Research & Intelligence Labs provides essential insights into the vulnerabilities impacting critical systems and software. With high-risk vulnerabilities such as CVE-2024-11680, CVE-2024-8785, and CVE-2024-49019 in play, it is crucial for organizations to stay proactive in applying patches, monitoring for potential attacks, and reinforcing their overall security posture.

With PoC exploit code already circulating for many of these vulnerabilities, the window of opportunity for attackers to exploit these flaws is rapidly closing, making immediate action imperative. By following the best practices and recommendations provided in this report, organizations can better protect themselves.

The post Cyble’s Weekly Vulnerability Report: Critical Flaws in Major Software Including Progress Software, QNAP, and 7-Zip appeared first on Cyble.

Blog – Cyble – ​Read More

Comprehensive overview of network detection & response capabilities and uses | Kaspersky official blog

Why do even large companies that have invested heavily in their cyberdefense still fall victim to cyberattacks? Most often, it’s a matter of an outdated approach to security. Security teams may deploy dozens of tools, but lack visibility within their own networks, which nowadays include not only usual physical segments, but cloud environments as well. Hackers often exploit stolen credentials, operate through compromised contractors, and try to use malware as rarely as possible — preferring to exploit legitimate software and dual-purpose applications. That’s why security tools that are usually used to protect company’s endpoints may not be effective enough against well-disguised cyberattacks.

In a recent survey, 44% of CISOs reported missing a data breach, with 84% attributing the issue to an inability to analyze traffic, particularly encrypted traffic. This is where network detection and response (NDR) systems come into play. They offer comprehensive traffic analysis, including internal traffic — significantly enhancing security capabilities. In the Kaspersky product range, NDR functionality is implemented as part of its Kaspersky Anti Targeted Attack Platform (KATA).

Outdated security tools aren’t enough

If there was one word to describe the priorities of today’s attackers, it would be “stealth”. Whether it’s espionage-focused APTs, ransomware groups, or any other attacks targeting a specific organization, adversaries go to great lengths to avoid detection, and complicate post-incident analysis. Our incident response report illustrates this vividly. Attackers exploit legitimate employee or contractor credentials, leverage admin tools already in use within the system (a tactic known as “living off the land”), and exploit vulnerabilities to perform actions from privileged user accounts, processes, or devices. Moreover, edge devices, such as proxy servers and firewalls, are increasingly being used as attack footholds.

How do cybersecurity teams respond to this? If a company’s threat detection approach was designed several years ago, its defenders might simply lack the tools to detect such activity in a timely manner:

  • In their traditional form, they only protect the organization’s perimeter, and don’t assist in detecting suspicious network activity inside it (such as attackers taking over additional computers).
  • Intrusion detection and prevention systems (IDS/IPS). The capabilities of classic IDS’s for detecting activity over encrypted channels are very limited, and their typical location between network segments impedes detection of lateral movement.
  • Antivirus and endpoint protection systems. These tools are difficult to use for detecting activity conducted entirely with legitimate tools in manual mode. Moreover, organizations always have routers, IoT devices, or network peripherals where it’s not possible to deploy such protection systems.

What is network detection and response?

NDR systems provide detailed monitoring of an organization’s traffic and apply various rules and algorithms to detect anomalous activity. They also include tools for rapid incident response.

The key difference to firewalls is the monitoring of all types of traffic flowing in various directions. Thus, not only communications between a network and the internet (north-south) are being analyzed, but data exchange between hosts within a corporate network (east-west) as well. Communications between systems in external networks and corporate cloud resources, as well as between cloud resources themselves, are not left unattended either. This makes NDR effective in various infrastructures: on-premises, cloud, and hybrid.

The key difference to classic IDS/IPS is the use of behavioral analysis mechanisms alongside signature analysis.

Besides connections analysis, an NDR solution keeps traffic in its “raw” form, and provides a whole range of technologies for analysis of such “snapshots” of data exchange; NDR can analyze many parameters of traffic (including metadata), going beyond simple “address-host-protocol” dependencies. For example, using JAx fingerprints, NDR can identify the nature even of encrypted SSL/TLS connections, and detect malicious traffic without needing to decrypt it.

Benefits of NDR for IT and security teams

Early threat detection. Even the initial steps of attackers — whether it’s brute-forcing passwords or exploiting vulnerabilities in publicly accessible applications — leave traces that NDR tools can detect. NDR, having “presence” not only on the edges of a network, but at its endpoints as well, is also well-suited to detecting lateral movement within the network, manipulation with authentication tokens, tunneling, reverse shells, and other common attack techniques, including network interactions.

Accelerated incident investigation. NDR tools allow for both broad and deep analysis of suspicious activity. Network interaction diagrams show where attackers moved and where their activity originated from, while access to raw traffic allows for the reconstruction of the attacker’s actions and the creation of detection rules for future searches.

A systematic approach to the big picture of an attack. NDR works with the tactics, techniques, and procedures of the attack — systematized according to such a popular framework as MITRE ATT&CK. Solutions of this class usually allow a security team to easily classify the detected indicators and, as a result, better understand the big picture of the attack, figure out the stage it’s at, and how the attack can be stopped as effectively as possible.

Detection of internal threats, misconfigurations, and shadow IT. The “behavioral” approach to traffic allows NDR to address preventive tasks as well. Various security policy violations, such as using unauthorized applications on personal devices, connecting additional devices to the company infrastructure, sharing passwords, accessing information not required for work tasks, using outdated software versions, and running server software without properly configured encryption and authentication, can be identified early and stopped.

Supply chain threat detection. Monitoring the traffic of legitimate applications may reveal undeclared functionality, such as unauthorized telemetry transmission to the manufacturer or attempts to deliver trojanized updates.

Automated response. The “R” in NDR stands for response actions such as isolating hosts with suspicious activity, tightening network zone interaction policies, and blocking high-risk protocols or malicious external hosts. Depending on the circumstances, the response can be either manual or automatic, triggered by the “if-then” presets.

NDR, EDR, XDR, and NTA

IT management and executives often ask tricky questions about how various *DR solutions differ from each other and why they’re all needed at the same time.

NTA (network traffic analysis) systems are the foundation from which NDR evolved. They were designed to collect and analyze all the traffic of a company (hence the name). However, practical implementation revealed the broader potential of this technology — that is, it could be used for rapid incident response. Response capabilities, including automation, are NDR’s primary distinction.

EDR (Endpoint Detection & Response) systems analyze cyberthreats on specific devices within the network (endpoints). While NDR provides a deep analysis of devices’ interactions and communication within the organization, EDR offers an equally detailed picture of the activity on individual devices. These systems complement each other, and only together do they provide a complete view of what’s happening in the organization and the tools needed for detection and response.

XDR (eXtended Detection & Response) systems take a holistic approach to threat detection and response by aggregating and correlating data from various sources, including endpoints, physical and cloud infrastructures, network devices, and more. This enables defenders to see a comprehensive overview of network activity, combine events from different sources into single alerts, apply advanced analytics to them, and simplify response actions. Different vendors put different spins on XDR: some offer XDR as a product that includes both EDR and NDR functionalities, while for others it may only support integration with these external tools.

Kaspersky’s approach: integrating NDR into the security ecosystem

Implementing NDR implies that an organization has already achieved a high level of cybersecurity maturity, with established monitoring and response practices, as well as tools for information exchange between systems, ensuring correlation and enrichment of data from various sources. This is why in Kaspersky’s product range and the NDR module enhances the capabilities of the Kaspersky Anti Targeted Attack Platform (KATA). The basic version of KATA includes mechanisms such as SSL/TLS connection fingerprint analysis, north-south traffic attack detection, selective traffic capture for suspicious connections, and basic response functions.

The KATA NDR Enhanced version includes all the NDR capabilities described above, including deep analysis and full storage of traffic, intra-network connection monitoring, and automated advanced response functions.

The top-tier version, KATA Ultra, combines expert EDR capabilities with full NDR functions, offering a comprehensive, single-vendor XDR solution.

Kaspersky official blog – ​Read More

Medical Device Maker Artivion Scrambling to Restore Systems After Ransomware Attack

Medical devices manufacturer Artivion says a ransomware attack caused disruptions to order and shipping processes.

The post Medical Device Maker Artivion Scrambling to Restore Systems After Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Behind Vectra AI’s deliberate approach to building AI agents for cybersecurity

VentureBeat/Ideogram


Unlike traditional security tools, Vectra uses AI agents to scrutinize encrypted and decrypted traffic metadata in a dynamic and holistic way.Read More

Security News | VentureBeat – ​Read More