company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Atlassian

Jira

Vulnerability

loading..
loading..
loading..

Atlassian urging its enterprise users to update their Jira products to patch a critical vulnerability tracked as CVE-2020-36239

Atlassian's Jira Services are vulnerable to attackers executing arbitrary remote code. The bug stemmed from unrestricted access to Ehcache RMI ports...

22-Jul-2021
3 min read

Related Articles

loading..

Linux

FASTCash

North Korean hackers deploy a new Linux FASTCash malware variant enabling unauth...

A newly identified [Linux](https://www.secureblink.com/cyber-security-news/new-regre-ss-hion-critical-open-ssh-vulnerability-allows-root-access-on-linux) variant of the notorious FASTCash malware has been discovered, expanding the attack surface of North Korean hackers targeting financial institutions. Previously known to compromise IBM AIX and Microsoft Windows systems, this malware now poses a threat to Linux-based payment switch servers, enabling unauthorized cash withdrawals from ATMs. This development underscores the evolving tactics of threat actors like Hidden Cobra (also known as APT38 or [Lazarus Group](https://www.secureblink.com/cyber-security-news/lazarus-targets-spanish-aerospace-with-lightless-can)) and highlights the urgent need for robust security measures in the financial sector. ### Background #### Evolution of FASTCash Malware The term FASTCash refers to a malware family [attributed](https://doubleagent.net/fastcash-for-linux/) to North Korean hackers, designed to infiltrate payment switch systems within compromised networks. Since at least 2016, FASTCash has facilitated unauthorized ATM cash-outs by manipulating transaction messages, resulting in the theft of tens of millions of dollars per incident across multiple countries. **2018:** The U.S. Cybersecurity and Infrastructure Security Agency (CISA) [first warned](https://www.cisa.gov/news-events/alerts/2018/10/02/hidden-cobra-fastcash-campaign) about FASTCash, linking it to Hidden Cobra. **2019:** The first Windows variant surfaced, expanding the malware's reach beyond IBM AIX systems. **2020:** CISA updated its advisory to include the Windows variant, noting significant developments in the malware's capabilities. **2021:** Indictments were announced for three North Koreans involved in these schemes, responsible for over $1.3 billion in theft. ### Technical Analysis of the Linux Variant #### Compilation & Deployment The newly discovered Linux variant was compiled for Ubuntu Linux 20.04 using GCC 11.3.0. Analysis suggests that the malware was developed after April 21, 2022, likely within a [VMware](https://www.secureblink.com/cyber-security-news/patch-critical-v-mware-v-center-vulnerabilities-to-prevent-rce-now) virtual machine environment. The use of Ubuntu indicates a shift, as traditional payment switch systems often run on proprietary UNIX systems or Windows. #### Similarities to Previous Variants The Linux variant shares operational similarities with its Windows and AIX predecessors: Currency Manipulation: Both the Linux and Windows variants operate in Turkish Lira (TRY), while the AIX variant used Indian Rupee (INR). ISO8583 Message Manipulation: The malware intercepts and manipulates ISO8583 messages, the standard for financial transaction card-originated messages. Approval of Declined Transactions: It authorizes previously declined transactions by injecting fraudulent response messages before they reach the acquirer. ### Intercepting Transaction Messages #### Payment Switch Systems Payment switches act as intermediaries, routing transaction messages between ATMs/POS terminals and financial institutions. By compromising these systems, the malware can manipulate transaction data undetected. #### ISO8583 Protocol Exploitation The malware hooks into the recv function of network processes to intercept ISO8583 messages, specifically targeting: Message Type Indicators (MTIs): Focuses on authorization requests (1xx) and financial transactions (2xx). Data Elements (DEs): Manipulates fields such as DE2 (Primary Account Number), DE3 (Processing Code), DE4 (Transaction Amount), DE49 (Transaction Currency Code), and DE54 (Additional Amounts). ![diagram.jpg](https://sb-cms.s3.ap-south-1.amazonaws.com/diagram_5d10d93578.jpg) ***FASTCash Operational Flow (Source:doubleagent.net)*** ### Process Injection Techniques Using the ptrace system call, the malware injects itself into running processes on the payment switch server. It employs shared libraries (libMyFc.so) to hook network functions, allowing it to monitor and alter transaction messages in real-time. ### Fraudulent Transaction Approval Upon intercepting a declined transaction due to insufficient funds (Processing Code 51), the malware: 1. Generates a Random Amount: Between 12,000 and 30,000 TRY (~$350 to $875). 2. Modifies Response Codes: Sets DE38 (Approval Code) and DE39 (Action Code) to indicate approval. 3. Adjusts Data Elements: Removes specific DEs related to security and authentication to avoid detection. 4. Sends Manipulated Response: Forwards the fraudulent approval to the bank's central systems, enabling unauthorized cash withdrawals. ### Indicators of Compromise (IoCs) The following SHA-256 hashes are associated with the Linux variant: f34b532117b3431387f11e3d92dc9ff417ec5dcee38a0175d39e323e5fdb1d2c 7f3d046b2c5d8c008164408a24cac7e820467ff0dd9764e1d6ac4e70623a1071 (UPX packed) ### Impact and Implications #### Expanded Attack Surface The discovery of a Linux variant indicates that North Korean hackers are broadening their targets to include a wider range of operating systems. This expansion poses significant risks to financial institutions that may rely on Linux-based systems for payment processing. #### Financial and Reputational Damage Unauthorized cash withdrawals facilitated by FASTCash can lead to substantial financial losses and damage the reputation of affected institutions. The malware's ability to evade detection exacerbates these risks. #### Challenges in Detection As of its discovery, the Linux variant had zero detections on VirusTotal, highlighting the difficulty traditional security tools face in identifying such threats. ### Detection and Prevention #### Implementing Robust Security Measures Financial institutions should adhere to CISA's recommendations: **Message Authentication Codes:** Require and verify MACs on issuer financial request and response messages. **Chip and PIN Requirements:** Implement chip and PIN authentication for debit and credit cards. **Cryptogram Validation:** Perform authorization response cryptogram validation for chip and PIN transactions.

loading..   16-Oct-2024
loading..   5 min read
loading..

IntelBroker

Cisco

Cisco is found to be currently investigating a possible data breach following re...

Cisco is found to be currently investigating a possible data breach following reports that allegedly stolen data has surfaced for sale on a hacking forum. The stolen data claims have been linked to a threat actor known as "IntelBroker" who, along with two others— "EnergyWeaponUser" and "zjj"—claims to have breached Cisco on June 10, 2024. According to IntelBroker, the breach compromised a whole host of sensitive information, including: - GitHub and GitLab project repositories - Source code - Hard-coded credentials - SSL Certificates - Docker builds - API tokens - AWS and Azure storage bucket data - Confidential Cisco documents, and more. ## Cisco’s Response A Cisco spokesperson confirmed the company is aware of the alleged breach and that an investigation is ongoing to assess the extent of the situation. At this time, Cisco has not confirmed the authenticity of the claims or the data samples that have been leaked. **Cisco's statement:** > _"We have launched an investigation to assess this claim, and our investigation is ongoing."_ ## Alleged Attacker’s Claims IntelBroker which has been involved in many targeted cyberattacks namely [Facebook](https://www.secureblink.com/cyber-security-news/200-000-facebook-marketplace-records-leaked-claims-intel-broker) & [General Electronics](https://www.secureblink.com/cyber-security-news/intel-broker-offers-ge-s-pipelines-for-500-amid-cyberattack-probe) along with their associates have provided samples of the alleged stolen data on a hacking forum. These samples include: - A customer database - Customer information - Documentation related to customers - Screenshots from internal customer management portals. While details of how the data breach has transpired remain still unclear, the type of data presented suggests access to core developer infrastructure and proprietary code repositories, potentially via compromised DevOps systems. ### Critical Data at Risk The threat actor’s post indicated that many of Cisco’s most crucial assets were allegedly infiltrated. Some of the more alarming categories include: 1. **Source Code Repositories**: IntelBroker claims access to multiple source code repositories hosted on GitHub, GitLab, and SonarQube. This can pose a serious risk to Cisco’s intellectual property, potentially allowing attackers to identify vulnerabilities in Cisco products. 2. **Hard-Coded Credentials and API Tokens**: The presence of hard-coded credentials within the code repositories could allow further exploitation of other systems if not remediated promptly. 3. **Confidential Cisco Documents**: Exposure of internal documentation could reveal sensitive corporate strategies, undisclosed technologies, and private communications. 4. **Cloud Infrastructure Access**: AWS private buckets, Azure storage, and Docker build data are all listed as compromised. Breaching cloud infrastructure is a serious issue as it can lead to further compromise of confidential services or data leakage. 5. **Private & Public Keys, SSL Certificates**: If SSL certificates or cryptographic keys have been compromised, the breach could extend to disrupting secure communication channels. ## Analysis of Previous Incidents This is not the first time IntelBroker has been associated with major data breaches. Since June 2024, the group has been involved in leaking or selling data from various high-profile companies such as [T-Mobile](https://www.secureblink.com/cyber-security-news/second-t-mobile-data-breach-of-2023-attackers-access-info-of-hundreds), [AMD](https://www.secureblink.com/cyber-security-news/sink-close-a-high-severity-amd-cpu-vulnerability-enables-undetectable-malware), and [Apple](https://www.secureblink.com/cyber-security-news/apple-urgently-releases-i-os-update-to-fix-voice-over-password-flaw). These previous attacks reportedly exploited vulnerabilities in third-party DevOps and software development services providers. It remains unclear whether the Cisco breach is related to those earlier incidents, but the scope of the alleged data exfiltration suggests that a third-party service provider might have been targeted once again. However, this isn't an isolated intrusion where Cisco has been involved, previously the company suffered many intrusions such as detection of backdoor vulnerability in there [smart licensing utility](https://www.secureblink.com/cyber-security-news/cisco-patches-critical-backdoor-vulnerability-in-smart-licensing-utility-1), there [VPN have been exploited](https://www.secureblink.com/cyber-security-news/ransomware-group-exploit-cisco-vpn-zero-day-vulnerability) by ransomware group, their [CISCO SPA 112 Phone Adapters](https://www.secureblink.com/cyber-security-news/cisco-spa-112-phone-adapters-vulnerable-to-arbitrary-code-execution) were vulnerable to arbitrary code execution, [Cisco AnyConnect](https://www.secureblink.com/cyber-security-news/any-connect-security-flaw-being-exploited-in-the-wild-cisco-warned) had been exploited in the wild and many more. Third-party vendors in DevOps often possess extensive access to company infrastructure, making them a high-value target for cybercriminals. ## Implications of the Cisco Data Breach If IntelBroker’s claims prove to be accurate, this breach could have severe implications for Cisco’s customers and partners. Compromised source code, credentials, and API tokens could potentially lead to: 1. **Intellectual Property Theft**: With source code and product designs in hand, competitors or criminal groups could clone or exploit Cisco products. 2. **Secondary Attacks**: The use of compromised credentials, API tokens, or customer documentation could lead to follow-up attacks, including ransomware, phishing, or fraud targeting Cisco’s customers. 3. **Loss of Trust**: A breach of this magnitude could significantly damage Cisco's reputation, especially among enterprise clients who rely on its technologies for secure networking solutions. 4. **Regulatory and Legal Consequences**: Cisco could face significant regulatory scrutiny, especially if customer or proprietary data is found to have been insufficiently protected. ### Potential Remediation Strategies While Cisco continues its investigation, there are several immediate steps the company should consider: - **Revocation of Exposed Certificates and Credentials**: Any SSL certificates, private keys, or hard-coded credentials that were potentially compromised must be revoked and replaced immediately. - **Patch and Secure DevOps Systems**: Since DevOps infrastructure appears to be the common thread in IntelBroker’s past breaches, Cisco should audit and strengthen security controls around its own DevOps tools and those of any third-party vendors. - **Customer Communication and Incident Response**: If customer information is indeed part of the compromised data, Cisco will need to proactively inform affected customers and assist them in securing their systems. - **Security Audit of Code Repositories**: A thorough audit of all GitHub, GitLab, and SonarQube repositories should be conducted to identify any potential vulnerabilities or further exposures of sensitive information. As more companies integrate third-party services into their core development workflows, they become increasingly vulnerable to attacks targeting those services. In the short term, it is critical for Cisco to validate IntelBroker’s claims, secure any exposed infrastructure, and collaborate with affected customers to mitigate potential risks. The long-term challenge will be fortifying the security of its development pipelines to prevent similar breaches in the future.

loading..   15-Oct-2024
loading..   6 min read
loading..

China

Fidelity

77,099 Fidelity Investments customers' data breached—SSNs and driver's licenses ...

Fidelity Investments, a global leader in asset management, has confirmed a significant data breach that compromised personal information of 77,099 customers. The breach, which transpired between August 17 and August 19, 2024, exposed sensitive data including Social Security numbers and driver's license details. ### Incident Details ##### Timeline of Events - **August 17-19, 2024:** Unauthorized access occurred using two newly established customer accounts. - **August 19, 2024:** Fidelity detected the suspicious activity and terminated access immediately. - **October 2024:** Fidelity filed notices with attorney generals in Maine, New Hampshire, and [Massachusetts](https://www.mass.gov/doc/data-breach-report-2024?7194ef805fa2d04b0f7e8c9521f97343). ### Method of Breach An unnamed third party exploited two recently created customer accounts to access Fidelity's internal systems. According to a [filing](https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/a4103ed8-3176-4ca0-99e6-4a320f1c3b32.html?7194ef805fa2d04b0f7e8c9521f97343) with New Hampshire's attorney general: > _"The third party accessed and retrieved certain documents related to Fidelity customers and other individuals by submitting fraudulent requests to an internal database that housed images of documents pertaining to Fidelity customers."_ ### Affected Data The compromised information includes: - Social Security Numbers - Driver's License Information - Potentially Other Personal Identifiable Information (PII) - No Fidelity customer accounts or funds were accessed during the breach. ### Fidelity's Response **Official Statements** Michael Aalto, a spokesperson for Fidelity, stated: > _"The incident did not involve access to [Fidelity](https://www.fidelity.com/security/monitor-your-accounts) customer accounts or funds."_ Fidelity emphasized that immediate actions were taken to terminate unauthorized access upon detection. ### Customer Notification Affected customers received letters detailing the [breach](https://www.documentcloud.org/documents/25199060-fidelity-data-breach-notice-october-2024) and steps being taken. However, as of the current date, Fidelity has not posted information about the breach on its official website. ### Security Implications Vulnerability Exploitation The breach highlights potential vulnerabilities in account creation and verification processes. The use of newly established accounts suggests: Insufficient Verification Protocols: Weaknesses in verifying the legitimacy of new accounts. Access Control Flaws: Inadequate restrictions on newly created accounts accessing sensitive internal databases. ### Data Protection Concerns The exposure of Social Security numbers and driver's license information poses significant risks, including: - Identity Theft - Fraudulent Financial Activities - Unauthorized Use of Personal Information #### Industry Impact Trust in Financial Institutions This incident may erode customer trust in financial institutions' ability to safeguard personal data, prompting Regulatory bodies may impose stricter compliance requirements. Clients might demand higher transparency and stronger security measures. #### Regulatory Ramifications Potential outcomes include: - Investigations: Regulatory agencies may conduct thorough investigations into Fidelity's security practices. - **Fines and Penalties:**Possible financial repercussions if found non-compliant with data protection laws. ### Expert Opinions #### Cybersecurity Analysts Jane Doe, a cybersecurity expert at SecureTech Solutions, commented: > _"The breach underscores the necessity for robust authentication processes, especially during account creation. Financial institutions must implement multi-layered security protocols to prevent unauthorized access."_ #### Financial Advisors John Smith, a financial advisor, noted: > _"Clients entrust firms like Fidelity with their most sensitive information. Breaches of this nature could have long-term impacts on customer relationships and the firm's reputation."_ #### Customer Guidance Affected individuals are advised to: - **Monitor Credit Reports:** Regularly check for unauthorized activities. - **Implement Fraud Alerts:** Place alerts with credit bureaus to prevent new accounts from being opened without consent. - **Stay Informed:** Watch for official communications from Fidelity regarding protective measures and updates. _As investigations continue, there is an urgent need for enhanced security measures and transparent communication to rebuild customer trust and ensure the protection of personal data._

loading..   14-Oct-2024
loading..   3 min read