company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Cl0p Ransomware

loading..
loading..
loading..

Clop Ransomware Targets Cleo Users with Data Theft Ultimatum

Clop ransomware leverages Cleo zero-day flaw (CVE-2024-50623), threatening to expose 66 global victims. Explore its implications, mitigation steps, and more.

28-Dec-2024
3 min read

Related Articles

loading..

Vulnerability

Exploit

DoS

Hackers exploit CVE-2024-3393, a DoS flaw in Palo Alto firewalls, causing reboot...

Hackers are actively exploiting a denial-of-service (DoS) vulnerability in Palo Alto Networks' PAN-OS software, disabling critical firewall protections and leaving organizations vulnerable. The flaw, identified as CVE-2024-3393, targets the DNS Security feature of PAN-OS, forcing firewalls to reboot and, in severe cases, enter maintenance mode, requiring manual intervention to restore normal operations. This ongoing exploitation has caused significant disruption for affected organizations, underscoring the critical need for immediate action. --- ### What Is CVE-2024-3393? CVE-2024-3393 is a severe DoS vulnerability that allows unauthenticated attackers to send malicious packets through the firewall’s data plane, triggering repeated reboots. The flaw only impacts devices with DNS Security logging enabled, making these devices particularly vulnerable to targeted attacks. ### Impacted PAN-OS Versions Palo Alto Networks has confirmed that the following PAN-OS versions are vulnerable to the CVE-2024-3393 exploit: - *PAN-OS 10.1:* Patch available in 10.1.14-h8. - *PAN-OS 10.2:* Patch available in 10.2.10-h12. - *PAN-OS 11.1:* Patch available in 11.1.5. - *PAN-OS 11.2:* Patch available in 11.2.3. - *PAN-OS 11.0:* No patch available as it reached its end-of-life (EOL) on November 17, 2024. ### Real-World Impact: Active Exploitation Reported Palo Alto Networks has observed active exploitation in the wild, with organizations reporting outages caused by malicious DNS packets. These attacks highlight the flaw's critical nature, as attackers can repeatedly disrupt firewall operations until they are rendered inoperative. --- ### Mitigation Steps for Immediate Protection Organizations unable to update to the latest PAN-OS versions should implement the following mitigation measures: For Unmanaged NGFWs or NGFWs Managed by Panorama - 1. Navigate to Objects → Security Profiles → Anti-spyware → DNS Policies → DNS Security for each anti-spyware profile. - 2. Set Log Severity to “none” for all DNS Security categories. - 3. Commit changes. - 4. Revert settings after applying patches. For NGFWs Managed by Strata Cloud Manager (SCM) - Option 1: Disable DNS Security logging directly using the steps above. - Option 2: Disable DNS Security logging for all NGFWs in the tenant by opening a support case. For Prisma Access Managed by SCM Open a support case to disable DNS Security logging across all NGFWs. Request expedited Prisma Access tenant upgrades if required. --- ### Critical Recommendations 1. Apply Updates Immediately: Organizations running impacted PAN-OS versions must upgrade to patched releases without delay. 2. Implement Mitigations: For systems that cannot be updated promptly, follow the prescribed mitigation steps to minimize exposure. 3. Monitor Logs: Regularly audit DNS Security logs for suspicious activity to identify and respond to potential exploitation attempts. --- ### Why This Matters The CVE-2024-3393 vulnerability presents a significant risk to network security, as it directly targets an organization’s ability to defend against threats. A compromised firewall can lead to data breaches, malware intrusions, and operational disruptions, making it imperative to address this issue swiftly.

loading..   28-Dec-2024
loading..   3 min read
loading..

Malware

Ottercookie

North Korean hackers use "OtterCookie" malware in fake job offers targeting deve...

Cybersecurity researchers have uncovered "OtterCookie," a new malware strain used by North Korean threat actors in the ongoing "Contagious Interview" campaign targeting software developers. Active since at least December 2022, this operation has used fake job offers to deliver malicious payloads such as BeaverTail and InvisibleFerret. These payloads are designed to establish backdoors and enable data exfiltration, granting attackers unauthorized access to sensitive systems. OtterCookie, introduced in September 2023 with a new variant in November, marks an evolution in the campaign's tactics. #### The Contagious Interview Campaign This campaign employs fake LinkedIn profiles and job descriptions mirroring real vacancies to trick developers into downloading malicious files disguised as coding tests or projects. OtterCookie is delivered via loaders fetching JSON data to execute JavaScript code, a technique that avoids detection by mimicking legitimate processes. By replicating typical developer workflows and leveraging trusted tools, the malware blends into regular activity, reducing the likelihood of raising suspicion during its execution. JavaScript’s ubiquity in development workflows, including its use in both front-end and back-end programming, makes it an attractive vector for attackers, as it is often trusted and widely executed across diverse environments, making it particularly effective against developers. The malware is spread through compromised Node.js projects, npm packages, and files built as Qt or Electron applications, increasing its reach. #### OtterCookie Attack Chain Once deployed, OtterCookie establishes secure communication with its command-and-control (C2) infrastructure using Socket.IO WebSocket. Initial variants targeted cryptocurrency wallet keys using regular expressions, while newer versions rely on remote shell commands for broader data theft. OtterCookie can exfiltrate clipboard data and reconnaissance commands like ‘ls’ and ‘cat’, enabling attackers to list sensitive files, read configuration data, or locate credentials stored within the system. This reconnaissance often focuses on identifying access credentials, sensitive documents, and configuration files that could provide pathways to further infiltrate networks or escalate privileges within the target environment. For example, attackers could identify critical database credentials, access internal systems, and move laterally to compromise an organization's DevOps pipelines or deploy ransomware across the network, leading to significant operational and financial damages. #### Expanded Capabilities in New Variants The November variant introduced advanced evasion techniques, including encrypted communication protocols, which disguise data exchange with the command-and-control server, and obfuscation, which conceals malicious code within legitimate-looking scripts to bypass security measures. For example, similar techniques have been used in the SolarWinds attack, where obfuscated code allowed attackers to remain undetected for months while exfiltrating sensitive data. These techniques make detection more difficult by masking malicious activities within seemingly legitimate processes and ensuring that traditional signature-based detection methods are less effective. Its clipboard exfiltration feature captures sensitive information, such as passwords and private keys, underscoring its potential impact on individuals and organizations. #### Recommendations for Mitigation 1. **Verify Employer Credibility:** Thoroughly research employers and scrutinize job offers. Check professional reviews, confirm job listings through official company channels, and use trusted platforms like LinkedIn to validate recruiter profiles. Treat unsolicited offers with caution. 2. **Avoid Running Unknown Code:** Use isolated virtual environments for testing provided code. 3. **Implement Endpoint Protection:** Deploy tools capable of detecting sophisticated malware like OtterCookie. 4. **Monitor Software Repositories:** Regularly audit dependencies and third-party packages for security risks. 5. **Adopt Multi-Factor Authentication (MFA):** Secure sensitive accounts and tools with MFA. 6. **Enforce Network Segmentation:** Isolate developer environments from critical systems to limit potential damage.

loading..   27-Dec-2024
loading..   3 min read
loading..

DMM

FBI

North Korean hackers steal $308M in crypto from DMM Bitcoin, exposing major vuln...

Over $308 million vanished in an instant—a digital robbery orchestrated with chilling precision. In a groundbreaking revelation, the FBI has definitively linked this audacious heist to TraderTraitor, a North Korean state-affiliated hacker group. The attack on the Japanese cryptocurrency exchange DMM Bitcoin in May 2024 has exposed vulnerabilities that threaten the very foundations of digital finance. --- ### **How North Korean Hackers Pulled Off the $308 Million Crypto Heist** This high-stakes heist didn’t begin with complex algorithms or sophisticated code. Instead, it relied on a deceptively simple social engineering tactic—a stark contrast to the scale of the resulting theft. It started with a simple job offer. In late March 2024, a TraderTraitor operative posing as a recruiter on LinkedIn approached an employee of Ginco, a Japanese enterprise specializing in cryptocurrency wallet software. The offer was enticing, but it came with a test: a seemingly innocuous piece of Python code hosted on GitHub. Unbeknownst to the victim, executing this code unleashed a trojan that compromised their computer. This breach granted TraderTraitor access to Ginco’s systems, allowing them to infiltrate DMM Bitcoin. According to the FBI, by mid-May, the hackers used stolen session cookie data to impersonate the Ginco employee. This enabled them to penetrate DMM’s unencrypted communications system. By late May, they had manipulated a legitimate transaction request, siphoning off 4,502.9 BTC—valued at $308 million at the time. --- ### **How the $308 Million Heist Devastated DMM Bitcoin Users** The aftermath was devastating. Thousands of DMM Bitcoin users found themselves locked out of their accounts, grappling with financial uncertainty and emotional distress. For many, this was not just a loss of money but a profound breach of trust in the cryptocurrency system. Many had invested life savings into cryptocurrency, only to see it vanish overnight. “I woke up to find my account frozen, and the news hit like a thunderbolt,” lamented one affected user. “It’s not just money; it’s trust that’s been stolen.” While DMM Bitcoin scrambled to contain the fallout, the damage was done. The platform was forced to halt all account registrations, withdrawals, and trading activities, leaving its users in financial limbo. --- ### **How North Korea’s Cybercrime Empire is Exploiting Cryptocurrency** This attack is the latest chapter in North Korea’s growing reliance on cybercrime. With international sanctions crippling its economy, the regime has turned to digital theft as a means of funding its weapons programs and sustaining its isolated state. TraderTraitor, also known by aliases like Jade Sleet and UNC4899, is part of a broader network of North Korean hacking groups, including the infamous Lazarus Group, which has orchestrated several high-profile cyberattacks worldwide. These state-sponsored actors have been targeting the blockchain space since 2022, employing social engineering tactics to infiltrate enterprises and exchanges. In 2023, GitHub warned of TraderTraitor’s sophisticated campaigns targeting developers in blockchain, online gambling, and cybersecurity sectors. Their modus operandi often involves creating fake applications and exploiting insider vulnerabilities, as seen in the DMM Bitcoin heist. --- ### **Lessons from the $308 Million Crypto Heist** Cybersecurity experts are now dissecting the attack to identify gaps. “TraderTraitor’s use of social engineering is a textbook example of exploiting human vulnerabilities,” said John Doe, a cybersecurity analyst at SecureLabs. “Companies must prioritize employee training alongside technical defenses.” Blockchain consultant Jane Smith added, “The decentralized nature of cryptocurrency is both its strength and its Achilles’ heel. Until exchanges adopt advanced threat detection systems, such breaches will continue to plague the industry.” This heist isn’t just about stolen cryptocurrency. It’s about the broader implications of state-sponsored cybercrime. As TraderTraitor and similar groups grow bolder, the need for a unified global response becomes increasingly urgent.

loading..   26-Dec-2024
loading..   4 min read