company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Vulnerability

Network

Endpoint

loading..
loading..
loading..

Palo Alto Networks Firewall vulnerability exploited in the wild, CISA

Attackers can launch DDoS attacks on their desired targets without authenticating to the firewall using the flaw identified as CVE-2022-0028…

26-Aug-2022
5 min read

No content available.

Related Articles

loading..

Double Extortion

Data Theft

Tata Technologies hit by Hunters International ransomware attack: 1.4TB (730K fi...

**Pune, India** – Tata Technologies, a global leader in engineering and digital solutions for manufacturing industries, has been thrust into the spotlight following a ransomware attack claimed by the notorious cybercriminal group Hunters International. The breach, first detected in January 2024, allegedly resulted in the theft of **1.4 terabytes of sensitive data** (approximately 730,000 files), raising concerns about industrial espionage, client confidentiality, and operational resilience in critical sectors like automotive and aerospace. --- ### **Attack Timeline and Tata’s Response** - **January 2024**: Tata Technologies disclosed a “security breach" disrupting parts of its IT infrastructure. The company assured stakeholders that client services remained unaffected and operational impacts were "minimal." - **February 2024**: Tata began restoring systems but provided no further updates, leaving clients and employees in the dark about the breach’s scope. - **March 2024**: Hunters International listed Tata Technologies on its dark web extortion portal, threatening to leak the stolen data unless a ransom is paid within one week. Despite repeated inquiries from media outlets like *BleepingComputer*, Tata has yet to confirm or deny Hunters’ claims. The lack of transparency has sparked criticism from cybersecurity experts, who argue that delayed disclosures exacerbate stakeholder risks. --- ### **Hunters International: A Profile in Cyber Menace** Hunters International emerged in late 2023, suspected to be a rebrand of the dismantled **Hive ransomware group**, which extorted over $100 million from 1,500+ victims globally before being targeted by the FBI in 2022. Key facts about the group: - **High-Profile Targets**: Includes U.S. Navy contractor Austal USA, Japanese optics giant Hoya, and Fred Hutchinson Cancer Center, where patients’ data was weaponized. - **Tactics**: Deploys double-extortion strategies—encrypting systems while threatening to leak stolen data. Unlike peers, Hunters avoids publishing data samples, complicating validation of their claims. - **Controversies**: In August 2023, the U.S. Marshals Service publicly denied Hunters’ breach allegations, highlighting the group’s mixed credibility. --- ### **What’s at Stake for Tata Technologies?** Tata Technologies, a subsidiary of the $128 billion Tata Group conglomerate, serves Fortune 500 clients in automotive (40% of revenue), aerospace, and industrial heavy machinery. The breach poses multifaceted risks: 1. **Intellectual Property (IP) Theft**: Leaked blueprints, proprietary designs, or R&D data could undermine Tata’s competitive edge in sectors like electric vehicles (EVs) and automation. 2. **Client Trust**: Major clients, including Airbus and Jaguar Land Rover, may demand assurances about data security. A 2023 IBM report found that **60% of breach victims raised prices** to offset recovery costs, risking client attrition. 3. **Regulatory Fallout**: If personal data (e.g., employee/customer details) was compromised, Tata could face penalties under GDPR, India’s DPDP Act, or California’s CCPA, where fines reach **$7,500 per intentional violation**. --- ### **Industry-Wide Implications** The attack reflects broader trends in cybercrime targeting critical infrastructure: - **Ransomware Surge**: Cybersecurity Ventures predicts global ransomware costs will hit **$265 billion annually by 2031**, with attacks every 2 seconds. - **Manufacturing Sector Vulnerability**: A 2024 Sophos report found that **73% of manufacturing firms suffered ransomware attacks** in 2023, the highest of any industry. - **Ethical Dilemmas**: Hunters’ history of exploiting cancer patients underscores the absence of moral boundaries in cyber extortion, complicating negotiations. --- ### **Expert Analysis** **Avinash Prasad, VP of Cybersecurity at CloudSEK**: “Hunters International’s modus operandi suggests they prioritize high-value targets with deep-pocketed clients. The lack of leaked samples could indicate ongoing negotiations or a bluff. Either way, Tata’s silence is a liability.” **Katie Nickels, Former Director of Intelligence at Red Canary**: “Rebranded groups like Hunters inherit the infrastructure and expertise of predecessors like Hive. Organizations must adopt zero-trust frameworks and real-time threat hunting to counter these evolving threats.” While Tata Technologies asserts that its restoration efforts are “progressing,” stakeholders await clarity on the nature of the stolen data (IP, financial records, or client contracts) and whether a ** ransom payment ** will be made. Tata Group historically avoids negotiations, but exceptions exist. - Long-term reputational damage** in a sector where trust is paramount.

loading..   05-Mar-2025
loading..   4 min read
loading..

CISA

CISCO

RCE

CISA warns U.S. federal agencies to secure systems against actively exploited vu...

The Cybersecurity and Infrastructure Security Agency (CISA) has warned U.S. federal agencies regarding vulnerabilities in Cisco and Windows systems that are being actively exploited in the wild. The vulnerabilities, tracked as CVE-2023-20118 and CVE-2018-8639, pose significant risks to federal systems and require immediate attention. ### **Cisco VPN Router Flaw (CVE-2023-20118)** The first vulnerability, CVE-2023-20118, affects multiple Cisco Small Business VPN routers, including models RV016, RV042, RV042G, RV082, RV320, and RV325. This flaw allows attackers to execute arbitrary commands on the affected routers. While administrative credentials are required to exploit the flaw, attackers can bypass authentication using CVE-2023-20025, which grants root privileges. **Impact:** The vulnerability exposes organizations to the risk of unauthorized control over critical network infrastructure, potentially leading to further attacks within the internal network. **Mitigation:** Cisco has issued advisories recommending that affected organizations upgrade to the latest firmware versions. It is also advised to restrict access to router management interfaces and monitor device logs for unusual activity. ### **Windows Win32k Privilege Escalation Bug (CVE-2018-8639)** The second vulnerability, CVE-2018-8639, is a local privilege escalation (LPE) flaw in the Windows Win32k component. Local attackers can exploit this bug to execute arbitrary code in kernel mode, allowing them to gain full control over a target system. The flaw affects both client and server versions of Windows, including Windows 7 and later, and Windows Server 2008 and up. **Impact:** Successful exploitation can lead to significant data manipulation, creating rogue user accounts, and, ultimately, full system compromise. **Mitigation:** Microsoft has already released security updates addressing this issue, and organizations are urged to apply the patches immediately. Furthermore, users should follow least-privilege principles and regularly audit local accounts for suspicious activity. --- ### **CISA Adds Vulnerabilities to the Known Exploited Vulnerabilities Catalog** In response to the active exploitation of these vulnerabilities, CISA has added CVE-2023-20118 and CVE-2018-8639 to its **Known Exploited Vulnerabilities Catalog**. The catalog highlights vulnerabilities that have been actively exploited in attacks, necessitating urgent attention from organizations. Under the Binding Operational Directive (BOD) 22-01, U.S. Federal Civilian Executive Branch (FCEB) agencies have until 23 March to secure their networks against these vulnerabilities. This mandate applies not only to federal agencies but also serves as a reminder for all organizations to prioritize patching and securing vulnerable systems. --- ### **Other Actively Exploited Vulnerabilities** CISA’s warning follows previous advisories, including actively exploiting a **Microsoft Outlook remote code execution (RCE) vulnerability** (CVE-2024-21413), for which federal agencies were instructed to apply patches by **27 February 2025**. Though this particular RCE issue is not the subject of the current warning, its mention highlights the ongoing risks posed by unpatched software. ### **Expert Recommendations and Best Practices** 1. **Patch Systems Immediately**: Organizations should prioritize patching both Cisco routers and Windows systems affected by the listed vulnerabilities. 2. **Limit Administrative Access**: Where possible, restrict admin access to critical systems and network devices to reduce the risk of exploitation. 3. **Monitor for Indicators of Compromise**: Continuous monitoring of logs and network traffic can help detect early signs of exploitation. 4. **Adhere to CISA’s Guidelines**: Federal agencies must comply with BOD 22-01 by securing systems before the 23 March deadline, but all organizations should take similar action to safeguard their infrastructure. 5. **Stay Updated**: Regularly review vendor advisories and CISA’s **Known Exploited Vulnerabilities Catalog** to stay informed about emerging threats. As cyberattacks become more sophisticated and targeted, the risks posed by vulnerabilities like CVE-2023-20118 and CVE-2018-8639 are ever more significant. CISA’s warning underscores the importance of proactive cybersecurity measures, timely patching, and vigilance to defend against ongoing exploitation of critical vulnerabilities.

loading..   04-Mar-2025
loading..   4 min read
loading..

LLM

AWS

API

Learn how 12,000 valid API keys and passwords were discovered in the Common Craw...

A massive trove of nearly 12,000 valid API keys and passwords has been uncovered in the Common Crawl repository—an enormous open-source archive used extensively to train large language models (LLMs). This alarming discovery underscores a systemic risk that could be feeding vulnerabilities directly into AI projects at major tech companies. ### Common Crawl’s Global Footprint Common Crawl has, for over a decade, offered petabytes of freely accessible web data. Because it’s so vast, many AI developers—potentially including those behind models at OpenAI, DeepSeek, Google, Meta, Anthropic, and Stability—rely on these archives to build and refine powerful language models. ### Valid Secrets Hiding in Plain Sight Researchers at Truffle Security analyzed 2.67 billion web pages (about 400 terabytes of data) from the December 2024 Common Crawl archive. Their tool, TruffleHog, flagged a staggering **11,908 secrets** that proved **fully functional**—including AWS root keys, MailChimp API keys, Slack webhooks, and more. **Key Findings** - **AWS Root Keys:** Some were exposed directly in front-end code, granting unrestricted access to cloud resources. - **MailChimp Keys:** At least 1,500 were hardcoded in HTML or JavaScript, opening the door to phishing campaigns and brand impersonation. - **WalkScore API Key:** One key alone appeared **57,029 times** across **1,871 subdomains**, illustrating the scope of credential reuse. - **Slack Webhooks:** One single webpage revealed **17 unique** Slack webhook URLs, which attackers could exploit to post messages or infiltrate private channels. ### Why AI Training Data is at Risk Although LLM training typically involves **data-cleaning and filtering** to remove sensitive or redundant information, no process is perfect. The sheer volume of data means **leaked credentials** can slip through, effectively teaching AI systems to regurgitate or even reference them. This threatens the security of the compromised services and raises major concerns about the **ethical and legal implications** of using publicly scraped data for training. ### Consequences of Hardcoded Credentials By embedding keys into front-end files, developers inadvertently grant anyone scanning the web ready access to powerful backend systems. Attackers could exploit these credentials to: - **Spin up malicious cloud infrastructure** using stolen AWS resources - **Launch phishing campaigns** or spam messages via legitimate MailChimp accounts - **Infiltrate private Communication channels** by abusing Slack webhooks - **Exfiltrate sensitive data** from compromised servers ### Mitigation and Lessons Learned Truffle Security collaborated with impacted vendors to rotate or revoke thousands of compromised keys. Still, this incident highlights the urgent need for stronger developer practices, especially as AI continues to devour terabytes of public data. Critical steps include: 1. **Never hardcode secrets** in front-end files—use environment variables or secure vaults. 2. **Routinely scan codebases** with specialized tools (like TruffleHog) to detect exposed credentials. 3. **Implement robust rotation policies** so that any discovered key can be rapidly invalidated. 4. **Strengthen AI data preprocessing** to better identify and strip out sensitive information before training.

loading..   03-Mar-2025
loading..   3 min read