company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Malversting

Tech Support Scam

loading..
loading..
loading..

Sophisticated Amazon Google Ad Redirects to Microsoft Support Scam

Discover how a disguised Amazon Google ad redirects users to a cunning Microsoft support scam. Learn about the evolving threat landscape.

21-Aug-2023
4 min read

Related Articles

loading..

JIRA

Schneider Electric faces a 40GB data breach, exposing isolated system vulnerabil...

[Schneider Electric](https://www.secureblink.com/cyber-security-news/1-5-tb-allegedly-stolen-from-schneider-electric-by-cactus-ransomware) recently confirmed a security breach involving its internal developer platform, resulting in the compromise of over 40GB of sensitive data from there JIRA server. The breach was claimed by a threat actor known as 'Grep,' who publicly [mocked](https://x.com/grepcn/status/1853089027777261941) Schneider on X (formerly Twitter). The stolen dataset reportedly includes over 400,000 rows of information, comprising 75,000 unique email addresses, employee names, project data, and critical infrastructure details. The attack vector leveraged exposed credentials that allowed Grep unauthorized access to Schneider Electric’s isolated JIRA server. Once access was obtained, the attackers used the MiniOrange REST API—a third-party MFA management tool—to scrape user information. The reliance on this open-source MFA tool played a significant role in the vulnerability, as Grep exploited insufficient API protections. This incident exposes an inherent weakness in isolated environments that are often perceived as secure by virtue of reduced network accessibility, without adequately accounting for poor credential hygiene and inadequate API security configurations. ### Exploit Analysis & Threat Actor Profile Grep’s actions are affiliated with a newly-formed hacking group named the International Contract Agency (ICA). Named after the fictional organization from the game *Hitman: Codename 47*, ICA distinguishes itself by its non-traditional extortion model. Instead of directly demanding ransom from targeted entities, ICA threatens to leak the data if the affected company fails to acknowledge the breach within a 48-hour window. In Schneider's case, Grep humorously demanded $125,000 in "Baguettes"—a sarcastic nod to Schneider's French origins—claiming it was not a serious financial demand but a mechanism to ensure public awareness of the incident. The data compromised includes project issues, plugins, and a significant volume of employee and customer personal details. The target environment was an "isolated" server, which Schneider believed would be inherently more secure. However, this perceived isolation led to complacency, resulting in weak credential management practices. Grep's successful scraping of the 40GB dataset from what was thought to be an isolated server reveals that the weakest link, often involving human error, remains a critical entry point for attackers, regardless of the perceived security of system boundaries. ### Detailed Technical Response & Analysis Following the breach, Schneider Electric mobilized its Global Incident Response team, emphasizing that its products and services were not directly impacted. Nonetheless, this statement fails to address deeper concerns about Schneider’s systemic cybersecurity protocols. This breach is part of an ongoing trend, as earlier in the year, Schneider’s Sustainability Business division fell victim to a [Cactus ransomware attack](https://www.secureblink.com/cyber-security-news/1-5-tb-allegedly-stolen-from-schneider-electric-by-cactus-ransomware), during which attackers purportedly extracted terabytes of proprietary data. The implications of these recurring incidents are manifold. As a company that forms the backbone of energy management and industrial automation solutions globally, any compromise involving Schneider Electric's systems potentially threatens critical infrastructure. Such infrastructure, once breached, can cascade into operational disruptions, creating far-reaching national and global consequences. The attack trajectory underscores the necessity for layered security mechanisms that do not solely rely on network isolation but also integrate robust credential policies, thorough monitoring, and encryption. Moreover, ICA's strategic decision to disclose breaches only when unacknowledged forces a reevaluation of traditional cybersecurity incident management protocols. By compelling companies to respond publicly, ICA manipulates the timeline and transparency of data breaches. Schneider’s compliance with the 48-hour acknowledgment prevented immediate data exposure, but the incident underlines the need for adopting proactive measures instead of reactive containment. ### Evolving Cyber Threats and the Importance of Robust Technical Controls This breach is a critical lesson in the importance of assuming an eventual breach mindset, even in seemingly secure environments. Credential management must be prioritized through strategies such as enforcing least privilege principles, implementing password rotation policies, and deploying strong MFA implementations that are less susceptible to automated scraping. Reliance on third-party and open-source solutions such as the MiniOrange REST API introduces additional attack surfaces, requiring organizations to conduct comprehensive code audits, penetration testing, and detailed security assessments. The attack also highlights the importance of API security, emphasizing the need for rate limiting, proper authentication, and auditing all access points, especially for systems interfacing with critical internal infrastructure. Furthermore, this incident showcases the critical necessity for corporations involved in essential services to transition from passive cybersecurity measures to an actively engaged, proactive cybersecurity model. Threat actors like Grep are evolving, leveraging data not just for immediate financial gain but as a means to publicly pressure organizations into acknowledging weaknesses. The stakes are increasingly high, and sophisticated defense mechanisms must involve advanced threat intelligence, real-time threat hunting, and granular access control mechanisms. Organizations must also consider the human factor, which remains a significant vulnerability. Extensive employee training on cybersecurity best practices—including managing personal credentials, identifying phishing attempts, and understanding data sensitivity—must form the foundation of any corporate security strategy. The absence of such training often results in inadvertent gaps that adversaries like ICA can exploit.

loading..   05-Nov-2024
loading..   5 min read
loading..

Encryptor

Interlock

Interlock ransomware disrupts organizations worldwide, encrypting data on FreeBS...

The **Interlock ransomware** has emerged as a new and dangerous player on the global cyber threat landscape, targeting **FreeBSD servers**—an uncommon but highly valuable target. This tactic signifies a shift among ransomware operators who are broadening their range from typical Windows systems to less traditionally attacked environments, exploiting vulnerabilities in systems critical to enterprise infrastructure. This deep-dive explores **Interlock’s strategy**, the technical nuances that make it a distinctive threat, and how organizations can protect against this sophisticated ransomware. #### What is Interlock Ransomware? The **Interlock ransomware** made its appearance in **September 2024**, quickly gaining notoriety for its targeted focus on **FreeBSD systems**, a Unix-like operating system widely used in critical infrastructure due to its stability and performance. Unlike most ransomware that primarily focuses on **Windows** and **Linux** platforms, Interlock has taken the **unusual approach of developing a custom encryptor for FreeBSD**. This targeting strategy allows attackers to disrupt key operations, leveraging the fact that FreeBSD is often used for hosting crucial services and managing enterprise workloads. #### A Targeted Approach to Attack FreeBSD Servers The FreeBSD-targeting encryptor is notable because ransomware designed specifically for this platform is rare. Historically, ransomware groups have focused their efforts on **Windows systems** due to their sheer number and extensive use. However, as **Hive ransomware** and others have shifted towards attacking **Linux** and **FreeBSD** environments, so too has Interlock, marking a new chapter in the evolution of cyber threats. **Why FreeBSD?** The answer lies in the widespread use of FreeBSD servers in environments that require high reliability and uptime, such as network infrastructure and hosting services. By successfully compromising these systems, Interlock’s operators aim to maximize the impact of their attacks, resulting in significant operational disruptions for the victim. #### Technical Deep Dive: Understanding the Interlock Encryptor The **Interlock ransomware encryptor** was initially detected by researchers who noted that it is an **ELF binary** specifically compiled for FreeBSD 10.4. The ELF (Executable and Linkable Format) is typically used for Unix-like operating systems, and its compilation for FreeBSD shows the deliberate targeting of this niche but important platform. Upon analysis, the **Interlock encryptor** presented itself as a **64-bit statically linked ELF binary**, which means that the malware includes all necessary libraries to run independently of the host system's library versions. This tactic ensures that the ransomware works across different versions of FreeBSD, expanding its range of potential victims. The **statically linked** nature of the encryptor also means that the payload is harder to interfere with or block without full access to the system. When executed, the **ransomware appends the extension .interlock** to encrypted files and drops a ransom note named "!__README__!.txt" in each affected directory. This file provides the victim with instructions to access an **anonymous Tor-based negotiation site**, where they are coerced into paying a hefty ransom to regain access to their data. #### Double-Extortion: Theft and Encryption Interlock employs a **double-extortion model**—not only does it encrypt files, but it also exfiltrates data before initiating encryption. The stolen data serves as additional leverage, threatening to publicly release it if the ransom is not paid. This tactic not only creates financial pressure on organizations but also raises the stakes by threatening their **reputation** and regulatory consequences. #### Real-World Impact: Wayne County Example The **Wayne County government** in Michigan became one of the early victims of the Interlock ransomware attack. The attack took place on October 3, 2024, and led to disruptions across county services, including preventing **online tax payments**, **inmate bonding** at the Sheriff's Office, and **recording real estate transactions** at the Register of Deeds Office. This highlights the **critical impact** that targeting FreeBSD infrastructure can have, especially when it powers essential public services. The attack involved multiple system shutdowns, revealing the broad reach of a targeted ransomware attack on essential services and critical infrastructure. #### Lateral Movement and Encrypted Negotiations During the attack process, Interlock spreads laterally throughout the compromised network, infecting multiple systems before deploying the ransomware. Once encryption is completed, victims are instructed to use an **anonymous chat room on the dark web**. To access this chat room, victims must enter an **organization-specific ID**, ensuring that the ransomware operators can uniquely identify each victim and negotiate individually, often based on the victim’s ability to pay. #### How to Defend Against Interlock Ransomware? Given the sophisticated nature of Interlock ransomware, it is imperative for organizations, particularly those using FreeBSD, to take proactive measures: 1. **Patch Management**: Always ensure that systems are running the latest updates. FreeBSD systems should be patched to mitigate known vulnerabilities. 2. **Multi-Factor Authentication (MFA)**: Implement **MFA** for remote access services like SSH to reduce the risk of unauthorized access. 3. **Data Backup**: Regularly backup data and store backups offline to prevent ransomware from encrypting both live data and backup copies. 4. **Endpoint Detection and Response (EDR)**: Deploy **EDR solutions** to monitor and detect any anomalous activity within the network. This includes unauthorized lateral movement or attempts to encrypt files. The **Interlock ransomware** is a stark reminder of the rapidly evolving nature of **cyber threats**. By targeting **FreeBSD**, a platform not usually associated with mainstream ransomware attacks, Interlock has demonstrated the ability of ransomware operators to diversify their attacks to increase impact and pressure. Organizations using FreeBSD must reinforce their **cyber defenses**, patch vulnerabilities, and prepare for the eventuality of an attack to mitigate the damage. The evolution of **cross-platform ransomware**, as seen in the cases of both **Interlock** and **Hive**, means that organizations can no longer rely solely on traditional antivirus or security practices designed primarily for **Windows** environments. Instead, a **holistic approach** to security, involving advanced monitoring, robust backup strategies, and stringent access controls, is necessary to safeguard against these increasingly sophisticated threats.

loading..   03-Nov-2024
loading..   5 min read
loading..

Zero-Click

NAS

Zero Day

Explore how Synology's rapid response to zero-day vulnerabilities sets a new cyb...

The recent zero-day vulnerabilities discovered at Pwn2Own Ireland 2024 highlight Synology’s swift handling of cybersecurity threats, offering a valuable case study in rapid response and the evolution of corporate responsibility in an era of increasingly sophisticated cyber threats. #### From Vulnerability to Accountability It’s easy to see the Synology zero-day incident as just another security patch story. However, what’s more thought-provoking is how it reveals a broader narrative about the need for a shift in how vendors perceive their role in safeguarding users. Midnight Blue's discovery of the RISK:STATION vulnerability (CVE-2024-10443) speaks volumes about the potential of collaborative efforts between security researchers and vendors. Synology’s accelerated response—delivering patches for BeeStation and DiskStation within a remarkable 48 hours—demonstrates a newfound urgency that goes beyond compliance. It embodies the fact that companies must now see themselves as active custodians of user safety. The stakes here are stark. A critical zero-click vulnerability, such as RISK:STATION, is akin to a digital wildfire waiting to happen—especially when millions of network-attached storage (NAS) devices, used both at home and across enterprises, are exposed to the internet. Midnight Blue’s prompt communication and Synology’s swift release of patches turned what could have been a devastating incident into a teachable moment for all companies grappling with vulnerabilities: timing and transparency can be the difference between chaos and control. #### Beyond Patches: The Human Element in Cybersecurity The technical details of Synology's patched vulnerabilities, while crucial, mask a deeper layer of significance—the human factor. Vulnerabilities, particularly those in ubiquitous devices like NAS systems, hold very tangible implications for everyday users. The reality that these vulnerabilities were found not just in common homes, but within the infrastructure of police departments, critical infrastructure contractors, and more, underscores the very real human cost of security gaps. Midnight Blue's subsequent media reach-out to emphasize mitigative actions reflects an essential, yet often overlooked, dimension of cybersecurity: informing and empowering the users themselves. The narrative here is not just about how swiftly a vendor can release a patch, but also about how well users can be educated to take immediate action. For many, these patches aren't applied automatically, necessitating awareness, engagement, and proactive defense on the part of device owners. By framing the dissemination of patch information as a top priority, Synology and Midnight Blue have taken a step toward bridging the gap between tech companies and their customers in cybersecurity literacy. #### Toward a Secure Digital Future The hurried patch releases by Synology and QNAP in the wake of Pwn2Own’s discoveries set a new standard in timeliness, but they also illustrate the changing relationship between security research and product safety. Vendors, previously accustomed to the luxury of taking up to 90 days to address reported vulnerabilities, must now operate in an accelerated environment where rapid exploitation is a clear and present danger. The story of RISK:STATION is a stark reminder that no connected device is immune, and every link in the chain of connectivity needs vigilance. The Internet of Things, of which NAS devices are a part, is only as strong as its weakest point, and often that point is the delay between vulnerability disclosure and patch application. Synology's response demonstrates how shrinking this gap must be at the forefront of vendor priorities. The challenge lies not just in the release of patches, but also in how swiftly and effectively they reach every vulnerable system. As NAS devices increasingly serve as repositories for sensitive information—not just for enterprises but for individuals who trust them with their family photos and personal data—stories like this should serve as a clarion call to both users and vendors. For vendors, it’s about recognizing the gravity of their role in user protection. For users, it’s a reminder to be vigilant, apply patches promptly, and reconsider how they expose their devices online. The Synology incident is, in many ways, a microcosm of what’s to come as our digital ecosystems expand. It’s a reminder that cybersecurity is as much about the processes of discovery and patching as it is about communication, education, and the fundamental responsibility of every player in the digital space to take security as seriously as possible. In a hyper-connected age, vigilance is no longer optional—it’s imperative.

loading..   02-Nov-2024
loading..   4 min read