Cyber Threat Intelligence Digest: Week 40

9th October 2024 - Threat Reports
Share
  • Vulnerabilities
  • Potential Threats
  • General News
  • Threat Actor Weekly Graph
  • Global Trends Powered by Recorded Future
  • Prominent Information Security Events
  • Remediation Actions

Executive Summary -
Highlights of Cyber Threat Intelligence Digest

Vulnerabilities

CISA Adds Ivanti EPM RCE Vulnerability, CVE-2024-29824, to Known Exploited Vulnerabilities Catalogue - The US Cybersecurity and Infrastructure Security Agency (CISA) added a critical-severity vulnerability affecting Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalogue on October 2, 2024. The vulnerability tracked as CVE-2024-29824, was initially patched by Ivanti on May 21, 2024. 

CVE-2024-47555 - Allows Remote Code Execution affecting Xerox FreeFlow Core - Xerox engineering and development discovered a vulnerability, tracked as CVE-2024-47555, in the Xerox FreeFlow Core application. It allows attackers to perform remote code execution via user and system configuration. The vulnerability affects Xerox FreeFlow Core 7.0. Updating the affected product to Xerox FreeFlow Core 7.0.11 is highly recommended to address the issue. 

CVE-2024-28995- Threat Actors Exploit SolarWinds, Targeting Sensitive Windows Files - On September 30, 2024, GreyNoise Labs reported that threat actors are exploiting CVE-2024-28995, a pathtraversal vulnerability in SolarWinds Serv-U. This flaw, disclosed on June 5, allows unauthorised access to sensitive files via manipulated URL requests, such as c:\windows\panther\unattend.xml.  

Potential Threats

Phishing Campaign Targeting the US and UK Impersonates Royal Mail - Threat actors targeted organisations in the US and UK using phishing emails to impersonate the Royal Mail to deliver ransomware. According to a report by Proofpoint on October 2, 2024, the threat actors used the open-sourced Prince Ransomware available on GitHub, which was dedicated for educational purposes and has no known decryption feature or recovery mechanism. 

Rackspace Suffers Data Breach - The breach, discovered on September 24, 2024, allowed the threat actor to gain unauthorised access to three of Rackspace's internal monitoring web servers and obtain customers’ account names, usernames, device information, IP addresses, and encrypted internal credentials. According to a report on September 30, 2024, by The Register, an unidentified threat actor exploited an unspecified zero-day remote code execution (RCE) vulnerability in ScienceLogic SL1 platform. 

Perfctl Malware Targets Linux in Cryptomining Campaign - Perfctl malware has been targeting Linux servers and workstations for at least three years, leveraging rootkits and high-level evasion techniques to remain undetected. According to a report by Aqua Nautilus’ October 3, 2024, Perfctl likely compromised thousands of Linux servers by exploiting misconfigurations and vulnerabilities, such as CVE2023-33246 (Apache RocketMQ) and CVE-2021-4034 (Polkit). 

General News

Cloudflare Mitigates Record-Breaking 3.8Tbps DDoS Attack - On October 2, 2024, American internet infrastructure company Cloudflare reported that it had mitigated a record-breaking distributed denial-of-service (DDoS) attack, which peaked at 3.8 terabits per second (Tbps) with 2 billion packets per second (Pps). The campaign, which began in early September, targeted organisations in the financial services, internet, and telecommunications sectors. 

Sellafield, UK’s largest nuclear site, fined £330,000 for cybersecurity failings - The company managing the Sellafield nuclear site in the United Kingdom has been fined £332,500 ($435,400) in a landmark prosecution after pleading guilty to three criminal charges over cybersecurity failings. 

Experts warn of DDoS attacks using linux printing vulnerability - Researchers at technology firm Akamai said on Tuesday that distributed denial-of-service (DDoS) attacks could be launched using four vulnerabilities affecting Common UNIX Printing System, also known as CUPS. The vulnerabilities, which allow attackers to run malicious code on a remote device, were discovered by Italian security researcher Simone Margaritelli and disclosed last week. 

Threat Actor Weekly Graph

Over the past 7 days, we have been tracking the following intent and opportunity changes within our Threat Actor Landscape.

Intent represents the potential targets of a group. When a group is observed attacking a different organisation or entity, their intent will increase.

Opportunity represents the various methods and technologies these groups may use. For example, if a group started using a new attack vector, such as a new kind of ransomware, their opportunity would increase.

Both intent and opportunity are scored out of 100 and are responsible for scoring the group’s severity. These updates can be seen below.

 

Limited Severity Basic Severity Moderate Severity High Severity

 

Threat Actor Severity Change Opportunity Change Intent Change
Lazarus Group High High (80) ↓ 1 (40) → 0
RedHotel New Moderate (53) ↑ 53 (5) ↑ 5
RedAlpha New Moderate (51) ↑ 51 (5) ↑ 5
Andariel Moderate Moderate (53) ↑ 1 (25) → 0
Stormous Ransomware Group New Basic (40) ↑ 40 (30) ↑ 30

Global Trends Powered by Recorded Future

Within each category, we have provided the current top five globally trending items. Each item is linked to how actively trending it is and is marked with a small symbol. 

The spikes in references are calculated over 60 days and are normalised to ensure they aren’t disproportionate when compared to bigger entities that will naturally have more baseline mentions.

- Spike – This indicates a large increase in reporting volume and a high diversity in the event descriptions,
- Rise – This indicates a small increase in reporting volume with little diversity in the descriptions.

Attackers Methods Vulnerabilities Targets
Salt Typhoon Denial-ofService CVE-202432102 Internet Hosting
Handala Trinity Ransomware CVE-202444193 Telecommunications
Stormous Ransomware Group Cyberattack CVE-202443047 Publishing
Majeed Brigade Domain Hijacking CVE-2024- 42415 Verizon
CyberVolk Group Remote Code Execution CVE-202445519 Television

 

 

Prominent Information Security Events

Phishing Campaign Targeting Organisations in the US and UK Impersonates the Royal Mail to Deliver Prince Ransomware

Source: Insikt Group, Proofpoint | Validated Intelligence Event 
Intelligence Cards: Intelligence & Reports 
IOC: Email: tedra_yrigollen@proton[.]me 
IOC: Email: indiracasciato@proton[.]me 
IOC: Email: chitra_mcintire@proton[.]me 
IOC: SHA256: e2a187babf980f024b94fa2cb4a93948d70c1e15bed1eccf975ab6c562754149 
IOC: SHA256: 226b653e57484de58148b455b714dcb551a52eda5a3a6d8210095aab96d782df IOC: SHA256: ad1983a13a06919c9b8da04727ea3c210e9d19e0598c0811e4b8355b5a98589e 

 
Threat actors targeted organisations in the US and UK using phishing emails impersonating the Royal Mail to deliver ransomware. According to a report by Proofpoint on October 2, 2024, the threat actors used the opensourced Prince Ransomware available on GitHub, which was dedicated for educational purposes and has no known decryption feature or recovery mechanism. 
 
The infection chain began with threat actors sending messages from ProtonMail addresses, impersonating Royal Mail, via email and public contact forms. The emails contained a PDF attachment that linked to a Dropbox-hosted ZIP file. This ZIP file included a second password-protected ZIP and a text file with the password.  
 
Inside the second ZIP was a malicious shortcut (LNK) file. When executed, the shortcut ran obfuscated JavaScript, which wrote multiple PowerShell scripts to the %temp% directory. These scripts bypassed Windows security features, created a scheduled task to run every twenty minutes, and ultimately decrypted and loaded a .NET assembly. This assembly was identified as the Prince ransomware, which encrypted files, changed their extensions, and displayed a ransom note. 

Perfctl Malware Targets Linux in Cryptomining Campaign

Source: Insikt Group, Aqua Nautilus | Validated Intelligence Event 
Intelligence Cards: Intelligence & Reports 
IOC: IP: 211[.]234[.]111[.]116 
IOC: IP: 46[.]101[.]139[.]173 
IOC: IP: 104[.]183[.]100[.]189 
IOC: IP: 198[.]211[.]126[.]180 
IOC: MD5: 656e22c65bf7c04d87b5afbe52b8d800 
IOC: MD5: 6e7230dbe35df5b46dcd08975a0cc87f 

  
Perfctl malware has been targeting Linux servers and workstations for at least three years, leveraging rootkits and high-level evasion techniques to remain undetected. According to a report by Aqua Nautilus’ October 3, 2024, Perfctl likely compromised thousands of Linux servers by exploiting misconfigurations and vulnerabilities, such as CVE-2023-33246 (Apache RocketMQ) and CVE-2021-4034 (Polkit). 
 
Once active, perfctl establishes communication over TOR with command-and-control servers, making traffic analysis difficult. It deploys rootkits (e.g., "libgcwrap.so") to intercept network traffic, modify authentication mechanisms, and replace legitimate system utilities, such as ldd, top, and lsof, to avoid detection. The primary objective of the malware is to conduct cryptomining for Monero, although Aqua Nautilus warns that it can support more damaging operations.  

Remediation Actions

Following the information provided above, we recommend that the technologies mentioned be fully patched and updated. We also want to highlight and recommend applying the following patches where applicable:  

  • CVE-2024-29824 – Upgrade Ivanti EPM Core server to the latest version. 
  • CVE-2024-47555 – Upgrade to Xerox FreeFlow Core 7.0.11. 
  • CVE-2024-28995 – Install the provided Hotfix; this requires Serv-U 15.4.2. 

If you are currently an Acumen Cyber Vulnerability Management customer, we will be proactively performing related searching and hunting activities within your environment.