CISA Warns of Active Attacks Exploiting Fortra MFT, TerraMaster NAS, and Intel Driver Flaws

0
310
CISA Warns of Active Attacks Exploiting Fortra MFT, TerraMaster NAS, and Intel Driver Flaws


Feb 11, 2023Ravie LakshmananThreat Response / Vulnerability

CISA Warns of Active Attacks Exploiting Fortra MFT, TerraMaster NAS, and Intel Driver Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing proof of energetic abuse within the wild.

Included among the many three is CVE-2022-24990, a bug affecting TerraMaster network-attached storage (TNAS) gadgets that might result in unauthenticated distant code execution with the best privileges.

Details in regards to the flaw have been disclosed by Ethiopian cyber safety analysis agency Octagon Networks in March 2022.

The vulnerability, in response to a joint advisory launched by U.S. and South Korean authorities authorities, is claimed to have been weaponized by North Korean nation-state hackers to strike healthcare and demanding infrastructure entities with ransomware.

The second shortcoming to be added to KEV catalog is CVE-2015-2291, an unspecified flaw within the Intel ethernet diagnostics driver for Windows (IQVW32.sys and IQVW64.sys) that might throw an affected system right into a denial-of-service state.

The exploitation of CVE-2015-2291 within the wild was revealed by CrowdStrike final month, detailing a Scattered Spider (aka Roasted 0ktapus or UNC3944) assault that entailed an try and plant a legitimately signed however malicious model of the susceptible driver utilizing a tactic known as Bring Your Own Vulnerable Driver (BYOVD).

The aim, the cybersecurity agency stated, was to bypass endpoint safety software program put in on the compromised host. The assault was in the end unsuccessful.

The growth underscores the rising adoption of the method by a number of risk actors, particularly BlackByte, Earth Longzhi, Lazarus Group, and OldGremlin, to energy their intrusions with elevated privileges.

Lastly, CISA has additionally added a distant code injection found in Fortra’s GoAnywhere MFT managed file switch software (CVE-2023-0669) to the KEV catalog. While patches for the flaw have been launched not too long ago, the exploitation has been linked to a cybercrime group affiliated with a ransomware operation.

Huntress, in an evaluation revealed earlier this week, stated it noticed the an infection chain resulting in the deployment of TrueBot, a Windows malware attributed to a risk actor often known as Silence and which shares connections with Evil Corp, a Russian e-crime crew that displays tactical overlaps with one other financially motivated group dubbed TA505.

With TA505 facilitating the deployment of Clop ransomware previously, it is being suspected that the assaults are a precursor to deploying file-locking malware on focused programs.

Furthermore, safety weblog Bleeping Computer reported that the Clop ransomware crew reached out to the publication and claimed to have exploited the flaw to steal knowledge saved within the compromised servers from over 130 corporations.

Federal Civilian Executive Branch (FCEB) companies are required to use the fixes by March 3, 2023, to safe the networks in opposition to energetic threats.

Found this text fascinating? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.

LEAVE A REPLY

Please enter your comment!
Please enter your name here