HomeNews
Cybersecurity News Digest: February 2023
HomeNews
Cybersecurity News Digest: February 2023

Another month filled with intriguing cybersecurity incidents has come and gone, and we’re ready to share the news with you.

Reddit falls victim to a phishing attack

When someone as seasoned as an r/Reddit moderator falls victim to phishing, it really sets into perspective how dangerous these attacks are. That’s exactly what happened this month, when an attacker directed Reddit employees to a website that imitated the company’s intranet gateway, in an attempt to steal credentials and auth tokens. 

This led to a security breach that exposed some confidential information, but Reddit’s prompt investigation concluded that no user data had been leaked.

Reddit was highly praised for how openly the platform has handled communication with its community, after the incident took place.

A critical vulnerability exploited in the ZK framework

CISA warns that hackers are actively exploiting a critical vulnerability in ZK, a popular open source web development framework written in Java.

The vulnerability that is now tracked as CVE-2022-36537, was used in a recent attack to gain initial access to ConnectWise R1Soft Server Backup Manager software and plant a backdoor. Companies running ZK Framework versions 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 are currently at risk.

KeePass denies having a vulnerability

The vulnerability which is now tracked as CVE-2023-24055 was found in an extremely popular open-source password manager KeePass. With the exploit, attackers who have write access to a system can edit the KeePass XML configuration and insert a malicious trigger that will export the whole database, including all usernames and passwords in plaintext.

However, the development team behind KeePass doesn’t agree, maintaining that this is only true as long as the program is run in an insecure environment, hence the vulnerability doesn’t count. 

New hacker group targets China with targeted attacks

Beijing-based security experts have uncovered a new hacking group — made up of members primarily from Europe and North America — that has been targeting Chinese online resources. The group, which is confusingly named Against The West (ATW), poses a serious risk to the country’s data security, experts say.

According to a report obtained by the Global Times, the cyber gang has claimed to have leaked sensitive information such as source code and database of more than 100 information systems of important government agencies, aviation, and infrastructure departments over 70 times since 2021, and their activity has been intensifying thorough 2022.

Go Daddy admits a multi-year security breach

Go Daddy, a major web hosting company, revealed a long-term security breach. The hackers were able to access the companye’s source code, as well as customer, and employee login information, which allowed them to abuse Go Daddy’s services by launching a series of watering hole attacks. This involves inserting malicious code into websites hosted by the provider.

Apparently, this has been going on for some years, but folks at GoDaddy are finally on top of the breach.

Google Engineers promise to eradicate prototype pollution

Programmers at Google have created a plan to combat prototype pollution, a well-known vulnerability that affects web security. This language flaw in JavaScript permits attackers to modify objects they have no authority over in real-time. This issue happens when there is no distinction between objects and their blueprints.

The solution was described at length on GitHub.

Try ANY.RUN for Enterprises

Combat new threats together – ANALYZE MALWARE IN A TEAM

A vulnerability found in Cisco ClamAV 

A potentially dangerous flaw in an anti-malware scanning product has been identified in Cisco’s networking hardware. Specifically, a security flaw affecting the ClamAV scanning library (CVE-2023-20032) has resulted in critical security risks for Cisco’s Secure Web Appliance and multiple versions of the Cisco Secure Endpoint, including Windows, MacOS, Linux, and cloud.

Toyota patches a critical backdoor

A significant vulnerability in the internet portal of Toyota’s international vendor management system was uncovered by U.S.-based security researcher Eaton Zveare. This issue related to the implementation of JWT (JSON Web Token) verification and would permit anybody possessing a legitimate email address to enter into any account.

The Global Supplier Preparation Information Management System (GSPIMS) is an online platform that offers Toyota personnel and providers access to existing jobs, polls, info on acquisitions, and more. The vulnerability has since been patched.

Meta fixes a 2FA bypass

Facebook’s parent company, Meta, has recently addressed a serious security vulnerability that could have allowed cyber attackers to bypass two-factor authentication (2FA) that relies on SMS-based verification. This flaw, which was discovered by a security researcher named Manoj Gautam, could confirm a targeted user’s previously verified Facebook mobile number by exploiting a rate-limiting issue within Instagram. 

The vulnerability could have allowed cybercriminals to brute-force the verification pin required to confirm someone’s phone number, effectively bypassing the 2FA process.

Belgium to become a safe-haven for ethical hackers

Belgium has announced the development of a legal framework to regulate ethical hacking, thus becoming the first European state to govern the work of independent penetration testers. Crucially, the new legislation clears up the circumstances that may or may not lead to law violation.

The announcement emphasizes the significance of white-hat hacking and the duties of pen-testers, who attempt to get into online systems for educational or security purposes without a prearranged agreement with the target.

ANY.RUN’s February updates

An in-depth XLoader analysis, ChatGPT shenanigans, where we tried to get it to be useful for blue teamers and failed, an announcement about our stand in GISEC 2023, and an interview with a security expert and educator Jézer Ferreira, where we discuss the state of security in Latin America, OSINT methods and much, much more:

These are the February posts to read from ANY.RUN:

Jack Zalesskiy
Technology writer at ANY.RUN at ANY.RUN | + posts

Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.

jack-zalesskiy
Jack Zalesskiy
Technology writer at ANY.RUN
Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.

What do you think about this post?

0 answers

  • Awful
  • Average
  • Great

No votes so far! Be the first to rate this post.

0 comments