trend analysis

This Threat Intelligence Report summarizes significant cyber threats and vulnerabilities observed during the second week of July 2024.

Ransomware

1. ShadowRoot Ransomware Targets Turkish Businesses

Victim: Turkish Businesses

The ransomware arrives through suspicious emails with PDF attachments, likely disguised as invoices, originating from the “.ru” domain. The embedded links within the PDF facilitate the download of a subsequent stage exe payload upon user interaction. It encrypts files with the “.shadowroot” extension. 

Reference: https://www.forcepoint.com/blog/x-labs/shadowroot-ransomware-targeting-turkish-businesses

2. New Eldorado Ransomware Attacking Windows And Linux Systems

Victim: Windows And Linux Systems

Eldorado, an emerging ransomware-as-a-service (RaaS) operation, offers locker variations for encrypting files on Windows and Linux systems. The ransomware spreads through phishing emails and can target network shares using the Server Message Block (SMB) protocol.

It uses Golang for cross-platform functionality and encrypts files using a combination of Chacha20 and RSA-OAEP encryption algorithms

Eldorado’s encryptor comes in four formats: esxi, esxi_64, win, and win_64, and its data leak site already lists 16 victims as of June 2024. Thirteen targets are in the United States, two in Italy, and one in Croatia.

Reference:

  1. https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
  2. https://gbhackers.com/new-eldorado-ransomware-attacks-windows-linux/

3. Nigerian cloud provider affected in Phobos ransomware attack

Victim: Nigerian cloud

The Nigerian Computer Emergency Response Team (ngCERT) reported a rise in Phobos ransomware attacks targeting the country’s cloud service providers in early July 2024

ngCERT did confirm that at least one Nigerian cloud provider was compromised by Phobos ransomware, but the specific company name remains undisclosed

Phobos attackers obtain access to vulnerable networks by sending phishing emails or using IP scanning tools to find vulnerable Remote Desktop Protocol (RDP) ports. When successful, such attacks cause system compromise, ransom payments, data loss, financial losses, and fraudulent behavior, according to ngCERT.

Reference: https://techcabal.com/2024/07/10/cloud-providers-ransomware-attack/

4. ARRL finally confirms ransomware gang stole data in a cyberattack

Victim: American Radio Relay League (ARRL)
Date: July 11, 2024

The American Radio Relay League (ARRL) finally confirmed that some of its employees’ data was stolen in a ransomware attack in May 2024.

In early June, it also revealed that its systems were hacked by a “malicious international cyber group” in a “sophisticated network attack.”

Although ARRL discovered no evidence that the stolen personal information was misused, it decided to provide people affected by the data breach with 24 months of free identity monitoring through Kroll out of “an abundance of caution.”

Reference: https://www.bleepingcomputer.com/news/security/arrl-finally-confirms-ransomware-gang-stole-data-in-cyberattack/

5. Rite Aid confirms data breach after June ransomware attack

Victim: Rite Aid

Pharmacy giant Rite Aid confirmed a data breach after suffering a cyberattack in June, which was claimed by the RansomHub ransomware operation.

While Rite Aid didn’t share what customer data was accessed in the breach or how many individuals were affected, it said that the data breach doesn’t impact health or financial information.

Reference: https://www.bleepingcomputer.com/news/security/rite-aid-confirms-data-breach-after-june-ransomware-attack/

6. American Golf Corporation Hit by MEDUSA Ransomware

Victim: American Golf Corporation (AGC)

Attacker: The MEDUSA ransomware group is believed to be behind the attack on AGC

The hackers allegedly exfiltrated 154.9 GB of data, including email correspondence, members’ data, orders, full access account credentials (User ID, Passwords, Secret Keys), reports, licenses, passports, and financial data.

Reference: https://thecyberexpress.com/american-golf-corporation-medusa-ransomware/

Vulnerabilities

CVEDateBase ScoreDescription
CVE-2024-130507/08/20249.8 CRITICALtap-windows6 driver version 9.26 and earlier does not properly check the size data of incoming write operations which an attacker can use to overflow memory buffers, resulting in a bug check and potentially arbitrary code execution in kernel space
CVE-2024-2790307/08/20249.8 CRITICALOpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.
CVE-2024-360407/09/20249.9 CRITICALThis vulnerability that affects the OSM – OpenStreetMap plugin for WordPress versions up to and including 6.0.2. It is a SQL injection vulnerability.
CVE-2024-2874707/09/20249.8 CRITICALAn unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges.
CVE-2024-3807407/09/20249.8 CRITICALWindows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-3987207/09/20249.8 CRITICALA vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1).
CVE-2024-3917107/09/20249.8 CRITICALDirectory Travel in PHPVibe v11.0.46 due to incomplete blacklist checksums and directory checks, which can lead to code execution via writing specific statements to .htaccess and code to a file with a .png suffix.
CVE-2023-3804907/09/20249.9 CRITICALA BOLA vulnerability in GET, PUT, DELETE /appointments/{appointmentId} allows a low-privileged user to fetch, modify, or delete an appointment of any user (including admin).
CVE-2024-3741807/09/20249.9 CRITICALUnrestricted Upload of File with Dangerous Type vulnerability in Andy Moyle Church Admin allows Upload a Web Shell to a Web Server. This issue affects Church Admin: from n/a through 4.4.6.
CVE-2024-661107/09/20249.8 CRITICALA nested iframe, triggering a cross-site navigation, could send SameSite=Strict or Lax cookies. This vulnerability affects Firefox < 128.
CVE-2024-636507/09/20249.8 CRITICALThe Product Table by WBW plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.1 via the ‘saveCustomTitle’ function.
CVE-2024-3807707/09/20249.8 CRITICALWindows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-3742407/09/20249.9 CRITICALUnrestricted Upload of File with Dangerous Type vulnerability in Automattic Newspack Blocks allows Upload a Web Shell to a Web Server. This issue affects Newspack Blocks: from n/a through 3.0.8.
CVE-2024-660607/09/20249.8 CRITICALClipboard code failed to check the index on an array access. This could have lead to an out-of-bounds read. This vulnerability affects Firefox < 128.
CVE-2024-631407/09/20249.8 CRITICALThe IQ Testimonials plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the ‘process_image_upload’ function in versions up to, and including, 2.2.7. 
CVE-2024-3742007/09/20249.9 CRITICALUnrestricted Upload of File with Dangerous Type vulnerability in WPZita Zita Elementor Site Library allows Upload a Web Shell to a Web Server. This issue affects Zita Elementor Site Library: from n/a through 1.6.1.
CVE-2024-660207/09/20249.8 CRITICALA mismatch between allocator and deallocator could have lead to memory corruption. This vulnerability affects Firefox < 128 and Firefox ESR < 115.13.
CVE-2024-631307/09/20249.8 CRITICALThe Gutenberg Forms plugin for WordPress is vulnerable to arbitrary file uploads due to the users can specify the allowed file types in the ‘upload’ function in versions up to, and including, 2.2.9.
CVE-2023-3805107/09/20249.9 CRITICALA BOLA vulnerability in GET, PUT, DELETE /secretaries/{secretaryId} allows a low privileged user to fetch, modify or delete a low privileged user
CVE-2024-3711207/09/202410.0 CRITICALImproper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Membership Software WishList Member X.
CVE-2024-3807607/09/20249.8 CRITICALWindows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-3808907/09/20249.9 CRITICALMicrosoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2024-548807/09/20249.8 CRITICALThe SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.
CVE-2023-4819407/09/20249.8 CRITICALVulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \x0. After executing set_client_qos, control over the gp register can be obtained.
CVE-2023-3805507/09/20249.6 CRITICALA BOLA vulnerability in GET, PUT, DELETE /services/{serviceId} allows a low privileged user to fetch, modify or delete the services of any user
CVE-2024-3755507/09/20249.1 CRITICALUnrestricted Upload of File with Dangerous Type vulnerability in ZealousWeb Generate PDF using Contact Form 7
CVE-2024-2875107/09/20249.1 CRITICALAn high privileged remote attacker can enable telnet access that accepts hardcoded credentials. 
CVE-2024-642207/09/20249.8 CRITICALAn unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.
CVE-2024-3907107/09/20249.8 CRITICALFujian Kelixun <=7.6.6.4391 is vulnerable to SQL Injection in send_event.php.
CVE-2024-487907/10/20249.8 CRITICALThis vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.
CVE-2024-3777007/10/20249.1 CRITICALThis vulnerability allows attackers to execute arbitrary commands via a crafted payload.
CVE-2024-521707/10/20249.2 CRITICALThis vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. 
CVE-2024-3731007/10/20249.0 CRITICALEVerest is an EV charging software stack. An integer overflow in the “v2g_incoming_v2gtp” function in the v2g_server.cpp implementation can allow a remote attacker to overflow the process’ heap. This vulnerability is fixed in 2024.3.1 and 2024.6.0.
CVE-2024-3787007/09/20249.8 CRITICALSQL injection vulnerability in processscore.php in Learning Management System Project In PHP With Source Code 1.0 allows attackers to execute arbitrary SQL commands via the id parameter.
CVE-2024-4061807/10/20249.6 CRITICALWhale browser before 3.26.244.21 allows an attacker to execute malicious JavaScript due to improper sanitization when processing a built-in extension.
CVE-2024-639707/11/20249.8 CRITICALThis vulnerability was partially fixed in 0.1.0.44, but was still exploitable via Cross-Site Request Forgery.
CVE-2024-638507/11/20249.8 CRITICALAn issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.
CVE-2024-4054107/12/20249.8 CRITICALmy-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build.
CVE-2024-3643507/11/20249.8 CRITICALvulnerability in Supermicro BMC firmware for select X11 and X12 models.
CVE-2024-632807/12/20249.8 CRITICALThe MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.14.7.
CVE-2024-3793307/12/20249.3 CRITICALImproper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in anhvnit Woocommerce OpenPos.This issue affects Woocommerce OpenPos: from n/a through 6.4.4.
CVE-2024-3792707/12/20249.8 CRITICALImproper Privilege Management vulnerability in NooTheme Jobmonster allows Privilege Escalation. This issue affects Jobmonster: from n/a through 4.7.0.
CVE-2024-3873607/12/20249.1 CRITICALUnrestricted Upload of File with Dangerous Type vulnerability in Realtyna Realtyna Organic IDX plugin allows Code Injection.
CVE-2024-3991407/12/20249.8 CRITICALFOG is a cloning/imaging/rescue suite/inventory management system.
Vulnerabilities table