Researchers at #Volexity revealed that multiple #Russian threat actors are conducting social-engineering & spear-phishing to target organizations with the ultimate goal of compromising #Microsoft 365 accounts via #DeviceCodeAuthentication phishing.

🔗 https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/na

Russische hackers breken wi-fi netwerken op ongekende wijze

In een ongekende cyberaanval hebben Russische spionnen gebruik gemaakt van een innovatieve techniek om toegang te krijgen tot Wi-Fi netwerken zonder fysiek aan

Tech Nieuws
In a separate report earlier this month, #security company #Volexity said it had found another high-end technique in play at a different, unnamed #ISP. In that case, it said a Chinese state #hacking group distinct from #VoltTyphoon was able to get far enough inside the service provider to alter #DNS web addresses that users were trying to reach & divert them elsewhere, allowing the #hackers to insert #backdoors for #espionage.
#InfoSec #Internet #tech #cybersecurity #China #US #geopolitics
@Taco_lad @da_667 as my final answer i would say do your own thing and promote and parlay innovation but then again just copy binary defense and trustedsec rollout - rely on core competencies and hire really good analysts and practitioners - i see them as a great role model #volexity staff

Volexity discovered a zero-day exploitation of a vulnerability in Palo Alto Networks' GlobalProtect firewall devices, identified as CVE-2024-3400. This vulnerability allowed unauthenticated remote code execution, enabling attackers to execute commands on the device via specially crafted network requests. The attacker, known as UTA0218, attempted to install a custom Python backdoor named UPSTYLE on the firewall. This backdoor was used to execute additional commands on the device. The exploitation was observed to have started on March 26, 2024, with the attacker testing the vulnerability by placing zero-byte files on firewall devices. By April 10, 2024, UTA0218 successfully deployed malicious payloads on multiple devices. After exploiting the devices, the attacker downloaded additional tools to facilitate access to victims' internal networks, extracting sensitive credentials and other files. The exploitation was limited and targeted, but there were signs of potential reconnaissance activity aimed at identifying more vulnerable systems. Palo Alto Networks confirmed the vulnerability and issued an advisory, including a threat protection signature and a timeline for a fix expected by April 14, 2024. Volexity recommends organizations using GlobalProtect firewall devices to read the advisory and take necessary mitigation actions to protect against further exploitation.

https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/

#cybersecurity #paloaltonetworks #unit42 #panos #vulnerability #firewall #globalprotect #UTA0218 #volexity

Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)

On April 10, 2024, Volexity identified zero-day exploitation of a vulnerability found within the GlobalProtect feature of Palo Alto Networks PAN-OS at one of its network security monitoring (NSM) customers. Volexity received alerts regarding suspect network traffic emanating from the customer’s firewall. A subsequent investigation determined the device had been compromised. The following day, April 11, 2024, Volexity observed further, identical exploitation at another one of its NSM customers by the same threat actor.

Volexity

Palo Alto Networks and Unit 42 are actively tracking and sharing information about a critical vulnerability, CVE-2024-3400, which affects their PAN-OS software. This vulnerability allows an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. It has a CVSS score of 10.0, indicating a high severity. The vulnerability is specific to PAN-OS 10.2, 11.0, and 11.1 versions when a GlobalProtect gateway and device telemetry are enabled. It does not impact cloud firewalls, Panorama appliances, or Prisma Access.

Palo Alto Networks has identified malicious exploitation of this vulnerability under the name Operation MidnightEclipse. They believe the initial exploitation is limited to a single threat actor but warn that additional actors may attempt to exploit it in the future. The company is providing interim guidance to mitigate the vulnerability, including recommendations for customers with a Threat Prevention subscription to block attacks by enabling Threat ID 95187. For those who cannot apply this mitigation immediately, Palo Alto Networks suggests temporarily disabling device telemetry until the device is upgraded to a fixed PAN-OS version.

The vulnerability is set to be fixed in an upcoming release of PAN-OS 10.2, 11.0, 11.1, and all later versions, with an estimated release date of April 14, 2024. Palo Alto Networks encourages customers to monitor their networks for abnormal activity and investigate any unexpected network activity as a best practice. They also thank Volexity for discovering this issue and their ongoing collaboration and partnership.

https://unit42.paloaltonetworks.com/cve-2024-3400/

https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/

#cybersecurity #paloaltonetworks #unit42 #panos #vulnerability #firewall #globalprotect #cve #midnighteclipse #threat #volexity

Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated April 24)

We detail Operation MidnightEclipse, a campaign exploiting command injection vulnerability CVE-2024-3400, and include protections and mitigations.

Unit 42
GlobalProtect von Palo Alto Networks anfällig für Hacker

Palo Alto Networks. Die IT-Sicherheitsfirma Volexity entdeckte kürzlich den kritischen CVSS 10-Fehler in PAN-OS der VPN-Lösung GlobalProtect.

Tarnkappe.info
Microsoft: Two New 0-Day Flaws in Exchange Server – Krebs on Security

Microsoft: Two New 0-Day Flaws in Exchange Server - Microsoft Corp. is investigating reports that attackers are exploiting two previou... https://krebsonsecurity.com/2022/09/microsoft-two-new-0-day-flaws-in-exchange-server/ #microsoftexchangeserverzero-day #zimbracollaborationsuite #latestwarnings #thecomingstorm #cve-2022-41040 #cve-2022-41082 #timetopatch #stevenadair #volexity #gtsc
Microsoft: Two New 0-Day Flaws in Exchange Server – Krebs on Security

Entlassungen bei Patreon: IT-Security-Team muss gehen

Patreon entlässt seine gesamte Belegschaft für IT-Sicherheit. Müssen Nutzer der Plattform nun um die Sicherheit ihrer Daten bangen?

Tarnkappe.info