Tag : 2024-05-07

17 attack reports | 137 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
Threat Actors Hack YouTube Channels to Distribute Infostealers May 10, 2024, 1:47 p.m. This analysis reveals that malicious groups have been exploiting popular YouTube channels, including some with over 800,000 subsc… 13
Malware (XMRig, OrcusRAT, etc.) disguised as MS Office crack May 10, 2024, 1:45 p.m. The report details an ongoing malware campaign targeting South Korean users, which disguises malicious payloads as cracked versio… 12
Protecting Networks from Opportunistic Ivanti Pulse Secure Vulnerability Exploitation May 10, 2024, 9:06 a.m. Juniper Threat Labs has observed attempts to exploit Ivanti Pulse Secure authentication bypass and remote code execution vulnerab… 23
Profiling Trafficers: Cerberus May 10, 2024, 9:02 a.m. This analysis delves into the activities of a group of malware operators known as Cerberus (formerly Amnesia) Team, who specializ… 24
New Campaigns from Scattered Spider May 10, 2024, 8:33 a.m. Scattered Spider, a financially motivated threat actor group, has been conducting aggressive phishing campaigns targeting various… 118
macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge May 10, 2024, 8:31 a.m. This analysis discusses the emergence of a new macOS malware family called 'Cuckoo Stealer', which acts as an infostealer and spy… 4
Dissecting REMCOS RAT: An in-depth analysis of a widespread 2024 malware, Part Four May 9, 2024, 3:14 p.m. This comprehensive analysis provides a thorough examination of the REMCOS Remote Access Trojan (RAT), a prominent malware threat … 34
Surge of JavaScript Malware in sites with vulnerable versions of LiteSpeed Cache Plugin May 9, 2024, 3:08 p.m. A recent surge of malicious JavaScript code has been observed targeting websites using vulnerable versions of the LiteSpeed Cache… 6
Tracking the Surge in Non-PE Cyber Threats May 9, 2024, 3:04 p.m. This intelligence report details a sophisticated infection chain that culminates in the deployment of AsyncRAT, a potent malware … 13
APT28 campaign against Polish government institutions May 8, 2024, 3:37 p.m. The CERT Polska team is investigating a large-scale malware campaign carried out by the Russian intelligence group APT28, which h… 74
Guntior - the story of an advanced bootkit that doesn't rely on Windows disk drivers May 8, 2024, 1:32 p.m. Amid the rise of bootkits at the time, a dropper was captured in-the-wild and posted on a malware tracker. The malware was called… 6
Code Emulation and Cybercrime Infrastructure Discovery May 8, 2024, 11:18 a.m. This report details the analysis of a malspam campaign utilizing the Matanbuchus loader, which involved decrypting strings within… 76
Stealer Distributed via Crafted Minecraft Source Pack May 8, 2024, 11:09 a.m. This report details the operation of the zEus stealer malware, which is distributed through a crafted Minecraft source pack. The … 23
Case of Malware Distribution Linking to Illegal Gambling Website Targeting Korean Web Server May 8, 2024, 11:05 a.m. This report examines a malware strain distributed to web servers in South Korea that redirects users to an illegal gambling site.… 8
RemcosRAT Distributed Using Steganography May 8, 2024, 11:03 a.m. Security researchers have discovered a campaign distributing RemcosRAT through a sophisticated infection chain involving steganog… 4
HijackLoader Updates May 7, 2024, 8:36 a.m. HijackLoader, also known as IDAT Loader, is a modular malware loader capable of executing multiple payloads. It utilizes a variet… 11
LNK File Disguised as Certificate Distributing RokRAT Malware May 7, 2024, 8:32 a.m. This analysis delves into the continuous distribution of malicious shortcut files (*.LNK) targeting South Korean users, particula… 4

Vulnerabilities

CVE CVSS Published Product impacted Tags
CVE-2024-4186 9.8 May 7, 2024, 6:15 a.m. LOGO-VULNERABLEBuild App Online plugin for WordPress
CVE-2024-4345 9.8 May 7, 2024, 9:15 a.m. LOGO-VULNERABLEStartklar Elementor Addons plugin for WordPress
CVE-2024-4346 9.1 May 7, 2024, 9:15 a.m. LOGO-VULNERABLEStartklar Elementor Addons plugin for WordPress
CVE-2024-34346 8.4 May 7, 2024, 9:15 p.m. LOGO-VULNERABLEDeno
CVE-2024-22472 8.1 May 7, 2024, 6:15 a.m. LOGO-VULNERABLESilicon Labs 500 Series Z-Wave devices
CVE-2024-27273 8.1 May 7, 2024, 9:15 p.m. LOGO-VULNERABLEIBM AIX
CVE-2024-31456 7.7 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEGLPI
CVE-2024-4599 7.5 May 7, 2024, 11:15 a.m. LOGO-VULNERABLELAN Messenger
CVE-2024-4537 7.5 May 7, 2024, 12:15 p.m. LOGO-VULNERABLEJanto Ticketing Software
CVE-2024-4538 7.5 May 7, 2024, 12:15 p.m. LOGO-VULNERABLEJanto Ticketing Software
CVE-2024-32663 7.5 May 7, 2024, 3:15 p.m. LOGO-VULNERABLESuricata
CVE-2024-34084 7.5 May 7, 2024, 3:15 p.m. LOGO-VULNERABLEMinder
CVE-2024-29207 7.5 May 7, 2024, 5:15 p.m. LOGO-VULNERABLEUniFi Connect EV Station
CVE-2024-4582 7.3 May 7, 2024, 11:15 a.m. LOGO-VULNERABLEFaraday GM8181
CVE-2024-4600 7.1 May 7, 2024, 12:15 p.m. LOGO-VULNERABLESocomec Net Vision
CVE-2024-29889 7.1 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEGLPI
CVE-2024-34342 7.1 May 7, 2024, 3:15 p.m. LOGO-VULNERABLEreact-pdf
CVE-2024-4536 6.8 May 7, 2024, 1:15 p.m. LOGO-VULNERABLEEclipse Dataspace Components
CVE-2024-20863 6.7 May 7, 2024, 5:15 a.m. LOGO-VULNERABLEHAL
CVE-2024-4601 6.7 May 7, 2024, 12:15 p.m. LOGO-VULNERABLESocomec Net Vision
CVE-2024-20865 6.6 May 7, 2024, 5:15 a.m. LOGO-VULNERABLEUNKNOWN
CVE-2024-2913 6.5 May 7, 2024, 12:15 a.m. LOGO-VULNERABLEUNKNOWN
CVE-2024-27217 6.5 May 7, 2024, 7:15 a.m. LOGO-VULNERABLEOpenHarmony
CVE-2024-3758 6.5 May 7, 2024, 7:15 a.m. LOGO-VULNERABLEOpenHarmony
CVE-2024-3759 6.5 May 7, 2024, 7:15 a.m. LOGO-VULNERABLEOpenHarmony
CVE-2024-27982 6.5 May 7, 2024, 5:15 p.m. LOGO-VULNERABLENode.js
CVE-2023-31234 6.3 May 7, 2024, 1:15 p.m. LOGO-VULNERABLETilda Publishing
CVE-2024-4595 6.3 May 7, 2024, 3:15 p.m. LOGO-VULNERABLESEMCMS
CVE-2024-20872 6.2 May 7, 2024, 5:15 a.m. LOGO-VULNERABLETalkbackSE
CVE-2023-40694 6.2 May 7, 2024, 9:15 p.m. LOGO-VULNERABLEIBM Watson CP4D Data Stores
CVE-2024-20861 6.0 May 7, 2024, 5:15 a.m. LOGO-VULNERABLEUNKNOWN
CVE-2024-20862 6.0 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung SveService
CVE-2024-29209 6.0 May 7, 2024, 5:15 p.m. LOGO-VULNERABLEPhish Alert Button (PAB) for Outlook
CVE-2023-7240 5.8 May 7, 2024, 1:15 p.m. LOGO-VULNERABLEUNKNOWN
CVE-2024-20866 5.7 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Setupwizard
CVE-2024-20859 5.5 May 7, 2024, 5:15 a.m. LOGO-VULNERABLEFactoryCamera
CVE-2024-20864 5.5 May 7, 2024, 5:15 a.m. LOGO-VULNERABLEDarManagerService
CVE-2024-20867 5.5 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Email
CVE-2024-20869 5.5 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Internet
CVE-2024-34341 5.4 May 7, 2024, 4:15 p.m. LOGO-VULNERABLETrix editor
CVE-2024-4583 5.3 May 7, 2024, 11:15 a.m. LOGO-VULNERABLEFaraday GM8181
CVE-2024-4584 5.3 May 7, 2024, 12:15 p.m. LOGO-VULNERABLEFaraday GM8181
CVE-2024-32664 5.3 May 7, 2024, 3:15 p.m. LOGO-VULNERABLESuricata
CVE-2024-32867 5.3 May 7, 2024, 3:15 p.m. LOGO-VULNERABLESuricata
CVE-2024-23808 5.2 May 7, 2024, 7:15 a.m. LOGO-VULNERABLEOpenHarmony
CVE-2024-20870 5.1 May 7, 2024, 5:15 a.m. LOGO-VULNERABLEGalaxy Store
CVE-2024-20871 4.9 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Keyboard
CVE-2024-20821 4.4 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Mobile Devices
CVE-2024-20868 4.4 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Notes
CVE-2024-20856 4.3 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Secure Folder
CVE-2023-6810 4.3 May 7, 2024, 10:15 a.m. LOGO-VULNERABLEClickCease Click Fraud Protection plugin for WordPress
CVE-2024-4585 4.3 May 7, 2024, 12:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4586 4.3 May 7, 2024, 1:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4587 4.3 May 7, 2024, 1:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4588 4.3 May 7, 2024, 1:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4589 4.3 May 7, 2024, 1:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-28148 4.3 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEApache Superset
CVE-2024-4590 4.3 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4591 4.3 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4592 4.3 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4593 4.3 May 7, 2024, 2:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-4594 4.3 May 7, 2024, 3:15 p.m. LOGO-VULNERABLEDedeCMS
CVE-2024-20857 4.0 May 7, 2024, 5:15 a.m. LOGO-VULNERABLECocktailBarService
CVE-2024-20858 4.0 May 7, 2024, 5:15 a.m. LOGO-VULNERABLECocktailBarService
CVE-2024-20860 4.0 May 7, 2024, 5:15 a.m. LOGO-VULNERABLETelephonyUI
CVE-2024-4596 3.7 May 7, 2024, 4:15 p.m. LOGO-VULNERABLEKimai
CVE-2024-31078 3.3 May 7, 2024, 7:15 a.m. LOGO-VULNERABLEOpenHarmony
CVE-2024-3757 3.3 May 7, 2024, 7:15 a.m. LOGO-VULNERABLEOpenHarmony
CVE-2024-29210 2.8 May 7, 2024, 5:15 p.m. LOGO-VULNERABLESecond Chance Client
CVE-2024-20855 2.4 May 7, 2024, 5:15 a.m. LOGO-VULNERABLESamsung Multitasking framework
CVE-2024-29206 2.2 May 7, 2024, 5:15 p.m. LOGO-VULNERABLEUniFi Connect EV Station
CVE-2024-29208 2.2 May 7, 2024, 5:15 p.m. LOGO-VULNERABLEUniFi Connect EV Station
CVE-2024-3628 None May 7, 2024, 6:15 a.m. LOGO-VULNERABLEEasyEvent WordPress plugin
CVE-2023-46012 None May 7, 2024, 2:15 p.m. LOGO-VULNERABLELINKSYS EA7500
CVE-2024-33434 None May 7, 2024, 2:15 p.m. LOGO-VULNERABLECHAOS
CVE-2024-33780 None May 7, 2024, 2:15 p.m. LOGO-VULNERABLEMP-SPDZ
CVE-2024-33781 None May 7, 2024, 2:15 p.m. LOGO-VULNERABLEMP-SPDZ
CVE-2024-33782 None May 7, 2024, 2:15 p.m. LOGO-VULNERABLEMP-SPDZ
CVE-2024-33783 None May 7, 2024, 2:15 p.m. LOGO-VULNERABLEMP-SPDZ
CVE-2024-32369 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLEHSC Cybersecurity HC Mailinspector
CVE-2024-32370 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLEHSC Cybersecurity HC Mailinspector
CVE-2024-32371 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLEHSC Cybersecurity HC Mailinspector
CVE-2024-33120 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLERoothub
CVE-2024-33122 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLERoothub
CVE-2024-33124 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLERoothub
CVE-2024-34523 None May 7, 2024, 3:15 p.m. LOGO-VULNERABLEAChecker
CVE-2024-33139 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33144 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33146 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33748 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLEMvnRepository MS Basic
CVE-2024-33856 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLELogpoint
CVE-2024-33857 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLELogpoint
CVE-2024-33858 None May 7, 2024, 4:15 p.m. LOGO-VULNERABLELogpoint
CVE-2022-37249 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEUNKNOWN
CVE-2024-29149 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEAlcatel-Lucent ALE NOE deskphones
CVE-2024-29150 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEAlcatel-Lucent ALE NOE deskphones
CVE-2024-33147 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33148 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33149 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33153 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33155 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33161 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33164 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLEJ2EEFAST
CVE-2024-33859 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLELogpoint
CVE-2024-33860 None May 7, 2024, 5:15 p.m. LOGO-VULNERABLELogpoint
CVE-2023-42757 None May 7, 2024, 6:15 p.m. LOGO-VULNERABLEProcess Explorer
CVE-2024-25507 None May 7, 2024, 6:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-25508 None May 7, 2024, 6:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-25512 None May 7, 2024, 6:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-34397 None May 7, 2024, 6:15 p.m. LOGO-VULNERABLEGLib
CVE-2024-34517 None May 7, 2024, 6:15 p.m. LOGO-VULNERABLENeo4j
CVE-2024-25509 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-25510 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-25511 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-25513 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-25514 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLERuvarOA
CVE-2024-34314 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLECmsEasy
CVE-2024-34315 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLECmsEasy
CVE-2024-4558 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLEGoogle Chrome
CVE-2024-4559 None May 7, 2024, 7:15 p.m. LOGO-VULNERABLEGoogle Chrome
CVE-2024-0022 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-0024 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-0025 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-0026 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-0027 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid OS
CVE-2024-0042 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-0043 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid Operating System
CVE-2024-23704 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23705 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23706 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23707 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23708 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23709 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23710 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23712 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-23713 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEAndroid
CVE-2024-4030 None May 7, 2024, 9:15 p.m. LOGO-VULNERABLEPython