New Forrester Report: The External Threat Intelligence Service Providers Landscape

Download

Weekly Cyber Round-up

Intelligence Report

January 23, 2025

Star Blizzard spear phishing campaign targets WhatsApp accounts

In mid-November 2024, Microsoft researchers observed the Russian threat actor Star Blizzard changing its initial access vector to target WhatsApp accounts. The campaign involved spear phishing emails that enticed the target to join a WhatsApp group for supposed non-governmental initiatives aimed at supporting NGOs in Ukraine. The email impersonated a US government official and contained a QR code that was intentionally broken to coax the target into responding. Star Blizzard then sent a second email with a Safe Links-wrapped shortened link as an alternative, which redirected the victim to a webpage with a further QR code to join the group. The QR code instead was used to connect an account to a linked device, enabling the threat actor to gain access to messages in the victim’s WhatsApp account and exfiltrate data using browser plugins.

Get the alert delivered directly to your inbox

New multi-stage loader PNGPlug used to deliver ValleyRAT to Chinese-speaking organisations

Intezer researchers identified a series of attacks against organisations in Chinese-speaking regions, including Hong Kong, Taiwan, and China. The campaign involves a new multi-stage loader, dubbed PNGPlug, which is used to deliver ValleyRAT. The attacks typically begin with a phishing site that encourages the victim to download a malicious MSI package disguised as legitimate software. Upon execution, a benign application is deployed, while an encrypted archive containing a DLL loader and malicious PNG image files is extracted. The PNG files contain PE executables that are loaded and injected into a newly created process, which executes ValleyRAT.

Threat actors impersonate CERT-UA using fake AnyDesk connection requests

CERT-UA warned of ongoing attempts by unknown threat actors to impersonate the agency by sending fake AnyDesk connection requests. The requests claim to be for conducting security audits and use social engineering techniques to exploit user trust. For the attack to succeed, AnyDesk must be installed and operational on the target’s computer. The attack also requires the attacker to be in possession of the target’s AnyDesk identifier.

Fake FortiGate config leaks used to target researchers with SmartLoader malware

Security researcher Chris Partridge warned of threat actors abusing the current news about Belsen Group’s leak of Fortinet FortiGate configurations to deliver malware. A newly created GitHub repository, called ‘Fortigate Belsen Leak Tracker’, contains a link to a ZIP file that supposedly contains all affected IPs. Instead, the file delivers the SmartLoader Lua malware, which is often used to install infostealers like Lumma.

PlushDaemon uses trojanised IPany VPN to deliver SlowStepper backdoor 

ESET researchers identified a supply chain attack that targeted the South Korean VPN provider, IPany, in 2023 and 2024. The attack has been attributed to a new China-aligned advanced persistent threat group, dubbed PlushDaemon. The threat actor replaced the legitimate installer for IPany with one including a new custom backdoor, dubbed SlowStepper, which has at least 30 modules. PlushDaemon has been active since at least 2019, engaging in espionage operations against users in China, Taiwan, Hong Kong, South Korea, the United States, and New Zealand.

High Priority Vulnerabilities

Name name Software Base
Score
Temp
Score
CVE-2024-7029 AVM1203 9.8 9.8
Related: Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai
CVE-2024-8963 CSA 9.1 7.0
Related: CISA and FBI Release Advisory on How Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications
CVE-2024-32555 Easy Real Estate Plugin 9.8 7.1
Related: Critical zero-days impact premium WordPress real estate plugins
CVE-2024-49138 Windows 7.8 7.5
Related: Zero-Day Vulnerability in Windows Exploited: CVE-2024-49138 PoC Code Released
CVE-2024-55591 FortiProxy 9.8 9.8
Related: Patch procrastination leaves 50,000 Fortinet firewalls vulnerable to zero-day

Get the full report
delivered to your inbox​

By filling out and submitting this request you give us your consent to use and store the information  you have provided for the purpose set out above or in connection with it. For more information, see our Privacy Policy.

Detect and respond to threats faster.

Request a personalised demo to see Silobreaker in action.
Get started

Request a demo