Hijacked Microsoft IIS Servers Used to Distribute Malware
Hijacked Microsoft IIS Servers Used to Distribute Malware
  • Alert & Advisory
  • July 27, 2023

AhnLab Security Emergency Response Centre (ASEC) has revealed that the North Korean state-sponsored Lazarus hacking group is breaching Windows Internet Information Service (IIS) web servers to hijack them for malware distribution. This latest campaign takes advantage of a weakness in INISAFE CrossWeb EX V6 to transmit the Lazarus malware. INISAFE CrossWeb EX V6 is a software used to protect against malicious websites and malware attacks. However, it has been reported that the Lazarus group has exploited a vulnerability in the software to distribute malware. The malware is installed when a system using a vulnerable version of INISAFE CrossWeb EX V6 visits a website via a web browser.

Watering Hole Attacks
Watering Hole Attacks
  • Alert & Advisory
  • July 23, 2023

ngCERT recently observed several cases of watering hole attacks that target groups of people who are somehow connected - whether they work for the same company, belong to the same social club, or have a common interest/background. The goal of this attack is to compromise as many of these users' devices as possible and, in some cases, gain access to their organization's network. In other words, a watering hole attack occurs when cyber criminals use skills such as hacking and social engineering to target individuals, groups, or organizations on a website they frequent. Alternatively, the attacker can direct the victim(s) to a website that they have compromised.

Critical Vulnerability Discovered in Popular WordPress Plugin
Critical Vulnerability Discovered in Popular WordPress Plugin
  • Alert & Advisory
  • July 22, 2023

Popular WordPress plugin “Essential Addons for Elementor” by WPDeveloper was found to contain a vulnerability that could allow remote attackers to escalate privileges to an administrator on the site. The plugin has more than a million active installations and the vulnerability affects versions 5.4.0 to 5.7.1.

Android Smartphones Vulnerable to Fingerprint Brute Force Attacks
Android Smartphones Vulnerable to Fingerprint Brute Force Attacks
  • Alert & Advisory
  • July 24, 2023

A new method of bypassing user authentication on smartphones running the Android, HarmonyOS, and iOS operating systems has been discovered. The method has been dubbed 'BrutePrint' by its discoverers, Tencent Labs and Zhejiang University, because it employs brute force attacks to crack modern smartphone authentication mechanisms such as fingerprints to bypass user authentication and take control of the device.

ESXi Remote Code Execution Vulnerability
ESXi Remote Code Execution Vulnerability
  • Vulnerability
  • July 21, 2023

Investigation revealed that the vulnerability ESXi versions 6.0, 6.5 and 6.7 running on any platform, and the Horizon cloud desktop-as-a-service (DaaS) platform version 8.x. could be exploited to perform remote code execution.

Related Articles