{"id":19395,"date":"2022-06-21T02:10:05","date_gmt":"2022-06-21T10:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/21\/news-13128\/"},"modified":"2022-06-21T02:10:05","modified_gmt":"2022-06-21T10:10:05","slug":"news-13128","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/21\/news-13128\/","title":{"rendered":"Security vulnerabilities: 5 times that organizations got hacked"},"content":{"rendered":"<p><strong>Credit to Author: Bill Cozens| Date: Tue, 21 Jun 2022 10:04:02 +0000<\/strong><\/p>\n<p>Businesses and governments these days are relying on dozens of different Software-as-a-Service (SaaS) applications to run their operations \u2014 and it\u2019s no secret that hackers are always looking for security vulnerabilities in them to exploit.<\/p>\n<p>According to <a href=\"http:\/\/pages.bettercloud.com\/rs\/719-KZY-706\/images\/2020_StateofSaaSOpsReport.pdf?mkt_tok=NzE5LUtaWS03MDYAAAF8LQdmoC7u54xbqxNwp0au4Zk7SiYaaqq2vupXFxCvaP5vY8gSQtlGFsUsRI8oj5Fl2m5PwIZUUAlzVZL_-hUEQ2RdNqgEzDAmZA5bZtowS_v-zMs\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">research by BetterCloud<\/a>, the average company with 500 to 999 employees uses about 93 different SaaS applications, with that number rising to 177 for companies with over 1000 employees.<\/p>\n<p>Coupled with the fact that vendors release thousands of updates each year to patch security vulnerabilities in their software, it\u2019s not surprising that businesses and governments are struggling to keep up with the <a href=\"https:\/\/media.bitpipe.com\/io_15x\/io_152272\/item_2184126\/ponemon-state-of-vulnerability-response-.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">volume of security vulnerabilities and patches<\/a>.<\/p>\n<p>And lo and behold, despite the best efforts of governments and businesses around the globe, hackers still managed to exploit <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/04\/the-top-5-most-routinely-exploited-vulnerabilities-of-2021\/\">multiple security vulnerabilities in 2021<\/a>.<\/p>\n<p>In this post, we\u2019ll take a look at five times governments and businesses got hacked thanks to security vulnerabilities in 2021.<\/p>\n<h2>1.\u00a0\u00a0 APT41 exploits Log4Shell vulnerability to compromise at least two US state governments<\/h2>\n<p>First publicly announced in early December 2021, <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2021\/12\/what-smbs-can-do-to-protect-against-log4shell-attacks\/\">Log4shell<\/a> (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2021-44228<\/a>) is a critical security vulnerability in the popular Java library Apache Log4j 2. The vulnerability is simple to execute and enables attackers to perform <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/remote-code-execution-rce-attack\/\">remote code execution<\/a>.<\/p>\n<p>A patch for Log4Shell was released on 9 December 2021, but within hours of the initial December 10 2021 announcement, hacker groups were already racing to exploit Log4Shell before businesses and governments could patch it \u2014 and at least one of them was successful.<\/p>\n<p>Shortly after the advisory, the Chinese state-sponsored hacking group APT41 exploited Log4Shell to compromise at least two US state governments, according to research from <a href=\"https:\/\/www.mandiant.com\/resources\/apt41-us-state-governments\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Mandiant<\/a>. Once they gained access to internet-facing systems, APT41 began a months-long campaign of <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/recon\/\">reconnaissance <\/a>and credential harvesting.<\/p>\n<h2>2.&nbsp; North Korean government backed-groups exploit Chrome zero-day vulnerability<\/h2>\n<p>On February 10 2022, Google&#8217;s Threat Analysis Group (TAG) <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/update-now-chrome-patches-actively-exploited-zero-day-vulnerability\/\">discovered that two North Korean government backed-groups <\/a>exploited a vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-0609\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>CVE-2022-0609<\/strong><\/a>) in Chrome to attack over 250 individuals working for various media, fintech, and software companies.<\/p>\n<p>The activities of the two groups have been tracked as <a href=\"https:\/\/www.clearskysec.com\/operation-dream-job\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Operation Dream Job<\/a> and<a href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> AppleJeus<\/a>, and both of them used the same <a href=\"https:\/\/blog.malwarebytes.com\/threats\/exploit-kits\/\">exploit kit<\/a> to collect sensitive information from affected systems.<\/p>\n<p>How does it work, you ask? Well, hackers exploited a use-after-free (UAF) vulnerability in the Animation component of Chrome \u2014 which, just like Log4Shell, allows hackers to perform remote code execution.<\/p>\n<h2>3.&nbsp; Hackers infiltrate governments and companies with ManageEngine ADSelfService Plus vulnerability<\/h2>\n<p>From September 17 through early October, hackers successfully compromised at least nine companies and 370 servers by<a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2021\/09\/fbi-and-cisa-warn-of-apt-groups-exploiting-adselfservice-plus\/\"> exploiting a vulnerability<strong> <\/strong><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-40539\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>(CVE-20<\/strong><\/a><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-40539\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-40539\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>1-40539)<\/strong><\/a><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2021\/09\/fbi-and-cisa-warn-of-apt-groups-exploiting-adselfservice-plus\/\"> in ManageEngine ADSelfService Plus<\/a>, a self-service password management and single sign-on solution.<\/p>\n<p>So, what happens after hackers exploited this vulnerability? You guessed it \u2014 remote code execution. Specifically, hackers uploaded a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/payload\/\">payl<\/a><a href=\"https:\/\/blog.malwarebytes.com\/glossary\/payload\/.\">oad <\/a>to a victims network that installed a webshell, a malicious script that grants hackers a persistent gateway to the affected device.<\/p>\n<p>From there, hackers <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/lateral-movement\/\">moved laterally<\/a> to other systems on the network, exfiltrated any files they pleased, and <a href=\"https:\/\/unit42.paloaltonetworks.com\/manageengine-godzilla-nglite-kdcsponge\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">even stole credentials<\/a>.<\/p>\n<h2>4.&nbsp; Tallinn-based hacker exploits Estonian government platform security vulnerabilities<\/h2>\n<p><a href=\"https:\/\/www.ria.ee\/en\/news\/police-and-border-guard-board-and-information-system-authority-stopped-illegal-downloading-data.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">In July 2021<\/a>, Estonian officials announced that a Tallinn-based male had gained access to KMAIS, Estonia\u2019s ID-document database, where he downloaded the government ID photos of 286,438 Estonians.<\/p>\n<p>To do this, the hacker exploited a vulnerability in KMAIS that allowed him to obtain a person&#8217;s ID photo using queries. Specifically, KMAIS did not sufficiently check the validity of the query received \u2014 and so, using fake digital certificates, the suspect could download the photograph of whoever he was pretending to be.<\/p>\n<h2>5.&nbsp; Russian hackers exploit Kaseya security vulnerabilities<\/h2>\n<p>Kaseya, a Miami-based software company, provides tech services to thousands of businesses over the world \u2014 and on July 2 2021, Kaseya CEO Fred Voccola had an urgent message for Kaseya customers: <a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">shut down your servers immediately<\/a>.<\/p>\n<p>The urgency was warranted. <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2021\/07\/shutdown-kaseya-vsa-servers-now-amidst-cascading-revil-attack-against-msps-clients\/\">Over 1,500 small and midsize businesses<\/a> had just been attacked, with attackers asking for $70 million in payment.<\/p>\n<p>A Russian-based cybergang known as REvil claimed responsibility for the attack. According to Hunteress Labs, REvil <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2021\/07\/04\/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa\" target=\"_blank\" rel=\"noreferrer noopener\">exploi<\/a><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2021\/07\/04\/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ted a zero-day<\/a> (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30116\" rel=\"nofollow\">CVE-<\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30116\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2021-30116<\/a>) and performed an authentication bypass in Kaseya&#8217;s web interface \u2014 allowing them to deploy <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2021\/07\/3-things-the-kaseya-attack-can-teach-us-about-ransomware-recovery\/\">a ransomware attack<\/a> on MSPs and their customers.<\/p>\n<h2><a><\/a>Organizations need a streamlined approach to vulnerability assessment<\/h2>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2022\/05\/10-ways-attackers-gain-access-to-networks\/\">Hackers took advantage<\/a> of many security vulnerabilities in 2021 to breach an array of governments and businesses.<\/p>\n<p>As we broke down in this article, hackers can range from individuals to whole state-sponsored groups \u2014 and we also saw how vulnerabilities themselves can appear in just about any piece of software regardless of the industry.<\/p>\n<p>And while some vulnerabilities are certainly worse than others, the sheer volume of vulnerabilities out there makes it difficult to keep up with the volume of security patches. With the right <a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-vulnerability-management\">vulnerability management<\/a> and<a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-patch-management\"> patch management<\/a>, however, your organization can find (and correct) weak points that malicious hackers, viruses, and other cyberthreats want to attack.<\/p>\n<p>Want to learn more about different vulnerability and patch management tools? Visit our <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Vulnerability and Patch Management page<\/a> or read the <a href=\"https:\/\/www.malwarebytes.com\/resources\/easset_upload_file46277_212091_e.pdf\">solution brief<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/security-vulnerabilities-5-times-that-organizations-got-hacked\/\">Security vulnerabilities: 5 times that organizations got hacked<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/security-vulnerabilities-5-times-that-organizations-got-hacked\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Bill Cozens| Date: Tue, 21 Jun 2022 10:04:02 +0000<\/strong><\/p>\n<p>In this post, we break down 5 times hackers used security vulnerabilities in 2021 to attack governments and businesses.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/security-vulnerabilities-5-times-that-organizations-got-hacked\/\">Security vulnerabilities: 5 times that organizations got hacked<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,10987,1328,4980,19950,3765,10752],"class_list":["post-19395","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-exploits","tag-government","tag-hack","tag-patch-management","tag-ransomware","tag-vulnerabilities"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19395"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19395\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19395"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}