- CISA and FBI Release Joint Advisory in Response to Active Exploitation of PaperCut Vulnerability
- Palo Alto Networks Security Advisories – May 2023
- Microsoft Releases May 2023 Security Updates
- Mozilla Releases Security Advisories for Multiple Products
- CISA and Partners Disclose Snake Malware Threat From Russian Cyber Actors
- CISA and Partners Release BianLian Ransomware Cybersecurity Advisory
|
|
CISA and FBI Release Joint Advisory in Response to Active Exploitation of PaperCut Vulnerability
Situation: Problem: Implication: Need: Additional Resources: CISA Write-Up: (link) Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG: (link) NIST NVD: (link)
|
|
|
|
Palo Alto Networks Security Advisories – May 2023
Situation: Problem: CVE-2023-0008 PAN-OS: A file disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to export local files from the firewall through a race condition. Implication: Need: Additional Resources: Palo Alto Networks Security Advisories (link) CVE-2023-0007 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Panorama Web Interface (link) CVE-2023-0008 PAN-OS: Local File Disclosure Vulnerability in the PAN-OS Web Interface (link) Best Practices (link) |
|
|
|
Microsoft Releases May 2023 Security Updates
Situation: Problem: Implication: Need: Additional Resources: May 2023 Security Updates – Release Notes – Security Update Guide – Microsoft (link) Deployment information (link) Microsoft Releases May 2023 Security Updates (link) |
|
|
|
Mozilla Releases Security Advisories for Multiple Products
Situation: Problem:
Implication: Need: Additional Resources: Mozilla Releases Security Advisories for Multiple Products: (link) Mozilla Foundation Security Advisory 2023-16: (link) Mozilla Foundation Security Advisory 2023-17: (link) Mozilla Foundation Security Advisories: (link) |
|
|
|
CISA and Partners Disclose Snake Malware Threat From Russian Cyber Actors
Situation: Problem: The Snake infrastructure has been identified in over 50 countries across North America, South America, Europe, Africa, Asia, and Australia, to include the United States and Russia itself. Although Snake uses infrastructure across all industries, its targeting is purposeful and tactical in nature. Implication: The FSB typically deploys Snake to external-facing infrastructure nodes on a network, and from there uses other tools and TTPs on the internal network to conduct additional exploitation operations. Upon gaining and cementing ingress into a target network, the FSB typically enumerates the network and works to obtain administrator credentials and access domain controllers. A wide array of mechanisms has been employed to gather user and administrator credentials in order to expand laterally across the network, to include keyloggers, network sniffers, and open source tools. Typically, after FSB operators map out a network and obtain administrator credentials for various domains in the network, regular collection operations begin. In most instances with Snake, further heavyweight implants are not deployed, and they rely on credentials and lightweight remote-access tools internally within a network. FSB operators sometimes deploy a small remote reverse shell along with Snake to enable interactive operations. This triggerable reverse shell, which the FSB has used for around 20 years, can be used as a backup access vector, or to maintain a minimal presence in a network and avoid detection while moving laterally. Need: Additional Resources: Snake Malware overview including technical information and mitigation recommendations: (link) Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure. (link) Russia Cyber Threat Overview and Advisories (link) |
|
|
|
CISA and Partners Release BianLian Ransomware Cybersecurity Advisory
Situation: Problem: Implication: Need: Additional Resources: CISA and Partners Release BianLian Ransomware Cybersecurity Advisory: (link) |