• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

CISA orders agencies to patch Backup Exec bugs used by ransomware gang

Ionut Ilascu by Ionut Ilascu
April 7, 2023
Reading Time: 3 mins read
0
CISA orders agencies to patch exploited Google Chrome bug by Dec 26th

CISA orders agencies to address Backup Exec bugs exploited in ransomware attack

RELATED POSTS

New Horabot campaign takes over victim’s Gmail, Outlook accounts

Windows 11 will let you view phone photos in File Explorer

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

On Friday, U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased by five its list of security issues that threat actors have used in attacks, three of them in Veritas Backup Exec exploited to deploy ransomware.

One of the vulnerabilities was exploited as zero-day as part of an exploit chain that targeted Samsung’s web browser and another that allows attackers to increase privileges on Windows machines.

Initial access in ransomware attack

Of the five vulnerabilities that CISA added to the catalog of Known Exploited Vulnerabilities (KEV) today, only one was rated critical, an issue in Veritas’ data protection software tracked as CVE-2021-27877 that allows remote access and command execution with elevated privileges.

A report earlier this week from cybersecurity firm Mandiant informs that CVE-2021-27877 was used by an affiliate of the ALPHV/BlackCat ransomware operation to gain initial access to a target network.

The other two flaws (CVE-2021-27876, CVE-2021-27878) impacting Veritas Backup Exec were also leveraged in the attack, enabling the intruder to access arbitrary files and execute arbitrary commands on the system.

It is worth noting that Veritas patched all three vulnerabilities in March 2021 and that thousands of Backup Exec instances are currently reachable over the public web.

Buy JNews
ADVERTISEMENT

Exploit chain delivers spyware

The zero-day vulnerability leveraged against Samsung’s web browser is tracked as CVE-2023-26083 and affects the Mali GPU driver from Arm.

Part of an exploit chain that delivered commercial spyware in a campaign discovered in December 2022 by Google’s Threat Analysis Group (TAG), the security issue is an information leak that allows exposing sensitive kernel metadata.

In a previous KEV update at the end of March, CISA included in the catalog the other vulnerabilities leveraged in the exploit chain, some of which were zero-days at the time of the attack.

The fifth vulnerability CISA added to KEV is identified as CVE-2019-1388. It impacts the Microsoft Windows Certificate Dialog and has been used in attacks to run processes with elevated privileges on a previously compromised machine.

Federal agencies in the U.S. have until April 28 to check if their systems are impacted by the newly added vulnerabilities and to apply the necessary updates.

As part of the binding operational directive (BOD 22-01) from November 2021, Federal Civilian Executive Branch Agencies (FCEB) agencies have to check and fix their networks for all bugs included in the KEV catalog, which currently has 911 entries.

Even if KEV is mainly aimed at federal agencies, it is strongly recommended that private companies all over the world treat with priority the vulnerabilities in the catalog.

Share54Tweet34Pin12
Ionut Ilascu

Ionut Ilascu

Related Posts

Beware: Hackers now use OneNote attachments to spread malware
Cyber Security

New Horabot campaign takes over victim’s Gmail, Outlook accounts

June 1, 2023
Windows 11 will let you view phone photos in File Explorer
Cyber Security

Windows 11 will let you view phone photos in File Explorer

June 1, 2023
Latitude cyberattack leads to data theft at two service providers
Cyber Security

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

June 1, 2023
Apple fixes recently disclosed zero-days on older iPhones and iPads
Cyber Security

Russia says US hacked thousands of iPhones in iOS zero-click attacks

June 1, 2023
Hackers turn to Google search ads to push info-stealing malware
Cyber Security

Google triples rewards for Chrome sandbox escape chain exploits

June 1, 2023
OSV and the Vulnerability Life Cycle
Cyber Security

Announcing the Chrome Browser Full Chain Exploit Bonus

June 1, 2023

Recommended Stories

Decoding how TRON [TRX] surpassed BTC, ETH in active address count

Decoding how TRON [TRX] surpassed BTC, ETH in active address count

March 27, 2023
Lastpass: Hackers stole customer vault data in cloud storage breach

Lastpass: Hackers stole customer vault data in cloud storage breach

December 22, 2022
Arbitrum DAO proposes return of ARB tokens: All you need to know

Arbitrum DAO proposes return of ARB tokens: All you need to know

April 10, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • XRP traders, know this about the ‘golden pocket’
  • New Horabot campaign takes over victim’s Gmail, Outlook accounts
  • LTC surprises investors with promising gains; this is what could happen next

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?