Ransomware Operators Exploit Novel ESXi Vulnerability for Attacks

Summary Microsoft researchers have uncovered a vulnerability in VMware ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on affected systems. Ransomware groups like Storm-0506, Storm-1175, Octo Tempest, and Manatee Tempest have exploited this flaw, designated CVE-2024-37085, deploying ransomware such as Akira and Black Basta. The issue was disclosed to VMware, which released a security update. RH-ISAC Members who utilize VMware products in…

Read More

FrostyGoop Leverages Modbus TCP to Exploit Sensitive OT Systems

Summary Security researchers have unveiled a new malware strain designated FrostyGoop, which is directly targeting industrial control systems (ICS) on targeted systems. Discovered by Dragos in April 2024, FrostyGoop can directly interact with ICS devices via Modbus, a widely used industrial protocol. The malware was linked to a cyber-attack on a district energy company in Lviv,…

Read More

RH-ISAC Joins National Task Force for Fraud & Scam Prevention

Washington, D.C. (July 18, 2024)  – Today, the Aspen Institute Financial Security Program (Aspen FSP) is announcing the formation of a National Task Force for Fraud & Scam Prevention, an initiative that will bring together leading stakeholders from government, law enforcement, private industry, and civil society to develop a nation-wide strategy aimed at helping prevent…

Read More

GitLab Pipeline Vulnerability Affects Community and Enterprise Versions; Patch Available

Summary A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user. The vulnerability, tracked as CVE-2024-5655, impacts all GitLab CE/EE versions from 15.8 through 16.11.4, 17.0.0 to 17.0.2, and 17.1.0 to 17.1.0. GitLab has addressed the vulnerability by releasing versions 17.1.1, 17.0.3, and 16.11.5, and…

Read More

SolarWinds Serv-U Vulnerability Under Active Attack; Patch Available

Context  A recently patched high-severity flaw, tracked as CVE-2024-28995, impacting SolarWinds Serv-U file transfer software is being actively exploited by malicious actors in the wild. A patch is available for affected SolarWinds customers. Community Impact  Successful exploitation of this vulnerability could be a potential steppingstone for attackers. By gaining access to sensitive information like credentials…

Read More