‹ Threat Show Home
The Threat Show

The Threat Show Ep. 1

Welcome to The Threat Show! We will discuss the do's, don'ts, and everything in between to make sure that you and your team stay secure from everyday threats.

Microsoft Exchange servers hacked to deploy LockBit ransomware    (1:23)

You might recall our coverage of the recent Microsoft Exchange zero-day vulnerabilities, which received several rounds of insufficient mitigations. Threat groups continue to take advantage of this vulnerability. One successfully Mediation: With the ongoing nature of this threat, you’ll want to patch your Exchange servers as soon as possible for the best odds of staying safe. Back up your servers as frequently as you can.

CVEs: CVE-2022-21969, CVE-2022-41040, CVE-2022-41082

Malware: LockBit(win.lockbit), LockBit, Lockbit, LockBit(elf.lockbit)

Fortinet Warns of Active Exploitation of Newly Discovered Critical Auth Bypass Bug    (3:56)

Fortinet previously disclosed a critical security vulnerability impacting its firewall and proxy devices. Now they’re warning users of several threat groups actively exploiting this vulnerability, which can let attackers see straight into your production environment.

Mediation: This affects lots of versions and devices, so you’ll want to deploy any patches available to you out of band to protect yourself.

CVEs: CVE-2022-40684

Unpatched Zimbra Flaw Lets Hackers Backdoor Servers    (5:56)

We have yet another email-based threat vector with Zimbra, which has been on our threat radar recently. Zimbra has failed to properly analyze and protect against malicious Java attachments in emails. A user might not even be aware that they have received a bad email. Once the email with the malicious Java attachment is sent, the code will be executed giving the attacker full control of the Zimbra server.

Mediation: You’ll want to patch ASAP. Another way to avoid these attacks is to block Java attachments at the mail server.

CVEs: CVE-2015-1197, CVE-2022-30333, CVE-2022-41352

POLONIUM Threat Group Targets Israeli Organizations with 'Creepy' Malware    (9:23)

POLONIUM is a Lebanon-based threat group that’s been targeting businesses in Israel. They use a unique, previously unknown toolset and malware to carry out large-scale information theft against cloud storage services such as Dropbox, OneDrive, etc. This attack comes in multiple waves, which unfortunately are likely to go unnoticed without proactively searching for them.

Mediation: In addition to detecting and blocking the malware before it can do any harm, organizations should consider analyzing audit logs for file storage platforms in order to find any large scale data thefts or abnormal amount of downloads that might be taking place.

More Details of macOS Archive Utility Flaw Emerge    (13:35)

Gatekeeper is a built-in security mechanism in macOS, often referred to as “security speed bump,” that notifies the user when they download a file from an untrusted, potentially dangerous source. Bad actors have been able to bypass this measure by crafting an archive or compressed file that tricks Gatekeeper into thinking it’s a trusted system file. Then they can deliver malware without Gatekeeper ever notifying the user that they could be in trouble, and in more extreme cases even root level access to a system.

Mediation: Keep your macOS systems up to date. Don’t wait for the automatic updates, patch ASAP.