The US Department of Treasure announced that its systems have been compromised by a Chinese APT in early December and that data was stolen from workstations. The threat actor apparently got access through an API key stolen from BeyondTrust and used in a cloud service aimed at providing remote technical support to the Department’s users. BeyondTrust is a third-party vendor providing remote access solutions to 20K customers worldwide, including 75% of Fortune 100 companies. Last week, a vulnerability in BeyondTrust (CVE-2024-12356) has been reported as exploited in the wild, even if it is unclear if the two cases are related.
[mitigate]Block access from 24.144.114.85, 142.93.119.175, 157.230.183.1 and 192.81.209.168[/mitigate]
A Denial-of-Service vulnerability in Palo Alto PAN-OS (CVE-2024-3393) is exploited in the wild. The flaw allows to disable PAN-OS DNS Security feature in configured firewalls, resulting in the firewall’s reboot. However, to exploit the vulnerability attackers may need permissions of authenticated end users via Prisma Access.
[mitigate]For each Anti-spyware profile, change the Log Severity to "none" for all configured DNS Security categories[/mitigate]
An exploited vulnerability in Four-Faith (CVE-2024-12856) exposes more than 15K industrial routers worldwide. The flaw was scanned by the same IP address responsible for exploiting another Four-Faith RCE vulnerability (CVE-2019-12168) two weeks ago.
Block access from 178.215.238[.]91
The US Department of Health proposed a set of new cybersecurity rules under the current regulation for healthcare organizations (HIPAA). Among others, the new rules require vulnerability scans every six months and more detailed risk analysis, including “an assessment of the risk level for each identified threat and vulnerability, based on the likelihood that each identified threat will exploit the identified vulnerabilities”. It also mandates data restoration within 72 hours after an incident and annual compliance audits.
Following the growing trend of threat actors targeting cloud environments, CISA will require federal agencies to implement its Secure Cloud Business Applications (SCuBA) initiative. It includes the implementation of configuration baselines for SaaS, automated configuration assessments and integration with CISA monitoring infrastructure.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
Unordered list
Bold text
Emphasis
Superscript
Subscript