Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Chinese Hackers Exploited New Zero-Day in Barracuda’s ESG Appliances

    justmattgBy justmattgDecember 28, 2023No Comments2 Mins Read

    [ad_1]

    Dec 27, 2023NewsroomZero-Day / Email Security

    Zero-Day in Barracuda's ESG Appliances

    Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoors on a “limited number” of devices.

    Tracked as CVE-2023-7102, the issue relates to a case of arbitrary code execution that resides within a third-party and open-source library Spreadsheet::ParseExcel that’s used by the Amavis scanner within the gateway.

    The company attributed the activity to a threat actor tracked by Google-owned Mandiant as UNC4841, which was previously linked to the active exploitation of another zero-day in Barracuda devices (CVE-2023-2868, CVSS score: 9.8) earlier this year.

    Successful exploitation of the new flaw is accomplished by means of a specially crafted Microsoft Excel email attachment. This is followed by the deployment of new variants of known implants called SEASPY and SALTWATER that are equipped to offer persistence and command execution capabilities.

    Cybersecurity

    Barracuda said it released a security update that has been “automatically applied” on December 21, 2023, and that no further customer action is required.

    It further pointed out that it “deployed a patch to remediate compromised ESG appliances which exhibited indicators of compromise related to the newly identified malware variants” a day later. It did not disclose the scale of the compromise.

    That said, the original flaw in the Spreadsheet::ParseExcel Perl module (version 0.65) remains unpatched and has been assigned the CVE identifier CVE-2023-7101, necessitating that downstream users take appropriate remedial action.

    According to Mandiant, which has been investigating the campaign, a number of private and public sector organizations located in at least 16 countries are estimated to have been impacted since October 2022.

    The latest development once again speaks to UNC4841’s adaptability, leveraging new tactics and techniques to retain access to high priority targets as existing loopholes get closed.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleCritical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack
    Next Article Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑