๐ก๏ธ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ก๐ฒ๐๐ & ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐ฆ๐๐บ๐บ๐ฎ๐ฟ๐
๐ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ฎ๐ป๐ฑ๐๐ฐ๐ฎ๐ฝ๐ฒ ๐ข๐๐ฒ๐ฟ๐๐ถ๐ฒ๐
Overall Severity: ๐ MEDIUM
Key Trends:
โข Increased sophistication in phishing attacks, particularly device code phishing.
โข Active exploitation of critical vulnerabilities in widely used firewall and network devices.
โข Targeting of remote workers and insider threats by state-sponsored groups.
Most Targeted Sectors: Telecommunications, Healthcare, Government
๐๐ฒ๐ ๐ง๐ฎ๐ธ๐ฒ๐ฎ๐๐ฎ๐๐
๐ด ๐ ๐ถ๐๐ถ๐ด๐ฎ๐๐ฒ ๐๐ฒ๐๐ถ๐ฐ๐ฒ ๐๐ผ๐ฑ๐ฒ ๐ฃ๐ต๐ถ๐๐ต๐ถ๐ป๐ด ๐ฅ๐ถ๐๐ธ๐
๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
Implement Conditional Access policies in Microsoft Entra ID to restrict device code authentication to trusted devices and networks. Monitor sign-in logs for suspicious activities and revoke refresh tokens if device code phishing is suspected.
๐ฅ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น๐ฒ:
Storm-2372โs device code phishing attacks have successfully targeted multiple sectors around the world. Itโs been i have gained unauthorised access to Microsoft services and harvesting sensitive data.
๐ง๐ถ๐บ๐ฒ๐ณ๐ฟ๐ฎ๐บ๐ฒ: Urgent Action Required
๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ๐:
โขย https://www.bleepingcomputer.com/news/security/microsoft-hackers-steal-emails-in-device-code-phishing-attacks/
โขย https://cyberscoop.com/russia-threat-groups-device-code-phishing-microsoft-accounts/
๐ด ๐จ๐ฟ๐ด๐ฒ๐ป๐ ๐ฃ๐ฎ๐๐ฐ๐ต ๐ณ๐ผ๐ฟ ๐ฃ๐ฎ๐น๐ผ ๐๐น๐๐ผ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ๐ ๐ฃ๐๐ก-๐ข๐ฆ
๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
Upgrade all PAN-OS firewalls to the latest versions (11.2.4-h4 or later) to address the critical authentication bypass vulnerability (CVE-2025โ0108) that is actively being exploited.
Rationale:
Exploitation attempts have already been detected against unpatched PAN-OS devices, risking unauthorized access and potential data breaches.
๐ง๐ถ๐บ๐ฒ๐ณ๐ฟ๐ฎ๐บ๐ฒ: Action Required This Week
๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ๐:
โขย https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
๐ด ๐ฃ๐ฎ๐๐ฐ๐ต ๐ฆ๐ผ๐ป๐ถ๐ฐ๐ช๐ฎ๐น๐น ๐๐ถ๐ฟ๐ฒ๐๐ฎ๐น๐น๐ ๐๐บ๐บ๐ฒ๐ฑ๐ถ๐ฎ๐๐ฒ๐น๐
๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
Update SonicWall firewalls to SonicOS versions 8.0.0โ8037 or 7.1.3โ7015 to mitigate the critical authentication bypass vulnerability (CVE-2024โ53704) that is being actively exploited.
Rationale:
The vulnerability allows attackers to hijack SSL VPN sessions, posing a significant risk to organisational security.
๐ง๐ถ๐บ๐ฒ๐ณ๐ฟ๐ฎ๐บ๐ฒ: Immediate Action Required
๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ๐:
โขย https://www.bleepingcomputer.com/news/security/sonicwall-firewall-bug-leveraged-in-attacks-after-poc-exploit-release/
โขย https://cybersecuritynews.com/sonicwall-firewall-authentication-bypass-vulnerability-exploited-in-wild/
๐ ๐ ๐ผ๐ป๐ถ๐๐ผ๐ฟ ๐ณ๐ผ๐ฟ ๐ฃ๐ผ๐๐๐ด๐ฟ๐ฒ๐ฆ๐ค๐ ๐ญ๐ฒ๐ฟ๐ผ-๐๐ฎ๐ ๐๐
๐ฝ๐น๐ผ๐ถ๐๐
๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
Ensure that PostgreSQL systems are patched against CVE-2024โ12356 and CVE-2025โ1094 to prevent potential exploitation linked to the BeyondTrust breach.
๐ฅ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น๐ฒ:
These vulnerabilities have been exploited in a high-profile breach, indicating a need for immediate attention to prevent similar incidents.
Timeframe: :date: Action Required This Week
๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ๐:
โขย https://www.bleepingcomputer.com/news/security/postgresql-flaw-exploited-as-zero-day-in-beyondtrust-breach/
๐ ๐ฆ๐๐ฟ๐ฒ๐ป๐ด๐๐ต๐ฒ๐ป ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ด๐ฎ๐ถ๐ป๐๐ ๐ก๐ผ๐ฟ๐๐ต ๐๐ผ๐ฟ๐ฒ๐ฎ๐ป ๐๐๐ฏ๐ฒ๐ฟ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐๐
๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
Implement robust identity verification processes for remote hires and enhance monitoring for insider threats to mitigate risks from North Korean IT workers infiltrating international companies.
๐ฅ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น๐ฒ:
These operatives use sophisticated tactics to plant backdoors and steal sensitive information, posing a significant threat to organisations.
๐ง๐ถ๐บ๐ฒ๐ณ๐ฟ๐ฎ๐บ๐ฒ: Action Required This Quarter
๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ๐:
โขย https://cybersecuritynews.com/north-korean-it-workers-infiltrate-international-companies-to-plant-backdoors-on-systems/
๐ ๐๐ฒ๐๐ฎ๐ฟ๐ฒ ๐ผ๐ณ ๐ฆ๐ผ๐ฐ๐๐ต๐ผ๐น๐ถ๐๐ต ๐ ๐ฎ๐น๐๐ฎ๐ฟ๐ฒ
๐๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป:
Educate users on avoiding fake browser update prompts and verify updates from official sources to prevent SocGholish infections.
๐ฅ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น๐ฒ:
This malware is distributed through deceptive update notifications and can lead to severe security breaches.
๐ง๐ถ๐บ๐ฒ๐ณ๐ฟ๐ฎ๐บ๐ฒ: Action Required This Month
๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ๐:
โขย https://cybersecuritynews.com/beware-of-malicious-browser-updates/