Intelligence Summary

18 Feb 2025 Intelligence Summary

šŸ›”ļø š—¦š—²š—°š˜‚š—æš—¶š˜š˜† š—”š—²š˜„š˜€ & š—œš—»š˜š—²š—¹š—¹š—¶š—“š—²š—»š—°š—² š—¦š˜‚š—ŗš—ŗš—®š—æš˜†

šŸ” š—§š—µš—æš—²š—®š˜ š—Ÿš—®š—»š—±š˜€š—°š—®š—½š—² š—¢š˜ƒš—²š—æš˜ƒš—¶š—²š˜„

š—¢š˜ƒš—²š—æš—®š—¹š—¹ š—¦š—²š˜ƒš—²š—æš—¶š˜š˜†: 🟠 MEDIUM

š—žš—²š˜† š—§š—æš—²š—»š—±š˜€:

• Interesting use of Microsoft Outlook features for C2 (FinalDraft)
• Exploitation of legitimate services for malicious purposes

š— š—¼š˜€š˜ š—§š—®š—æš—“š—²š˜š—²š—± š—¦š—²š—°š˜š—¼š—æš˜€: Government, Telecommunications, Healthcare

Key Takeaways

🟠 š— š—¶š˜š—¶š—“š—®š˜š—² š—„š—¶š˜€š—øš˜€ š—³š—æš—¼š—ŗ š—™š—¶š—»š—®š—¹š——š—æš—®š—³š˜ š— š—®š—¹š˜„š—®š—æš—²

š——š—²š˜€š—°š—æš—¶š—½š˜š—¶š—¼š—»:
Investigate for Microsoft Outlook configurations to detect exploitation via the FinalDraft malware, which uses email drafts for command-and-control communications. We’d reccomend using the information provided by ElasticLabs in their fantastic report.

š—„š—®š˜š—¶š—¼š—»š—®š—¹š—²:
This stealthy malware can exfiltrate sensitive data and perform lateral movement within networks, posing significant risks to organisations.

š—§š—¶š—ŗš—²š—³š—æš—®š—ŗš—²: š—”š—°š˜š—¶š—¼š—» š—„š—²š—¾š˜‚š—¶š—æš—²š—± š—§š—µš—¶š˜€ š—Ŗš—²š—²š—ø

š—¦š—¼š˜‚š—æš—°š—²š˜€:

šŸ”“ š—£š—®š˜š—°š—µ š—©š˜‚š—¹š—»š—²š—æš—®š—Æš—¶š—¹š—¶š˜š—¶š—²š˜€ š—¶š—» š—£š—”š—”-š—¢š—¦ š—®š—»š—± š—–š—¶š˜€š—°š—¼ š——š—²š˜ƒš—¶š—°š—²š˜€
š——š—²š˜€š—°š—æš—¶š—½š˜š—¶š—¼š—»:
This was also in yesterday’s new but we strongly recommend that you immediately update affected systems to address the high-severity authentication bypass vulnerabilities in PAN-OS and the exploitation of unpatched Cisco devices.

š—„š—®š˜š—¶š—¼š—»š—®š—¹š—²:
Exploitation of these vulnerabilities has been observed in the wild, posing critical risks to network security.

š—§š—¶š—ŗš—²š—³š—æš—®š—ŗš—²: š—œš—ŗš—ŗš—²š—±š—¶š—®š˜š—² š—”š—°š˜š—¶š—¼š—» š—„š—²š—¾š˜‚š—¶š—æš—²š—±

š—¦š—¼š˜‚š—æš—°š—²š˜€:
• https://cybersecuritynews.com/pan-os-authentication-bypass-exploited/
• https://cybersecuritynews.com/salt-typhoon-hackers-exploited-1000-cisco-devices/

šŸ”µš—œš—ŗš—½š—¹š—²š—ŗš—²š—»š˜ š—˜š—»š—µš—®š—»š—°š—²š—± š—£š—æš—¼š˜š—²š—°š˜š—¶š—¼š—» š—¶š—» š—šš—¼š—¼š—“š—¹š—² š—–š—µš—æš—¼š—ŗš—²

š——š—²š˜€š—°š—æš—¶š—½š˜š—¶š—¼š—»:
Enable the AI-powered Enhanced Protection feature in Google Chrome to provide real-time threat detection, suspicious download scanning, and password compromise alerts.

š—„š—®š˜š—¶š—¼š—»š—®š—¹š—²:
This feature significantly enhances user security by proactively identifying and mitigating threats that may not have been previously recognised.

š—§š—¶š—ŗš—²š—³š—æš—®š—ŗš—²: In the next month

š—¦š—¼š˜‚š—æš—°š—²š˜€:
• https://www.bleepingcomputer.com/news/google/google-chromes-ai-powered-security-feature-rolls-out-to-everyone/
• https://cybersecuritynews.com/google-chrome-ai-powered-security/

Stay Ahead of Cyber Threats.
Get Exclusive Insights!

Receive expert cyber security insights, threat intelligence reports, and the latest industry updates.

Huntabil.IT is a leader in threat-informed defence, helping organisations stay ahead of cyber threats with expert-driven intelligence, proactive threat hunting, and tailored security advisory services.

Ā© 2025 Huntabil.IT Technologies Pty Ltd

Stay in the loop!