Wednesday 18th December 2024

Wednesday 18th December 2024

Good morning. If your router could talk, it’d probably say, “Patch me before it’s too late!” Between ransomware gangs exploiting DrayTek routers, rogue RDP attacks masquerading as legit connections, and newly flagged vulnerabilities from CISA, it’s a rough week for network security.

Today, we’re looking into how red team tools are falling into the wrong hands, why IoT devices like webcams are under fire, and why your organisation’s RDP settings might need a second look. Cybercriminals are innovating—*are your defences keeping up?*

Let’s dig in. 🔒


The Mask Returns: Cyber Espionage Actor Strikes Again

A notorious yet under-the-radar cyber espionage group, The Mask (aka Careto), has reemerged, targeting a Latin American organization in two sophisticated attacks in 2019 and 2022, according to Kaspersky researchers. Active since at least 2007, The Mask typically zeroes in on high-profile entities like governments and research institutions.

Their playbook? Initial access via spear-phishing emails that exploit browser vulnerabilities, followed by malware deployment. Notably, the group has devised methods to exploit legitimate tools—like the MDaemon webmail server and HitmanPro Alert driver—to maintain persistence and spread across networks.

  • 2019 Attack: Deployed Careto2 (a modular framework) and Goreto (a Golang-based toolset) to exfiltrate data via OneDrive and Google Drive.
  • 2022 Attack: Leveraged a malicious webmail extension and spread FakeHMP malware, enabling keystroke logging, reconnaissance, and further payload execution.

Fast forward to 2024: The Mask has been linked to fresh infection techniques, cementing their ability to innovate with advanced malware capabilities. Cybersecurity pros, stay sharp—this actor clearly hasn’t dropped the curtain.


Earth Koshchei Strikes Again: Weaponising Red Team Tools

APT group Earth Koshchei (aka APT29/Midnight Blizzard) is back in the spotlight, this time exploiting red team methodologies to execute a massive rogue RDP attack. Trend Micro reports that the espionage-focused group—allegedly linked to Russia's SVR—used rogue RDP configuration files to gain partial control of victim systems and exfiltrate sensitive data.

The campaign peaked on October 22, 2024, with targeted spear-phishing emails hitting governments, militaries, academic researchers, and Ukrainian entities. Victims unknowingly connected to malicious RDP servers set up across 193 proxies and 34 backend servers, allowing the attackers to:

  • Crawl redirected drives and exfiltrate files.
  • Execute disguised applications like "AWS Secure Storage Connection Test."
  • Operate stealthily without deploying malware.

Earth Koshchei’s extensive infrastructure—enabled by VPNs, TOR, and residential proxies—further complicates attribution, though the group’s fingerprints are evident.

Big Picture: This attack highlights the risk of red team techniques being repurposed by APTs. Blocking outbound RDP connections and filtering RDP files over email are critical defences for organisations.


CISA Flags New Exploited Flaws as FBI Tracks HiatusRAT Escalation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two new vulnerabilities to its Known Exploited Vulnerabilities catalog, warning of active exploitation:

  • CVE-2024-20767 (Adobe ColdFusion): Improper access control allowing attackers to tamper with restricted files via exposed admin panels.
  • CVE-2024-35250 (Microsoft Windows Kernel-Mode Driver): A local privilege escalation flaw tied to Microsoft's Kernel Streaming Service.

Federal agencies are urged to patch systems by January 6, 2025, as PoC exploits for both vulnerabilities are publicly available.

Meanwhile, the FBI warned of HiatusRAT campaigns expanding beyond routers to exploit IoT devices like Hikvision and D-Link webcams, leveraging outdated vulnerabilities and weak passwords. Tools like Ingram and Medusa are reportedly used for brute-force attacks.

Over 20,000 DrayTek routers were exploited in a ransomware spree involving multiple threat actors—Monstrous Mantis, Ruthless Mantis, and LARVA-15. The campaign showcased a structured workflow:

  1. Monstrous Mantis gained initial access via a suspected zero-day vulnerability.
  2. Credentials were harvested and passed to partners for lateral movement and ransomware deployment (e.g., RagnarLocker, Qilin).

The findings highlight lingering weaknesses in device security, urging vendors to prioritise root cause analysis and systematic code reviews.

Marcel Velica

Senior Security Program Manager | Leading Cybersecurity Initiatives | Driving Strategic Security Solutions| Cybersecurity Excellence | Cloud Security

2d

It's crucial for both businesses and individuals to recognize the risks associated with unpatched devices, especially in our increasingly interconnected world. Aidan Dickenson

To view or add a comment, sign in

More articles by Aidan Dickenson

  • Saturday 21st December 2024

    Saturday 21st December 2024

    THANK YOU FOR ALL YOUR SUPPORT IN 2024, THIS NEWSLETTER HAS GROWN TO OVER 1000 SUBSCRIBERS. I'M INCREDIBLY GRATEFUL TO…

  • Friday 20th December 2024

    Friday 20th December 2024

    Good morning and a very happy Friday to you all. Today's edition is covering a wide range of stories from a phishing…

    1 Comment
  • Thursday 19th December 2024

    Thursday 19th December 2024

    Good morning. Today’s newsletter is looking in to stories from hackers disguising themselves as Google Calendar invites…

    4 Comments
  • Tuesday 17th December 2024

    Tuesday 17th December 2024

    Good morning everyone and thank you for joining me for the latest instalment of Cyber Daily! Today's edition is looking…

  • Monday 16th December 2024

    Monday 16th December 2024

    Good morning. If your holiday shopping list includes a budget Android device, you might want to double-check that…

    1 Comment
  • Sunday 15th December 2024

    Sunday 15th December 2024

    Good morning everyone, I hope you're all having a fantastic weekend. They say what happens in the cloud stays in the…

    1 Comment
  • Saturday 14th December 2024

    Saturday 14th December 2024

    Good morning. Today’s newsletter looks into a world where bad actors wield malware, fake jobs, and phony authority like…

    1 Comment
  • Friday 13th December 2024

    Friday 13th December 2024

    Good morning everyone and a very happy Friday to you all..

  • Thursday 12th December 2024

    Thursday 12th December 2024

    Good morning! In today’s edition, we’re looking into: - A Chinese cybersecurity researcher who turned critical…

    3 Comments
  • Wednesday 11th December 2024

    Wednesday 11th December 2024

    Good morning. Today we're covering stories ranging from North Korean hackers pulling off a $50M DeFi heist to…

    3 Comments

Explore topics