Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Chinese hackers exploit new zero-day vulnerability in Barracuda ESG devices
    Cyber Security

    Chinese hackers exploit new zero-day vulnerability in Barracuda ESG devices

    techempireBy techempireNo Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportDecember 27, 2023Editorial DepartmentZero-day/email security

    Zero-day vulnerability in Barracuda ESG devices

    Barracuda has revealed that Chinese threat actors exploited a new zero-day vulnerability in its Email Security Gateway (ESG) devices to deploy a backdoor on a “limited number” of devices.

    This issue, tracked as CVE-2023-7102, involves arbitrary code execution in Spreadsheet::ParseExcel, a third-party open source library used by the Amavis scanner that resides in the gateway.

    The company attributed the activity to threat actors tracked by Google-owned Mandiant UNC4841this vulnerability was previously linked to another zero-day vulnerability (CVE-2023-2868, CVSS score: 9.8) that was actively exploited in Barracuda devices earlier this year.

    The new vulnerability was successfully exploited via a specially crafted Microsoft Excel email attachment. New variants of known implants named SEASPY and SALTWATER were subsequently deployed, providing persistence and command execution capabilities.

    Internet security

    Barracuda said it released a security update that was “automatically applied” on December 21, 2023, with no further action required by customers.

    It further noted that a day later it “deployed a patch to remediate compromised ESG devices that showed signs of compromise associated with the newly identified malware variant.” It did not disclose the size of the compromise.

    That said, the original flaw in the Spreadsheet::ParseExcel Perl module (version 0.65) remains unpatched and has been assigned CVE identification code CVE-2023-7101, requiring downstream users to take appropriate remediation measures.

    Since October 2022, some private and public sector organizations in at least 16 countries are estimated to have been affected, according to Mandiant, which has been investigating the activity.

    The latest developments once again demonstrate UNC4841’s adaptability, leveraging new strategies and techniques to retain access to high-priority targets while existing vulnerabilities are closed.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.