Monthly Advisory • 3 MIN READ
April Threat Advisory- Top 5
by Eleanor Barlow • Apr 2022
SecurityHQ’s Monthly Threat Report, Drawn from Recent Advisories of April 2022.
Credit to SecurityHQ team members: Devendra Bendre, Harsh Gajbhiya, Mandeep Sheoran, Geethu Krishna G
Zero-Day Privilege Escalation Vulnerability Affecting Windows Version of 7-Zip.
Threat Reference: Global
Risks: Privilege Escalation
Advisory Type: Zero-Day Exploits
Priority: Elevated
Security Researchers observed a recently published zero-day vulnerability in 7-Zip that allows an attacker to perform privilege escalation and command execution on Windows machines running with the 7-Zip version 21.07. This is exploitable due to misconfiguration of 7z.dll and a heap overflow.
Publicly Available POCs can be found below:
https[://]github.com[/]tiktb8/CVE-2022-29072
https[://]github.com[/]kagancapar/CVE-2022-29072
Recommendations
- It is recommended to keep all devices and software updated to their latest versions.
- Monitor your IT infrastructure 24×7 for suspicious activities.
- It is recommended to keep anti-malware solutions at endpoints, and IPS signatures at the network level, always updated.
Google Released a Patch for Zero-Day Vulnerability (CVE-2022-1364) in Chrome, Exploited in the Wild.
Threat Reference: Global
Risks: Zero Days
Advisory Type: Updates/Patches
Priority: Standard
Google has released Chrome version 100.0.4896.127 for Windows, Mac, and Linux to fix high severity Type Confusion vulnerability in V8 (CVE-2022-1364) which is exploited in the wild.
Recommendation
- It is recommended to update Google Chrome to the latest available versions/patch level.
Apache Released Update to Fix RCE Vulnerability in Struts.
Threat Reference: Global
Risks: Remote Code Execution
Advisory Type: Updates/Patches
Priority: Standard
Apache has fixed a critical remote code execution vulnerability in Struts, tracked as CVE-2021-31805 and having CVSs score 9.8. Successful exploitation of this vulnerability can allow the attacker to execute remote code execution on the victims’ system.
Affected versions: Struts 2 versions from 2.0.0 up to and including 2.5.29.
Recommendations
- It is recommended to update Apache Strut to the latest available version 2.5.30 or greater.
Mirai Botnet Infecting Vulnerable Web Servers by Exploiting Spring4shell Vulnerability
Threat Reference: Global
Risks: Malware
Advisory Type: Threat
Priority: Standard
Researchers have observed that attackers are actively exploiting Spring4Shell vulnerability on vulnerable web servers to deploy mirai botnet. The Spring4shell vulnerability tracked as CVE-2022-22965 and having cvss score 9.8. Successful exploitation of this vulnerability can allow the attacker to install mirai botnet on web server.
Recommendations
- It is recommended to update Spring Framework to the latest available version.
- Deploy Endpoint Detection & Response (EDR) tools to detect latest malwares and suspicious activities on endpoints.
- Update the Anti-malware solutions at endpoint and perimeter level solutions to include the given IOCs.
- Analyze Endpoint solutions – EDR, AV, Email Anti-malware solution logs for the presence of mentioned IOCs.
Threat Actors Targeting Energy Sectors ICS/SCADA Devices
Threat Reference: Global
Risks: Potential Threat
Advisory Type: Threat
Priority: Standard
Security Researchers discovered that threat actors are targeting the Energy Sector by using custom tools for targeting ICS/SCADA devices. This can scan for compromised and control affected devices and gain access to operational technology network.
Threat actors can also compromise workstations present in Information Technology or OT organizations, this exploit can also compromise ASRock Motherboard driver with known vulnerabilities.
Recommendations
- Monitor your IT infrastructure 24/7 for suspicious activities.
- It is recommended to keep anti-malware solutions at endpoints and IPS signatures at the network level always updated.
- It is recommended to keep all devices and software updated to their latest versions.
Having conducted incident response investigations across a wide range of industries, SecurityHQ are best placed to work with businesses large and small, and across numerous technical environments to reduce the impact of a cyber security incident. For more information on these threats, speak to an expert here.
Or if you suspect a security incident, you can report an incident here.