Skip to main content

Nightmare week for security vendors: Now a Trend Micro bug is being exploited in the wild | The Record by Recorded Future

 


US-Japanese cybersecurity firm Trend Micro disclosed on Wednesday that a threat actor began using a bug in its antivirus products to gain admin rights on Windows systems as part of its attacks.

The vulnerability, tracked as CVE-2020–24557, affects the company’s Apex One and OfficeScan XG, two advanced security products aimed at enterprise customers.

The bug was discovered last year by Christopher Vella, a vulnerability researcher at Microsoft, who privately reported the issue to Trend Micro through the company’s Zero-Day Initiative bug acquisition program.

Trend Micro patched the issue in August 2020, but in an update to its initial security advisory posted on Wednesday, the security firm said it learned of incidents where this same bug was weaponized to attack some of its customers.

“The specific flaw exists within the logic that controls access to the Misc folder,” the ZDI team said last year. “An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.”

Based on this description of the issue, the bug could not be used to break into systems but was used as a second step in a multi-phase exploit chain after hackers already planted malicious code on a victim’s computer and used the bug to take full control of an infected system.

While Trend Micro did not share any details about the attackers, a source familiar with the attacks told The Record the bug was used by an advanced persistent threat (APT), a term usually used to refer to state-sponsored cyber-espionage groups.

This bug now becomes the fourth vulnerability in Apex One and OfficeScan XG security products that has been exploited in the wild after CVE-2019–18187, CVE-2020–8467, and CVE-2020–8468.

The first three were abused in 2019 and 2020, with the first being used by a Chinese cyber-espionage group during an attack on Mitsubishi Electric.

A bad week for security product vendors


News about hackers exploiting the Trend Micro vulnerability comes a day after FireEye disclosed that multiple hacking groups had also exploited zero-day in security products from Pulse Secure and SonicWall.

While all these attacks are unrelated, they show a pattern in real-world attacks where threat actors are slowly realizing that security products are as vulnerable as any other software, and, because of the central and privileged position they occupy inside most corporate networks, they are ideal entry points into high-profile targets.


Originally published at https://therecord.media on April 22, 2021.

Comments

Popular posts from this blog

Google can now help you figure out that song stuck in your head - all you have to do is hum (or whistle) into your phone

  Google just launched its “hum to search” feature, which allows users to hum, whistle, or sing for 10–15 seconds in order to identify a song. The feature currently works in 20 languages, and Google hopes to add more. Google has finally launched the perfect feature for when a song is stuck in your head but you don’t know any of the words. “Hum to search” launched today on both the Google app for iOS and Android, according to Google’s blog, The Keyword. Users can also whistle or sing directly into the mic to identify a song. The technology works like this: the user can hum (whistle, or sing) for 10–15 seconds, and then Google’s technology takes the song’s melody and turns it into a numbers-based sequence. From there, the sequence can be used to “identify songs based on a variety of sources, including humans singing, whistling or humming, as well as studio recordings,” according to Google’s announcement. The sequence also strips away any other outside noise, like accompanying instru...

Ransomware's Dangerous New Trick Is Double-Encrypting Your Data

  Ransomware groups have always taken a more-is-more approach . If a victim pays a ransom and then goes back to business as usual-hit them again. Or don’t just encrypt a target’s systems; steal their data first, so you can threaten to leak it if they don’t pay up. The latest escalation? Ransomware hackers who encrypt a victim’s data twice at the same time. Double-encryption attacks have happened before, usually stemming from two separate ransomware gangs compromising the same victim at the same time. But antivirus company Emsisoft says it is aware of dozens of incidents in which the same actor or group intentionally layers two types of ransomware on top of each other. “The groups are constantly trying to work out which strategies are best , which net them the most money for the least amount of effort,” says Emsisoft threat analyst Brett Callow. “So in this approach you have a single actor deploying two types of ransomware. The victim decrypts their data and discovers it’s not act...

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...