id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
310
It would be inefficient for an administrator to travel to a physical office to make a change on a system, but its critical that organizations take control over these applications.
[]
[]
[]
311
The first step is identifying them in your network.
[]
[]
[]
312
Palo Alto Networks currently tracks 90 different remote-access applications in Applipedia.
[ { "id": 45786, "label": "SOFTWARE", "start_offset": 79, "end_offset": 89 }, { "id": 44692, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
313
Examples include Remote Desktop Protocol (RDP), Virtual Network Connection (VNC), TeamViewer, and even Secure Shell (SSH), to name a few.
[ { "id": 1072, "label": "attack-pattern", "start_offset": 18, "end_offset": 41 }, { "id": 1075, "label": "tools", "start_offset": 83, "end_offset": 93 }, { "id": 1073, "label": "tools", "start_offset": 43, "end_offset": 46 }, { "id": 46010, "label": "tools", "start_offset": 104, "end_offset": 122 }, { "id": 46011, "label": "tools", "start_offset": 49, "end_offset": 81 } ]
[]
[]
314
Once you can identify the traffic, you need to separate the good from the bad.
[]
[]
[]
315
If your company runs Windows and relies on RDP, you can close off VNC, TeamViewer and the other 87 applications because you don’t need them.
[ { "id": 44693, "label": "SOFTWARE", "start_offset": 21, "end_offset": 28 }, { "id": 44694, "label": "tools", "start_offset": 43, "end_offset": 46 }, { "id": 44695, "label": "tools", "start_offset": 66, "end_offset": 69 }, { "id": 44696, "label": "tools", "start_offset": 71, "end_offset": 81 } ]
[]
[]
316
If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users.
[ { "id": 46013, "label": "SOFTWARE", "start_offset": 100, "end_offset": 103 }, { "id": 46012, "label": "SOFTWARE", "start_offset": 64, "end_offset": 67 } ]
[]
[]
317
The key is putting a policy in place and making sure your technology is enforcing that policy at the network layer.
[]
[]
[]
318
The Backoff and Citadel reports from last week highlight how uncontrolled remote access broadens your attack surface and acts as a backdoor for attackers already in your network.
[ { "id": 1095, "label": "malware", "start_offset": 5, "end_offset": 12 }, { "id": 1097, "label": "malware", "start_offset": 17, "end_offset": 24 } ]
[]
[]
319
Remote-access abuse is not a new problem.
[ { "id": 46014, "label": "attack-pattern", "start_offset": 0, "end_offset": 19 } ]
[]
[]
320
We’ve been highlighting the importance of controlling this threat since 2009, but five years later it remains an issue for many organizations.
[ { "id": 46015, "label": "TIME", "start_offset": 66, "end_offset": 76 } ]
[]
[]
321
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
322
Please mark, I'm not a robot!
[]
[]
[]
323
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
324
The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control.
[ { "id": 44699, "label": "malware", "start_offset": 50, "end_offset": 64 }, { "id": 44700, "label": "tools", "start_offset": 117, "end_offset": 120 } ]
[ { "id": 14, "from_id": 44699, "to_id": 44700, "type": "uses" } ]
[]
325
F-Secure was the first to spot this new version on October 1, but since then the attacks have ramped up and new variants of the malware are emerging daily.
[ { "id": 46017, "label": "TIME", "start_offset": 52, "end_offset": 61 }, { "id": 46016, "label": "identity", "start_offset": 1, "end_offset": 9 } ]
[]
[]
326
Our WildFire analysis platform has picked up 84 CryptoWall 2.0 variants since September 30, delivered primarily through e-mail attachments but also through malicious PDFs and web exploit kits.
[ { "id": 1120, "label": "tools", "start_offset": 4, "end_offset": 12 }, { "id": 46018, "label": "malware", "start_offset": 48, "end_offset": 62 }, { "id": 46019, "label": "TIME", "start_offset": 78, "end_offset": 90 } ]
[]
[]
327
CryptoWall 2.0 is similar to other ransomware attacks that have plagued users and businesses for nearly a decade.
[ { "id": 44701, "label": "malware", "start_offset": 1, "end_offset": 15 } ]
[]
[]
328
Once it is running on a system, CryptoWall 2.0 seeks out document files and encrypts them using the RSA encryption algorithm.
[ { "id": 46020, "label": "malware", "start_offset": 32, "end_offset": 46 } ]
[]
[]
329
The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network.
[ { "id": 46021, "label": "malware", "start_offset": 134, "end_offset": 149 }, { "id": 46022, "label": "tools", "start_offset": 216, "end_offset": 219 }, { "id": 46023, "label": "Infrastucture", "start_offset": 172, "end_offset": 203 } ]
[ { "id": 145, "from_id": 46021, "to_id": 46022, "type": "uses" }, { "id": 144, "from_id": 46021, "to_id": 46023, "type": "beacons-to" } ]
[]
330
This allows attackers to hide their communications and avoid having their C2 servers shut down, but also makes it easy for organizations to block the threat.
[]
[]
[]
331
CryptoWall isn’t the only threat that communicates over Tor and if your network doesn’t have an explicit reason to allow anonymization networks, you should consider blocking the application altogether with your firewall.
[ { "id": 1138, "label": "malware", "start_offset": 0, "end_offset": 10 }, { "id": 1140, "label": "tools", "start_offset": 56, "end_offset": 59 } ]
[ { "id": 147, "from_id": 1138, "to_id": 1140, "type": "uses" } ]
[]
332
If your system has already been infected with CryptoWall 2.0, you’ll see a pop-up just like this one shortly after the malware has encrypted your documents.
[ { "id": 46024, "label": "malware", "start_offset": 47, "end_offset": 61 } ]
[]
[]
333
Note that the attacker has given you a few options for how to pay them the ransom.
[]
[]
[]
334
The green box contains four links that will work only for your system.
[]
[]
[]
335
These use four domains registered just today:
[]
[]
[]
336
All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “[email protected]”.
[ { "id": 1156, "label": "IPV4", "start_offset": 41, "end_offset": 56 }, { "id": 46025, "label": "location", "start_offset": 60, "end_offset": 67 }, { "id": 44703, "label": "EMAIL", "start_offset": 138, "end_offset": 162 } ]
[ { "id": 148, "from_id": 1156, "to_id": 44703, "type": "related-to" } ]
[]
337
This is the same address used to register two other payment domains registered earlier this month:
[]
[]
[]
338
If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin.
[ { "id": 46026, "label": "malware", "start_offset": 57, "end_offset": 67 }, { "id": 46027, "label": "tools", "start_offset": 103, "end_offset": 114 }, { "id": 46028, "label": "DOMAIN", "start_offset": 137, "end_offset": 159 }, { "id": 46029, "label": "SOFTWARE", "start_offset": 194, "end_offset": 205 }, { "id": 46031, "label": "SOFTWARE", "start_offset": 303, "end_offset": 310 }, { "id": 46030, "label": "malware", "start_offset": 257, "end_offset": 267 } ]
[ { "id": 149, "from_id": 46026, "to_id": 46027, "type": "related-to" }, { "id": 150, "from_id": 46026, "to_id": 46028, "type": "related-to" } ]
[]
339
To pay the ransom the user will need to acquire 1.33 BitCoins and transfer them to a specific BitCoin wallet that is associated with their specific infection.
[ { "id": 44704, "label": "SOFTWARE", "start_offset": 53, "end_offset": 61 }, { "id": 44705, "label": "SOFTWARE", "start_offset": 94, "end_offset": 101 } ]
[]
[]
340
History has shown that paying the ransom will likely allow you to retrieve your files, but the best defense against ransomware is having up-to-date back-ups or by preventing the infection all-together.
[]
[]
[]
341
Since we detected the first CryptoWall 2.0 variant with our WildFire engine on September 29, we’ve seen over 85,000 separate attacks attempting to deliver the malware.
[ { "id": 1185, "label": "malware", "start_offset": 61, "end_offset": 69 }, { "id": 46032, "label": "TIME", "start_offset": 80, "end_offset": 92 }, { "id": 46033, "label": "malware", "start_offset": 29, "end_offset": 43 } ]
[]
[]
342
The majority of these have come through e-mails with executable attachments, sometimes contained in .zip files.
[]
[]
[]
343
Most of the e-mail attacks used fake invoice, fax and voicemail themes with attachments named like the following:
[]
[]
[]
344
In the last week we’ve seen the attack vectors evolve to contain exploit kits as well.
[]
[]
[]
345
On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0.
[ { "id": 44706, "label": "TIME", "start_offset": 3, "end_offset": 13 }, { "id": 44707, "label": "malware", "start_offset": 137, "end_offset": 151 }, { "id": 44708, "label": "vulnerability", "start_offset": 69, "end_offset": 82 }, { "id": 44709, "label": "malware", "start_offset": 90, "end_offset": 114 }, { "id": 44710, "label": "threat-actor", "start_offset": 19, "end_offset": 26 } ]
[ { "id": 15, "from_id": 44707, "to_id": 44708, "type": "exploits" }, { "id": 16, "from_id": 44709, "to_id": 44707, "type": "delivers" }, { "id": 17, "from_id": 44710, "to_id": 44709, "type": "authored-by" } ]
[]
346
Yesterday we picked up an e-mail campaign pretending to be a fax report that carried a .zip attachment with a PDF inside.
[ { "id": 46034, "label": "campaign", "start_offset": 27, "end_offset": 42 } ]
[]
[]
347
The PDF exploits CVE-2013-2729 to download a binary which also installed CryptoWall 2.0.
[ { "id": 46035, "label": "malware", "start_offset": 74, "end_offset": 88 }, { "id": 46036, "label": "vulnerability", "start_offset": 18, "end_offset": 31 } ]
[ { "id": 151, "from_id": 46035, "to_id": 46036, "type": "exploits" } ]
[]
348
The best way to protect yourself against ransomware is to keep up-to-date backups of your important files.
[]
[]
[]
349
A ransomware infection, which encrypts all of your files, is similar to a drive failure, except that for a small fee you have the chance to get your files back.
[]
[]
[]
350
To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 46038, "label": "SOFTWARE", "start_offset": 79, "end_offset": 91 }, { "id": 46039, "label": "vulnerability", "start_offset": 145, "end_offset": 158 }, { "id": 46037, "label": "malware", "start_offset": 20, "end_offset": 34 }, { "id": 46041, "label": "vulnerability", "start_offset": 92, "end_offset": 143 } ]
[ { "id": 152, "from_id": 46037, "to_id": 46039, "type": "exploits" } ]
[]
351
Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
352
Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160).
[ { "id": 46042, "label": "TIME", "start_offset": 0, "end_offset": 9 }, { "id": 46043, "label": "identity", "start_offset": 11, "end_offset": 21 }, { "id": 46044, "label": "location", "start_offset": 55, "end_offset": 59 }, { "id": 46045, "label": "identity", "start_offset": 93, "end_offset": 123 }, { "id": 46047, "label": "vulnerability", "start_offset": 196, "end_offset": 209 }, { "id": 46046, "label": "vulnerability", "start_offset": 162, "end_offset": 194 } ]
[]
[]
353
CHS’s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014.
[ { "id": 46048, "label": "identity", "start_offset": 0, "end_offset": 3 }, { "id": 46049, "label": "TIME", "start_offset": 20, "end_offset": 26 }, { "id": 46050, "label": "TIME", "start_offset": 178, "end_offset": 184 }, { "id": 46051, "label": "TIME", "start_offset": 188, "end_offset": 200 } ]
[]
[]
354
TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.
[ { "id": 44711, "label": "identity", "start_offset": 0, "end_offset": 10 }, { "id": 44712, "label": "vulnerability", "start_offset": 113, "end_offset": 137 }, { "id": 44713, "label": "tools", "start_offset": 167, "end_offset": 170 }, { "id": 44714, "label": "attack-pattern", "start_offset": 60, "end_offset": 82 } ]
[ { "id": 18, "from_id": 44714, "to_id": 44712, "type": "exploits" } ]
[]
355
We need more facts to be sure, but this instance may be the first public breach related to the Heartbleed vulnerability since it was announced in April.
[ { "id": 46052, "label": "TIME", "start_offset": 147, "end_offset": 152 }, { "id": 46053, "label": "vulnerability", "start_offset": 96, "end_offset": 120 } ]
[]
[]
356
Now, over four months since the Heartbleed disclosure, this attack reminds us of how serious this vulnerability is and how critical protection against it remains.
[ { "id": 46054, "label": "vulnerability", "start_offset": 32, "end_offset": 42 } ]
[]
[]
357
As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.
[ { "id": 44716, "label": "attack-pattern", "start_offset": 38, "end_offset": 51 }, { "id": 44715, "label": "vulnerability", "start_offset": 4, "end_offset": 14 } ]
[ { "id": 153, "from_id": 44715, "to_id": 44716, "type": "targets" } ]
[]
358
In this case, that apparently included VPN credentials, which they then used to log into the network and more laterally from system to system until discovering the data they were after.
[ { "id": 46055, "label": "SOFTWARE", "start_offset": 39, "end_offset": 42 } ]
[]
[]
359
While most vendors released patches for their products months ago it remains up to the users and administrators to ensure those patches are deployed.
[]
[]
[]
360
As the OpenSSL library is so widely used, some administrators may be finding unpatched systems for years to come.
[ { "id": 44717, "label": "SOFTWARE", "start_offset": 7, "end_offset": 22 } ]
[]
[]
361
While network-based defenses are not a substitute for patching software, Heartbleed is detectable using IPS signatures.
[ { "id": 46056, "label": "vulnerability", "start_offset": 73, "end_offset": 83 } ]
[]
[]
362
Palo Alto Networks deployed five signatures in April to defend against this threat, 40039, 36420, 36419, 36418 and 36416.
[ { "id": 46057, "label": "identity", "start_offset": 0, "end_offset": 18 }, { "id": 46058, "label": "TIME", "start_offset": 47, "end_offset": 52 } ]
[]
[]
363
No matter how well patched your systems are, there’s no reason not to deploy IPS signatures like these to detect and block attempted Heartbleed exploits.
[ { "id": 44718, "label": "vulnerability", "start_offset": 134, "end_offset": 144 } ]
[]
[]
364
If you’ve already deployed signatures and your logs are showing attempted exploits, consider blocking or monitoring the IP addresses sending the requests.
[]
[]
[]
365
A Heartbleed probe could be evidence of the early stages of an attack on your network, and persistent attackers are unlikely to give up after jiggling the handle on the front door.
[ { "id": 46059, "label": "vulnerability", "start_offset": 2, "end_offset": 12 } ]
[]
[]
366
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
367
Please mark, I'm not a robot!
[]
[]
[]
368
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
369
This post is also available in: 日本語 (Japanese) On June 2, Volexity reported that over Memorial Day weekend, they identified suspicious activity on two internet-facing servers running Atlassian’s Confluence Server application.
[ { "id": 44719, "label": "TIME", "start_offset": 56, "end_offset": 63 }, { "id": 44720, "label": "identity", "start_offset": 64, "end_offset": 72 }, { "id": 44721, "label": "SOFTWARE", "start_offset": 189, "end_offset": 211 } ]
[]
[]
370
After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center.
[ { "id": 46061, "label": "vulnerability", "start_offset": 95, "end_offset": 130 }, { "id": 46063, "label": "SOFTWARE", "start_offset": 134, "end_offset": 167 }, { "id": 46062, "label": "identity", "start_offset": 34, "end_offset": 42 } ]
[ { "id": 154, "from_id": 46063, "to_id": 46061, "type": "has" } ]
[]
371
The details were reported to Atlassian on May 31, and Atlassian has since assigned the issue to CVE-2022-26134.
[ { "id": 46064, "label": "TIME", "start_offset": 42, "end_offset": 48 }, { "id": 46065, "label": "identity", "start_offset": 29, "end_offset": 38 }, { "id": 46066, "label": "identity", "start_offset": 54, "end_offset": 63 }, { "id": 46067, "label": "vulnerability", "start_offset": 96, "end_offset": 110 } ]
[]
[]
372
Based on the security advisory issued by Atlassian, it appears that the exploit is indeed an unauthenticated, remote code execution vulnerability.
[ { "id": 44723, "label": "identity", "start_offset": 42, "end_offset": 51 }, { "id": 44724, "label": "attack-pattern", "start_offset": 111, "end_offset": 132 } ]
[]
[]
373
If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.
[ { "id": 46068, "label": "attack-pattern", "start_offset": 55, "end_offset": 76 }, { "id": 46069, "label": "attack-pattern", "start_offset": 81, "end_offset": 99 } ]
[]
[]
374
At the time of publication, the Palo Alto Networks attack surface management solution Cortex Xpanse identified 19,707 instances of Confluence Servers that are potentially affected by this CVE.
[ { "id": 46070, "label": "identity", "start_offset": 32, "end_offset": 50 }, { "id": 46072, "label": "SOFTWARE", "start_offset": 131, "end_offset": 149 }, { "id": 46071, "label": "SOFTWARE", "start_offset": 86, "end_offset": 99 } ]
[]
[]
375
A patch resolving the issue has been posted by Atlassian.
[ { "id": 44725, "label": "SOFTWARE", "start_offset": 48, "end_offset": 57 } ]
[]
[]
376
Palo Alto Networks strongly advises organizations to patch immediately.
[ { "id": 46073, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
377
Updated June 7 to add additional in-the-wild observations.
[ { "id": 46074, "label": "TIME", "start_offset": 9, "end_offset": 15 } ]
[]
[]
378
Vulnerable Systems CVE-2022-26134 in the Wild Cortex Managed Threat Hunting Detections of CVE-2022-26134
[ { "id": 44726, "label": "vulnerability", "start_offset": 19, "end_offset": 33 }, { "id": 44727, "label": "SOFTWARE", "start_offset": 46, "end_offset": 52 }, { "id": 44728, "label": "vulnerability", "start_offset": 90, "end_offset": 104 } ]
[]
[]
379
Conclusion Indicators of Compromise
[]
[]
[]
380
The Palo Alto Networks attack surface management solution Cortex Xpanse found 19,707 instances of Confluence Servers that are potentially affected by this CVE.
[ { "id": 46075, "label": "identity", "start_offset": 4, "end_offset": 22 }, { "id": 46077, "label": "SOFTWARE", "start_offset": 98, "end_offset": 116 }, { "id": 46076, "label": "SOFTWARE", "start_offset": 58, "end_offset": 71 } ]
[]
[]
382
Additionally, the Xpanse research team also found 1,251 end-of-life versions of the Confluence Server exposed on the public internet.
[ { "id": 46080, "label": "SOFTWARE", "start_offset": 85, "end_offset": 102 }, { "id": 46079, "label": "identity", "start_offset": 19, "end_offset": 39 } ]
[]
[]
383
Assets running end-of-life software should never be internet-facing.
[]
[]
[]
384
If an asset cannot be updated to secure versions of software, it should be isolated or decommissioned altogether.
[]
[]
[]
385
To learn more about the ubiquitous problem of end-of-life software, please refer to the 2022 Cortex Xpanse Attack Surface Threat Report.
[ { "id": 46081, "label": "TIME", "start_offset": 88, "end_offset": 92 }, { "id": 46082, "label": "SOFTWARE", "start_offset": 93, "end_offset": 106 } ]
[]
[]
386
Thus far, Unit 42 has noted historical scans being performed by the IP addresses publicly shared by Volexity.
[ { "id": 46084, "label": "identity", "start_offset": 101, "end_offset": 109 }, { "id": 46083, "label": "identity", "start_offset": 11, "end_offset": 18 } ]
[]
[]
387
These scans date back as early as May 26, 2022, and target organizations in various industries.
[ { "id": 44733, "label": "TIME", "start_offset": 34, "end_offset": 46 } ]
[]
[]
388
Additionally, a purported proof of concept (PoC) has reached the public domain, increasing the threat this particular vulnerability poses.
[]
[]
[]
389
The Cortex Managed Threat Hunting team has detected several exploitation attempts.
[ { "id": 46085, "label": "identity", "start_offset": 5, "end_offset": 39 } ]
[]
[]
390
Among the attempts, we found successful exploitation, which resulted in the Cerber Ransomware attack.
[ { "id": 44734, "label": "campaign", "start_offset": 76, "end_offset": 100 } ]
[]
[]
391
The ransomware was blocked by the Cortex XDR agent.
[ { "id": 46086, "label": "SOFTWARE", "start_offset": 36, "end_offset": 52 } ]
[]
[]
392
The Managed Threat Hunting team immediately reported this incident to the customer and continues to monitor our customers using the XQL queries in the following section.
[ { "id": 46088, "label": "SOFTWARE", "start_offset": 132, "end_offset": 135 }, { "id": 46087, "label": "identity", "start_offset": 4, "end_offset": 31 } ]
[]
[]
393
Cortex XDR also includes multiple detections for post-exploitation activities.
[ { "id": 44735, "label": "SOFTWARE", "start_offset": 0, "end_offset": 10 }, { "id": 44736, "label": "attack-pattern", "start_offset": 49, "end_offset": 77 } ]
[]
[]
394
Below are details of what was seen in the attempt.
[]
[]
[]
395
In this case, the process tomcat.exe spawned multiple reconnaissance commands such as: whoami, systeminfo, arp, ipconfig, etc. On top of that, a Base64-encoded PowerShell command was executed and retrieved a ransomware binary.
[ { "id": 46091, "label": "tools", "start_offset": 97, "end_offset": 107 }, { "id": 46092, "label": "tools", "start_offset": 109, "end_offset": 113 }, { "id": 46094, "label": "attack-pattern", "start_offset": 148, "end_offset": 181 }, { "id": 46089, "label": "FILEPATH", "start_offset": 28, "end_offset": 38 }, { "id": 46090, "label": "tools", "start_offset": 89, "end_offset": 95 }, { "id": 46093, "label": "tools", "start_offset": 114, "end_offset": 122 } ]
[]
[]
396
In order to confirm the assumption that the above activity is related to CVE-2022-26134, we looked into the Confluence Apache access logs (atlassian-confluence.log) and found the PowerShell execution. The Cortex Managed Threat Hunting team continues to track any attempts to exploit CVE-2022-26134 across our customers, using Cortex XDR and the XQL queries below.
[ { "id": 44737, "label": "vulnerability", "start_offset": 74, "end_offset": 88 }, { "id": 44738, "label": "vulnerability", "start_offset": 285, "end_offset": 299 }, { "id": 44739, "label": "SOFTWARE", "start_offset": 207, "end_offset": 214 }, { "id": 44740, "label": "SOFTWARE", "start_offset": 328, "end_offset": 338 }, { "id": 44741, "label": "SOFTWARE", "start_offset": 109, "end_offset": 119 }, { "id": 44742, "label": "SOFTWARE", "start_offset": 120, "end_offset": 126 }, { "id": 44743, "label": "tools", "start_offset": 180, "end_offset": 190 }, { "id": 44744, "label": "FILEPATH", "start_offset": 140, "end_offset": 164 }, { "id": 44745, "label": "tools", "start_offset": 347, "end_offset": 350 } ]
[]
[]
397
Palo Alto Networks provides protection against the exploitation of this vulnerability in the following ways: Additionally, Xpanse has the ability to identify and detect Atlassian Confluence Servers that may be a part of your attack surface or the attack surface of third-party partners connected to your organization.
[ { "id": 46095, "label": "identity", "start_offset": 1, "end_offset": 19 }, { "id": 46096, "label": "SOFTWARE", "start_offset": 125, "end_offset": 131 }, { "id": 46097, "label": "SOFTWARE", "start_offset": 171, "end_offset": 199 } ]
[]
[]
398
Xpanse is even able to classify those servers which have not been upgraded to the most recent version.
[ { "id": 46098, "label": "SOFTWARE", "start_offset": 0, "end_offset": 6 } ]
[]
[]
399
These abilities will be updated to detect additional instances or versions that are insecure against this CVE.
[]
[]
[]
400
Existing Xpanse customers can log into Expander and identify their enumerated Atlassian Confluence devices by filtering by “Atlassian Confluence Server” in the Services tab.
[ { "id": 46099, "label": "SOFTWARE", "start_offset": 10, "end_offset": 16 }, { "id": 46101, "label": "SOFTWARE", "start_offset": 125, "end_offset": 152 }, { "id": 46100, "label": "SOFTWARE", "start_offset": 79, "end_offset": 99 } ]
[]
[]
401
As further information emerges or additional detections and protections are put into place, Palo Alto Networks will update this publication accordingly.
[ { "id": 46102, "label": "identity", "start_offset": 93, "end_offset": 111 } ]
[]
[]
402
During the hunting process, we encountered exploitation attempts that originated from the following IP addresses: Updated June 13, 2022, at 5:30 a.m. PT.
[ { "id": 44746, "label": "TIME", "start_offset": 123, "end_offset": 153 } ]
[]
[]
403
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
404
Please mark, I'm not a robot!
[]
[]
[]
405
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
406
Overview
[]
[]
[]
407
As shoppers and retailers gear up for the 2017 holiday season, they need to be aware of a new kind of cybersecurity threat they may face this year: unauthorized coin mining.
[ { "id": 46104, "label": "attack-pattern", "start_offset": 148, "end_offset": 172 }, { "id": 46103, "label": "TIME", "start_offset": 42, "end_offset": 61 } ]
[]
[]
408
Unauthorized coin mining is a new threat that can affect retailers and shoppers in a way that could impact or even halt their online shopping experience.
[ { "id": 44747, "label": "attack-pattern", "start_offset": 1, "end_offset": 25 } ]
[]
[]
409
A recent Unit 42 threat intelligence posting on the topic showed how 63 percent of the unauthorized coin mining sites we found came online in October 2017.
[ { "id": 46105, "label": "identity", "start_offset": 9, "end_offset": 16 }, { "id": 46106, "label": "TIME", "start_offset": 142, "end_offset": 154 } ]
[]
[]
410
This surge in unauthorized coin mining is driven, in large part, by the recent skyrocketing in the value of digital currencies like bitcoin.
[ { "id": 46107, "label": "SOFTWARE", "start_offset": 133, "end_offset": 140 }, { "id": 46108, "label": "attack-pattern", "start_offset": 15, "end_offset": 39 } ]
[]
[]