December 2023's Most Wanted Malware- The Resurgence of Qbot

Last month, Qbot malware was employed by cybercriminals as part of a limited-scale phishing attack targeting organizations in the hospitality sector.
Seeing Qbot in the wild less than four months after its distribution infrastructure was dismantled is a reminder that while we can disrupt malware campaigns, the actors behind them will adapt with new technologies.
Formbook harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to orders from its C&C. Nanocore - Nanocore is a Remote Access Trojan that targets Windows operating system users and was first observed in the wild in 2013.
All versions of the RAT contain basic plugins and functionalities such as screen capture, crypto currency mining, remote control of the desktop and webcam session theft.
This malware sends out information about the targeted system to a remote server.
NJRat - NJRat is a remote accesses Trojan, targeting mainly government agencies and organizations in the Middle East.
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.
Web Servers Malicious URL Directory Traversal - There exists a directory traversal vulnerability on different web servers.
The vulnerability is due to an input validation error in a web server that does not properly sanitize the URI for the directory traversal patterns.
Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.
Zyxel ZyWALL Command Injection - A command injection vulnerability exists in Zyxel ZyWALL. Successful exploitation of this vulnerability would allow remote attackers to execute arbitrary OS commands in the effected system.
A remote attacker can exploit this issue by sending a specially crafted request to the victim.
The vulnerability is due to incorrect web server configuration.
A remote attacker can exploit this vulnerability by sending a specially crafted URL to an affected PHP page.
MVPower CCTV DVR Remote Code Execution- A remote code execution vulnerability exists in MVPower CCTV DVR. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.
Successful exploitation of this vulnerability would allow remote attackers to obtain sensitive information and gain unauthorized access to the affected system.
OpenSSL TLS DTLS Heartbeat Information Disclosure - OpenSSL TLS DTLS Heartbeat Information Disclosure An information disclosure vulnerability exists in OpenSSL. The vulnerability, aka Heartbleed, is due to an error when handling TLS/DTLS heartbeat packets.
HTTP Headers Remote Code Execution - HTTP headers let the client and the server pass additional information with an HTTP request.
A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine.
D-Link Multiple Products Remote Code Execution - A remote code execution vulnerability exists in multiple D-Link products.


This Cyber News was published on blog.checkpoint.com. Publication date: Tue, 09 Jan 2024 14:13:31 +0000


Cyber News related to December 2023's Most Wanted Malware- The Resurgence of Qbot