CyberWatch

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

By

Curtis Franklin

By

Access Point Consulting

Software Updates Cause Chaos and Concern

This week, the CyberWatch team dissected the complexities of software updates, starting with Microsoft’s October Windows Security updates. While patching is critical, these updates broke SSH connections on some Windows 11 systems, creating headaches for enterprise and IoT users. Microsoft provided a temporary PowerShell workaround, but this incident serves as a reminder to test patches before deployment.

Meanwhile, Adobe, Zoom, and Google also issued patches addressing a combined total of over 150 vulnerabilities. From Adobe’s updates for creative tools to Zoom’s fixes for input validation flaws, and Chrome’s focus on navigation vulnerabilities, the week highlighted the critical importance of staying up-to-date across platforms.

Malicious Campaigns Target Everything from Spreadsheets to Games

Cybercriminals continued their innovation streak with two major malware strains making waves:

  • Remcos RAT Campaign: Using Excel files disguised as purchase orders, this trojan gives attackers full control over target systems.
  • Windows 4.0 Malware: Evolving from Ghost RAT, this new strain uses gaming apps to infiltrate systems, proving that no digital activity is immune to compromise.

Adding to the chaos, Stelfox Malware emerged, masquerading as crack tools for popular software like AutoCAD and Foxit. Beyond bypassing copy protection, it mines cryptocurrency and steals payment data, signaling a concerning trend in malware diversity.

Supply Chain Attacks Continue to Escalate

Supply chain attacks dominated headlines this week:

  • Landmark Admin Breach: Affecting over 800,000 Liberty Bankers Insurance Group policyholders, this breach exposed sensitive data, including Social Security and financial account numbers.
  • Thompson Coburn Breach: The law firm’s data exposure impacted over 300,000 Presbyterian Healthcare patients, with information spanning medical records to health insurance details.

Both breaches underscore the necessity of securing supply chain participants with multi-factor authentication, encryption, and robust monitoring.

Law Enforcement Strikes Against Malware-as-a-Service

In a rare victory, international law enforcement agencies dismantled the Redline Stealer malware operation and its clone, Meta Stealer. This malware-as-a-service platform sold turnkey solutions to cybercriminals, highlighting the scalability and resilience of modern cybercrime enterprises. While this takedown is a win, the decentralized nature of these operations means the fight is far from over.

Key Takeaways from This Week

  1. Patch with Precision: While updates are essential, poorly implemented patches can cause operational disruptions. Test patches before deploying across systems.
  2. Train Your Team: User education remains a critical defense against sophisticated phishing and malware campaigns.
  3. Fortify Supply Chains: Proactive risk management and secure third-party interactions are non-negotiable in today’s threat landscape.

Listen to the CyberWatch podcast on Spotify and Apple Podcasts, or watch the episode on YouTube.

Resources

Trending Articles & Security Reports

Resources

CyberWatch

October 25, 2024

Ransomware, Supply Chain Attacks, and Nation-State Threats

CyberWatch, by Access Point Consulting, is your weekly source for emerging cybersecurity news, regulatory updates, and threat intelligence. Backed by experts in security consulting, regulatory compliance, and security operations, Access Point enables you to manage cyber risks, respond to incidents, and drive innovation in your company. Read here or on our website; listen on Spotify or Apple Podcasts; or watch on YouTube.website; listen on Spotify or Apple Podcasts; or watch on YouTube. .

Find out more
October 7, 2024

VINs and Losses: How Hackers Take Kias for a Ride

In the age of smart cars and connected devices, convenience often comes with hidden risks. A recently discovered critical vulnerability in Kia vehicles serves as a stark reminder of how our increasingly digital world is making cars new targets for cyberattacks. This vulnerability allowed hackers to remotely control various vehicle functions—using nothing more than a car's license plate number. It highlights the growing threat of cyberattacks on connected cars and the importance of cybersecurity in the automotive industry.

Find out more
October 3, 2024

Vulnerability in SolarWinds Managed File Transfer Server Actively Exploited

CVE-2024-28995 SolarWinds has issued a critical update for a zero-day vulnerability in its Serv-U MFT Server, allowing attackers to bypass security and access restricted files without authentication. Actively exploited, this flaw poses a significant risk for businesses that delay applying the fix.

Find out more