Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of February 7, 2022
  • Cyber Attacks
  • Malware
  • Vulnerabilities

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of February 7, 2022

4 years ago Andrew Swoboda
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of February 7, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of February 7, 2022. I’ve also included some comments on these stories.

Mac Trojan Comes with Expanded Ability to Drop Secondary Payloads

As reported by Dark Reading, security researchers analyzed a new variant of UpdateAgent and observed that attackers have modified the Mac trojan’s ability to drop additional payloads hosted on public cloud infrastructure. They found that it doesn’t choose between .ZIP archives and mountable disk images for distributing its secondary payloads. Instead, this version comes with the ability to use both attack channels.

Andrew Swoboda | Senior Security Researcher at Tripwire

The UpdateAgent malware that targets Mac has been updated to do more than just drop adware. This malware first surfaced in September of 2020. According to researcher at Microsoft it has been found to contain expanded functionality. It looks like this malware now contains Adload, a Trojan, that contains the functionality for installing unwated applications and additional ad loaders.

New Windows Terminal Version Can Automatically Run Profiles as Administrator

Microsoft has released a new version of the Windows Terminal that can automatically launch profiles as Administrator. According to Bleeping Computer, users can configure Windows Terminal Preview 1.13 to open a profile in an Admin terminal window automatically. Alternatively, they can hold CTRL while clicking on the profile name.

Andrew Swoboda | Senior Security Researcher at Tripwire

Windows Terminal now has the ability to automatically run as an administrator. This feature allows users to launch terminals as an administrator without manually launching the terminal.

Microsoft Moving Forward with WMIC Phase-out

On February 10, Bleeping Computer wrote that Microsoft will begin removing the Windows Management Instrumentation Command-line (WMIC) tool. This phase-out process, which will begin with the latest Windows 11 preview builds in the Dev channel, will deprecate wmic.exe only. It will not affect WMI or the ability to query Windows Management Instrumentation using Windows PowerShell.

Andrew Swoboda | Senior Security Researcher at Tripwire

Microsoft’s removal of WMIC comes to no surprise because they have been pushing PowerShell for a while. By default, PowerShell scripts are not signed are disabled. This means that to execute any scripts, users will need to execute code directly or find a way to bypass that restriction.

Malware Distributors Look to regsvr32.exe for New Attacks

Ever heard of “Squiblydoo?” It’s not a typo. It’s an older attack technique where nefarious individuals use regsvr32.exe to distribute malware through a Word document. As it turns out, malware distributors associated with the Qbot and Lokibot operations are picking up this tactic once again, per Bleeping Computer’s reporting.

Andrew Swoboda | Senior Security Researcher at Tripwire

There has been a increase in the use of regsvr32.exe by malware. regsvr32.exe is used to register and de-register OLEs in the registry. The main method of delivery is through phishing campaigns. Users have to be convinced to click on malicous documents.

Keep in Touch with Tripwire VERT

Want more insights from Tripwire VERT before our next cybersecurity news roundup comes out? Subscribe to our newsletter here.

Previous VERT Cybersecurity News Roundups

  • January 31, 2022
  • January 24, 2022
  • January 17, 2022
  • September 27, 2021

The post ” Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of February 7, 2022″ appeared first on TripWire

Source:TripWire – Andrew Swoboda

Tags: Cloud, Malware, Microsoft, Phishing, TripWire

Continue Reading

Previous Critical Security Flaws Reported in Moxa MXview Network Management Software
Next Spanish Police Arrest SIM Swappers Who Stole Money from Victims Bank Accounts

More Stories

  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

[Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Most Remediation Programs Never Confirm the Fix Actually Worked

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE
  • Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
  • Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
  • [Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)
  • Most Remediation Programs Never Confirm the Fix Actually Worked

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT