Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Malicious Code. Show all posts

WhatsApp Image Scam Uses Steganography to Steal User Data and Money

 

With over three billion users globally, including around 500 million in India, WhatsApp has become one of the most widely used communication platforms. While this immense popularity makes it convenient for users to stay connected, it also provides fertile ground for cybercriminals to launch increasingly sophisticated scams. 

A recent alarming trend involves the use of steganography—a technique for hiding malicious code inside images—enabling attackers to compromise user devices and steal sensitive data. A case from Jabalpur, Madhya Pradesh, brought this threat into the spotlight. A 28-year-old man reportedly lost close to ₹2 lakh after downloading a seemingly harmless image received via WhatsApp. The image, however, was embedded with malware that secretly installed itself on his phone. 

This new approach is particularly concerning because the file looked completely normal and harmless to the user. Unlike traditional scams involving suspicious links or messages, this method exploits a far subtler form of cyberattack. Steganography is the practice of embedding hidden information inside media files such as images, videos, or audio. In this scam, cybercriminals embed malicious code into the least significant bits of image data or in the file’s metadata—areas that do not impact the visible quality of the image but can carry executable instructions. These altered files are then distributed via WhatsApp, often as forwarded messages. 

When a recipient downloads or opens the file, the embedded malware activates and begins to infiltrate the device. Once installed, the malware can harvest a wide range of personal data. It may extract saved passwords, intercept one-time passwords, and even facilitate unauthorized financial transactions. What makes this form of attack more dangerous than typical phishing attempts is its stealth. Because the malware is hidden within legitimate-looking files, it often bypasses detection by standard antivirus software, especially those designed for consumer use. Detecting and analyzing such threats typically requires specialized forensic tools and advanced behavioral monitoring. 

In the Jabalpur case, after downloading the infected image, the malware gained control over the victim’s device, accessed his banking credentials, and enabled unauthorized fund transfers. Experts warn that this method could be replicated on a much larger scale, especially if users remain unaware of the risks posed by media files. 

As platforms like WhatsApp continue working to enhance security, users must remain cautious and avoid downloading media from unfamiliar sources. In today’s digital age, even an innocent-looking image can become a tool for cyber theft.

Cyberattackers Use JPG Files to Deploy Ransomware Undetected

 


Several cybersecurity experts have recently identified a worrying evolution in ransomware tactics. These actors are now concealing and deploying fully undetectable ransomware payloads using JPEG images, resulting in an outbreak of completely undetectable ransomware. It is a major advance in the methodology of cyberattacks, as it provides threat actors with a way of bypassing conventional antivirus systems as well as signature-based malware detection tools with alarming ease, thereby creating a significant advance in cyberattack methodology. 

With this new method of ransomware delivery, harmful code is embedded within seemingly harmless image files, which are widely trusted, frequently shared, and rarely examined by users or basic security tools. This new method is quite different from traditional ransomware delivery methods. As soon as users open these doctored images, the embedded ransomware starts working. This could compromise entire systems without triggering standard security warnings. 

Cybersecurity researchers discovered this method by monitoring high-level, stealthy-oriented ransomware campaigns. The findings reveal a sophisticated exploitation strategy that indicates a dangerous change in the threat landscape and is a warning that needs to be addressed. By exploiting the inherent trust in commonly used file types such as JPGs, cybercriminals are exploiting a blind spot in existing defence mechanisms, putting individuals, organisations, and infrastructures at increased risk. 

It is evident from this development that there is a critical need for more advanced, behaviour-based threat detection systems and increased user awareness, since traditional security tools may no longer be sufficient to combat such sophisticated and covert attacks. In the exploit, there is an astonishingly sophisticated, multi-stage attack chain that uses common file formats as a means of evading traditional security systems without detection. 

An inherent component of this strategy is that malicious code is embedded within a JPEG image file, which serves to convey the message silently to an unsuspecting user. When the compromised image is opened, a concealed "loader" is activated, which launches the development of the ransomware process. During Stage One, a stager script is activated, which is hidden within the image file as a means to open the door for the further stages of the attack. This stage script acts as an initial foothold that will prepare the system for the remaining phases. 

There is a second stage of the ransomware infection where the stager reaches out to a remote command-and-control server to download the actual executable that contains the ransomware. There are three stages of ransomware execution. In this stage, the ransomware payload is systematically encrypting the victim's files and demanding payment for decryption, which can be done in cryptocurrencies. 

A unique feature of this attack is the innovative way in which it employs a dual-file delivery method, which consists not only of the tainted JPG image but also of a decoy file, normally a PDF or Word document. As these two files contain both malicious components, antivirus programs find it extremely difficult to detect them. Traditional security software rarely correlates the activities of separate file formats, which allows the exploit to operate undetected by conventional security software. 

Additionally, the payload's advanced obfuscation and encryption techniques have proved to be extremely effective in evading over 90% of known antivirus engines, further complicating detection efforts. By doing so, most of the endpoint protection solutions in use at the moment are effectively invisible to this malware. Besides exploiting the inherent trust users place in familiar formats like JPGs and documents, the attack also relies on social engineering to gain entry into the system. 

There is a high probability that targets will open the files without suspicion, which is why the success of the attack is greatly increased. It is particularly alarming to see how simple and effective the method is. Cybercriminals need only two files to execute a full-scale ransomware attack, making it possible for them to target large targets rapidly with minimal effort. According to a cybersecurity researcher who examined the exploit under the pseudonym Aux Grep, the tactic is "a zero-day-grade attack with 60% success." This indicates that shortly, more polished versions of this exploit will be developed that will be even more dangerous. 

To combat increasingly covert and complex threats, proactive defensive measures and ongoing evolution of cybersecurity strategies are necessary. This insight emphasises how imperative it is for cybersecurity measures to be developed and evolved. Organisations must stay ahead of adversaries by combining advanced detection technologies with informed human vigilance to thrive in an increasingly hostile digital landscape. 

The emergence of ransomware attacks concealed within benign-looking image files is not merely a technical anomaly—it is a clear signal that cyberthreats are evolving in complexity and cunning. Organisations can no longer rely on reactive security measures or outdated assumptions about attack vectors in an environment where the line between legitimate and malicious content continues to blur. To navigate this shifting threat landscape, cybersecurity must be approached as a dynamic, continuous process—one that integrates intelligent automation, rigorous user education, and robust response protocols. 

Decision-makers must invest in cybersecurity not as a compliance necessity, but as a core pillar of operational resilience. From revisiting email attachment policies and revising digital hygiene protocols to deploying real-time threat intelligence and incident response systems, the imperative is clear: defence must evolve faster than the threats themselves. Moreover, fostering a security-first culture—where vigilance is embedded at every level of the organisation—is no longer optional. 

As attackers increasingly weaponise trust and familiarity, even routine file interactions must be viewed through a more critical, informed lens. In the face of adversaries who adapt quickly and operate with surgical precision, success will belong to those who are not only prepared but proactively positioned to detect, contain, and neutralise threats before they manifest as damage. The JPG-based ransomware tactic may be one of the latest threats, but it will not be the last. Organisations that act decisively today will be far better equipped to face the unknowns of tomorrow. 

Defending Against JPEG-Based Ransomware Attacks: Key Strategies for Organisations 


Cybercriminals are increasingly exploiting trusted file formats like JPEGs to spread sophisticated ransomware, putting a lot of pressure on cyber experts to ensure that proactive and layered defence strategies are in place. Various technical safeguards, policy measures, and user awareness initiatives can be used to mitigate the risks posed by these stealthy attack vectors. This can be accomplished by combining technical precautions with policy measures. 

1. Enable Full File Extension Visibility

It is possible to prevent the threat of malware in a simple but effective way by configuring systems to display the full file extension by default. By providing insight into the complete file name, users can avoid mistakenly opening malicious content and identify deceptive files, for example, those that appear to be images, but contain executable payloads (e.g., “photo.jpg.exe”).

2. Behaviour-Based Threat Detection

 In the age of emerging threats that utilise obfuscation and encryption, traditional antivirus solutions, which are based on signature databases, are increasingly ineffective. As a result, organisations should consider investing in advanced endpoint detection and response (EDR) solutions that use behaviour-based analysis in their organisation. SentinelOne, Huntress, and CrowdStrike Falcon can be used to identify unusual activity patterns and halt attacks before damages are caused–even when a threat was previously unknown. 

3. Isolate and Analyse Suspicious Files

Users must open all attachments to their email particularly ones from unverified sources or unexpected sources, in an isolated or sandboxed environment. By taking this precaution, it will prevent potentially malicious content from reaching critical infrastructure or sensitive data, which will reduce the risk of lateral movement and widening infection within a network.

4. Maintain Regular, Versioned Backups 

A frequent, versioned backup of the data-whether it is stored offline or in a secure cloud environment, is extremely vital for protecting users against ransomware. Organisations must regularly test backup integrity and make sure recovery procedures are clearly defined if a ransomware attack occurs. Having clean backups will help organisations recover quickly without falling victim to ransom demands. 

5. Prioritise Employee Awareness and Phishing Prevention

As a result of human error, companies continue to encounter social engineering attack vectors like phishing emails and suspicious attachments, even when they appear to be from familiar sources. Employees should be trained regularly to recognise such tactics, including phishing emails and suspicious files. The first line of defence against ransomware intrusions is an informed workforce. 

As a result of the wave of image-based ransomware that has been circulating around the world, threat actors have taken advantage of universally trusted file types to bypass traditional defence systems. It is estimated that ransomware damages worldwide will reach $300 billion by the year 2025 (approximately 25 lakh crore), which highlights the urgency for developing a comprehensive and multi-layered cybersecurity posture. 

To thrive in an increasingly hostile digital environment, organisations must utilise advanced detection technologies combined with informed human vigilance to stay ahead of their adversaries. Increasingly, ransomware attacks that are concealed within benign-looking image files are not just a technical anomaly; they are a sign that cyberthreats are becoming more sophisticated and cunning and more sophisticated. 

Increasingly, organisations are finding that the line between legitimate and malicious content has become increasingly blurred. Therefore, organisations should no longer rely solely on reactive security measures or outdated assumptions about attack vectors. A dynamic, continuous cybersecurity process must be implemented to navigate this shifting threat landscape - one that integrates intelligent automation, rigorous user education, and robust response protocols - to effectively respond to threats.

The decision-makers must recognise that cybersecurity is not just a compliance requirement, but rather one of the key pillars of operational resilience. Defences must evolve faster than the threats themselves, so they need to revisit email attachment policies, revise digital hygiene protocols, and deploy real-time threat intelligence and incident response systems. As a result, it is now imperative for organisations to establish a culture of security first, in which vigilance is embedded at every level of their organisation. 

Increasingly, attackers are weaponising trust and familiarity, forcing even routine file interactions to be viewed from a critical, informed perspective. As adversaries who adapt rapidly and operate with surgical precision continue to grow in strength, success will be determined by those who are prepared, proactively positioned, and able to detect, contain, and neutralise threats before they become a real threat. It may be one of the latest threats-but it won't be the last. Organisations that maintain a proactive posture today will be positioned far better to deal with all of the unknowns that may arise in the future.

Agentic AI and Ransomware: How Autonomous Agents Are Reshaping Cybersecurity Threats

 

A new generation of artificial intelligence—known as agentic AI—is emerging, and it promises to fundamentally change how technology is used. Unlike generative AI, which mainly responds to prompts, agentic AI operates independently, solving complex problems and making decisions without direct human input. While this leap in autonomy brings major benefits for businesses, it also introduces serious risks, especially in the realm of cybersecurity. Security experts warn that agentic AI could significantly enhance the capabilities of ransomware groups. 

These autonomous agents can analyze, plan, and execute tasks on their own, making them ideal tools for attackers seeking to automate and scale their operations. As agentic AI evolves, it is poised to alter the cyber threat landscape, potentially enabling more efficient and harder-to-detect ransomware attacks. In contrast to the early concerns raised in 2022 with the launch of tools like ChatGPT, which mainly helped attackers draft phishing emails or debug malicious code, agentic AI can operate in real time and adapt to complex environments. This allows cybercriminals to offload traditionally manual processes like lateral movement, system enumeration, and target prioritization. 

Currently, ransomware operators often rely on Initial Access Brokers (IABs) to breach networks, then spend time manually navigating internal systems to deploy malware. This process is labor-intensive and prone to error, often leading to incomplete or failed attacks. Agentic AI, however, removes many of these limitations. It can independently identify valuable targets, choose the most effective attack vectors, and adjust to obstacles—all without human direction. These agents may also dramatically reduce the time required to carry out a successful ransomware campaign, compressing what once took weeks into mere minutes. 

In practice, agentic AI can discover weak points in a network, bypass defenses, deploy malware, and erase evidence of the intrusion—all in a single automated workflow. However, just as agentic AI poses a new challenge for cybersecurity, it also offers potential defensive benefits. Security teams could deploy autonomous AI agents to monitor networks, detect anomalies, or even create decoy systems that mislead attackers. 

While agentic AI is not yet widely deployed by threat actors, its rapid development signals an urgent need for organizations to prepare. To stay ahead, companies should begin exploring how agentic AI can be integrated into their defense strategies. Being proactive now could mean the difference between falling behind or successfully countering the next wave of ransomware threats.

Magento Extension Supply Chain Attack Backdoors Hundreds of E-Commerce Sites

 

A coordinated supply chain attack has compromised between 500 and 1,000 Magento-based e-commerce websites through 21 backdoored extensions, according to new research from cybersecurity firm Sansec. The breach affected sites globally, including the one being operated by a multinational corporation valued at $40 billion.  

Sansec revealed that malicious code was injected into the extensions as far back as 2019. However, it remained inactive until April 2025, when attackers remotely activated the malware and seized control of vulnerable servers. “Multiple vendors were hacked in a coordinated supply chain attack,” Sansec reported. “Curiously, the malware was injected six years ago, but came to life this week.” 

The compromised extensions originate from well-known Magento vendors Tigren, Meetanshi, and MGS. Affected extensions include: Tigren: Ajaxsuite, Ajaxcart, Ajaxlogin, Ajaxcompare, Ajaxwishlist, MultiCOD Meetanshi: ImageClean, CookieNotice, Flatshipping, FacebookChat, CurrencySwitcher, DeferJS MGS: Lookbook, StoreLocator, Brand, GDPR, Portfolio, Popup, DeliveryTime, ProductTabs, Blog.

Additionally, a version of the Weltpixel GoogleTagManager extension was found with similar code, though Sansec could not verify whether the source was the vendor or an already-infected site. The malware was embedded in files named License.php or LicenseApi.php — components that typically manage license validation for the extensions. The backdoor listens for HTTP requests containing special parameters like requestKey and dataSign. 

When matched against hardcoded keys, it grants attackers access to admin-level functionality, including the ability to upload files. These files can then be executed through PHP’s include_once() function, opening the door for data theft, credit card skimming, admin account creation, and complete server control. Earlier variants of the backdoor didn’t require any authentication. 

However, recent versions now rely on a static key for limited protection. Sansec confirmed that this method was used to deploy a web shell on at least one client’s server. When alerted, vendor responses varied. MGS did not respond. Tigren denied any security breach and reportedly continues to distribute the compromised code. Meetanshi acknowledged a server intrusion but denied their extensions were affected. 

BleepingComputer independently verified the presence of the backdoor in the MGS StoreLocator extension, which is still available for download. Sansec recommends that any site using the listed extensions immediately conduct full server scans and review indicators of compromise. 

Ideally, websites should be restored from a verified, clean backup. The security firm also highlighted the unusual delay between the malware’s insertion and its activation, suggesting the attack was carefully planned over a long timeline. An expanded investigation is ongoing.

Ransomware Attackers Are Weaponizing PHP Flaw to Infect Web Servers

 

Security researchers revealed that ransomware attackers have swiftly turned a simple-to-exploit PHP programming language vulnerability—which allows malicious code to be executed on web servers—into a weapon. 

As of Thursday last week, Censys' Internet scans had found 1,000 servers infected with the TellYouThePass ransomware strain, down from 1,800 on Monday. The servers, which are largely based in China, no longer display their typical content; instead, many list the site's file directory, which shows that all files have a.locked extension, indicating that they have been encrypted. The accompanying ransom note demands around $6,500 in exchange for the decryption key. 

The vulnerability, identified as CVE-2024-4577 and assigned a severity rating of 9.8 out of 10, results from flaws in PHP's conversion of Unicode characters to ASCII. Best Fit, a feature integrated into Windows, enables attackers to utilise argument injection to turn user-supplied data into characters that send malicious commands to the main PHP application. Exploits enable attackers to circumvent CVE-2012-1823, a significant code execution vulnerability addressed in PHP in 2012. 

CVE-2024-4577 only affects PHP when it is run in CGI mode, which involves a web server parsing HTTP requests and passing them to a PHP script for processing. Even if PHP is not configured to use CGI mode, the vulnerability may still be exploitable if PHP executables such as php.exe and php-cgi.exe are located in directories accessible to the web server. This setup is fairly uncommon, with the exception of the XAMPP platform, which includes it by default. An extra requirement appears to be that the Windows locale, which is used to personalise the OS to the user's local language, be set to Chinese or Japanese. 

The critical vulnerability was made public on June 6, along with a security fix. The attackers were exploiting it within 24 hours to install TellYouThePass, Imperva researchers disclosed last week. The exploits ran malware that exploited the Windows binary mshta.exe to launch an HTML application hosted on an attacker-controlled server. The use of the programme revealed a strategy known as living off the land, in which attackers employ native OS features and tools to blend in with routine, non-malicious behaviour.

In a post published Friday, Censys researchers stated that the TellYouThePass gang's exploitation began on June 7 and mirrored previous incidents in which opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of affected servers have IP addresses in China, Taiwan, Hong Kong, or Japan, most likely because Chinese and Japanese localities are the only ones verified to be vulnerable, Censys researchers noted in an email.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI or XAMPP service stops responding—hence the drop in detected infections,” researchers added. “Another point to consider is that there are currently no observed ransom payments to the only Bitcoin address listed in the ransom notes (source). Based on these facts, our intuition is that this is likely the result of those services being decommissioned or going offline in some other manner.”

New DLL Search Order Hijacking Variant Evades Windows 10 and 11 Protections

 

Security researchers have outlined a fresh variant of a dynamic link library (DLL) search order hijacking technique, potentially enabling threat actors to circumvent security measures and execute malicious code on computers running Microsoft Windows 10 and Windows 11.

The new method, disclosed in a report by cybersecurity firm Security Joes and exclusively shared with The Hacker News, exploits executables commonly present in the trusted WinSxS folder, utilizing the classic DLL search order hijacking technique. By doing so, adversaries can avoid the need for elevated privileges when attempting to run malicious code on a compromised system, introducing potentially vulnerable binaries into the attack chain.

DLL search order hijacking involves manipulating the search order used to load DLLs, allowing the execution of malicious payloads for purposes such as defense evasion, persistence, and privilege escalation. This technique targets applications that do not specify the full path to required libraries, relying on a predefined search order to locate DLLs on disk.

Threat actors exploit this behavior by relocating legitimate system binaries into non-standard directories that contain malicious DLLs, named after legitimate ones. This tricks the system into loading the attack code-containing library instead of the authentic one.

The unique aspect introduced by Security Joes focuses on files within the trusted "C:\Windows\WinSxS" folder. WinSxS, short for Windows side-by-side, is a crucial Windows component used for OS customization and updates to ensure compatibility and integrity.

According to Ido Naor, co-founder and CEO of Security Joes, the discovery diverges from traditional cyber attack methods, providing a more subtle and stealthy exploitation technique. The strategy involves identifying vulnerable binaries in the WinSxS folder and combining them with DLL search order hijacking methods. This entails strategically placing a custom DLL with the same name as a legitimate DLL into an actor-controlled directory, triggering code execution when executing a vulnerable file in the WinSxS folder.

Security Joes emphasized the potential for additional binaries in the WinSxS folder susceptible to this DLL search order hijacking, urging organizations to take precautions. They recommended examining parent-child relationships between processes, particularly focusing on trusted binaries, and closely monitoring activities performed by binaries in the WinSxS folder, including network communications and file operations.

How Can Developers Win the Data Security Battle?

 


In IT organizations, chief information officers (CIOs) rank security as their top challenge as being one of their biggest weaknesses. It is estimated that 82% of companies are vulnerable to cyber threats in their own software supply chains. 

Because security threats continue to change and become increasingly sophisticated, developers must work closely with security teams. It is done to ensure the development lifecycle is managed effectively throughout the whole process. This is so that all measures are taken to ensure security is baked in from the ground up. 

Several factors, including this and others, have contributed to the emergence of cybersecurity as an issue that is becoming more expensive. A recently released report by McKinsey & Company predicted that in 2025, cybercrime would be worth approximately $10.5 trillion worldwide, an increase of 300% over today's figure. Meanwhile, governments all over the globe are taking note of the risks associated with the software supply chain by assessing the risks. There have been several cyber performance goals set by the Cybersecurity and Infrastructure Security Agency (CISA) to protect critical infrastructure across the country as part of its cyber performance goals. It appears, for now, that these guidelines may serve as a foundation for federal regulations if they are voluntary. There is evidence to support this, but for now, they are voluntary. 

It is encouraging to see that a positive trend is brewing, but as of now, there is one group increasingly strengthening its position on the front lines of defense when it comes to data security: software developers. 

Software Supply Chain Security: Four Pillars 

There is a responsibility placed on security teams within their organizations to do whatever they can to protect the data of their company. Software supply chain attacks have been increasing in number and method over the past few years due to the increasing volume and nature of these attacks. Policies need to be enforced across a wide range of operations, in addition, security teams are also expected to implement best practices and compliance standards across these operations. As a result, many organizations have had their supply chain teams overworked, resulting in a "downhill" effect on development teams, who inevitably have been called to resolve and strengthen many of the many supply chain issues that have become backlogs in the process of supply chain integration. 

Unfortunately, most organizations cannot afford to have a person devoted solely to DevSecOps, and there are not enough leaders or engineers who can do so. Due to this fact, it is becoming increasingly common for security and development teams to work together. This is because they include security from the start of the development of applications and processes, thereby ensuring a secure product for users. 

Developers are now playing an increasingly critical role in the fight against data breaches, which means they have four things they need to keep in mind in their efforts to secure the software supply chain in this day and age: 

Increasing the Emphasis on Software Packages

Software packages can simply be described as modules of code that are put together to form a complete application at their most basic level. Among malicious actors today, one of the most common strategies that they employ is to attack compromised packages that include more than just source code - these compromised packages might contain sensitive keys, configuration files, or other aspects that can make a company vulnerable to their attacks. 

To be able to detect issues within packages that cannot be detected solely by source code alone, developers must have both the tools and knowledge required. A full understanding of potential exploits will allow them to be able to determine the full impact of their introduction. 

Knowing the Context in Which Software Operates

In addition to developing software packages, developers must learn and understand the context within which software operates to best protect it from harm. Particularly, they must identify and recognize the misuse of open-source libraries, the ongoing insecurity of services, the exposure of secrets, as well as issues with infrastructure-as-code configurations (IACs). A vulnerability in the application must then be identified to determine whether it is appropriate for them and whether they are likely to exploit it. 

An application's configuration, use of authentication mechanisms, and exposure of keys can all make a difference as to whether common vulnerabilities and exposures (CVEs) can be exploited and exploited successfully. Along with the security team, developers should ensure that the libraries, services, daemons, and IAC they rely on within a software supply chain, such as on-premises, in the cloud, and at the edge, are not misused or misconfigured, regardless of where they are located. 

Assure That all Processes and Tools are Secure

In an ideal situation, all the artifacts and repositories that are needed to support a development project should be managed in one place, creating an all-encompassing point of truth for the organization. The process of securing a product becomes a natural part of the development process when the development team has control over everything in their portfolio - this single source of facts becomes a single source of trust. 

DevOps requirements and tools require and incorporate security as part of their design and implementation when they are managed correctly. It is the goal of the project to unify, accelerate, and secure the delivery of software from the development stage to the deployment stage. Teams involved in the security set policies and strategies, followed by teams involved in development resolving, or managing any codebase issues. A workflow that works for core DevOps teams does not just work for security and developer teams. Instead, it has to work for all teams, whether it is an infrastructure team, an integration team, a release team, or a flow team.

Preventing the Exploitation of Vulnerabilities

To detect vulnerabilities that can be exploited, most organizations should partner with a third-party or open-source community, which has advanced research experience, to assist them in uncovering them before they are exploited by attackers. As a result, businesses can make quick decisions to combat upcoming attacks as they become commonplace in their line of business. This in turn enables them to update databases rapidly with contextual analysis that mimics the work of researchers. 

Innovation Through Facilitation

Security needs to be implemented across the entire development process of an application to allow developers to actually develop. This means that if they follow the strategies above, they won’t spend all their time dealing with security issues that they do not understand. Instead, they can get their work done. In this way, they can solve vulnerabilities easier and faster and make sure that they are fixing everything that is wrong with the vulnerabilities. There is no doubt that security is a real and vital concern. However, to win, organizations must make it a priority throughout the entire software supply chain rather than just in the IT department. This allows developers to develop more innovative software, which in turn allows the business to move forward and innovate.

All You Need to Know About the Cisco Command-Injection Bug


A security flaw has been discovered in Cisco gear used in data centers, large enterprises, industrial facilities, and smart city power grids that could give hackers unrestricted access to these devices and wider networks. 

Trellix researchers, in a report published on February 1st reveals the bug, one of two flaws discovered, impacts the following Cisco networking devices: 

  • Cisco ISR 4431 routers 
  • 800 Series Industrial ISRs 
  • CGR1000 Compute Modules
  • IC3000 Industrial Compute Gateways 
  • IOS XE-based devices configured with IOx 
  • IR510 WPAN Industrial Routers 
  • Cisco Catalyst Access points 

One bug — CSCwc67015 — was discovered in code which is not yet released. Apparently, it has the capability to allow hackers to execute their own code, and possibly replace the majority of the files on the device. 

The second bug (allegedly more malicious) — CVE-2023-20076 — found in production equipment, is a command-injection vulnerability which could enable unauthorized access and remote code execution (RCE). Despite Cisco's barriers against such a situation, this would have required not only complete control of a device's operating system but also persistence through any upgrades or reboots. 

According to Trellix, since Cisco networking equipment is being operated around the globe in data centers, enterprises, and government organizations, including its most common footprints at industrial facilities, this makes the impact of the vulnerabilities more significant. 

“In the world of routers, switches, and networking, Cisco is the current king of the market[…]We would say that thousands of businesses could potentially be impacted,” says Sam Quinn, senior security researcher with the Trellix Advanced Research Center. 

The Latest Cisco Security Flaws 

According to Trellix, the two flaws are a result of a shift in how routing technology work. On these miniature-server-routers, network administrators may now install application containers or even entire virtual systems. Along with great functionality, this increased complexity will also lead to a broader attack surface. 

"Modern routers now function like high-powered servers[…]with many Ethernet ports running not only routing software but, in some cases, even multiple containers," the authors of the report explained. 

Both CSCwc67015 and CVE-2023-20076 roots from the router's advanced application hosting environment. 

In terms of CSCwc67015, "a maliciously packed programme could bypass a vital security check while uncompressing the uploaded application" in the hosting environment. The study aimed to safeguard the system from CVE-2007-4559, a 15-year-old path traversal vulnerability in a Python module that Trellix itself had discovered in September. 

The flaw CVE-2023-20076, however, also makes use of the Cisco routers' support for virtual machines and application containers. In this particular case, it has to do with how admins pass commands to start their applications. 

The researchers identified that the 'DHCP Client ID' option inside the Interface Settings was not properly being sanitized, granting them root-level access to the device and enabling them to "inject any OS command of our choosing." 

Adding to this, the authors of the report highlight how "Cisco heavily prioritizes security in a way that attempts to prevent an attack from remaining a problem through reboots and system resets." 

However, they showed in a proof-of-concept video how the command-injection problem might be exploited to gain total access, enabling a malicious container to withstand device reboots or firmware updates. There are now only two options for removal: doing a complete factory reset or manually identifying and eradicating the malicious code. 

Furthermore, in a concluding remark, the Trellix researchers have advised organizations to watch out for any suspicious containers installed on relevant Cisco devices, and recommended that companies that do not operate containers to disactivate the IOx container framework completely. 

They highlighted that "organizations with impacted devices should update to the newest firmware immediately" as being the most crucial step to follow. 

Moreover, users are advised to apply the patch as soon as possible, in order to protect themselves from the vulnerabilities.