Article Details
Scrape Timestamp (UTC): 2023-12-27 11:52:21.610
Original Article Text
Click to Toggle View
Barracuda fixes new ESG zero-day exploited by Chinese hackers. Network and email security firm Barracuda says it remotely patched all active Email Security Gateway (ESG) appliances on December 21 against a zero-day bug exploited by UNC4841 Chinese hackers. The company deployed a second wave of security updates a day later on already compromised ESG appliances where the attackers deployed SeaSpy and Saltwater malware. Disclosed on Christmas Eve and tracked as CVE-2023-7102, the zero-day is due to a weakness in the Spreadsheet::ParseExcel third-party library used by the Amavis virus scanner running on Barracuda ESG appliances. Attackers can exploit the flaw to execute arbitrary code on unpatched ESG appliances through parameter injection. The company also filed the CVE-2023-7101 CVE ID to track the bug separately in the open-source library, which is still awaiting a patch. "No action is required by customers at this time, and our investigation is ongoing," Barracuda said in an advisory issued on December 24. "Barracuda, working in collaboration with Mandiant, assesses this activity is attributable to continued operations of the China nexus actor tracked as UNC4841." Second wave of zero-day attacks this year In May, the same hacker group used another zero-day (CVE-2023-2868) to target Barracuda ESG appliances as part of a cyber-espionage campaign. Barracuda revealed the zero-day had been abused in attacks for at least seven months, since at least October 2022, to deploy previously unknown malware and exfiltrate data from compromised systems. They deployed SeaSpy and Saltwater malware and the SeaSide malicious tool to gain remote access to hacked systems via reverse shells. Submarine (aka DepthCharge) and Whirlpool malware was deployed in the same attacks as later-stage payloads to maintain persistence to a small number of previously compromised devices on networks of high-value targets. The attackers' motivation was espionage, with UNC4841 hackers engaging in targeted exfiltration from breached networks to high-profile government and high-tech users. Almost a third of appliances hacked in the May campaign belonged to government agencies, most of them between October and December 2022, according to cybersecurity firm Mandiant. Barracuda warned customers after the May attacks that they must replace all compromised appliances immediately, even those they had already patched (around 5% of all appliances were breached in the attacks). Barracuda says more than 200,000 organizations worldwide use its products, including top companies like Samsung, Kraft Heinz, Mitsubishi, and Delta Airlines.
Daily Brief Summary
Barracuda Networks remotely patched a zero-day vulnerability affecting Email Security Gateway appliances, targeted by the Chinese hacker group UNC4841.
The vulnerability, tracked as CVE-2023-7102, is a result of a flaw in the Spreadsheet::ParseExcel library used by Amavis virus scanner in the company's appliances.
Attackers executed arbitrary code on unpatched devices by exploiting this flaw through parameter injection.
A second set of security updates was deployed to tackle the SeaSpy and Saltwater malware found on compromised ESG appliances.
The CVE-2023-7101 CVE ID was created to track the associated bug within the third-party library, which is yet to be patched.
Barracuda's investigation into the breach is ongoing, in collaboration with security firm Mandiant, pointing to the activities of the UNC4841 hacker group, suspected for espionage.
The espionage campaign had been operational since at least October 2022, leading to targeted data exfiltration from government and high-tech sectors.
Barracuda advised customers to replace all compromised appliances after a similar attack in May, and currently serves over 200,000 organizations globally.