Article Details

Scrape Timestamp (UTC): 2023-12-14 06:32:46.968

Source: https://thehackernews.com/2023/12/new-hacker-group-gambleforce-tageting.html

Original Article Text

Click to Toggle View

New Hacker Group 'GambleForce' Tageting APAC Firms Using SQL Injection Attacks. A previously unknown hacker outfit called GambleForce has been attributed to a series of SQL injection attacks against companies primarily in the Asia-Pacific (APAC) region since at least September 2023. "GambleForce uses a set of basic yet very effective techniques, including SQL injections and the exploitation of vulnerable website content management systems (CMS) to steal sensitive information, such as user credentials," Singapore-headquartered Group-IB said in a report shared with The Hacker News. The group is estimated to have targeted 24 organizations in the gambling, government, retail, and travel sectors across Australia, Brazil, China, India, Indonesia, the Philippines, South Korea, and Thailand. Six of these attacks were successful. Traditional security measures won't cut it in today's world. It's time for Zero Trust Security. Secure your data like never before. The modus operandi of GambleForce is its exclusive reliance on open-source tools like dirsearch, sqlmap, tinyproxy, and redis-rogue-getshell at different stages of the attacks with the ultimate goal of exfiltrating sensitive information from compromised networks. Also used by the threat actor is the legitimate post-exploitation framework known as Cobalt Strike. Interestingly, the version of the tool discovered on its attack infrastructure used commands in Chinese, although the group's origins are far from clear. The attack chains entail the abuse of victims' public-facing applications of victims by exploiting SQL injections as well as the exploitation of CVE-2023-23752, a medium-severity flaw in Joomla CMS, to gain unauthorized access to a Brazilian company. It's currently not known how GambleForce leverages the stolen information. The cybersecurity firm said it also took down the adversary's command-and-control (C2) server and notified the identified victims. "Web injections are among the oldest and most popular attack vectors," Nikita Rostovcev, senior threat analyst at Group-IB, said. "And the reason being is that sometimes developers overlook the importance of input security and data validation. Insecure coding practices, incorrect database settings, and outdated software create a fertile environment for SQL injection attacks on web applications."

Daily Brief Summary

CYBERCRIME // GambleForce Hacker Group Attacks APAC Companies via SQL Injection

A new hacker group named GambleForce has been targeting Asia-Pacific firms with SQL injection attacks since September 2023.

The threat actor targets the gambling, government, retail, and travel sectors, successfully breaching six out of 24 organizations.

GambleForce employs basic but effective tactics, utilizing tools like dirsearch, sqlmap, tinyproxy, and redis-rogue-getshell and a Chinese version of the legitimate Cobalt Strike framework.

They exploit vulnerable CMS and public-facing applications, including a known flaw in Joomla CMS, to steal sensitive user data.

The origins of GambleForce are unclear, but the group has been using Chinese commands within their tools.

Group-IB, a cybersecurity firm, has taken down GambleForce's command-and-control server and alerted affected victims.

The article emphasizes the importance of secure coding practices and the ongoing risks of SQL injection attacks due to developers overlooking input security and data validation.