Article Details

Scrape Timestamp (UTC): 2023-12-27 12:38:40.301

Source: https://thehackernews.com/2023/12/chinese-hackers-exploited-new-zero-day.html

Original Article Text

Click to Toggle View

Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances. Barracuda has revealed that Chinese threat actors exploited a new zero-day in its Email Security Gateway (ESG) appliances to deploy backdoor on a "limited number" of devices. Tracked as CVE-2023-7102, the issue relates to a case of arbitrary code execution that resides within a third-party and open-source library Spreadsheet::ParseExcel that's used by the Amavis scanner within the gateway. The company attributed the activity to a threat actor tracked by Google-owned Mandiant as UNC4841, which was previously linked to the active exploitation of another zero-day in Barracuda devices (CVE-2023-2868, CVSS score: 9.8) earlier this year. Successful exploitation of the new flaw is accomplished by means of a specially crafted Microsoft Excel email attachment. This is followed by the deployment of new variants of known implants called SEASPY and SALTWATER that are equipped to offer persistence and command execution capabilities. Barracuda said it released a security update that has been "automatically applied" on December 21, 2023, and that no further customer action is required. It further pointed out that it "deployed a patch to remediate compromised ESG appliances which exhibited indicators of compromise related to the newly identified malware variants" a day later. It did not disclose the scale of the compromise. That said, the original flaw in the Spreadsheet::ParseExcel Perl module (version 0.65) remains unpatched and has been assigned the CVE identifier CVE-2023-7101, necessitating that downstream users take appropriate remedial action. According to Mandiant, which has been investigating the campaign, a number of private and public sector organizations located in at least 16 countries are estimated to have been impacted since October 2022. The latest development once again speaks to UNC4841's adaptability, leveraging new tactics and techniques to retain access to high priority targets as existing loopholes get closed.

Daily Brief Summary

NATION STATE ACTIVITY // Chinese Hackers Target Barracuda ESG Appliances with Zero-Day Exploit

Chinese threat actors used a zero-day vulnerability in Barracuda Email Security Gateway (ESG) appliances to install backdoors on select systems.

The flaw, tracked as CVE-2023-7102, permits arbitrary code execution via a third-party library used by the Amavis scanner.

The adversary, UNC4841, was also linked to previous exploitation of another zero-day in Barracuda devices.

Attackers used malicious Microsoft Excel email attachments to exploit the vulnerability and deploy persistence-capable malware variants, SEASPY and SALTWATER.

Barracuda has released and automatically applied a security update, with an additional patch for affected appliances, requiring no extra customer actions.

The original vulnerability in the third-party library remains unpatched, posing a risk that requires downstream user attention.

Mandiant has found evidence of impacted private and public sector organizations in at least 16 countries since October 2022.

The persistent adaptability of UNC4841 showcases the group's focus on maintaining access to high-value targets by exploiting new security gaps.