Unit 42(@Unit42_Intel) 's Twitter Profileg
Unit 42

@Unit42_Intel

The latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.

ID:4487645412

linkhttps://unit42.paloaltonetworks.com/ calendar_today07-12-2015 16:30:42

2,3K Tweets

50,7K Followers

88 Following

Unit 42(@Unit42_Intel) 's Twitter Profile Photo

2024-04-30 (Tuesday): We've found several seemingly legitimate websites hosting JavaScript-based . List of associated file hashes for examples of skimmer code and domains used by endpoints collecting the stolen data are available at bit.ly/3Wn4apC

account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Our threat brief on has been substantially updated. Updated sections include Current Scope of the Attack and the section on Operation MidnightEclipse activity. bit.ly/43YOECb

Our threat brief on #CVE20243400 has been substantially updated. Updated sections include Current Scope of the Attack and the section on Operation MidnightEclipse activity. bit.ly/43YOECb
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

We've updated interim guidance as well as new information on coming fixes in our threat brief tracking exploitation of : bit.ly/43YOECb

We've updated interim guidance as well as new information on coming fixes in our threat brief tracking exploitation of #CVE20243400: bit.ly/43YOECb
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Our threat brief on Operation MidnightEclipse, tracking exploitation of , now has new indicators as well as lists of commands seen in exploitation attempts: bit.ly/43YOECb

Our threat brief on Operation MidnightEclipse, tracking exploitation of #CVE20243400, now has new indicators as well as lists of commands seen in exploitation attempts: bit.ly/43YOECb
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

The issue is fixed in hotfix releases of PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. Hotfixes for other commonly deployed maintenance releases will also be made available to address this issue. Details: bit.ly/4awHckb

account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Malicious activity tracked under the campaign is targeting CVE-2024-3400, which exploits a vulnerability in certain versions of PAN-OS software. This threat brief covers mitigations and product protections: bit.ly/3vPUngM

Malicious activity tracked under the campaign #OperationMidnightEclipse is targeting CVE-2024-3400, which exploits a vulnerability in certain versions of PAN-OS software. This threat brief covers mitigations and product protections: bit.ly/3vPUngM
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Sisense is experiencing a security event that may involve the exposure of customer credentials, login details, tokens, and other sensitive data.

If you are a Sisense customer, we recommend rotating all keys, credentials, or other secrets as appropriate. bit.ly/3UeMSsb

Sisense is experiencing a security event that may involve the exposure of customer credentials, login details, tokens, and other sensitive data. If you are a Sisense customer, we recommend rotating all keys, credentials, or other secrets as appropriate. bit.ly/3UeMSsb
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

, a financially-motivated group, is now exploiting both SaaS and CSP environments for data exfiltration. We detail common exploits and tactics seen โ€” showing a pattern analysts can identify. Read more: bit.ly/43VgH5s

#MuddledLibra, a financially-motivated group, is now exploiting both SaaS and CSP environments for data exfiltration. We detail common exploits and tactics seen โ€” showing a pattern analysts can identify. Read more: bit.ly/43VgH5s #CloudThreatLandscape #Cybercrime
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Providing data-rich observations, our researchers break down the scanning patterns, behaviors and technology stack on a noted increase in malware-initiated scanning. Read now: bit.ly/49o4Xta

Providing data-rich observations, our researchers break down the scanning patterns, behaviors and technology stack on a noted increase in malware-initiated scanning. Read now: bit.ly/49o4Xta
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Our telemetry revealed an interesting case of ( ) against a Middle East target: Persistence through scheduled task that runs PowerShell to abuse AutodialDLL registry key. AutodialDLL loads DLL for C2 framework. Details at bit.ly/4aIQDMU

Our telemetry revealed an interesting case of #BoggySerpens (#MuddyWater) against a Middle East target: Persistence through scheduled task that runs PowerShell to abuse AutodialDLL registry key. AutodialDLL loads DLL for C2 framework. Details at bit.ly/4aIQDMU
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

This week on : David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and former Recon Marine, to discuss the value of a military mindset in cybersecurity.

Listen in. bit.ly/3TKVfLF

account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

A vulnerability can be easy to overlook, even though itโ€™s not complex and impact can be high. After discovering BOLA vulnerability CVE-2024-1313 in the open-source software Grafana, a data dashboard visualizer, we analyze our findings. bit.ly/3VyEAgK

A #BOLA vulnerability can be easy to overlook, even though itโ€™s not complex and impact can be high. After discovering BOLA vulnerability CVE-2024-1313 in the open-source software Grafana, a data dashboard visualizer, we analyze our findings. bit.ly/3VyEAgK
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

2024-04-04 (Thursday): We generated an infection in a lab environment based on the latest round of / activity. Initial bank-themed lures started earlier this week on 2024-04-02. Some indicators available at bit.ly/3PQut3r

2024-04-04 (Thursday): We generated an infection in a lab environment based on the latest round of #KoiLoader/#KoiStealer activity. Initial bank-themed lures started earlier this week on 2024-04-02. Some indicators available at bit.ly/3PQut3r #Unit42ThreatIntel
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Two Chinese-linked APTs targeted entities or countries affiliated with ASEAN in March. ( ) distributed using interest in the ASEAN-Australia Special Summit to create lures. The second targeted government infrastructure. bit.ly/3TtqE58

Two Chinese-linked APTs targeted entities or countries affiliated with ASEAN in March. #StatelyTaurus (#MustangPanda) distributed #malware using interest in the ASEAN-Australia Special Summit to create lures. The second targeted government infrastructure. bit.ly/3TtqE58
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Unit 42 has posted a threat brief giving an overview of CVE-2024-3094, a vulnerability in XZ Utils impacting multiple Linux distributions, and how to mitigate it. We will update the threat brief as more info becomes available. Read now: bit.ly/3TVfOq2

Unit 42 has posted a threat brief giving an overview of CVE-2024-3094, a vulnerability in XZ Utils impacting multiple Linux distributions, and how to mitigate it. We will update the threat brief as more info becomes available. Read now: bit.ly/3TVfOq2
account_circle