Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
WSUS Exploited to Deploy Skuld Infostealer; BIND 9 DNS Flaw PoC Released
Advertisements

WSUS Vulnerability Exploited for Malware Distribution

Security researchers have reported on a recent attack campaign where a vulnerability in Windows Server Update Services (WSUS) was actively exploited to deliver malware. Attackers leveraged compromised WSUS servers to push malicious updates to connected endpoints within corporate networks. This method allowed the threat actors to bypass traditional security measures by using a legitimate and trusted update mechanism.

The payload delivered in this campaign was identified as the Skuld infostealer, a variant of the Amadey botnet. Once installed, the Skuld malware is designed to exfiltrate sensitive information from compromised systems. Data targeted by the infostealer includes browser credentials, cryptocurrency wallet details, system information, and other valuable data that is then sent to an attacker-controlled command-and-control server.

Proof-of-Concept Published for BIND 9 Vulnerability

In a separate development, a proof-of-concept (PoC) exploit was publicly released for a critical vulnerability in the BIND 9 Domain Name System (DNS) software. The flaw, if exploited, could allow a remote attacker to trigger a denial-of-service (DoS) condition, causing the named service to terminate unexpectedly. The availability of a public PoC increases the risk of exploitation as it provides a clear roadmap for attackers to replicate the attack.

The Internet Systems Consortium (ISC), the developer of BIND 9, had previously released security advisories and patched versions to address the vulnerability. System administrators managing BIND 9 servers were urged to apply the necessary updates to mitigate the threat demonstrated by the now-public exploit code. The flaw impacts multiple versions of the widely used DNS software.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading