Research

Lazarus NPM Supply Chain Attack

Chapter 1: Threat Overview The Lazarus Group uploaded six malicious npm packages intended to infiltrate developer environments, initiating a targeted supply chain attack. These programs, which have been downloaded approximately 330 times, are designed to install backdoors for long-term access, steal cryptocurrency wallets, and steal credentials. Using the typo squatting technique, this attack creates package …

Lazarus NPM Supply Chain Attack Read More »

Black Basta Ransomware

Chapter 1: Key Trends and Outlook Black Basta Ransomware is one of the popular ransomware that began its campaign in April 2022. The first variant of Black Basta was first identified by SentinelOne, and later revealed that Black Basta operates as a ransomware-as-a-service (RaaS). Black Basta is often compared to Conti, and was suspected of …

Black Basta Ransomware Read More »

CVE-2024-10957 Vulnerability in UpdraftPlus Plugin

Description The vulnerability lies in the recursive_unserialized_replace function of the UpdraftPlus plugin. Improper handling of deserialization allows attackers to inject a PHP object if additional plugins or themes containing a Property-Oriented Programming (POP) chain are installed. While no POP chain exists within UpdraftPlus itself, the exploitability depends on the presence of other vulnerable components. Key …

CVE-2024-10957 Vulnerability in UpdraftPlus Plugin Read More »

All About: XZ Utilization Backdoor 2024

Chapter 1: XZ Backdoor: Key Trends and Outlook Red Hat Information Risk and Security and Red Hat Product Security learned that the latestversions of the “xz” tools and libraries contain malicious code that appears to be intended toallow unauthorized access. The xz compression library, a widely-used tool for compressing files,found across Linux distributions, community projects, …

All About: XZ Utilization Backdoor 2024 Read More »