• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
icefire ransomware exploits ibm aspera faspex to attack linux powered enterprise

IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

You are here: Home / General Cyber Security News / IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
March 9, 2023

A earlier recognised Windows-based mostly ransomware strain acknowledged as IceFire has expanded its emphasis to focus on Linux business networks belonging to several media and leisure sector organizations across the world.

The intrusions entail the exploitation of a just lately disclosed deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS rating: 9.8), in accordance to cybersecurity firm SentinelOne.

“This strategic change is a significant move that aligns them with other ransomware groups that also concentrate on Linux techniques,” Alex Delamotte, senior danger researcher at SentinelOne, explained in a report shared with The Hacker Information.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


A greater part of the attacks noticed by SentinelOne have been directed towards organizations found in Turkey, Iran, Pakistan, and the U.A.E., countries that are not ordinarily targeted by organized ransomware crews.

IceFire was very first detected in March 2022 by the MalwareHunterTeam, but it was not until eventually August 2022 that victims were publicized by way of its dark web leak internet site, in accordance to GuidePoint Security, Malwarebytes, and NCC Group.

IceFire Ransomware

The ransomware binary concentrating on Linux is a 2.18 MB 64-bit ELF file that’s put in on CentOS hosts managing a vulnerable variation of IBM Aspera Faspex file server application.

It can be also able of staying away from encrypting selected paths so that the contaminated equipment proceeds to be operational.

WEBINARDiscover the Concealed Risks of 3rd-Party SaaS Apps

Are you mindful of the challenges involved with 3rd-party app accessibility to your firm’s SaaS applications? Join our webinar to understand about the kinds of permissions getting granted and how to minimize risk.

RESERVE YOUR SEAT

“In comparison to Windows, Linux is much more difficult to deploy ransomware against–particularly at scale,” Delamotte claimed. “Several Linux techniques are servers: standard an infection vectors like phishing or push-by obtain are considerably less effective. To get over this, actors turn to exploiting application vulnerabilities.”

The progress comes as Fortinet FortiGuard Labs disclosed a new LockBit ransomware campaign employing “evasive tradecraft” to keep away from detection as a result of .IMG containers that bypass Mark of The Web (MotW) protections.

Discovered this short article attention-grabbing? Adhere to us on Twitter  and LinkedIn to examine a lot more exceptional material we put up.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Understanding the Shared Responsibility Model, Critical Step to Ensure Cloud Security
Next Post: Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware hackers exploiting remote desktop software flaws to deploy plugx malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL

Copyright © TheCyberSecurity.News, All Rights Reserved.