• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
icefire ransomware exploits ibm aspera faspex to attack linux powered enterprise

IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

You are here: Home / General Cyber Security News / IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
March 9, 2023

A earlier recognised Windows-based mostly ransomware strain acknowledged as IceFire has expanded its emphasis to focus on Linux business networks belonging to several media and leisure sector organizations across the world.

The intrusions entail the exploitation of a just lately disclosed deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS rating: 9.8), in accordance to cybersecurity firm SentinelOne.

“This strategic change is a significant move that aligns them with other ransomware groups that also concentrate on Linux techniques,” Alex Delamotte, senior danger researcher at SentinelOne, explained in a report shared with The Hacker Information.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


A greater part of the attacks noticed by SentinelOne have been directed towards organizations found in Turkey, Iran, Pakistan, and the U.A.E., countries that are not ordinarily targeted by organized ransomware crews.

IceFire was very first detected in March 2022 by the MalwareHunterTeam, but it was not until eventually August 2022 that victims were publicized by way of its dark web leak internet site, in accordance to GuidePoint Security, Malwarebytes, and NCC Group.

IceFire Ransomware

The ransomware binary concentrating on Linux is a 2.18 MB 64-bit ELF file that’s put in on CentOS hosts managing a vulnerable variation of IBM Aspera Faspex file server application.

It can be also able of staying away from encrypting selected paths so that the contaminated equipment proceeds to be operational.

WEBINARDiscover the Concealed Risks of 3rd-Party SaaS Apps

Are you mindful of the challenges involved with 3rd-party app accessibility to your firm’s SaaS applications? Join our webinar to understand about the kinds of permissions getting granted and how to minimize risk.

RESERVE YOUR SEAT

“In comparison to Windows, Linux is much more difficult to deploy ransomware against–particularly at scale,” Delamotte claimed. “Several Linux techniques are servers: standard an infection vectors like phishing or push-by obtain are considerably less effective. To get over this, actors turn to exploiting application vulnerabilities.”

The progress comes as Fortinet FortiGuard Labs disclosed a new LockBit ransomware campaign employing “evasive tradecraft” to keep away from detection as a result of .IMG containers that bypass Mark of The Web (MotW) protections.

Discovered this short article attention-grabbing? Adhere to us on Twitter  and LinkedIn to examine a lot more exceptional material we put up.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Understanding the Shared Responsibility Model, Critical Step to Ensure Cloud Security
Next Post: Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware hackers exploiting remote desktop software flaws to deploy plugx malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.