CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Image credit by Pixabay
06/01/2023

New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner

VTA-00430 – New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner A new Linux malware developed using the shell script compiler (shc) has been observed deploying a cryptocurrency miner on compromised systems. It is presumed that after successful authentication through …

Read More
Cyber100 Cohort 3 Site Visit
14/12/2022

Empowering the Cybersecurity and Cloud Security Industry Together

Empowering the Cybersecurity and Cloud Security Industry Together We are thrilled and humbled to have Cyber100 Cohort 3 committee members (NACSA, MDEC, MAMPU, MCMC, MyDigital EPU KKOMM) to visit our office yesterday. We did not see this visit as sales …

Read More
Image credit by Pixabay
06/12/2022

APT Actor Spread AppleJeus Malware Disguised as Cryptocurrency Apps

VTA-00429 – APT Actor Spread AppleJeus Malware Disguised as Cryptocurrency Apps The Lazarus Group threat actor has been observed leveraging fake cryptocurrency apps as a lure to deliver a previously undocumented version of the AppleJeus malware, according to new findings …

Read More
New Browser-in-the-Browser (BitB) Attack Steal User Credentials
06/12/2022

New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability (CVE-2022-4262)

VTA-00428 – New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability (CVE-2022-4262) Recently, Google has released an out-of-band security update to fix a new actively exploited zero-day flaw in its Chrome web browser. The high-severity flaw, tracked as CVE-2022-4262, concerns …

Read More
LockFile Ransomware Hijacks Windows Domain
29/11/2022

“Bleed You” Campaign Exploiting RCE Vulnerability in Windows Internet Key Exchange (CVE-2022-34721)

VTA-00427 – “Bleed You” Campaign Exploiting RCE Vulnerability in Windows Internet Key Exchange (CVE-2022-34721) The cybersecurity researcher from CYFIRMA discovered several exploits that are currently in use that target the Windows Internet Key Exchange (IKE) Protocol Extensions and more than …

Read More

Case Study