CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

New Browser-in-the-Browser (BitB) Attack Steal User Credentials
24/03/2022

New Browser-in-the-Browser (BitB) Attack Steals User Credentials

VTA-00410 – New Browser-in-the-Browser (BitB) Attack Steals User Credentials Recently, there is new way to trick targets into coughing up sensitive information. This new type of attack is found  to be using phishing technique that simulates a browser window within …

Read More
High Severity Privilege Escalation of Linux Kernel 'Dirty Pipe' On Major Distros
09/03/2022

High Severity Privilege Escalation of Linux Kernel ‘Dirty Pipe’ On Major Distros

VTA-00409 – High Severity Privilege Escalation of Linux Kernel ‘Dirty Pipe’ On Major Distros Recently, Linux has another high-severity vulnerability that makes it easier for untrusted users to execute codes capable of carrying out a host of malicious actions, including installing …

Read More
PROVINTELL_Gramdoor and Starwhale Abuse Telegram Messenger API
04/03/2022

GRAMDOOR and STARWHALE Abuse Telegram Messenger API

VTA-00408 – GRAMDOOR and STARWHALE Abuse Telegram Messenger API Mandiant has identified 2 new targeted malware threats, GRAMDOOR and STARWHALE, which implement simple backdoor functionalities. Both are attributed to UNC (Uncategorized) groups. GRAMDOOR is a backdoor written in Python that …

Read More
Vulnerable Microsoft SQL Servers targeted through Cobalt strike
24/02/2022

Hackers Target Microsoft SQL Database Servers Through Cobalt Strike

VTA-00407 – Hackers Target Microsoft SQL Database Servers Through Cobalt Strike ASEC analysis team has reported that vulnerable MS-SQL servers have been targeted by distribution of Cobalt Strike which includes attacks to an environment with unpatched vulnerability, brute forcing and …

Read More
Trojans through Microsoft Teams
23/02/2022

Hackers Spread Trojans Through Microsoft Teams

VTA-00406 – Hackers Spread Trojans Through Microsoft Teams Hackers are attaching .exe files to Teams chat to install a Trojan on the end-user computer. This trojan will bypass default protections in Teams and install malware, in which Teams has limited …

Read More

Case Study