Weekly Intelligence
cyber-security-exim-vulnerability

June 9th Weekly Attack Surface Attribution

Overview

This week there were four (4) distinct vulnerabilities being discussed across the dark web. Of those, one (1) vulnerability can be tied to threat actors in Mitre’s ATT&CK framework. This one vulnerability can be tied to 36 different Advanced Persistent Threat groups based off of known group tactics, techniques, and procedures (TTPs).

This vulnerabilities currently impact 465,000 unique instances of deployed technology across the global internet. At the time of our research, the majority of affected vulnerable infrastructure are located in Japan.

Details

The vulnerability most likely to be exploited is the CVE-2019-0796 vulnerability which affects multiple Microsoft Windows products. CVE-2019-0796 is a Windows privilege escalation focused vulnerability.

JUNE_9_ATTACK_LIKELIHOOD

In analyzing the TTPs used by the threat actors in the ATT&CK framework, we uncovered 36 specific Advanced Persistent Threat (APT) groups which leverage various TTPs impacting these vulnerabilities.

JUNE_9_ATPs

For many of these threat actors, the country of origin isunknown; however, this week the top countries of origin that could be identified are China, Iran and Russia. Threat actors in the middle east also showed up in our research this week such as the Lebanese group Dark Caracal along with Gallmaker and BlackOasis.

JUNE_9_THREAT_ACTORS

A survey of global internet infrastructure identified over 465,000 instances of deployed infrastructure that are potentially susceptible to this vulnerability (CVE-2019-0796).

The majority of these vulnerabilities can be found in Japan, Taiwan and Russia.

JUNE_9_COUNTRIES_2

About Cybeta

Cybeta is a cybersecurity data science firm focused on developing advanced analytics for early indications and warning of potential or emerging cyber-attacks. Our flagship product, Threat Beta, has been independently verified and validated to provide accurate forecasting of future breach exposure.

Cybeta works with various data providers as well as through our own deployment of network sensors to provide a continuous stream of near-real time data for our analytics and prediction engine. By providing corporate executives and government officials with advanced insights into future attack potential, we are enabling organizations to make the shift towards an active defense cybersecurity strategy.

About Our Newsletter

In an effort to further our mission of enabling organizations to take on an active defense cybersecurity strategy, our newsletter is the result of our analytic work which culls through dark web forums; collects, aggregates and analyzes internet infrastructure data, vulnerabilities, weaknesses and exploits deployed around the world.

Each week our newsletter will present our findings of which vulnerabilities and exploits were being discussed by hackers, nation states, cyber criminals and information security researchers across the dark web. We map this data to the tactics, techniques and procedures (TTPs) we see in the Mitre ATT&CK framework datasets. 

Where and when it is available, we will also present where we have uncovered these specific vulnerabilities, while not drawing attention to the specific organization owning the vulnerable infrastructure.