LogoLogo

Podcasts

Newsletters

Videos

People

About

Search

Risky Bulletin Newsletter

May 24, 2024

Risky Biz News: Backdoor found in court and jail AV recording software

Written by

Catalin Cimpanu
Catalin Cimpanu

News Editor

This newsletter is brought to you by  Proofpoint . You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via  this RSS feed . On Apple Podcasts:

‎Risky Business News: Risky Biz News: Backdoor found in court AV recording software on Apple Podcasts
‎Show Risky Business News, Ep Risky Biz News: Backdoor found in court AV recording software - 23 May 2024
Apple Podcasts

Cybersecurity researchers from  Rapid7  and  S2W  have found a backdoor trojan inside a popular app used for recording courtroom and jury meetings.

The malware was found in the installer for  JAVS Viewer , version 8.3.7, an app from Justice AV Solutions that allows customers to play back older recordings.

JAVS customers who downloaded the official installer from the company's website between April 1 and mid-May are likely infected with a version of the GateDoor backdoor.

The malware is written in Go and is the Windows version of RustDoor, a Rust-based backdoor that could infect macOS systems.

Previous reports from  Bitdefender  and  S2W  linked both versions of the malware to server infrastructure previously operated by the AlphV (BlackCat) ransomware operation.

Rapid7 has published information on its  blog  on how customers can determine if they installed the malicious version of the JAVS Viewer app—it drops a misspelled "fffmpeg.exe" encoder signed with a "Vanguard Tech Limited" certificate.

If systems are found to be infected, Rapid7 advises a full reimaging and the changing of all passwords stored on that system.

For its part, Justice AV Solutions appears to have been very responsive to the incident. Per a statement listed under Rapid7's report, the company says it removed the modified installer from its servers and is now conducting an audit of all JAVS software products.

The incident appears to be contained, but it's still unclear how the threat actor managed to put a backdoored file on its servers.

While Justice AV Solutions lists more than 10,000 customers on its website, it's likely that not all were impacted.

JAVS Viewer app

Breaches, hacks, and security incidents

Gala Games hack:  The individual who exploited and stole $21 million worth of crypto tokens from the Gala Games platform has  returned  all the stolen assets. The hack took place earlier this week on Monday, when a hacker exploited the platform, minted $200 million worth of new tokens, and managed to steal $21 million before their access was cut off. The funds were returned after the company  claimed  it identified the hacker's identity and was working with law enforcement. Gala didn't specify if they are now dropping the case against the attacker. [ Additional coverage in  CoinTelegraph ]

Change Healthcare hack:  Members of the American Medical Association (AMA) have asked the US government to absolve them of HIPAA requirements related to Change Healthcare's February ransomware attack. AMA members have asked the US Department of Health and Human Services to hold Change Healthcare responsible for sending breach notifications related to the hack. Previously, Change Healthcare's parent company said it would handle breach notifications for some customers but not all. More than 100 healthcare organizations have signed an AMA letter [ PDF ] to the government. [ Additional coverage in  HealthcareDive ]

NYSE hack fine:  The US SEC has  fined  Intercontinental Exchange (ICE), the company behind the New York Stock Exchange (NYSE), $10 million for failing to report an April 2021 security breach in a timely manner.

pcTattletale leak:  Stalkerware application pcTattletale is leaking screenshots captured from installed systems due to a vulnerability in its API. The issue was discovered by security researcher  Eric Daigle , who reported the leak to the vendor earlier this month. Despite repeated contact attempts, the company has yet to respond to both the researcher and reporters.   TechCrunch  says the app is currently used by multiple hotels to keep an eye on employee systems. Screenshots taken by the app from hotel systems are now exposing the personal details of their guests.

Eindhoven leak:  The Dutch city of Eindhoven has suffered a security breach and leaked the personal details of over 220,000 residents. [ Additional coverage in  Eindhovens Dagblad ]

General tech and privacy

TLS Session Tickets and the GDPR:  Polish privacy researcher Lukasz Olejnik has conducted a  privacy audit  of a TLS feature named Session Tickets that can allow TLS sessions to be easily resumed. The new feature is GDPR compliant, and Olejnik says that's a good thing since a privacy regulation impacting technical advancements may suggest "that something is very wrong with EU data protection law."

BlueSky gets DMs:  The BlueSky social network now supports  direct messages  (DMs).

LastPass encrypts URLs:  Password manager LastPass will  start encrypting URLs  stored in user vaults to protect user data against unauthorized access. LastPass is rolling out encrypted URLs after a major security breach in  December 2022 . A  report  claimed threat actors decrypted some of the stolen password vaults and then emptied cryptocurrency wallets with the recovered credentials. Encrypting URLs will prevent threat actors from linking credentials from a password vault to an online service. LastPass says it's encrypting URLs now because most devices have the memory to handle encryption algorithms.

DHS immigrants biometrics database:  Experts from Georgetown University's law school say the DHS is misleading and intimidating immigrants to collect biometric and DNA profiles.  Experts say  that since 2020, the DHS has added more than 1.5 million DNA profiles to the national law enforcement database (CODIS), a 5,000% increase in just 3 years.

Edge gets screenshot protection:  Microsoft has added  new DLP security features  to the enterprise version of its Edge web browser. New versions of Edge for Business will allow admins to restrict an employee's ability to take screenshots or capture the screen on sensitive pages. Administrators can also restrict users from printing Word, Excel, and PowerPoint documents marked as sensitive. The new features will be available in the coming weeks.

Microsoft's VBScript deprecation:  Microsoft will  deprecate  and make VBScript a feature-on-demand (FOD) in the second half of the year with the release of Windows 11, version 24H2. VBScript will remain enabled by default, but administrators will now have the option to disable it if they wish to. VBScript will be disabled by default in 2027. Microsoft says it plans to remove VBScript from Windows but has not committed to an exact date yet.

UK ICO to investigate Microsoft:  The UK's privacy watchdog is  investigating  Microsoft over  Recall , a new Windows 11 feature that takes screenshots of users' PCs every few seconds. Microsoft says the feature is intended to allow users to use a locally installed AI assistant to search through screenshots and a user's past activity. Recall is currently available on Microsoft's new select line of  Copilot+ PCs . UK officials say they're looking into what safeguards Microsoft is putting in place to safeguard user privacy. Privacy and security experts have  criticized  Recall for exposing Windows users to new risks. Critics say the feature creates unredacted screenshots that may contain sensitive information, like passwords and bank numbers, and leave the data on the user's hard drive from where it can be stolen by malware.

Government, politics, and policy

Diverse Cybersecurity Workforce Act:  Two Democrats from the US House of Representatives have introduced the  Diverse Cybersecurity Workforce Act , a bill that would establish a program within CISA to promote the cybersecurity field to underrepresented and disadvantaged communities.

Goldstein replacement:  CISA has nominated Jeff Greene to take over the position of the agency's Executive Assistant Director for Cybersecurity. Greene will replace Eric Goldstein, who will be leaving his post this month. Greene previously served in the White House's National Security Council's Cyber Directorate and as Director of US NIST. [ Additional coverage in  The Record ]

EU anti-propaganda statement:  Sixteen EU members  have   pledged  to detect and fight propaganda and disinformation targeting the EU and neighboring countries. The 16 countries plan to share information, provide legal reactions, and even issue sanctions against foreign actors. They also plan to pressure online platforms to follow their legal obligations and crack down on disinformation campaigns. Countries that signed the statement include France, Germany, Poland, Austria, Bulgaria, Croatia, Czechia, Denmark, Greece, Italy, Latvia, Luxembourg, Portugal, Romania, Slovenia, and Spain. [ h/t Lukasz Olejnik ]

Deepfakes in the criminal code:  The President of Latvia has asked the government to amend the country's criminal code to criminalize the creation of deepfakes for political use. The proposal suggests that offenders should face punishment of up to five years in jail. President Edgars Rinkēvičs' proposal comes after deepfakes were used in Slovakia's presidential and parliamentary election last year in support of an anti-EU and pro-Kremlin candidate. [ Additional coverage in  LSM ]

Sponsor section

In this Risky Business News sponsor interview, Catalin Cimpanu talks with Proofpoint senior threat intelligence analyst Selena Larson about the latest changes in the threat actor landscape in the aftermath of several law enforcement takedowns and Microsoft tech stack changes.

‎Risky Business News: Sponsored: Proofpoint on the current threat actor landscape on Apple Podcasts
‎Show Risky Business News, Ep Sponsored: Proofpoint on the current threat actor landscape - 19 May 2024
Apple Podcasts

Cybercrime and threat intel

BEC money launderer sentenced:  US authorities have  sentenced  a Georgia man to 10 years in prison for laundering the proceeds of BEC and romance scams.

Novel phishing infrastructure:  Huntress researchers have  discovered  the infrastructure of a phishing group that appears to combine several techniques for a novel form of phishing operations. Huntress says the threat actor appears to combine HTML smuggling, injected iframes, and session theft via transparent proxy—for a never-before-seen attack combo.

Elections, India, hacktivism, and cybercrime:  Resecurity has published a  report  on how cybercrime and hacktivist groups are playing a role in this year's Indian elections, either through data dumps or influence operations.

Arc malvertising:  Malwarebytes researchers look at a recent  malvertising campaign  using the new Arc browser as a lure to infect users with malware.

SMS scam abuse:  Telecom security firm  ENEA looks at  how SMS scammers are abusing cloud services to host infrastructure without any issues from the hosters. YOLO!

PyPI macOS malware:  DataDog researchers  have spotted  a cluster of malicious PyPI packages that target macOS users with malware.

Pegasus fakes:  Indian security firm CloudSEK has published a  report  looking at all the recent ads published on the dark web and Telegram claiming to sell versions of the "Pegasus spyware"—obviously scams.

Storm-0539:  Microsoft has published a more in-depth report [ PDF ] on Storm-0539, a threat actor that has been targeting the gift card departments at US retail corporations. Microsoft  first spotted  the group last December, and the group was recently at the center of an FBI security alert as well. [ PDF ]

Threat/trend reports:   Cisco Talos ,  Huntress ,  NCC Group ,  US NIST , and  Qrator Labs  have recently published reports covering infosec industry threats and trends.

Malware technical reports

Gootloader:  Malwarebytes has published a  technical deep dive  at recent campaigns distributing the Gootloader malware family.

Iluria Stealer:  CyFirma continues to find new malware advertised in underground cybercrime circles. Their latest finding is the new  Iluria Stealer , an infostealer from the developer of the older Nikki Stealer.

New stealers:  Kaspersky researchers look at three new infostealers they've spotted advertised online— Acrid, ScarletStealer, and Sys01 . If nuclear war erupted tomorrow, the only things to survive would be cockroaches and infostealers.

ShrinkLocker ransomware:  Kaspersky has discovered and documented a new ransomware strain named  ShrinkLocker  that used Windows' built-in BitLocker feature for data encryption.

CatDDoS botnets:  Chinese security firm QiAnXin is seeing a surge in activity in IoT botnets using a variant of the Mirai malware named  CatDDoS . The botnets have exploited over 80 vulnerabilities in different devices over the last three months to amass new bots and improve their attack capabilities. CatDDoS-related botnets are currently launching attacks on more than 300 targets on a daily basis. QiAnXin says it's seeing some of the botnets attempting to cannibalize each other's bots.

Sponsor Section

Proofpoint recently identified a  SugarGh0st RAT campaign  targeting organizations in the United States involved in artificial intelligence efforts, including those in academia, private industry, and government service. Proofpoint tracks the cluster responsible for this activity as UNK_SweetSpecter.

APTs, cyber-espionage, and info-ops

TikTok influence operations:   TikTok says  that in the first four months of the year, it disrupted 15 influence operations and removed 3,001 associated accounts. The company says most networks were trying to influence upcoming elections among a selected target audience. Most of the networks operated from the country they were trying to influence. Only two networks based out of China and Iran targeted audiences abroad, with pro-PRC and anti-US views, respectively. TikTok says the largest influence networks were found in Serbia, Indonesia, and Venezuela. A list of all networks and their goals is available  here .

" For example, we disrupted a network targeting an Indonesian audience ahead of the country's presidential elections earlier this year, and another targeting the UK by artificially amplifying narratives about the UK's domestic political discourse. "

SideWinder:  Embee Research says it  uncovered  new SideWinder APT infrastructure by combining regex patterns, Whois records, and domain registrar data from past operations.

Transparent Tribe:  IBM has published a  report  covering campaigns linked to Pakistan's Transparent Tribe APT that took place between late 2023 to April 2024. The campaign's targets included entities in India's government, defense, and aerospace sectors.

Kimsuky's Gomir:  ShadowStackRE has published a  breakdown  of  Gomir , a new Linux backdoor used by the Kimsuky APT.

Sharp Dragon expands:  A suspected Chinese APT group named Sharp Dragon (Sharp Panda) has expanded its targeting to new regions, such as Africa and the Caribbean. The group has been active for years but has historically targeted only the Southeast Asia region. Security firm  Check Point  says the group is now using compromised accounts inside the governments of past victims to reach out to African and Caribbean governments and establish new footholds. Researchers say the group is careful when selecting new targets and uses publicly and readily available tools to blend in with the noise.

KeyPlug in Italy:  Italian security firm  YOROI  takes a look at a few KeyPlug implants they found across Italy. KeyPlug is a backdoor used in the past by China's APT41.

Operation Diplomatic Specter:  Palo Alto Networks says it's tracking a suspected Chinese APT conducting a campaign against diplomatic missions, embassies, and military targets across the Middle East, Africa, and Asia. Named Operation Diplomatic Specter, the campaign has been active since late 2022, and its main tools have been the TunnelSpecter and SweetSpecter backdoors.

Unfading Sea Haze:  A suspected Chinese APT named  Unfading Sea Haze  has gone under the radar for more than five years in attacks targeting countries around the South China Sea. Most of the attacks involved custom versions of the Gh0st open-source remote access trojan. Security firm Bitdefender says it discovered traces of the group's malware on the networks of eight military and government targets in the South China Sea region.

" The Unfading Sea Haze threat actor group has demonstrated a sophisticated approach to cyberattacks. Their custom malware arsenal, including the Gh0st RAT family and Ps2dllLoader, showcases a focus on flexibility and evasion techniques. The observed shift towards modularity, dynamic elements, and in-memory execution highlights their efforts to bypass traditional security measures. Attackers are constantly adapting their tactics, necessitating a layered security approach. "

MSS front companies:   Natto Thoughts  looks at how the MSS appears to combine both front and real companies for its cyber contractor ecosystem.

ORB usage:  Google's Mandiant division  warns  about an increasing number of Chinese APT groups adopting ORB (operational relay box) networks to disguise their attack infrastructure. These networks are made up of a mixture of residential proxy networks, VPS servers, and hacked routers and IoT devices. Threat actors are using these networks to hide malicious operations such as vulnerability scanning, exploitation attempts, C2 traffic, and data exfiltration. Mandiant says it's tracking multiple ORB networks in the wild. The biggest are SPACEHOP and FLORAHOX, used by groups like APT5 and APT31, respectively.

Vulnerabilities, security research, and bug bounty

Apple's WPS is leaking:  Apple's Wi-Fi Positioning System (WPS) is leaking too much information about nearby devices to a threat actor querying its official API. A team of academics says this data can be collected over time to create a map of WiFi-capable devices around the globe, even for non-Apple devices. Researchers say that by constantly updating this map, they can track the movement of individuals and groups of people over time. For example, researchers say they were able to accurately track the movement of Starlink terminals used by both Ukrainian and Russian forces in their recent conflict. They also tracked how Gaza residents slowly moved to the South of the Gaza Strip in the recent Israeli-Palestine conflict. [ Additional coverage in  KrebsOnSecurity /Research paper  PDF ]

Veeam auth bypass:  Backup and recovery software maker Veeam has released  security updates  that fix five vulnerabilities, including an authentication bypass issues (CVE-2024-29849) in its enterprise backup solution. If you're a company that is a potential target of ransomware campaigns, you may want to patch this issue to prevent threat actors from deleting your backups and forcing you into a corner.

WinRAR bug write-up:  Security researcher Siddharth Dushantha has published a  write-up  of a bug he found in WinRAR's Linux and Windows CLI clients.

PDF.js bug write-up:  Codean's Thomas Rinsma has published a  write-up  of a bug he found in Mozilla's PDF.js PDF file viewer. The bug could have allowed threat actors to run malicious code inside apps where the PDF.js library was used and left misconfigured. It's a pretty niche scenario, but 10/10 on the nasty scale.

GitHub ES PoC: Proof of concept code is now  available  for that CVSSv3 10/10 auth bypass in GitHub enterprise servers ( CVE-2024-4985 ).

Security audits:  Boost  and  ExpressVPN  have published security audits this week. The Boost audit found seven vulnerabilities, while the ExpressVPN audit looked at the company's no-logs policy.

Cisco security updates:  Cisco has released  seven security advisories  for its products.

GitLab security updates:  GitLab has published  security updates  to fix seven vulnerabilities, including a one-click account takeover XSS.

NVD backlog:  More than three months after NIST stopped enriching the NVD database, the organization has yet to resume its normal activity. 93% of all vulnerabilities added to the NVD database over the last three months still lack crucial information. According to a report from security firm  VulnCheck , NIST's involvement with the NVD is slowing down, with fewer vulnerabilities processed with each passing week.

Infosec industry

Kevin Mandia steps down:  Mandiant CEO Kevin Mandia is  stepping down  from his role at the end of the month. The move comes after Google has finished integrating Mandiant into its cybersecurity teams. Google acquired Mandiant for $5.4 billion in late 2022, and the Mandiant threat intel team has been merged into Google Cloud. Mandia will transition into an advisory role at the company. [ Additional coverage in  CRN ]

Tool update—Little Snitch:  Objective Development has  released v6  of the Little Snitch firewall app for macOS.

Risky Business Podcasts

In this edition of Between Three Nerds, Tom Uren and The Grugq talk to Elena Grossfeld about the strategic culture of Russian intelligence organizations.

Recent Newsletters

  • Law Enforcement Is Finally Making Progress on Ransomware
  • Risky Bulletin: Security firms will attempt to clean up their own mess—APT name taxonomies
  • Risky Bulletin: Law enforcement take down AVCheck
  • Risky Bulletin: Windows Update will soon deliver individual app updates
  • Russia's Cybercriminals and Spies Are Officially in Cahoots

Recent Videos

  • Srsly Risky Biz: Law Enforcement Is Finally Making Progress on Ransomware
  • Risky Business Weekly (794): Psychic Panda outgunned by Fluffy Lizard and UNC56728242
  • Between Two Nerds: NSA's thinking on information warfare
  • Srsly Risky Biz: Russia's cybercriminals and spies are officially in cahoots
  • Risky Business Weekly (793): Scattered Spider is hijacking MX records

Recent Podcasts

  • Srsly Risky Biz: Law Enforcement Is Finally Making Progress on Ransomware
  • Risky Business #794 -- Psychic Panda outgunned by Fluffy Lizard and UNC56728242
  • Risky Bulletin: Syrian Army infected with spyware before regime collapse
  • Between Two Nerds: NSA's thinking on information warfare
  • Risky Bulletin: Law enforcement takes down AVCheck
Risky Business Media

Risky Business

  • Home
  • Podcasts
  • Newsletters
  • Video
  • Sitemap

Risky Business Media

  • About
  • People
  • Advertising
  • Sponsor Enquiries: sales@risky.biz

Risky Connections

  • Risky Business on Apple Podcasts
  • Risky Business on Spotify
  • Risky Bulletin on Apple Podcasts
  • Risky Bulletin on Spotify
  • YouTube
  • LinkedIn

Risky Contacts

Risky Business Media Pty Ltd
PO Box 774
Byron Bay NSW 2481
General Email: editorial@risky.biz

© Risky Business Media 2007–2025. All rights reserved.
ABN 73 618 465 517