Warning Against Cisco IOS XE Software Web UI Vulnerabilities (CVE-2023-20198, CVE-2023-20273)

Warning Against Cisco IOS XE Software Web UI Vulnerabilities (CVE-2023-20198, CVE-2023-20273)

Overview This month, Cisco released a security advisory regarding two vulnerabilities currently being actively exploited in actual attacks: CVE-2023-20198 and CVE-2023-20273. These vulnerabilities are present in the web UI feature of Cisco IOS XE Software. The CVE-2023-20198 vulnerability allows an unauthorized threat actor to create an arbitrary account with level

Lazarus Threat Group Exploiting Vulnerability of Korean Finance Security Solution

Lazarus Threat Group Exploiting Vulnerability of Korean Finance Security Solution

As covered before here on the ASEC Blog, the Lazarus threat group exploits the vulnerabilities of INISAFE CrossWeb EX and MagicLine4NX in their attacks.  New Malware of Lazarus Threat Actor Group Exploiting INITECH Process (Apr 26, 2022) A Case of Malware Infection by the Lazarus Attack Group Disabling Anti-Malware Programs

8220 Gang Uses Log4Shell Vulnerability to Install CoinMiner

8220 Gang Uses Log4Shell Vulnerability to Install CoinMiner

Ahnlab Security Emergency response Center (ASEC) has recently confirmed that the 8220 Gang attack group is using the Log4Shell vulnerability to install CoinMiner in VMware Horizon servers. Among the systems targeted for the attack, there were Korean energy-related companies with unpatched and vulnerable systems, hence being preyed upon by multiple

Caution When Using 3CX DesktopApp (CVE-2023-29059)

Caution When Using 3CX DesktopApp (CVE-2023-29059)

Overview Details about how supply chains were attacked through the 3CX DesktopApp were published. [1] This software provides users with various communication functions, such as voice calls and video conferences, and can be operated on both Windows and MAC operating systems. Currently, the 3CX company is preparing to issue a new

Initech Product (INISAFE CrossWEB) Security Update Recommendation

Initech Product (INISAFE CrossWEB) Security Update Recommendation

Overview A security update to patch the vulnerability of Initech’s INISAFE CrossWeb EX V3 has been announced. INISAFE CrossWeb EX V3 is a software program used for electronic financial transactions and financial security certification in the public sector. It is used by various companies and individuals for Internet banking, so

Microsoft Office Outlook Vulnerability (CVE-2023-23397) Appearance and Manual Measure Guide

Microsoft Office Outlook Vulnerability (CVE-2023-23397) Appearance and Manual Measure Guide

AhnLab Security Emergency response Center (ASEC) recently published a notice about a Microsoft Office Outlook vulnerability. Warning for Microsoft Office Outlook Privilege Escalation Vulnerability (CVE-2023-23397)   CVE-2023-23397 is a vulnerability that leaks a user’s account credentials upon receiving an email and triggering a notification. The stolen information includes the ‘NTLM’

Warning for MagicLine4NX (Certificate Solution) Vulnerability and Update Recommended

Warning for MagicLine4NX (Certificate Solution) Vulnerability and Update Recommended

  Vulnerable Software and Overview MagicLine4NX is a non-ActiveX joint certificate program developed by the Korean company, Dream Security. Users can use MagicLine4NX to perform logins with a joint certificate and digitally sign transactions. This program is registered as a Startup Program and will be relaunched by a certain service

Warning for Certification Solution (VestCert) Vulnerability and Update Recommendation

Warning for Certification Solution (VestCert) Vulnerability and Update Recommendation

Vulnerable Software and Overview VestCert is a certification program used while accessing websites, and is a non-ActiveX module developed by the Korean company, Yettiesoft. This program is registered as a Startup Program and will be relaunched by Yettiesoft’s service (Gozi) even if it is terminated. It remains constantly active as a

Warning for Asset Management Program (TCO!Stream) Vulnerability and Update Recommendation

Warning for Asset Management Program (TCO!Stream) Vulnerability and Update Recommendation

Vulnerable Software and Overview TCO!Stream is an asset management solution developed by the Korean company, MLsoft. Consisting of a server and a client, administrators can use the console program to perform asset management work by accessing the server. TCO!Stream offers various features for asset management, but there is a process

PlugX Malware Being Distributed via Vulnerability Exploitation

PlugX Malware Being Distributed via Vulnerability Exploitation

ASEC (AhnLab Security Emergency response Center) has recently discovered the installation of the PlugX malware through the Chinese remote control programs Sunlogin and Awesun’s remote code execution vulnerability. Sunlogin’s remote code execution vulnerability (CNVD-2022-10270 / CNVD-2022-03672) is still being used for attacks even now ever since its exploit code was