<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Go Anywhere MFT in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208846#M39551</link>
    <description>&lt;P&gt;Wow,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;what a work.&lt;/P&gt;
&lt;P&gt;Or you could just post the link&amp;nbsp;&lt;A href="https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/" target="_blank"&gt;https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/&lt;/A&gt;&amp;nbsp;to the original report.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Mar 2024 08:08:18 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2024-03-15T08:08:18Z</dc:date>
    <item>
      <title>Go Anywhere MFT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208797#M39540</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone tried to use Check Point's deep packet inspection&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm" target="_blank"&gt;SSH Deep Packet Inspection (checkpoint.com)&lt;/A&gt; over Go Anywhere MFT &lt;A href="https://www.goanywhere.com/" target="_blank"&gt;https://www.goanywhere.com/&lt;/A&gt;?&lt;/P&gt;
&lt;P&gt;For one thing, goanywhere uses port 8022.&lt;/P&gt;
&lt;P&gt;I see one other post in the community on Go Anywhere MFT but it's in Japanese.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 17:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208797#M39540</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-03-14T17:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: Go Anywhere MFT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208798#M39541</link>
      <description>&lt;P&gt;I found the link in Japanese and hit translate to English in google Chrome and this is what it gave &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/" target="_blank"&gt;https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;**************************&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-quilt-row lia-quilt-row-message-subject"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-subject-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV class="topic-subject-wrapper"&gt;
&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;
&lt;DIV class="MessageSubject"&gt;
&lt;DIV class="lia-message-subject"&gt;&lt;FONT&gt;Weekly Cybersecurity Threat Report (March 27, 2023 edition) “This week also reports of zero-day damage to GoAnywhere MFT, malicious package detected on PyPI, etc.”&lt;/FONT&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-quilt-row lia-quilt-row-message-body"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-body-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV id="bodyDisplay_5f64c6c6252e0d" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;FONT&gt;This is an abridged version of the Check Point Research Team's&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Weekly Cybersecurity Threat Report for&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;March&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;27&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;2023 .&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT&gt;For the original English version,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;please see&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;A href="https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN&gt;&lt;FONT&gt;here .&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;FONT&gt;This week's&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;U&gt;&lt;FONT&gt;TOP Cyber ​​attacks and security breaches&lt;/FONT&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;&lt;/U&gt;
&lt;P&gt;&lt;FONT&gt;A new victim of the Clop&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;ransomware gang has been exposed,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;leveraging&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;a zero-day security flaw (&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2023-0669 ) in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Fortra GoAnywhere Managed File Transfer system for attack purposes. Among them&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;American luxury brand retailer&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-saks-fifth-avenue-retailer-says-mock-data-stolen/" target="_blank" rel="nofollow noopener noreferrer"&gt;Saks Fifth Avenue&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/city-of-toronto-confirms-data-theft-clop-claims-responsibility/" target="_blank" rel="nofollow noopener noreferrer"&gt;the City of Toronto .&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT&gt;Check Point&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;'s&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;IPS&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Threat Emulation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;, and&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Harmony Endpoint&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;FONT&gt;&lt;STRONG&gt;&lt;EM&gt;provide protection&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;against&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;this threat&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;[GoAnywhere MFT Insecure Deserialization (CVE-2023-0669); Ransomware.Win.Clop; Ransomware_Linux_Clop_A; Ransomware_Linux_Clop_B] .&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;The city of Oak Ridge, Tennessee&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;A href="https://therecord.media/oak-ridge-tennessee-ransomware-attack" target="_blank" rel="nofollow noopener noreferrer"&gt;&lt;FONT&gt;experienced&lt;/FONT&gt;&lt;/A&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;network issues that appeared to be a ransomware attack affecting its technology systems . No ransomware group has yet claimed responsibility.&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Italian luxury sports car manufacturer Ferrari&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.ferrari.com/en-EN/corporate/articles/cyber-incident-in-ferrari" target="_blank" rel="nofollow noopener noreferrer"&gt;has announced&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;a data breach following an extortion attack on its IT systems&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. The leaked data consists of personal information of the company's customers, including their full names, addresses, email addresses, and phone numbers.&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;&amp;nbsp;Bitcoin ATM&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;manufacturer&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;General Bytes&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.securityweek.com/millions-stolen-in-hack-at-cryptocurrency-atm-manufacturer-general-bytes/" target="_blank" rel="nofollow noopener noreferrer"&gt;has confirmed&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;a breach that resulted in the theft of $ 1.6&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;million in cryptocurrency&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;owned by the company and its customers&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. Threat actors&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;exploited&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;a zero-day vulnerability (&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2023-28725 ) in the company's&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;BATM management platform,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;the service interface used by Bitcoin ATMs to upload videos,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;by uploading a&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;JavaScript script to run with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;BATM&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;user privileges. I was able to do.&lt;/SPAN&gt;&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Australian consumer lender Latitude Financial Services&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.theguardian.com/australia-news/2023/mar/27/latitude-financial-cyber-data-breach-hack-14m-customer-records-stolen" target="_blank" rel="nofollow noopener noreferrer"&gt;has confirmed&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;a major data breach&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. The leaked data&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;consists of records of 14 million customers, including driver's license numbers, passport numbers, and financial statements. The data leaked&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;includes driver license numbers for&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;7.9 million customers in Australia and New Zealand.&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Early access cyber attacks belonging to the Chinese state-backed cyber espionage group APT41&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/" target="_blank" rel="nofollow noopener noreferrer"&gt;have been confirmed&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;to target the telecommunications sector in the Middle East&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. Threat actors infiltrate Internet-facing Microsoft Exchange&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;servers to perform command execution, reconnaissance, credential theft, lateral movement, and data exfiltration activities.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT&gt;Check Point&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;'s&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Threat Emulation&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;FONT&gt;&lt;STRONG&gt;&lt;EM&gt;provides protection&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;against&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;this threat&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;[ATP.Wins.ATP41] .&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;FONT&gt;About vulnerabilities and patches&lt;/FONT&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Cyber ​​researchers&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.mandiant.com/resources/blog/zero-days-exploited-2022" target="_blank" rel="nofollow noopener noreferrer"&gt;share&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;their findings on 55&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;zero-day vulnerabilities&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;exploited in 2022&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. It notes that Chinese state-backed cyber espionage groups have exploited more zero-days than any other cyber espionage actor. Four&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;vulnerabilities were exploited by financially motivated threat actors, and&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;75% of them&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;were related to ransomware.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Google&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;has&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;A href="https://googleprojectzero.blogspot.com/2023/03/multiple-internet-to-baseband-remote-rce.html" target="_blank" rel="nofollow noopener noreferrer"&gt;identified&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;18&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;zero&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;-day vulnerabilities in&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Exynos modems&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. Four of them&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;(&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2023-24033&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2023-26496&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2023-26497&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2023-26498&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;) allow threat actors to remotely compromise smartphone devices using only the victim's phone number. can.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Cisco&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://blog.talosintelligence.com/vulnerability-spotlight-wellintech-ics-platform-vulnerable-to-information-disclosure-buffer-overflow-vulnerabilities/" target="_blank" rel="nofollow noopener noreferrer"&gt;has discovered&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;two&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;vulnerabilities&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;in&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;WellinTech&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;'s&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;industrial control system data manager&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;KingHistorian&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;. The first&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;vulnerability is an information disclosure vulnerability (&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2022-45124&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;) that could allow an attacker to steal a user's personal information such as name and password.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The second&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;flaw (&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CVE-2022-43663&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;) could allow an attacker to cause a buffer overflow by sending malicious packets to a target machine.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;FONT&gt;Cyber ​​threat intelligence report&lt;/FONT&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Check Point Research&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;has detected malicious packages in the Python&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;package index&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;, PyPI , that use phishing techniques to hide their malicious intent.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;This malicious package secretly downloads and executes obfuscated code as part of its installation process, posing a supply chain risk.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT&gt;Check Point&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;'s&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CloudGuard Spectral&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;FONT&gt;&lt;STRONG&gt;&lt;EM&gt;provides protection&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;against&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;this threat .&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Cyber ​​researchers&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;have discovered a new variant of the&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;FakeGPT Chrome extension&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;named “ChatGPT-For-Google” based on an open source project.&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT&gt;This affects thousands of victims every day. This variant&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;uses&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;malicious sponsored Google search results under the guise of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ChatGPT&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;integration&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for browsers to steal Facebook&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;session&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cookies&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and compromise accounts.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;Cyber ​​researchers&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;are sharing&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;the tools, techniques, and procedures (&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;TTPs ) of North Korean state-sponsored cyber espionage group APT37&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;(also known as&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ScarCruft ).&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;This threat actor primarily targets individuals in South Korean organizations through spear-phishing emails.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;APT37&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;also&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;distributes&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Chinotto PowerShell- based backdoors&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;using various attack vectors .&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT&gt;Check Point&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;'s&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Harmony Endpoint&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;FONT&gt;&lt;STRONG&gt;&lt;EM&gt;provides protection&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;against&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;this threat&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;[APT.Win.APT37] .&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT&gt;A new Android&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;botnet&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;, Nexus&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;, has been observed in a global fraud campaign.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Nexus&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;is&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;similar to the SOVA Android&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;banking Trojan and primarily works to steal accounts from banking portals and cryptocurrency services. The malware&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;is advertised&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;on&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;underground forums and&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Telegram as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Malware-as-a-Service&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;(&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;MaaS ).&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT&gt;*****************************&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 14 Mar 2024 18:16:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208798#M39541</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-14T18:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Go Anywhere MFT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208846#M39551</link>
      <description>&lt;P&gt;Wow,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;what a work.&lt;/P&gt;
&lt;P&gt;Or you could just post the link&amp;nbsp;&lt;A href="https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/" target="_blank"&gt;https://research.checkpoint.com/2023/27th-march-threat-intelligence-report/&lt;/A&gt;&amp;nbsp;to the original report.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 08:08:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208846#M39551</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-03-15T08:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: Go Anywhere MFT</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208866#M39557</link>
      <description>&lt;P&gt;Ah, did not really do anything :). All I did was just hit translate from google Chrome on original post in Japanese, and then copy/paste whatever it gave in English, thats it.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 11:25:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Go-Anywhere-MFT/m-p/208866#M39557</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-15T11:25:49Z</dc:date>
    </item>
  </channel>
</rss>

