August 2024: Latest Malware, Vulnerabilities and Exploits
Common Information
Type Value
UUID 11ecadfc-680f-4e89-8092-141ac3650205
Fingerprint 85300d999d91b68b
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 2, 2024, 12:02 p.m.
Added to db Aug. 31, 2024, 9:49 a.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline August 2024: Latest Malware, Vulnerabilities and Exploits
Title August 2024: Latest Malware, Vulnerabilities and Exploits
Detected Hints/Tags/Attributes 107/3/36
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 26
cve-2024-37085
Details CVE 9
cve-2024-4879
Details CVE 9
cve-2024-5217
Details CVE 6
cve-2024-5178
Details CVE 56
cve-2024-36401
Details CVE 16
cve-2017-11774
Details Domain 3
hunter.how
Details Domain 4127
github.com
Details File 2
linux.pl
Details File 173
outlook.exe
Details File 1
new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html
Details Github username 2
geoserver
Details Github username 13
trustedsec
Details sha1 2
2a5e003764180eb3531443946d2f3c80ffcb2c30
Details sha256 1
003764fd74bf13cff9bf1ddd870cbf593b23e2b584ba4465114023870ea6fbef
Details sha256 1
1f5e4d2f71478518fe76b0efbb75609d3fb6cab06d1b021d6aa30db424f84a5e
Details sha256 1
dad13b0a9f5fde7bcdda3e5afa10e7d83af0ff39288b9f11a725850b1e6f6313
Details sha256 1
5687b32cdd5c4d1b3e928ee0792f6ec43817883721f9b86ec8066c5ec2791595
Details sha256 1
5c52e41090cdd13e0bfa7ec11c283f5051347ba02c9868b4fddfd9c3fc452191
Details sha256 1
4c3b9a568d8911a2a256fdc2ebe9ff5911a6b2b63c7784da08a4daf692e93c1a
Details sha256 1
ef9aebcd9022080189af8aa2fb0b6594c3dfdc862340f79c17fb248e51fc9929
Details sha256 1
7a55c8391fda90a5d4653fdebe2d685edb662859937e14b6756f45e29b76901d
Details Microsoft Threat Actor Naming Taxonomy (Groups in development) 8
Storm-0506
Details Microsoft Threat Actor Naming Taxonomy (Groups in development) 7
Storm-1175
Details Url 1
https://www.rapid7.com/blog/post/2024/07/30/vmware-esxi-cve-2024-37085-targeted-in-ransomware-campaigns/.
Details Url 1
https://www.resecurity.com/blog/article/cve-2024-4879-and-cve-2024-5217-servicenow-rce-exploitation-in-a-global-reconnaissance-campaign.
Details Url 1
https://www.bleepingcomputer.com/news/security/cisa-warns-critical-geoserver-geotools-rce-flaw-is-exploited-in-attacks/.
Details Url 1
https://github.com/geoserver/geoserver/security/advisories/ghsa-6jj6-gm7p-fcvv.
Details Url 1
https://databreaches.net/2024/07/23/acadian-ambulance-hit-by-ransomware-attack-daixin-claims-info-on-10-million-patients-stolen/.
Details Url 1
https://www.bleepingcomputer.com/news/security/sexi-ransomware-rebrands-to-apt-inc-continues-vmware-esxi-attacks/.
Details Url 1
https://symantec-enterprise-blogs.security.com/threat-intelligence/daggerfly-espionage-updated-toolset.
Details Url 1
https://www.virustotal.com/gui/file/7a55c8391fda90a5d4653fdebe2d685edb662859937e14b6756f45e29b76901d.
Details Url 1
https://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html
Details Url 1
https://github.com/trustedsec/specula/wiki/home.
Details Url 1
https://www.bleepingcomputer.com/news/security/new-specula-tool-uses-outlook-for-remote-code-execution-in-windows/.
Details Windows Registry Key 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\WebView