Summary of Vulnerabilities & Threats: April 2023
Vulnerabilities Exploited | Adversaries in Action | Attacks Executed | Top Targeted Countries | Top Targeted Industries | MITRE ATT&CK TTPs |
17 | 19 | 29 | Netherlands United States Norway Ukraine Belgium | Government Energy Financial Telecommunications Healthcare | 196 |
Download the pdf file to learn more
Summary
In April, the discovery of six zero-day vulnerabilities drew significant attention from the cybersecurity community. One of these vulnerabilities was exploited by Rorschach Ransomware group, leading to a heightened sense of urgency among security teams to patch their systems.
The month of April saw a rise in ransomware attacks, with various strains such as Rorschach, Money message, Blackcat, Trigona, Cylance, Nokoyawa, and LockBit actively targeting victims. As ransomware continues to evolve and grow in sophistication, organizations must take steps to protect themselves by implementing comprehensive backup and disaster recovery strategies and training employees on how to recognize and avoid phishing attacks.
Attackers are leveraging two vulnerabilities (CVE-2023-27350 and CVE-2023-27351) in PaperCut MF/NG software to install Atera remote management software. In addition to ransomware attacks, several malware families were observed targeting victims worldwide. These include Jaguar Tooth, BellaCiao, QBot, MgBot, Domino Backdoor, and Carbanak Backdoor. These malware families are designed to steal sensitive data, disrupt systems, and evade detection by security tools.
Finally, the CVE-2023-2033 vulnerability is a high-severity zero-day vulnerability that was exploited in attacks, making it the first zero-day chrome vulnerability to be exploited since the start of the year 2023.
Download the pdf file to learn more