The large-scale supply chain attack targeting voice-over-Internet-protocol communications firm 3CX exploited a Windows flaw designated CVE-2013-3900 and described as a "WinVerifyTrust Signature Validation Vulnerability," in which one of two DLLs that were replaced with malicious versions for the attack was still designated as legitimately signed by Microsoft, BleepingComputer reports.
According to ANALYGENCE senior vulnerability analyst Will Dormann, this particular vulnerability is 10 years old, having been disclosed by Microsoft on Dec. 10, 2013, and continues to be exploited to this day, allowing attackers to add content to the EXE's authenticode signature section in a signed executable without it affecting the signature's validity.
Microsoft introduced a fix for this vulnerability on an opt-in basis, which can only be performed through a manual edit of the Windows Registry. However, Windows 10 users who employ this fix will find that it has been removed if they update to Windows 11, reopening their device to the vulnerability.
Gigabyte has released BIOS updates aimed at removing a firmware backdoor discovered by Eclypsium in over 270 of its motherboard models, which could have been exploited to facilitate the deployment of a Windows binary that would then prompt payload retrieval and execution, SecurityWeek reports.
Attacks exploiting a zero-day in the MOVEit Transfer file transfer app to compromise various servers and facilitate data exfiltration efforts have been admitted by the Clop ransomware operation, also known as Lace Tempest, TA505, and FIN11, after the intrusions have been attributed to the group by Microsoft, reports BleepingComputer.