company logo


Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.


By Industry




IT & Telecom


By Role


DevOps Engineer


Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest


Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.





Lakeview Loan a month old data breach compromising 2.5 million lenders

A month old massive data breach went undetected resulting in the breach of personal information of over 2.5 million customers…

3 min read

Related Articles





Change Healthcare ransomware attack exposes vast medical records. Sensitive pati...

The recent ransomware attack on [UnitedHealth’s]( subsidiary, Change Healthcare, has revealed significant vulnerabilities in the healthcare sector's cybersecurity infrastructure. This meticulously structured [Threatfeed]( delves into the nuances of the breach, dissecting the technical aspects and ramifications with a sharp, critical lens. The attack has resulted in the exposure of sensitive patient data, prompting urgent discussions on cybersecurity practices and patient privacy. ## Detailed Breakdown of the Attack ### Attack Execution and Data Exfiltration The BlackCat (ALPHV) ransomware gang executed the attack using stolen credentials to access Change Healthcare's Citrix remote access service. The absence of multi-factor authentication (MFA) facilitated this breach. The attackers exfiltrated approximately 6 TB of sensitive data. #### Technical Pathway of the Attack 1. **Credential Theft**: Stolen credentials were utilized to gain initial access. 2. **Lack of MFA**: The absence of MFA on Citrix services allowed easy access. 3. **Data Exfiltration**: 6 TB of data was stolen, encompassing a wide array of personal and medical information. ### Impact on Healthcare Operations The attack led to widespread service disruptions, particularly affecting pharmacies unable to process insurance claims. This interruption forced many patients to pay full prices for medications. ### Financial Ramifications UnitedHealth has estimated losses at $872 million due to the breach. This figure is likely to increase as investigations and remediations continue. ## Types of Data Compromised The stolen data includes a comprehensive range of personal and medical information: 1. **Health Insurance Information**: Member ID numbers, policy details, Medicaid-Medicare numbers. 2. **Health Information**: Medical records, diagnoses, test results, images, treatment details. 3. **Billing Information**: Claim numbers, account numbers, financial data. 4. **Personal Information**: Social Security numbers, driver's licenses, passport numbers. ### Implications of Data Exposure The exposure of such extensive data heightens the risk of identity theft and fraud. Patients’ medical histories, although not fully exposed, are still at risk. ## Response and Mitigation Strategies ### Immediate Actions by UnitedHealth UnitedHealth has initiated data breach notifications, set to be mailed in July. Affected individuals are offered two years of complimentary credit monitoring and identity theft protection services. #### Steps for Affected Individuals 1. **Credit Monitoring**: Enroll in the provided services. 2. **Vigilance**: Monitor financial statements and health records for suspicious activity. 3. **Resource Utilization**: Visit for further information. ### Recommendations To prevent such incidents, the following measures are recommended: 1. **Multi-Factor Authentication (MFA)**: Implement MFA across all access points. 2. **Regular Audits**: Conduct frequent security audits and vulnerability assessments. 3. **Encryption**: Encrypt sensitive data both in transit and at rest. 4. **Incident Response Plan**: Develop and regularly update an incident response plan. ## Analysis of the Ransomware Mechanics ### BlackCat (ALPHV) Tactics BlackCat employed sophisticated tactics, leveraging stolen credentials to bypass security measures. The group's strategy included demanding a ransom and subsequently reneging on their agreement, demonstrating a high level of organizational deceit. #### Financial Transactions UnitedHealth admitted to paying an initial ransom of $22 million. However, internal conflict within the ransomware gang led to further data leaks, indicating unresolved ransom disputes. ### Decryptor Tools and Data Recovery Despite paying the ransom, data decryption and recovery efforts were complicated by the gang's internal issues. This underscores the unreliability of ransomware actors in adhering to negotiated terms. ## Considerations ### Policy and Regulatory Implications This breach highlights the need for stringent regulatory frameworks in healthcare cybersecurity. Policymakers must enforce robust security standards to protect patient data. ### Advancements Investing in advanced cybersecurity technologies, such as AI-based threat detection and zero-trust architectures, can significantly enhance protection against such sophisticated attacks. ### Organizational Culture Organizations must cultivate a security-first culture, emphasizing continuous employee training on cybersecurity best practices.

loading..   22-Jun-2024
loading..   4 min read


CDK Global's massive cyberattack disrupts operations for 15,000 car dealerships,...

In the past week, CDK Global, a prominent SaaS provider for car dealerships, suffered back to back cyberattacks. These breaches disrupted services for over 15,000 car dealerships in North America. This [Threatfeed]( delves into the technical aspects of these attacks, evaluates the impact, and explores potential recovery strategies. ## Overview of CDK Global CDK Global delivers a comprehensive SaaS platform catering to car dealerships. Their offerings encompass CRM, financing, payroll, support and service, inventory management, and back-office operations. The integration of an always-on VPN to CDK's data centers enables seamless access to these services for dealerships. ## Incident Breakdown ### Initial Cyberattack On the night of June 18, CDK Global encountered a cyberattack, prompting the shutdown of IT systems, phones, and applications to contain the threat. This attack incapacitated two data centers, disrupting dealership operations reliant on CDK’s platform. #### Attack Vector and Entry Point The attackers likely exploited the always-on VPN connection used by dealerships. This connection grants extensive access to CDK’s platform, making it a prime target for cybercriminals. Moreover, CDK’s software, with administrative privileges on client devices, posed an additional risk. ### Secondary Breach As CDK began restoring services on June 19, a second breach has transpired. This forced another shutdown, indicating that the initial threat was not fully mitigated. The rapid attempt to restore services without comprehensive security checks may have facilitated this subsequent attack. ## Technical Analysis ### Nature of the Attack While the exact malware remains unidentified, the pattern suggests a ransomware attack. Such attacks involve encrypting data and demanding ransom for decryption. Ransomware also involves data exfiltration, where threat actors use stolen data as leverage. ### Potential Exploits 1. **VPN Vulnerabilities**: Always-on VPNs are susceptible to various attacks, including man-in-the-middle (MITM) and brute force attacks. 2. **Admin Privileges Misuse**: Software running with administrative privileges can be exploited to deploy malicious updates or gain unauthorized access. 3. **Single-Sign-On (SSO) Weaknesses**: Transitioning to a modern SSO platform might introduce vulnerabilities if not adequately secured. #### VPN Exploit Simulation ```python import paramiko def connect_vpn(host, user, password): client = paramiko.SSHClient() client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) client.connect(host, username=user, password=password) return client # Simulate VPN connection exploitation vpn_client = connect_vpn('', 'admin', 'password123') stdin, stdout, stderr = vpn_client.exec_command('cat /etc/passwd') print( ``` ### Impact on Dealership Operations The attack has caused extensive disruption: - Inability to track and order parts. - Halted sales and financing processes. - Forced reliance on manual processes, leading to inefficiencies. ### Mitigation and Response #### Immediate Actions 1. **Disconnection of VPNs**: Advising dealerships to disconnect always-on VPNs to prevent lateral movement. 2. **Shutdown of Systems**: Temporarily disabling IT systems to halt the attack’s spread. #### Long-term Strategies 1. **Enhanced Monitoring**: Implementing real-time monitoring and anomaly detection systems. 2. **Zero Trust Architecture**: Adopting a Zero Trust approach to minimize trust zones. 3. **Regular Audits and Penetration Testing**: Conducting frequent security audits and penetration tests to identify and mitigate vulnerabilities. ### Implementing Zero Trust ```python from flask import Flask, request, jsonify app = Flask(__name__) # Simple example of token-based authentication TOKENS = {"valid_token_123": "user1"} @app.route('/secure-endpoint', methods=['POST']) def secure_endpoint(): token = request.headers.get('Authorization') if token in TOKENS: return jsonify({"message": "Access Granted"}) else: return jsonify({"message": "Access Denied"}), 403 if __name__ == '__main__': ``` ## Future Recommendations ### Security Enhancements 1. **VPN Security**: Employ multi-factor authentication (MFA) and VPN segmentation. 2. **Privileged Access Management (PAM)**: Implement PAM solutions to control administrative access. 3. **SSO Security**: Ensure robust security protocols during SSO transitions, including thorough testing and validation. ### MFA for VPN ```python import pyotp # Generate OTP for MFA totp = pyotp.TOTP("base32secret3232") print("Your OTP is:", # Function to verify OTP def verify_otp(user_input_otp): return totp.verify(user_input_otp) user_otp = input("Enter your OTP: ") if verify_otp(user_otp): print("OTP Verified, Access Granted") else: print("Invalid OTP, Access Denied") ```

loading..   21-Jun-2024
loading..   4 min read



Hackers exploit SolarWinds Serv-U CVE-2024-28995 flaw. 5,500-9,500 systems at ri...

# Technical Analysis and Research on CVE-2024-28995 Exploitation in SolarWinds Serv-U ## Overview The cybersecurity landscape is facing a critical threat with the active exploitation of a path traversal vulnerability in SolarWinds Serv-U software. This vulnerability, identified as CVE-2024-28995, poses significant risks to unpatched systems, demanding immediate attention and remediation. The flaw allows unauthenticated attackers to read arbitrary files on affected systems by manipulating HTTP GET requests. This technical analysis delves into the nuances of the vulnerability, the exploitation methods observed, and the necessary mitigation measures. ## Vulnerability Details ### CVE-2024-28995: Path Traversal Flaw CVE-2024-28995 is a high-severity directory traversal vulnerability in several SolarWinds Serv-U products, including: - Serv-U FTP Server 15.4 - Serv-U Gateway 15.4 - Serv-U MFT Server 15.4 - Serv-U File Server and earlier versions The flaw arises from insufficient validation of path traversal sequences, allowing attackers to bypass security checks and access sensitive files. This vulnerability is particularly concerning as it does not require authentication, making it an attractive target for threat actors. ### Impact of the Vulnerability Exploiting this flaw enables attackers to read files from the filesystem, potentially exposing sensitive data and leading to further compromise. The affected versions of the software are widely deployed, amplifying the potential impact. Older versions (15.3.2 and earlier) are also vulnerable but will be unsupported after February 2025. ## Exploitation Techniques ### Public Proof-of-Concept (PoC) Exploits The availability of public PoC exploits has accelerated the exploitation of CVE-2024-28995. Over the weekend, Rapid7 analysts published a detailed technical write-up, outlining the steps to exploit this vulnerability. Following this, an independent researcher released a PoC exploit and a bulk scanner on GitHub, further simplifying the attack process. ### Observed Exploitation Activities Analysts from GreyNoise set up a honeypot to monitor exploitation attempts. They observed a range of attack strategies, from manual attempts to automated scripts. These requests exploit the path traversal flaw to access critical files like `/etc/passwd` on Linux and `win.ini` on Windows, which contain valuable configuration data. ## Detailed Technical Analysis ### Vulnerability Exploitation The exploitation process involves crafting HTTP GET requests that manipulate the directory paths to traverse the filesystem. By bypassing security checks, attackers can access files outside the intended directories. ### Mitigation Measures SolarWinds released version 15.4.2 Hotfix 2 ( on June 5, 2024, which addresses this vulnerability by improving the validation of path traversal sequences. Administrators should apply this update immediately to mitigate the risk. These scripts demonstrate the simplicity of exploiting CVE-2024-28995, underscoring the need for prompt patching. ## Conclusion The active exploitation of CVE-2024-28995 in SolarWinds Serv-U products highlights the critical importance of timely vulnerability management. Unpatched systems are at high risk of compromise, with attackers leveraging publicly available exploits to access sensitive data. System administrators must apply the latest updates from SolarWinds to mitigate this threat. Continuous monitoring and adherence to security best practices are essential to safeguard against such vulnerabilities. --- By following the structured format and rigorous analysis, this technical research provides a comprehensive understanding of the CVE-2024-28995 exploitation, offering actionable insights for cybersecurity professionals.

loading..   20-Jun-2024
loading..   3 min read