ARTICLE
13 January 2023

Ankura CTIX FLASH Update - January 10, 2023

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
On January 5, 2023, Maternal & Family Health Services (MFHS) disclosed that a ransomware attack occurred on April 4, 2022, and unauthorized actors had access to their systems prior to the attack, specifically since August 21, 2021.
United States Food, Drugs, Healthcare, Life Sciences

Malware Activity

Health and Human Services Organization Discloses Ransomware Attack and Breach from Early 2022

On January 5, 2023, Maternal & Family Health Services (MFHS) disclosed that a ransomware attack occurred on April 4, 2022, and unauthorized actors had access to their systems prior to the attack, specifically since August 21, 2021. MFHS is a private non-profit health and human services organization that serves Northeast Pennsylvania. The organization confirmed that breach notification letters began being sent to those potentially impacted, including former and current employees, patients, and vendors, on January 3, 2023. The information that may have been compromised during the ransomware attack includes, but is potentially not limited to, names, addresses, dates of birth, driver's license numbers, Social Security numbers (SSNs), financial account and payment card data, usernames, passwords, medical information and/or health insurance information. MFHS currently has no evidence that the compromised data has been misused and a ransomware group has yet to be attributed to the April 2022 attack. CTIX analysts will continue to monitor for advancements and update accordingly.

Threat Actor Activity

Cold River Threat Actors Target United States Nuclear Research Labs

Recent research has revealed that Russian threat actors targeted several United States nuclear research laboratories in late summer 2022. The threat actors are tied to the Cold River (Callisto, TAG-53) organization, a Russian state-sponsored group known to commonly conduct cyberespionage operations. It is believed that affiliations between the threat group and the Russian state surfaced when data trails led back to an IT employee in Syktyvkar named Andrey Korinets. Several email addresses tied to Korinets were used in connection with Cold River operations between 2015 and 2020 alongside discussions on several Russian dark web forums. Between August and September of 2022, Cold River launched a social engineering campaign targeting nuclear scientists with fake login portals in an attempt to steal credentials. Specifically, threat actors mimicked copies of the Argonne, Brookhaven, and Livermore National Laboratories login pages and distributed them in their phishing emails. It has not been determined if any further compromise has occurred from this campaign or why these facilities were specifically targeted. Recent activity from the group shows that Cold River registered several domain names imitating non-governmental organizations investigating war crimes in the Russia/Ukraine conflict. CTIX will continue to monitor for any fallout from these campaigns and provide additional updates accordingly.

Vulnerabilities

Okta Autho Patches Critical RCE Vulnerability Impacting a Very Prolific Open-Source Library

A critical remote code execution (RCE) vulnerability has been patched in the popular JsonWebToken open-source encryption library maintained by Okta Autho. The library is downloaded from Node Package Manager (NPM), a free library and registry for the publishing of JavaScript software packages utilized by developers. Specifically, JsonWebToken is utilized to digitally create, sign, and verify a JSON Web Token (JWT), the open-source standard defining how to securely transmit information between parties as a JSON object. The vulnerability, tracked as CVE-2022-23529, is described as an input validation flaw. A threat actor could exploit this vulnerability by manipulating the "secretOrPublicKey" argument in JsonWebToken's verify() method, used to verify and return the unencrypted information. This can be carried out via maliciously crafted code input, allowing the attacker to gain control over a key retrieval parameter to take over accounts, impersonate users, steal sensitive information, and elevate privileges to carry out malicious follow-on activity. Although it is rated as high severity, the flaw received a CVSS score of 7.6/10 due to the fact that the attacker would still need to compromise the key management process between an application and a JsonWebToken server before being able to exploit this vulnerability. With an estimated 36 million NPM downloads per month, the popularity of the JsonWebToken poses a massive risk to supply chains. The patch implements additional checks for the "secretOrPublicKey" parameter, and CTIX analysts urge all JavaScript developers dependent on the library to upgrade to the secure version immediately.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More