A critical Barracuda security backdoor has been exploited for months, so patch now
Hackers have been exploiting a zero-day vulnerability in a Barracuda Networks product over several months to target countless organizations with numerous pieces of malware, reports have claimed.
The company said it has patched a critical vulnerability tracked as CVE-2023-2868, which had been used by threat actors since October 2022. The email software in question is called Barracuda Email Security Gateway (ESG), with versions between 5.1.3.001 and 9.2.0.006 being vulnerable.
“Users whose appliances we believe were impacted have been notified via the ESG user interface of actions to take,” the company said in a security advisory. “Barracuda has also reached out to these specific customers. Additional customers may be identified in the course of the investigation.”
Three malware families
So far, Barracuda says it has spotted three malware families being distributed via the zero-day: Saltwater, Seaside, and Seaspy.
The former allows threat actors to download and upload files, and run commands, among other things. Seaside is a persistence backdoor, while the latter is used to receive a C2 IP address and port to establish a reverse shell.
To make sure your organization is safe, you should do the following:
- Update your ESG appliance, and make sure it is regularly patched
- Stop using the compromised ESG appliance
- Rotate ESG appliance credentials where possible, including any connected LDAP/AD, Barracuda Cloud Control, FTP Server, SMB, and any private TLS certificates.
- The company also invites all clients who believe they may have been targeted, to reach out to support via [email protected].
Finally, organizations should review their network logs and look for possible indicators of compromise or unknown IP addresses.
According to the National Vulnerability Database, the flaw is a remote command injection vulnerability arising as the appliance fails to comprehensively sanitize the processing of .tar files (tape archives). In other words, formatting file names in a specific way allows the attackers to execute system commands.
Hackers have been exploiting a zero-day vulnerability in a Barracuda Networks product over several months to target countless organizations with numerous pieces of malware, reports have claimed. The company said it has patched a critical vulnerability tracked as CVE-2023-2868, which had been used by threat actors since October 2022. The…
Recent Posts
- The Delta Emulator is changing its logo after Adobe threatened it
- This devious Wi-Fi security flaw could let hackers eavesdrop on your network with ease
- The Tom’s Guide Awards are coming soon – here’s how to submit your products
- ‘iPhone 17 Slim’ rumors point to a redesigned model in 2025
- The OpenAI team tasked with protecting humanity is no more
Archives
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- December 2011