A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access.
Qlik Sense is a data discovery and analytics platform that allows you to visualize and analyze data from various sources. It has a modern interface, a relational analytics engine, and advanced artificial intelligence.
Cactus is ransomware that encrypts data, provides a ransom note (” cAcTuS.readme.txt “), and appends the. “CTS1 ” extension to filenames.
StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.
They exploit via the combination or direct abuse of (CVE-2023-41266, CVE-2023-41265). Reported by Articwolf.
CVE-2023-41266 Path traversal in Qlik Sense Enterprise for Windows. The severity range is high(8.2). An unauthenticated, remote attacker generates an anonymous session, which allows them to perform HTTP requests to unauthorized endpoints.
CVE-2023-41265 HTTP Tunneling vulnerability in Qlik Sense Enterprise for Windows, severity range is critical (9.6). Allowing them to execute HTTP requests on the backend server hosting the repository application.
Notably, the code was consistent between all intrusions identified and involved the Qlik Sense Scheduler service (Scheduler.exe), spawning uncommon processes.
The threat actors downloaded more tools to ensure remote control and persistence via PowerShell and the Background Intelligent Transfer Service (BITS). These tools included:
Also, the threat actors observed:
The evidence of these actors include:
Further technical data will be provided when available, but the incident response (IR) investigation is still underway.
Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.
VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations for…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple vulnerabilities…
Researchers at Palo Alto Networks' Unit 42 have revealed a troubling surge in large language…
Cybereason Security Services has published a comprehensive threat analysis highlighting the resurgence of the Phorpiex…
A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link's DSL-3788 routers,…
Authorities have delivered a major blow to the cybercrime world by dismantling two of the…