Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Uncovering the DeepDATA Malware: A Threat to Fortinet Users and the Unpatched Vulnerability


DeepDATA malware exploits unpatched vulnerability in Fortinet's VPN client on Windows, posing a significant threat to users who rely on unpatched software. Volexity reported the flaw to Fortinet in July 2024 but the company has yet to address the issue. The lack of transparency from Fortinet raises concerns among cybersecurity experts.

  • The DeepDATA malware is a modular post-exploitation tool developed by BrazenBamboo, a threat actor known for its sophisticated tactics.
  • The malware was first discovered by Volexity, a cybersecurity firm that specializes in identifying and analyzing emerging threats.
  • The DeepDATA malware gathers information from target devices, including VPN credentials, communication platforms, application passwords, web browser information, Wi-Fi hotspots, and installed software.
  • The malware exploits an unpatched vulnerability in Fortinet's VPN client on Windows to extract VPN credentials from memory of the client's process.
  • Fortinet has yet to address the issue despite Volexity reporting it in July 2024, raising concerns among cybersecurity experts.
  • The DeepDATA malware poses a significant threat to users who rely on Fortinet's VPN services and highlights the importance of staying up-to-date with security patches and monitoring system logs for suspicious activity.



  • The cybersecurity landscape is constantly evolving, with new threats emerging every day. One such threat that has gained significant attention recently is the DeepDATA malware, which has been linked to an unpatched vulnerability in Fortinet's FortiClient for Windows. In this article, we will delve into the world of cyber threats and explore the details of the DeepDATA malware, its connection to Fortinet, and the implications it poses to users.

    The DeepDATA malware is a modular post-exploitation tool developed by BrazenBamboo, a threat actor known for its sophisticated tactics. The malware was first discovered by Volexity, a cybersecurity firm that specializes in identifying and analyzing emerging threats. According to Volexity, the DeepDATA malware is designed to gather a wide range of information from target devices, including VPN credentials, communication platforms, application passwords, web browser information, Wi-Fi hotspots, and installed software.

    At the heart of the DeepDATA malware is a dynamic-link library (DLL) loader called "data.dll," which decrypts and launches 12 different plugins using an orchestrator module ("frame.dll"). The plugins are designed to perform specific tasks, such as capturing VPN credentials or exfiltrating files. One of the plugins, specifically, exploits a zero-day vulnerability in Fortinet's VPN client on Windows that allows it to extract the credentials for the user from memory of the client's process.

    This vulnerability, which remains unpatched, poses a significant threat to users who rely on Fortinet's VPN services. The fact that the DeepDATA malware can exploit this vulnerability without requiring any user interaction highlights the importance of staying up-to-date with security patches and regularly monitoring system logs for suspicious activity.

    Volexity reported the flaw to Fortinet on July 18, 2024, but it remains unclear whether the company has taken adequate action to address the issue. The lack of transparency from Fortinet on this matter raises concerns among cybersecurity experts, who warn that users may be unwittingly putting themselves at risk by using unpatched software.

    The connection between DeepDATA and other malware families developed by BrazenBamboo is also noteworthy. Volexity notes that the architecture for the Windows variant of LightSpy, another malware family associated with BrazenBamboo, is different from other documented OS variants. This suggests that the malware families may be linked to a private enterprise that has been tasked with developing hacking tools for governmental operators.

    While it is unclear whether BH_A006, a loader used by LightSpy, is commercially available or part of a centralized pool of tools and techniques among Chinese threat actors, the overlap between DeepDATA and other malware families highlights the sophistication of BrazenBamboo's tactics. The fact that they have been able to develop such advanced malware without being detected suggests that they have access to significant resources and expertise.

    In conclusion, the DeepDATA malware poses a serious threat to Fortinet users who rely on unpatched software. The lack of transparency from Fortinet on this matter raises concerns among cybersecurity experts, who warn that users may be unwittingly putting themselves at risk by using unpatched software. As the cybersecurity landscape continues to evolve, it is essential for users and organizations to prioritize staying up-to-date with security patches and regularly monitoring system logs for suspicious activity.

    Summary:

    The DeepDATA malware, developed by BrazenBamboo, poses a significant threat to Fortinet users who rely on unpatched software. The malware exploits an unpatched vulnerability in Fortinet's VPN client on Windows that allows it to extract VPN credentials from memory of the client's process. Despite Volexity reporting the flaw to Fortinet in July 2024, the company has yet to address the issue, raising concerns among cybersecurity experts. As users and organizations prioritize staying up-to-date with security patches, they must also remain vigilant in monitoring system logs for suspicious activity.




    Related Information:

  • https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html


  • Published: Sat Nov 16 03:56:02 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us