Apple has released urgent software updates to fix two critical security flaws that are currently being exploited by attackers. These vulnerabilities could allow malicious web content to execute harmful code or perform cross-site scripting (XSS) attacks. Users are urged to update their devices immediately to reduce the risk of exploitation.
The updates address security weaknesses in multiple Apple platforms, including iOS, iPadOS, macOS, visionOS, and the Safari web browser.
Details of the Vulnerabilities
CVE-2024-44308 (CVSS Score: 8.8)
CVE-2024-44309 (CVSS Score: 6.1)
Security Enhancements
Apple has addressed these vulnerabilities with:
Affected Devices and Updates
Recommendations
All users should update their devices as soon as possible to safeguard against these actively exploited vulnerabilities. To install the updates, navigate to your device’s Settings > General > Software Update section and follow the on-screen instructions.
Attackers have exploited two critical vulnerabilities in Palo Alto Networks firewalls, compromising thousands of devices and deploying malicious software. The breaches have allowed attackers to install web-accessible backdoors, cryptocurrency miners, and other malware, effectively taking control of the affected firewalls.
Approximately 2,000 firewalls were compromised, according to reports from Shadowserver and Onyphe. This number has reduced to around 800, likely due to remediation efforts following the release of patches. Despite these reports, Palo Alto Networks maintains that the exploitation is limited to "a small number" of installations.
The exploited devices were exposed via their PAN-OS management interfaces, which are accessible either from the internet or through internal networks.
Vulnerabilities and Exploits
CVE-2024-0012 (Critical, CVSS Score: 9.3)
CVE-2024-9474 (Medium, CVSS Score: 6.9)
Exploitation Timeline
Recommendations
While Palo Alto Networks has acknowledged the vulnerabilities and exploitation, it has refrained from providing precise numbers regarding compromised devices. The company continues to stress the importance of securing management interfaces to prevent further exploitation.
A Russian-linked cyber espionage campaign targeting organisations in Europe and Asia has been identified. The campaign, attributed to the TAG-110 threat actor group, employs HATVIBE and CHERRYSPY malware for intelligence gathering.
The activity, attributed to TAG-110 by Recorded Future’s Insikt Group, overlaps with:
The campaign appears to align with Russian geopolitical objectives, particularly in post-Soviet states and NATO-aligned countries.
Malware Overview
Attack Methodology
Strategic Objectives
According to Recorded Future, this campaign is part of a broader Russian strategy to:
These activities are consistent with Russia’s hybrid warfare doctrine, blending cyber espionage, sabotage, and influence operations to weaken adversaries without triggering direct conflict.
Broader Implications
Russia’s cyber operations have intensified following its invasion of Ukraine in February 2022. Observers warn of:
The Gerasimov Doctrine, which outlines Russia’s hybrid war strategy, suggests that these activities will escalate in destructiveness while staying below the threshold of outright war with NATO.
Recommendations
This campaign highlights Russia’s continued use of cyber operations as a tool of geopolitical influence and destabilisation. Organisations in targeted regions should remain vigilant, adopting comprehensive cybersecurity measures to mitigate the risk of compromise.
Contact Periculo for expert cyber security solutions tailored to the digital health industry.