Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

MinIO storage system exploited by hackers to target corporate networks

  • September 5, 2023
Total
0
Shares
0
0
0


If your MinIO client app was replaced with its evil twin that leaks sensitive data to third parties, would you notice? Some hackers are betting you wouldn’t, as that’s exactly what they have been doing against certain endpoints, researchers from Security Joes recently discovered.

In a detailed writeup, cybersecurity experts from Security Joes said they observed some threat actors chaining together two relatively unknown vulnerabilities: CVE-2023-28432 (CVSS score: 7.5) and CVE-2023-28434 (CVSS score: 8.8).

By using these two flaws, threat actors steal admin credentials and move into MinIO, an open-source object storage service where admins can keep things like unstructured data, logs, backups, and more. As it offers to keep files up to 50TB in size, as well as other advantages, it’s become a cost-effective choice.

Deceptive update

Once they gain access to the client, they can run a “deceptive update,” as Security Joes describes it. “By replacing the authentic MinIO binary with its ‘evil’ counterpart, the attacker seals the compromise of the system.”

The threat actors, which are yet to be named, are using a replica of an exploit called Evil MinIO, which was published on GitHub in April this year, The Hacker News reports. “That said, there is no evidence to suggest a connection between the exploit’s author and the attackers,” the publication adds.

Still, the compromised endpoint can then work as a backdoor, giving the attackers the ability to run commands on the host that runs the application. “Notably, the executed commands inherit the system permissions of the user who initiated the application. In this instance, due to inadequate security practices, the DevOps engineer launching the application held root-level permissions,” the researchers explained.

They added that there are more than 52,000 MinIO instances that are exposed on the public internet, with roughly two-fifths (38%) running an updated, protected version.

Via: BleepingComputer


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • Technology

Latch is becoming Door.com | TechCrunch

  • September 5, 2023
View Post
Next Article
  • News

Sea of Stars DLC is already in the works

  • September 5, 2023
View Post
You May Also Like
View Post
  • News

Quordle today – hints and answers for Wednesday, September 27 (game #611)

  • September 26, 2023
View Post
  • News

FTC Says Amazon Used These Tactics to Undermine Competition

  • September 26, 2023
View Post
  • News

Here Are the 2 Tactics Amazon Used to Undermine Competition, the F.T.C. Says

  • September 26, 2023
View Post
  • News

The laptop that weighs less than the Apple iPad Pro tablet has been refreshed — shame no one noticed

  • September 26, 2023
View Post
  • News

I was excited about the battery life on the Surface Laptop Studio 2… then I read the small print

  • September 26, 2023
View Post
  • News

Amazon to Invest Up to $4 Billion in A.I. Start-Up Anthropic

  • September 26, 2023
View Post
  • News

Top Apple Executive Defends Favoring Google on iPhones

  • September 26, 2023
View Post
  • News

CMF by Nothing’s new Buds Pro and Watch Pro look like affordable bargains

  • September 26, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.