Cyber attacks, security incidents and data breaches are constantly in the news. But when a cybersecurity vendor itself gets compromised, it does make everyone stand up and notice. Sadly, the enormity of the Barracuda email gateway security incident isn’t just limited to the name of the victim itself. It extends far beyond that to the fact that Barracuda is now advising customers to rip out vulnerable hardware - a huge ask, and a costly and news-making one at that. In this blog, our experts try to decode everything that happened in this major cybersecurity news of 2023. Our attempt is to break it down into simple-to-digest facts for everyone. As always, this exercise is purely educational and doesn’t intend to highlight or slight the victim.
A little over two weeks ago, security stalwart, Barracuda Networks, announced that it had identified a vulnerability in its Email Security Gateway Appliance (ESG) on May 19, 2023. The zero day vulnerability, a critical remote command injection flaw tracked as CVE-2023-2868, apparently affected a module in Barracuda’s Email Security Gateway for initial screening of attachments in incoming emails. This caused some email gateway appliances to be accessed by unauthorized parties. Barracuda then deployed a security patch to all vulnerable ESG appliances worldwide on May 20 and applied a second patch on May 21. However, this was after an unspecified number of customers was already compromised due to the email gateway breach. The company reiterated that no other Barracuda products, including its SaaS email security services were impacted by this zero-day vulnerability. Users whose appliances were believed to be impacted would have received notice via their ESG user interface. The actions for the customers included a review of their environments to determine if they needed to take any further steps. On May 30, 2023, Barracuda revealed that the vulnerability has actually been exploited for 7 months since October 2022. Attackers have probably had illicit access to "a subset of ESG appliances” and have deployed backdoors to ensure prolonged access to the affected systems
On May 6, however, Barracuda published an ‘action notice’. It began urging its customers to rip out affected ESG appliances as just fixing them with patches wasn’t going to work. Experts have called this development “stunning”. It is estimated that there are about 11,000 Barracuda ESG appliances on the internet. Many have suggested that Barracuda’s latest directive suggests that the malware has managed to achieve persistence at a low enough level that even cleaning the device won’t rid it of criminal access. The three types of malware discovered on hacked Barracuda appliances are SaltWater, SeaSpy, and SeaSide. To help its customers deal with the situation better, Barracuda is providing customers with assistance to deal with the current situation by releasing Indicators of compromise (IoCs) for both endpoints and networks. It is also sharing Yara rules that can be used for threat hunting. Barracuda has also said that apart from replacing hardware, impacted customers should review their affected appliances for signs of compromise since October 2022 at least. On May 8, the government of the Australian Capital Territory (ACT) said that it has become one of the victims of the vulnerability found in Barracuda's ESG appliances. The government spokesperson added that there is a chance that personal information may have been compromised but they're conducting a complete investigation to ascertain that.
Sky Prime Recoupment Agency was established in May 2015 streamline to streamline activities.
473 Grim Avenue San Diego, CA 92073 USA
+1 (276) 409-0156
info@skyprimerecoupmentagency.com
© 2015 - 2023 Sky Prime Recoupment Agency. All Rights Reserved.