Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
A zero-day vulnerability in Barracuda’s Email Security Gateway (ESG) appliances has been exploited by Chinese threat actors. Tracked as CVE-2023-7102, the vulnerability leads to the installation of backdoors on devices.
The zero-day flaw revolves around arbitrary code execution within a third-party and open-source library named “Spreadsheet::ParseExcel.” This library is used by the Amavis scanner within the gateway to analyze Microsoft Excel email attachments for potential malware.
The threat actor behind the exploitation, UNC4841, was previously associated with the exploitation of another Barracuda zero-day (CVE-2023-2868) earlier in the year. The threat actor executed the new flaw by using a specially crafted Microsoft Excel email attachment. Later, new iterations of known implants named SEASPY and SALTWATER were deployed, providing persistence and command execution capabilities.
Austin Larsen from Mandiant highlighted the effortless execution of the attack. When a target receives an email containing the malicious Excel attachment from UNC4841, the Barracuda ESG appliance scans the email, triggering the execution of the malicious code within the Excel file – a process that does not require action from the end-user.
Barracuda applied a security update on December 21, 2023, with no further action required from customers. Additionally, another patch was deployed on December 22 to address compromised ESG appliances exposing indicators of compromise related to the newly identified malware variants. Barracuda did not disclose the extent of the compromise but the company did stress the need for downstream users to address the original flaw in the “Spreadsheet::ParseExcel Perl” module (version 0.65), assigned the CVE number CVE-2023-7101.
INDICATORS OF COMPROMISE (IoCs)
IP Addresses
MD5 Hashes
SHA256
SUPPORTING DOCUMENTATION
Barracuda Email Security Gateway Appliance (ESG) Vulnerability
Spreadsheet::ParseExcel - Read information from an Excel file. - metacpan.org
Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances (thehackernews.com)
Another Barracuda ESG zero-day flaw exploited in the wild | TechTarget