• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Microsoft Warns of State-Sponsored Attacks Exploiting Critical PaperCut Vulnerability

You are here: Home / Cyber Security News / Microsoft Warns of State-Sponsored Attacks Exploiting Critical PaperCut Vulnerability

Iranian nation-state groups have now joined economically inspired actors in actively exploiting a critical flaw in PaperCut print management software program, Microsoft said.

The tech giant’s danger intelligence crew explained it observed equally Mango Sandstorm (Mercury) and Mint Sandstorm (Phosphorus) weaponizing CVE-2023-27350 in their operations to reach original access.

“This action displays Mint Sandstorm’s continued capability to speedily integrate [proof-of-concept] exploits into their operations,” Microsoft claimed in a series of tweets.

On the other hand, CVE-2023-27350 exploitation activity related with Mango Sandstorm is reported to be on the decreased stop of the spectrum, with the point out-sponsored team “working with applications from prior intrusions to link to their C2 infrastructure.”

It really is worthy of noting that Mango Sandstorm is linked to Iran’s Ministry of Intelligence and Security (MOIS) and Mint Sandstorm is stated to be involved with the Islamic Groundbreaking Guard Corps (IRGC).

The ongoing assault arrives weeks right after Microsoft confirmed the involvement of Lace Tempest, a cybercrime gang that overlaps with other hacking teams like FIN11, TA505, and Evil Corp, in abusing the flaw to produce Cl0p and LockBit ransomware.

CVE-2023-27350 (CVSS rating: 9.8) relates to a critical flaw in PaperCut MF and NG installations that could be exploited by an unauthenticated attacker to execute arbitrary code with Program privileges.

A patch was produced obtainable by PaperCut on March 8, 2023. Trend Micro’s Zero Day Initiative (ZDI), which identified and noted the issue, is expected to launch far more technical data about it on Might 10, 2023.

Cybersecurity business VulnCheck, past week, published details on a new line of attack that can circumvent existing detections, enabling adversaries to leverage the flaw unimpeded.

Forthcoming WEBINARLearn to Prevent Ransomware with Real-Time Security

Sign up for our webinar and study how to prevent ransomware attacks in their tracks with serious-time MFA and support account defense.

Save My Seat!

With extra attackers leaping in on the PaperCut exploitation bandwagon to breach vulnerable servers, it can be imperative that corporations go promptly to utilize the important updates (versions 20.1.7, 21.2.11, and 22..9 and afterwards).

The growth also follows a report from Microsoft which disclosed that Iranian threat actors in Iran are progressively relying on a new tactic that brings together offensive cyber operations with multi-pronged influence functions to “fuel geopolitical improve in alignment with the regime’s targets.”

The change coincides with an greater tempo in adopting freshly claimed vulnerabilities, the use of compromised internet websites for command-and-command to superior conceal the source of assaults, and harnessing custom tooling and tradecraft for highest effects.

Discovered this short article intriguing? Abide by us on Twitter  and LinkedIn to study much more unique material we post.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Five Takeaways From the Russian Cyber-Attack on Viasat’s Satellites
Next Post: CISOs Worried About Personal Liability For Breaches »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS
  • New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Copyright © 2025 · AllTech.News, All Rights Reserved.