Tuesday , June 25 2024
Source: BGD e-GOV CIRT

Current web vulnerabilities in Bangladesh across vendor product line

On a report titled “Surge on Web defacement and web application related vulnerabilities targeting Bangladesh” BGD e-GOV CIRT said, web defacement attacks and the exploitation of web application vulnerabilities are a growing trend in Bangladesh.

These weaknesses can be used for phishing attacks, spreading malware, and creating backdoors for continuous access, further endangering the security of the affected websites. Websites and applications use environment or configuration files to manage content and specify data locations. Alterations to these files can indicate a security breach or defacement attack. 73% of all identified web vulnerabilities are found in websites and IoT devices accessed through basic HTTP authentication.

LockBit Claims 33 TB of US Federal Reserve Data

LockBit claimed that it breached Federal Reserve Board (Federalreserve.gov), the central banking system of the United States and exfiltrated 33...
Read More
LockBit Claims 33 TB of US Federal Reserve Data

Indonesia’s National data center compromised, $8M ransom demand

Cyber attack compromised Indonesia's national data center, causing trouble with immigration checks at airports. Attacker demanded an $8 million ransom,...
Read More
Indonesia’s National data center compromised, $8M ransom demand

ESET Issues Security Patch for Privilege Escalation Flaw

ESET Issued security patch for privilege escalation flaw in its Windows security products. This flaw, called CVE-2024-2003 (CVSS 7.3), was...
Read More
ESET Issues Security Patch for Privilege Escalation Flaw

Hacker offer zero-day RCE exploit of Atlassian Jira for Sale

A threat offer to sell a zero-day exploit for Atlassian's Jira in a underground forum. This exploit can be used...
Read More
Hacker offer zero-day RCE exploit of Atlassian Jira for Sale

US bans Kaspersky software over Russia ties

The US plans to ban the sale of Kaspersky antivirus software due to its alleged ties to the Kremlin. Gina...
Read More
US bans Kaspersky software over Russia ties

China-linked spies target Asian Telcos since 2021

A group believed to be linked to China has hacked multiple telecom operators in an Asian country since 2021, according...
Read More
China-linked spies target Asian Telcos since 2021

Azad selected expert reviewer for CISA Review Manual 28th Edition

Certified Information Systems Auditor (CISA) is a globally recognized professional certification for information systems audit, control, and security. It's offered...
Read More
Azad selected expert reviewer for CISA Review Manual 28th Edition

Attackers Target AWS Vaults, Buckets, and Secrets

DataDog Security Labs found a worrying campaign targeting Amazon Web Services (AWS), showing a new wave of harmful activity aimed...
Read More
Attackers Target AWS Vaults, Buckets, and Secrets

CISA released Guidance for Modern Approaches to Network Access Security

CISA and the FBI released guidance, Modern Approaches to Network Access Security, with support from other organizations including New Zealand’s...
Read More
CISA released Guidance for Modern Approaches to Network Access Security

CISA Releases One Industrial Control Systems Advisory

On June 18, 2024, CISA released an advisory about Industrial Control Systems (ICS). These advisories give important information about security...
Read More
CISA Releases One Industrial Control Systems Advisory

CIRT report highlighted the web vulnerabilities associated it assets/products used by Bangladeshi organizations. In the report CIRT mentioned numerous worlds’ renowned vendors names and CVE’s related to their products and the severity.

Source: BGD e-GOV CIRT

According to CIRT report, VMware CVE’s (33.11%) mostly affect Bangladeshi organization. Zimbra is in the 2nd position with 27.03% CVE’s and Roundcube with 17.23 % CVE’s is in 3rd position in the chart.

  Source: BGD e-GOV CIRT

CIRT said for some common causes such incident happened including outdated software, weak credentials, poor configuration, lack of security updates and insecure code.

According to CIRT, hackers attack such sites using remote file inclusion (RFI), SQL injection, cross-site scripting, (XSS), Brute force attack and expiating vulnerable software.

CIRT mentioned some effective remediation strategies to mitigate these vulnerabilities, including Parameterized Queries and ORM (SQL Injection), Input Validation and Sanitization, Output Encoding (XSS), Content Security Policy (CSP) (XSS), Patch Management, Web Server Configuration and to Follow OWASP Guidelines. Implementing these strategies can significantly enhance web security and protect against defacement attacks.

 

Check Also

camera

Dahua Cameras 0day Vulnerability offer to sell

A threat actor has announced selling a 0day vulnerability for Dahua cameras. The bad actor …

Leave a Reply

Your email address will not be published. Required fields are marked *