Wednesday, February 12, 2025
HomeNewsExim Mail Server Vulnerability Exposes Millions to Malicious Attachments

Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments

A vulnerability tracked as CVE-2024-39929 with a CVSS score of 9.1, has been addressed. This flaw previously allowed threat actors to craft and deliver malicious attachments to victims’ inboxes. The report indicated that the most vulnerable instances were located in Russia, Canada, and the United States. Although there is no evidence of active exploitation, users are strongly advised to update to the latest version as soon as possible. A situation report shared with the U.S. National Vulnerability Database (NVD) stated that “Exim through 4.97.1 misparses a multiline RFC 2231 header filename, enabling remote attackers to bypass a $mime_filename extension-blocking protection mechanism, potentially delivering executable attachments to end-users’ mailboxes.”

AI-Powered Russian Bot Disinformation Farm Exposed

The United States Department of Justice has confirmed the successful seizure of a Russian disinformation farm operated by AI-powered bots. The farm utilized a botnet comprising 968 X accounts. The agency seized two internet domains and identified over 1,000 social media accounts used by Russian threat actors for pro-Kremlin disinformation.

“The social media bot farm used elements of AI to create fictitious social media profiles — often purporting to belong to individuals in the United States — which the operators then used to promote messages supporting Russian government objectives.”

Further details revealed that the establishment of the bot farm began in April 2022, involving the anonymous procurement of online infrastructure to spread disinformation through fictitious online personas from various nationalities.

Australian Military Personnel and Husband Face Legal Action for Espionage

A 40-year-old army private in the Australian Defence Force (ADF) and her 62-year-old husband, identified by the media as Kira Korolev and Igor Korolev, now face charges of “spying on behalf of Russia,” which could result in up to 15 years of imprisonment. The two Russian-born Australian citizens are reportedly part of BURGAZADA, a complex law enforcement operation.

Reports indicate that the couple has resided in Australia for over a decade. They live in the Brisbane suburb of Everton Park, where the Australian Federal Police (AFP) arrested them on July 11, 2024. According to the AFP, this espionage case is the first of its kind since the establishment of new laws by the Commonwealth in 2018.

GED Lawyers Ransomware Attack

GED Lawyers, a legal firm dedicated to helping victims of personal injury and natural disasters recover compensation from harm caused by negligence, misconduct, or an insurance company’s unreasonable behaviour, has suffered a ransomware attack by Arcusmedia. With over 200 employees, the firm specializes in personal injury protection, personal injury, disaster recovery, estate planning, asset protection, real estate, and product liability. GED Lawyers reports a revenue of $20.6 million.

Rite Aid Ransomware Attack

Rite Aid, a full-service company committed to improving health outcomes with specialities in retail pharmacy, telehealth, pharmacy benefit management, and health management, has been attacked by the Ransomhub ransomware group. Rite Aid employs over 1,000 people and reports a revenue of $23.5 billion.

SF Medical Products Ransomware Attack

SF Medical Products, an international manufacturer of affordable yet high-quality medical products used by medical professionals, has also been targeted by Ransomhub. The company employs over 50 people and reports a revenue of $5 million.

 

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular