{"id":1,"date":"2022-06-03T15:36:42","date_gmt":"2022-06-03T15:36:42","guid":{"rendered":"https:\/\/gcsecurity.us\/?p=1"},"modified":"2023-01-27T19:58:43","modified_gmt":"2023-01-27T19:58:43","slug":"sec-bull-06-03-22","status":"publish","type":"post","link":"https:\/\/gcsecurity.us\/?p=1","title":{"rendered":"Threat Intelligence Bulletin &#8211; Follina, Stolen VPN Credentials, and Telegram Phishing"},"content":{"rendered":"\n<p>Microsoft Office zero-day \u2018Follina\u2019 (CVE-2022-30190) exploiting Support Diagnostic Tools<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/threatpost.com\/zero-day-follina-bug-lays-older-microsoft-office-versions-open-to-attack\/179756\/\">https:\/\/threatpost.com\/zero-day-follina-bug-lays-older-microsoft-office-versions-open-to-attack\/179756\/<\/a><\/li><li><a href=\"https:\/\/www.zdnet.com\/article\/this-zero-day-windows-flaw-opens-a-backdoor-to-hackers-via-microsoft-word-heres-how-to-fix-it\/\">https:\/\/www.zdnet.com\/article\/this-zero-day-windows-flaw-opens-a-backdoor-to-hackers-via-microsoft-word-heres-how-to-fix-it\/<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>FBI warns hackers selling VPN credentials from educational institutions<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/thehackernews.com\/2022\/05\/fbi-warns-about-hackers-selling-vpn.html\">https:\/\/thehackernews.com\/2022\/05\/fbi-warns-about-hackers-selling-vpn.html<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Chinese hackers infecting victims using man-on-the-side attacks by monitoring network tracking<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-luoyu-hackers-deploy-cyber-espionage-malware-via-app-updates\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-luoyu-hackers-deploy-cyber-espionage-malware-via-app-updates\/<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Windows Search zero-day can be used to open search window with remotely-hosted malware by launching a word doc<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-windows-search-zero-day-added-to-microsoft-protocol-nightmare\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-windows-search-zero-day-added-to-microsoft-protocol-nightmare\/<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Telegraph blogging platform being used for credential harvesting pages of phishing campaigns<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/telegram-s-blogging-platform-abused-in-phishing-attacks\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/telegram-s-blogging-platform-abused-in-phishing-attacks\/<\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Zero-day in unpatched Atlassian Confluence being exploited<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.helpnetsecurity.com\/2022\/06\/03\/cve-2022-26134\/\">https:\/\/www.helpnetsecurity.com\/2022\/06\/03\/cve-2022-26134\/<\/a><\/li><li><a href=\"https:\/\/thehackernews.com\/2022\/06\/hackers-exploiting-unpatched-critical.html\">https:\/\/thehackernews.com\/2022\/06\/hackers-exploiting-unpatched-critical.html<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Office zero-day \u2018Follina\u2019 (CVE-2022-30190) exploiting Support Diagnostic Tools https:\/\/threatpost.com\/zero-day-follina-bug-lays-older-microsoft-office-versions-open-to-attack\/179756\/ https:\/\/www.zdnet.com\/article\/this-zero-day-windows-flaw-opens-a-backdoor-to-hackers-via-microsoft-word-heres-how-to-fix-it\/ FBI warns hackers selling VPN credentials from educational institutions https:\/\/thehackernews.com\/2022\/05\/fbi-warns-about-hackers-selling-vpn.html Chinese hackers infecting victims using man-on-the-side attacks by monitoring network tracking https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-luoyu-hackers-deploy-cyber-espionage-malware-via-app-updates\/ Windows Search zero-day can be used to open search window with remotely-hosted malware by launching a word doc https:\/\/www.bleepingcomputer.com\/news\/security\/new-windows-search-zero-day-added-to-microsoft-protocol-nightmare\/ Telegraph blogging platform [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[15,14],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-news","tag-cybersecurity","tag-news"],"_links":{"self":[{"href":"https:\/\/gcsecurity.us\/index.php?rest_route=\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcsecurity.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcsecurity.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcsecurity.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcsecurity.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":5,"href":"https:\/\/gcsecurity.us\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":116,"href":"https:\/\/gcsecurity.us\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/116"}],"wp:attachment":[{"href":"https:\/\/gcsecurity.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcsecurity.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcsecurity.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}