Dec. 27, 2023, 2:36 p.m. | /u/ATTACKERSA

cybersecurity www.reddit.com

Barracuda disclosed that Chinese threat actors exploited a zero-day (CVE-2023-7102) in its Email Security Gateway, allowing arbitrary code execution through a third-party library. This follows a prior incident (CVE-2023-2868) this year by the same threat actor (UNC4841). The exploit involves a crafted Excel email attachment, leading to backdoor deployment with known implants SEASPY and SALTWATER. Barracuda released an automatic security update on December 21, 2023, and deployed a patch for compromised devices the next day. The original flaw in Spreadsheet::ParseExcel …

actor arbitrary code attachment backdoor barracuda chinese code code execution cve cve-2023-2868 cybersecurity deployment email email attachment email security email security gateway excel exploit exploited gateway implants incident library party seaspy security security gateway solution third third-party threat threat actor threat actors unc4841 zero-day

Senior Security Researcher

@ Microsoft | Redmond, Washington, United States

Sr. Cyber Risk Analyst

@ American Heart Association | Dallas, TX, United States

Cybersecurity Engineer 2/3

@ Scaled Composites, LLC | Mojave, CA, US

Information Security Operations Manager

@ DP World | Charlotte, NC, United States

Sr Cyber Security Engineer I

@ Staples | Framingham, MA, United States

Security Engineer - Heartland (Remote)

@ GuidePoint Security LLC | Remote in the US