23 Vulnerabilities in Black Basta’s Chat Logs Exploited in the Wild, Including PAN-OS, Cisco IOS, & Exchange

GreyNoise has confirmed active exploitation of 23 out of 62 vulnerabilities referenced in internal chat logs attributed to the Black Basta ransomware group. These vulnerabilities span enterprise software, security appliances, and widely deployed web applications, with several critical flaws exploited as recently as the past 24 hours. The findings underscore the persistent targeting of known […] The post 23 Vulnerabilities in Black Basta’s Chat Logs Exploited in the Wild, Including PAN-OS, Cisco IOS, & Exchange appeared first on Cyber Security News.

Feb 27, 2025 - 13:36
 0
23 Vulnerabilities in Black Basta’s Chat Logs Exploited in the Wild, Including PAN-OS, Cisco IOS, & Exchange

GreyNoise has confirmed active exploitation of 23 out of 62 vulnerabilities referenced in internal chat logs attributed to the Black Basta ransomware group.

These vulnerabilities span enterprise software, security appliances, and widely deployed web applications, with several critical flaws exploited as recently as the past 24 hours.

The findings underscore the persistent targeting of known vulnerabilities, even those absent from government advisories like CISA’s Known Exploited Vulnerabilities (KEV) catalog.

The leaked logs, initially compiled by cybersecurity firm VulnCheck, provided a rare window into the vulnerabilities prioritized by ransomware operators.

List of CVEs in chat logs (Compiled by Vulncheck)

Actively Exploited vulnerabilities:

CVE IDDescriptionVendor/ProductExploitation Status
CVE-2024-3400PAN-OS Command InjectionPalo Alto NetworksActive (Last 24h)
CVE-2024-27198JetBrains TeamCity Authentication BypassJetBrainsActive (Last 24h)
CVE-2024-24919Check Point Quantum Security Gateways Info DisclosureCheck PointActive (Last 24h)
CVE-2024-23897Jenkins CLI Path TraversalJenkinsConfirmed Active
CVE-2024-1709ConnectWise ScreenConnect Auth BypassConnectWiseActive (Last 24h)
CVE-2023-6875WordPress Post SMTP Mailer Missing AuthorizationWPExpertsActive (Not in KEV)
CVE-2023-4966Citrix NetScaler ADC Buffer Overflow (Citrix Bleed)CitrixActive (Last 24h)
CVE-2023-42793JetBrains TeamCity Auth BypassJetBrainsConfirmed Active
CVE-2023-36845Juniper Junos OS PHP Variable ControlJuniperActive (Last 24h)
CVE-2023-36844Juniper Junos EX PHP Variable ModificationJuniperConfirmed Active
CVE-2023-29357Microsoft SharePoint Privilege EscalationMicrosoftConfirmed Active
CVE-2023-22515Atlassian Confluence Access Control BypassAtlassianActive (Last 24h)
CVE-2023-20198Cisco IOS XE Web UI Privilege EscalationCiscoActive (Last 24h)
CVE-2022-41082Microsoft Exchange Remote Code ExecutionMicrosoftActive (Last 24h)
CVE-2022-41040Microsoft Exchange Server-Side Request ForgeryMicrosoftConfirmed Active
CVE-2022-37042Zimbra Collaboration Suite Auth BypassSynacorConfirmed Active
CVE-2022-30525Zyxel Firewall OS Command InjectionZyxelActive (Last 24h)
CVE-2022-27925Zimbra Arbitrary File UploadSynacorConfirmed Active
CVE-2022-26134Atlassian Confluence Remote Code ExecutionAtlassianConfirmed Active
CVE-2022-22965Spring Framework RCE (Spring4Shell)VMwareConfirmed Active
CVE-2022-1388F5 BIG-IP Missing AuthenticationF5 NetworksConfirmed Active
CVE-2021-44228Apache Log4j RCE (Log4Shell)ApacheActive (Last 24h)
CVE-2021-26855Microsoft Exchange RCE (ProxyLogon)MicrosoftActive (Last 24h)

Recent Surge in Zero-Day Exploitation

GreyNoise’s internet-wide telemetry identified exploitation activity for 23 CVEs, including high-severity flaws in Palo Alto Networks PAN-OS, Cisco IOS XE, and Microsoft Exchange Server. Notably, CVE-2023-6875, a missing authorization vulnerability in the WordPress plugin “Post SMTP Mailer,” has seen exploitation despite lacking KEV designation, highlighting the limitations of static vulnerability lists.

The operational tempo of attackers remains alarming, with 12 CVEs exploited within the past 24 hours alone. These include:

Network appliances from Palo Alto, Cisco, and Juniper dominate the exploited vulnerabilities list. CVE-2024-3400, a command injection flaw in Palo Alto’s PAN-OS, enables unauthenticated attackers to execute arbitrary code with root privileges. Similarly, CVE-2023-20198 in Cisco IOS XE’s web UI has resurfaced as a prime target, allowing attackers to create privileged accounts and deploy malicious implants.

Juniper’s Junos OS vulnerabilities (CVE-2023-36845 and CVE-2023-36844) continue to be exploited through PHP variable manipulation, enabling remote code execution on EX Series switches. These attacks often precede lateral movement attempts within corporate networks.

High-traffic web platforms remain vulnerable, with CVE-2023-22515 (Atlassian Confluence access control bypass) and CVE-2022-26134 (Confluence Server remote code execution) actively exploited. Microsoft Exchange Server vulnerabilities CVE-2021-26855 (ProxyLogon) and CVE-2022-41082 persist in attacker playbooks, enabling mailbox infiltration and server compromise.

The reappearance of CVE-2021-44228 (Log4Shell) in exploitation attempts underscores the challenge of eradicating this ubiquitous logging library vulnerability.

Hack Attempts

GreyNoise observed renewed scanning for Log4j instances, particularly in unpatched IoT and enterprise systems.

GreyNoise’s 24-hour activity snapshot reveals intensified targeting of:

  • CVE-2024-24919: Check Point Quantum Security Gateways information disclosure
  • CVE-2023-4966: Citrix NetScaler ADC buffer overflow (Citrix Bleed)
  • CVE-2022-30525: Zyxel firewall OS command injection

These exploits frequently precede ransomware deployment, with attackers leveraging initial access to disable security tools and exfiltrate data. The ConnectWise ScreenConnect flaw (CVE-2024-1709) has become particularly prevalent, with attackers exploiting authentication bypasses to implant remote access trojans.

While patching remains critical, the absence of CVE-2023-6875 from the KEV catalog demonstrates the need for real-time threat intelligence. GreyNoise recommends:

  1. Network Segmentation: Isolate internet-facing systems like Exchange servers and VPN gateways.
  2. Behavioral Monitoring: Detect anomalous process creation and suspicious authentication patterns.
  3. Compromise Assessments: Hunt for indicators of exploitation across the 23 CVEs using IoCs from GreyNoise’s dataset.

With ransomware groups increasingly automating vulnerability exploitation, continuous monitoring, and infrastructure hardening have become non-negotiable components of modern cybersecurity programs.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

The post 23 Vulnerabilities in Black Basta’s Chat Logs Exploited in the Wild, Including PAN-OS, Cisco IOS, & Exchange appeared first on Cyber Security News.