Tempo of exploit raises issues
Exploitation exercise was noticed lower than a day after the vulnerability turned public, which, Sysdig famous, demonstrates risk actors rapidly operationalizing new vulnerabilities (in all probability by automation).
Attackers may construct a working exploit simply from the advisory description and rapidly begin scanning for flawed situations. “Exfiltrated info included keys and credentials, which offered entry to related databases and potential software program provide chain compromise,” Sysdig researchers stated.
With patch home windows collapsing considerably, runtime detection stays a major and the one choice, Sysdig famous. “Each attacker on this marketing campaign adopted the identical post-exploitation playbook: execute a shell command by way of Python’s os.popen(), then exfiltrate the output over HTTP,” it stated, including that runtime guidelines can detect these makes an attempt.



