<p>The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: <b>APT, Cyber mercenaries, Phishing, Rootkits, Spyware,</b> and <b>Vulnerabilities</b>. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.</p> <p><img src="https://cdn.filestackcontent.com/3Y72YoI9Qa2zuTAUPfqn"/><br/> <b>Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.</b></p> <h2>Trending Cyber News and Threat Intelligence</h2> <div class="trending-threat-article"> <h3><a href="https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-stealing-browser-extension-sharpext/" target="_blank">SharpTongue Deploys Clever Mail-Stealing Browser Extension “SHARPEXT”</a></h3> <p>(published: July 28, 2022)</p> <p>Volexity researchers discovered SharpExt, a new malicious browser app used by the North-Korea sponsored Velvet Chollima (Kimsuky, SharpTongue, Thallium) group. SharpExt inspects and exfiltrates data from a victim's webmail (AOL or Gmail) account as they browse it. Velvet Chollima continues to add new features to the app, the latest known version (3.0) supports three browsers: Microsoft Edge, Google Chrome, and Whale, the latter almost exclusively used in South Korea. Following the initial compromise, Velvet Chollima deploy SharpExt and to avoid warning the victim they manually exfiltrate settings files to change the settings and generate a valid "super_mac" security check value. They also hide the newly opened DevTools window and any other warning windows such as a warning regarding extensions running in developer mode.<br/> <b>Analyst Comment:</b> Velvet Chollima is known for its tactic of deploying malicious browser extensions, but in the past it was concentrating on stealing credentials instead of emails. The group continues aggressive cyberespionage campaigns exfiltrating military and industrial technologies from Europe, South Korea, and the US. Network defenders should monitor for suspicious instances of PowerShell execution, as well as for traffic to and from known Velvet Chollima infrastructure (available in Anomali Match).<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/947129" target="_blank">[MITRE ATT&CK] Browser Extensions - T1176</a> | <a href="https://ui.threatstream.com/ttp/947098" target="_blank">[MITRE ATT&CK] Email Collection - T1114</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/3905776" target="_blank">[MITRE ATT&CK] Hide Artifacts - T1564</a><br/> <b>Tags:</b> SharpExt, Velvet Chollima, Kimsuky, SharpTongue, Thallium, APT, North Korea, source-country:KP, South Korea, target-country:KR, USA, target-country:US, target-region:Europe, AOL, Gmail, Edge, Chrome, Whale, PowerShell, VBS, Browser extension</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/" target="_blank">Untangling KNOTWEED: European Private-Sector Offensive Actor Using 0-Day Exploits</a></h3> <p>(published: July 27, 2022)</p> <p>Microsoft researchers detail activity of DSIRF, Austrian private-sector offensive actor (PSOA). In 2021, this actor, tracked as Knotweed, used four Windows and Adobe 0-day exploits. In 2022, DSIRF was exploiting another Adobe Reader vulnerability, CVE-2022-22047, which was patched in July 2022. DSIRF attacks rely on their malware toolset called Subzero. The initial downloader shellcode is executed from either the exploit chains or malicious Excel documents. It downloads a JPG image file with extra encrypted data, extracts, decrypts and loads to the memory the Corelump memory-only infostealer. For persistence, Corelump creates trojanized copies of legitimate Windows DLLs that serve as the Jumplump downloader. Despite DSIRF advertising itself as a red-teaming service provider, at least some of their observed victims never ordered being breached.<br/> <b>Analyst Comment:</b> Cyber mercenary companies often end up selling advanced malware toolsets to customers ready to abuse it to spy on other organizations and prominent individuals. DSIRF appears to be an advanced threat actor as they are able to use zero-day exploits for their attacks. Network defenders should ensure deployment of the July 2022 Microsoft security updates to address the CVE-2022-22047 vulnerability. Enable multifactor authentication (MFA) to address the risk of credential theft, with special attention to all remote connectivity accounts.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947244" target="_blank">[MITRE ATT&CK] Exploitation for Client Execution - T1203</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/947229" target="_blank">[MITRE ATT&CK] Data Obfuscation - T1001</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&CK] Obfuscated Files or Information - T1027</a> | <a href="https://ui.threatstream.com/ttp/947136" target="_blank">[MITRE ATT&CK] Deobfuscate/Decode Files or Information - T1140</a> | <a href="https://ui.threatstream.com/ttp/3905348" target="_blank">[MITRE ATT&CK] OS Credential Dumping - T1003</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&CK] Modify Registry - T1112</a><br/> <b>Tags:</b> DSIRF, Knotweed, Subzero, Private-sector offensive actor, Cyber mercenary, PSOA, Access-as-a-service, Hack-for-hire, DSIRF GmbH, Windows, Adobe, Adobe Reader, 0-day, target-region:Europe, target-region:Central America, United Kingdom, target-country:UK, Panama, target-country:PA, Austria, source-country:AT, target-country:AT, detection:Jumplump, detection:Corelump, Mex, PassLib, Mimikatz, Chisel, JPG, CVE-2021-28550, CVE-2021-36948, CVE-2022-22047, CVE-2021-31201, CVE-2021-31199, Finance, Law</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/" target="_blank">Malicious IIS Extensions Quietly Open Persistent Backdoors into Servers</a></h3> <p>(published: July 26, 2022)</p> <p>Microsoft researchers observed a rise in backdoors that are malicious extensions for Internet Information Services (IIS), a Microsoft web server. A typical infection chain involves installation of a script web shell, later followed by installation of an IIS backdoor to provide highly covert and persistent access to the server. Once registered with the target application, the backdoor can monitor incoming and outgoing requests, dump credentials and perform app-specific attacks such as mailbox export from Microsoft Exchange servers. Four major categories of the IIS backdoors include credential stealers, IIS handlers, open-source variants, and web shell-based variants.<br/> <b>Analyst Comment:</b> Threat actors are migrating the functionality of their web shells (such as China Chopper) into malicious IIS modules enjoying at the moment a lower detection ratio. They understand the opportunities IIS can offer, equally they understand the typical monitoring and security that will be in place and will craft/reengineer to ‘stay beneath the radar’. The goal here is persistence, reconnaissance and everything that follows. It is important for web server administrators to keep their systems up to date with patching and ensure that they have worked with their security teams to harden and lock down the environment adequately. In tandem, it is key to set up monitoring for unexpected additions, paths, and new modules. For IIS servers, prioritize alerts related to suspicious processes originating from w3wp.exe. Looking more widely, consideration of the attack flow should inform reviews of systems and networks monitoring and security hardening - creating multiple layers of defense across the connected estate. Anomali Match customers can run a check to look for evidence of compromise from this IIS based attack flow through matching to known malicious DLL binaries.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/3297595" target="_blank">[MITRE ATT&CK] Server Software Component - T1505</a> | <a href="https://ui.threatstream.com/ttp/947138" target="_blank">[MITRE ATT&CK] Exploit Public-Facing Application - T1190</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/3905068" target="_blank">[MITRE ATT&CK] Protocol Tunneling - T1572</a> | <a href="https://ui.threatstream.com/ttp/3904531" target="_blank">[MITRE ATT&CK] Encrypted Channel - T1573</a> | <a href="https://ui.threatstream.com/ttp/3905348" target="_blank">[MITRE ATT&CK] OS Credential Dumping - T1003</a><br/> <b>Tags:</b> Internet Information Services, IIS, IIS extension, Windows, China Chopper, w3wp.exe, Antsword, Mimikatz, PsExec, Backdoor, detection:Backdoor:MSIL/SuspIISModule, detection:Backdoor:MSIL/OWAStealer, detection:Win32/SuspGacInstall, Global assembly cache, ProxyShell, PowerShell, RDP, SSH</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.sucuri.net/2022/07/dhl-phishing-page-uses-telegram-bot-for-exfiltration.html" target="_blank">DHL Phishing Page Uses Telegram Bot for Exfiltration</a></h3> <p>(published: July 26, 2022)</p> <p>Sending phished data via encrypted channel to a bot in the Telegram messenger becomes a popular alternative to a standard tactic of sending it via emails. Another trend observed by Sucuri researchers is the usage of multi-step phishing pages where the victim is navigated from one screen to another before actually being asked to provide financial information. A specific DHL-themed phishing campaign that Sucuri outlines uses a third party IP address check to avoid showing the phishing page if a proxy or a VPN service is suspected.<br/> <b>Analyst Comment:</b> Phishing threat actors strive to make their phishing pages and traffic less detectable. The tactic of traffic distribution system leads to false negatives when actors are able to display benign content to known research and proxy IP addresses. As these phishing pages are often hosted on compromised websites, website owners should keep their systems updated, use unique strong passwords and introduce MFA for all privileged or internet facing resources, and employ server-side scanning to detect unauthorized malicious content. It is also a good practice for website owners to deploy client side monitoring to flag possible malicious content coming through pull in content and plugins from elsewhere and hence only visible client side in the interaction.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&CK] Phishing - T1566</a><br/> <b>Tags:</b> Phishing, DHL, Telegram, Heroku, VPN, Proxy, IP fraud score</p> </div> <div class="trending-threat-article"> <h3><a href="https://labs.withsecure.com/assets/BlogFiles/Publications/WithSecure_Research_DUCKTAIL.pdf" target="_blank">DUCKTAIL: An InfoStealer Malware Targeting Facebook Business Accounts</a></h3> <p>(published: July 26, 2022)</p> <p>A newly found malware campaign dubbed “DUCKTAIL” was observed targeting individuals and businesses that operate on Facebook Business platform, according to WhiteSecure researchers. The malware has the capability of stealing stealing browser cookies and Facebook security tokens. The attackers then leverage the access to user accounts to add attacker-controlled email to administer connected Facebook Business accounts. Upon analyzing data and samples, researchers attribute this activity to a Vietnamese group that is financially motivated. Researchers also found the samples linked to the DUCKTAIL operation are written in .NET Core.<br/> <b>Analyst Comment:</b> Regularly reviewing the administrative access for business accounts and revoking access to unknown users are some of the factors that reduce the attack surface and impact. Using web endpoint protection and real-time threat protection also reduces the exposure and attack probability.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3297610" target="_blank">[MITRE ATT&CK] Steal Web Session Cookie - T1539</a> | <a href="https://ui.threatstream.com/ttp/3905082" target="_blank">[MITRE ATT&CK] Exfiltration Over Web Service - T1567</a><br/> <b>Tags:</b> DUCKTAIL, Malware, Business, Facebook, Browser, Cookies, Telegram</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.cyble.com/2022/07/25/luca-stealer-source-code-leaked-on-a-cybercrime-forum/" target="_blank">Luca Stealer Source Code Leaked On A Cybercrime Forum</a></h3> <p>(published: July 25, 2022)</p> <p>Cyble researchers detected that developers of Luca Stealer, a new Rust-based infostealer made its source code publicly available. After publishing the source code on a popular cybercrime forum on July 3, 2022 and cooperating with other actors on improving and adding new features, the improved Luca Stealer code appeared on GitHub. Rust programming language gives malware developers additional versatility and evasion capabilities. First Luca Stealer version was exfiltrating stolen data using a Telegram bot, it was replaced with Discord webhooks to expand the exfiltration file size limit. Luca Stealer steals login credentials, credit cards, and cookies from over 30 Chromium-based browsers, targets 10 cold crypto wallets, and various browser extensions of password managers and crypto wallets for over 20 browsers.<br/> <b>Analyst Comment:</b> Luca Stealer is a cresting threat - with the source code widely shared new versions and additions will be developed. Security teams should define and deploy protection, detection and response for this threat as soon as possible. Users should be educated on dangers of torrenting, downloading from untrusted sources, unwarranted emails, and links. They should avoid using Browser built in password managers in favor of secured password vaults, use MFA for all accounts that offer it, and always use unique strong passwords. Use a reputed antivirus and internet security software.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/3905036" target="_blank">[MITRE ATT&CK] Credentials from Password Stores - T1555</a> | <a href="https://ui.threatstream.com/ttp/3297610" target="_blank">[MITRE ATT&CK] Steal Web Session Cookie - T1539</a> | <a href="https://ui.threatstream.com/ttp/3297602" target="_blank">[MITRE ATT&CK] Steal Application Access Token - T1528</a> | <a href="https://ui.threatstream.com/ttp/947079" target="_blank">[MITRE ATT&CK] Screen Capture - T1113</a> | <a href="https://ui.threatstream.com/ttp/3297596" target="_blank">[MITRE ATT&CK] Software Discovery - T1518</a> | <a href="https://ui.threatstream.com/ttp/947285" target="_blank">[MITRE ATT&CK] System Time Discovery - T1124</a> | <a href="https://ui.threatstream.com/ttp/947120" target="_blank">[MITRE ATT&CK] System Service Discovery - T1007</a> | <a href="https://ui.threatstream.com/ttp/3905071" target="_blank">[MITRE ATT&CK] Application Layer Protocol - T1071</a> | <a href="https://ui.threatstream.com/ttp/947193" target="_blank">[MITRE ATT&CK] Automated Exfiltration - T1020</a><br/> <b>Tags:</b> Luca Stealer, Infostealer, Source code, Cybercrime forum, Rust, Windows, Cryptocurrency, Telegram bot, Discord webhooks, GitHub</p> </div> <div class="trending-threat-article"> <h3><a href="https://securelist.com/cosmicstrand-uefi-firmware-rootkit/106973/" target="_blank">ComicStrand: The Discovery Of A Sophisticated UEFI Firmware Rootkit</a></h3> <p>(published: July 25, 2022)</p> <p>ComicStrand, a UEFI (Unified Extensible Firmware Interface), which is located in the firmware image of Gigabyte or ASUS motherboards, firmware rootkit was recently discovered by Kaspersky researchers. The rootkit was discovered on Windows systems and the infected firmware images were linked to H81 chipset designs. A kernel-level implant makes the rootkit executable at every OS startup, thus achieving stealthiness and persistence. Potential entry point of the malware remains unclear, however, researchers believe a tampered or a blackdoored motherboard usually sold as a second-hand device could be a possible infection vector. According to the researchers, the malware is attributed to a Chinese-speaking APT group and were identified in China, Iran, Russia, and Vietnam. Kaspersky also concluded the UEFI implant has been used in the wild since late 2016, although the potential impact and the C2 implants on the victims remain unknown.<br/> <b>Analyst Comment:</b> Rootkits are stealthy and have an edge over other malwares due to their complicated nature. Although no remedy has been identified for firmware based infection, re-flashing the infected firmware is the only way of removing it. This can be performed by utilizing the BIOS utilities.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/3905768" target="_blank">[MITRE ATT&CK] Boot or Logon Autostart Execution - T1547</a> | <a href="https://ui.threatstream.com/ttp/947081" target="_blank">[MITRE ATT&CK] Logon Scripts - T1037</a> | <a href="https://ui.threatstream.com/ttp/3905040" target="_blank">[MITRE ATT&CK] Create or Modify System Process - T1543</a> | <a href="https://ui.threatstream.com/ttp/3905341" target="_blank">[MITRE ATT&CK] Pre-OS Boot - T1542</a> | <a href="https://ui.threatstream.com/ttp/947092" target="_blank">[MITRE ATT&CK] Rootkit - T1014</a> | <a href="https://ui.threatstream.com/ttp/2402533" target="_blank">[MITRE ATT&CK] Firmware Corruption - T1495</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/947250" target="_blank">[MITRE ATT&CK] Standard Non-Application Layer Protocol - T1095</a> | <a href="https://ui.threatstream.com/ttp/3905764" target="_blank">[MITRE ATT&CK] Hijack Execution Flow - T1574</a><br/> <b>Tags:</b> ComicStrand, Rootkit, Firmware, UEFI, Windows, Malware, Target-Country: China, Target-Country: Vietnam, Target-Country: Russia,Target-Country: Iran</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-attack-eu-targets-with-konni-rat-malware/" target="_blank">Hackers Attack EU Targets with Konni RAT Malware</a></h3> <p>(published: July 23, 2022)</p> <p>Securonix researchers discovered a new state-sponsored campaign dubbed STIFF#BIZON that targeted the Czech Republic, Poland, and other European countries. This campaign used the Konni remote access trojan (RAT) previously attributed to North Korean group APT37. At the same time, some of the underlying infrastructure points to Russia-sponsored Fancy Bear (APT28), so the final attribution is inconclusive. The STIFF#BIZON campaign features a complex, multi-stage infection chain including spearphishing archived attachment with a malicious LNK shortcut leading to a Powershell script execution. Once the Konni RAT is installed, the attackers gather various information from the victim machine and extract the state key to decrypt the cookie database offline and bypass MFA authentication.<br/> <b>Analyst Comment:</b> Defenders are advised to disable the storage of clear text passwords in LSASS memory. Monitor for a suspicious PowerShell in .LNK file process and a scheduled task creation run from a public directory. Anomali XDR customers are enabled by ingested indicators to look for evidence of compromise and potential established persistence on their estate.<br/> <b>MITRE ATT&CK:</b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/947127" target="_blank">[MITRE ATT&CK] Scheduled Task - T1053</a> | <a href="https://ui.threatstream.com/ttp/3905344" target="_blank">[MITRE ATT&CK] System Services - T1569</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/3905040" target="_blank">[MITRE ATT&CK] Create or Modify System Process - T1543</a> | <a href="https://ui.threatstream.com/ttp/947127" target="_blank">[MITRE ATT&CK] Scheduled Task - T1053</a> | <a href="https://ui.threatstream.com/ttp/947269" target="_blank">[MITRE ATT&CK] Access Token Manipulation - T1134</a> | <a href="https://ui.threatstream.com/ttp/3905040" target="_blank">[MITRE ATT&CK] Create or Modify System Process - T1543</a> | <a href="https://ui.threatstream.com/ttp/3906164" target="_blank">[MITRE ATT&CK] Abuse Elevation Control Mechanism - T1548</a> | <a href="https://ui.threatstream.com/ttp/947269" target="_blank">[MITRE ATT&CK] Access Token Manipulation - T1134</a> | <a href="https://ui.threatstream.com/ttp/947194" target="_blank">[MITRE ATT&CK] Indicator Removal on Host - T1070</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&CK] Obfuscated Files or Information - T1027</a> | <a href="https://ui.threatstream.com/ttp/3905036" target="_blank">[MITRE ATT&CK] Credentials from Password Stores - T1555</a> | <a href="https://ui.threatstream.com/ttp/3297610" target="_blank">[MITRE ATT&CK] Steal Web Session Cookie - T1539</a> | <a href="https://ui.threatstream.com/ttp/947125" target="_blank">[MITRE ATT&CK] System Information Discovery - T1082</a> | <a href="https://ui.threatstream.com/ttp/947207" target="_blank">[MITRE ATT&CK] Process Discovery - T1057</a> | <a href="https://ui.threatstream.com/ttp/947120" target="_blank">[MITRE ATT&CK] System Service Discovery - T1007</a> | <a href="https://ui.threatstream.com/ttp/947082" target="_blank">[MITRE ATT&CK] System Owner/User Discovery - T1033</a> | <a href="https://ui.threatstream.com/ttp/3905097" target="_blank">[MITRE ATT&CK] Archive Collected Data - T1560</a> | <a href="https://ui.threatstream.com/ttp/947079" target="_blank">[MITRE ATT&CK] Screen Capture - T1113</a> | <a href="https://ui.threatstream.com/ttp/947117" target="_blank">[MITRE ATT&CK] Automated Collection - T1119</a> | <a href="https://ui.threatstream.com/ttp/3905071" target="_blank">[MITRE ATT&CK] Application Layer Protocol - T1071</a> | <a href="https://ui.threatstream.com/ttp/947259" target="_blank">[MITRE ATT&CK] Data Encoding - T1132</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/947193" target="_blank">[MITRE ATT&CK] Automated Exfiltration - T1020</a> | <a href="https://ui.threatstream.com/ttp/3904494" target="_blank">[MITRE ATT&CK] Exfiltration Over C2 Channel - T1041</a><br/> <b>Tags:</b> STIFF#BIZON, APT28, FancyBear, APT37, Konni, EU, Poland, target-country:PL, Check Republic, target-country:CZ, Russia, North Korea, Cyberespionage, APT, VBscript, PowerShell, LNK, MFA bypass, Windows</p> </div> <h2>Observed Threats</h2> <p>Additional information regarding the threats discussed in this week's Anomali Cyber Watch can be found below:</p> <p><a href="https://ui.threatstream.com/actor/27916" target="_blank">Velvet Chollima</a><br/> Velvet Chollima, also known as “Kimsuky”, is a suspected APT group believed to be linked to the Democratic People’s Republic of Korea (DPRK). Active since at least 2013, the primary motive of the group is espionage against South Korea. An increase of activity occurred during the period of the 2018 summit between United States President Donald Trump and DPRK Leader Kim Jong-Un.</p> <p><a href="https://ui.threatstream.com/vulnerability/2470926" target="_blank">CVE-2022-22047</a><br/> Windows CSRSS Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22026, CVE-2022-22049.</p> <p><a href="https://ui.threatstream.com/vulnerability/1530648" target="_blank">CVE-2021-36948</a><br/> Windows Update Medic Service Elevation of Privilege Vulnerability.</p> <p><a href="https://ui.threatstream.com/vulnerability/1401751" target="_blank">CVE-2021-31201</a><br/> Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31199.</p> <p><a href="https://ui.threatstream.com/vulnerability/1401752" target="_blank">CVE-2021-31199</a><br/> Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31201.</p> <p><a href="https://ui.threatstream.com/vulnerability/1551207" target="_blank">CVE-2021-28550</a><br/> Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.</p>