The Cybersecurity and Infrastructure Security Agency (CISA), in conjunction with the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS), has issued a joint Cybersecurity Advisory. Released on July 6, 2023, this advisory is titled "Increased Truebot Activity Infects U.S. and Canada Based Networks," and serves to inform organizations about the increased risk posed by newly identified variants of Truebot malware.
"We have observed that cyber threat actors are increasingly leveraging Truebot malware through targeted phishing campaigns," said a CISA spokesperson. This alarming trend highlights the need for organizations to be vigilant and proactive in their cybersecurity measures.
"We have observed that cyber threat actors are increasingly leveraging Truebot malware through targeted phishing campaigns,"
The newly discovered Truebot variants have been confirmed through open-source research and analytical findings. They allow adversaries to gain initial access by exploiting a significant vulnerability in the Netwrix Auditor application, specifically CVE-2022-31199. "Malicious actors are using this known vulnerability not just to infiltrate systems but also to collect and exfiltrate sensitive data," stated the FBI representative.
"Malicious actors are using this known vulnerability not just to infiltrate systems but also to collect and exfiltrate sensitive data,"

Evidence suggests that by May 2023, these threat actors were already utilizing this vulnerability and subsequent Truebot variants to target organizations across both the United States and Canada. Given the grave implications, the advisory calls for immediate action from all organizations to bolster their defenses.
Impact and Legacy
CISA, the FBI, MS-ISAC, and CCCS have laid out specific recommendations for organizations to minimize their risk to Truebot variants and other ransomware threats. The foremost advice is to apply the necessary patches to the CVE-2022-31199 vulnerability. "Implementing these recommended mitigations is crucial to reducing the likelihood and impact of malware activity," said the CCCS official.
"Implementing these recommended mitigations is crucial to reducing the likelihood and impact of malware activity,"
Beyond patching, the advisory encourages organizations to reach out if they experience any cybersecurity incidents or suspicious activities. SLTT government entities can report issues to the MS-ISAC at SOC@cisecurity.org or through their hotline. The FBI also urges reports through local field offices, while CISA provides resources via their online reporting tool or through their 24/7 Operations Center.
For further guidance, organizations are encouraged to explore StopRansomware.gov. This platform offers an array of free U.S. government resources aimed at improving cyber hygiene and overall cybersecurity posture while aiding in ransomware risk reduction. "It's imperative for organizations to leverage these resources to stay ahead of evolving threats," commented an analyst from the MS-ISAC.
"It's imperative for organizations to leverage these resources to stay ahead of evolving threats,"

As cyber threats continue to evolve, the need for heightened awareness and prompt action is paramount. The insights from the Cybersecurity Advisory serve as a critical reminder for organizations to stay informed and updated on emerging cyber threats and vulnerabilities. The collaborative effort by CISA, the FBI, MS-ISAC, and CCCS highlights the ongoing commitment to safeguarding North America's cyber landscape against malicious activities.
Looking Ahead
In conclusion, the recent developments surrounding Truebot malware variants illuminate the constantly shifting nature of cybersecurity threats. Organizations must not only implement the recommended mitigations but also foster a culture of vigilance and preparedness to defend against future attacks.

