RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
Security OperationsJune 1, 2023

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

This week: Barracuda’s Email Security Gateway had an undetected flaw, which was abused by hackers for months. Also: Could AI bring on an "extinction event?"

This Week’s Top Story

A flaw in Barracuda’s email security gateway was exploited by hackers for months

Barracuda, an enterprise security firm, disclosed this past Tuesday that a recently patched zero-day flaw in its Email Security Gateway (ESG) appliances has been abused by hackers to backdoor the company’s devices for the past seven months. The critical vulnerability, CVE-2023-2868, has been exploited by these threat actors since October 2022 and wasn’t identified by Barracuda until May 19, 2023. Patches for the flaw were released by Barracuda on May 20 and 21.

The flaw, which impacts versions 5.1.3.001 through 9.2.0.006, allows a remote attacker to achieve code execution on susceptible installations. Barracuda identified that attackers executed malware on a subset of appliances, and also found that data was exfiltrated on a subset of appliances. To date, three malware strains have been found on impacted appliances: SALTWATER, SEASPY, and SEASIDE, and each of them exhibits one or more malicious functions.

Mandiant has been investigating the incident, and has found that one of the strains’ source code, SEASPY, overlaps with an open source backdoor called cd00r. At this time, Mandiant and Barracuda have not attributed the attacks to any known threat actors. Barracuda also did not disclose how many organizations were breached as a result of the flaw, but assured that the investigation into the incident is ongoing.

News Roundup

Here are the stories we’re paying attention to this week…

Avoiding potential ‘extinction event’ from AI requires action, US official says (ABC News)

A top U.S. official for cybersecurity said Wednesday that humanity could be at risk of an "extinction event" if tech companies fail to self-regulate and work with the government to reign in the power of artificial intelligence.

Critical firmware vulnerability in Gigabyte Systems exposes 7 million devices (The Hacker News)

Cybersecurity researchers have found "backdoor-like behavior" within Gigabyte systems, which they say enables the UEFI firmware of the devices to drop a Windows executable and retrieve updates in an insecure format.

Toyota finds more misconfigured servers leaking customer info (Bleeping Computer)

Toyota Motor Corporation has discovered two additional misconfigured cloud services that leaked car owners' personal information for over seven years. This finding came after the Japanese carmaker conducted a thorough investigation on all cloud environments managed by Toyota Connected Corporation after previously discovering a misconfigured server that exposed the location data of over 2 million customers for ten years.

SAS Airlines hit by $3 million ransom demand following DDoS attacks (Graham Cluley)

Scandinavian Airlines (SAS) has received a US $3 million ransom demand following a prolonged campaign of distributed denial-of-service (DDoS) attacks against its online services. The Anonymous Sudan hacktivist group published their financial demand on its Telegram channel after disrupting the airline's website and smartphone app.

Dark Pink hackers continue to target government and military organizations (Bleeping Computer)

The Dark Pink APT hacking group continues to be very active in 2023, observed targeting government, military, and education organizations in Indonesia, Brunei, and Vietnam. The threat group has been active since at least mid-2021, primarily targeting entities in the Asia-Pacific region, but it wasn’t exposed until January 2023.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Security Operations

More Blog Posts

ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu

Crypto group ushers in post-quantum security

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

Learn More about Crypto group ushers in post-quantum security
Crypto group ushers in post-quantum security

Cybercrime-as-a-service forces a security rethink

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Learn More about Cybercrime-as-a-service forces a security rethink
Cybercrime-as-a-service forces a security rethink

Why governance is key to safe AI adoption

A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.

Learn More about Why governance is key to safe AI adoption
Why governance is key to safe AI adoption
Adversarial AI rise

Adversarial AI is on the rise: What you need to know

Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.

Learn More about Adversarial AI is on the rise: What you need to know
Adversarial AI is on the rise: What you need to know
Post-quantum security
Cybercrime-as-a-service
AI adoption guardrails