Security Roundup: January 2025 | Kocho
Skip to content
Funnel overlay image

January Security Roundup

arrow icon arrow icon

From Kocho’s Security Operations Centre (SOC)

Published: 28 January 2025

This month’s highlights range from mitigation advice for new Microsoft vulnerabilities to account takeover risks and nation state extortion tactics from North Korea. Read on for the latest updates and tips to keep your systems safe. 

In the news:

  • Unusual UserAgents drive surge in account takeovers

  • Critical Windows flaw enables code execution

  • North Korean IT workers extorting global organisations

  • Outlook vulnerability enables malicious email attacks

Surge in unusual UserAgents linked to account takeovers

The Kocho Security Operations Centre (SOC) has detected a rise in account takeovers involving unusual UserAgents during successful malicious logins.

We’ve identified attackers leveraging UserAgents such as Axios, a popular JavaScript HTTP client, to automate sign-in attacks like credential stuffing or brute force attempts.

Our analysts also note that these attacks are often paired with access to services like OfficeHome, advising that detection capabilities can be increased by pairing both within a KQL query.

Additional suspicious UserAgents like “curl” and “Python” have also been observed during malicious activity. Expanding detection queries to include these UserAgents can offer broader coverage and improved incident response.

Recommendations

Green and ebony magnifying glass and line icon on transparent background

Use combined KQL queries to detect Axios and OfficeHome activity.

Expand UserAgent monitoring to include “curl” and “Python”.

Ebony and green target crosshairs icon on transparent background

Track unusual UserAgents to identify and mitigate threats.

Critical Windows vulnerability requires immediate attention

Microsoft has disclosed a high-severity vulnerability (CVSS 7.8) impacting Windows Server 2025, Windows 10, and Windows 11, which could allow attackers to execute arbitrary code with elevated privileges.

A proof-of-concept exploit has been released, targeting a flaw in Windows Registry memory management.

Microsoft has released security updates, including KB5036980 Preview and KB5037771, to address the flaw.

We strongly urge all clients to apply these patches immediately and review their access controls, audit protocols, and user training to enhance defences.

Recommendations

Ebony and green tickets on transparent background

Apply patches promptly across all affected systems.

Strengthen access controls by limiting administrative privileges.

Ebony and green ticklist icon on transparent background

Conduct regular audits to uncover and address security gaps.

Ebony and green person presenting icon on transparent background

Enhance user training to combat phishing and social engineering.

Refer to Microsoft’s advisory (CVE-2024-43641) for detailed guidance.

Keep pace with the latest security threats

Sign up to receive the latest threat intelligence articles and reports from our SecOps team.

FBI warns of North Korean IT workers extorting employers

The FBI has issued a warning about North Korean IT workers posing as remote freelancers to infiltrate businesses, steal proprietary data, and extort employers.

Refusal to pay often results in the public release of sensitive information.

A statement on the FBI websites says:

Butterfly overlay image
quote icon

After being discovered on company networks, North Korean IT workers have extorted victims by holding stolen proprietary data and code hostage until the companies meet ransom demands. In some instances, North Korean IT workers have publicly released victim companies’ proprietary code.

Federal Bureau of Investigations (FBI)

These workers, using forged identities, target organisations in the US, Europe, and East Asia. Their earnings, which fund the North Korean government, are increasing as tactics evolve to exploit remote work.

Security researchers have reported a rise in insider attacks and data exfiltration from platforms like GitHub. Recent indictments revealed that five individuals generated over $866,000 for North Korea through these schemes.

Recommendations:

Strengthen applicant screening with identity verification.

Ebony and green pen and paper icon on transparent background

Cross-check resumes and contact information for patterns or inconsistencies.

Ebony and green tick person in brackets icon on transparent background

Raise staff awareness of these schemes.

Ebony and green open eye icon on transparent background

Monitor communication accounts and data for suspicious activity.

Ebony and green hands shaking icon on transparent background

Conduct in-person hiring where feasible to verify identities.

Microsoft Outlook vulnerability

A critical vulnerability (CVSS 9.8) in Microsoft Outlook was disclosed on January 14, enabling attackers to remotely execute code on a victim’s device without user interaction.

The flaw exploits Windows Object Linking and Embedding (OLE) functionality, allowing malicious emails to trigger the vulnerability simply by being opened or previewed in Outlook.

Recommendations

Microsoft has released a patch to address the issue, but until it’s applied, the following mitigations are recommended:

Ebony and green open book icon on transparent background

Read emails in plain text to minimise risks from malicious OLE objects.

Ebony and green alert warning icon on transparent background

Avoid RTF attachments from unknown or untrusted sources.

Ebony and green file and padlock icon on transparent background

Limit user permissions to critical systems to reduce damage potential

Ensure systems are updated immediately to reduce exposure to this low-effort, high-impact attack vector.

For more detail about the vulnerability and links to patches, visit the Microsoft security information page here.

From our blog: Why SOCs need to move out of their silos

Cyber criminals are waging a new kind of war, but too many SOCs are still fighting yesterday’s battles.

Modern attackers thrive by exploiting the interconnected nature of systems, using graph-based strategies to outsmart defenders.

Yet, many SOCs are stuck in outdated, siloed approaches that leave critical gaps ripe for exploitation.

To stay ahead, they need to adopt their adversaries’ playbook. Shifting from fragmented defences, to unified, proactive strategies.

So, what’s holding them back?

Read the full article from Kocho’s Head of SOC, Anna Webb 

tag icon

Let's talk!

30-day free trials and flexible contracts

Book a free Discovery Call and learn more about our AI-powered security operations service, XDR Rapid Protect.

Get more information on:

  • 30-day free trials for new partnerships
  • Flexible, 30-day contracts (no lock-in)
  • Microsoft-funded proof of concepts
Butterfly overlay image

Author

Jack Fisher

Threat Detection Engineer

Jack is a key member of Kocho’s Security Operations Centre, ensuring we provide excellent detection capabilities for our clients. OSCP certified, he has a passion for both offensive and defensive cyber security.

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.