Pay attention TOP STORIES
Pay attention TOP STORIES
"...Credit Suisse’s demise was a long time coming, with a culmination of years of scandals, multi-billion dollar losses, leadership changes and a strategy that failed to inspire investor confidence. In February, the bank — Switzerland’s second-largest — reported its biggest annual loss since the 2008 financial crisis after clients withdrew more than 110 billion Swiss francs ($120 billion).
In December 2022, Credit Suisse raised some $4 billion in funding from investors, including major Gulf banks and sovereign wealth funds like Saudi National Bank, the Qatari Investment Authority and the Saudi Olayan Group. Norway’s sovereign wealth fund, Norges Bank Investment Management, is also a major shareholder.
SNB’s feeling right now is probably like all shareholders in CS — utter anger that management have let the situation get to this point.Simon Fentham-FletcherCHIEF INVESTMENT OFFICER, FREEDOM ASSET MANAGEMENT
The sharp and sudden downturn that began last week and led to the bank’s emergency sale is partially the fault of Saudi National Bank itself, some argue.
Saudi National Bank chairman Ammar Al Khudiary on Wednesday was asked by Bloomberg if it would increase its stake in the troubled Swiss lender. His reply was “absolutely not, for many reasons outside the simplest reason, which is regulatory and statutory.”
The comment triggered investor panic and sent Credit Suisse shares down 24% during that session, even though the statement wasn’t in fact new; the Saudi bank said in October that it had no plans to expand its holdings beyond the current 9.9%.
“Even though the situation at Credit Suisse was not perfect and investors had a lot of question marks about the future of the bank, SNB didn’t help calm down investors and shot themselves in the foot” with the chairman’s comments, one UAE-based investment banker, who requested not to be named due to professional restrictions, told CNBC.
MARKETS
First Republic shares slide 18% Monday after a credit rating downgrade
PUBLISHED MON, MAR 20 20236:36 AM EDTUPDATED 31 MIN AGO
thumbnail
John Melloy
@JOHNMELLOY
WATCH LIVE
KEY POINTS
S&P cut its credit rating to B+ from BB+ on Sunday after first lowering it to junk status just last week.
The rating remains on CreditWatch Negative, said S&P.
First Republic shares are down sharply this month as the collapse of Silicon Valley Bank caused investors to rethink other banks with large uninsured deposit bases. the banker said.

The Saudi National Bank chairman did attempt to calm the situation the following day, telling CNBC’s Hadley Gamble in Riyadh that “if you look at how the entire banking sector has dropped, unfortunately, a lot of people were just looking for excuses.”
“It’s panic, a little bit of panic. I believe completely unwarranted, whether it be for Credit Suisse or for the entire market,” Al Khudairy said. His comments ultimately failed to stem the bank’s continued rout.
The messy fallout, which spilled over across the entire banking sector, has ruptured market confidence and stoked fears of another global banking crisis. Swiss Finance Minister Karin Keller-Sutter set out to reassure angry taxpayers during a press conference Sunday, stressing that “this is a commercial solution and not a bailout.”

“SNB’s feeling right now is probably like all shareholders in CS — utter anger that management have let the situation get to this point,” Simon Fentham-Fletcher, chief investment officer at Abu Dhabi-based Freedom Asset Management, told CNBC.
“For years CS lurched from crisis to regulatory fine and changed management as it emerged in a new path. Finally the bank ran out of time,” he said.
He said that shareholders, specifically large ones like Saudi National Bank, will likely now want to reappraise the way they make investments and “where the stake is as large as it was here, will probably want to start embedding people so they properly understand what is happening inside their investments.”
“This might see a rise in activist shareholders not just wanting a board seat but real eyes and ears,” he added, noting that the last few weeks of market turmoil will undoubtedly put a significant dent in investor desire for risk.
From a risk perspective, Fentham-Fletcher said, “generally I think that we will see a pull back in all risk appetite as confidence has just taken a severe beating, and this combined with the apparent upending of the capital structure rules will undoubtedly make people pause.”
If this can happen inside a federal agency, it likely can happen inside other organizations.
✓ There was an advisory jointly published by the Cybersecurity and Infrastructure Security Agency, the FBI, and the Multi-State Information Sharing and Analysis Center. From last November to early January, the server exhibited signs of compromise.
The breach is the result of someone in the unnamed agency failing to install a patch that had been available for years. As noted earlier, tools that scan systems for vulnerabilities often limit their searches to a certain set of pre-defined file paths. If this can happen inside a federal agency, it likely can happen inside other organizations.
Anyone using the Telerik UI for ASP.NET AJAX should carefully read Thursday’s advisory as well as the one Progress published in 2019 to ensure they’re not exposed.
RELATED
The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations last year.
1
Getty Images
Multiple threat actors—one working on behalf of a nation-state—gained access to the network of a US federal agency by exploiting a four-year-old vulnerability that remained unpatched, the US government warned.
Exploit activities by one group likely began in August 2021 and last August by the other, according to an advisory jointly published by the Cybersecurity and Infrastructure Security Agency, the FBI, and the Multi-State Information Sharing and Analysis Center. From last November to early January, the server exhibited signs of compromise.
Both groups exploited a code-execution vulnerability tracked as CVE-2019-18935 in a developer tool known as the Telerik user interface (UI) for ASP.NET AJAX, which was located in the agency’s Microsoft Internet Information Services (IIS) web server. The advisory didn’t identify the agency other than to say it was a Federal Civilian Executive Branch Agency under the CISA authority.
The Telerik UI for ASP.NET AJAX is sold by a company called Progress, which is headquartered in Burlington, Massachusetts, and Rotterdam in the Netherlands. The tool bundles more than 100 UI components that developers can use to reduce the time it takes to create custom Web applications. In late 2019, Progress released version 2020.1.114, which patched CVE-2019-18935, an insecure deserialization vulnerability that made it possible to remotely execute code on vulnerable servers. The vulnerability carried a severity rating of 9.8 out of a possible 10. In 2020, the NSA warned that the vulnerability was being exploited by Chinese state-sponsored actors.
“This exploit, which results in interactive access with the web server, enabled the threat actors to successfully execute remote code on the vulnerable web server,” Thursday’s advisory explained. “Though the agency’s vulnerability scanner had the appropriate plugin for CVE-2019-18935, it failed to detect the vulnerability due to the Telerik UI software being installed in a file path it does not typically scan. This may be the case for many software installations, as file paths widely vary depending on the organization and installation method.”
To successfully exploit CVE-2019-18935, hackers must first have knowledge of the encryption keys used with a component known as the Telerik RadAsyncUpload. Federal investigators suspect the threat actors exploited one of two vulnerabilities discovered in 2017 that also remained unpatched on the agency server.
Attacks from both groups used a technique known as DLL side loading, which involves replacing legitimate dynamic-link library files in Microsoft Windows with malicious ones. Some of the DLL files the group uploaded were disguised as PNG images. The malicious files were then executed using a legitimate process for IIS servers called w3wp.exe. A review of antivirus logs identified that some of the uploaded DLL files were present on the system as early as August 2021.
The advisory said little about the nation-state-sponsored threat group, other than to identify the IP addresses it used to host command-and-control servers. The group, referred to as TA1 in Thursday’s advisory, began using CVE-2019-18935 last August to enumerate systems inside the agency network. Investigators identified nine DLL files used to explore the server and evade security defenses. The files communicated with a control server with an IP address of 137.184.130[.]162 or 45.77.212[.]12. The traffic to these IP addresses used unencrypted Transmission Control Protocol (TCP) over port 443. The threat actor’s malware was able to load additional libraries and delete DLL files to hide malicious activity on the network.
The advisory referred to the other group as TA2 and identified it as XE Group, which researchers from security firm Volexity have said is likely based in Vietnam. Both Volexity and fellow security firm Malwarebytes have said the financially motivated group engages in payment-card skimming.
“Similar to TA1, TA2 exploited CVE-2019-18935 and was able to upload at least three unique DLL files into the C:\Windows\Temp\ directory that TA2 executed via the w3wp.exe process,” the advisory stated. “These DLL files drop and execute reverse (remote) shell utilities for unencrypted communication with C2 IP addresses associated with the malicious domains.”
The breach is the result of someone in the unnamed agency failing to install a patch that had been available for years. As noted earlier, tools that scan systems for vulnerabilities often limit their searches to a certain set of pre-defined file paths. If this can happen inside a federal agency, it likely can happen inside other organizations.
Anyone using the Telerik UI for ASP.NET AJAX should carefully read Thursday’s advisory as well as the one Progress published in 2019 to ensure they’re not exposed.
Dan Goodin / Dan is the Security Editor at Ars Technica, which he joined in 2012 after working for The Register, the Associated Press, Bloomberg News, and other publications. Find him on Mastodon at: https://infosec.exchange/@dangoodin