Christmas "Gift" Delivered Through SSH
released on 2024-12-20 @ 04:28:32 PM
A malicious file named "christmas_slab.pdf.lnk" was discovered, utilizing Windows' built-in SSH support to deliver malware. The LNK file executes ssh.exe to transfer and run a PE file from a remote server. The attack leverages the SSH/SCP protocol, taking advantage of its widespread availability on modern Windows systems. The malicious payload is downloaded from an IP address belonging to Apple's range, raising suspicions. The LNK file's command line arguments reveal the attacker's intent to bypass host key checking and execute the downloaded malware. This technique demonstrates how threat actors are adapting to use legitimate system tools for malicious purposes.
BellaCPP: Discovering a new BellaCiao variant written in C++
released on 2024-12-20 @ 03:25:38 PM
A new C++ variant of the BellaCiao malware, dubbed BellaCPP, has been discovered by researchers. This variant shares similarities with the original .NET-based BellaCiao, including domain generation and SSH tunneling capabilities. BellaCPP was found on a machine also infected with a .NET BellaCiao sample. The malware is designed to run as a Windows service and uses XOR encryption to decrypt strings. It generates domains and checks DNS records to establish communication. The discovery highlights the importance of thorough network investigations, as attackers may deploy unknown samples to maintain persistence. The malware is attributed to the Charming Kitten threat actor with medium-to-high confidence based on similarities in functionality and infrastructure.
Now You See Me, Now You Don't: Using LLMs to Obfuscate Malicious JavaScript
released on 2024-12-20 @ 03:25:37 PM
This article discusses an adversarial machine learning algorithm that uses large language models (LLMs) to generate novel variants of malicious JavaScript code at scale. The algorithm iteratively transforms malicious code to evade detection while maintaining its functionality. The process involves rewriting prompts such as variable renaming, dead code insertion, and whitespace removal. The technique significantly reduced detection rates on VirusTotal. To counter this, the researchers retrained their classifier on LLM-rewritten samples, improving real-world detection by 10%. The study highlights both the potential threats and opportunities presented by LLMs in cybersecurity, demonstrating how they can be used to create evasive malware variants but also to enhance defensive capabilities.
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
released on 2024-12-20 @ 03:25:36 PM
Two npm packages, @rspack/core and @rspack/cli, were compromised in a supply chain attack, allowing the publication of malicious versions containing cryptocurrency mining malware. The attack targeted specific countries and aimed to execute XMRig cryptocurrency miner on Linux hosts. The malicious versions have been unpublished, and version 1.1.8 is now considered safe. The incident highlights the need for stricter safeguards in package managers to protect developers. The Rspack project maintainers have taken steps to secure their infrastructure, including invalidating tokens and auditing source code. An investigation into the root cause of the token theft is ongoing.
Recent Cases of Watering Hole Attacks, Part 1
released on 2024-12-20 @ 02:28:16 PM
This analysis focuses on a watering hole attack targeting a Japanese university research laboratory website in 2023. The attack used social engineering to trick users into downloading and executing malware disguised as an Adobe Flash Player update. The malware, identified as a modified Cobalt Strike Beacon, was injected into the Explorer process. The attackers used Cloudflare Workers for their C2 server and employed various techniques to evade detection, including disabling anti-analysis functions and stopping antivirus software. The report also mentions other attacks by the same group, using decoy documents and malware with specific execution options. The article emphasizes the importance of maintaining awareness of diverse attack vectors beyond commonly exploited vulnerabilities in exposed assets.
Cyberattack: UAC-0125 using the theme "Army+" (CERT-UA#12559)
released on 2024-12-20 @ 02:25:57 PM
A cyber attack attributed to UAC-0125 has been identified, involving websites mimicking the official 'Army+' app page. These sites, hosted on Cloudflare Workers, prompt users to download a malicious executable. The EXE file, an NSIS installer, contains a decoy .NET file, Python interpreter, Tor files, and a PowerShell script. When executed, it installs an OpenSSH server, generates RSA keys, and sets up remote hidden access to the victim's computer via Tor. This activity is associated with UAC-0002 (APT44/Sandworm). Previous incidents in early 2024 used trojanized Microsoft Office packages as the initial compromise vector. The attackers may further expand their attack on the organization's IT infrastructure if successful.
cShell DDoS Bot Attack Case Targeting Linux SSH Server (screen and hping3)
released on 2024-12-20 @ 02:22:03 PM
A new DDoS malware strain named cShell is targeting poorly managed Linux servers through SSH services. The threat actor uses brute force attacks to gain initial access, then installs the cShell bot developed in Go language. cShell exploits Linux tools 'screen' and 'hping3' to perform various DDoS attacks. It supports multiple DDoS commands, including SYN, ACK, and UDP floods. The malware maintains persistence by registering as a service and can update itself using Pastebin URLs. cShell's simple design leverages existing Linux tools, making it an effective DDoS bot. To protect against such attacks, administrators should use strong passwords, regularly update systems, and implement security measures like firewalls.
Araneida Scanner: Cracked Acunetix Web App & API Scanner Discovered
released on 2024-12-20 @ 08:49:35 AM
Silent Push Threat Analysts have uncovered the Araneida Scanner, a cracked version of Acunetix being used for illegal purposes. The scanner is employed for offensive reconnaissance, user data scraping, and vulnerability exploitation. It was detected during a partner's reconnaissance effort, prompting an investigation. The tool is being promoted on Telegram, where actors boast about taking over thousands of websites and selling stolen credentials. A separate Chinese-language panel, also likely using cracked Acunetix software, was discovered. Both tools pose significant threats for reconnaissance prior to sophisticated attacks. The investigation revealed multiple IP addresses hosting Araneida customer panels and the continued sale of the scanner through a specific domain.
Welcome to the party, pal!
released on 2024-12-19 @ 11:43:47 PM
This end-of-year newsletter discusses cybersecurity trends and personal anecdotes. It emphasizes the importance of multi-factor authentication and password management, highlighting the prevalence of identity-based attacks. The author shares a story about introducing hardware tokens to family members, which was met with limited enthusiasm. The newsletter also mentions Cisco Talos' vulnerability research efforts, recent security headlines, and upcoming events. It concludes with a list of prevalent malware files detected by Talos telemetry.
Attackers exploiting a FortiClient EMS vulnerability in the wild
released on 2024-12-19 @ 02:41:35 PM
Kaspersky's GERT team identified an attack exploiting a patched vulnerability (CVE-2023-48788) in FortiClient EMS versions 7.0.1 to 7.0.10 and 7.2.0 to 7.2.2. The attackers used SQL injection to infiltrate a company's network through an exposed Windows server. They deployed remote access tools like ScreenConnect and AnyDesk, performed network enumeration, credential theft, and defense evasion. The vulnerability allows unauthorized code execution via specially crafted data packets. Multiple threat actors have been observed exploiting this vulnerability globally, targeting various companies and consistently altering ScreenConnect subdomains. The analysis highlights the importance of timely patching and implementing additional security controls to prevent such attacks.
Security Brief: Threat Actors Gift Holiday Lures to Threat Landscape
released on 2024-12-19 @ 02:41:33 PM
As the holiday season approaches, threat actors are exploiting people's desires for deals, jobs, and end-of-year bonuses. Researchers have observed an increase in themed content delivering malware, fraud, and credential phishing campaigns. Examples include a 'Winter Holiday Promotion' campaign delivering Remcos RAT, credential phishing campaigns impersonating HR departments to steal login information, and employment fraud schemes targeting universities. These attacks use timely lures such as holiday promotions, bonus announcements, and seasonal job offers to manipulate victims into risky online behaviors. The campaigns employ various techniques, including compressed executables, QR codes, and specially crafted OOXML files to bypass detection and harvest user credentials.
North Korean group targets nuclear-related organization with new malware
released on 2024-12-19 @ 12:57:39 PM
The Lazarus group has evolved its infection chain by targeting employees of a nuclear-related organization with a combination of new and old malware. The attack involved delivering malicious archive files containing trojanized VNC utilities and various malware strains including Ranid Downloader, MISTPEN, RollMid, LPEClient, CookieTime, and a new modular backdoor called CookiePlus. The infection chain has become more complex, demonstrating improved delivery and persistence methods. CookiePlus, likely the successor to MISTPEN, can download both DLLs and shellcode, making it difficult to detect. The group used compromised WordPress servers as command and control infrastructure for most of the malware.
NotLockBit: A Deep Dive Into the New Ransomware Threat
released on 2024-12-19 @ 12:57:34 PM
NotLockBit is an emerging ransomware family that mimics LockBit's behavior while targeting both macOS and Windows systems. Distributed as an x86_64 golang binary, it showcases advanced capabilities including targeted file encryption, data exfiltration, and self-deletion mechanisms. The malware gathers system information, generates and encrypts a master key, and writes collected data to text files. It utilizes AWS credentials for data exfiltration, encrypts specific file types while avoiding certain directories, and employs AES encryption. NotLockBit alters the desktop wallpaper and performs self-deletion after execution. The analysis reveals variations in obfuscation and compilation techniques across samples, highlighting its sophistication and evolving nature in the ransomware landscape.
Python-Based NodeStealer Version Targets Facebook Ads Manager
released on 2024-12-19 @ 12:56:35 PM
The latest variant of NodeStealer has evolved from JavaScript to Python, expanding its data theft capabilities. Trend Micro's MXDR team uncovered this advanced version in a campaign targeting a Malaysian educational institution, linked to a Vietnamese threat group. The malware now targets Facebook Ads Manager accounts, stealing critical financial and business information alongside credit card details and browser data. The infection begins with a spear-phishing email containing a malicious link, which downloads and installs the malware disguised as a legitimate application. Sophisticated techniques like DLL sideloading and encoded PowerShell commands are used to bypass security and execute the final payload, exfiltrating data via Telegram.
Stealthy Cyber Attacks: LNK Files & SSH Commands Playbook
released on 2024-12-19 @ 12:56:33 PM
This analysis explores a rising trend in cyber attacks where threat actors leverage LNK files and SSH commands as initial infection vectors. The attackers use meticulously crafted shortcut files, often disguised as legitimate documents, to execute commands using Living-off-the-Land Binaries (LOLBins). The report highlights three specific campaigns: one using SCP to download and execute malicious files, another abusing SSH and PowerShell commands to run harmful payloads, and a third combining SSH and CMD commands to load malicious DLLs. These sophisticated techniques aim to bypass traditional security mechanisms and evade detection by exploiting trusted system utilities. The evolving tactics underscore the need for continuous vigilance and adapted security strategies to counter these advanced attack vectors.
A new playground: Malicious campaigns proliferate from VSCode to npm
released on 2024-12-19 @ 04:01:05 AM
This intelligence details the emergence of malicious campaigns spreading from VSCode to npm. Researchers observed an increasing amount of malicious activity in VSCode Marketplace, with threat actors using npm packages to inject malicious code into VSCode IDE. The campaign initially targeted the crypto community but later expanded to impersonate the Zoom application. Malicious extensions contained downloader functionality and were obfuscated with Javascript Obfuscator. The campaign then spread to npm with the package 'etherscancontracthandler'. The analysis highlights the importance of scrutinizing open source, third-party, and commercial code, as well as performing regular security assessments to prevent IDE compromises and protect the software supply chain.
A Look Back: The Evolution of Latin American eCrime Malware in 2024
released on 2024-12-18 @ 07:17:29 PM
Latin American cybercrime continues to evolve as adversaries refine their tactics and techniques. Key developments in 2024 include the adoption of Rust for improved evasion, consistent use of multi-stage infection chains and malspam campaigns, and evidence of collaboration among threat actors. Notable updates were observed across malware families like Mispadu, Kiron, Caiman, Culebra, Salve, and Astaroth. These updates ranged from new delivery mechanisms and obfuscation techniques to enhanced stealer features. Despite innovations, Delphi-based components remain prevalent. The ongoing refinement of these malware families highlights the adaptability and ingenuity of Latin American cybercriminals in sustaining their operations.
Your Data Is Under New Management: The Rise of LummaStealer
released on 2024-12-18 @ 06:13:53 PM
LummaStealer, a relatively new information-stealing malware, has gained prominence since 2022 for its ability to collect sensitive data from Windows systems. Marketed as Malware-as-a-Service (MaaS) on underground forums, it targets individuals, cryptocurrency users, and small to medium-sized businesses. The malware employs various infection vectors, including phishing emails, cracked software, and malicious downloads. It harvests credentials, cookies, cryptocurrency wallets, and system information, exfiltrating data to remote servers. Recent campaigns have shown increased sophistication in social engineering tactics and the use of legitimate platforms like Steam and Dropbox to evade detection. The malware's accessibility through MaaS has made it popular among diverse threat actors, complicating attribution efforts.
Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising
released on 2024-12-18 @ 05:31:29 PM
A large-scale fake captcha campaign has been distributing Lumma info-stealer malware through malvertising techniques. The campaign, relying on a single ad network, delivers over 1 million daily ad impressions, causing thousands of daily victims to lose their accounts and money. The malicious activity is propagated through a network of 3,000+ content sites funneling traffic. The campaign uses deceptive captcha pages that trick users into executing PowerShell commands, instantly installing stealer malware. The ad network Monetag, a subsidiary of PropellerAds, is identified as the primary facilitator. The threat actors leverage services like BeMob for cloaking, showcasing the fragmented accountability in the ad ecosystem. The campaign's success highlights the need for stronger proactive measures in ad networks and the importance of user caution when encountering free content online.
Analyzing FLUX#CONSOLE: Using Tax-Themed Lures, Threat Actors Exploit Windows Management Console to Deliver Backdoor Payloads
released on 2024-12-18 @ 05:16:00 PM
The FLUX#CONSOLE campaign involves a sophisticated tax-themed phishing attack that exploits Microsoft Management Console (MSC) files to deliver a stealthy backdoor payload. Threat actors use tax-related lures to trick users into executing malicious code. The attack leverages MSC files, which are normally used for administrative tasks, to execute obfuscated JavaScript. This leads to the deployment of a malicious DLL file (DismCore.dll) through DLL sideloading. The campaign employs advanced obfuscation techniques, including multiple layers of encoding and encryption, to evade detection. Persistence is established using scheduled tasks. The malware communicates with a command and control server, potentially exfiltrating data from infected systems.
ICS Threat Analysis: New Malware Can Kill Engineering Processes
released on 2024-12-18 @ 02:43:54 PM
An analysis of a public malware repository reveals a persistent presence of OT/ICS malware, with engineering workstations being a significant target. Two notable clusters were identified: Mitsubishi engineering workstation software infected with the Ramnit worm, and a new experimental malware named Chaya_003 capable of terminating Siemens engineering processes. The research highlights the evolving threat landscape in OT/ICS environments, emphasizing the need for enhanced security measures. Recommendations include hardening engineering workstations, proper network segmentation, and implementing comprehensive threat monitoring solutions across both IT and OT systems.
Effective Phishing Campaign Targeting European Companies and Institutions
released on 2024-12-18 @ 02:37:46 PM
A sophisticated phishing operation targeting European automotive, chemical, and industrial manufacturing companies has been uncovered. The campaign, which peaked in June 2024, used HubSpot Free Form Builder and Docusign-enabled PDFs to harvest account credentials and infiltrate Microsoft Azure cloud infrastructures. Approximately 20,000 users were targeted across various European organizations. The attackers employed multiple redirection techniques, custom user-agent strings, and Bulletproof VPS hosts to evade detection. Once access was gained, the threat actors attempted to maintain persistence by adding new devices to compromised accounts. The campaign highlights the ongoing threat of targeted phishing attacks against corporate cloud infrastructures.
Hacktivists attack Russian organizations using rare RATs
released on 2024-12-18 @ 12:48:59 PM
The Cyber Anarchy Squad (C.A.S) is a hacktivist group targeting Russian and Belarusian organizations since 2022. They exploit vulnerabilities in public services and use free tools to inflict maximum damage. The group employs rare remote access Trojans like Revenge RAT and Spark RAT, alongside common tools like Mimikatz. C.A.S focuses on data theft and reputational damage, often collaborating with other hacktivist groups. They use Telegram to spread information about attacks and victims. The group's tactics include initial access through exploit of public-facing applications, execution via PowerShell and cmd, persistence through registry keys and startup folders, defense evasion by disabling security tools, and credential access using various utilities. C.A.S encrypts victim infrastructure using leaked ransomware builders and can destroy data using system utilities.
A Deep Dive into TeamTNT and Spinning YARN
released on 2024-12-18 @ 06:34:56 AM
TeamTNT is conducting a crypto mining campaign called Spinning YARN, targeting Docker, Redis, YARN, and Confluence. The attack involves server-side scripting vulnerabilities, obfuscated code, and malware deployment. The malware assesses the environment, disables cloud security, establishes persistence, and sets up a crypto miner. The impact extends beyond resource consumption, granting the attacker persistent access for potential further exploitation. TeamTNT, active since 2019, is known for attacks on cloud environments and cryptojacking. The campaign utilizes various tools and tactics, including malware droppers, XMRig miners, and reverse shells. Organizations should prioritize securing their infrastructure and stay informed about evolving threats to Linux and cloud environments.
BADBOX Botnet Is Back
released on 2024-12-17 @ 09:59:20 PM
The BADBOX botnet, previously thought to be contained, has resurfaced with increased scope and sophistication. Recent findings reveal over 192,000 infected devices, including high-end Yandex 4K QLED Smart TVs and Hisense smartphones, expanding beyond the initially targeted off-brand Android devices. The botnet exploits compromised firmware to install malware and secondary payloads without user consent, enabling activities such as residential proxying, remote code installation, and ad fraud. The operation affects multiple countries, with Russia, China, and India being the most impacted. The malware's ability to adapt and spread through global supply chains poses significant challenges for consumers and enterprises alike, emphasizing the importance of trusted vendors and partners in cybersecurity.
Unpacking the Diicot Malware Targeting Linux Environments
released on 2024-12-17 @ 09:59:20 PM
A new malware campaign attributed to the Romanian-speaking Diicot threat group has been discovered targeting Linux systems. The campaign shows significant advancements compared to previous iterations, including modified UPX headers with corrupted checksums, advanced payload staging, and environment-specific behavior. The malware targets Linux machines running OpenSSH, exploiting weak credentials for access. It employs various techniques such as file obfuscation, reverse shell capabilities, persistence mechanisms, and command and control communication. The campaign also includes SSH brute force functionality and potential cryptojacking capabilities. The attackers have earned over $16,000 from Monero mining alone.
Hidden in Plain Sight: New Attack Chain Delivers Espionage RATs
released on 2024-12-17 @ 08:58:21 PM
An advanced persistent threat group, TA397, targeted a Turkish defense organization with a sophisticated attack chain. The campaign used a RAR archive containing a decoy PDF, a shortcut file, and an Alternate Data Stream with PowerShell code. The infection process involved creating a scheduled task to communicate with a staging domain and manually deploying WmRAT and MiyaRAT malware. These RATs enable intelligence gathering and data exfiltration. The attack utilized NTFS alternate data streams and masqueraded files to evade detection. TA397's infrastructure included separate staging and command and control domains. The threat actor's tactics, targeting, and malware indicate it is likely an intelligence collection effort supporting a South Asian government's interests.
Brain Cipher Ransomware uses CVE-2023-28252
released on 2024-12-17 @ 04:31:20 PM
Brain Cipher ransomware is suspected of exploiting CVE-2023-28252, a vulnerability previously utilized by the now-inactive Nokowaya Ransomware Group. The exploit, often disguised as 'clfs_eop.exe', targets the Microsoft Windows CLFS Driver for privilege escalation. This vulnerability is being sold on underground networks for $5K to $25K, indicating the existence of unpatched systems. The analysis provides multiple MD5 hashes associated with the exploit, along with several IP addresses potentially related to the CVE or Brain Cipher operations. The exploitation of this vulnerability highlights the ongoing threat posed by ransomware groups adapting to use newly discovered security flaws.
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks
released on 2024-12-17 @ 04:20:09 PM
Earth Koshchei, an APT group suspected to be sponsored by the Russian SVR, executed a large-scale rogue RDP campaign targeting high-profile sectors. The attack methodology involved spear-phishing emails, red team tools, and sophisticated anonymization techniques. The campaign used an RDP relay, rogue RDP server, and malicious RDP configuration files to potentially leak data and install malware. The group registered over 200 domain names between August and October, setting up 193 RDP relays and 34 rogue RDP backend servers. They employed anonymization layers like VPN services, TOR, and residential proxies to mask their operations. The campaign peaked on October 22, targeting governments, armed forces, think tanks, academic researchers, and Ukrainian entities.
APT-C-36 (Blind Eagle) continues to target Colombia
released on 2024-12-17 @ 03:58:35 PM
APT-C-36, known as Blind Eagle, is suspected to originate from South America and primarily targets Colombia and other South American countries. Since October 2024, the group has been using more diverse and complex attack methods against Colombian entities. Their tactics involve multi-stage payload delivery and injection, memory execution to conceal traces, and anti-debugging techniques. The attack process includes using SVG files as bait, impersonating Colombian government communications, and ultimately deploying the AsyncRAT client for remote control. The group's technical capabilities have notably improved, incorporating techniques like 'Heaven's Gate' to evade analysis.
CoinLurker: The Stealer Powering the Next Generation of Fake Updates
released on 2024-12-17 @ 09:57:57 AM
CoinLurker is a sophisticated stealer designed to exfiltrate data while evading detection. Written in Go, it employs advanced obfuscation and anti-analysis techniques, making it highly effective in modern cyberattacks. The malware is delivered through fake update campaigns, leveraging deceptive entry points that exploit user trust. It uses Microsoft Edge Webview2 as a stager and employs a multi-stage chain involving Binance Smart Contracts and Bitbucket repositories to conceal its payload. CoinLurker targets cryptocurrency wallets and financial applications, systematically enumerating directories to access sensitive user data. Its layered injection tactics and obfuscated functions make it challenging for analysts to reverse-engineer its logic.
How Threat Actors Exploit Brand Collaborations to Target Popular YouTube Channels
released on 2024-12-17 @ 12:24:47 AM
Cybercriminals are targeting YouTube creators through sophisticated phishing campaigns that impersonate trusted brands offering collaboration deals. The malware is disguised as legitimate documents and delivered via password-protected files on platforms like OneDrive. Once downloaded, it steals sensitive information and grants remote access to victims' systems. The campaign uses YouTube parsers to collect email addresses, automation tools for bulk phishing, and multiple SMTP servers for distribution. Attackers leverage templates impersonating brands and PR entities to create convincing emails. The malware communicates with command and control servers to exfiltrate data, using techniques to evade detection. This global campaign highlights the need for content creators and marketers to verify collaboration requests and implement robust cybersecurity measures.
Technical Analysis of RiseLoader
released on 2024-12-16 @ 11:06:21 PM
RiseLoader, a new malware loader family observed in October 2024, implements a custom TCP-based binary network protocol similar to RisePro. It uses VMProtect for obfuscation and has been observed dropping malware families like Vidar, Lumma Stealer, XMRig, and Socks5Systemz. The malware collects information about installed applications and browser extensions related to cryptocurrency. RiseLoader's network communication protocol involves exchanging various message types with the C2 server, including system information, payload instructions, and task execution status. The similarities between RiseLoader and RisePro suggest they may be developed by the same threat actor, with RiseLoader potentially still in development for future information stealing and anti-analysis features.
Widespread Exploitation of Cleo File Transfer Software
released on 2024-12-16 @ 02:25:43 PM
Critical vulnerabilities in Cleo file transfer products, including VLTrader, Harmony, and LexiCom, are being actively exploited. Initially stemming from an insufficient patch for CVE-2024-50623, a new critical vulnerability (CVE-2024-55956) allows unauthenticated users to execute arbitrary commands. Exploitation has been confirmed in customer environments, with attackers dropping modular Java backdoors and conducting post-exploitation activities. Affected versions include those prior to 5.8.0.24. Immediate patching and removal from public internet access are recommended. Indicators of compromise and post-exploitation behavior have been observed, including enumeration commands, PowerShell usage, and attempts to clear Windows event logs.
New Yokai Side-loaded Backdoor Targets Thai Officials
released on 2024-12-16 @ 02:21:31 PM
A new backdoor named Yokai has been discovered targeting Thai officials. The malware is distributed via RAR files containing shortcut files that create decoy documents and execute a dropper. The dropper deploys a legitimate iTop Data Recovery application used to side-load the Yokai backdoor DLL. Yokai creates scheduled tasks, collects system information, and communicates with command and control servers to receive commands and exfiltrate data. It uses encryption and checksum validation for C2 communication. The backdoor provides remote shell access and can execute arbitrary commands. This attack demonstrates the continued use of DLL side-loading techniques by threat actors to evade detection.
A PAINFUL QUICKHEAL
released on 2024-12-16 @ 01:03:10 PM
This report analyzes a QUICKHEAL malware sample associated with the Chinese PLA-linked Needleminer group. The 32-bit DLL, protected by VMProtect, targets the telecom sector and was compiled in April 2022. It can steal credentials from Firefox and Internet Explorer browsers. The malware communicates with a C2 server using HTTP and attempts to establish connections via proxy. It employs various obfuscation techniques, including renaming cmd.exe and using a custom API resolver. The attackers' infrastructure, spanning multiple years and campaigns, shows poor operational security but targets diverse sectors and countries, including India, South Korea, and potentially the Middle East.
VIPKeyLogger Infostealer in the Wild
released on 2024-12-16 @ 12:46:11 PM
A new infostealer called VIPKeyLogger has been observed with increased activity. It shares similarities with Snake Keylogger and is distributed through phishing campaigns. The malware is delivered as an archive or Microsoft 365 file attachment, which downloads and executes a .NET compiled file. VIPKeyLogger utilizes steganography to hide obfuscated code within a bitmap image. It exfiltrates various data types including PC names, country names, clipboard data, screenshots, cookies, and browser history. The stolen information is sent via Telegram to Dynamic DuckDNS C2 servers. The attack chain involves multiple stages, from initial email lure to payload execution and data exfiltration.
Mauri Ransomware Threat Actors Exploiting Apache ActiveMQ Vulnerability (CVE-2023-46604)
released on 2024-12-16 @ 12:45:26 PM
Threat actors are exploiting the CVE-2023-46604 vulnerability in Apache ActiveMQ to attack Korean systems, particularly using Mauri ransomware. The vulnerability allows remote code execution on unpatched servers. Attackers use XML configuration files to add backdoor accounts, install remote access tools like Quasar RAT, and set up proxies using Frpc. The Mauri ransomware, based on open-source code, is found on the attacker's server with customized configurations. While primarily targeting cryptocurrency mining, some cases involve system control and potential data theft. System administrators are urged to patch vulnerable Apache ActiveMQ versions and implement security measures to prevent attacks.
Under the SADBRIDGE with GOSAR: QUASAR Gets a Golang Rewrite
released on 2024-12-16 @ 12:44:54 PM
Elastic Security Labs has uncovered a new intrusion set targeting Chinese-speaking regions, dubbed REF3864. The threat group employs a custom loader called SADBRIDGE to deploy GOSAR, a Golang-based reimplementation of the QUASAR backdoor. The infection chain involves trojanized MSI installers masquerading as legitimate software, utilizing DLL side-loading and injection techniques. GOSAR extends QUASAR's capabilities with additional information-gathering features, multi-OS support, and improved evasion tactics. The malware employs various persistence mechanisms and privilege escalation techniques, including UAC bypass and abuse of Windows Task Scheduler. GOSAR's functionalities include system information retrieval, screenshot capture, command execution, and keylogging, among others.
Declawing PUMAKIT
released on 2024-12-16 @ 12:44:17 PM
PUMAKIT is a sophisticated multi-stage Linux malware consisting of a dropper, memory-resident executables, an LKM rootkit, and a userland rootkit. It employs advanced stealth techniques to hide its presence and maintain C2 communication. The rootkit hooks 18 syscalls and kernel functions using ftrace to manipulate system behavior, including hiding files, privilege escalation, and anti-debugging. It uses unconventional methods like the rmdir syscall for interaction. The malware checks for specific conditions before activating and embeds all components within the dropper. Key capabilities include privilege escalation, file/directory hiding, anti-debugging, and C2 communication.
New I2PRAT communicates via anonymous peer-to-peer network
released on 2024-12-16 @ 10:31:52 AM
A novel malware strain, I2PRAT, has been discovered utilizing the I2P network for command and control communication. The infection begins with a phishing email leading to a fake CAPTCHA page, which tricks users into executing a malicious PowerShell script. The malware employs UAC bypass, Microsoft Defender evasion techniques, and WFP filters to render the victim's machine vulnerable. The RAT's modular structure includes various plugins for different functionalities, such as downloading files, enabling RDP, managing user accounts, and creating scheduled tasks. The malware has been active since at least March 2024 and may be distributed through PrivateLoader.
Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operation
released on 2024-12-14 @ 07:04:45 AM
This analysis examines HeartCrypt, a new packer-as-a-service (PaaS) used to protect malware. Developed since July 2023 and launched in February 2024, HeartCrypt charges $20 per file to pack Windows x86 and .NET payloads. It is primarily used by malware operators of families like LummaStealer, Remcos, and Rhadamanthys. HeartCrypt injects malicious code into legitimate binaries and employs various obfuscation techniques to hinder analysis. The packer executes in multiple stages, using encoded resources and anti-sandbox measures. Over 2,000 malicious payloads across 45 malware families have utilized HeartCrypt, highlighting the increasing commoditization of malware development and the need for proactive threat hunting.
NodeLoader Exposed: The Node.js Malware Evading Detection
released on 2024-12-13 @ 10:59:24 PM
Zscaler ThreatLabz discovered a malware campaign using Node.js applications for Windows to distribute cryptocurrency miners and information stealers. Named NodeLoader, this malware family employs Node.js compiled executables to deliver second-stage payloads like XMRig, Lumma, and Phemedrone Stealer. The attackers use social engineering, targeting gamers through YouTube and Discord, leading them to malicious websites resembling legitimate gaming platforms. NodeLoader uses the sudo-prompt module for privilege escalation and employs various evasion techniques. The malware downloads and executes PowerShell scripts, which in turn download and run additional payloads. The use of Node.js and large file sizes complicates detection for some security products, resulting in low antivirus detection rates.
Frequent freeloader: Russian actor using tools of other groups to attack Ukraine
released on 2024-12-13 @ 01:28:10 PM
Russian nation-state actor Secret Blizzard has been observed using tools and infrastructure from other threat actors to compromise targets in Ukraine. Between March and April 2024, Secret Blizzard utilized the Amadey bot malware associated with cybercriminal activity to deploy its custom Tavdig and KazuarV2 backdoors on Ukrainian military devices. In January 2024, Secret Blizzard also leveraged a backdoor from Storm-1837, a Russia-based threat actor targeting Ukrainian drone pilots, to install its malware. This approach highlights Secret Blizzard's strategy of diversifying attack vectors and prioritizing access to military targets in Ukraine. The actor employs various techniques including strategic web compromises, adversary-in-the-middle campaigns, and spear-phishing for initial access.
Unwrapping the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaign
released on 2024-12-13 @ 01:21:53 PM
A large-scale phishing campaign targeting retail brands and cryptocurrency users has been uncovered. The campaign, dubbed 'Aggressive Inventory Zombies' (AIZ), initially impersonated Etsy but expanded to target major retailers like Amazon, BestBuy, and eBay. The threat actor uses a popular website template to create phishing sites, integrating chat services for malicious activities. The campaign also targets crypto audiences with a substantial network of phishing sites. The research revealed financial ties to India and collaboration with Stark Industries led to the discovery of additional infrastructure. The campaign employs various tactics, including bulk pricing schemes and live chat widgets for phishing. Multiple cryptocurrency-related phishing efforts were also identified, targeting various crypto brands and exchanges.
PlainGnome and Bonespy Russian Android spyware discovered | Threat Intel
released on 2024-12-13 @ 01:13:04 PM
Two Android surveillance families, BoneSpy and PlainGnome, have been discovered and attributed to the Russian Gamaredon APT group, associated with the FSB. BoneSpy, active since 2021, is based on open-source DroidWatcher, while PlainGnome emerged in 2024. Both target Russian-speaking victims in former Soviet states, collecting data such as SMS messages, call logs, audio, photos, location, and contacts. The malware is likely distributed through targeted social engineering. Infrastructure analysis reveals connections to known Gamaredon domains and Russian ISPs. This discovery marks Gamaredon's first known mobile surveillance tools, expanding their capabilities beyond desktop campaigns.
Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
released on 2024-12-13 @ 12:40:02 PM
An attacker used social engineering via a Microsoft Teams call to impersonate a client and gain remote access to a user's system. The victim was tricked into downloading AnyDesk, allowing the attacker to drop suspicious files, including DarkGate malware. The attack involved multiple stages, including the execution of malicious commands, system information gathering, and connection to a command-and-control server. The DarkGate payload was delivered through an AutoIt script, which injected itself into legitimate processes. Although persistent files and a registry entry were created, the attack was thwarted before data exfiltration occurred. The incident highlights the importance of robust security measures and awareness against social engineering attacks.
Cleopatra's Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software
released on 2024-12-13 @ 12:40:02 PM
A mass exploitation campaign targeting Cleo Managed File Transfer (MFT) products was observed in December 2024. The attackers exploited a zero-day vulnerability to deploy a Java-based backdoor dubbed Cleopatra. The campaign began on December 7 and is ongoing. The attack chain involves an obfuscated PowerShell stager, a Java loader, and the Cleopatra backdoor. The backdoor supports cross-platform functionality on Windows and Linux, with specific features to access data within Cleo MFT software. Multiple IP addresses were used for command and control, while vulnerability scanning originated from only two IPs. The campaign appears opportunistic, affecting various industries. Affected Cleo products include Harmony, VLTrader, and LexiCom, even on patched versions.
Black and White Domination: Glutton Trojan Lurks in Mainstream PHP Frameworks
released on 2024-12-11 @ 07:24:17 PM
The XLab threat detection system uncovered an advanced PHP trojan named Glutton, which has been active for over a year without detection. Glutton targets both legitimate businesses and cybercriminal operations, infiltrating popular PHP frameworks like ThinkPHP and Laravel. It employs modular components for information theft, backdoor installation, and code injection. The malware can deploy both ELF-based Winnti backdoors and PHP-based backdoors, demonstrating cross-platform capabilities. Notably, Glutton also targets black market operations by infecting their systems, potentially aiming to steal from cybercriminals themselves. The attack framework operates without leaving files on disk, making detection challenging.
Inside a New OT/IoT Cyberweapon: IOCONTROL
released on 2024-12-11 @ 07:20:00 PM
Team82 analyzed a sample of IOCONTROL, a custom-built IoT/OT malware used by Iran-affiliated attackers to target Israel and U.S.-based devices. The malware affects various IoT and SCADA/OT devices, including IP cameras, routers, PLCs, HMIs, and firewalls from multiple vendors. IOCONTROL is believed to be part of a global cyber operation against western IoT and OT devices, likely used as a cyberweapon by a nation-state to attack civilian critical infrastructure. The malware uses the MQTT protocol for C2 communication and employs stealth techniques like DNS over HTTPS. It has capabilities for arbitrary code execution, self-deletion, port scanning, and persistence through a daemon installation.
AppLite: A New AntiDot Variant Targeting Mobile Employee Devices
released on 2024-12-11 @ 07:12:11 PM
A sophisticated Mishing campaign delivers malware to Android devices, enabling credential theft from banking, cryptocurrency, and critical applications. The campaign uses phishing domains to distribute a new variant of the Antidot banking trojan, dubbed AppLite Banker. Attackers pose as recruiters, tricking victims into downloading a malicious app that installs AppLite. The malware can mimic enterprise apps, Chrome, and TikTok, allowing for device takeover and application access. It uses advanced techniques like ZIP manipulation, websocket communication, and overlay attacks to evade detection and steal credentials. AppLite targets users in multiple languages and focuses on banking, cryptocurrency, and finance apps across various countries.
Malware Analysis: A Kernel Land Rootkit Loader for FK_Undead
released on 2024-12-11 @ 04:36:12 AM
This analysis delves into a Windows rootkit loader for the FK_Undead malware family, known for intercepting user network traffic through proxy manipulation. The loader, signed with a valid Microsoft certificate, installs itself as a system service and employs various evasion techniques. It downloads and decrypts a payload, which is another signed driver protected by VMProtect. The rootkit checks for security tools, virtual machine environments, and implements notify routines to hide from detection. It uses deaddrops to retrieve URLs for downloading the FK_Undead payload, which is then decrypted and installed as a separate kernel driver service.
Inside Zloader's Latest Trick: DNS Tunneling
released on 2024-12-11 @ 02:51:39 AM
Zloader, a modular Trojan based on Zeus source code, has introduced new features in version 2.9.4.0 to enhance its anti-analysis capabilities and resilience against detection. Key updates include a custom DNS tunnel protocol for C2 communications, an interactive shell supporting over a dozen commands, and improved anti-analysis techniques. The malware now uses more targeted distribution methods, moving away from large-scale spam campaigns. Technical analysis reveals changes in configuration, environment checks, API resolution, and network communication. The new DNS tunneling feature allows Zloader to encapsulate encrypted TLS traffic through a custom protocol using DNS records, providing an additional layer of obfuscation.
Technical Analysis of Zloader 2.9.0.4
released on 2024-12-11 @ 02:51:38 AM
The latest version of Zloader (2.9.4.0) introduces significant enhancements to its capabilities. Key features include a custom DNS tunnel protocol for C2 communications, an interactive shell supporting various commands, and updated anti-analysis techniques. The malware's distribution has become more targeted, often utilizing Remote Monitoring and Management tools. Zloader's configuration now includes new sections related to DNS tunneling, and its environment check mechanism has been modified. The malware's API resolution process has been updated, and it now implements an interactive shell for executing various commands. The most notable addition is the DNS tunneling feature, which uses a custom protocol to encapsulate encrypted TLS traffic through DNS requests.
Intensifies Attacks On Russia With PhantomCore
released on 2024-12-11 @ 02:51:37 AM
The Head Mare hacktivist group has escalated its campaign against Russian targets using the PhantomCore backdoor. The group employs deceptive ZIP archives containing malicious LNK files and executables disguised as archive files to deploy PhantomCore. This C++-compiled backdoor, which replaces earlier GoLang versions, incorporates the Boost.Beast library for C&C communication. PhantomCore gathers victim information and awaits further commands from the C&C server. The infection chain involves PowerShell commands to extract and execute the malware. Head Mare's campaign spans various industries and may deploy ransomware like LockBit and Babuk. The group's evolving tactics and ability to collect data and deploy additional payloads highlight the ongoing threat to Russian organizations.
Inside the incident: Uncovering an advanced phishing attack
released on 2024-12-11 @ 02:51:35 AM
A sophisticated phishing campaign targeted a U.K.-based insurance company, using a compromised CEO's email account from a major shipping company. The attack involved a malicious PDF link hosted on AWS, leading to a fake Microsoft authentication page. The threat actor employed tactics like deletion rules, trusted sender addresses, and legitimate platforms to evade detection. The 'Russian nesting dolls' method was used, embedding multiple links to obscure the final phishing site. Swift action by the security team limited the attacker's success to creating a deletion rule. The incident was part of a broader campaign targeting multiple companies, highlighting the need for enhanced user awareness and technical measures to combat increasingly sophisticated phishing attempts.
New Cleo zero-day RCE flaw exploited in data theft attacks
released on 2024-12-11 @ 02:51:34 AM
A critical zero-day vulnerability in Cleo's managed file transfer software is being actively exploited by hackers to breach corporate networks and steal data. The flaw affects Cleo LexiCom, VLTrader, and Harmony products, allowing unrestricted file upload and downloads leading to remote code execution. It bypasses a previous fix for CVE-2024-50623. Exploitation began on December 3, 2024, with a significant increase on December 8. The attacks involve writing malicious files into the 'autorun' directory, which are then processed automatically, executing PowerShell commands and downloading additional payloads. At least ten organizations have been impacted, with 390 potentially vulnerable servers identified globally. Users are advised to take immediate mitigation steps, including moving exposed systems behind firewalls and disabling the autorun feature.
Analysis of Recent Attack Activities Targeting China Using Research Project Plans as Bait
released on 2024-12-10 @ 02:59:13 PM
The Patchwork APT group, also known as Hangover and Dropping Elephant, has been conducting cyber espionage activities since 2009, primarily targeting Asian countries including China and Pakistan. Recently, they launched a phishing campaign against Chinese research personnel using a document titled 'National Key R&D Program Engineering Science and Comprehensive Interdisciplinary Key Special 2025 Project Guide Suggestion Form' as bait. The attack uses LNK files as initial payload, downloads PDF and executable files, sets up scheduled tasks, and ultimately loads the BadNews malware. The group impersonates legitimate websites and employs various techniques to evade detection and gather sensitive information from targeted systems.
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia
released on 2024-12-10 @ 02:56:00 PM
An unknown threat actor has deployed a malicious Android sample targeting high-value assets in Southern Asia. The malware, generated using the Spynote Remote Administration Tool, was delivered via WhatsApp in multiple attempts. The payload, concealed and operating in the background, exhibits various capabilities including location tracking, contact access, camera control, SMS reading, and file system interaction. The malware also attempts to enable accessibility settings for enhanced control. Analysis reveals obfuscated code and permissions that allow extensive monitoring and data extraction. The attack's sophistication suggests possible involvement of an APT group, though the specific actor remains unidentified. This incident highlights the ongoing use of SpyNote variants in targeted attacks against critical sectors and individuals.
Extensive Analysis of APT-C-53 (Gamaredon) Group's Attack Activities
released on 2024-12-10 @ 02:21:13 PM
APT-C-53 (Gamaredon), also known as Primitive Bear, Winterflounder, and BlueAlpha, is an active APT group since 2013 targeting government, defense, diplomacy, and media sectors. The analysis reveals their use of complex techniques including malicious LNK files, XHTML files, and sophisticated phishing campaigns. Their attack vectors include email attachments with compressed files containing malicious LNK files, XHTML files that download malicious payloads, and HTA files. The group employs various obfuscation techniques and leverages PowerShell scripts for persistence and communication with command and control servers. The malware also has capabilities to infect removable drives and maintain persistence through registry modifications.
Unveiling RevC2 and Venom Loader
released on 2024-12-10 @ 01:45:55 PM
Between August and October 2024, two new malware families, RevC2 and Venom Loader, were deployed using Venom Spider's Malware-as-a-Service tools. RevC2 uses WebSockets for C2 communication and can steal cookies and passwords, proxy network traffic, and enable remote code execution. Venom Loader is customized for each victim, using the computer name to encode the payload. The first campaign used an API documentation lure to deliver RevC2, while the second campaign used a cryptocurrency transaction lure to deliver Venom Loader and Retdoor, a JavaScript backdoor. Both campaigns demonstrate sophisticated attack chains and highlight the evolving threat landscape.
Pirated Business Software Activator Spreads RedLine Stealer
released on 2024-12-10 @ 01:42:59 PM
A malicious campaign targeting users of unlicensed corporate business automation software has been discovered. The attackers are distributing malicious activators on accounting forums that contain the RedLine stealer hidden in an unusual way. The activator library is obfuscated using .NET Reactor, with the malicious code compressed and encrypted in multiple layers. The campaign began in January 2024 and continues to threaten users of unlicensed software. The attackers aim at entrepreneurs using current versions of a business process automation platform, spreading their solution disguised as a new version of the HPDxLIB activator. The malicious version differs from the 'clean' one primarily by using .NET and having a new self-signed certificate.
Cleo Software Actively Being Exploited in the Wild
released on 2024-12-10 @ 11:40:49 AM
A critical vulnerability in Cleo's LexiCom, VLTransfer, and Harmony software, used for file transfer management, is being actively exploited. The flaw allows unauthenticated remote code execution, affecting all versions up to and including 5.8.0.21. Attackers are exploiting this vulnerability to drop malicious files, execute PowerShell commands, and gain persistence on affected systems. The attack chain involves placing files in the 'autorun' directory and leveraging the software's import functionality. Post-exploitation activities include domain reconnaissance and potential Active Directory enumeration. Multiple businesses, particularly in consumer products, food industry, trucking, and shipping sectors, have been compromised. Huntress researchers have developed a proof-of-concept and are working with Cleo to address the issue.
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware
released on 2024-12-09 @ 10:32:47 PM
A resurgence of activity related to the Black Basta ransomware campaign has been observed since early October. The threat actors have refined their tactics, introducing new malware payloads, improved delivery methods, and enhanced defense evasion techniques. The attacks begin with email bombing of target users, followed by social engineering attempts via Microsoft Teams. Operators impersonate IT staff and trick users into installing remote management tools. Once access is gained, they deploy credential harvesters, Zbot, DarkGate, and custom malware. The campaign has been linked to Black Basta ransomware deployments in the past, highlighting its serious nature. The attackers continue to update their strategies and tools rapidly, demonstrating sophisticated and persistent threat behavior.
DroidBot: Insights from a new Turkish MaaS fraud operation
released on 2024-12-09 @ 10:22:50 PM
DroidBot is an advanced Android Remote Access Trojan combining hidden VNC and overlay capabilities with spyware features. It uses dual-channel communication, transmitting data via MQTT and receiving commands through HTTPS. The malware targets 77 entities, including banks and cryptocurrency exchanges, in countries like the UK, Italy, France, Spain, and Portugal. Evidence suggests Turkish-speaking developers and a Malware-as-a-Service operation with 17 distinct affiliate groups. DroidBot is under active development, showing inconsistencies across samples. Its sophisticated features, diverse target list, and MaaS infrastructure make it a significant threat to financial institutions and government entities across multiple regions.
Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices
released on 2024-12-09 @ 01:12:57 PM
A malicious botnet called Socks5Systemz is operating a proxy service named PROXY.AM, utilizing over 85,000 compromised devices. The botnet, active since 2013, aims to turn infected systems into proxy exit nodes for cybercriminals seeking to obscure their attack sources. Initially boasting around 250,000 machines, the botnet's size has decreased due to a loss of control and subsequent rebuilding. PROXY.AM offers 'elite, private, and anonymous proxy servers' for monthly fees ranging from $126 to $700. The botnet primarily affects countries like India, Indonesia, Ukraine, and Algeria. This revelation follows recent discoveries of similar malware-powered proxy services, highlighting the ongoing threat of botnets and proxy abuse in cybercrime activities.
CURLing for Crypto on Honeypots
released on 2024-12-09 @ 08:26:55 AM
An analysis of honeypot activity reveals a pattern of repeated curl commands targeting various websites, primarily originating from a single IP address. The commands, executed on multiple honeypots, focus on cryptocurrency-related sites, bot construction platforms, and communication services. The activity involves thousands of requests to each site, potentially indicating a distributed denial-of-service attempt or a cryptocurrency mining operation. The report details the methods used to analyze the data, including log parsing and visualization techniques, and provides a comprehensive list of targeted websites along with their purposes. The persistent nature of this activity, which began in November 2024 and continues, suggests an ongoing campaign with unclear motives.
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
released on 2024-12-07 @ 12:25:43 PM
A sophisticated scam targeting Web3 professionals has been identified, involving the Realst crypto stealer malware with variants for both macOS and Windows. The threat actors have created fake companies using AI-generated content to appear legitimate, cycling through various names like Meetio, Clusee, and Meeten. The scam involves setting up video calls and prompting targets to download a malicious meeting application. The malware steals sensitive information, including cryptocurrency wallet data, browser credentials, and banking details. It employs various techniques to evade detection and ensure persistence. The campaign highlights the increasing use of AI in social engineering and the growing threat of malicious Electron applications.
Compromised ultralytics PyPI package delivers crypto coinminer
released on 2024-12-07 @ 12:25:41 PM
A malicious version of the popular AI library ultralytics was published on PyPI, containing downloader code for the XMRig coinminer. The compromise was achieved by exploiting a known GitHub Actions script injection. Two versions, 8.3.41 and 8.3.42, were affected before a clean version 8.3.43 was released. The attack had potential to impact millions of users due to the package's popularity. The infection vector involved crafting malicious pull requests to gain backdoor access. The compromise was initiated from Hong Kong. The malicious code was inserted into downloads.py and model.py files, designed to download platform-specific payloads. While this incident focused on cryptocurrency mining, it could have been used to deploy more aggressive malware.
A Technical Look At The New 'Termite' Ransomware That Hit Blue Yonder
released on 2024-12-07 @ 12:25:39 PM
The Termite ransomware, a rebranded version of Babuk, recently targeted supply chain management platform Blue Yonder. This new strain employs advanced tactics, including double extortion, to maximize its impact. Upon execution, it terminates services, deletes shadow copies, empties the recycle bin, and encrypts files while avoiding certain system folders. The ransomware spreads through network shares and appends a '.termite' extension to encrypted files. It uses multiple MITRE ATT&CK techniques for execution, defense evasion, discovery, and impact. The emergence of Termite highlights the need for robust cybersecurity measures, proactive threat intelligence, and effective incident response strategies to counter evolving ransomware threats.
Network Abuses Leveraging High-Profile Events: Suspicious Domain Registrations and Other Scams
released on 2024-12-07 @ 02:33:06 AM
Threat actors exploit high-profile events like global sporting championships to launch attacks through phishing and scams. The analysis focuses on trends in domain registrations, DNS traffic, URL traffic, active domains, verdict change requests, and domain textual patterns. Case studies include observations related to the 2024 Summer Olympics in Paris. Metrics to watch include domain registration trends, textual patterns in deceptive domains, DNS traffic anomalies, and URL traffic patterns. The report highlights the importance of proactive monitoring and analysis of these trends to identify and mitigate threats early. Specific examples of network abuses related to the Paris Olympics are provided, including suspicious domain registrations, DNS traffic spikes, and scam campaigns.
End-of-Year PTO: Days Off and Data Exfiltration with Formbook
released on 2024-12-06 @ 10:10:37 PM
A phishing campaign disguised as an end-of-year leave approval notice has been intercepted by the Cofense Phishing Defense Center. The malicious email, masquerading as HR communication, tricks recipients into clicking a link that leads to the deployment of FormBook malware. The email contains red flags such as an external sender warning and a SendGrid-wrapped URL. The malware, an AutoIt compiled executable, uses process injection techniques to evade detection and execute its payload. FormBook performs reconnaissance, injects code into svchost.exe and Utilman.exe, and carries out credential harvesting, keylogging, and data exfiltration. The attack exploits the urgency of year-end leave scheduling to infiltrate organizations and steal sensitive information.
U.S. Organization in China Targeted by Attackers
released on 2024-12-06 @ 05:11:15 PM
A large U.S. entity with significant operations in China faced a four-month-long cyber intrusion, likely conducted by a China-based threat actor. The attackers obtained persistent network access, laterally moved across systems, compromised Exchange servers to harvest emails, and deployed exfiltration tools, suggesting data theft. Tactics involved DLL sideloading, credential dumping, remote execution tools, and reconnaissance of Active Directory.
The adventures of an extroverted cyber nerd and the people who help to fight the good fight
released on 2024-12-06 @ 03:11:25 AM
The article describes the experiences of a Senior Security Strategist at Talos, highlighting the unique blend of technical expertise and communication skills required for the role. It emphasizes the importance of supporting NGOs in cybersecurity, detailing the author's involvement with the NGO-ISAC annual summit and the creation of a custom Backdoors & Breaches game for NGOs. The piece also touches on recent research regarding QR code attacks in emails and provides updates on major cybersecurity issues, including vulnerabilities in US water systems and guidance for evicting China-linked threat actors.
Something to Remember Us By: Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware Installed
released on 2024-12-05 @ 05:33:37 PM
A joint investigation by The First Department and The Citizen Lab uncovered spyware covertly implanted on a Russian programmer's phone after it was confiscated by authorities. The individual, accused of sending money to Ukraine, was subjected to beatings and recruitment attempts by the FSB during his 15-day detention. The spyware, resembling the Monokle family, allows for extensive surveillance capabilities including location tracking, call recording, and message interception. Analysis reveals similarities to previously reported Monokle samples, suggesting either an updated version or new software using much of the same code. The case highlights the risks of device confiscation by hostile security services and the need for expert analysis upon return.
Leveraging Cloudflare Tunnels for GammaDrop Infrastructure
released on 2024-12-05 @ 05:33:36 PM
BlueAlpha, a Russian state-sponsored cyber threat group, has evolved its malware delivery tactics by exploiting Cloudflare Tunnels to conceal GammaDrop staging infrastructure. The group employs HTML smuggling with sophisticated modifications to bypass email security systems and uses DNS fast-fluxing to complicate C2 communication tracking. BlueAlpha's malware suite includes GammaDrop, which acts as a dropper for GammaLoad, a custom loader capable of beaconing to its C2 and executing additional malware. The group utilizes extensive obfuscation techniques to complicate analysis. Mitigation strategies include enhancing email security, restricting execution of malicious files, monitoring network traffic, and leveraging threat intelligence solutions.
Threat Actor Targets Manufacturing Industry With Malware
released on 2024-12-05 @ 05:33:35 PM
A sophisticated cyberattack campaign targeting the manufacturing industry has been identified, utilizing a deceptive LNK file disguised as a PDF document. The attack leverages multiple Living-off-the-Land Binaries and Google Accelerated Mobile Pages to evade detection. The threat actor employs various techniques, including DLL sideloading and process injection, to deploy Lumma Stealer and Amadey Bot. These malware strains enable the attacker to gain control and exfiltrate sensitive information from victim machines. The campaign's infection chain involves multiple stages of code injection and uses legitimate system tools to execute malicious PowerShell commands. The attackers demonstrate adaptability by using URL shortening and AMP URLs to bypass traditional security mechanisms.
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur's Multi-Platform Attacks
released on 2024-12-05 @ 07:31:57 AM
Earth Minotaur, a threat actor targeting Tibetan and Uyghur communities, utilizes the MOONSHINE exploit kit to compromise Android devices and install the DarkNimbus backdoor. The exploit kit targets vulnerabilities in instant messaging apps, particularly WeChat, and has been updated with new exploits since 2019. DarkNimbus, an unreported Android backdoor with a Windows version, allows for comprehensive surveillance. The attack chain involves social engineering tactics, exploiting Chromium-based vulnerabilities, and implanting a trojanized XWalk browser core. The backdoor supports various data collection and device control features. Earth Minotaur appears to be a distinct intrusion set from previously reported groups, though connections to other Chinese operations are noted.
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
released on 2024-12-05 @ 02:56:44 AM
The Russian state-sponsored threat actor Secret Blizzard has been observed compromising the infrastructure of Storm-0156, a Pakistan-based espionage group, to conduct their own espionage operations. Since November 2022, Secret Blizzard has used Storm-0156's backdoors to deploy their own malware on compromised devices, particularly targeting government entities in Afghanistan and India. The threat actor has employed various tools, including TinyTurla variant, TwoDash, Statuezy, and MiniPocket, alongside Storm-0156's CrimsonRAT and Wainscot backdoors. This activity highlights Secret Blizzard's tactic of leveraging other actors' infrastructure to diversify attack vectors and facilitate intelligence collection.
Snowblind: The Invisible Hand of Secret Blizzard
released on 2024-12-05 @ 02:56:44 AM
A Russian-based threat actor, Secret Blizzard, has infiltrated 33 command-and-control nodes of a Pakistani-based actor, Storm-0156. Over two years, Secret Blizzard leveraged this access to deploy malware into Afghan government networks and potentially acquired data from Pakistani operators' workstations. They expanded their focus to include two other malware families, Waiscot and CrimsonRAT, used against Indian targets. The campaign demonstrates Secret Blizzard's meticulous approach to expanding operations in the Middle East, exploiting other actors' infrastructure to avoid attribution and gain sensitive information. This strategy allows them to remotely acquire data without exposing their own tools, taking advantage of the foothold created by the original threat actor.
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader
released on 2024-12-04 @ 11:12:37 PM
A new malware called Pronsis Loader has been discovered, with similarities to D3F@ck Loader. Both use JPHP-compiled executables, but Pronsis uses NSIS for installation instead of Inno Setup. Pronsis Loader typically delivers Lumma Stealer and Latrodectus payloads. It employs defense evasion techniques like excluding user directories from Windows Defender scans. The malware establishes persistence through scheduled tasks. Infrastructure analysis revealed multiple IP addresses and open directories used to host malicious files, particularly Lumma Stealer variants. This discovery highlights the evolving nature of malware threats and the need for continued vigilance in cybersecurity practices.
Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)
released on 2024-12-04 @ 11:12:34 PM
This analysis explores the Rockstar 2FA phishing-as-a-service kit, focusing on real-world email campaign examples. It highlights various techniques used by attackers, including the abuse of legitimate services for FUD (Fully Undetectable) links, such as Microsoft OneDrive, OneNote, Dynamics 365, Atlassian Confluence, and Google Docs Viewer. The use of QR codes in phishing attempts and the insertion of stolen email threads to inflate message size are also discussed. The article emphasizes the multi-stage nature of these attacks and the importance of caution when dealing with emails sent through trusted platforms.
The Curious Case of an Excellent Resume
released on 2024-12-04 @ 08:55:51 PM
This report details a malicious campaign where the threat actor gained initial access through a resume lure as part of a TA4557/FIN6 operation. The actor employed techniques like abusing legitimate binaries, establishing Cobalt Strike and Pyramid C2, exploiting CVE-2023-27532 for lateral movement, and using Cloudflared for tunneling traffic.
Analyzing threat actor Kimsuky email phishing campaign
released on 2024-12-04 @ 08:43:12 PM
The report provides an in-depth analysis of the email phishing campaigns conducted by the Kimsuky threat actor group. It highlights their tactics of using diverse themes and subjects to pique the curiosity of recipients, targeting researchers and individuals related to North Korean affairs in an attempt to hijack accounts over several years. The report reveals how the group changes their attack staging servers from Japan to Russia to evade detection, employs malwareless attack strategies using finance-related lures, and underscores the need for proactive security measures against known phishing IP addresses using EDR products.
Forges Recruitment Sites, Launches Attacks on Aerospace and Semiconductor Industries in Multiple Countries
released on 2024-12-04 @ 08:41:52 PM
In this analysis, researchers have uncovered a malicious campaign orchestrated by APT35, a threat group believed to be affiliated with the Islamic Revolutionary Guard Corps (IRGC) of Iran. The group has been observed using forged recruitment sites and corporate sites to target the aerospace and semiconductor industries across multiple countries, including the United States, Thailand, the United Arab Emirates, and Israel. The attackers lure victims into downloading and executing malicious processes under the guise of site access or VPN access. The campaign leverages legitimate internet resources such as OneDrive, Google Cloud, and GitHub, and employs various tactics to evade detection and facilitate its operations. The detailed report provides an in-depth examination of the attack methods, infrastructure, and indicators of compromise (IOCs) associated with this campaign.
XWorm: Analyzing New Infection Tactics With Old Payload
released on 2024-12-04 @ 05:00:20 PM
A recent malware campaign utilizes a multi-stage infection chain starting with a LNK file that lures victims into opening an invoice in a web browser. The attack involves PowerShell commands, batch files, and Python scripts to download and execute the XWorm payload. The infection process includes downloading a ZIP file containing Python setup files and scripts, with a malicious script responsible for decrypting and injecting shellcode. The XWorm variant employed is an older version that includes an Xlogger module for tracking user activities. The malware's capabilities include shellcode injection and keylogging, enabling the theft of sensitive information and exfiltration to a remote server.
PROXY.AM Powered by Socks5Systemz Botnet
released on 2024-12-04 @ 10:17:37 AM
The Socks5Systemz botnet, active since 2013, has been operating under the radar by integrating with other malware as a SOCK5 proxy module. Recently, it has grown to 250,000 compromised systems globally. The botnet powers PROXY.AM, a service providing proxy exit nodes for criminal activities. Originally sold as standalone malware, Socks5Systemz was adapted for use in Andromeda, Smokeloader, and Trickbot. The botnet's size fluctuates, with recent estimates ranging from 85,000 to 100,000 daily active bots. PROXY.AM, registered in 2016, offers 'elite, private and anonymous proxies' for various purposes, including account brute-forcing. The malware has undergone recent updates, including new infrastructure and obfuscation techniques.
Hunting Payroll Pirates: Tracking HR Redirect Phishing Scam
released on 2024-12-04 @ 10:14:12 AM
A malicious threat actor group dubbed 'Payroll Pirates' is orchestrating an ongoing human resources payroll redirection phishing scam targeting numerous organizations' employees. The campaign primarily focuses on Workday users and high-profile companies. The actors employ search ads with brand keywords to promote sponsored phishing websites, utilize website builders for rapid domain creation, and often host phishing content behind an /online directory. The group has targeted various organizations, including the California Employment Development Department, Kaiser Permanente, Macy's, New York Life, and Roche. The scammers use obtained credentials and social security numbers to access employee portals and redirect funds to fraudulent bank accounts. The campaign's infrastructure includes hundreds of domains, dedicated IP ranges, and tactical shifts in specific timeframes.
Stellar Discovery of A New Cluster of Andromeda/Gamarue C2
released on 2024-12-04 @ 03:54:07 AM
A new cluster of Command and Control (C2) servers related to the Andromeda/Gamarue backdoor has been discovered, targeting manufacturing and logistics companies in Asia. The initial infection vector involves USB drive-by attacks, using LNK shortcuts to execute malicious DLLs. The malware employs rundll32.exe to load these DLLs, establishing C2 connections to domains with a specific TLS certificate. The Andromeda backdoor, known for its modular nature and ability to download additional malware, is used in conjunction with other malware families. Persistence is achieved through registry modifications, and the attackers attempt to evade detection by masquerading as Google applications.
Inside Akira Ransomware's Rust Experiment
released on 2024-12-03 @ 10:42:18 PM
Check Point Research analyzed the Rust version of Akira ransomware that targeted ESXi servers in early 2024. The malware's complex assembly is attributed to Rust idioms, boilerplate code, and compiler strategies. The analysis reveals the ransomware's use of the seahorse CLI framework, indicatif library for progress reporting, and a hybrid encryption approach using curve25519 and SOSEMANUK. The malware's default behavior targets ESXi VMs, but it can also function as general-purpose Linux ransomware. The study highlights the challenges in reverse-engineering Rust binaries due to aggressive inlining and optimization, emphasizing the need for advanced tooling to identify spliced inline code.
Gafgyt Malware Broadens Its Scope in Recent Attacks
released on 2024-12-03 @ 06:16:00 PM
Trend Micro researchers have identified threat actors exploiting misconfigured Docker servers to spread Gafgyt malware, traditionally known for targeting IoT devices. This shift in behavior involves attackers creating Docker containers based on legitimate 'alpine' images to deploy the malware. The attack sequence includes attempts to deploy various Gafgyt botnet binaries, with the potential to launch DDoS attacks on targeted servers. The malware uses hardcoded command-and-control server addresses and can perform DDoS attacks using multiple protocols. The attackers also employ privilege escalation techniques and attempt to discover local IP addresses. This new tactic represents a significant expansion of Gafgyt's targets beyond its usual scope.
SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
released on 2024-12-03 @ 06:15:59 PM
Threat actors are exploiting old Microsoft Office vulnerabilities using SmokeLoader, a modular malware loader, to steal browser credentials. The campaign targets manufacturing, healthcare, and IT companies in Taiwan, utilizing CVE-2017-0199 and CVE-2017-11882 to execute remote code and deploy malicious payloads. SmokeLoader, typically used to deliver other malware, is now employing its own plugins for credential theft. The attack involves phishing emails with malicious attachments, exploiting the MS Office flaws to download and execute harmful plugins. FortiGuard Labs has identified nine different plugins used to steal various types of credentials and sensitive data from browsers and email software.
Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)
released on 2024-12-03 @ 04:39:12 PM
Trustwave SpiderLabs has been monitoring the rise of Phishing-as-a-Service (PaaS) platforms, focusing on a kit named 'Rockstar 2FA' linked to widespread adversary-in-the-middle (AiTM) phishing attacks. The campaign, targeting Microsoft user accounts, employs car-themed web pages and has seen a significant increase since August 2024. Rockstar 2FA, an updated version of the DadSec/Phoenix kit, operates under a PaaS model and offers features like 2FA bypass, cookie harvesting, and antibot protection. The attacks use various email delivery mechanisms and themes to bypass traditional filters, affecting users across multiple sectors and regions.
Howling Scorpius (Akira Ransomware)
released on 2024-12-03 @ 04:35:30 PM
Howling Scorpius, the entity behind Akira ransomware-as-a-service, has become one of the top five most active ransomware groups since emerging in early 2023. They target small to medium-sized businesses across various sectors in North America, Europe, and Australia using a double extortion strategy. The group operates Windows and Linux/ESXi encryptors, and is actively enhancing its toolkit. Their tactics include exploiting vulnerable VPN services, using valid accounts from dark web brokers, targeting RDP, and conducting spear-phishing campaigns. They employ tools like Mimikatz and LaZagne for credential access, and use WinRAR, WinSCP, RClone, and FileZilla for data exfiltration. The group has also introduced new variants like Megazord and Akira v2, demonstrating ongoing development efforts.
Beware of phishing attacks by APT-C-01 (Poison Ivy)
released on 2024-12-03 @ 04:34:20 PM
APT-C-01, known as Poison Ivy, is a persistent threat group targeting defense, government, technology, and education sectors since 2007. They specialize in phishing attacks, including watering hole and spear-phishing, using personalized bait content. Recent observations show the group creating fake official websites for targeted phishing. When victims visit these sites, malicious payloads are automatically downloaded, which further load Sliver RAT for data theft and remote control. The attack process involves a C# loader that decrypts and loads shellcode, ultimately deploying the Sliver RAT. The malware uses PDF icons to deceive victims and employs strong obfuscation techniques. The final payload, Sliver, is an open-source, cross-platform C2 framework with multiple communication protocols and extensive functionality.
Analysis report on recent phishing attacks by APT-C-48 (CNC)
released on 2024-12-03 @ 04:30:07 PM
APT-C-48 (CNC), a South Asian government-backed APT group, has been targeting government, military, education, research, healthcare, and media sectors. They use spear-phishing emails with resume-related topics to deliver malicious payloads. The group modifies executable file icons to resemble PDF files and adds spaces to filenames to hide extensions. Upon execution, the malware downloads a decoy document and additional attack components. The sample employs anti-debugging and anti-VM techniques, self-deletion mechanisms, and establishes persistence through scheduled tasks. The attack pattern and tactics are consistent with previous APT-C-48 activities, particularly their focus on the education and research sectors.
TaxOff: You've Got a Backdoor...
released on 2024-12-03 @ 04:27:00 PM
A sophisticated threat group named TaxOff has been discovered targeting Russian government agencies. The group uses phishing emails with legal and financial themes to deliver the Trinper backdoor, a multithreaded C++ malware with advanced features. Trinper employs STL containers, custom serialization, and a buffer cache for improved performance. It can inject code, manipulate files, execute commands, and perform keylogging. The backdoor communicates with command and control servers using encrypted channels and domain fronting techniques. TaxOff's combination of convincing social engineering and a complex backdoor makes their attacks particularly dangerous and difficult to detect.
Ransomware Roundup - Interlock
released on 2024-12-03 @ 04:17:06 PM
The Interlock ransomware is a new variant targeting Microsoft Windows and FreeBSD systems. It encrypts files and demands ransom for decryption. The malware has both Windows and FreeBSD versions, using AES-CBC encryption and adding a '.interlock' extension to encrypted files. It excludes certain files and directories from encryption. The ransomware's data leak site lists victims primarily in the United States and Italy, affecting sectors such as education, finance, government, healthcare, and manufacturing. The infection vector is unknown, but a backdoor was found on a victim's machine. The ransomware's TOR site includes sections for home, about, data leak, and help. FortiGuard Labs provides detection and protection against Interlock through various security solutions.
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
released on 2024-12-03 @ 03:34:04 PM
Earth Estries, a Chinese APT group, has been aggressively targeting critical sectors globally since 2023. The group employs advanced techniques and multiple backdoors, including GHOSTSPIDER, SNAPPYBEE, and MASOL RAT, to compromise organizations in telecommunications, government, and other industries across various countries. Their sophisticated attacks exploit server vulnerabilities for initial access and use living-off-the-land binaries for lateral movement. Earth Estries has successfully infiltrated over 20 organizations, demonstrating a complex C&C infrastructure and possible shared tools with other Chinese APT groups. The group's operations involve long-term espionage activities, targeting not only critical services but also vendor networks to facilitate broader access.
NetSupport RAT and RMS in malicious emails
released on 2024-12-02 @ 05:08:08 PM
The Horns&Hooves campaign, active since March 2023, targets Russian businesses with malicious email attachments containing scripts that install NetSupport RAT or BurnsRAT. The campaign evolved through several versions, improving obfuscation and delivery methods. It uses decoy documents and legitimate-looking file names to trick users. The attackers, likely associated with the TA569 group, gain remote access to infected systems and potentially sell this access to other cybercriminals. The campaign has affected over a thousand users, primarily in Russia, and has been observed attempting to install additional malware like Rhadamanthys and Meduza stealers.
The RAT race: What happens when RATs go undetected
released on 2024-11-30 @ 06:27:32 AM
This analysis explores a sophisticated cyberattack attempt involving multiple Remote Access Tools (RATs) and a stealer. The attack chain begins with an email containing an exploit for CVE-2024-38213, bypassing Windows' Mark of the Web security feature. The malware uses WebDav directories and Cloudflare's free tunnel service to host and execute various RATs, including DcRAT, AsyncRAT, and XWorm, as well as the PureLog Stealer. The payloads are delivered through obfuscated batch files and compiled Python scripts, using memory-only execution techniques to evade detection. The attackers employ multiple C2 domains using the DuckDNS service, pointing to IP addresses in the U.S. The analysis highlights the importance of early threat detection in preventing potential ransomware deployment or data exfiltration.
Malicious PyPI crypto pay package aiocpa implants infostealer code
released on 2024-11-29 @ 10:48:20 AM
ReversingLabs detected a malicious package named 'aiocpa' on PyPI, engineered to compromise cryptocurrency wallets. Unlike typical attacks, the actors published their own crypto client tool to attract users before compromising them through a malicious update. The package appeared legitimate, with multiple versions and good documentation. Machine learning-based threat hunting revealed suspicious obfuscated code in versions 0.1.13 and 0.1.14, designed to exfiltrate sensitive crypto trading information. The incident highlights the growing sophistication of open-source software threats and the need for advanced security tools in development processes.
First UEFI bootkit malware for Linux discovered
released on 2024-11-27 @ 08:53:35 PM
A groundbreaking discovery has been made in the realm of cybersecurity: the first UEFI bootkit specifically targeting Linux systems. Named 'Bootkitty,' this proof-of-concept malware marks a significant evolution in stealthy and hard-to-remove bootkit threats. Although currently limited to certain Ubuntu versions and configurations, its existence raises concerns about potential future developments. Bootkitty bypasses kernel signature verification, preloads malicious components during system boot, and manipulates various security protocols. While not yet observed in real-world attacks, this discovery highlights the growing threat landscape for Linux systems and underscores the need for enhanced security measures in enterprise environments adopting Linux.
Attacks by APT-C-60 Group Exploiting Legitimate Services
released on 2024-11-27 @ 06:36:35 PM
The APT-C-60 group targeted organizations in Japan and East Asia with a sophisticated attack campaign. The attack begins with a phishing email containing a Google Drive link to download a VHDX file. This file includes an LNK file that executes a downloader, which then retrieves a backdoor called SpyGrace. The attackers use legitimate services like Bitbucket and StatCounter for command and control. The malware achieves persistence through COM hijacking and employs various techniques to evade detection. The campaign likely targeted multiple East Asian countries, using similar tactics across different attacks.
Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024
released on 2024-11-27 @ 06:31:49 PM
A spear-phishing campaign targeting Japan since June 2024 has been identified, featuring the reemergence of the ANEL backdoor, previously used by APT10 until 2018. The campaign, attributed to Earth Kasha, targets individuals in political organizations, research institutions, and international relations-related entities. The attack utilizes various infection methods, including macro-enabled documents and shortcut files. The malware suite includes ROAMINGMOUSE, ANELLDR, and updated versions of ANEL. Post-exploitation activities involve information gathering and, in some cases, deployment of the more advanced NOOPDOOR backdoor. This campaign marks a shift in Earth Kasha's tactics, moving from exploiting vulnerabilities in edge devices to targeting individuals through spear-phishing.
Matrix Unleashes A New Widespread DDoS Campaign
released on 2024-11-27 @ 06:19:27 PM
A new widespread Distributed Denial-of-Service (DDoS) campaign orchestrated by a threat actor named Matrix has been uncovered. The operation combines public scripts, brute-force attacks, and exploitation of weak credentials to create a botnet capable of global disruption. Matrix targets vulnerabilities and misconfigurations across internet-connected devices, particularly IoT and enterprise systems. The campaign demonstrates how accessible tools and minimal technical knowledge can enable large-scale cyberattacks. Despite showing Russian affiliation, the absence of Ukrainian targets suggests a focus on financial gain rather than political motives. The threat actor is actively targeting both development and production servers, marking an evolution in DDoS activities.
Credit Card Skimmer Malware Targeting Magento Checkout Pages
released on 2024-11-27 @ 04:16:20 PM
A sophisticated credit card skimmer malware has been discovered targeting Magento-powered eCommerce websites, specifically their checkout processes. The malware dynamically creates a fake credit card form or extracts payment fields, activating only on checkout pages. It uses advanced obfuscation techniques to avoid detection and is present in both filesystem and database. The stolen data, including credit card information and customer details, is encrypted and exfiltrated to remote servers using a beaconing technique. The infection was initially detected through routine inspection, revealing malicious scripts loaded from blacklisted domains. The malware's sophisticated approach and encryption mechanisms make it challenging to detect, emphasizing the need for regular security audits and robust protective measures for eCommerce platforms.
Financially Motivated Threat Actor Leveraged Google Docs and Weebly Services
released on 2024-11-27 @ 03:14:19 PM
A phishing campaign targeting telecommunications and financial sectors was identified in late October 2024. The attackers used Google Docs to deliver phishing links, redirecting victims to fake login pages hosted on Weebly. This method bypassed standard email filters and endpoint protections by leveraging trusted platforms. The campaign primarily targeted telecom and financial sectors with customized lures, including AT&T-themed pages and financial institution pages for US and Canadian users. The attackers used dynamic DNS for subdomain rotation and incorporated legitimate tracking tools like Sentry.io and Datadog to monitor phishing page metrics. They also employed fake multi-factor authentication prompts to enhance the appearance of authenticity and increase the chances of success.
Gaming Engines: An Undetected Playground for Malware Loaders
released on 2024-11-27 @ 03:11:33 PM
Check Point Research uncovered a new technique exploiting the Godot Engine to execute malicious GDScript code, remaining undetected by most antivirus tools. The technique has been used since June 2024, potentially infecting over 17,000 machines. A loader called GodLoader employs this method and is distributed via the Stargazers Ghost Network on GitHub. The technique allows cross-platform targeting of Windows, macOS, Linux, Android, and iOS devices. Researchers demonstrated successful payload drops on Linux and MacOS. This approach could potentially target over 1.2 million users of Godot-developed games through malicious mods or downloadable content.
Analyzing the first UEFI bootkit for Linux
released on 2024-11-27 @ 03:11:33 PM
ESET researchers have discovered Bootkitty, the first UEFI bootkit designed for Linux systems. This proof-of-concept malware targets specific Ubuntu versions and aims to disable kernel signature verification while preloading unknown ELF binaries. Bootkitty is signed with a self-signed certificate, limiting its effectiveness to systems without UEFI Secure Boot enabled. The bootkit patches GRUB and the Linux kernel to bypass security measures and load potentially malicious modules. Additionally, a related kernel module named BCDropper was identified, which deploys an ELF program responsible for loading another kernel module. This discovery highlights the evolving threat landscape for UEFI-based systems beyond Windows.
Firefox and Tor Browser zero-days exploited to target attacks in Europe and North America
released on 2024-11-27 @ 03:11:32 PM
The Russian cybercrime group RomCom exploited two zero-day vulnerabilities in Firefox and Tor Browser to conduct attacks on users across Europe and North America. The first vulnerability (CVE-2024-9680) is a use-after-free issue in Firefox's Animation Timelines feature that could allow code execution. The second (CVE-2024-49039) is a Windows Task Scheduler privilege escalation flaw. RomCom chained these vulnerabilities to compromise systems without user interaction by tricking victims into visiting malicious websites. The attacks occurred between October 10-16, 2024 and targeted up to 250 victims per country. RomCom used the exploits to deliver their custom backdoor malware.
PSLoramyra: Technical Analysis of Fileless Malware Loader
released on 2024-11-27 @ 03:11:32 PM
This analysis examines PSLoramyra, an advanced fileless malware loader that utilizes PowerShell, VBS, and BAT scripts to inject and execute malicious payloads directly in memory. The infection chain begins with an initial PowerShell script that generates three critical files: roox.ps1, roox.bat, and roox.vbs. The loader establishes persistence through Windows Task Scheduler, running roox.vbs every two minutes. PSLoramyra employs stealthy execution techniques, including hidden windows and bypassing execution policies. The main payload is deobfuscated, loaded into memory using .NET Reflection, and executed via RegSvcs.exe. This sophisticated approach allows PSLoramyra to evade traditional detection methods, making it a significant threat.
RomCom exploits Firefox and Windows zero days in the wild
released on 2024-11-27 @ 03:10:44 PM
ESET researchers discovered a critical zero-day vulnerability in Mozilla products, exploited by the Russia-aligned group RomCom. The vulnerability, CVE-2024-9680, allows code execution in Firefox, Thunderbird, and Tor Browser. When chained with another Windows vulnerability, CVE-2024-49039, it enables arbitrary code execution without user interaction. The exploit chain delivered RomCom's backdoor in a widespread campaign targeting Europe and North America. Mozilla quickly patched the vulnerability within a day of notification. The Windows vulnerability, a privilege escalation bug in the Task Scheduler, was later patched by Microsoft. This sophisticated attack demonstrates RomCom's capabilities in developing or obtaining stealthy exploitation techniques.
Unveiling the Past and Present of APT-K-47 Weapon: Asyncshell
released on 2024-11-26 @ 09:42:12 PM
The intelligence report details the discovery and analysis of an attack campaign by the APT-K-47 organization, also known as Mysterious Elephant. The attackers used a CHM file to execute a malicious payload, which is an upgraded version of their Asyncshell tool. The new version, dubbed Asyncshell-v4, features base64 variant algorithm for string hiding, disguised C2 requests, and reduced log messages. The report traces the evolution of Asyncshell through four versions, from its first discovery in January 2024 to the latest capture. The tool has been used in attacks targeting various countries, including Pakistan, Bangladesh, and Turkey, often using decoy documents related to government and religious topics.
The Evolution of a Cyber Threat: From JinxLoader to Astolfo Loader
released on 2024-11-26 @ 09:34:38 PM
JinxLoader, a Go-based malware loader distributed via phishing emails, has evolved into Astolfo Loader. Originally sold on Hack Forums, JinxLoader was designed to deploy additional malware on Windows and Linux systems. The malware operates as a Malware-as-a-Service, making sophisticated tools accessible to a broader range of cybercriminals. Astolfo Loader, a rebranded version written in C++, offers improved performance and smaller file size. Both loaders employ anti-analysis techniques and geolocation checks before connecting to command-and-control servers. This evolution demonstrates the rapid spread and adaptation of malware variants in the cybercriminal ecosystem.
RobotDropper Automates the Delivery of Multiple Infostealers
released on 2024-11-26 @ 09:24:55 PM
A phishing campaign is distributing Trojanized MSI files that use DLL sideloading to execute LegionLoader, a malicious program that delivers multiple infostealers. The campaign is widespread, with over 400 unique malicious MSI files identified since June 2024. Victims are targeted globally through links from .monster domains forwarded to cloud providers. The attack chain involves downloading a ZIP file containing a malicious MSI, which retrieves a password from a C2 server to unpack a RAR file and extract a malicious DLL. LegionLoader then downloads various infostealers and communicates with multiple domains. The infrastructure heavily utilizes Cloudflare, making tracing difficult. Mitigation involves sourcing software from legitimate sources, keeping systems updated, and using reputable antivirus software.
Know Thy Enemy: A Novel November Case on Persistent Remote Access
released on 2024-11-26 @ 09:13:44 PM
In early November 2024, a threat actor gained initial access to a network via brute-forcing a public-facing RD-Web instance. Using PsExec, they executed batch files across multiple machines to enable RDP connections and install a malicious MeshAgent. The actor renamed the MeshAgent to mimic a virtualization binary and disguised its server as a Windows Network Virtual Adapter. The attack involved lateral movement, privilege escalation, and credential access through WDigest manipulation. The threat actor's consistent tradecraft was observed in multiple environments, highlighting the importance of continuous threat hunting and feedback loops in security investigations. Lessons learned include hardening external perimeters, enforcing MFA, and deploying software allow-lists.
An NPM and PyPI Malicious Campaign Targeting Windows Users
released on 2024-11-26 @ 09:06:40 PM
Datadog Security Research has uncovered an ongoing supply chain attack targeting both npm and PyPi package repositories, tracked as MUT-8694. This campaign uses malicious packages to deliver infostealer malware to Windows users, leveraging legitimate services like GitHub and repl.it for payload hosting. The threat actor employs typosquatting and targets developers, particularly those working with Roblox. Two main malware types are deployed: Blank Grabber and Skuld Stealer, both open-source projects with capabilities to steal credentials, crypto wallets, and other sensitive information. The campaign demonstrates sophistication in its multi-ecosystem approach and persistence, highlighting the growing risk to open-source package repositories.
Threat Campaign Targeting Palo Alto Networks Firewall Devices Observed
released on 2024-11-25 @ 04:01:43 PM
Arctic Wolf has identified multiple intrusions across various industries involving Palo Alto Network firewall devices. The attacks likely exploit recently disclosed PAN-OS vulnerabilities CVE-2024-0012 and CVE-2024-9474 for initial access. Affected devices downloaded payloads including the Sliver C2 framework and coinminer binaries. Threat actors injected malicious commands into firewall login attempts, deployed PHP webshells, exfiltrated sensitive configuration files and credentials, and in some cases installed XMRig cryptocurrency miners. The campaign demonstrates rapid exploitation of newly disclosed vulnerabilities in perimeter devices. Defenders are advised to implement robust external monitoring, restrict management interfaces, and patch vulnerable systems promptly.
HEXON STEALER: THE LONG JOURNEY OF COPYING, HIDING, AND REBRANDING
released on 2024-11-23 @ 02:03:20 PM
Hexon Stealer, a malware capable of extracting sensitive information from browsers, has emerged as a rebranded version of Stealit Stealer. It utilizes the Electron framework and NSIS installer format to target browser cookies, credentials, and crypto-wallets. The malware grants full remote access to compromised systems, allowing attackers to monitor screens, control inputs, and engage in ransom negotiations. Hexon Stealer's key capabilities include Discord injection, game account access, cryptocurrency theft, and various remote control features. The developer, likely Turkish, promotes the stealer through Telegram and Signal channels, offering subscription plans. The malware's code is heavily obfuscated to evade detection, and it employs sophisticated techniques to exfiltrate stolen data.
Unveiling WolfsBane: Linux counterpart to Gelsevirine
released on 2024-11-22 @ 04:49:57 AM
ESET researchers have discovered previously unknown Linux backdoors attributed to the China-aligned Gelsemium APT group. The main backdoor, named WolfsBane, is the Linux equivalent of Gelsemium's Gelsevirine backdoor for Windows. Another backdoor, FireWood, is connected to the group's Project Wood malware. These tools are designed for cyberespionage, targeting system information, credentials, and specific files. The malware uses sophisticated techniques for persistence, stealth, and command execution. This discovery marks Gelsemium's first known use of Linux malware, indicating a shift in APT tactics towards exploiting vulnerabilities in internet-facing Linux systems.
Differential analysis raises red flags over @lottiefiles/lottie-player
released on 2024-11-22 @ 04:49:57 AM
ReversingLabs researchers discovered malicious versions of the popular npm package @lottiefiles/lottie-player. Versions 2.0.5, 2.0.6, and 2.0.7 were compromised and used to spread malicious code designed to steal crypto wallet assets. The attackers altered the lottie-player.js file, replacing its code with their own. Differential analysis revealed significant changes in package size and behaviors, including the introduction of URLs related to Bitcoin exchange services. The compromise was quickly detected, and LottieFiles maintainers worked with npm to remove the malicious versions. This incident highlights the importance of secure development practices, such as pinning dependencies to specific versions and regularly conducting security assessments to verify the integrity of open-source libraries.
Marketplace for stolen credit cards disrupted by feds
released on 2024-11-22 @ 04:49:55 AM
Federal authorities have shut down PopeyeTools, an illicit online marketplace operating since 2016, which sold stolen credit card data and cybercrime tools. Three alleged administrators from Pakistan and Afghanistan face criminal charges. The platform offered credit card numbers, bank account information, and identity theft tools, with some card details selling for as low as $30. The site also provided refunds for invalid data and tools to verify stolen information. Authorities seized related domains and cryptocurrency assets, uncovering personal information of at least 227,000 individuals and estimating the administrators' earnings at $1.7 million. This action is part of a broader crackdown on cybercrime, including recent arrests related to ransomware and casino attacks.
Threat Assessment: Distributors of BlackSuit Ransomware
released on 2024-11-20 @ 10:03:12 PM
Ignoble Scorpius, previously known as Royal ransomware, has rebranded as BlackSuit ransomware and increased its activity since March 2024. The group has targeted at least 93 victims globally, with a focus on the construction and manufacturing industries. Their initial ransom demands average 1.6% of the victim's annual revenue. The group uses various initial access methods, including phishing, SEO poisoning, and supply chain attacks. They employ tools like Mimikatz, Cobalt Strike, and Rclone for credential theft, lateral movement, and data exfiltration. The ransomware has both Windows and Linux variants, with specific functionality to target VMware ESXi servers in some Linux versions. The group's sophisticated tactics and potential ties to former Conti and Royal ransomware members make them a significant threat.
Threat Actors Hijack Misconfigured Servers for Live Sports Streaming
released on 2024-11-19 @ 09:59:07 PM
Aqua Nautilus researchers uncovered a new attack vector where threat actors exploit misconfigured JupyterLab and Jupyter Notebook applications to hijack servers for streaming sports events. The attackers gain unauthenticated access, install ffmpeg, and use it to capture live streams, redirecting them to illegal servers. This activity, while seemingly minor, poses significant risks including data manipulation, theft, and potential financial damage. The researchers used Aqua Tracee and TraceeShark tools to analyze the attack, revealing the process of server compromise and stream ripping. The campaign primarily targeted Qatari beIN Sports network broadcasts, with evidence suggesting the attackers may be of Arab-speaking origin. The attack demonstrates the importance of securing data science environments and highlights the growing threat of illegal sports streaming to the entertainment industry.
Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
released on 2024-11-19 @ 09:59:06 PM
FrostyGoop, an operational technology (OT) malware, disrupted critical infrastructure in Ukraine in early 2024, affecting heating systems for over 600 apartment buildings. It is the first OT-centric malware to use Modbus TCP communications for such an impact. The malware can operate both within compromised networks and externally if devices are internet-accessible. It sends Modbus commands to read or modify data on industrial control systems. New samples and indicators were uncovered, including configuration files and libraries. The malware is compiled using Go and leverages specific open-source libraries. It implements debugger evasion techniques and can encrypt configuration files. Analysis revealed over 1 million Modbus TCP devices exposed to the internet, highlighting the increasing threat to critical infrastructure.
Raspberry Robin Analysis
released on 2024-11-19 @ 09:59:06 PM
Raspberry Robin, a malicious downloader discovered in 2021, has been circulating for years, primarily spreading through infected USB devices. It stands out due to its unique binary-obfuscation techniques, extensive use of anti-analysis methods, and privilege escalation exploits. The malware uses multiple code layers, each employing various obfuscation techniques. It communicates with command-and-control servers via the TOR network and can propagate through networks. Raspberry Robin employs numerous anti-analysis and evasion methods, including CPU performance checks, Windows API manipulations, and registry modifications. It uses UAC-bypass methods and local privilege escalation exploits to elevate privileges. The malware's primary goal is to download and execute payloads on compromised hosts, collecting extensive system information before requesting the payload.
One Sock Fits All: The use and abuse of the NSOCKS botnet
released on 2024-11-19 @ 09:59:04 PM
The ngioweb botnet serves as the foundation for the NSOCKS criminal proxy service, maintaining over 35,000 bots daily across 180 countries. The botnet primarily targets SOHO routers and IoT devices, with two-thirds of proxies based in the U.S. NSOCKS utilizes over 180 'backconnect' C2 nodes to obscure users' identities. The infrastructure enables various threat actors to create their own services and launch DDoS attacks. The botnet employs multiple exploits, targeting vulnerable devices and evading common security solutions. NSOCKS is notorious among criminal forums and has been used by groups like Muddled Libra. The service allows users to purchase proxies with cryptocurrency, offering features such as domain filtering for targeted use. The open nature of NSOCKS has led to its abuse by other actors, including DDoS attackers and other proxy services like Shopsocks5 and VN5Socks.
BabbleLoader
released on 2024-11-19 @ 09:46:14 AM
BabbleLoader is a highly evasive malware loader designed to bypass antivirus and sandbox environments to deliver stealers into memory. It employs sophisticated techniques such as junk code insertion, metamorphic transformations, dynamic API resolution, and anti-sandboxing measures. The loader's features include altering its structure to evade detection, resolving necessary functions at runtime, and embedding encrypted malicious code in memory. It targets both English and Russian-speaking individuals through various lure themes, including cracked software and business-related applications. The loader's complexity poses significant challenges for both traditional and AI-based detection systems, making it a versatile tool for cybercriminals.
Spot the Difference: New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella
released on 2024-11-19 @ 09:19:40 AM
Earth Kasha, a threat group targeting Japan since 2019, has launched a new campaign with significant updates to their tactics and arsenals. The group has expanded its targets to include Taiwan and India, focusing on advanced technology organizations and government agencies. They now exploit public-facing applications like SSL-VPN and file storage services for initial access, using vulnerabilities in products such as Array AG, Proself, and FortiOS/FortiProxy. Earth Kasha deploys multiple backdoors including Cobalt Strike, LODEINFO, and the newly discovered NOOPDOOR. Their post-exploitation activities involve information theft, credential acquisition, and lateral movement. The group utilizes custom malware like MirrorStealer for credential dumping and employs sophisticated techniques to evade detection. While similarities exist with other China-nexus actors, Earth Kasha maintains distinct characteristics in its operations.
Chinese hackers exploit Fortinet VPN zero-day to steal credentials
released on 2024-11-18 @ 11:40:40 PM
Chinese threat actors, known as BrazenBamboo, are exploiting a zero-day vulnerability in Fortinet's FortiClient Windows VPN client to steal credentials. The hackers use a custom post-exploitation toolkit called DeepData, which includes a FortiClient plugin to extract usernames, passwords, and VPN server information from the process memory. Volexity researchers discovered the flaw in July 2024 and reported it to Fortinet, but it remains unresolved. The vulnerability allows attackers to dump credentials from memory after user authentication. BrazenBamboo is known for deploying advanced malware targeting multiple platforms in surveillance operations. By compromising VPN accounts, they can gain initial access to corporate networks and expand espionage campaigns.
November 18 Advisory: Active Exploitation of Critical RCE in Palo Alto Networks PAN-OS [CVE-2024-0012 and CVE-2024-9474]
released on 2024-11-18 @ 07:19:18 PM
Two critical vulnerabilities in Palo Alto Networks PAN-OS, CVE-2024-0012 and CVE-2024-9474, have been disclosed. CVE-2024-0012 is an authentication bypass allowing unauthenticated remote attackers to gain admin privileges, while CVE-2024-9474 is an authenticated privilege escalation bug. These can be chained for full system compromise. Active exploitation has been observed for CVE-2024-0012. Affected versions include PAN-OS 10.2, 11.0, 11.1, and 11.2. Patches are available, and organizations are urged to update immediately. Censys identified 13,324 publicly exposed NGFW management interfaces, with 34% in the US. Limiting public exposure and upgrading to PAN-OS 10.2 or later is recommended.
Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012
released on 2024-11-18 @ 07:19:17 PM
A critical authentication bypass vulnerability (CVE-2024-0012) in Palo Alto Networks PAN-OS software allows unauthenticated attackers to gain administrator privileges on affected devices. The issue affects PAN-OS versions 10.2, 11.0, 11.1, and 11.2, but not Cloud NGFW or Prisma Access. Limited exploitation attempts have been observed, primarily from anonymous VPN services. Post-exploitation activities include command execution and webshell deployment. Palo Alto Networks is actively monitoring the situation, dubbed Operation Lunar Peek, and has released patches. Customers are urged to update their systems and restrict management interface access to trusted internal IP addresses to mitigate the risk.
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
released on 2024-11-18 @ 02:21:41 PM
The ClickFix social engineering technique, which tricks users into copying and running malicious PowerShell commands, has become increasingly prevalent across the threat landscape. Initially observed in campaigns by TA571 and ClearFake, it is now used by multiple threat actors to deliver various malware types. The technique often employs fake error messages or CAPTCHA checks to deceive users. Recent examples include GitHub notification impersonations delivering Lumma Stealer, Swiss-targeted campaigns distributing AsyncRAT, fake software updates deploying NetSupport RAT, and ChatGPT-themed malvertising delivering XWorm. The technique's popularity stems from its effectiveness in bypassing security measures by exploiting users' desire to resolve issues independently.
Inside Water Barghest's Rapid Exploit-to-Market Strategy for IoT Devices
released on 2024-11-18 @ 02:21:40 PM
Water Barghest, a cybercriminal group, has developed a highly automated system for exploiting and monetizing IoT devices. Their botnet, comprising over 20,000 devices as of October 2024, uses automated scripts to identify and compromise vulnerable IoT devices from public internet scan databases. Once compromised, the Ngioweb malware is deployed, running in memory and connecting to command-and-control servers. The entire process, from initial infection to listing the device on a residential proxy marketplace, can take as little as 10 minutes. Water Barghest targets various IoT devices from brands like Cisco, DrayTek, and Zyxel, using both n-day vulnerabilities and at least one zero-day exploit. Their sophisticated operation has allowed them to maintain a low profile while generating steady income through their cybercriminal activities.
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
released on 2024-11-18 @ 12:47:51 PM
Proofpoint researchers have identified a surge in the ClickFix social engineering technique across the threat landscape. This technique uses dialogue boxes with fake error messages to trick users into copying, pasting, and running malicious content on their computers. Multiple threat actors are employing ClickFix through compromised websites, documents, HTML attachments, and malicious URLs. Recent campaigns have included GitHub security vulnerability notifications, Swiss e-commerce marketplace impersonations, fake software updates, and ChatGPT-themed malvertising. The technique has been observed delivering various malware, including AsyncRAT, Danabot, DarkGate, Lumma Stealer, and NetSupport. The popularity of ClickFix is attributed to its effectiveness in bypassing security protections by exploiting users' desire to be helpful and independent.
Mind the (air) gap: GoldenJackal gooses government guardrails
released on 2024-11-17 @ 12:25:36 AM
ESET researchers uncovered two distinct toolsets used by the GoldenJackal APT group to breach air-gapped systems in government organizations. The first toolset, observed in 2019, included GoldenDealer for delivering executables via USB drives, GoldenHowl as a modular backdoor, and GoldenRobo for file collection and exfiltration. The second toolset, deployed from 2022 to 2024, featured a highly modular approach with components for file collection, distribution, and exfiltration. GoldenJackal primarily targeted government and diplomatic entities in Europe, the Middle East, and South Asia, demonstrating sophisticated capabilities to compromise isolated networks. The group's evolution in developing two separate air-gap breaching toolsets within five years highlights their advanced threat level and awareness of network segmentation practices employed by their targets.
Telekopye transitions to targeting tourists via hotel booking scam
released on 2024-11-17 @ 12:25:35 AM
ESET researchers have discovered that Telekopye, a Telegram-based toolkit used by cybercriminals to scam people on online marketplaces, has expanded its operations to target users of popular accommodation booking platforms like Booking.com and Airbnb. The scammers, referred to as Neanderthals, now utilize compromised accounts of legitimate hotels to contact potential victims with fake payment issues. This new scam scenario provides personalized, legitimate-looking information, making it harder to detect. The scammers have also implemented advanced features such as automated phishing page generation, interactive chatbots with translation capabilities, and anti-DDoS measures. Recent law enforcement operations have shed light on the groups' recruitment practices, revealing a dark side to their operations.
Life on a crooked RedLine: Analyzing the infamous infostealer's backend
released on 2024-11-17 @ 12:25:33 AM
This article provides an in-depth analysis of RedLine Stealer, a notorious information-stealing malware. The research focuses on previously undocumented backend modules and the control panel used by affiliates. Key findings include the identification of over 1,000 unique IP addresses hosting RedLine panels, the use of Windows Communication Framework for component communication, and the shared origin of RedLine and META Stealer. The analysis covers authentication processes, sample creation mechanisms, and network infrastructure details. The researchers also highlight security vulnerabilities in the backend, such as storing passwords in cleartext. The article concludes by discussing the takedown of RedLine and META Stealer in Operation Magnus, emphasizing the widespread nature of these threats despite being orchestrated by a small group of actors.
Fake AI video generators infect Windows, macOS with infostealers
released on 2024-11-16 @ 09:56:24 PM
Threat actors are using fake AI image and video generators to distribute Lumma Stealer and AMOS information-stealing malware on Windows and macOS. These malicious programs masquerade as an AI application called EditProAI, targeting users through search results and social media advertisements. The malware steals credentials, passwords, credit card information, and cryptocurrency wallets from popular web browsers. Victims are lured by deepfake political videos and professional-looking websites. The Windows variant uses a stolen code signing certificate to appear legitimate. Users who have downloaded this malware should consider their saved passwords and authentication compromised, reset them immediately, and enable multi-factor authentication on sensitive accounts.
Weaponizing FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
released on 2024-11-16 @ 03:01:06 PM
A Chinese state-affiliated threat actor, BrazenBamboo, has exploited a zero-day vulnerability in Fortinet's Windows VPN client to steal user credentials. The vulnerability allows extraction of login information from the FortiClient process memory. BrazenBamboo uses two malware families: DEEPDATA, a modular post-exploitation tool for Windows, and LIGHTSPY, a multi-platform malware. DEEPDATA includes plugins for stealing credentials, collecting data from chat apps, and recording audio. The threat actor's infrastructure hosts various applications, including an email theft platform and a big data analysis platform for stolen data. Evidence suggests BrazenBamboo may be a private enterprise producing capabilities for governmental operators focused on domestic targets.
Glove Stealer bypasses Chrome's App-Bound Encryption to steal cookies
released on 2024-11-16 @ 03:18:23 AM
Researchers have discovered a new .NET-based information stealer called Glove Stealer that targets browser extensions and local software to steal sensitive data like cookies, passwords, and cryptocurrency wallets. It uses a novel technique to bypass Chrome's App-Bound encryption by exploiting the IElevator service. The malware is distributed through phishing campaigns and requires administrative privileges to place its module in Chrome's Program Files directory. Once executed, it contacts a command-and-control server to exfiltrate harvested data.
Attack On Maritime & Defense Manufacturing
released on 2024-11-15 @ 06:35:55 PM
The DONOT APT group has launched a campaign targeting Pakistan's manufacturing industry supporting maritime and defense sectors. The attack uses a malicious LNK file disguised as an RTF, which executes PowerShell commands to deliver a lure document and stager malware. The malware establishes persistence through scheduled tasks, communicates with command and control servers using encrypted methods, and can download additional payloads. The campaign shows evolution in tactics, including improved encryption and payload delivery methods. The attackers collect detailed system information from victims and can self-delete if instructed. This operation demonstrates the increasing sophistication of APT campaigns and the need for enhanced cybersecurity measures.
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
released on 2024-11-15 @ 02:51:59 AM
Unit 42 researchers identified a North Korean IT worker activity cluster, CL-STA-0237, involved in phishing attacks using malware-infected video conference apps. The cluster likely operates from Laos and exploited a U.S.-based SMB IT services company to apply for other jobs, securing a position at a major tech company in 2022. This cluster is part of a broader network of North Korean IT workers supporting illicit activities. The article highlights the shift from stable income-seeking to aggressive malware campaigns and illustrates the global reach of these workers. Organizations are advised to strengthen hiring processes, implement robust monitoring, evaluate outsourced services, and ensure employees don't use corporate machines for personal activities.
Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
released on 2024-11-14 @ 07:47:34 PM
A Chinese financially motivated threat actor, dubbed SilkSpecter, has been uncovered targeting e-commerce shoppers in Europe and USA with a phishing campaign leveraging Black Friday discounts. The actor uses fake discounted products as lures to steal Cardholder Data, Sensitive Authentication Data, and Personally Identifiable Information. SilkSpecter exploits the legitimate payment processor Stripe to complete genuine transactions while covertly exfiltrating sensitive data. The phishing sites use Google Translate to dynamically adjust the language based on the victim's IP location. The campaign is linked to a Chinese SaaS platform, oemapps, which enables the creation of convincing fake e-commerce sites. The phishing domains primarily use .top, .shop, .store, and .vip TLDs, often typosquatting legitimate e-commerce organizations.
Malware Spotlight: A Deep-Dive Analysis of WezRat
released on 2024-11-14 @ 07:13:40 PM
Check Point Research provides a comprehensive analysis of WezRat, a custom modular infostealer attributed to the Iranian cyber group Emennet Pasargad. The malware has been active for over a year, targeting organizations in multiple countries. WezRat's capabilities include executing commands, taking screenshots, uploading files, keylogging, and stealing clipboard content and cookie files. The analysis reveals the malware's evolution, its modular architecture, and the threat actors' infrastructure. The latest version was distributed through a phishing campaign impersonating the Israeli National Cyber Directorate, demonstrating the group's ongoing development and refinement of this versatile cyber espionage tool.
The State of Cloud Ransomware in 2024
released on 2024-11-14 @ 11:57:49 AM
Cloud ransomware attacks are evolving, primarily targeting storage services like Amazon S3 and Azure Blob Storage. Attackers exploit misconfigurations or use stolen credentials to access and encrypt data. Cloud service providers have implemented security measures, such as AWS's 7-day key deletion window, to mitigate risks. New techniques using customer-managed keys pose challenges for data recovery. Ransomware groups are also leveraging cloud services for data exfiltration. Web applications hosted in the cloud are vulnerable to extortion attacks, with tools like Pandora targeting PHP servers. Organizations are advised to use Cloud Security Posture Management solutions and enforce strong identity management practices to protect against these emerging threats.
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails
released on 2024-11-14 @ 11:57:45 AM
A newly discovered vulnerability in Windows NT LAN Manager (NTLM) has been exploited by suspected Russian hackers in cyber attacks against Ukraine. The flaw, identified as CVE-2024-43451, allows attackers to steal NTLMv2 hashes through minimal user interaction with malicious files. The exploit chain involves phishing emails containing links to compromised Ukrainian government websites, leading to the download of a ZIP archive with a malicious URL file. When interacted with, this file triggers the vulnerability and downloads additional payloads, including the Spark RAT malware. The attack also enables pass-the-hash attacks for unauthorized user authentication. Ukrainian CERT has attributed this activity to a threat actor known as UAC-0194.
PHP Reinfector and Backdoor Malware Target WordPress Sites
released on 2024-11-14 @ 03:18:24 AM
A sophisticated PHP reinfector and backdoor malware is targeting WordPress websites, infecting plugin files and database tables. The malware reinfects active plugins, manipulates wp_options and wp_posts tables, and creates malicious admin users. It utilizes WordPress's cron system to maintain control and injects third-party scripts for VexTrio scam redirects. The infection mechanism goes beyond the WPCode plugin, affecting sites without it installed. The malware employs various techniques to evade detection, including function obfuscation and deactivating security plugins. It also includes a backdoor for remote code execution. This persistent threat emphasizes the need for regular site monitoring, updates, and professional security measures to prevent and address infections effectively.
HawkEye Malware: Technical Analysis
released on 2024-11-13 @ 06:34:33 PM
HawkEye, also known as PredatorPain, is a long-lived keylogger malware that has evolved to include stealer capabilities. Originating before 2010, it gained popularity in 2013 through spearphishing campaigns. The malware is typically delivered via phishing emails or compromised websites, and utilizes a multi-stage infection process involving file dropping, code injection, and persistence mechanisms. HawkEye's functionality includes keylogging, system information gathering, credential theft, wallet theft, screenshot capture, and security software detection. It can exfiltrate data through various methods and has been used by diverse threat actors, from criminal groups to script kiddies. The malware's versatility and ease of use have contributed to its continued prevalence in cybersecurity incidents.
New threat targeting macOS discovered
released on 2024-11-13 @ 12:24:34 PM
Jamf Threat Labs uncovered malware samples linked to North Korea, built using Flutter, which provides inherent obfuscation. The malware, discovered in late October, includes Go, Python, and Flutter variants. The Flutter-built application presents a minesweeper game while making network requests to a known DPRK-associated domain. The malware executes AppleScript code received from the server. Similar functionality was observed in Go and Python variants. The attackers may be testing new weaponization techniques, potentially attempting to bypass Apple's notarization process and antivirus detection. This marks the first instance of this actor using Flutter to target macOS devices.
How to Improve Cyber Threat Investigations with TI Lookup
released on 2024-11-13 @ 10:59:43 AM
This article discusses the use of Threat Intelligence (TI) Lookup, a centralized service for threat data exploration and analysis. It highlights key features such as fast search results, extensive search parameters, and access to a large database of malware and phishing samples. The article explains how TI Lookup sources data from public submissions and provides several use cases, including checking suspicious IP addresses, identifying malware families using mutexes, uncovering threats using file paths, connecting unrelated data points, and collecting fresh samples with YARA rules. The tool's ability to provide quick results and offer a wide range of search options makes it valuable for cybersecurity professionals.
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
released on 2024-11-13 @ 04:45:31 AM
A Chinese state-sponsored threat group, TAG-112, has compromised two Tibetan websites to deliver Cobalt Strike malware. The attackers embedded malicious JavaScript in the sites, spoofing a TLS certificate error to trick visitors into downloading a disguised security certificate. This campaign highlights ongoing cyber-espionage efforts targeting Tibetan entities. TAG-112's infrastructure, hidden using Cloudflare, links this operation to other China-sponsored activities, particularly TAG-102 (Evasive Panda). The group exploited vulnerabilities in the Joomla content management system to implant the malicious code. This attack demonstrates the continued focus of Chinese cyber operations on ethnic and religious minority groups, emphasizing the need for proactive cybersecurity measures.
Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity
released on 2024-11-12 @ 08:31:22 PM
Check Point Research has been tracking ongoing activity of the WIRTE threat actor, associated with Hamas, despite the ongoing conflict in the region. The group continues to target entities in the Palestinian Authority, Jordan, Iraq, Egypt, and Saudi Arabia for espionage. WIRTE has expanded its operations to include disruptive attacks, with clear links found between their custom malware and the SameCoin wiper targeting Israeli entities. The group's tools have evolved, but key operational aspects remain consistent. WIRTE's activities persist throughout the war, complicating geographical attribution. The group employs various tactics, including custom loaders, phishing, and wipers, targeting both Israeli and other Middle Eastern entities.
Dissecting A Multi-Stage PowerShell Campaign Using Chisel
released on 2024-11-12 @ 12:30:08 PM
A sophisticated multi-stage PowerShell campaign has been identified, utilizing an LNK file to initiate a sequence of obfuscated scripts. The attack maintains persistence and stealth by connecting with a command-and-control server. It employs Chisel, a fast TCP/UDP tunneling tool, and a Netskope proxy for covert communication, enabling lateral movement within compromised networks. The campaign involves three stages of PowerShell scripts, each with specific functions to establish persistence, communicate with the C&C server, and execute received commands. The presence of a Chisel DLL suggests advanced threat actor tactics aimed at prolonged control and evasion, indicating a highly organized or financially motivated operation.
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave
released on 2024-11-12 @ 08:47:27 AM
The Androxgh0st botnet, active since January 2024, has evolved to incorporate Mozi botnet payloads, expanding its attack surface from web servers to IoT devices. It exploits vulnerabilities in various platforms, including Cisco ASA, Atlassian JIRA, and PHP frameworks, utilizing remote code execution and credential theft techniques. The botnet targets unpatched systems, employing tactics like command injection and brute-force attacks to maintain persistent access. With over 500 infected devices globally, Androxgh0st poses a significant threat to critical infrastructure. The integration of Mozi's capabilities suggests a possible merger of the two botnets, potentially under the same cybercriminal group, enhancing their combined effectiveness and reach.
New Ymir ransomware discovered used together with RustyStealer | Securelist
released on 2024-11-11 @ 11:13:37 AM
A new ransomware called Ymir was discovered during an incident response case. It uses memory operations to evade detection and employs the ChaCha20 cipher for encryption. The attackers gained initial access via PowerShell commands and installed tools like Process Hacker before deploying Ymir. The ransomware encrypts files, appends the .6C5oy2dVr6 extension, and drops PDF ransom notes. It uses PowerShell to self-delete after execution. A test variant was also identified. The attack was preceded by infections with RustyStealer malware and SystemBC scripts used for data exfiltration. The incident highlights the connection between initial access brokers and ransomware groups.
Hello again, FakeBat: popular loader returns after months-long hiatus
released on 2024-11-11 @ 09:50:19 AM
FakeBat, a loader previously known as Eugenloader and PaykLoader, has resurfaced after a three-month absence. The malware was distributed through a malicious Google ad impersonating the productivity application Notion. The attack chain involves a tracking template, cloaking domain, and a decoy site. FakeBat's payload is the LummaC2 stealer, which is injected into MSBuild.exe via process hollowing. The loader uses obfuscation techniques and the RastaMouse AMSI bypass script. This incident highlights the ongoing threat of malvertising and brand impersonation in Google ads, demonstrating how threat actors can quickly revert to proven methods of malware distribution.
Scammers target UK senior citizens with Winter Fuel Payment texts
released on 2024-11-09 @ 11:59:23 PM
Opportunistic scammers are exploiting the UK's recent changes to the Winter Fuel Payments program by targeting senior British residents with fraudulent text messages. These messages claim to offer 'winter heating allowance' and 'cost of living support', directing recipients to deceptive websites that mimic official GOV.UK pages. The phishing sites aim to collect personal and financial information from unsuspecting victims. The scam is particularly concerning given the government's controversial decision to reduce winter fuel payments for millions of pensioners. The fraudulent campaign is designed to work primarily on mobile devices, presenting a fake 'domain for sale' page when accessed from computers. Authorities advise against clicking on suspicious links and recommend reporting such scams to the appropriate agencies.
Malware Steals Account Credentials
released on 2024-11-09 @ 01:13:50 AM
A malicious script targeting e-commerce sites, particularly Magento, has been discovered. The script, found in the dataPost.js file, is heavily obfuscated and designed to steal customer account credentials and admin login details. It waits for login actions to trigger, then scrapes data entered into the form. The stolen information is sent to a domain mimicking legitimate jQuery repositories. This malware appears tailored for specific site designs, potentially allowing attackers to make site changes or install malicious modules. To protect against such attacks, regular password updates, software updates, principle of least privilege for admin accounts, and IP restrictions for admin logins are recommended.
New Campaign Uses Remcos RAT to Exploit Victims
released on 2024-11-08 @ 06:33:57 PM
A phishing campaign utilizing Remcos RAT has been detected. The attack begins with an email containing a malicious Excel document that exploits CVE-2017-0199. When opened, it downloads and executes an HTA file, which in turn downloads and runs a malicious EXE. This EXE uses PowerShell to load and execute obfuscated code, employing various anti-analysis techniques. The malware performs process hollowing to inject Remcos into a new process, maintaining persistence through registry modifications. Remcos then communicates with its C2 server, collecting system information and awaiting further commands. The RAT has extensive capabilities for remote control and data exfiltration from the victim's device.
AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services
released on 2024-11-08 @ 06:33:55 PM
The AndroxGh0st malware has expanded its capabilities by incorporating the Mozi botnet to target IoT devices and cloud services. This Python-based tool, known for attacking Laravel applications, now exploits a wider range of vulnerabilities in internet-facing applications. The malware uses remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures. AndroxGh0st's integration with Mozi suggests a possible operational alliance, allowing it to propagate to more devices. The botnet cycles through common administrative usernames and targets WordPress backends. This collaboration enhances the effectiveness and efficiency of their combined botnet operations, potentially indicating control by the same cybercriminal group.
CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
released on 2024-11-08 @ 12:04:44 PM
A targeted email campaign exploiting CVE-2024-38213 has been uncovered, disguised as communication related to the Gas Infrastructure Europe Annual Conference in Munich. The attack bypasses standard security protocols to deploy LummaStealer malware, stealing sensitive data. The vulnerability, known as Copy2Pwn, bypasses Windows' Mark-of-the-Web feature, creating a dangerous security gap. Multiple threat actors, including AsyncRAT and XWorm, have been linked to its exploitation. The attack involves a sophisticated multi-stage payload, using system utilities for persistence and obfuscation. Recommendations include restricting certain email attachment types, deploying SIGMA rules for detection, and blocking identified indicators of compromise.
QSC: new modular framework in CloudComputating campaigns
released on 2024-11-08 @ 11:37:08 AM
Kaspersky researchers discovered QSC, a multi-plugin malware framework used by the CloudComputating group in cyber espionage campaigns. QSC consists of a Loader, Core module, Network module, File Manager module, and Command Shell module, allowing attackers to load specific plugins on demand. The framework was deployed alongside a new Golang-based backdoor called GoClient. Attackers used stolen domain admin credentials to move laterally and deploy QSC on other machines within compromised networks. The campaigns targeted telecommunication companies in South and West Asia, with attackers collecting system information, accessing domain controllers, and exfiltrating sensitive data.
BlueNoroff used macOS malware with novel persistence
released on 2024-11-08 @ 12:02:55 AM
SentinelLabs researchers identified a North Korea-linked threat actor targeting crypto businesses with new macOS malware as part of a campaign called 'Hidden Risk'. The attackers, linked to BlueNoroff, used fake cryptocurrency news emails and a malicious app disguised as a PDF to deliver multi-stage malware. The malware uses a novel persistence technique exploiting the Zsh configuration file to bypass macOS security notifications. The campaign has been active since July 2024 and shows BlueNoroff's continued focus on targeting the crypto and Web3 sectors with evolving tactics.
WINELOADER Analysis
released on 2024-11-07 @ 10:48:58 PM
APT29, also known as Cozy Bear, has targeted European diplomats using a sophisticated multi-stage attack chain involving a new modular backdoor called WINELOADER. The attack begins with a fake PDF invitation to a wine-tasting event, which leads to the download of a malicious HTA file. This file then downloads and executes the WINELOADER backdoor, which uses advanced evasion techniques such as DLL side-loading, encryption, and DLL hollowing. The malware communicates with command and control servers hosted on compromised websites, downloading additional modules and establishing persistence through scheduled tasks or registry keys. The campaign demonstrates APT29's focus on exploiting diplomatic relations between India and European nations, showcasing their advanced tactics and efforts to remain undetected.
2024 Credit Card Theft Season Arrives
released on 2024-11-07 @ 10:48:55 PM
As the holiday shopping season approaches, eCommerce website owners need to be vigilant against credit card stealing malware, known as 'MageCart'. Attackers focus their efforts in the last quarter to maximize profits from stolen card details. Analysis of recent malware samples reveals sophisticated techniques, including WebSocket skimmers, jquery hex skimmers, and r.blob skimmers. These skimmers use obfuscation methods like XOR encryption and base64 encoding to hide their malicious code. The Smilodon hacking group has evolved its tactics, now using randomized plugin names in WordPress. Website owners are advised to implement security measures such as two-factor authentication, strong passwords, and keeping software up-to-date to protect against these threats.
Unmasking Phishing: Strategies for identifying 0ktapus domains and beyond
released on 2024-11-07 @ 05:32:29 PM
This analysis examines phishing tactics used by threat actors, particularly focusing on the 0ktapus group. It outlines techniques for investigating phishing campaigns by pivoting between landing pages, using 0ktapus as a case study. The methods discussed include application fingerprinting, network profiling, and domain registration analysis. The research reveals various DOM templates used by 0ktapus over time and provides insights into their infrastructure and tactics. The article also offers recommendations for prevention and detection of phishing attacks, emphasizing the importance of MFA, SSO, and continuous vigilance in cybersecurity practices.
Analysis of AsyncRAT's Infection Tactics via Open Directories
released on 2024-11-07 @ 05:32:29 PM
This analysis explores two distinct methods used to infect systems with AsyncRAT through open directories. The first technique involves a multi-stage process using various obfuscated scripts (VBS, BAT, PowerShell) and disguised files to download and execute the AsyncRAT payload. The second method employs a simpler two-stage approach, utilizing a VBS script and a disguised PowerShell script to create files and set up a scheduled task for persistent infection. Both techniques demonstrate the adaptability of attackers in using publicly accessible files to spread AsyncRAT, a Remote Access Trojan designed for system infiltration and remote control.
Unwrapping the emerging Interlock ransomware attack
released on 2024-11-07 @ 04:41:29 PM
A new ransomware group called Interlock has emerged, targeting various sectors with big-game hunting and double extortion attacks. The group uses a sophisticated delivery chain including a RAT disguised as a browser updater, PowerShell scripts, credential stealers, and keyloggers. They primarily move laterally through RDP and exfiltrate data using Azure Storage Explorer. The Interlock ransomware encrypts files with the .Interlock extension and drops ransom notes. The attackers claim to exploit unaddressed vulnerabilities and justify their actions as holding companies accountable for poor cybersecurity. Analysis suggests possible links to the Rhysida ransomware group based on similarities in tactics and code. The attack timeline indicates a dwell time of about 17 days in the victim's environment.
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
released on 2024-11-06 @ 06:33:53 PM
A large-scale phishing campaign deploying the latest version of Rhadamanthys stealer (0.7) has been discovered. The campaign, dubbed CopyRh(ight)adamantys, uses copyright infringement claims to target various regions globally. It impersonates numerous companies, mainly from Entertainment/Media and Technology/Software sectors, sending tailored emails to specific entities. The campaign's sophistication suggests the use of automation and possibly AI tools for lure distribution. The latest Rhadamanthys version claims to include AI-powered text recognition, though analysis reveals it uses older machine learning techniques typical of OCR software. The campaign's wide targeting and tactics indicate it's likely orchestrated by a financially motivated cybercrime group rather than a nation-state actor.
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit
released on 2024-11-06 @ 04:21:53 PM
RunningRAT, a remote access trojan initially observed in 2018 targeting the Pyeongchang Winter Olympics, has evolved its capabilities to include cryptocurrency mining. This shift indicates an expansion of the malware's operational focus. The analysis reveals the discovery of RunningRAT samples in open directories, detailing its execution process, network communications, and connection to cryptocurrency mining tools. The malware's infrastructure includes command and control servers hosting XMRig mining software, suggesting a new direction towards financial gain through compromised systems. The findings highlight the adaptability of established malware and the importance of continued monitoring for emerging threats.
New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps
released on 2024-11-06 @ 04:21:51 PM
A command-and-control framework called Winos 4.0 is being distributed through gaming-related applications, targeting Chinese-speaking users. The malware, rebuilt from Gh0st RAT, uses a multi-stage infection process involving fake BMP files, DLLs, and shellcode. It can harvest system information, capture clipboard content, gather cryptocurrency wallet data, and enable backdoor functionality. Winos 4.0 also allows for additional plugins to capture screenshots and upload sensitive documents. The framework is considered powerful, similar to Cobalt Strike and Sliver, and exploits users' trust in game optimization tools to deploy deep system control.
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
released on 2024-11-06 @ 02:29:09 PM
A new Gootloader variant has been discovered using search engine optimization (SEO) poisoning to target Australian Bengal cat enthusiasts. The campaign uses Google search results for 'Are Bengal Cats legal in Australia?' to deliver malicious payloads. When users click on compromised links, a zip file containing obfuscated JavaScript is downloaded. This initial payload drops a larger JavaScript file, which creates a scheduled task for persistence. The second stage uses WScript and CScript to execute additional PowerShell commands. While the full deployment of GootKit was not observed in this case, the malware typically leads to information stealing and potential ransomware attacks. The campaign demonstrates the ongoing evolution of Gootloader's tactics and the continued threat of SEO poisoning for malware delivery.
New Trend in MSI File Abuse: New Use of MST Files to Deliver Tromas
released on 2024-11-06 @ 11:22:43 AM
The New OceanLotus group has reactivated after a year, employing a novel tactic of MSI file misuse. This APT campaign, targeting a domestic governmental enterprise, marks the first observed use of the MSI TRANSFORMS technique by an APT group. The attack utilizes a legitimate Microsoft installation package, exploiting the MST file to execute malicious code. The group has evolved its methods, shellcode-izing their RUST Trojan for improved memory countermeasures. The campaign's execution chain involves spear-phishing emails and employs DLL side-loading techniques. This new approach demonstrates the group's continued sophistication and adaptability in their cyber espionage activities.
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM
released on 2024-11-06 @ 11:19:36 AM
A new Android banking Trojan called ToxicPanda has emerged, targeting Europe and Latin America. Originating from Chinese-speaking threat actors, it has infected over 1500 devices across Italy, Portugal, Spain, and other countries. ToxicPanda exploits accessibility services for account takeovers and on-device fraud. It can intercept OTPs, remotely control devices, and collect sensitive data. The malware uses AES encryption for C2 communication and has a sophisticated control panel. While less advanced than some trojans, ToxicPanda's expansion into new regions marks a significant shift in the threat landscape.
Analysis of Cyber Reconnaissance Activities Behind APT37 Threats
released on 2024-11-06 @ 11:12:08 AM
The report analyzes the covert cyber reconnaissance activities of the state-sponsored APT37 group targeting South Korea. The group uses spear-phishing emails with malicious LNK files to deploy the RoKRAT malware, collecting sensitive information from victims' devices. The attackers employ various tactics to evade detection, including web beacons for initial reconnaissance and cloud storage services for command and control. The report highlights the group's evolving techniques, use of VPN servers, and specific targeting of individuals in fields related to North Korea. It emphasizes the need for enhanced endpoint security solutions to detect and respond to such sophisticated threats.
North Korean remote workers landing jobs in the West
released on 2024-11-06 @ 11:06:57 AM
North Korean threat actors are utilizing Contagious Interview and WageMole campaigns to secure remote employment in Western countries, evading financial sanctions. The Contagious Interview campaign has been updated with improved script obfuscation and multi-platform support, targeting over 100 devices across various operating systems. The campaign steals sensitive data, including source code and cryptocurrency information. WageMole leverages stolen data to create fake identities, using generative AI to acquire and perform jobs. The actors aggressively target developers through social media and job platforms, focusing on web, cryptocurrency, and AI roles. They use sophisticated techniques to bypass background checks and secure legitimate remote positions, particularly in small to mid-sized businesses.
Supply Chain Attack Using Ethereum Smart Contracts to Distribute Multi-Platform Malware
released on 2024-11-05 @ 05:21:39 PM
A sophisticated supply chain attack has been discovered targeting the NPM ecosystem. The malicious package 'jest-fet-mock' impersonates popular testing utilities and uses Ethereum smart contracts for command-and-control operations. This cross-platform malware affects Windows, Linux, and macOS, executing during package installation via preinstall scripts. It performs info-stealing actions and establishes persistence across infected systems. The attack leverages blockchain technology for resilient C2 infrastructure, making it difficult to detect and take down. This approach represents a notable shift in supply chain attack methodologies, combining blockchain with traditional attack vectors. The campaign specifically targets development environments and CI/CD pipelines, posing a significant threat to software supply chains.
Investigating a SharePoint Compromise: IR Tales from the Field
released on 2024-11-05 @ 04:01:01 PM
An incident response investigation uncovered an attacker who exploited a SharePoint vulnerability (CVE-2024-38094) to gain initial access. The attacker remained undetected for two weeks, moving laterally across the network and compromising the entire domain. Key tactics included installing Horoung Antivirus to impair defenses, using tools like Impacket and Mimikatz for lateral movement and credential harvesting, and establishing persistence through scheduled tasks. The attacker attempted to destroy backups and used various binaries for network reconnaissance and privilege escalation. The investigation revealed the importance of efficient response procedures and comprehensive security tooling to mitigate the impact of such breaches.
Attempts to disrupt Russian businesses with MetaStealer
released on 2024-11-05 @ 11:42:21 AM
A previously unknown threat actor, Venture Wolf, has been targeting Russian businesses since November 2023. The group uses multiple loaders to deliver MetaStealer, a malware that focuses on manufacturing, construction, IT, and telecommunications industries. The campaign involves disseminating archives with loaders and phishing documents, using various file types as decoys. The loaders, which are obfuscated PE files, inject the malicious payload into dummy .NET files or RegAsm.exe processes. MetaStealer, a fork of RedLine, collects system information, retrieves data from browsers and crypto wallets, and steals information from email clients and other applications. The threat actor employs sophisticated techniques to evade detection and analysis.
Python RAT with a Nice Screensharing Feature
released on 2024-11-05 @ 11:42:20 AM
A Python Remote Access Trojan (RAT) with advanced capabilities, including a notable screensharing feature, has been discovered. The RAT, based on a two-year-old script, has a low detection rate on VirusTotal. It offers numerous functions to control the victim's computer, such as shell access, webcam control, and registry manipulation. The screensharing feature utilizes the 'vidstream' Python library, enabling real-time viewing of the victim's screen. A proof-of-concept demonstrated the RAT's ability to stream the victim's screen to the attacker's computer. This exemplifies Python's growing popularity among attackers for creating sophisticated malware, even for Windows environments.
Automatically Detecting DNS Hijacking in Passive DNS
released on 2024-11-05 @ 05:37:25 AM
This article describes a machine learning-based pipeline for detecting DNS hijacking using passive DNS data. The system processes an average of 167 million new DNS records daily, extracting 74 features from over 169 terabytes of data. Between March and September 2024, it identified 6,729 hijacking incidents out of 29 billion processed records. Notable examples include the hijacking of a Hungarian political party's domain, the defacement of a utility company and ISP, and the use of university and research center domains for illicit gambling. The pipeline can now detect DNS hijacking in customer traffic within 10 minutes, providing crucial protection against this pervasive threat.
Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT
released on 2024-11-04 @ 10:12:02 PM
APT36, also known as Transparent Tribe, is a Pakistan-based threat actor targeting Indian government and military entities. Their campaigns utilize ElizaRAT, a Windows Remote Access Tool that has evolved to enhance evasion techniques and C2 communication. Recent campaigns employ cloud services like Google Drive, Telegram, and Slack for distribution and control. The malware deploys payloads such as ApoloStealer to collect sensitive information from victims' systems. ElizaRAT's execution methods and detection evasion have improved, with new variants using different cloud services and VPS for C2. The campaigns exclusively target Indian systems, as evidenced by time zone checks in the malware.
G700: The Next Generation of Craxs RAT
released on 2024-11-04 @ 10:11:55 PM
G700 RAT, an advanced variant of Craxs RAT, targets Android devices and cryptocurrency applications. It employs sophisticated techniques like privilege escalation, phishing, and malicious APK distribution to infiltrate devices. The malware bypasses authentication, captures sensitive data, and manipulates legitimate app functions, allowing attackers to perform illicit actions undetected. Developed in C# and Java, it exploits mobile app security gaps, intercepts SMS messages, abuses Android permissions, and hijacks crypto transactions. G700 RAT uses persistence and obfuscation techniques, including Base64 encoding and APK encryption, to evade detection. Distributed through darkweb forums and Telegram channels, it poses a growing threat to device security, especially in cryptocurrency and financial environments.
Recent Keylogger Attributed to North Korean Group Andariel
released on 2024-11-04 @ 05:12:19 PM
A new keylogger, attributed to the North Korean group Andariel (APT45), has been linked to targeted attacks against U.S. organizations. The malware captures keystrokes and mouse activity, storing data in an encrypted archive. It employs anti-analysis techniques like code obfuscation through junk code. The keylogger sets global Windows hooks to intercept keystrokes and mouse events, modifies registry for persistence, and creates a password-protected archive in the temp folder. It uses SetWindowsHookEx API for keyboard and mouse event monitoring, and GetMessageW API for message queue handling. The malware also steals clipboard data and logs special key presses. Hybrid Analysis effectively identified the keylogger's capabilities, persistence mechanism, and log file creation, providing valuable insights for threat analysis.
DDoS-for-Hire Platform dstat[.]cc Disrupted; Suspects Arrested
released on 2024-11-04 @ 05:12:17 PM
German law enforcement authorities have successfully disrupted dstat[.]cc, a criminal service facilitating distributed denial-of-service (DDoS) attacks. The platform provided recommendations and evaluations of stresser services, making DDoS attacks accessible to users without advanced technical skills. Two suspects, aged 19 and 28, were arrested in connection with the platform. They are also accused of operating an online drug trafficking platform called 'Flight RCS.' This takedown is part of Operation PowerOFF, an ongoing law enforcement initiative targeting DDoS-for-hire sites. The disruption of dstat[.]cc represents a significant blow to the cybercriminal ecosystem, as it offered botnet owners the ability to assess and demonstrate their attack capabilities.
Attacker Abuses Victim Resources to Reap Rewards from Titan Network
released on 2024-11-04 @ 12:01:31 PM
An attacker exploited the Atlassian Confluence vulnerability CVE-2023-22527 to achieve remote code execution for cryptomining via the Titan Network. The malicious actor gathered system details using public IP lookup services and various commands. Multiple shell scripts were downloaded and executed to install Titan binaries and connect compromised machines to the Titan Network, specifically the Cassini Testnet. This allowed the attacker to participate in the delegated proof of stake system for reward tokens. The attack also involved installing an aleo-pool client for additional cryptomining activities. Furthermore, attempts at lateral movement through SSH in AWS cloud were observed, including the deployment of SSH public keys and modification of SSH configurations.
Cryptocurrency Enthusiasts Targeted in Multi-Vector Supply Chain Attack
released on 2024-11-04 @ 11:49:59 AM
A sophisticated malware campaign targeting cryptocurrency enthusiasts has been uncovered, utilizing multiple attack vectors including a malicious Python package on PyPI and deceptive GitHub repositories. The multi-stage malware, disguised as cryptocurrency trading tools, aims to steal sensitive data and drain crypto wallets. It employs a deceptive GUI to distract users while performing malicious activities in the background. The attack flow involves an initial infection through the PyPI package, followed by a multi-stage process using a fake website to deliver secondary payloads. The malware conducts extensive data theft, targeting cryptocurrency wallet data, browser information, and sensitive system files. The attacker uses multiple platforms to distribute the malware and engages with potential victims through a Telegram channel.
Analyzing an Encrypted Phishing PDF
released on 2024-11-04 @ 11:06:04 AM
This analysis explores the challenges of decoding encrypted PDF documents, particularly in the context of phishing. It explains that while the structure of encrypted PDFs remains visible, strings and streams are encrypted. The article recommends using qpdf, an open-source tool, to decrypt PDFs for further analysis. It demonstrates the process using a phishing PDF example, showing how to determine if a password is required and how to decrypt the document. The importance of decryption prior to using tools like pdf-parser is emphasized, as it allows for the extraction of crucial information such as URIs, which would otherwise appear as ciphertext.
InfoStealer Malware Attacking Meta Business Page To Steal Logins
released on 2024-11-04 @ 10:12:05 AM
A sophisticated malvertising campaign is distributing the SYS01 infostealer malware through Meta's advertising platform. The attackers impersonate trusted brands and popular software, targeting primarily senior male demographics. The malware, designed to steal personal data and credentials, is distributed via thousands of malicious advertisements potentially reaching millions of users. The attack infrastructure uses multiple domains as fake download platforms, employing evolving distribution mechanisms to avoid detection. The malware's infection chain involves Electron-based applications, obfuscated JavaScript, and PowerShell scripts, with persistence established through Windows Task Scheduler. It communicates with C2 servers using HTTP calls and leverages Telegram bots and Google pages for dynamic C2 domain retrieval.
Booking.com Phishers May Leave You With Reservations
released on 2024-11-02 @ 11:40:43 PM
A recent spear-phishing campaign targeted a California hotel after its Booking.com credentials were stolen. The scam involved sending targeted messages within the Booking mobile app, claiming additional information was required for anti-fraud purposes. Booking.com confirmed a security incident affecting one of its partners, allowing unauthorized access to customer booking information. The company now requires two-factor authentication for partners, but it's unclear if this is enforced for all accounts. Cybercriminals are increasingly targeting Booking.com hospitality partners, with attacks rising 900% in 2024. The article also explores various cybercrime services aimed at phishers targeting hotels that use Booking.com, including the sale of compromised accounts and tools for automated login attempts.
LastPass Warns of Hackers Misusing Reviews for Fake Support Numbers
released on 2024-11-02 @ 05:30:01 PM
LastPass has alerted users about a social engineering campaign targeting customers through fraudulent 5-star reviews on the Chrome Web Store. Hackers are posting fake reviews for the LastPass Chrome extension, promoting a bogus customer support phone number to steal user data. When users call this number, they are connected to scammers impersonating LastPass representatives who attempt to gather personal information and direct callers to a suspicious website. The company is actively working to remove fake reviews and take down phishing websites. LastPass reminds users that they will never ask for master passwords and advises customers to only use official support channels. This scam follows previous cyberattacks on LastPass in 2022 that resulted in data and source code theft.
EDR Bypass Testing Reveals Extortion Actor's Toolkit
released on 2024-11-02 @ 01:03:05 AM
Unit 42 investigated an extortion attempt where threat actors tested an AV/EDR bypass tool on rogue systems with Cortex XDR installed. The actors purchased network access via Atera RMM and used a BYOVD technique for the bypass tool. Researchers gained visibility into the actors' systems, uncovering tools, files, and identifying information. The bypass tool was traced to cybercrime forum posts by user KernelMode. Analysis revealed connections to Conti ransomware training materials and overlaps with known TTPs. A Kazakh company and individual were linked to the activity through exposed documents and video artifacts. The incident highlights the growing trend of AV/EDR bypass tools and the monetization of such capabilities in cybercrime forums.
Inside Iran's Cyber Playbook: AI, Fake Hosting, and Psychological Warfare
released on 2024-11-01 @ 07:36:41 PM
Iranian cyber group Emennet Pasargad, operating as Aria Sepehr Ayandehsazan (ASA), has been linked to targeting the 2024 Summer Olympics and compromising a French display provider. The group, part of Iran's Islamic Revolutionary Guard Corps, used AI software, fictitious hosting resellers, and psychological tactics in their operations. They targeted Israeli athletes, attempted to contact hostage families, and harvested information about Israeli military personnel. The US and Israeli agencies have exposed their tactics, including the use of cover personas and infrastructure obfuscation methods. The US State Department is offering a $10 million reward for information on the IRGC-associated hacking group Shahid Hemmat.
SmokeBuster Tool
released on 2024-10-31 @ 09:16:24 PM
ThreatLabz has developed SmokeBuster, a tool to detect, analyze, and remove SmokeLoader malware from infected systems. Despite Operation Endgame's disruption in May 2024, SmokeLoader continues to be used by threat groups. SmokeBuster supports various SmokeLoader versions and Windows systems, offering features like uninstallation, thread control, and memory manipulation. The tool revealed bugs in recent SmokeLoader versions that significantly degrade system performance. These flaws stem from persistence implementation, infection checks, and inadequate thread and memory cleanup. The bugs cause repeated injections and thread creation, leading to system slowdown over time. SmokeBuster's capabilities may accelerate SmokeLoader's decline, especially given its performance-degrading flaws.
Threat actors use copyright infringement phishing lure to deploy infostealers
released on 2024-10-31 @ 09:16:06 PM
An unknown threat actor is conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. The campaign uses emails impersonating legal departments, claiming copyright infringement to lure victims into downloading malware. The attackers abuse Google's Appspot domains, short URLs, and Dropbox to deliver information stealers, employing various evasion techniques. The malware includes LummaC2 and Rhadamanthys stealers, which are embedded in legitimate binaries. The campaign specifically targets traditional Chinese speakers and uses well-known company names in Taiwan and Hong Kong to increase credibility. The infection chain involves encrypted archives, fake PDF executables, and sophisticated loaders that employ anti-analysis techniques and ensure persistence on infected systems.
Threat Intelligence Alert: Phish 'n' Ships Fakes Online Shops to Steal Money and Credit Card Information
released on 2024-10-31 @ 07:46:48 PM
A sophisticated fraud scheme dubbed 'Phish 'n' Ships' has been uncovered, involving fake web shops that exploit digital payment providers to steal consumers' money and credit card information. The operation, traced back to 2019, has infected over 1,000 websites, created 121 fake web stores, and resulted in estimated losses of tens of millions of dollars. The threat actors, using tools with Simplified Chinese language, drive traffic to these fake shops by infecting legitimate websites and manipulating search engine rankings. The scheme has been partially disrupted through collaborative efforts, but remains an active threat. This operation highlights the dangerous intersection between digital advertising and fraud, emphasizing the need for caution in online shopping.
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns
released on 2024-10-31 @ 07:46:46 PM
Sophos unveils a five-year investigation tracking China-based threat actors targeting perimeter devices, particularly Sophos firewalls. The report details multiple attack campaigns, including Asnarök, Bookmark Buffer Overflow, and Covert Channels, which exploited zero-day vulnerabilities to gain access and deploy various malware payloads. The attackers demonstrated sophisticated tactics, techniques, and procedures, including the use of rootkits, backdoors, and novel persistence mechanisms. The campaigns evolved from indiscriminate attacks to highly targeted operations against government agencies, critical infrastructure, and strategic industries, primarily in the Asia-Pacific region. Sophos' defensive efforts included rapid patching, threat hunting, and collaboration with international cybersecurity agencies and researchers.
Russian Hackers Attacking Ukraine Military With Malware Via Telegram
released on 2024-10-31 @ 03:14:47 PM
Russian hackers, identified as UNC5812, are targeting the Ukrainian military through a sophisticated cyber operation. The attackers use a deceptive Telegram channel and website posing as a civil defense service to distribute malware for both Windows and Android devices. The Windows attack deploys Pronsis Loader, which installs SUNSPINNER (a decoy mapping application) and PURESTEALER (an information-stealing malware). Android users are targeted with CRAXSRAT, a commercial backdoor malware. The operation spreads through promoted posts in legitimate Ukrainian Telegram channels and employs social engineering tactics. The campaign also includes an influence operation sharing anti-mobilization content across pro-Russian social media networks. This cyber-espionage effort aims to exploit recent changes in Ukraine's mobilization laws and the introduction of digital military IDs.
Rat King: How the Android Trojan CraxsRAT Steals User Data
released on 2024-10-31 @ 08:23:49 AM
CraxsRAT, an Android trojan, has been targeting Russian and Belarusian users since summer 2024. It masquerades as legitimate apps like government services, antivirus software, and telecom operators. The malware spreads through social engineering tactics, prompting users to download malicious APK files via messaging apps. CraxsRAT has extensive capabilities, including remote device control, data exfiltration, call and SMS interception, keylogging, and camera/microphone access. It uses various techniques to evade detection and removal. The trojan is believed to be used by both financially motivated groups and those engaged in cyber espionage. Over 140 unique samples have been identified, with the threat continuing to evolve and adapt to maintain its effectiveness.
LUNAR SPIDER Enabling Ransomware Attacks on Financial Sector with Brute Ratel C4 and Latrodectus
released on 2024-10-31 @ 08:23:48 AM
LUNAR SPIDER, a Russian-speaking financially motivated threat group, has resumed operations following law enforcement disruptions. They've shifted from using IcedID to leveraging Latrodectus and Brute Ratel C4 malware, targeting financial services through SEO poisoning malvertising campaigns. The group maintains affiliations with ransomware operators like ALPHV/BlackCat, sharing infrastructure and tools. LUNAR SPIDER's adaptability is evident in their use of over 200 malicious infrastructures across different malware families. Their latest campaign employed obfuscated JavaScript to deliver Brute Ratel C4, establishing persistence and command-and-control communication.
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
released on 2024-10-30 @ 10:04:22 PM
On October 22, 2024, Microsoft identified a spear-phishing campaign in which Midnight Blizzard sent phishing emails to thousands of users in over 100 organizations. The emails were highly targeted, using social engineering lures relating to Microsoft, Amazon Web Services (AWS), and the concept of Zero Trust. The emails contained a Remote Desktop Protocol (RDP) configuration file signed with a LetsEncrypt certificate. RDP configuration (.RDP) files summarize automatic settings and resource mappings that are established when a successful connection to an RDP server occurs.
Strela Stealer Targets Europe Stealthily Via WebDav
released on 2024-10-30 @ 09:45:06 PM
Strela Stealer, first identified by DCSO in late 2022, is a type of information-stealing malware primarily designed to exfiltrate email account credentials from widely used email clients, including Microsoft Outlook and Mozilla Thunderbird. This malware initially targeted Spanish-speaking users through spam email campaigns containing malicious ISO attachments, which included a .lnk file and a polyglot file. When executed, the .lnk file triggered the polyglot file, executing both the lure html and Strela stealer DLL using “rundll32.exe”.
Play Ransomware Engagement
released on 2024-10-30 @ 04:32:04 PM
Unit 42 has identified Jumpy Pisces, a North Korean state-sponsored threat group, as a key player in a recent ransomware incident. The group appears to be collaborating with the Play ransomware group, marking a shift in their tactics. This is the first observed instance of Jumpy Pisces using existing ransomware infrastructure, potentially acting as an initial access broker or an affiliate. The attack timeline spans from May to September 2024, involving initial access through a compromised user account, lateral movement, and persistence using tools like Sliver and DTrack. The incident culminated in the deployment of Play ransomware in early September. This collaboration signals deeper involvement of North Korean threat actors in the broader ransomware landscape, potentially leading to more widespread and damaging attacks globally.
Suspected DPRK Phishing Campaign Targets Naver; Separate Apple Domain Spoofing Cluster Identified
released on 2024-10-30 @ 03:14:53 PM
Researchers discovered a potential North Korean phishing campaign targeting Naver, a major South Korean tech platform. The investigation revealed an exposed directory containing phishing pages designed to steal Naver user credentials. Separately, an infrastructure cluster was identified using domains and certificates impersonating Apple. Both findings align with tactics commonly associated with DPRK cyber operations. The phishing server, hosted in Seoul, contained multiple folders with files for credential theft. Additionally, a cluster of IPs across various countries was found sharing TLS certificates and domains spoofing Apple. The use of low-cost domains, Let's Encrypt certificates, and frequent infrastructure changes are consistent with known DPRK threat actor behaviors.
Writing a BugSleep C2 server and detecting its traffic with Snort
released on 2024-10-30 @ 03:14:53 PM
This analysis focuses on the BugSleep implant, also known as MuddyRot, a remote access tool that provides reverse shell and file I/O capabilities. The article details the process of reverse engineering BugSleep's protocol, creating a functional C2 server, and developing Snort rules for traffic detection. Key aspects include the implant's use of a bespoke C2 protocol over TCP, its encryption methods, and command structure. The researchers successfully implemented various commands such as ping, file operations, and reverse shell in a Python C2 server. The development of Snort rules for detecting BugSleep traffic is also discussed, highlighting challenges in rule creation and the use of flowbits for improved detection accuracy.
More Than Just a Corporate Wiki? How Threat Actors are Exploiting Confluence
released on 2024-10-30 @ 10:21:18 AM
Threat actors are increasingly using legitimate third-party business software to evade detection and maintain deception. Atlassian's Confluence is being exploited to host malicious content, leveraging its trusted domain status. The attack involves an email with an Excel attachment containing a DocuSign-branded image. Clicking the hyperlink redirects users to an Atlassian domain, then to a Microsoft-branded sign-in form. This technique bypasses secure email gateways and other security measures. Once credentials are entered, they are exfiltrated to the threat actor's domain. Such attacks can lead to various malicious activities, including spear phishing, business email compromises, and malware deployment. The use of trusted domains makes these attacks particularly effective and difficult to detect.
Notorious WrnRAT Delivered Mimic As Gambling Games
released on 2024-10-29 @ 09:32:35 PM
Cybersecurity analysts have uncovered a sophisticated malware operation targeting online gambling platforms. Threat actors are distributing the WrnRAT malware by disguising it as popular Korean gambling games. The multi-stage infection process involves a batch script, followed by a .NET-based dropper that installs and executes WrnRAT. The malware, developed using Python and packaged with PyInstaller, captures screenshots, collects system information, and can terminate specific processes. It also manipulates firewall configurations to evade detection. The primary motivation appears to be financial exploitation, with attackers potentially gaining unfair advantages in gambling activities by observing players' actions in real-time.
Malicious CAPTCHA delivers Lumma and Amadey Trojans
released on 2024-10-29 @ 02:25:10 PM
An adware campaign targets online users by presenting them with fake CAPTCHA or update prompts, tricking them into running malicious PowerShell commands that deploy credential-stealing malware like Lumma and Amadey. The attackers leverage ad networks to redirect victims to compromised sites hosting these social engineering lures. Once executed, Lumma abuses legitimate BitLocker functionality to harvest cryptocurrency wallets, passwords, and browser data, while Amadey gathers credentials and can deploy Remcos remote access trojan.
Docker Gatling Gun Campaign
released on 2024-10-29 @ 01:51:29 PM
Recent research has uncovered a new malicious campaign orchestrated by the notorious hacking group TeamTNT. This campaign exploits exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, utilizing compromised servers and Docker Hub as infrastructure for spreading their malicious payloads. TeamTNT is leveraging native cloud capabilities by appending compromised Docker instances to a Docker Swarm and using Docker Hub to store and distribute their malware, aiming to rent out victim's computational resources to third parties for cryptomining operations.
Evasive Panda scouting cloud services
released on 2024-10-28 @ 08:14:34 PM
CloudScout is a post-compromise toolset used by Evasive Panda to target a Taiwanese government entity and religious organization between 2022 and 2023. The toolset can retrieve data from various cloud services using stolen web session cookies. It works with MgBot, Evasive Panda's malware framework, through a plugin. Three CloudScout modules were analyzed, targeting Google Drive, Gmail, and Outlook. The modules are deployed by MgBot plugins and use stolen cookies to access and exfiltrate cloud data. CloudScout's design includes a common architecture across modules and a core CommonUtilities package. The toolset demonstrates Evasive Panda's technical capabilities and focus on cloud-stored data in espionage operations.
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives
released on 2024-10-28 @ 03:48:41 PM
A Russian hybrid espionage and influence operation, dubbed UNC5812, targets potential Ukrainian military recruits through a Telegram persona called 'Civil Defense'. The campaign delivers Windows and Android malware, including SUNSPINNER, PURESTEALER, and CRAXSRAT, while simultaneously spreading anti-mobilization narratives. The operation uses social engineering tactics to bypass security measures and gain extensive permissions on victims' devices. UNC5812 also engages in influence activities to undermine Ukraine's mobilization efforts by soliciting and sharing content that discredits Ukrainian military recruitment practices. The campaign leverages both a dedicated website and Telegram channel to distribute malware and propagate anti-mobilization messages.
Chinese Hackers Toolkit Uncovered And Activity History Uncovered
released on 2024-10-28 @ 03:48:39 PM
A Chinese hacking group called 'You Dun' was discovered through an exposed open directory, revealing their comprehensive attack infrastructure. The group utilized sophisticated reconnaissance tools and exploited Zhiyuan OA software via SQL injection attacks, targeting South Korean pharmaceutical organizations. They employed advanced privilege escalation tools and operated a C2 infrastructure using Cobalt Strike and Viper framework. The hackers also created a custom ransomware variant based on LockBit 3.0. Their activities extended across multiple Asian countries, focusing on government, education, health, and logistics sectors. The group used proxy servers to conceal their location and employed various hacking tools, including WebLogicScan, Vulmap, Xray, and dirsearch.
Docker Gatling Gun Campaign
released on 2024-10-26 @ 02:24:30 PM
A new campaign by the hacking group TeamTNT targets cloud native environments, exploiting exposed Docker daemons to deploy Sliver malware, cyber worms, and cryptominers. The group is utilizing Docker Swarm and Docker Hub to spread malware and rent out victims' computational power. TeamTNT has adopted new tools, replacing their traditional Tsunami backdoor with Sliver malware. The attack flow involves aggressive scanning, resource hijacking, and the use of cloud tools. The campaign gains initial access through exposed Docker ports and deploys containers from compromised Docker Hub accounts. TeamTNT's infrastructure includes new domains and compromised web servers, with indications of potential future attacks on Kubernetes clusters.
Unauthorized RDP Connections For Cyberespionage Operations
released on 2024-10-26 @ 02:24:28 PM
Cyble Research and Intelligence Labs uncovered an ongoing cyberattack campaign utilizing malicious LNK files to gain unauthorized Remote Desktop access on compromised systems. The sophisticated multi-stage attack chain employs PowerShell and BAT scripts to evade detection, create administrative accounts, and alter Remote Desktop settings. The campaign, named 'HeptaX', has been active since 2023, targeting various sectors with consistent techniques. It involves the deployment of ChromePass, a tool for stealing saved passwords from Chromium-based browsers. The attack begins with a ZIP file containing a malicious shortcut, likely distributed via phishing emails, and progresses through multiple stages of payload downloads and executions, ultimately enabling the threat actors to establish remote access for further malicious activities.
Malicious RDP Files Identified in Latest Attack on Ukrainian Entities
released on 2024-10-26 @ 07:55:17 AM
CERT-UA has uncovered a new malicious email campaign targeting Ukrainian government agencies, enterprises, and military entities. The campaign uses RDP configuration files to establish remote connections, enabling data theft and further malware deployment. Attributed to UAC-0215 and linked to APT29, the operation exploits popular services like Amazon and Microsoft. Infrastructure preparation began in August 2024, with potential to spread beyond Ukraine. Amazon has seized impersonating domains to neutralize the threat. CERT-UA also warned of other attacks, including a large-scale operation stealing confidential information (UAC-0218) and a ClickFix-style campaign possibly linked to APT28.
Uncovering the Lounge Pass Scam Campaign: Targeted Android SMS Stealer Preying on Air Travellers
released on 2024-10-25 @ 08:49:48 PM
A sophisticated scam targeting air travelers in Indian airports has been uncovered, involving a malicious Android app called 'Lounge Pass'. The app, distributed through fake domains, intercepts and forwards SMS messages from victims' devices to cybercriminals, resulting in significant financial losses. Between July and August 2024, over 450 travelers unknowingly installed the fraudulent app, leading to a theft of more than INR 9 lakhs (approx. $11,000). The scammers exploited an exposed Firebase endpoint to store stolen SMS messages. Multiple related domains were identified spreading similar APKs. Key recommendations include downloading apps only from official stores, avoiding random QR code scanning, and never granting SMS access to travel or lounge apps.
The Good, the Bad and the Ugly in Cybersecurity - Week 43
released on 2024-10-25 @ 08:49:48 PM
CISA proposes new security measures to protect sensitive data from adversary nations, following President Biden's Executive Order. A free file recovery tool for early Mallox ransomware victims is released. A novel macOS ransomware, macOS.NotLockBit, is discovered abusing AWS S3 for data exfiltration. A critical Fortinet zero-day vulnerability (CVE-2024-47575) has been exploited in-the-wild since June, potentially affecting over 50 servers. Fortinet has released a patch and provided mitigation strategies for affected customers.
Tenacious Pungsan: A DPRK threat actor linked to Contagious Interview
released on 2024-10-25 @ 01:53:45 PM
Datadog Security Research discovered three malicious npm packages: passports-js, bcrypts-js, and blockscan-api, containing BeaverTail malware associated with North Korean threat actors. The packages, downloaded 323 times, targeted job-seekers in the US tech industry through a campaign named Contagious Interview. The malware, obfuscated using common techniques, steals cryptocurrency wallet and credit card information from browser caches and login keychains on Unix and Windows systems. The attackers used namesquatting to mimic legitimate packages and exploited the open source software supply chain. Two different campaign IDs were identified, suggesting potentially new efforts to target Node.js developers. The activity was linked to the Contagious Interview campaign through shared infrastructure and tactics.
ValleyRAT Insights: Tactics, Techniques, and Detection Methods
released on 2024-10-25 @ 09:19:32 AM
ValleyRAT is a remote access Trojan targeting Chinese-speaking users through phishing campaigns. It employs multi-stage, multi-component tactics to evade detection and maintain persistence. The malware uses various techniques including process injection, registry manipulation, and UAC bypass. It attempts to disable antivirus software and evade sandboxes. ValleyRAT creates scheduled tasks and modifies registry keys for persistence. The analysis reveals its use of MITRE ATT&CK techniques such as startup folder manipulation, process injection, and command and control communication. The blog provides insights into ValleyRAT's tactics and offers detection methods to defend against this evolving threat.
Senator questions internet domain companies over Russian disinformation charges
released on 2024-10-25 @ 09:00:34 AM
A US Senator has sent letters to CEOs of major internet domain companies, questioning their role in recently-uncovered Russian disinformation campaigns. The Senator highlights the use of domain registration services by the 'Doppelganger' network, which creates websites mimicking legitimate news sources to spread propaganda. The letters emphasize the potential impact on the upcoming presidential election and criticize the domain name industry for not addressing abusive behavior. The Senator warns that legislative remedies may be necessary to promote greater diligence in the global domain name ecosystem, particularly in light of foreign attempts to undermine confidence in the election.
Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN
released on 2024-10-24 @ 06:23:43 PM
Since early August, there has been a significant increase in Fog and Akira ransomware intrusions targeting SonicWall SSL VPN users across various industries. The attacks appear opportunistic rather than targeting specific sectors. All affected devices lacked patches for CVE-2024-40766. Initial access involved VPN logins from VPS hosting IPs, with rapid progression to data encryption and exfiltration, often within hours. Shared infrastructure was observed across multiple intrusions. Defenders are advised to prioritize firmware updates, monitor for suspicious VPN logins, maintain secure offsite backups, and watch for post-compromise activities on endpoints.
Operation Cobalt Whisper: Threat Actor Targets Multiple Industries Across Hong Kong and Pakistan
released on 2024-10-24 @ 12:59:06 PM
A sophisticated cyber espionage campaign dubbed Operation Cobalt Whisper has been uncovered, targeting various industries in Hong Kong and Pakistan. The threat actor focuses on the defense sector, engineering researchers, and key entities in these regions, using tailored lures related to electrotechnical societies, energy infrastructure, and environmental engineering. The campaign heavily relies on Cobalt Strike for post-exploitation, deploying it through obfuscated VBScript. The attack chain involves malicious LNK files, VBScript, and Cobalt Strike beacons. The operation has been active since May 2024, with over 20 infection chains identified. The threat actor's tactics suggest a methodical approach to cyber-espionage, aiming to compromise sensitive research and intellectual property.
Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575)
released on 2024-10-24 @ 11:31:53 AM
A new threat cluster, UNC5820, has been observed exploiting a zero-day vulnerability in FortiManager appliances across multiple industries. The vulnerability allows unauthorized execution of arbitrary code or commands on vulnerable devices. The attackers staged and exfiltrated configuration data from managed FortiGate devices, potentially enabling further compromise. Exploitation attempts were first detected on June 27, 2024, with a second attempt on September 23, 2024. The threat actor added an unauthorized device to the FortiManager console and exfiltrated compressed archives containing sensitive configuration files. While no evidence of lateral movement has been found, organizations with exposed FortiManager devices are urged to conduct immediate forensic investigations.
Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis
released on 2024-10-24 @ 11:31:51 AM
This analysis examines two cybersecurity incidents: a web shell attack and a VPN compromise. The web shell attack involved uploading malicious files to a server, executing commands, creating a local admin account, and attempting to establish persistence. The VPN compromise led to lateral movement, with the attacker using legitimate tools like AnyDesk for remote access and attempting privilege escalation. Both incidents highlight the importance of layered security, comprehensive logging, and proactive threat detection. Key recommendations include implementing strong input validation, network segmentation, regular patching, and monitoring for unusual activities. The analysis emphasizes the need for organizations to adopt a multi-faceted approach to cybersecurity to defend against evolving threats.
Embargo ransomware: Rock'n'Rust
released on 2024-10-23 @ 10:35:31 PM
ESET researchers have uncovered new Rust-based tools used by the Embargo ransomware group. The toolkit includes MDeployer, a loader that deploys MS4Killer and Embargo ransomware, and MS4Killer, an EDR killer that exploits a vulnerable driver. Embargo, first observed in June 2024, is a relatively new player in the ransomware scene that targets both Windows and Linux systems. The group's tools are actively developed and customized for each victim. MDeployer abuses Safe Mode to disable security solutions, while MS4Killer terminates security product processes using the Bring Your Own Vulnerable Driver technique. The analysis reveals ongoing development and adaptation of the tools during intrusions, suggesting the attackers can quickly modify and recompile their toolkit.
FortiManager fgfmd vulnerability indicators
released on 2024-10-23 @ 07:54:29 PM
A critical vulnerability in FortiManager's fgfmd daemon allows remote unauthenticated attackers to execute arbitrary code or commands via specially crafted requests. This vulnerability, classified as CWE-306 (Missing Authentication for Critical Function), has been exploited in the wild. The attack primarily targets the exfiltration of files containing IPs, credentials, and configurations of managed devices. Multiple versions of FortiManager and FortiManager Cloud are affected. Mitigation strategies include upgrading to fixed versions, implementing workarounds such as preventing unknown device registration, using local-in policies to whitelist IP addresses, or employing custom certificates. Recovery methods involve fresh installations or re-initialization of hardware models, with careful consideration of potential data tampering.
DarkComet RAT: Technical Analysis of Attack Chain
released on 2024-10-23 @ 05:36:32 PM
This analysis examines the Remote Access Trojan (RAT) DarkComet, detailing its capabilities, distribution methods, and technical operations. The malware alters file attributes, establishes communication with malicious domains, modifies process privileges, and gathers system information. It employs various persistence mechanisms, including registry modifications. DarkComet's functionalities include simulating user input, capturing keystrokes, and manipulating system settings. The analysis reveals its ability to evade detection, escalate privileges, and execute remote commands via a Command and Control (C2) server. The malware's versatility and ease of use contribute to its widespread deployment in targeted cyberattacks, making it a significant threat to cybersecurity.
Unmasking Prometei: A Deep Dive Into MXDR Findings
released on 2024-10-23 @ 05:36:32 PM
This analysis examines the Prometei botnet's infiltration of a customer's system through a targeted brute force attack. Leveraging Trend Vision One, the investigation traced the botnet's detailed installation routine and stealthy tactics. Prometei, a modular malware family used for cryptocurrency mining and credential theft, spreads by exploiting vulnerabilities and using PowerShell scripts. The botnet downloads compressed archives containing various components to maintain control over infected devices. Key findings include the use of a domain generation algorithm for command and control, deployment of web shells, and connections to the Tor network. The threat actors behind Prometei are likely Russian-speaking individuals, as evidenced by language settings and targeting behaviors.
Triad Nexus: FUNNULL CDN hosting DGA domains for suspect Chinese sites
released on 2024-10-23 @ 01:19:41 PM
Silent Push has uncovered a large-scale malicious infrastructure dubbed 'Triad Nexus' hosted on the FUNNULL content delivery network. The investigation revealed over 200,000 unique hostnames, with 95% created using Domain Generation Algorithms. FUNNULL is linked to hosting suspect gambling websites, investment scams, and a retail phishing campaign targeting major brands. Connections were found to the Suncity Group, previously implicated in money laundering for the Lazarus crime group. A supply chain attack involving the polyfill.io JavaScript library affected over 110,000 websites. The research exposes FUNNULL's role in facilitating various criminal activities and raises concerns about its practices as a CDN provider.